Diff for /loncom/lcuserdel between versions 1.2 and 1.13

version 1.2, 2000/10/28 17:53:01 version 1.13, 2002/10/07 01:41:31
Line 3 Line 3
 # lcuserdel  # lcuserdel
 #  #
 # Scott Harrison  # Scott Harrison
 # October 27, 2000  # SH: October 27, 2000
   # SH: October 28, 2000
   # SH: October 29, 2000
   
 use strict;  use strict;
   
Line 11  use strict; Line 13  use strict;
 # be run by user 'www'.  It DOES NOT delete directories.  # be run by user 'www'.  It DOES NOT delete directories.
 # All it does is remove a user's entries from  # All it does is remove a user's entries from
 # /etc/passwd, /etc/groups, and /etc/smbpasswd.  # /etc/passwd, /etc/groups, and /etc/smbpasswd.
   # It also disables user directory access by making the directory
   # to be owned by user=www (as opposed to the former "username").
   # This command only returns an error if it is
   # invoked incorrectly (by passing bad command-line arguments, etc).
   
   # This script works under the same process control mechanism
   # as lcuseradd and lcpasswd, to make sure that only one of these
   # processes is running at any one time on the system.
   
 # Standard input usage  # Standard input usage
 # First line is USERNAME  # First line is USERNAME
   
   # Valid user names must consist of ascii
   # characters that are alphabetical characters
   # (A-Z,a-z), numeric (0-9), or the underscore
   # mark (_). (Essentially, the perl regex \w).
   
 # Command-line arguments [USERNAME]  # Command-line arguments [USERNAME]
 # Yes, but be very careful here (don't pass shell commands)  # Yes, but be very careful here (don't pass shell commands)
 # and this is only supported to allow perl-system calls.  # and this is only supported to allow perl-system calls.
   
 # Usage within code  # Usage within code
 #  #
 # $exitcode=system("NAME")/256;  # $exitcode=system("/home/httpd/perl/lcuserdel","NAME")/256;
 # print "uh-oh" if $exitcode;  # print "uh-oh" if $exitcode;
   
 # These are the exit codes.  # These are the exit codes.
   # ( (0,"ok"),
   #   (1,"User ID mismatch.  This program must be run as user 'www'"),
   #   (2,"Error. This program needs just 1 command-line argument (username).") )
   #   (3,"Error. Only one line should be entered into standard input."),
   #   (4,"Error. Too many other simultaneous password change requests being made."),
   #   (5,"Error. The user name specified has invalid characters.") )
   
 # Security  # Security
 $ENV{'PATH'}=""; # Nullify path information.  $ENV{'PATH'}=""; # Nullify path information.
Line 38  if (@ARGV) { Line 57  if (@ARGV) {
     $noprint=1;      $noprint=1;
 }  }
   
   # Read in /etc/passwd, and make sure this process is running from user=www
 open (IN, "</etc/passwd");  open (IN, "</etc/passwd");
 my @lines=<IN>;  my @lines=<IN>;
 close IN;  close IN;
Line 53  if ($wwwid!=$<) { Line 73  if ($wwwid!=$<) {
 }  }
 &disable_root_capability;  &disable_root_capability;
   
 # Gather input.  Should only be 3 values.  # Handle case of another lcpasswd process
   unless (&try_to_lock("/tmp/lock_lcpasswd")) {
       print "Error. Too many other simultaneous password change requests being made.\n" unless $noprint;
       exit 4;
   }
   
   # Gather input.  Should only be 1 value (user name).
 my @input;  my @input;
 if (@ARGV==3) {  if (@ARGV==1) {
     @input=@ARGV;      @input=@ARGV;
 }  }
 elsif (@ARGV) {  elsif (@ARGV) {
     print("Error. This program needs 3 command-line arguments (username, old password, new password).\n") unless $noprint;      print("Error. This program needs just 1 command-line argument (username).\n") unless $noprint;
       unlink('/tmp/lock_lcpasswd');
     exit 2;      exit 2;
 }  }
 else {  else {
     @input=<>;      @input=<>;
     if (@input!=3) {      if (@input!=1) {
  print("Error. Three lines need to be entered into standard input.\n") unless $noprint;   print("Error. Only one line should be entered into standard input.\n") unless $noprint;
    unlink('/tmp/lock_lcpasswd');
  exit 3;   exit 3;
     }      }
     map {chop} @input;      map {chop} @input;
 }  }
 # Handle case of another lcpasswd process  
 unless (&try_to_lock("/tmp/lock_lcpasswd")) {  my ($username)=@input;
     print "Error. Too many other simultaneous password change requests being made.\n" unless $noprint;  $username=~/^(\w+)$/;
     exit 4;  my $safeusername=$1;
   if ($username ne $safeusername) {
       print "Error. The user name specified has invalid characters.\n";
       unlink('/tmp/lock_lcpasswd');
       exit 5;
   }
   
   &enable_root_capability;
   
   # By using the system userdel command:
   # Remove entry from /etc/passwd if it exists
   # Remove entry from /etc/groups if it exists
   # I surround with groupdel command to make absolutely sure the group definition disappears.
   system('/usr/sbin/groupdel',$safeusername); # ignore error message
   system('/usr/sbin/userdel',$safeusername); # ignore error message
   system('/usr/sbin/groupdel',$safeusername); # ignore error message
   
   # Remove entry from /etc/smbpasswd if it exists
   #  the safest way to do this is with smbpasswd -x
   #  as that's independent of location of the smbpasswd file.
   #
   if (-e '/usr/bin/smbpasswd') {
     ($>,$<) = (0,0); # fool smbpasswd to think this is not setuid.
     system('/usr/bin/smbpasswd -x '.$safeusername);
 }  }
   
   
   # Change ownership on directory from username:username to www:www
   # This prevents subsequently added users from having access.
   
   system('/bin/chown','-R','www:www',"/home/$safeusername");
   
   &disable_root_capability;
   unlink("/tmp/lock_lcpasswd");
   exit 0;
   
   # ----------------------------------------------------------- have setuid script run as root
   sub enable_root_capability {
       if ($wwwid==$>) {
    ($<,$>)=($>,$<);
    ($(,$))=($),$();
       }
       else {
    # root capability is already enabled
       }
       return $>;
   }
   
   # ----------------------------------------------------------- have setuid script run as www
   sub disable_root_capability {
       if ($wwwid==$<) {
    ($<,$>)=($>,$<);
    ($(,$))=($),$();
       }
       else {
    # root capability is already disabled
       }
   }
   
   # ----------------------------------- make sure that another lcpasswd process isn't running
   sub try_to_lock {
       my ($lockfile)=@_;
       my $currentpid;
       my $lastpid;
       # Do not manipulate lock file as root
       if ($>==0) {
    return 0;
       }
       # Try to generate lock file.
       # Wait 3 seconds.  If same process id is in
       # lock file, then assume lock file is stale, and
       # go ahead.  If process id's fluctuate, try
       # for a maximum of 10 times.
       for (0..10) {
    if (-e $lockfile) {
       open(LOCK,"<$lockfile");
       $currentpid=<LOCK>;
       close LOCK;
       if ($currentpid==$lastpid) {
    last;
       }
       sleep 3;
       $lastpid=$currentpid;
    }
    else {
       last;
    }
    if ($_==10) {
       return 0;
    }
       }
       open(LOCK,">$lockfile");
       print LOCK $$;
       close LOCK;
       return 1;
   }
   
   

Removed from v.1.2  
changed lines
  Added in v.1.13


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>