/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
*
*
* lib/nsswitch/compat/getpwent.c -- name-service-switch backend for getpwnam()
* passwd entries there that begin with "+" or "-", it consults other
* services. By default it uses NIS (YP), but the user can override this
* with a "passwd_compat" entry in /etc/nsswitch.conf, e.g.
* passwd_compat: ldap
*
* This code tries to produce the same results as the 4.x code, even when
* the latter seems ill thought-out (mostly in the handling of netgroups,
* "-", and the combination thereof). Bug-compatible, in other words.
* Though we do try to be more reasonable about the format of "+" and "-"
* entries here, i.e. you don't have to pad them with spurious colons and
*
* Caveats:
* - More than one source may be specified, with the usual switch semantics,
* but having multiple sources here is definitely odd.
* - People who recursively specify "compat" deserve what they get.
* - Entries that begin with "+@" or "-@" are interpreted using
* getnetgrent() and innetgr(), which use the "netgroup" entry in
* /etc/nsswitch.conf. If the sources for "passwd_compat" and "netgroup"
* differ, everything should work fine, but the semantics will be pretty
* confusing.
*/
#include <pwd.h>
#include <shadow.h> /* For PASSWD (pathname to passwd file) */
#include <stdlib.h>
#include <strings.h>
#include "compat_common.h"
static DEFINE_NSS_DB_ROOT(db_root);
static void
nss_db_params_t *p;
{
p->name = NSS_DBNAM_PASSWD;
}
/*
*/
int
{
return (NSS_STR_PARSE_SUCCESS);
continue;
continue;
return (NSS_STR_PARSE_PARSE);
return (NSS_STR_PARSE_PARSE);
return (NSS_STR_PARSE_PARSE);
return (NSS_STR_PARSE_SUCCESS);
/* Check if we have enough space in the buffer */
return (NSS_STR_PARSE_ERANGE);
/* Replace ephemeral ids by ID_NOBODY */
*linelenp = newlinelen;
return (NSS_STR_PARSE_SUCCESS);
}
static const char *
{
return (p->pw_name);
}
static int
{
}
static nss_status_t
void *a;
{
}
static int
{
}
static nss_status_t
void *a;
{
return (NSS_NOTFOUND);
}
/*ARGSUSED*/
static int
const char **fields;
{
char *s;
int parsestat;
int len;
int buflen;
if (buf == 0) {
return (NSS_STR_PARSE_PARSE);
/* Really "out of memory", but PARSE_PARSE will have to do */
}
/*
* Don't allow overriding of
* - username
* - uid
* - gid
* That's what the SunOS 4.x code did; who are we to question it...
*/
s = buf;
if (fields[1] != 0)
else {
/* ====> Does this do the right thing? */
else
}
return (NSS_STR_PARSE_ERANGE);
}
s += len;
return (NSS_STR_PARSE_ERANGE);
}
s += len;
/*
* if asked, return the data in /etc file format
*/
/* reset the result ptr to the original value */
} else {
}
} else {
}
return (parsestat);
}
};
/*ARGSUSED*/
{
return (_nss_compat_constr(passwd_ops,
sizeof (passwd_ops) / sizeof (passwd_ops[0]),
&db_root,
1,
merge_pwents));
}