summaryrefslogtreecommitdiff
path: root/meta/recipes-extended/shadow/files
diff options
context:
space:
mode:
authorMikhail Durnev <mikhail_durnev@mentor.com>2013-06-25 21:54:35 -0500
committerSaul Wold <sgw@linux.intel.com>2013-06-27 09:55:58 -0700
commitae7aa0ef68372c15224c0c518cb90ba7350137b4 (patch)
treec23ced8c30c6e9a501c35cf7d788130afe794088 /meta/recipes-extended/shadow/files
parent040010d04672c93f18d60308ecf3c26a26ec5fd3 (diff)
downloadopenembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.tar.gz
openembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.tar.bz2
openembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.zip
shadow-native: Add --root option in groupmems
Patch add_root_cmd_groupmems.patch that we apply to shadow-native allows program groupmems from the shadow utility package to chroot() so it can be used to modify etc/passwd and etc/group if they are located in a sysroot. The --root option in groupmems is needed for class useradd. Signed-off-by: Mikhail Durnev <mikhail_durnev@mentor.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/recipes-extended/shadow/files')
-rw-r--r--meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch75
1 files changed, 75 insertions, 0 deletions
diff --git a/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch b/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch
new file mode 100644
index 0000000000..40444967ab
--- /dev/null
+++ b/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch
@@ -0,0 +1,75 @@
+Add a --root command option to groupmems utility.
+
+This option allows the utility to be chrooted when run under pseudo.
+
+Signed-off-by: Mikhail Durnev <mikhail_durnev@mentor.com>
+
+diff -Naur old/src/groupmems.c new/src/groupmems.c
+--- old/src/groupmems.c 2011-02-13 11:58:16.000000000 -0600
++++ new/src/groupmems.c 2013-05-30 04:45:38.000000000 -0500
+@@ -60,6 +60,7 @@
+ #define EXIT_MEMBER_EXISTS 7 /* member of group already exists */
+ #define EXIT_INVALID_USER 8 /* specified user does not exist */
+ #define EXIT_INVALID_GROUP 9 /* specified group does not exist */
++#define EXIT_BAD_ARG 10 /* invalid argument to option */
+
+ /*
+ * Global variables
+@@ -79,6 +80,7 @@
+ static bool is_shadowgrp;
+ static bool sgr_locked = false;
+ #endif
++static const char *newroot = "";
+
+ /* local function prototypes */
+ static char *whoami (void);
+@@ -368,6 +370,7 @@
+ "Options:\n"
+ " -g, --group groupname change groupname instead of the user's group\n"
+ " (root only)\n"
++ " -R, --root CHROOT_DIR directory to chroot into\n"
+ "\n"
+ "Actions:\n"
+ " -a, --add username add username to the members of the group\n"
+@@ -391,10 +394,11 @@
+ {"group", required_argument, NULL, 'g'},
+ {"list", no_argument, NULL, 'l'},
+ {"purge", no_argument, NULL, 'p'},
++ {"root", required_argument, NULL, 'R'},
+ {NULL, 0, NULL, '\0'}
+ };
+
+- while ((arg = getopt_long (argc, argv, "a:d:g:lp", long_options,
++ while ((arg = getopt_long (argc, argv, "a:d:g:lpR:", long_options,
+ &option_index)) != EOF) {
+ switch (arg) {
+ case 'a':
+@@ -416,6 +420,28 @@
+ purge = true;
+ ++exclusive;
+ break;
++ case 'R':
++ if ('/' != optarg[0]) {
++ fprintf (stderr,
++ _("%s: invalid chroot path '%s'\n"),
++ Prog, optarg);
++ exit (EXIT_BAD_ARG);
++ }
++ newroot = optarg;
++
++ if (access (newroot, F_OK) != 0) {
++ fprintf(stderr,
++ _("%s: chroot directory %s does not exist\n"),
++ Prog, newroot);
++ exit (EXIT_BAD_ARG);
++ }
++ if ( chroot(newroot) != 0 ) {
++ fprintf(stderr,
++ _("%s: unable to chroot to directory %s\n"),
++ Prog, newroot);
++ exit (EXIT_BAD_ARG);
++ }
++ break;
+ default:
+ usage ();
+ }