diff options
author | Mikhail Durnev <mikhail_durnev@mentor.com> | 2013-06-25 21:54:35 -0500 |
---|---|---|
committer | Saul Wold <sgw@linux.intel.com> | 2013-06-27 09:55:58 -0700 |
commit | ae7aa0ef68372c15224c0c518cb90ba7350137b4 (patch) | |
tree | c23ced8c30c6e9a501c35cf7d788130afe794088 /meta/recipes-extended/shadow/files | |
parent | 040010d04672c93f18d60308ecf3c26a26ec5fd3 (diff) | |
download | openembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.tar.gz openembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.tar.bz2 openembedded-core-ae7aa0ef68372c15224c0c518cb90ba7350137b4.zip |
shadow-native: Add --root option in groupmems
Patch add_root_cmd_groupmems.patch that we apply to shadow-native
allows program groupmems from the shadow utility package to chroot()
so it can be used to modify etc/passwd and etc/group if they are
located in a sysroot.
The --root option in groupmems is needed for class useradd.
Signed-off-by: Mikhail Durnev <mikhail_durnev@mentor.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/recipes-extended/shadow/files')
-rw-r--r-- | meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch | 75 |
1 files changed, 75 insertions, 0 deletions
diff --git a/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch b/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch new file mode 100644 index 0000000000..40444967ab --- /dev/null +++ b/meta/recipes-extended/shadow/files/add_root_cmd_groupmems.patch @@ -0,0 +1,75 @@ +Add a --root command option to groupmems utility. + +This option allows the utility to be chrooted when run under pseudo. + +Signed-off-by: Mikhail Durnev <mikhail_durnev@mentor.com> + +diff -Naur old/src/groupmems.c new/src/groupmems.c +--- old/src/groupmems.c 2011-02-13 11:58:16.000000000 -0600 ++++ new/src/groupmems.c 2013-05-30 04:45:38.000000000 -0500 +@@ -60,6 +60,7 @@ + #define EXIT_MEMBER_EXISTS 7 /* member of group already exists */ + #define EXIT_INVALID_USER 8 /* specified user does not exist */ + #define EXIT_INVALID_GROUP 9 /* specified group does not exist */ ++#define EXIT_BAD_ARG 10 /* invalid argument to option */ + + /* + * Global variables +@@ -79,6 +80,7 @@ + static bool is_shadowgrp; + static bool sgr_locked = false; + #endif ++static const char *newroot = ""; + + /* local function prototypes */ + static char *whoami (void); +@@ -368,6 +370,7 @@ + "Options:\n" + " -g, --group groupname change groupname instead of the user's group\n" + " (root only)\n" ++ " -R, --root CHROOT_DIR directory to chroot into\n" + "\n" + "Actions:\n" + " -a, --add username add username to the members of the group\n" +@@ -391,10 +394,11 @@ + {"group", required_argument, NULL, 'g'}, + {"list", no_argument, NULL, 'l'}, + {"purge", no_argument, NULL, 'p'}, ++ {"root", required_argument, NULL, 'R'}, + {NULL, 0, NULL, '\0'} + }; + +- while ((arg = getopt_long (argc, argv, "a:d:g:lp", long_options, ++ while ((arg = getopt_long (argc, argv, "a:d:g:lpR:", long_options, + &option_index)) != EOF) { + switch (arg) { + case 'a': +@@ -416,6 +420,28 @@ + purge = true; + ++exclusive; + break; ++ case 'R': ++ if ('/' != optarg[0]) { ++ fprintf (stderr, ++ _("%s: invalid chroot path '%s'\n"), ++ Prog, optarg); ++ exit (EXIT_BAD_ARG); ++ } ++ newroot = optarg; ++ ++ if (access (newroot, F_OK) != 0) { ++ fprintf(stderr, ++ _("%s: chroot directory %s does not exist\n"), ++ Prog, newroot); ++ exit (EXIT_BAD_ARG); ++ } ++ if ( chroot(newroot) != 0 ) { ++ fprintf(stderr, ++ _("%s: unable to chroot to directory %s\n"), ++ Prog, newroot); ++ exit (EXIT_BAD_ARG); ++ } ++ break; + default: + usage (); + } |