12 eval {my @n = getpwuid 0; setpwent()};
13 skip_all($1) if $@ && $@ =~ /(The \w+ function is unimplemented)/;
15 eval { require Config; };
18 my ($where, $args, @pathnames) = @_;
19 foreach my $prog (@pathnames) {
21 next unless open PW, '-|', "$prog $args 2>/dev/null";
22 next unless defined <PW>;
29 my $where = try_prog('NIS passwd', 'passwd',
30 qw(/usr/bin/ypcat /bin/ypcat /etc/ypcat));
33 $where //= try_prog('NetInfo passwd', 'passwd .', '/usr/bin/nidump');
36 $where //= try_prog('NIS+', 'passwd.org_dir', '/bin/niscat');
40 my @dscl = qw(/usr/bin/dscl);
41 if (!defined $where && $Config::Config{useperlio} && grep { -x } @dscl) {
42 eval { require PerlIO::scalar; }; # Beware miniperl.
44 print "# No PerlIO::scalar, will not try dscl\n";
47 # Map dscl items to passwd fields, and provide support for
48 # mucking with the dscl output if we need to (and we do).
51 map {$_ => {inx => $inx++, mung => sub {$_[0]}}}
52 qw{RecordName Password UniqueID PrimaryGroupID
53 RealName NFSHomeDirectory UserShell};
56 # The RecordName for a /User record is the username. In some
57 # cases there are synonyms (e.g. _www and www), in which case we
58 # get a blank-delimited list. We prefer the first entry in the
59 # list because getpwnam() does.
60 $want{RecordName}{mung} = sub {(split '\s+', $_[0], 2)[0]};
62 # The UniqueID and PrimaryGroupID for a /User record are the
63 # user ID and the primary group ID respectively. In cases where
64 # the high bit is set, 'dscl' returns a negative number, whereas
65 # getpwnam() returns its twos complement. This mungs the dscl
66 # output to agree with what getpwnam() produces. Interestingly
67 # enough, getpwuid(-2) returns the right record ('nobody'), even
68 # though it returns the uid as 4294967294. If you track uid_t
69 # on an i386, you find it is an unsigned int, which makes the
70 # unsigned version the right one; but both /etc/passwd and
71 # /etc/master.passwd contain negative numbers.
72 $want{UniqueID}{mung} = $want{PrimaryGroupID}{mung} = sub {
73 unpack 'L', pack 'l', $_[0]};
75 foreach my $dscl (@dscl) {
77 next unless open my $fh, '-|', "$dscl . -readall /Users @{[keys %want]} 2>/dev/null";
84 # Some records do not have all items. In particular,
85 # the macports user has no real name. Here it's an undef,
86 # in the password file it becomes an empty string.
87 no warnings 'uninitialized';
88 push @lines, join (':', @rec) . "\n";
93 my ($name, $value) = split ':\s+', $_, 2;
94 unless (defined $value) {
101 if (defined (my $info = $want{$name})) {
102 $rec[$info->{inx}] = $info->{mung}->($value);
107 no warnings 'uninitialized';
108 push @lines, join (':', @rec) . "\n";
110 my $data = join '', @lines;
111 if (open PW, '<', \$data) { # Needs PerlIO::scalar.
112 $where = "dscl . -readall /Users";
119 if (not defined $where) {
121 my $no_i_pwd = !$Config::Config{i_pwd} && '$Config{i_pwd} undefined';
123 my $PW = "/etc/passwd";
125 skip_all($no_i_pwd) if $no_i_pwd;
126 skip_all("no $PW file");
127 } elsif (open PW, '<', $PW) {
131 skip_all($no_i_pwd) if $no_i_pwd;
132 die "\$Config{i_pwd} is defined, $PW exists but has no entries, all other approaches failed, giving up";
135 die "Can't open $PW: $!";
139 # By now the PW filehandle should be open and full of juicy password entries.
143 # Go through at most this many users.
144 # (note that the first entry has been read away by now)
151 print "# where $where\n";
157 # LIMIT -1 so that users with empty shells don't fall off
158 my @s = split /:/, $_, -1;
159 my ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s);
160 (my $v) = $Config::Config{osvers} =~ /^(\d+)/;
161 if ($^O eq 'darwin' && $v < 9) {
162 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s[0,1,2,3,7,8,9];
164 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s;
166 next if /^\+/; # ignore NIS includes
168 push @{ $seen{$name_s} }, $.;
170 warn "# Your $where line $. is empty.\n";
178 # In principle we could whine if @s != 7 but do we know enough
179 # of passwd file formats everywhere?
180 if (@s == 7 || ($^O eq 'darwin' && @s == 10)) {
181 my @n = getpwuid($uid_s);
184 my ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
185 # Protect against one-to-many and many-to-one mappings.
186 if ($name_s ne $name) {
187 @n = getpwnam($name_s);
188 ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
189 next if $name_s ne $name;
192 if $name eq $name_s and
194 # Do not compare passwords: think shadow passwords.
205 print "# max = $max, n = $n, perfect = ", scalar keys %perfect, "\n";
208 skip("Found no password entries", 1) unless $n;
210 if (keys %perfect == 0) {
214 # The failure of op/pwent test is not necessarily serious.
215 # It may fail due to local password administration conventions.
216 # If you are for example using both NIS and local passwords,
217 # test failure is possible. Any distributed password scheme
218 # can cause such failures.
220 # What the pwent test is doing is that it compares the $max first
222 # with the results of getpwuid() and getpwnam() call. If it finds no
223 # matches at all, it suspects something is wrong.
228 cmp_ok(keys %perfect, '>', 0, "pwent test satisfactory")
229 or note("(not necessarily serious: run t/op/pwent.t by itself)");
232 # Test both the scalar and list contexts.
238 my $pw = scalar getpwent();
239 last unless defined $pw;
248 my ($pw) = (getpwent());
249 last unless defined $pw;
255 "getpwent() produced identical results in list and scalar contexts");