home *** CD-ROM | disk | FTP | other *** search
- # Returns a true value if there seems to be a system user account.
- # OVERRIDE_SYSTEM_USER overrides this to assume that no system user account
- # exists.
- is_system_user () {
- if [ "$OVERRIDE_SYSTEM_USER" ]; then
- return 1
- fi
-
- if ! [ -e $ROOT/etc/passwd ]; then
- return 1
- fi
-
- # Assume NIS, or any uid from 1000 to 29999, means there is a user.
- if grep -q '^+:' $ROOT/etc/passwd || \
- grep -q '^[^:]*:[^:]*:[1-9][0-9][0-9][0-9]:' $ROOT/etc/passwd || \
- grep -q '^[^:]*:[^:]*:[12][0-9][0-9][0-9][0-9]:' $ROOT/etc/passwd; then
- return 0
- else
- return 1
- fi
- }
-
- # Returns a true value if root already has a password.
- root_password () {
- if ! [ -e $ROOT/etc/passwd ]; then
- return 1
- fi
-
- # Assume there is a root password if NIS is being used.
- if grep -q '^+:' $ROOT/etc/passwd; then
- return 0
- fi
-
- # Be more careful than usual about test arguments in the following,
- # just in case (for example) the encrypted password string is "!".
-
- if [ -e $ROOT/etc/shadow ] && \
- [ -n "`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" ] && \
- [ "x`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" != 'x*' ] && \
- [ "x`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" != 'x!' ]; then
- return 0
- fi
-
- if [ -e $ROOT/etc/passwd ] && \
- [ -n "`grep ^root: $ROOT/etc/passwd | cut -d : -f 2`" ] && \
- [ "x`grep ^root: $ROOT/etc/passwd | cut -d : -f 2`" != 'xx' ]; then
- return 0
- fi
-
- return 1
- }
-
- password_is_empty () {
- db_get user-setup/allow-password-empty
- if [ "$RET" = true ]; then
- return 1 # don't consider this as empty if explicitly allowed
- fi
- [ -z "$1" ]
- }
-
- password_is_weak () {
- db_get user-setup/allow-password-weak
- if [ "$RET" = true ]; then
- return 1 # don't consider this as weak if explicitly allowed
- fi
- [ "$(printf %s "$1" | wc -c)" -lt 8 ]
- }
-