home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World Komputer 2010 April
/
PCWorld0410.iso
/
hity wydania
/
Ubuntu 9.10 PL
/
karmelkowy-koliberek-desktop-9.10-i386-PL.iso
/
casper
/
filesystem.squashfs
/
usr
/
lib
/
user-setup
/
functions.sh
next >
Wrap
Text File
|
2009-07-10
|
2KB
|
68 lines
# Returns a true value if there seems to be a system user account.
# OVERRIDE_SYSTEM_USER overrides this to assume that no system user account
# exists.
is_system_user () {
if [ "$OVERRIDE_SYSTEM_USER" ]; then
return 1
fi
if ! [ -e $ROOT/etc/passwd ]; then
return 1
fi
# Assume NIS, or any uid from 1000 to 29999, means there is a user.
if grep -q '^+:' $ROOT/etc/passwd || \
grep -q '^[^:]*:[^:]*:[1-9][0-9][0-9][0-9]:' $ROOT/etc/passwd || \
grep -q '^[^:]*:[^:]*:[12][0-9][0-9][0-9][0-9]:' $ROOT/etc/passwd; then
return 0
else
return 1
fi
}
# Returns a true value if root already has a password.
root_password () {
if ! [ -e $ROOT/etc/passwd ]; then
return 1
fi
# Assume there is a root password if NIS is being used.
if grep -q '^+:' $ROOT/etc/passwd; then
return 0
fi
# Be more careful than usual about test arguments in the following,
# just in case (for example) the encrypted password string is "!".
if [ -e $ROOT/etc/shadow ] && \
[ -n "`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" ] && \
[ "x`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" != 'x*' ] && \
[ "x`grep ^root: $ROOT/etc/shadow | cut -d : -f 2`" != 'x!' ]; then
return 0
fi
if [ -e $ROOT/etc/passwd ] && \
[ -n "`grep ^root: $ROOT/etc/passwd | cut -d : -f 2`" ] && \
[ "x`grep ^root: $ROOT/etc/passwd | cut -d : -f 2`" != 'xx' ]; then
return 0
fi
return 1
}
password_is_empty () {
db_get user-setup/allow-password-empty
if [ "$RET" = true ]; then
return 1 # don't consider this as empty if explicitly allowed
fi
[ -z "$1" ]
}
password_is_weak () {
db_get user-setup/allow-password-weak
if [ "$RET" = true ]; then
return 1 # don't consider this as weak if explicitly allowed
fi
[ "$(printf %s "$1" | wc -c)" -lt 8 ]
}