Group :: Development/Perl
RPM: perl-Passwd-Linux
Main Changelog Spec Patches Sources Download Gear Bugs and FR Repocop
Current version: 1.2-alt1
Build date: 13 december 2007, 02:34 ( 855.4 weeks ago )
Size: 10.26 Kb
Home page: http://www.cpan.org
License: Artistic
Summary: Perl module for manipulating the passwd and shadow files
Description:
List of contributors List of rpms provided by this srpm:
ACL:
Build date: 13 december 2007, 02:34 ( 855.4 weeks ago )
Size: 10.26 Kb
Home page: http://www.cpan.org
License: Artistic
Summary: Perl module for manipulating the passwd and shadow files
Description:
Passwd::Linux provides additional password routines. It augments the getpw* functions with setpwinfo, modpwinfo, rmpwnam, mgetpwnam. You need to run the functions as root or as someone who has permission to read/modify the shadow file.
setpwinfo and modpwinfo are called with arrays containing (in order):
name, crypted_password, uid, gid, gecos, home_directory, shell, [ days_since_epoch_password_last_change, days_before_password_may_be_changed, days_after_which_password_must_be_changed, days_before_expire_user_is_warned, days_after_expire_password_is_disabled, days_since_epoch_account_is_disabled ]
The optional fields are filled in as <days since the epoch>, 0, 99999, 7, <empty>, <empty>, when not given a value.
Read the shadow manpage for additional details of the optional fields from the shadow file
rmpwnam is called with a list of names to remove
mgetpwnam returns the same array that getpwnam returns without the 'unused' age or comment fields it also returns the crypted password and the other shadow file fields if run with root permissions.
setpwinfo does a create/modify of the user.
modpwinfo only does a modify, it will return an error if the user doesn't exist.
rmpwnam removes the users with the given logins from both the password and shadow files.
You must be running as root in order to use this module. If it successfully completes an operation and you are not root then you have a huge security problem on your box.
This module as distributed does not allow operations to occur on uid 0 files
Return values:
< 0 system error occurred, error value should be in $!
0 no error
1 operation attempt on uid 0
2 user does not exist
Current maintainer: Igor Zubkov setpwinfo and modpwinfo are called with arrays containing (in order):
name, crypted_password, uid, gid, gecos, home_directory, shell, [ days_since_epoch_password_last_change, days_before_password_may_be_changed, days_after_which_password_must_be_changed, days_before_expire_user_is_warned, days_after_expire_password_is_disabled, days_since_epoch_account_is_disabled ]
The optional fields are filled in as <days since the epoch>, 0, 99999, 7, <empty>, <empty>, when not given a value.
Read the shadow manpage for additional details of the optional fields from the shadow file
rmpwnam is called with a list of names to remove
mgetpwnam returns the same array that getpwnam returns without the 'unused' age or comment fields it also returns the crypted password and the other shadow file fields if run with root permissions.
setpwinfo does a create/modify of the user.
modpwinfo only does a modify, it will return an error if the user doesn't exist.
rmpwnam removes the users with the given logins from both the password and shadow files.
You must be running as root in order to use this module. If it successfully completes an operation and you are not root then you have a huge security problem on your box.
This module as distributed does not allow operations to occur on uid 0 files
Return values:
< 0 system error occurred, error value should be in $!
0 no error
1 operation attempt on uid 0
2 user does not exist
List of contributors List of rpms provided by this srpm:
- perl-Passwd-Linux