3 # $Id: svc_acct.import,v 1.15 2001-07-30 06:07:47 ivan Exp $
5 # ivan@sisd.com 98-mar-9
7 # changed 'password' field to '_password' because PgSQL 6.3 reserves this word
8 # bmccane@maxbaud.net 98-Apr-3
10 # generalized svcparts (still needs radius import) ivan@sisd.com 98-mar-23
12 # radius import, now an interactive script. still needs erpcd import?
13 # ivan@sisd.com 98-jun-24
15 # arbitrary radius attributes ivan@sisd.com 98-aug-9
17 # don't import /var/spool/freeside/conf/shells! ivan@sisd.com 98-aug-13
19 # $Log: svc_acct.import,v $
20 # Revision 1.15 2001-07-30 06:07:47 ivan
21 # allow !! for locked accounts instead of changing to *SUSPENDED*
23 # Revision 1.14 2001/05/07 15:24:15 ivan
26 # Revision 1.13 2001/05/05 08:51:16 ivan
27 # http://www.sisd.com/freeside/list-archive/msg01915.html
29 # Revision 1.12 2001/04/22 01:56:15 ivan
30 # get rid of FS::SSH.pm (became Net::SSH and Net::SCP on CPAN)
32 # Revision 1.11 2000/06/29 12:27:01 ivan
33 # s/password/_password/ for PostgreSQL wasn't done in the import.
35 # Revision 1.10 2000/06/28 12:32:30 ivan
36 # allow RADIUS lines with "Auth-Type = Local" too
38 # Revision 1.8 2000/02/03 05:16:52 ivan
39 # beginning of DNS and Apache support
41 # Revision 1.7 1999/07/08 02:32:26 ivan
42 # import fix, noticed by Ben Leibig and Joel Griffiths
44 # Revision 1.6 1999/07/08 01:49:00 ivan
45 # updates to avoid -w warnings from Joel Griffiths <griff@aver-computer.com>
47 # Revision 1.5 1999/03/25 08:42:19 ivan
48 # import stuff uses Term::Query and spits out (some kinds of) nonsensical input
50 # Revision 1.4 1999/03/24 00:43:38 ivan
51 # die if no relevant services
53 # Revision 1.3 1998/12/10 07:23:16 ivan
54 # use FS::Conf, need user (for datasrc)
56 # Revision 1.2 1998/10/13 12:07:51 ivan
57 # Assigns password from the shadow file for RADIUS password "UNIX"
61 use vars qw(%part_svc);
63 use Term::Query qw(query);
64 use Net::SCP qw(iscp);
65 use FS::UID qw(adminsuidsetup datasrc);
66 use FS::Record qw(qsearch);
70 my $user = shift or die &usage;
73 my($spooldir)="/usr/local/etc/freeside/export.". datasrc;
75 $FS::svc_acct::nossh_hack = 1;
79 %part_svc=map { $_->svcpart, $_ } qsearch('part_svc',{'svcdb'=>'svc_acct'});
81 die "No services with svcdb svc_acct!\n" unless %part_svc;
83 print "\n\n", &menu_svc, "\n", <<END;
84 Most accounts probably have entries in passwd and users (with Port-Limit
87 my($ppp_svcpart)=&getpart;
89 print "\n\n", &menu_svc, "\n", <<END;
90 Some accounts have entries in passwd and users, but with Port-Limit 2 (or
93 my($isdn_svcpart)=&getpart;
95 print "\n\n", &menu_svc, "\n", <<END;
96 Some accounts might have entries in users only (Port-Limit 1)
98 my($oppp_svcpart)=&getpart;
100 print "\n\n", &menu_svc, "\n", <<END;
101 Some accounts might have entries in users only (Port-Limit >= 2)
103 my($oisdn_svcpart)=&getpart;
105 print "\n\n", &menu_svc, "\n", <<END;
106 POP mail accounts have entries in passwd only, and have a particular shell.
108 my($pop_shell)=&getvalue("Enter that shell:");
109 my($popmail_svcpart)=&getpart;
111 print "\n\n", &menu_svc, "\n", <<END;
112 Everything else in passwd is a shell account.
114 my($shell_svcpart)=&getpart;
117 Enter the location and name of your _user_ passwd file, for example
118 "mail.isp.com:/etc/passwd" or "nis.isp.com:/etc/global/passwd"
120 my($loc_passwd)=&getvalue(":");
121 iscp("root\@$loc_passwd", "$spooldir/passwd.import");
124 Enter the location and name of your _user_ shadow file, for example
125 "mail.isp.com:/etc/shadow" or "bsd.isp.com:/etc/master.passwd"
127 my($loc_shadow)=&getvalue(":");
128 iscp("root\@$loc_shadow", "$spooldir/shadow.import");
131 Enter the location and name of your radius "users" file, for example
132 "radius.isp.com:/etc/raddb/users"
134 my($loc_users)=&getvalue(":");
135 iscp("root\@$loc_users", "$spooldir/users.import");
138 ( join "\n", map "$_: ".$part_svc{$_}->svc, sort keys %part_svc ). "\n";
141 $^W=0; # Term::Query isn't -w-safe
142 my $return = query "Enter part number:", 'irk', [ keys %part_svc ];
148 $^W=0; # Term::Query isn't -w-safe
149 my $return = query $prompt, '';
158 open(PASSWD,"<$spooldir/passwd.import");
159 open(SHADOW,"<$spooldir/shadow.import");
160 open(USERS,"<$spooldir/users.import");
162 my(%upassword,%ip,%allparam);
163 my(%param,$username);
169 /^(\w+)\s+(Auth-Type\s+=\s+Local,\s+)Password\s+=\s+"([^"]+)"(,\s+Expiration\s+=\s+"([^"]*")\s*)?$/
170 or die "1Unexpected line in users.import: $_";
171 my($password,$expiration);
172 ($username,$password,$expiration)=(lc($1),$3,$5);
173 $password = '' if $password eq 'UNIX';
174 $upassword{$username}=$password;
177 die "2Unexpected line in users.import: $_";
182 if ( defined $param{'radius_Framed_IP_Address'} ) {
183 $ip{$username} = $param{'radius_Framed_IP_Address'};
184 delete $param{'radius_Framed_IP_Address'};
186 $ip{$username} = '0e0';
188 $allparam{$username}={ %param };
190 } elsif ( /^\s+([\w\-]+)\s=\s"?([\w\.\-\s]+)"?,?\s*$/ ) {
191 my($attribute,$value)=($1,$2);
192 $attribute =~ s/\-/_/g;
193 $param{'radius_'.$attribute}=$value;
195 die "3Unexpected line in users.import: $_";
199 #? incase there isn't a terminating blank line ?
200 if ( defined $param{'radius_Framed_IP_Address'} ) {
201 $ip{$username} = $param{'radius_Framed_IP_Address'};
202 delete $param{'radius_Framed_IP_Address'};
204 $ip{$username} = '0e0';
206 $allparam{$username}={ %param };
211 my($username,$password)=split(/:/);
212 #$password =~ s/^\!$/\*/;
213 #$password =~ s/\!+/\*SUSPENDED\* /;
214 $password{$username}=$password;
219 my($username,$x,$uid,$gid,$finger,$dir,$shell)=split(/:/);
220 my($password)=$upassword{$username} || $password{$username};
222 my($maxb)=${$allparam{$username}}{'radius_Port_Limit'};
224 if ( exists $upassword{$username} ) {
226 $svcpart = $isdn_svcpart
227 } elsif ( ! $maxb || $maxb == 1 ) {
228 $svcpart = $ppp_svcpart
230 die "Illegal Port-Limit in users ($username)!\n";
232 } elsif ( $shell eq $pop_shell ) {
233 $svcpart = $popmail_svcpart;
235 $svcpart = $shell_svcpart;
238 my($svc_acct) = new FS::svc_acct ({
239 'svcpart' => $svcpart,
240 'username' => $username,
241 '_password' => $password,
247 'slipip' => $ip{$username},
248 %{$allparam{$username}},
251 $error=$svc_acct->insert;
252 die $error if $error;
254 delete $allparam{$username};
255 delete $upassword{$username};
259 foreach $username ( keys %upassword ) {
260 my($password)=$upassword{$username};
262 my($maxb)=${$allparam{$username}}{'radius_Port_Limit'} || 0;
265 $svcpart = $oisdn_svcpart
266 } elsif ( ! $maxb || $maxb == 1 ) {
267 $svcpart = $oppp_svcpart
269 die "Illegal Port-Limit in users!\n";
272 my($svc_acct) = new FS::svc_acct ({
273 'svcpart' => $svcpart,
274 'username' => $username,
275 '_password' => $password,
276 'slipip' => $ip{$username},
277 %{$allparam{$username}},
280 $error=$svc_acct->insert;
281 die $error, if $error;
283 delete $allparam{$username};
284 delete $upassword{$username};
290 die "Usage:\n\n svc_acct.import user\n";