@@ -607,9 +607,9 @@ static void add_group(const char *user, const char *group)
607607 return ; /* already group member */
608608
609609 if (systemf ("adduser %s %s" , user , group ))
610- SECURITY ("Failed giving user %s UNIX %s permissions." , user , group );
610+ AUDIT ("Failed giving user \"%s\" UNIX %s permissions." , user , group );
611611 else
612- SECURITY ("User %s added to UNIX %s group." , user , group );
612+ AUDIT ("User \"%s\" added to UNIX \"%s\" group." , user , group );
613613}
614614
615615static void del_group (const char * user , const char * group )
@@ -620,9 +620,9 @@ static void del_group(const char *user, const char *group)
620620 return ; /* not member of group */
621621
622622 if (systemf ("delgroup %s %s" , user , group ))
623- SECURITY ("Failed removing user %s from UNIX %s group." , user , group );
623+ AUDIT ("Failed removing user \"%s\" from UNIX \"%s\" group." , user , group );
624624 else
625- SECURITY ("User %s removed from UNIX %s group." , user , group );
625+ AUDIT ("User \"%s\" removed from UNIX \"%s\" group." , user , group );
626626}
627627
628628/* Users with a valid shell are also allowed CLI access */
@@ -786,7 +786,7 @@ static int sys_call_adduser(sr_session_ctx_t *sess, char *name, uid_t uid, gid_t
786786 char * * args ;
787787 int err ;
788788
789- DEBUG ("Adding new user %s , cleaning up any stale group." , name );
789+ DEBUG ("Adding new user \"%s\" , cleaning up any stale group." , name );
790790 systemf ("delgroup %s 2>/dev/null" , name );
791791
792792 /* reusing existing uid:gid from $HOME */
@@ -840,15 +840,15 @@ static int sys_add_user(sr_session_ctx_t *sess, char *name)
840840 /* Verify IDs aren't already used, like BusyBox adduser */
841841 if (getpwuid (st .st_uid ) || getgrgid (st .st_uid ) || getgrgid (st .st_gid )) {
842842 /* Exists but owned by someone else. */
843- SECURITY ("Failed mapping user %s to /home/%s, uid:gid (%d:%d) already exists." ,
843+ AUDIT ("Failed mapping user \"%s\" to /home/%s, uid:gid (%d:%d) already exists." ,
844844 name , name , st .st_uid , st .st_gid );
845845 err = sys_call_adduser (sess , name , 0 , 0 );
846846 } else {
847- SECURITY ("Reusing uid:gid %d:%d and /home/%s for new user %s " ,
847+ AUDIT ("Reusing uid:gid %d:%d and /home/%s for new user \"%s\" " ,
848848 st .st_uid , st .st_gid , name , name );
849849 err = sys_call_adduser (sess , name , st .st_uid , st .st_gid );
850850 if (err ) {
851- SECURITY ("Failed reusing uid:gid from /home/%s, retrying create user ..." , name );
851+ AUDIT ("Failed reusing uid:gid from /home/%s, retrying create user ..." , name );
852852 err = sys_call_adduser (sess , name , 0 , 0 );
853853 } else
854854 reused = true;
@@ -857,11 +857,11 @@ static int sys_add_user(sr_session_ctx_t *sess, char *name)
857857 err = sys_call_adduser (sess , name , 0 , 0 );
858858
859859 if (err ) {
860- SECURITY ("Failed creating new user \"%s\"" , name );
860+ AUDIT ("Failed creating new user \"%s\"" , name );
861861 return SR_ERR_SYS ;
862862 }
863863
864- SECURITY ("User \"%s\" created%s." , name , reused ? ", mapped to existing home directory" : "" );
864+ AUDIT ("User \"%s\" created%s." , name , reused ? ", mapped to existing home directory" : "" );
865865
866866 /*
867867 * OpenSSH in Infix has been set up to use /var/run/sshd/%s.keys
@@ -930,7 +930,7 @@ static int set_shell(const char *user, const char *shell)
930930
931931 if (!strcmp (pw -> pw_name , user )) {
932932 if (strcmp (pw -> pw_shell , shell ))
933- NOTE ("Updating login shell for user %s to %s" , user , shell );
933+ AUDIT ("Updating login shell for user \"%s\" to %s" , user , shell );
934934
935935 upw = * pw ;
936936 upw .pw_shell = (char * )shell ;
@@ -953,7 +953,7 @@ static int set_shell(const char *user, const char *shell)
953953 if (fp )
954954 fclose (fp );
955955 endpwent ();
956- ERRNO ("Failed setting user %s shell %s" , user , shell );
956+ ERRNO ("Failed setting user \"%s\" shell %s" , user , shell );
957957
958958 return -1 ;
959959}
@@ -971,7 +971,7 @@ static int set_password(const char *user, const char *hash, bool lock)
971971
972972 fp = fopen (_PATH_SHADOW "+" , "w" );
973973 if (!fp ) {
974- ERRNO ("Failed opening %s+ for %s " , _PATH_SHADOW , user );
974+ ERRNO ("Failed opening %s+ for user \"%s\" " , _PATH_SHADOW , user );
975975 goto fail ;
976976 }
977977 fd = fileno (fp );
@@ -1016,7 +1016,7 @@ static int set_password(const char *user, const char *hash, bool lock)
10161016 endspent ();
10171017 ulckpwdf ();
10181018exit :
1019- SECURITY ("Failed setting password for %s " , user );
1019+ AUDIT ("Failed setting password for user \"%s\" " , user );
10201020
10211021 return -1 ;
10221022}
@@ -1045,7 +1045,7 @@ static const char *is_valid_hash(struct confd *confd, const char *user, const ch
10451045
10461046 pwd = json_object_get (confd -> root , "factory-password-hash" );
10471047 if (!json_is_string (pwd )) {
1048- EMERG ("Cannot find factory-default password hash for user %s !" , user );
1048+ EMERG ("Cannot find factory-default password hash for user \"%s\" !" , user );
10491049 return NULL ;
10501050 }
10511051
@@ -1072,7 +1072,7 @@ static sr_error_t handle_sr_passwd_update(sr_session_ctx_t *, struct confd *conf
10721072 assert (change -> new );
10731073
10741074 if (change -> new -> type != SR_STRING_T ) {
1075- SECURITY ("Internal error, expected user %s password to be string type." , user );
1075+ AUDIT ("Internal error, expected user \"%s\" password to be string type." , user );
10761076 err = SR_ERR_INTERNAL ;
10771077 break ;
10781078 }
@@ -1090,17 +1090,17 @@ static sr_error_t handle_sr_passwd_update(sr_session_ctx_t *, struct confd *conf
10901090 if (set_password (user , hash , lock ))
10911091 err = SR_ERR_SYS ;
10921092 else if (lock )
1093- NOTE ("User account %s locked." , user );
1093+ NOTE ("User account \"%s\" locked." , user );
10941094 else if (!strcmp (hash , "*" ))
1095- NOTE ("Password login disabled for user %s " , user );
1095+ NOTE ("Password login disabled for user \"%s\" " , user );
10961096 else
1097- SECURITY ("Password updated for user %s " , user );
1097+ AUDIT ("Password updated for user \"%s\" " , user );
10981098 break ;
10991099 case SR_OP_DELETED :
11001100 if (set_password (user , "*" , false))
11011101 err = SR_ERR_SYS ;
11021102 else
1103- NOTE ("Password login disabled for user %s " , user );
1103+ NOTE ("Password login disabled for user \"%s\" " , user );
11041104 break ;
11051105 case SR_OP_MOVED :
11061106 break ;
@@ -1125,10 +1125,10 @@ static sr_error_t handle_sr_shell_update(sr_session_ctx_t *sess, struct confd *c
11251125
11261126 shell = sys_find_usable_shell (sess , (char * )user , is_admin_user (sess , user ));
11271127 if (set_shell (user , shell )) {
1128- SECURITY ("Failed updating shell to %s for user %s " , shell , user );
1128+ AUDIT ("Failed updating shell to %s for user \"%s\" " , shell , user );
11291129 err = SR_ERR_SYS ;
11301130 } else {
1131- SECURITY ("Login shell updated for user %s " , user );
1131+ AUDIT ("Login shell updated for user \"%s\" " , user );
11321132 err = SR_ERR_OK ;
11331133 }
11341134 free (shell );
@@ -1148,7 +1148,7 @@ static sr_error_t check_sr_user_update(sr_session_ctx_t *, struct confd *, struc
11481148
11491149 name = sr_xpath_key_value (val -> xpath , "user" , "name" , & state );
11501150 if (!is_valid_username (name )) {
1151- SECURITY ("Invalid username \"%s\"" , name );
1151+ AUDIT ("Invalid username \"%s\"" , name );
11521152 return SR_ERR_VALIDATION_FAILED ;
11531153 }
11541154 NOTE ("Username \"%s\" is valid" , name );
@@ -1232,7 +1232,7 @@ static sr_error_t generate_auth_keys(sr_session_ctx_t *session, const char *xpat
12321232
12331233 fp = fopenf ("w" , "/var/run/sshd/%s.keys" , username );
12341234 if (!fp ) {
1235- ERROR ("failed opening %s authorized_keys file: %s" , username , strerror (errno ));
1235+ ERROR ("failed opening user \"%s\" authorized_keys file: %s" , username , strerror (errno ));
12361236 continue ;
12371237 }
12381238
@@ -1361,7 +1361,7 @@ static sr_error_t change_auth_done(struct confd *confd, sr_session_ctx_t *sessio
13611361
13621362 err = generate_auth_keys (session , XPATH_AUTH_ "/user//." );
13631363 if (err ) {
1364- SECURITY ("failed saving authorized-key data." );
1364+ AUDIT ("failed saving authorized-key data." );
13651365 goto cleanup ;
13661366 }
13671367
@@ -1432,11 +1432,11 @@ static int change_nacm(sr_session_ctx_t *session, uint32_t sub_id, const char *m
14321432 for (size_t i = 0 ; i < user_count ; i ++ ) {
14331433 const char * user = users [i ].data .string_val ;
14341434 bool is_admin = is_admin_user (session , user );
1435- char * shell ;
1435+ const char * shell ;
14361436
14371437 shell = sys_find_usable_shell (session , (char * )user , is_admin );
14381438 if (set_shell (user , shell ))
1439- SECURITY ("Failed adjusting shell for user %s " , user );
1439+ AUDIT ("Failed adjusting shell for user \"%s\" " , user );
14401440
14411441 if (is_admin )
14421442 add_group (user , "wheel" );
0 commit comments