6 eval {my @n = getpwuid 0; setpwent()};
7 if ($@ && $@ =~ /(The \w+ function is unimplemented)/) {
8 print "1..0 # Skip: $1\n";
11 eval { require Config; import Config; };
13 if ($Config{'i_pwd'} ne 'define') {
14 $reason = '$Config{i_pwd} undefined';
16 elsif (not -f "/etc/passwd" ) { # Play safe.
17 $reason = 'no /etc/passwd file';
20 if (not defined $where) { # Try NIS.
21 foreach my $ypcat (qw(/usr/bin/ypcat /bin/ypcat /etc/ypcat)) {
23 open(PW, "$ypcat passwd 2>/dev/null |") &&
25 $where = "NIS passwd";
32 if (not defined $where) { # Try NetInfo.
33 foreach my $nidump (qw(/usr/bin/nidump)) {
35 open(PW, "$nidump passwd . 2>/dev/null |") &&
37 $where = "NetInfo passwd";
44 if (not defined $where) { # Try local.
45 my $PW = "/etc/passwd";
46 if (-f $PW && open(PW, $PW) && defined(<PW>)) {
52 if (not defined $where) { # Try NIS+
53 foreach my $niscat (qw(/bin/niscat)) {
55 open(PW, "$niscat passwd.org_dir 2>/dev/null |") &&
57 $where = "NIS+ $niscat passwd.org_dir";
64 if ($reason) { # Give up.
65 print "1..0 # Skip: $reason\n";
70 # By now the PW filehandle should be open and full of juicy password entries.
74 # Go through at most this many users.
75 # (note that the first entry has been read away by now)
83 print "# where $where\n";
89 # LIMIT -1 so that users with empty shells don't fall off
90 my @s = split /:/, $_, -1;
91 my ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s);
92 if ($^O eq 'darwin') {
93 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s[0,1,2,3,7,8,9];
95 ($name_s, $passwd_s, $uid_s, $gid_s, $gcos_s, $home_s, $shell_s) = @s;
97 next if /^\+/; # ignore NIS includes
99 push @{ $seen{$name_s} }, $.;
101 warn "# Your $where line $. is empty.\n";
109 # In principle we could whine if @s != 7 but do we know enough
110 # of passwd file formats everywhere?
111 if (@s == 7 || ($^O eq 'darwin' && @s == 10)) {
112 @n = getpwuid($uid_s);
115 my ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
116 # Protect against one-to-many and many-to-one mappings.
117 if ($name_s ne $name) {
118 @n = getpwnam($name_s);
119 ($name,$passwd,$uid,$gid,$quota,$comment,$gcos,$home,$shell) = @n;
120 next if $name_s ne $name;
123 if $name eq $name_s and
125 # Do not compare passwords: think shadow passwords.
136 print "# max = $max, n = $n, perfect = ", scalar keys %perfect, "\n";
138 if (keys %perfect == 0 && $n) {
142 # The failure of op/pwent test is not necessarily serious.
143 # It may fail due to local password administration conventions.
144 # If you are for example using both NIS and local passwords,
145 # test failure is possible. Any distributed password scheme
146 # can cause such failures.
148 # What the pwent test is doing is that it compares the $max first
150 # with the results of getpwuid() and getpwnam() call. If it finds no
151 # matches at all, it suspects something is wrong.
160 print "\t# (not necessarily serious: run t/op/pwent.t by itself)" if $not;
163 # Test both the scalar and list contexts.
169 my $pw = scalar getpwent();
170 last unless defined $pw;
179 my ($pw) = (getpwent());
180 last unless defined $pw;
185 print "not " unless "@pw1" eq "@pw2";
186 print "ok ", $tst++, "\n";