summaryrefslogtreecommitdiff
path: root/go/parabola_hackers/nslcd_backend/db_passwd.go
diff options
context:
space:
mode:
authorLuke Shumaker <lukeshu@sbcglobal.net>2017-02-03 01:27:51 -0500
committerLuke Shumaker <lukeshu@sbcglobal.net>2017-02-03 01:27:51 -0500
commit026a77f92fd89f009eefee19a43c15d416f54cf7 (patch)
tree31363cfeb002ea8bb0872f3d2243796439ca189c /go/parabola_hackers/nslcd_backend/db_passwd.go
parent026a02b995bb0ae456c66c98f14ea0b2b761a1ea (diff)
Rename the Go packages to have a bit more taste.
Diffstat (limited to 'go/parabola_hackers/nslcd_backend/db_passwd.go')
-rw-r--r--go/parabola_hackers/nslcd_backend/db_passwd.go81
1 files changed, 0 insertions, 81 deletions
diff --git a/go/parabola_hackers/nslcd_backend/db_passwd.go b/go/parabola_hackers/nslcd_backend/db_passwd.go
deleted file mode 100644
index c5faf5c..0000000
--- a/go/parabola_hackers/nslcd_backend/db_passwd.go
+++ /dev/null
@@ -1,81 +0,0 @@
-// Copyright 2015-2016 Luke Shumaker <lukeshu@sbcglobal.net>.
-//
-// This is free software; you can redistribute it and/or
-// modify it under the terms of the GNU General Public License as
-// published by the Free Software Foundation; either version 2 of
-// the License, or (at your option) any later version.
-//
-// This software is distributed in the hope that it will be useful,
-// but WITHOUT ANY WARRANTY; without even the implied warranty of
-// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-// GNU General Public License for more details.
-//
-// You should have received a copy of the GNU General Public
-// License along with this manual; if not, see
-// <http://www.gnu.org/licenses/>.
-
-package hackers_nslcd_backend
-
-import (
- p "git.lukeshu.com/go/libnslcd/nslcd_proto"
- s "golang.org/x/sys/unix"
-)
-
-/* Note that the output password hash value should be one of:
- <empty> - no password set, allow login without password
- ! - used to prevent logins
- x - "valid" encrypted password that does not match any valid password
- often used to indicate that the password is defined elsewhere
- other - encrypted password, in crypt(3) format */
-
-func (o *Hackers) Passwd_ByName(cred s.Ucred, req p.Request_Passwd_ByName) <-chan p.Passwd {
- o.lock.RLock()
- ret := make(chan p.Passwd)
- go func() {
- defer o.lock.RUnlock()
- defer close(ret)
-
- uid := o.name2uid(req.Name)
- if uid < 0 {
- return
- }
- passwd := o.users[uid].Passwd
- passwd.PwHash = "x" // only put actual hashes in the Shadow DB
- ret <- passwd
- }()
- return ret
-}
-
-func (o *Hackers) Passwd_ByUID(cred s.Ucred, req p.Request_Passwd_ByUID) <-chan p.Passwd {
- o.lock.RLock()
- ret := make(chan p.Passwd)
- go func() {
- defer o.lock.RUnlock()
- defer close(ret)
-
- user, found := o.users[req.UID]
- if !found {
- return
- }
- passwd := user.Passwd
- passwd.PwHash = "x" // only put actual hashes in the Shadow DB
- ret <- passwd
- }()
- return ret
-}
-
-func (o *Hackers) Passwd_All(cred s.Ucred, req p.Request_Passwd_All) <-chan p.Passwd {
- o.lock.RLock()
- ret := make(chan p.Passwd)
- go func() {
- defer o.lock.RUnlock()
- defer close(ret)
-
- for _, user := range o.users {
- passwd := user.Passwd
- passwd.PwHash = "x" // only put actual hashes in the Shadow DB
- ret <- passwd
- }
- }()
- return ret
-}