summaryrefslogtreecommitdiff
path: root/go/parabola_hackers/nslcd_backend/db_passwd.go
blob: 3f32ddd9dad35f8f42c6cd2a65d66a27fbf6d1dc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
// Copyright 2015-2016 Luke Shumaker <lukeshu@sbcglobal.net>.
//
// This is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of
// the License, or (at your option) any later version.
//
// This software is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public
// License along with this manual; if not, see
// <http://www.gnu.org/licenses/>.

package hackers_nslcd_backend

import (
	s "syscall"

	p "lukeshu.com/git/go/libnslcd.git/proto"
)

/* Note that the output password hash value should be one of:
   <empty> - no password set, allow login without password
   !       - used to prevent logins
   x       - "valid" encrypted password that does not match any valid password
             often used to indicate that the password is defined elsewhere
   other   - encrypted password, in crypt(3) format */

func (o *Hackers) Passwd_ByName(cred s.Ucred, req p.Request_Passwd_ByName) <-chan p.Passwd {
	o.lock.RLock()
	ret := make(chan p.Passwd)
	go func() {
		defer o.lock.RUnlock()
		defer close(ret)

		uid := o.name2uid(req.Name)
		if uid < 0 {
			return
		}
		passwd := o.users[uid].Passwd
		passwd.PwHash = "x" // only put actual hashes in the Shadow DB
		ret <- passwd
	}()
	return ret
}

func (o *Hackers) Passwd_ByUID(cred s.Ucred, req p.Request_Passwd_ByUID) <-chan p.Passwd {
	o.lock.RLock()
	ret := make(chan p.Passwd)
	go func() {
		defer o.lock.RUnlock()
		defer close(ret)

		user, found := o.users[req.UID]
		if !found {
			return
		}
		passwd := user.Passwd
		passwd.PwHash = "x" // only put actual hashes in the Shadow DB
		ret <- passwd
	}()
	return ret
}

func (o *Hackers) Passwd_All(cred s.Ucred, req p.Request_Passwd_All) <-chan p.Passwd {
	o.lock.RLock()
	ret := make(chan p.Passwd)
	go func() {
		defer o.lock.RUnlock()
		defer close(ret)

		for _, user := range o.users {
			passwd := user.Passwd
			passwd.PwHash = "x" // only put actual hashes in the Shadow DB
			ret <- passwd
		}
	}()
	return ret
}