summaryrefslogtreecommitdiff
path: root/go/parabola_hackers/passwords.go.in
blob: b9f93d9552ad39f1f095742a4fc7fab52a22d588 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// Copyright 2015-2016 Luke Shumaker <lukeshu@sbcglobal.net>.
//
// This is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of
// the License, or (at your option) any later version.
//
// This software is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public
// License along with this manual; if not, see
// <http://www.gnu.org/licenses/>.

package parabola_hackers

import (
	"fmt"
	"io/ioutil"
	"os"
	"sort"
	"strings"

	"lukeshu.com/git/go/libgnulinux.git/crypt"
	"lukeshu.com/git/go/libsystemd.git/sd_daemon/logger"
)

/* Note that the password hash value should be one of:
   <empty> - no password set, allow login without password
   !       - used to prevent logins
   x       - "valid" encrypted password that does not match any valid password
             often used to indicate that the password is defined elsewhere
   other   - encrypted password, in crypt(3) format */

const shadow_file = "@shadow_file@"

func LoadAllPasswords() (map[string]string, error) {
	file, err := os.Open(shadow_file)
	if err != nil {
		return nil, err
	}
	contents, err := ioutil.ReadAll(file)
	if err != nil {
		return nil, err
	}
	lines := strings.Split(string(contents), "\n")
	passwords := make(map[string]string, len(lines))
	for i, line := range lines {
		if line == "" {
			continue
		}
		cols := strings.SplitN(line, ":", 2)
		if len(cols) != 2 {
			logger.Err("hackers.git %s:%d: malformed line", shadow_file, i+1)
			continue
		}
		username := cols[0]
		hash := cols[1]
		if hash != "!" && !crypt.SaltOk(hash) {
			hash = "!"
			logger.Err("%s:%d: malformed hash for user: %s", shadow_file, i+1, username)
		}
		passwords[username] = hash
	}
	return passwords, nil
}

func SaveAllPasswords(passwords map[string]string) error {
	usernames := make([]string, len(passwords))
	i := 0
	for username, _ := range passwords {
		usernames[i] = username
		i++
	}
	sort.Strings(usernames)

	file, err := os.OpenFile(shadow_file+"-", os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0600)
	if err != nil {
		return err
	}

	for _, username := range usernames {
		fmt.Fprintf(file, "%s:%s\n", username, passwords[username])
	}
	err = file.Sync()
	if err != nil {
		return err
	}
	err = file.Close()
	if err != nil {
		return err
	}

	return os.Rename(shadow_file+"-", shadow_file)
}