Skip to content
Snippets Groups Projects
Verified Commit 52715922 authored by Nik | Klampfradler's avatar Nik | Klampfradler
Browse files

[NSS] Add module stub

parent a684feb2
No related branches found
No related tags found
No related merge requests found
...@@ -14,6 +14,10 @@ crate-type = [ "cdylib" ] ...@@ -14,6 +14,10 @@ crate-type = [ "cdylib" ]
[dependencies] [dependencies]
pamsm = { version = "^0.4.2", features = ["libpam"] } pamsm = { version = "^0.4.2", features = ["libpam"] }
libnss = "^0.1.0"
paste = "^0.1"
libc = "^0.2.0"
lazy_static = "^1.3.0"
oauth2 = "^4.0.0" oauth2 = "^4.0.0"
reqwest = "^0.11.3" reqwest = "^0.11.3"
config = "^0.11.0" config = "^0.11.0"
......
#[macro_use] extern crate pamsm; // Modules and macro imports for our own code
#[macro_use] extern crate log; #[macro_use] extern crate log;
mod cache; mod cache;
mod logging; mod logging;
mod config; mod config;
// Module and macro imports for the PAM component
#[macro_use] extern crate pamsm;
mod pam; mod pam;
// Module and macro imports for the NSS component
extern crate libc;
#[macro_use] extern crate lazy_static;
#[macro_use] extern crate libnss;
mod nss;
/* Copyright 2021 Dominik George <dominik.george@teckids.org>
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
use crate::config::get_config;
use config::Config;
use crate::logging::setup_log;
use libnss::passwd::{PasswdHooks, Passwd};
fn nss_hook_prepare() -> Config {
let conf = get_config(None);
let mut log_level = log::LevelFilter::Error;
if conf.get_bool("debug").unwrap_or_default() || conf.get_bool("nss.debug").unwrap_or_default() {
log_level = log::LevelFilter::Debug;
}
setup_log(log_level);
return conf;
}
struct OidcPasswd;
impl PasswdHooks for OidcPasswd {
fn get_all_entries() -> Vec<Passwd> {
vec![
Passwd {
name: "test".to_string(),
passwd: "x".to_string(),
uid: 1005,
gid: 1005,
gecos: "Test Account".to_string(),
dir: "/home/test".to_string(),
shell: "/bin/bash".to_string(),
}
]
}
fn get_entry_by_uid(uid: libc::uid_t) -> Option<Passwd> {
if uid == 1005 {
return Some(Passwd {
name: "test".to_string(),
passwd: "x".to_string(),
uid: 1005,
gid: 1005,
gecos: "Test Account".to_string(),
dir: "/home/test".to_string(),
shell: "/bin/bash".to_string(),
});
}
None
}
fn get_entry_by_name(name: String) -> Option<Passwd> {
if name == "test" {
return Some(Passwd {
name: "test".to_string(),
passwd: "x".to_string(),
uid: 1005,
gid: 1005,
gecos: "Test Account".to_string(),
dir: "/home/test".to_string(),
shell: "/bin/bash".to_string(),
});
}
None
}
}
libnss_passwd_hooks!(oidc, OidcPasswd);
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment