1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
|
use constant_time_eq::constant_time_eq;
use diesel::expression::AsExpression;
use diesel::pg::PgConnection;
use diesel::prelude::*;
use diesel::sql_types::Bool;
use pamsm::{Pam, PamError, PamFlags, PamLibExt, PamResult, PamServiceModule, pam_module};
use self::db::*;
mod db;
struct PamTokenPg;
fn authenticate(pam: Pam, flags: PamFlags, args: &[String]) -> PamResult<()> {
let mut dsn = None;
let mut table = None;
let mut schema = None;
macro_rules! parse_options {
($args:expr, $($opt:ident),+$(,)?) => {
for arg in $args {
if false { unreachable!() }
$(else if arg.starts_with(concat!(stringify!($opt), "=")) {
let value = &arg[(stringify!($opt).len() + 1)..];
if $opt.is_none() {
$opt = Some(value);
} else {
pam.syslog(pamsm::LogLvl::ERR, concat!(
"improperly configured: option '",
stringify!($opt),
"' specified multiple times",
))?;
return Err(PamError::SYSTEM_ERR);
}
})+
else {
pam.syslog(
pamsm::LogLvl::ERR,
&format!("improperly configured: invalid option '{}'", arg),
)?;
return Err(PamError::SYSTEM_ERR);
}
}
}
}
parse_options!(args, dsn, table, schema);
let Some(dsn) = dsn else {
pam.syslog(
pamsm::LogLvl::ERR,
"improperly configured: missing required option 'dsn'",
)?;
return Err(PamError::SYSTEM_ERR);
};
let Some(table) = table else {
pam.syslog(
pamsm::LogLvl::ERR,
"improperly configured: missing required option 'table'",
)?;
return Err(PamError::SYSTEM_ERR);
};
let table = db::Table::new(table, schema);
let pam_user = pam
.get_user(None)
.and_then(|user| user.ok_or(PamError::AUTH_ERR))?
.to_str()
.map_err(|_| PamError::SERVICE_ERR)?;
let pam_authtok = pam
.get_authtok(None)
.and_then(|authtok| authtok.ok_or(PamError::AUTH_ERR))?
.to_bytes();
let mut conn = PgConnection::establish(dsn).map_err(|_| PamError::AUTHINFO_UNAVAIL)?;
let user_tokens = table
.select(token)
.filter(username.eq(pam_user))
.filter(token.ne("").or(AsExpression::<Bool>::as_expression(
!flags.contains(PamFlags::DISALLOW_NULL_AUTHTOK),
)))
.load::<String>(&mut conn)
.map_err(|_| PamError::AUTHINFO_UNAVAIL)?;
for user_token in user_tokens {
let user_token = user_token.as_bytes();
if constant_time_eq(user_token, pam_authtok) {
return Ok(());
}
}
Err(PamError::AUTH_ERR)
}
impl PamServiceModule for PamTokenPg {
fn authenticate(pam: Pam, flags: PamFlags, args: Vec<String>) -> PamError {
authenticate(pam, flags, &args)
.err()
.unwrap_or(PamError::SUCCESS)
}
}
pam_module!(PamTokenPg);
#[cfg(test)]
mod tests {
use super::*;
}
|