Module: Rpam2

Defined in:
lib/rpam2.rb,
ext/rpam2/rpam2.c

Constant Summary collapse

VERSION =
4.0
@@fake_data =
nil

Class Attribute Summary collapse

Class Method Summary collapse

Class Attribute Details

.fake_dataObject

Returns the value of attribute fake_data.



9
10
11
# File 'lib/rpam2.rb', line 9

def fake_data
  @fake_data
end

Class Method Details

._accountc(servicename, username) ⇒ Object



218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
# File 'ext/rpam2/rpam2.c', line 218

static VALUE method_accountpam(VALUE self, VALUE servicename, VALUE username) {
    pam_handle_t* pamh = NULL;
    unsigned int result=0;
    struct pam_conv auth_c = {0,0};

    result = pam_start(rpam_default_servicename, StringValueCStr(username), &auth_c, &pamh);
    if (result != PAM_SUCCESS) {
        rb_warn("INIT: %s", pam_strerror(pamh, result));
        return Qfalse;
    }

    result = _start(pamh, &servicename, NULL, NULL, NULL);
    if(result!=PAM_SUCCESS)
        return Qfalse;

    if (pam_end(pamh, result) == PAM_SUCCESS)
        return Qtrue;
    else {
        rb_warn("END: %s", pam_strerror(pamh, result));
        return Qfalse;
    }
}

._authc(servicename, username, password, ruser, rhost) ⇒ Object



193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
# File 'ext/rpam2/rpam2.c', line 193

static VALUE method_authpam(VALUE self, VALUE servicename, VALUE username, VALUE password, VALUE ruser, VALUE rhost) {
     pam_handle_t* pamh = NULL;
    unsigned int result = 0;
    struct pam_conv auth_c = {0,0};

    result = pam_start(rpam_default_servicename, StringValueCStr(username), &auth_c, &pamh);
    if (result != PAM_SUCCESS) {
        rb_warn("INIT: %s", pam_strerror(pamh, result));
        return Qfalse;
    }

    result = _start(pamh, &servicename, StringValueCStr(password), &ruser, &rhost);
    if(result!=PAM_SUCCESS)
        return Qfalse;


    if (pam_end(pamh, result) == PAM_SUCCESS)
        return Qtrue;
    else {
        rb_warn("END: %s", pam_strerror(pamh, result));
        return Qfalse;
    }
}

._getenvc(servicename, username, password, envname, opensession, ruser, rhost) ⇒ Object



242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
# File 'ext/rpam2/rpam2.c', line 242

static VALUE method_getenvpam(VALUE self, VALUE servicename, VALUE username, VALUE password, VALUE envname, VALUE opensession, VALUE ruser, VALUE rhost) {
    pam_handle_t* pamh = NULL;
    const char *c_ret=NULL;
    VALUE ruby_ret;
    unsigned int result = 0;
    struct pam_conv auth_c = {0,0};

    result = pam_start(rpam_default_servicename, StringValueCStr(username), &auth_c, &pamh);
    if (result != PAM_SUCCESS) {
        rb_warn("INIT: %s", pam_strerror(pamh, result));
        return Qnil;
    }

    result = _start(pamh, &servicename, StringValueCStr(password), &ruser, &rhost);
    if(result != PAM_SUCCESS)
        return Qnil;

    if (RTEST(opensession)){
        result = pam_open_session(pamh, 0);
        if (result != PAM_SUCCESS) {
            rb_warn("SESSION OPEN: %s", pam_strerror(pamh, result));
            pam_end(pamh, result);
            return Qnil;
        }
    }
    c_ret = pam_getenv(pamh, StringValueCStr(envname));
    if(c_ret){
        ruby_ret = rb_str_new_cstr(c_ret);
    } else {
        ruby_ret = Qnil;
    }

    if (RTEST(opensession)){
        result = pam_close_session(pamh, 0);
        if (result != PAM_SUCCESS) {
            rb_warn("SESSION END: %s", pam_strerror(pamh, result));
        }
    }

    result = pam_end(pamh, result);
    if (result != PAM_SUCCESS) {
        rb_warn("END: %s", pam_strerror(pamh, result));
    }
    return ruby_ret;
}

._listenvc(servicename, username, password, opensession, ruser, rhost) ⇒ Object



289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
# File 'ext/rpam2/rpam2.c', line 289

static VALUE method_listenvpam(VALUE self, VALUE servicename, VALUE username, VALUE password, VALUE opensession, VALUE ruser, VALUE rhost){
    pam_handle_t* pamh = NULL;
    unsigned int result=0;
    char *last=NULL;
    char **envlist=NULL;
    char **tmpenvlist=NULL;
    VALUE ruby_ret;
    struct pam_conv auth_c = {0,0};

    Check_Type(username, T_STRING);
    Check_Type(password, T_STRING);


    result = pam_start(rpam_default_servicename, StringValueCStr(username), &auth_c, &pamh);
    if (result != PAM_SUCCESS) {
        rb_warn("INIT: %s", pam_strerror(pamh, result));
        return Qnil;
    }

    result = _start(pamh, &servicename, StringValueCStr(password), &ruser, &rhost);
    if(result != PAM_SUCCESS)
        return Qnil;

    if (RTEST(opensession)){
        result = pam_open_session(pamh, 0);
        if (result != PAM_SUCCESS) {
            rb_warn("SESSION OPEN: %s", pam_strerror(pamh, result));
            pam_end(pamh, result);
            return Qnil;
        }
    }

    envlist = pam_getenvlist(pamh);
    ruby_ret = rb_hash_new();
    tmpenvlist = envlist;
    while(*tmpenvlist!=NULL){
        last = strchr(*tmpenvlist, '=');
        /* should not be needed but better be safe in a security relevant application */
        if (last!=NULL){
            rb_hash_aset(ruby_ret, rb_str_new(*tmpenvlist, last-*tmpenvlist), rb_str_new_cstr(last+1));
        }
        /* strings have to be freed (specification)
         overwrite them with zero to prevent leakage */
        memset(*tmpenvlist, 0, strlen(*tmpenvlist));
        free(*tmpenvlist);
        tmpenvlist++;
    }
    /* stringlist have to be freed (specification) */
    free(envlist);

    if (RTEST(opensession)){
        result = pam_close_session(pamh, 0);
        if (result != PAM_SUCCESS) {
            rb_warn("SESSION END: %s", pam_strerror(pamh, result));
        }
        result = pam_end(pamh, result);
        if (result != PAM_SUCCESS) {
            rb_warn("END: %s", pam_strerror(pamh, result));
        }
    }

    return ruby_ret;
}

.account(servicename, username) ⇒ Object



23
24
25
# File 'lib/rpam2.rb', line 23

def (servicename, username)
  (servicename, username)
end

.auth(*args) ⇒ Object



12
13
14
15
16
17
18
19
20
21
# File 'lib/rpam2.rb', line 12

def auth(*args)
  case args.size
    when 3
      _auth(*args, nil, nil)
    when 5
      _auth(*args)
    else
      raise ArgumentError, "wrong number of arguments (given #{args.size}, expected 3 or 5)"
  end
end

.getenv(*args) ⇒ Object



27
28
29
30
31
32
33
34
35
36
37
38
# File 'lib/rpam2.rb', line 27

def getenv(*args)
  case args.size
    when 4
      _getenv(*args, nil, nil, nil)
    when 5
      _getenv(*args, nil, nil)
    when 7
      _getenv(*args)
    else
      raise ArgumentError, "wrong number of arguments (given #{args.size}, expected 4, 5 or 7)"
  end
end

.listenv(*args) ⇒ Object



40
41
42
43
44
45
46
47
48
49
50
51
# File 'lib/rpam2.rb', line 40

def listenv(*args)
  case args.size
    when 3
      _listenv(*args, nil, nil, nil)
    when 4
      _listenv(*args, nil, nil)
    when 6
      _listenv(*args)
    else
      raise ArgumentError, "wrong number of arguments (given #{args.size}, expected 3, 4 or 6)"
  end
end