pam-auth 0.6.0

[MOVED TO `pam`] Safe Rust wrapper for PAM authentification
docs.rs failed to build pam-auth-0.6.0
Please check the build logs for more information.
See Builds for ideas on how to fix a failed build, or Metadata for how to configure docs.rs builds.
If you believe this is docs.rs' fault, open an issue.
Visit the last successful build: pam-auth-0.5.5

[MOVED TO pam]

pam-auth is deprecated and was renamed to pam. Please use the new crate for any future projects and consider switching if you still use this crate.

pam-auth Version License Build Status

Safe Rust bindings to Linux Pluggable Authentication Modules (PAM). Currently only supports basic username/password authentication.

Documentation @ docs.rs

Warning

Environment support through the env module is probably broken and should not be used in the current state!

Supported Rust versions

The library is only continuously built against Rust stable, beta and nightly but as it does not use a lot of new language features it should probably compile on older versions as well. If you encounter problems building on older versions and a small fix can be applied to make the build succeed, consider opening a pull request.

Note about stability

This crate follows semantic versioning. As such all versions below 1.0.0 should be considered development versions. This means the API could change any time.

Usage

  1. Add pam-auth to your Cargo.toml:
[dependencies]
pam-auth = "0.5.0"
  1. Use the Authenticator struct to authenticate and open a session
extern crate pam_auth;
pub fn main() {
        let service = "<yourapp>";
        let user = "<user>";
        let password = "<pass>";

        let mut auth = pam_auth::Authenticator::new(service).unwrap();
        auth.set_credentials(user, password);
        if auth.authenticate().is_ok() && auth.open_session().is_ok() {
            println!("Successfully opened a session!");
        }
        else {
            println!("Authentication failed =/");
        }
}

TODO:

  • Implement basic user/password authentication
  • Add Authenticator struct
  • Add documentation
  • Verify current conv does not leak memory
  • Allow custom conv functions to be passed (in pam-sys?)
  • Code cleanup

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.