chef 11.14.2-x86-mingw32 → 11.14.6-x86-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/chef/application.rb +16 -8
- data/lib/chef/dsl/recipe.rb +14 -0
- data/lib/chef/exceptions.rb +1 -0
- data/lib/chef/provider/env/windows.rb +5 -9
- data/lib/chef/provider/group/dscl.rb +27 -9
- data/lib/chef/provider/package/rpm.rb +2 -2
- data/lib/chef/provider/user/dscl.rb +544 -157
- data/lib/chef/resource.rb +3 -0
- data/lib/chef/resource/freebsd_package.rb +10 -2
- data/lib/chef/resource/user.rb +18 -0
- data/lib/chef/resource_reporter.rb +7 -7
- data/lib/chef/role.rb +2 -2
- data/lib/chef/version.rb +1 -1
- data/spec/data/mac_users/10.7-8.plist.xml +559 -0
- data/spec/data/mac_users/10.7-8.shadow.xml +11 -0
- data/spec/data/mac_users/10.7.plist.xml +559 -0
- data/spec/data/mac_users/10.7.shadow.xml +11 -0
- data/spec/data/mac_users/10.8.plist.xml +559 -0
- data/spec/data/mac_users/10.8.shadow.xml +21 -0
- data/spec/data/mac_users/10.9.plist.xml +560 -0
- data/spec/data/mac_users/10.9.shadow.xml +21 -0
- data/spec/functional/resource/env_spec.rb +137 -0
- data/spec/functional/resource/user/dscl_spec.rb +198 -0
- data/spec/functional/resource/{user_spec.rb → user/useradd_spec.rb} +1 -1
- data/spec/support/lib/chef/resource/zen_follower.rb +46 -0
- data/spec/unit/application_spec.rb +32 -9
- data/spec/unit/provider/group/dscl_spec.rb +38 -1
- data/spec/unit/provider/package/rpm_spec.rb +12 -0
- data/spec/unit/provider/user/dscl_spec.rb +659 -264
- data/spec/unit/provider/user/useradd_spec.rb +1 -0
- data/spec/unit/recipe_spec.rb +41 -0
- data/spec/unit/resource_reporter_spec.rb +48 -0
- data/spec/unit/resource_spec.rb +9 -2
- data/spec/unit/role_spec.rb +6 -0
- metadata +28 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6f91371bb60065252a97632555f0df556cad3fae
|
4
|
+
data.tar.gz: 1bb4529b9515de55e1ffd4ad6cd617e4545ca1e5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: df49419774cdffd4dc4605f060b425bd544cebc16f6e244c5baa09f31eef7b88114bd0227fa659040cf7fa9d45b51d089a617d573723d8d5aa29970dd3595b34
|
7
|
+
data.tar.gz: 1c5f519f24807ce4c72996a1faedcddaaee5d07f0b8bc20e0f6e6b57ec440b6eb138c090095ba9f546bbe863354ebb4289b06294b30abea3cbdbdbf85c070a00
|
data/lib/chef/application.rb
CHANGED
@@ -72,7 +72,6 @@ class Chef::Application
|
|
72
72
|
end
|
73
73
|
end
|
74
74
|
|
75
|
-
|
76
75
|
# Parse configuration (options and config file)
|
77
76
|
def configure_chef
|
78
77
|
parse_options
|
@@ -254,30 +253,39 @@ class Chef::Application
|
|
254
253
|
# Set ENV['http_proxy']
|
255
254
|
def configure_http_proxy
|
256
255
|
if http_proxy = Chef::Config[:http_proxy]
|
257
|
-
|
258
|
-
|
256
|
+
http_proxy_string = configure_proxy("http", http_proxy,
|
257
|
+
Chef::Config[:http_proxy_user], Chef::Config[:http_proxy_pass])
|
258
|
+
env['http_proxy'] = http_proxy_string unless env['http_proxy']
|
259
|
+
env['HTTP_PROXY'] = http_proxy_string unless env['HTTP_PROXY']
|
259
260
|
end
|
260
261
|
end
|
261
262
|
|
262
263
|
# Set ENV['https_proxy']
|
263
264
|
def configure_https_proxy
|
264
265
|
if https_proxy = Chef::Config[:https_proxy]
|
265
|
-
|
266
|
-
|
266
|
+
https_proxy_string = configure_proxy("https", https_proxy,
|
267
|
+
Chef::Config[:https_proxy_user], Chef::Config[:https_proxy_pass])
|
268
|
+
env['https_proxy'] = https_proxy_string unless env['https_proxy']
|
269
|
+
env['HTTPS_PROXY'] = https_proxy_string unless env['HTTPS_PROXY']
|
267
270
|
end
|
268
271
|
end
|
269
272
|
|
270
273
|
# Set ENV['ftp_proxy']
|
271
274
|
def configure_ftp_proxy
|
272
275
|
if ftp_proxy = Chef::Config[:ftp_proxy]
|
273
|
-
|
276
|
+
ftp_proxy_string = configure_proxy("ftp", ftp_proxy,
|
274
277
|
Chef::Config[:ftp_proxy_user], Chef::Config[:ftp_proxy_pass])
|
278
|
+
env['ftp_proxy'] = ftp_proxy_string unless env['ftp_proxy']
|
279
|
+
env['FTP_PROXY'] = ftp_proxy_string unless env['FTP_PROXY']
|
275
280
|
end
|
276
281
|
end
|
277
282
|
|
278
283
|
# Set ENV['no_proxy']
|
279
284
|
def configure_no_proxy
|
280
|
-
|
285
|
+
if Chef::Config[:no_proxy]
|
286
|
+
env['no_proxy'] = Chef::Config[:no_proxy] unless env['no_proxy']
|
287
|
+
env['NO_PROXY'] = Chef::Config[:no_proxy] unless env['NO_PROXY']
|
288
|
+
end
|
281
289
|
end
|
282
290
|
|
283
291
|
# Builds a proxy uri. Examples:
|
@@ -291,7 +299,7 @@ class Chef::Application
|
|
291
299
|
# pass = password
|
292
300
|
def configure_proxy(scheme, path, user, pass)
|
293
301
|
begin
|
294
|
-
path = "#{scheme}://#{path}" unless path.
|
302
|
+
path = "#{scheme}://#{path}" unless path.include?('://')
|
295
303
|
# URI.split returns the following parts:
|
296
304
|
# [scheme, userinfo, host, port, registry, path, opaque, query, fragment]
|
297
305
|
parts = URI.split(URI.encode(path))
|
data/lib/chef/dsl/recipe.rb
CHANGED
@@ -84,6 +84,20 @@ class Chef
|
|
84
84
|
|
85
85
|
resource = build_resource(type, name, created_at, &resource_attrs_block)
|
86
86
|
|
87
|
+
# Some resources (freebsd_package) can be invoked with multiple names
|
88
|
+
# (package || freebsd_package).
|
89
|
+
# https://github.com/opscode/chef/issues/1773
|
90
|
+
# For these resources we want to make sure
|
91
|
+
# their key in resource collection is same as the name they are declared
|
92
|
+
# as. Since this might be a breaking change for resources that define
|
93
|
+
# customer to_s methods, we are working around the issue by letting
|
94
|
+
# resources know of their created_as_type until this issue is fixed in
|
95
|
+
# Chef 12:
|
96
|
+
# https://github.com/opscode/chef/issues/1817
|
97
|
+
if resource.respond_to?(:created_as_type=)
|
98
|
+
resource.created_as_type = type
|
99
|
+
end
|
100
|
+
|
87
101
|
run_context.resource_collection.insert(resource)
|
88
102
|
resource
|
89
103
|
end
|
data/lib/chef/exceptions.rb
CHANGED
@@ -83,6 +83,7 @@ class Chef
|
|
83
83
|
class RequestedUIDUnavailable < RuntimeError; end
|
84
84
|
class InvalidHomeDirectory < ArgumentError; end
|
85
85
|
class DsclCommandFailed < RuntimeError; end
|
86
|
+
class PlistUtilCommandFailed < RuntimeError; end
|
86
87
|
class UserIDNotFound < ArgumentError; end
|
87
88
|
class GroupIDNotFound < ArgumentError; end
|
88
89
|
class ConflictingMembersInGroup < ArgumentError; end
|
@@ -51,17 +51,13 @@ class Chef
|
|
51
51
|
return obj ? obj.variablevalue : nil
|
52
52
|
end
|
53
53
|
|
54
|
-
def find_env(environment_variables, key_name)
|
55
|
-
environment_variables.find do | environment_variable |
|
56
|
-
environment_variable['name'].downcase == key_name
|
57
|
-
end
|
58
|
-
end
|
59
|
-
|
60
54
|
def env_obj(key_name)
|
61
55
|
wmi = WmiLite::Wmi.new
|
62
|
-
|
63
|
-
|
64
|
-
|
56
|
+
# Note that by design this query is case insensitive with regard to key_name
|
57
|
+
environment_variables = wmi.query("select * from Win32_Environment where name = '#{key_name}'")
|
58
|
+
if environment_variables && environment_variables.length > 0
|
59
|
+
environment_variables[0].wmi_ole_object
|
60
|
+
end
|
65
61
|
end
|
66
62
|
|
67
63
|
#see: http://msdn.microsoft.com/en-us/library/ms682653%28VS.85%29.aspx
|
@@ -39,11 +39,33 @@ class Chef
|
|
39
39
|
return result[2]
|
40
40
|
end
|
41
41
|
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
42
|
+
def load_current_resource
|
43
|
+
@current_resource = Chef::Resource::Group.new(@new_resource.name)
|
44
|
+
@current_resource.group_name(@new_resource.name)
|
45
|
+
group_info = nil
|
46
|
+
begin
|
47
|
+
group_info = safe_dscl("read /Groups/#{@new_resource.name}")
|
48
|
+
rescue Chef::Exceptions::Group
|
49
|
+
@group_exists = false
|
50
|
+
Chef::Log.debug("#{@new_resource} group does not exist")
|
51
|
+
end
|
52
|
+
|
53
|
+
if group_info
|
54
|
+
group_info.each_line do |line|
|
55
|
+
key, val = line.split(': ')
|
56
|
+
val.strip! if val
|
57
|
+
case key.downcase
|
58
|
+
when 'primarygroupid'
|
59
|
+
@new_resource.gid(val) unless @new_resource.gid
|
60
|
+
@current_resource.gid(val)
|
61
|
+
when 'groupmembership'
|
62
|
+
@current_resource.members(val.split(' '))
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
@current_resource
|
68
|
+
end
|
47
69
|
|
48
70
|
# get a free GID greater than 200
|
49
71
|
def get_free_gid(search_limit=1000)
|
@@ -115,10 +137,6 @@ class Chef
|
|
115
137
|
end
|
116
138
|
end
|
117
139
|
|
118
|
-
def load_current_resource
|
119
|
-
super
|
120
|
-
end
|
121
|
-
|
122
140
|
def create_group
|
123
141
|
dscl_create_group
|
124
142
|
set_gid
|
@@ -60,7 +60,7 @@ class Chef
|
|
60
60
|
status = popen4("rpm -qp --queryformat '%{NAME} %{VERSION}-%{RELEASE}\n' #{@new_resource.source}") do |pid, stdin, stdout, stderr|
|
61
61
|
stdout.each do |line|
|
62
62
|
case line
|
63
|
-
when
|
63
|
+
when /^([\w\d+_.-]+)\s([\w\d_.-]+)$/
|
64
64
|
@current_resource.package_name($1)
|
65
65
|
@new_resource.version($2)
|
66
66
|
@candidate_version = $2
|
@@ -78,7 +78,7 @@ class Chef
|
|
78
78
|
@rpm_status = popen4("rpm -q --queryformat '%{NAME} %{VERSION}-%{RELEASE}\n' #{@current_resource.package_name}") do |pid, stdin, stdout, stderr|
|
79
79
|
stdout.each do |line|
|
80
80
|
case line
|
81
|
-
when
|
81
|
+
when /^([\w\d+_.-]+)\s([\w\d_.-]+)$/
|
82
82
|
Chef::Log.debug("#{@new_resource} current version is #{$2}")
|
83
83
|
@current_resource.version($2)
|
84
84
|
end
|
@@ -16,42 +16,210 @@
|
|
16
16
|
# limitations under the License.
|
17
17
|
#
|
18
18
|
|
19
|
-
require '
|
19
|
+
require 'mixlib/shellout'
|
20
20
|
require 'chef/provider/user'
|
21
21
|
require 'openssl'
|
22
|
+
require 'plist'
|
22
23
|
|
23
24
|
class Chef
|
24
25
|
class Provider
|
25
26
|
class User
|
27
|
+
#
|
28
|
+
# The most tricky bit of this provider is the way it deals with user passwords.
|
29
|
+
# Mac OS X has different password shadow calculations based on the version.
|
30
|
+
# < 10.7 => password shadow calculation format SALTED-SHA1
|
31
|
+
# => stored in: /var/db/shadow/hash/#{guid}
|
32
|
+
# => shadow binary length 68 bytes
|
33
|
+
# => First 4 bytes salt / Next 64 bytes shadow value
|
34
|
+
# = 10.7 => password shadow calculation format SALTED-SHA512
|
35
|
+
# => stored in: /var/db/dslocal/nodes/Default/users/#{name}.plist
|
36
|
+
# => shadow binary length 68 bytes
|
37
|
+
# => First 4 bytes salt / Next 64 bytes shadow value
|
38
|
+
# > 10.7 => password shadow calculation format SALTED-SHA512-PBKDF2
|
39
|
+
# => stored in: /var/db/dslocal/nodes/Default/users/#{name}.plist
|
40
|
+
# => shadow binary length 128 bytes
|
41
|
+
# => Salt / Iterations are stored seperately in the same file
|
42
|
+
#
|
43
|
+
# This provider only supports Mac OSX versions 10.7 and above
|
26
44
|
class Dscl < Chef::Provider::User
|
27
45
|
include Chef::Mixin::ShellOut
|
28
46
|
|
29
|
-
|
30
|
-
|
47
|
+
def define_resource_requirements
|
48
|
+
super
|
49
|
+
|
50
|
+
requirements.assert(:all_actions) do |a|
|
51
|
+
a.assertion { mac_osx_version_less_than_10_7? == false }
|
52
|
+
a.failure_message(Chef::Exceptions::User, "Chef::Provider::User::Dscl only supports Mac OS X versions 10.7 and above.")
|
53
|
+
end
|
54
|
+
|
55
|
+
requirements.assert(:all_actions) do |a|
|
56
|
+
a.assertion { ::File.exists?("/usr/bin/dscl") }
|
57
|
+
a.failure_message(Chef::Exceptions::User, "Cannot find binary '/usr/bin/dscl' on the system for #{@new_resource}!")
|
58
|
+
end
|
59
|
+
|
60
|
+
requirements.assert(:all_actions) do |a|
|
61
|
+
a.assertion { ::File.exists?("/usr/bin/plutil") }
|
62
|
+
a.failure_message(Chef::Exceptions::User, "Cannot find binary '/usr/bin/plutil' on the system for #{@new_resource}!")
|
63
|
+
end
|
64
|
+
|
65
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
66
|
+
a.assertion do
|
67
|
+
if @new_resource.password && mac_osx_version_greater_than_10_7?
|
68
|
+
# SALTED-SHA512 password shadow hashes are not supported on 10.8 and above.
|
69
|
+
!salted_sha512?(@new_resource.password)
|
70
|
+
else
|
71
|
+
true
|
72
|
+
end
|
73
|
+
end
|
74
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512 passwords are not supported on Mac 10.8 and above. \
|
75
|
+
If you want to set the user password using shadow info make sure you specify a SALTED-SHA512-PBKDF2 shadow hash \
|
76
|
+
in 'password', with the associated 'salt' and 'iterations'.")
|
77
|
+
end
|
78
|
+
|
79
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
80
|
+
a.assertion do
|
81
|
+
if @new_resource.password && mac_osx_version_greater_than_10_7? && salted_sha512_pbkdf2?(@new_resource.password)
|
82
|
+
# salt and iterations should be specified when
|
83
|
+
# SALTED-SHA512-PBKDF2 password shadow hash is given
|
84
|
+
!@new_resource.salt.nil? && !@new_resource.iterations.nil?
|
85
|
+
else
|
86
|
+
true
|
87
|
+
end
|
88
|
+
end
|
89
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512-PBKDF2 shadow hash is given without associated \
|
90
|
+
'salt' and 'iterations'. Please specify 'salt' and 'iterations' in order to set the user password using shadow hash.")
|
91
|
+
end
|
92
|
+
|
93
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
94
|
+
a.assertion do
|
95
|
+
if @new_resource.password && !mac_osx_version_greater_than_10_7?
|
96
|
+
# On 10.7 SALTED-SHA512-PBKDF2 is not supported
|
97
|
+
!salted_sha512_pbkdf2?(@new_resource.password)
|
98
|
+
else
|
99
|
+
true
|
100
|
+
end
|
101
|
+
end
|
102
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512-PBKDF2 shadow hashes are not supported on \
|
103
|
+
Mac OS X version 10.7. Please specify a SALTED-SHA512 shadow hash in 'password' attribute to set the \
|
104
|
+
user password using shadow hash.")
|
105
|
+
end
|
31
106
|
|
32
|
-
def dscl(*args)
|
33
|
-
shell_out("dscl . -#{args.join(' ')}")
|
34
107
|
end
|
35
108
|
|
36
|
-
def
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
109
|
+
def load_current_resource
|
110
|
+
@current_resource = Chef::Resource::User.new(@new_resource.username)
|
111
|
+
@current_resource.username(@new_resource.username)
|
112
|
+
|
113
|
+
user_info = read_user_info
|
114
|
+
if user_info
|
115
|
+
@current_resource.uid(dscl_get(user_info, :uid))
|
116
|
+
@current_resource.gid(dscl_get(user_info, :gid))
|
117
|
+
@current_resource.home(dscl_get(user_info, :home))
|
118
|
+
@current_resource.shell(dscl_get(user_info, :shell))
|
119
|
+
@current_resource.comment(dscl_get(user_info, :comment))
|
120
|
+
@authentication_authority = dscl_get(user_info, :auth_authority)
|
121
|
+
|
122
|
+
if @new_resource.password && dscl_get(user_info, :password) == "********"
|
123
|
+
# A password is set. Let's get the password information from shadow file
|
124
|
+
shadow_hash_binary = dscl_get(user_info, :shadow_hash)
|
125
|
+
|
126
|
+
# Calling shell_out directly since we want to give an input stream
|
127
|
+
shadow_hash_xml = convert_binary_plist_to_xml(shadow_hash_binary.string)
|
128
|
+
shadow_hash = Plist::parse_xml(shadow_hash_xml)
|
129
|
+
|
130
|
+
if shadow_hash["SALTED-SHA512"]
|
131
|
+
# Convert the shadow value from Base64 encoding to hex before consuming them
|
132
|
+
@password_shadow_conversion_algorithm = "SALTED-SHA512"
|
133
|
+
@current_resource.password(shadow_hash["SALTED-SHA512"].string.unpack('H*').first)
|
134
|
+
elsif shadow_hash["SALTED-SHA512-PBKDF2"]
|
135
|
+
@password_shadow_conversion_algorithm = "SALTED-SHA512-PBKDF2"
|
136
|
+
# Convert the entropy from Base64 encoding to hex before consuming them
|
137
|
+
@current_resource.password(shadow_hash["SALTED-SHA512-PBKDF2"]["entropy"].string.unpack('H*').first)
|
138
|
+
@current_resource.iterations(shadow_hash["SALTED-SHA512-PBKDF2"]["iterations"])
|
139
|
+
# Convert the salt from Base64 encoding to hex before consuming them
|
140
|
+
@current_resource.salt(shadow_hash["SALTED-SHA512-PBKDF2"]["salt"].string.unpack('H*').first)
|
141
|
+
else
|
142
|
+
raise(Chef::Exceptions::User,"Unknown shadow_hash format: #{shadow_hash.keys.join(' ')}")
|
143
|
+
end
|
144
|
+
end
|
145
|
+
|
146
|
+
convert_group_name if @new_resource.gid
|
147
|
+
else
|
148
|
+
@user_exists = false
|
149
|
+
Chef::Log.debug("#{@new_resource} user does not exist")
|
150
|
+
end
|
151
|
+
|
152
|
+
@current_resource
|
153
|
+
end
|
154
|
+
|
155
|
+
#
|
156
|
+
# Provider Actions
|
157
|
+
#
|
158
|
+
|
159
|
+
def create_user
|
160
|
+
dscl_create_user
|
161
|
+
dscl_create_comment
|
162
|
+
dscl_set_uid
|
163
|
+
dscl_set_gid
|
164
|
+
dscl_set_home
|
165
|
+
dscl_set_shell
|
166
|
+
set_password
|
42
167
|
end
|
43
168
|
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
169
|
+
def manage_user
|
170
|
+
dscl_create_user if diverged?(:username)
|
171
|
+
dscl_create_comment if diverged?(:comment)
|
172
|
+
dscl_set_uid if diverged?(:uid)
|
173
|
+
dscl_set_gid if diverged?(:gid)
|
174
|
+
dscl_set_home if diverged?(:home)
|
175
|
+
dscl_set_shell if diverged?(:shell)
|
176
|
+
set_password if diverged_password?
|
177
|
+
end
|
49
178
|
|
50
|
-
#
|
179
|
+
#
|
180
|
+
# Action Helpers
|
181
|
+
#
|
182
|
+
|
183
|
+
#
|
184
|
+
# Create a user using dscl
|
185
|
+
#
|
186
|
+
def dscl_create_user
|
187
|
+
run_dscl("create /Users/#{@new_resource.username}")
|
188
|
+
end
|
189
|
+
|
190
|
+
#
|
191
|
+
# Saves the specified Chef user `comment` into RealName attribute
|
192
|
+
# of Mac user.
|
193
|
+
#
|
194
|
+
def dscl_create_comment
|
195
|
+
run_dscl("create /Users/#{@new_resource.username} RealName '#{@new_resource.comment}'")
|
196
|
+
end
|
197
|
+
|
198
|
+
#
|
199
|
+
# Sets the user id for the user using dscl.
|
200
|
+
# If a `uid` is not specified, it finds the next available one starting
|
201
|
+
# from 200 if `system` is set, 500 otherwise.
|
202
|
+
#
|
203
|
+
def dscl_set_uid
|
204
|
+
@new_resource.uid(get_free_uid) if (@new_resource.uid.nil? || @new_resource.uid == '')
|
205
|
+
|
206
|
+
if uid_used?(@new_resource.uid)
|
207
|
+
raise(Chef::Exceptions::RequestedUIDUnavailable, "uid #{@new_resource.uid} is already in use")
|
208
|
+
end
|
209
|
+
|
210
|
+
run_dscl("create /Users/#{@new_resource.username} UniqueID #{@new_resource.uid}")
|
211
|
+
end
|
212
|
+
|
213
|
+
#
|
214
|
+
# Find the next available uid on the system. starting with 200 if `system` is set,
|
215
|
+
# 500 otherwise.
|
216
|
+
#
|
51
217
|
def get_free_uid(search_limit=1000)
|
52
|
-
uid = nil
|
53
|
-
|
54
|
-
|
218
|
+
uid = nil
|
219
|
+
base_uid = @new_resource.system ? 200 : 500
|
220
|
+
next_uid_guess = base_uid
|
221
|
+
users_uids = run_dscl("list /Users uid")
|
222
|
+
while(next_uid_guess < search_limit + base_uid)
|
55
223
|
if users_uids =~ Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n")
|
56
224
|
next_uid_guess += 1
|
57
225
|
else
|
@@ -62,22 +230,41 @@ class Chef
|
|
62
230
|
return uid || raise("uid not found. Exhausted. Searched #{search_limit} times")
|
63
231
|
end
|
64
232
|
|
233
|
+
#
|
234
|
+
# Returns true if uid is in use by a different account, false otherwise.
|
235
|
+
#
|
65
236
|
def uid_used?(uid)
|
66
237
|
return false unless uid
|
67
|
-
users_uids =
|
238
|
+
users_uids = run_dscl("list /Users uid")
|
68
239
|
!! ( users_uids =~ Regexp.new("#{Regexp.escape(uid.to_s)}\n") )
|
69
240
|
end
|
70
241
|
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
242
|
+
#
|
243
|
+
# Sets the group id for the user using dscl. Fails if a group doesn't
|
244
|
+
# exist on the system with given group id.
|
245
|
+
#
|
246
|
+
def dscl_set_gid
|
247
|
+
unless @new_resource.gid && @new_resource.gid.to_s.match(/^\d+$/)
|
248
|
+
begin
|
249
|
+
possible_gid = run_dscl("read /Groups/#{@new_resource.gid} PrimaryGroupID").split(" ").last
|
250
|
+
rescue Chef::Exceptions::DsclCommandFailed => e
|
251
|
+
raise Chef::Exceptions::GroupIDNotFound.new("Group not found for #{@new_resource.gid} when creating user #{@new_resource.username}")
|
252
|
+
end
|
253
|
+
@new_resource.gid(possible_gid) if possible_gid && possible_gid.match(/^\d+$/)
|
75
254
|
end
|
76
|
-
|
255
|
+
run_dscl("create /Users/#{@new_resource.username} PrimaryGroupID '#{@new_resource.gid}'")
|
77
256
|
end
|
78
257
|
|
79
|
-
|
80
|
-
|
258
|
+
#
|
259
|
+
# Sets the home directory for the user. If `:manage_home` is set home
|
260
|
+
# directory is managed (moved / created) for the user.
|
261
|
+
#
|
262
|
+
def dscl_set_home
|
263
|
+
if @new_resource.home.nil? || @new_resource.home.empty?
|
264
|
+
run_dscl("delete /Users/#{@new_resource.username} NFSHomeDirectory")
|
265
|
+
return
|
266
|
+
end
|
267
|
+
|
81
268
|
if @new_resource.supports[:manage_home]
|
82
269
|
validate_home_dir_specification!
|
83
270
|
|
@@ -89,199 +276,399 @@ class Chef
|
|
89
276
|
move_home
|
90
277
|
end
|
91
278
|
end
|
92
|
-
|
279
|
+
run_dscl("create /Users/#{@new_resource.username} NFSHomeDirectory '#{@new_resource.home}'")
|
280
|
+
end
|
281
|
+
|
282
|
+
def validate_home_dir_specification!
|
283
|
+
unless @new_resource.home =~ /^\//
|
284
|
+
raise(Chef::Exceptions::InvalidHomeDirectory,"invalid path spec for User: '#{@new_resource.username}', home directory: '#{@new_resource.home}'")
|
285
|
+
end
|
93
286
|
end
|
94
287
|
|
95
|
-
def
|
96
|
-
|
288
|
+
def current_home_exists?
|
289
|
+
::File.exist?("#{@current_resource.home}")
|
97
290
|
end
|
98
291
|
|
99
|
-
def
|
100
|
-
|
292
|
+
def new_home_exists?
|
293
|
+
::File.exist?("#{@new_resource.home}")
|
101
294
|
end
|
102
295
|
|
103
|
-
def
|
104
|
-
|
296
|
+
def ditto_home
|
297
|
+
skel = "/System/Library/User Template/English.lproj"
|
298
|
+
raise(Chef::Exceptions::User,"can't find skel at: #{skel}") unless ::File.exists?(skel)
|
299
|
+
shell_out! "ditto '#{skel}' '#{@new_resource.home}'"
|
300
|
+
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
301
|
+
end
|
302
|
+
|
303
|
+
def move_home
|
304
|
+
Chef::Log.debug("#{@new_resource} moving #{self} home from #{@current_resource.home} to #{@new_resource.home}")
|
305
|
+
|
306
|
+
src = @current_resource.home
|
307
|
+
FileUtils.mkdir_p(@new_resource.home)
|
308
|
+
files = ::Dir.glob("#{src}/*", ::File::FNM_DOTMATCH) - ["#{src}/.","#{src}/.."]
|
309
|
+
::FileUtils.mv(files,@new_resource.home, :force => true)
|
310
|
+
::FileUtils.rmdir(src)
|
311
|
+
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
105
312
|
end
|
106
313
|
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
314
|
+
#
|
315
|
+
# Sets the shell for the user using dscl.
|
316
|
+
#
|
317
|
+
def dscl_set_shell
|
318
|
+
if @new_resource.shell || ::File.exists?("#{@new_resource.shell}")
|
319
|
+
run_dscl("create /Users/#{@new_resource.username} UserShell '#{@new_resource.shell}'")
|
111
320
|
else
|
112
|
-
false
|
321
|
+
run_dscl("create /Users/#{@new_resource.username} UserShell '/usr/bin/false'")
|
113
322
|
end
|
114
323
|
end
|
115
324
|
|
116
|
-
|
117
|
-
|
118
|
-
|
325
|
+
#
|
326
|
+
# Sets the password for the user based on given password parameters.
|
327
|
+
# Chef supports specifying plain-text passwords and password shadow
|
328
|
+
# hash data.
|
329
|
+
#
|
330
|
+
def set_password
|
331
|
+
# Return if there is no password to set
|
332
|
+
return if @new_resource.password.nil?
|
333
|
+
|
334
|
+
shadow_info = prepare_password_shadow_info
|
335
|
+
|
336
|
+
# Shadow info is saved as binary plist. Convert the info to binary plist.
|
337
|
+
shadow_info_binary = StringIO.new
|
338
|
+
command = Mixlib::ShellOut.new("plutil -convert binary1 -o - -",
|
339
|
+
:input => shadow_info.to_plist, :live_stream => shadow_info_binary)
|
340
|
+
command.run_command
|
341
|
+
|
342
|
+
# Replace the shadow info in user's plist
|
343
|
+
user_info = read_user_info
|
344
|
+
dscl_set(user_info, :shadow_hash, shadow_info_binary)
|
345
|
+
|
346
|
+
#
|
347
|
+
# Before saving the user's plist file we need to wait for dscl to
|
348
|
+
# update its caches and flush them to disk. In order to achieve this
|
349
|
+
# we need to wait first for our changes to get into the dscl cache
|
350
|
+
# and then flush the cache to disk before saving password into the
|
351
|
+
# plist file. 3 seconds is the minimum experimental value for dscl
|
352
|
+
# cache to be updated. We can get rid of this sleep when we find a
|
353
|
+
# trigger to update dscl cache.
|
354
|
+
#
|
355
|
+
sleep 3
|
356
|
+
shell_out("dscacheutil '-flushcache'")
|
357
|
+
save_user_info(user_info)
|
358
|
+
end
|
119
359
|
|
120
|
-
|
121
|
-
|
122
|
-
|
360
|
+
#
|
361
|
+
# Prepares the password shadow info based on the platform version.
|
362
|
+
#
|
363
|
+
def prepare_password_shadow_info
|
364
|
+
shadow_info = { }
|
365
|
+
entropy = nil
|
366
|
+
salt = nil
|
367
|
+
iterations = nil
|
368
|
+
|
369
|
+
if mac_osx_version_10_7?
|
370
|
+
hash_value = if salted_sha512?(@new_resource.password)
|
371
|
+
@new_resource.password
|
123
372
|
else
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
OpenSSL::Random.random_bytes(10).each_byte { |b| hex_salt << b.to_i.to_s(16) }
|
129
|
-
hex_salt = hex_salt.slice(0...8)
|
130
|
-
salt = [hex_salt].pack("H*")
|
131
|
-
sha1 = ::OpenSSL::Digest::SHA1.hexdigest(salt+@new_resource.password)
|
132
|
-
salted_sha1 = (hex_salt+sha1).upcase
|
133
|
-
end
|
134
|
-
shadow_hash = String.new("00000000"*155)
|
135
|
-
shadow_hash[168] = salted_sha1
|
373
|
+
# Create a random 4 byte salt
|
374
|
+
salt = OpenSSL::Random.random_bytes(4)
|
375
|
+
encoded_password = OpenSSL::Digest::SHA512.hexdigest(salt + @new_resource.password)
|
376
|
+
hash_value = salt.unpack('H*').first + encoded_password
|
136
377
|
end
|
137
378
|
|
138
|
-
|
139
|
-
|
379
|
+
shadow_info["SALTED-SHA512"] = StringIO.new
|
380
|
+
shadow_info["SALTED-SHA512"].string = convert_to_binary(hash_value)
|
381
|
+
shadow_info
|
382
|
+
else
|
383
|
+
if salted_sha512_pbkdf2?(@new_resource.password)
|
384
|
+
entropy = convert_to_binary(@new_resource.password)
|
385
|
+
salt = convert_to_binary(@new_resource.salt)
|
386
|
+
iterations = @new_resource.iterations
|
387
|
+
else
|
388
|
+
salt = OpenSSL::Random.random_bytes(32)
|
389
|
+
iterations = @new_resource.iterations # Use the default if not specified by the user
|
390
|
+
|
391
|
+
entropy = OpenSSL::PKCS5::pbkdf2_hmac(
|
392
|
+
@new_resource.password,
|
393
|
+
salt,
|
394
|
+
iterations,
|
395
|
+
128,
|
396
|
+
OpenSSL::Digest::SHA512.new
|
397
|
+
)
|
140
398
|
end
|
141
399
|
|
142
|
-
|
143
|
-
|
400
|
+
pbkdf_info = { }
|
401
|
+
pbkdf_info["entropy"] = StringIO.new
|
402
|
+
pbkdf_info["entropy"].string = entropy
|
403
|
+
pbkdf_info["salt"] = StringIO.new
|
404
|
+
pbkdf_info["salt"].string = salt
|
405
|
+
pbkdf_info["iterations"] = iterations
|
406
|
+
|
407
|
+
shadow_info["SALTED-SHA512-PBKDF2"] = pbkdf_info
|
408
|
+
end
|
409
|
+
|
410
|
+
shadow_info
|
411
|
+
end
|
412
|
+
|
413
|
+
#
|
414
|
+
# Removes the user from the system after removing user from his groups
|
415
|
+
# and deleting home directory if needed.
|
416
|
+
#
|
417
|
+
def remove_user
|
418
|
+
if @new_resource.supports[:manage_home]
|
419
|
+
# Remove home directory
|
420
|
+
FileUtils.rm_rf(@current_resource.home)
|
421
|
+
end
|
422
|
+
|
423
|
+
# Remove the user from its groups
|
424
|
+
run_dscl("list /Groups").each_line do |group|
|
425
|
+
if member_of_group?(group.chomp)
|
426
|
+
run_dscl("delete /Groups/#{group.chomp} GroupMembership '#{@new_resource.username}'")
|
144
427
|
end
|
145
428
|
end
|
429
|
+
|
430
|
+
# Remove user account
|
431
|
+
run_dscl("delete /Users/#{@new_resource.username}")
|
146
432
|
end
|
147
433
|
|
148
|
-
|
149
|
-
|
150
|
-
|
434
|
+
#
|
435
|
+
# Locks the user.
|
436
|
+
#
|
437
|
+
def lock_user
|
438
|
+
run_dscl("append /Users/#{@new_resource.username} AuthenticationAuthority ';DisabledUser;'")
|
151
439
|
end
|
152
440
|
|
153
|
-
|
154
|
-
|
155
|
-
|
156
|
-
|
157
|
-
|
158
|
-
|
159
|
-
dscl_set_shell
|
160
|
-
modify_password
|
441
|
+
#
|
442
|
+
# Unlocks the user
|
443
|
+
#
|
444
|
+
def unlock_user
|
445
|
+
auth_string = @authentication_authority.gsub(/AuthenticationAuthority: /,"").gsub(/;DisabledUser;/,"").strip
|
446
|
+
run_dscl("create /Users/#{@new_resource.username} AuthenticationAuthority '#{auth_string}'")
|
161
447
|
end
|
162
448
|
|
163
|
-
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
449
|
+
#
|
450
|
+
# Returns true if the user is locked, false otherwise.
|
451
|
+
#
|
452
|
+
def locked?
|
453
|
+
if @authentication_authority
|
454
|
+
!!(@authentication_authority =~ /DisabledUser/ )
|
455
|
+
else
|
456
|
+
false
|
457
|
+
end
|
171
458
|
end
|
172
459
|
|
173
|
-
|
174
|
-
|
460
|
+
#
|
461
|
+
# This is the interface base User provider requires to provide idempotency.
|
462
|
+
#
|
463
|
+
def check_lock
|
464
|
+
return @locked = locked?
|
175
465
|
end
|
176
466
|
|
177
|
-
|
178
|
-
|
467
|
+
#
|
468
|
+
# Helper functions
|
469
|
+
#
|
470
|
+
|
471
|
+
#
|
472
|
+
# Returns true if the system state and desired state is different for
|
473
|
+
# given attribute.
|
474
|
+
#
|
475
|
+
def diverged?(parameter)
|
476
|
+
parameter_updated?(parameter) && (not @new_resource.send(parameter).nil?)
|
179
477
|
end
|
180
478
|
|
181
|
-
def
|
182
|
-
|
183
|
-
begin
|
184
|
-
possible_gid = safe_dscl("read /Groups/#{@new_resource.gid} PrimaryGroupID").split(" ").last
|
185
|
-
rescue Chef::Exceptions::DsclCommandFailed => e
|
186
|
-
raise Chef::Exceptions::GroupIDNotFound.new("Group not found for #{@new_resource.gid} when creating user #{@new_resource.username}")
|
187
|
-
end
|
188
|
-
@new_resource.gid(possible_gid) if possible_gid && possible_gid.match(/^\d+$/)
|
189
|
-
end
|
190
|
-
safe_dscl("create /Users/#{@new_resource.username} PrimaryGroupID '#{@new_resource.gid}'")
|
479
|
+
def parameter_updated?(parameter)
|
480
|
+
not (@new_resource.send(parameter) == @current_resource.send(parameter))
|
191
481
|
end
|
192
482
|
|
193
|
-
|
194
|
-
|
195
|
-
|
483
|
+
#
|
484
|
+
# We need a special check function for password since we support both
|
485
|
+
# plain text and shadow hash data.
|
486
|
+
#
|
487
|
+
# Checks if password needs update based on platform version and the
|
488
|
+
# type of the password specified.
|
489
|
+
#
|
490
|
+
def diverged_password?
|
491
|
+
return false if @new_resource.password.nil?
|
492
|
+
|
493
|
+
# Dscl provider supports both plain text passwords and shadow hashes.
|
494
|
+
if mac_osx_version_10_7?
|
495
|
+
if salted_sha512?(@new_resource.password)
|
496
|
+
diverged?(:password)
|
497
|
+
else
|
498
|
+
!salted_sha512_password_match?
|
499
|
+
end
|
196
500
|
else
|
197
|
-
|
501
|
+
# When a system is upgraded to a version 10.7+ shadow hashes of the users
|
502
|
+
# will be updated when the user logs in. So it's possible that we will have
|
503
|
+
# SALTED-SHA512 password in the current_resource. In that case we will force
|
504
|
+
# password to be updated.
|
505
|
+
return true if salted_sha512?(@current_resource.password)
|
506
|
+
|
507
|
+
if salted_sha512_pbkdf2?(@new_resource.password)
|
508
|
+
diverged?(:password) || diverged?(:salt) || diverged?(:iterations)
|
509
|
+
else
|
510
|
+
!salted_sha512_pbkdf2_password_match?
|
511
|
+
end
|
198
512
|
end
|
199
513
|
end
|
200
514
|
|
201
|
-
|
202
|
-
|
203
|
-
|
204
|
-
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
|
210
|
-
end
|
211
|
-
# remove the user from its groups
|
212
|
-
groups = []
|
213
|
-
Etc.group do |group|
|
214
|
-
groups << group.name if group.mem.include?(@new_resource.username)
|
215
|
-
end
|
216
|
-
groups.each do |group_name|
|
217
|
-
safe_dscl("delete /Groups/#{group_name} GroupMembership '#{@new_resource.username}'")
|
515
|
+
#
|
516
|
+
# Returns true if user is member of the specified group, false otherwise.
|
517
|
+
#
|
518
|
+
def member_of_group?(group_name)
|
519
|
+
membership_info = ""
|
520
|
+
begin
|
521
|
+
membership_info = run_dscl("read /Groups/#{group_name}")
|
522
|
+
rescue Chef::Exceptions::DsclCommandFailed
|
523
|
+
# Raised if the group doesn't contain any members
|
218
524
|
end
|
219
|
-
#
|
220
|
-
|
525
|
+
# Output is something like:
|
526
|
+
# GroupMembership: root admin etc
|
527
|
+
members = membership_info.split(" ")
|
528
|
+
members.shift # Get rid of GroupMembership: string
|
529
|
+
members.include?(@new_resource.username)
|
221
530
|
end
|
222
531
|
|
223
|
-
|
224
|
-
|
225
|
-
|
226
|
-
|
227
|
-
|
228
|
-
|
532
|
+
#
|
533
|
+
# DSCL Helper functions
|
534
|
+
#
|
535
|
+
|
536
|
+
# A simple map of Chef's terms to DSCL's terms.
|
537
|
+
DSCL_PROPERTY_MAP = {
|
538
|
+
:uid => "generateduid",
|
539
|
+
:gid => "gid",
|
540
|
+
:home => "home",
|
541
|
+
:shell => "shell",
|
542
|
+
:comment => "realname",
|
543
|
+
:password => "passwd",
|
544
|
+
:auth_authority => "authentication_authority",
|
545
|
+
:shadow_hash => "ShadowHashData"
|
546
|
+
}.freeze
|
547
|
+
|
548
|
+
# Directory where the user plist files are stored for versions 10.7 and above
|
549
|
+
USER_PLIST_DIRECTORY = "/var/db/dslocal/nodes/Default/users".freeze
|
550
|
+
|
551
|
+
#
|
552
|
+
# Reads the user plist and returns a hash keyed with DSCL properties specified
|
553
|
+
# in DSCL_PROPERTY_MAP. Return nil if the user is not found.
|
554
|
+
#
|
555
|
+
def read_user_info
|
556
|
+
user_info = nil
|
557
|
+
|
558
|
+
begin
|
559
|
+
user_plist_file = "#{USER_PLIST_DIRECTORY}/#{@new_resource.username}.plist"
|
560
|
+
user_plist_info = run_plutil("convert xml1 -o - #{user_plist_file}")
|
561
|
+
user_info = Plist::parse_xml(user_plist_info)
|
562
|
+
rescue Chef::Exceptions::PlistUtilCommandFailed
|
229
563
|
end
|
564
|
+
|
565
|
+
user_info
|
230
566
|
end
|
231
567
|
|
232
|
-
|
233
|
-
|
568
|
+
#
|
569
|
+
# Saves the given hash keyed with DSCL properties specified
|
570
|
+
# in DSCL_PROPERTY_MAP to the disk.
|
571
|
+
#
|
572
|
+
def save_user_info(user_info)
|
573
|
+
user_plist_file = "#{USER_PLIST_DIRECTORY}/#{@new_resource.username}.plist"
|
574
|
+
Plist::Emit.save_plist(user_info, user_plist_file)
|
575
|
+
run_plutil("convert binary1 #{user_plist_file}")
|
234
576
|
end
|
235
577
|
|
236
|
-
|
237
|
-
|
578
|
+
#
|
579
|
+
# Sets a value in user information hash using Chef attributes as keys.
|
580
|
+
#
|
581
|
+
def dscl_set(user_hash, key, value)
|
582
|
+
raise "Unknown dscl key #{key}" unless DSCL_PROPERTY_MAP.keys.include?(key)
|
583
|
+
user_hash[DSCL_PROPERTY_MAP[key]] = [ value ]
|
584
|
+
user_hash
|
238
585
|
end
|
239
586
|
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
|
587
|
+
#
|
588
|
+
# Gets a value from user information hash using Chef attributes as keys.
|
589
|
+
#
|
590
|
+
def dscl_get(user_hash, key)
|
591
|
+
raise "Unknown dscl key #{key}" unless DSCL_PROPERTY_MAP.keys.include?(key)
|
592
|
+
# DSCL values are set as arrays
|
593
|
+
value = user_hash[DSCL_PROPERTY_MAP[key]]
|
594
|
+
value.nil? ? value : value.first
|
244
595
|
end
|
245
596
|
|
246
|
-
|
247
|
-
|
248
|
-
|
249
|
-
|
597
|
+
#
|
598
|
+
# System Helpets
|
599
|
+
#
|
600
|
+
|
601
|
+
def mac_osx_version
|
602
|
+
# This provider will only be invoked on node[:platform] == "mac_os_x"
|
603
|
+
# We do not check or assert that here.
|
604
|
+
node[:platform_version]
|
250
605
|
end
|
251
606
|
|
252
|
-
def
|
253
|
-
|
607
|
+
def mac_osx_version_10_7?
|
608
|
+
mac_osx_version.start_with?("10.7.")
|
254
609
|
end
|
255
610
|
|
256
|
-
def
|
257
|
-
|
611
|
+
def mac_osx_version_less_than_10_7?
|
612
|
+
versions = mac_osx_version.split(".")
|
613
|
+
# Make integer comparison in order not to report 10.10 less than 10.7
|
614
|
+
(versions[0].to_i <= 10 && versions[1].to_i < 7)
|
258
615
|
end
|
259
616
|
|
260
|
-
def
|
261
|
-
|
262
|
-
|
263
|
-
|
264
|
-
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
617
|
+
def mac_osx_version_greater_than_10_7?
|
618
|
+
versions = mac_osx_version.split(".")
|
619
|
+
# Make integer comparison in order not to report 10.10 less than 10.7
|
620
|
+
(versions[0].to_i >= 10 && versions[1].to_i > 7)
|
265
621
|
end
|
266
622
|
|
267
|
-
def
|
268
|
-
|
623
|
+
def run_dscl(*args)
|
624
|
+
result = shell_out("dscl . -#{args.join(' ')}")
|
625
|
+
return "" if ( args.first =~ /^delete/ ) && ( result.exitstatus != 0 )
|
626
|
+
raise(Chef::Exceptions::DsclCommandFailed,"dscl error: #{result.inspect}") unless result.exitstatus == 0
|
627
|
+
raise(Chef::Exceptions::DsclCommandFailed,"dscl error: #{result.inspect}") if result.stdout =~ /No such key: /
|
628
|
+
result.stdout
|
629
|
+
end
|
269
630
|
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
::FileUtils.rmdir(src)
|
275
|
-
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
631
|
+
def run_plutil(*args)
|
632
|
+
result = shell_out("plutil -#{args.join(' ')}")
|
633
|
+
raise(Chef::Exceptions::PlistUtilCommandFailed,"plutil error: #{result.inspect}") unless result.exitstatus == 0
|
634
|
+
result.stdout
|
276
635
|
end
|
277
636
|
|
278
|
-
def
|
279
|
-
|
637
|
+
def convert_binary_plist_to_xml(binary_plist_string)
|
638
|
+
Mixlib::ShellOut.new("plutil -convert xml1 -o - -", :input => binary_plist_string).run_command.stdout
|
280
639
|
end
|
281
640
|
|
282
|
-
def
|
283
|
-
|
641
|
+
def convert_to_binary(string)
|
642
|
+
string.unpack('a2'*(string.size/2)).collect { |i| i.hex.chr }.join
|
643
|
+
end
|
644
|
+
|
645
|
+
def salted_sha512?(string)
|
646
|
+
!!(string =~ /^[[:xdigit:]]{136}$/)
|
647
|
+
end
|
648
|
+
|
649
|
+
def salted_sha512_password_match?
|
650
|
+
# Salt is included in the first 4 bytes of shadow data
|
651
|
+
salt = @current_resource.password.slice(0,8)
|
652
|
+
shadow = OpenSSL::Digest::SHA512.hexdigest(convert_to_binary(salt) + @new_resource.password)
|
653
|
+
@current_resource.password == salt + shadow
|
284
654
|
end
|
655
|
+
|
656
|
+
def salted_sha512_pbkdf2?(string)
|
657
|
+
!!(string =~ /^[[:xdigit:]]{256}$/)
|
658
|
+
end
|
659
|
+
|
660
|
+
def salted_sha512_pbkdf2_password_match?
|
661
|
+
salt = convert_to_binary(@current_resource.salt)
|
662
|
+
|
663
|
+
OpenSSL::PKCS5::pbkdf2_hmac(
|
664
|
+
@new_resource.password,
|
665
|
+
salt,
|
666
|
+
@current_resource.iterations,
|
667
|
+
128,
|
668
|
+
OpenSSL::Digest::SHA512.new
|
669
|
+
).unpack('H*').first == @current_resource.password
|
670
|
+
end
|
671
|
+
|
285
672
|
end
|
286
673
|
end
|
287
674
|
end
|