chef 11.14.2 → 11.14.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/chef/application.rb +16 -8
- data/lib/chef/dsl/recipe.rb +14 -0
- data/lib/chef/exceptions.rb +1 -0
- data/lib/chef/provider/env/windows.rb +5 -9
- data/lib/chef/provider/group/dscl.rb +27 -9
- data/lib/chef/provider/package/rpm.rb +2 -2
- data/lib/chef/provider/user/dscl.rb +544 -157
- data/lib/chef/resource.rb +3 -0
- data/lib/chef/resource/freebsd_package.rb +10 -2
- data/lib/chef/resource/user.rb +18 -0
- data/lib/chef/resource_reporter.rb +7 -7
- data/lib/chef/role.rb +2 -2
- data/lib/chef/version.rb +1 -1
- data/spec/data/mac_users/10.7-8.plist.xml +559 -0
- data/spec/data/mac_users/10.7-8.shadow.xml +11 -0
- data/spec/data/mac_users/10.7.plist.xml +559 -0
- data/spec/data/mac_users/10.7.shadow.xml +11 -0
- data/spec/data/mac_users/10.8.plist.xml +559 -0
- data/spec/data/mac_users/10.8.shadow.xml +21 -0
- data/spec/data/mac_users/10.9.plist.xml +560 -0
- data/spec/data/mac_users/10.9.shadow.xml +21 -0
- data/spec/functional/resource/env_spec.rb +137 -0
- data/spec/functional/resource/user/dscl_spec.rb +198 -0
- data/spec/functional/resource/{user_spec.rb → user/useradd_spec.rb} +1 -1
- data/spec/support/lib/chef/resource/zen_follower.rb +46 -0
- data/spec/unit/application_spec.rb +32 -9
- data/spec/unit/provider/group/dscl_spec.rb +38 -1
- data/spec/unit/provider/package/rpm_spec.rb +12 -0
- data/spec/unit/provider/user/dscl_spec.rb +659 -264
- data/spec/unit/provider/user/useradd_spec.rb +1 -0
- data/spec/unit/recipe_spec.rb +41 -0
- data/spec/unit/resource_reporter_spec.rb +48 -0
- data/spec/unit/resource_spec.rb +9 -2
- data/spec/unit/role_spec.rb +6 -0
- metadata +28 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ed3db2e9813c63b272e8e24bd05851fadb685353
|
4
|
+
data.tar.gz: 8d37dbdc91c018b6c5198dc629c4bf0692f09e32
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 44423083d01bb36c9932871b19fcb7760fb2653281a1896f9650ebe1895fdac5fb28d82dc3dc8d55a340c10bfaa02d30ea98e8c80826500a378c271fe96703b5
|
7
|
+
data.tar.gz: 93ff8bf81fdd1c3233000a75c69eef4673325c3f24160bbfd4fd7f1f98da0518c08ea98d0333131d119547f3e6aca186386f091a010e5794e74f05d31d945f3a
|
data/lib/chef/application.rb
CHANGED
@@ -72,7 +72,6 @@ class Chef::Application
|
|
72
72
|
end
|
73
73
|
end
|
74
74
|
|
75
|
-
|
76
75
|
# Parse configuration (options and config file)
|
77
76
|
def configure_chef
|
78
77
|
parse_options
|
@@ -254,30 +253,39 @@ class Chef::Application
|
|
254
253
|
# Set ENV['http_proxy']
|
255
254
|
def configure_http_proxy
|
256
255
|
if http_proxy = Chef::Config[:http_proxy]
|
257
|
-
|
258
|
-
|
256
|
+
http_proxy_string = configure_proxy("http", http_proxy,
|
257
|
+
Chef::Config[:http_proxy_user], Chef::Config[:http_proxy_pass])
|
258
|
+
env['http_proxy'] = http_proxy_string unless env['http_proxy']
|
259
|
+
env['HTTP_PROXY'] = http_proxy_string unless env['HTTP_PROXY']
|
259
260
|
end
|
260
261
|
end
|
261
262
|
|
262
263
|
# Set ENV['https_proxy']
|
263
264
|
def configure_https_proxy
|
264
265
|
if https_proxy = Chef::Config[:https_proxy]
|
265
|
-
|
266
|
-
|
266
|
+
https_proxy_string = configure_proxy("https", https_proxy,
|
267
|
+
Chef::Config[:https_proxy_user], Chef::Config[:https_proxy_pass])
|
268
|
+
env['https_proxy'] = https_proxy_string unless env['https_proxy']
|
269
|
+
env['HTTPS_PROXY'] = https_proxy_string unless env['HTTPS_PROXY']
|
267
270
|
end
|
268
271
|
end
|
269
272
|
|
270
273
|
# Set ENV['ftp_proxy']
|
271
274
|
def configure_ftp_proxy
|
272
275
|
if ftp_proxy = Chef::Config[:ftp_proxy]
|
273
|
-
|
276
|
+
ftp_proxy_string = configure_proxy("ftp", ftp_proxy,
|
274
277
|
Chef::Config[:ftp_proxy_user], Chef::Config[:ftp_proxy_pass])
|
278
|
+
env['ftp_proxy'] = ftp_proxy_string unless env['ftp_proxy']
|
279
|
+
env['FTP_PROXY'] = ftp_proxy_string unless env['FTP_PROXY']
|
275
280
|
end
|
276
281
|
end
|
277
282
|
|
278
283
|
# Set ENV['no_proxy']
|
279
284
|
def configure_no_proxy
|
280
|
-
|
285
|
+
if Chef::Config[:no_proxy]
|
286
|
+
env['no_proxy'] = Chef::Config[:no_proxy] unless env['no_proxy']
|
287
|
+
env['NO_PROXY'] = Chef::Config[:no_proxy] unless env['NO_PROXY']
|
288
|
+
end
|
281
289
|
end
|
282
290
|
|
283
291
|
# Builds a proxy uri. Examples:
|
@@ -291,7 +299,7 @@ class Chef::Application
|
|
291
299
|
# pass = password
|
292
300
|
def configure_proxy(scheme, path, user, pass)
|
293
301
|
begin
|
294
|
-
path = "#{scheme}://#{path}" unless path.
|
302
|
+
path = "#{scheme}://#{path}" unless path.include?('://')
|
295
303
|
# URI.split returns the following parts:
|
296
304
|
# [scheme, userinfo, host, port, registry, path, opaque, query, fragment]
|
297
305
|
parts = URI.split(URI.encode(path))
|
data/lib/chef/dsl/recipe.rb
CHANGED
@@ -84,6 +84,20 @@ class Chef
|
|
84
84
|
|
85
85
|
resource = build_resource(type, name, created_at, &resource_attrs_block)
|
86
86
|
|
87
|
+
# Some resources (freebsd_package) can be invoked with multiple names
|
88
|
+
# (package || freebsd_package).
|
89
|
+
# https://github.com/opscode/chef/issues/1773
|
90
|
+
# For these resources we want to make sure
|
91
|
+
# their key in resource collection is same as the name they are declared
|
92
|
+
# as. Since this might be a breaking change for resources that define
|
93
|
+
# customer to_s methods, we are working around the issue by letting
|
94
|
+
# resources know of their created_as_type until this issue is fixed in
|
95
|
+
# Chef 12:
|
96
|
+
# https://github.com/opscode/chef/issues/1817
|
97
|
+
if resource.respond_to?(:created_as_type=)
|
98
|
+
resource.created_as_type = type
|
99
|
+
end
|
100
|
+
|
87
101
|
run_context.resource_collection.insert(resource)
|
88
102
|
resource
|
89
103
|
end
|
data/lib/chef/exceptions.rb
CHANGED
@@ -83,6 +83,7 @@ class Chef
|
|
83
83
|
class RequestedUIDUnavailable < RuntimeError; end
|
84
84
|
class InvalidHomeDirectory < ArgumentError; end
|
85
85
|
class DsclCommandFailed < RuntimeError; end
|
86
|
+
class PlistUtilCommandFailed < RuntimeError; end
|
86
87
|
class UserIDNotFound < ArgumentError; end
|
87
88
|
class GroupIDNotFound < ArgumentError; end
|
88
89
|
class ConflictingMembersInGroup < ArgumentError; end
|
@@ -51,17 +51,13 @@ class Chef
|
|
51
51
|
return obj ? obj.variablevalue : nil
|
52
52
|
end
|
53
53
|
|
54
|
-
def find_env(environment_variables, key_name)
|
55
|
-
environment_variables.find do | environment_variable |
|
56
|
-
environment_variable['name'].downcase == key_name
|
57
|
-
end
|
58
|
-
end
|
59
|
-
|
60
54
|
def env_obj(key_name)
|
61
55
|
wmi = WmiLite::Wmi.new
|
62
|
-
|
63
|
-
|
64
|
-
|
56
|
+
# Note that by design this query is case insensitive with regard to key_name
|
57
|
+
environment_variables = wmi.query("select * from Win32_Environment where name = '#{key_name}'")
|
58
|
+
if environment_variables && environment_variables.length > 0
|
59
|
+
environment_variables[0].wmi_ole_object
|
60
|
+
end
|
65
61
|
end
|
66
62
|
|
67
63
|
#see: http://msdn.microsoft.com/en-us/library/ms682653%28VS.85%29.aspx
|
@@ -39,11 +39,33 @@ class Chef
|
|
39
39
|
return result[2]
|
40
40
|
end
|
41
41
|
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
42
|
+
def load_current_resource
|
43
|
+
@current_resource = Chef::Resource::Group.new(@new_resource.name)
|
44
|
+
@current_resource.group_name(@new_resource.name)
|
45
|
+
group_info = nil
|
46
|
+
begin
|
47
|
+
group_info = safe_dscl("read /Groups/#{@new_resource.name}")
|
48
|
+
rescue Chef::Exceptions::Group
|
49
|
+
@group_exists = false
|
50
|
+
Chef::Log.debug("#{@new_resource} group does not exist")
|
51
|
+
end
|
52
|
+
|
53
|
+
if group_info
|
54
|
+
group_info.each_line do |line|
|
55
|
+
key, val = line.split(': ')
|
56
|
+
val.strip! if val
|
57
|
+
case key.downcase
|
58
|
+
when 'primarygroupid'
|
59
|
+
@new_resource.gid(val) unless @new_resource.gid
|
60
|
+
@current_resource.gid(val)
|
61
|
+
when 'groupmembership'
|
62
|
+
@current_resource.members(val.split(' '))
|
63
|
+
end
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
@current_resource
|
68
|
+
end
|
47
69
|
|
48
70
|
# get a free GID greater than 200
|
49
71
|
def get_free_gid(search_limit=1000)
|
@@ -115,10 +137,6 @@ class Chef
|
|
115
137
|
end
|
116
138
|
end
|
117
139
|
|
118
|
-
def load_current_resource
|
119
|
-
super
|
120
|
-
end
|
121
|
-
|
122
140
|
def create_group
|
123
141
|
dscl_create_group
|
124
142
|
set_gid
|
@@ -60,7 +60,7 @@ class Chef
|
|
60
60
|
status = popen4("rpm -qp --queryformat '%{NAME} %{VERSION}-%{RELEASE}\n' #{@new_resource.source}") do |pid, stdin, stdout, stderr|
|
61
61
|
stdout.each do |line|
|
62
62
|
case line
|
63
|
-
when
|
63
|
+
when /^([\w\d+_.-]+)\s([\w\d_.-]+)$/
|
64
64
|
@current_resource.package_name($1)
|
65
65
|
@new_resource.version($2)
|
66
66
|
@candidate_version = $2
|
@@ -78,7 +78,7 @@ class Chef
|
|
78
78
|
@rpm_status = popen4("rpm -q --queryformat '%{NAME} %{VERSION}-%{RELEASE}\n' #{@current_resource.package_name}") do |pid, stdin, stdout, stderr|
|
79
79
|
stdout.each do |line|
|
80
80
|
case line
|
81
|
-
when
|
81
|
+
when /^([\w\d+_.-]+)\s([\w\d_.-]+)$/
|
82
82
|
Chef::Log.debug("#{@new_resource} current version is #{$2}")
|
83
83
|
@current_resource.version($2)
|
84
84
|
end
|
@@ -16,42 +16,210 @@
|
|
16
16
|
# limitations under the License.
|
17
17
|
#
|
18
18
|
|
19
|
-
require '
|
19
|
+
require 'mixlib/shellout'
|
20
20
|
require 'chef/provider/user'
|
21
21
|
require 'openssl'
|
22
|
+
require 'plist'
|
22
23
|
|
23
24
|
class Chef
|
24
25
|
class Provider
|
25
26
|
class User
|
27
|
+
#
|
28
|
+
# The most tricky bit of this provider is the way it deals with user passwords.
|
29
|
+
# Mac OS X has different password shadow calculations based on the version.
|
30
|
+
# < 10.7 => password shadow calculation format SALTED-SHA1
|
31
|
+
# => stored in: /var/db/shadow/hash/#{guid}
|
32
|
+
# => shadow binary length 68 bytes
|
33
|
+
# => First 4 bytes salt / Next 64 bytes shadow value
|
34
|
+
# = 10.7 => password shadow calculation format SALTED-SHA512
|
35
|
+
# => stored in: /var/db/dslocal/nodes/Default/users/#{name}.plist
|
36
|
+
# => shadow binary length 68 bytes
|
37
|
+
# => First 4 bytes salt / Next 64 bytes shadow value
|
38
|
+
# > 10.7 => password shadow calculation format SALTED-SHA512-PBKDF2
|
39
|
+
# => stored in: /var/db/dslocal/nodes/Default/users/#{name}.plist
|
40
|
+
# => shadow binary length 128 bytes
|
41
|
+
# => Salt / Iterations are stored seperately in the same file
|
42
|
+
#
|
43
|
+
# This provider only supports Mac OSX versions 10.7 and above
|
26
44
|
class Dscl < Chef::Provider::User
|
27
45
|
include Chef::Mixin::ShellOut
|
28
46
|
|
29
|
-
|
30
|
-
|
47
|
+
def define_resource_requirements
|
48
|
+
super
|
49
|
+
|
50
|
+
requirements.assert(:all_actions) do |a|
|
51
|
+
a.assertion { mac_osx_version_less_than_10_7? == false }
|
52
|
+
a.failure_message(Chef::Exceptions::User, "Chef::Provider::User::Dscl only supports Mac OS X versions 10.7 and above.")
|
53
|
+
end
|
54
|
+
|
55
|
+
requirements.assert(:all_actions) do |a|
|
56
|
+
a.assertion { ::File.exists?("/usr/bin/dscl") }
|
57
|
+
a.failure_message(Chef::Exceptions::User, "Cannot find binary '/usr/bin/dscl' on the system for #{@new_resource}!")
|
58
|
+
end
|
59
|
+
|
60
|
+
requirements.assert(:all_actions) do |a|
|
61
|
+
a.assertion { ::File.exists?("/usr/bin/plutil") }
|
62
|
+
a.failure_message(Chef::Exceptions::User, "Cannot find binary '/usr/bin/plutil' on the system for #{@new_resource}!")
|
63
|
+
end
|
64
|
+
|
65
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
66
|
+
a.assertion do
|
67
|
+
if @new_resource.password && mac_osx_version_greater_than_10_7?
|
68
|
+
# SALTED-SHA512 password shadow hashes are not supported on 10.8 and above.
|
69
|
+
!salted_sha512?(@new_resource.password)
|
70
|
+
else
|
71
|
+
true
|
72
|
+
end
|
73
|
+
end
|
74
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512 passwords are not supported on Mac 10.8 and above. \
|
75
|
+
If you want to set the user password using shadow info make sure you specify a SALTED-SHA512-PBKDF2 shadow hash \
|
76
|
+
in 'password', with the associated 'salt' and 'iterations'.")
|
77
|
+
end
|
78
|
+
|
79
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
80
|
+
a.assertion do
|
81
|
+
if @new_resource.password && mac_osx_version_greater_than_10_7? && salted_sha512_pbkdf2?(@new_resource.password)
|
82
|
+
# salt and iterations should be specified when
|
83
|
+
# SALTED-SHA512-PBKDF2 password shadow hash is given
|
84
|
+
!@new_resource.salt.nil? && !@new_resource.iterations.nil?
|
85
|
+
else
|
86
|
+
true
|
87
|
+
end
|
88
|
+
end
|
89
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512-PBKDF2 shadow hash is given without associated \
|
90
|
+
'salt' and 'iterations'. Please specify 'salt' and 'iterations' in order to set the user password using shadow hash.")
|
91
|
+
end
|
92
|
+
|
93
|
+
requirements.assert(:create, :modify, :manage) do |a|
|
94
|
+
a.assertion do
|
95
|
+
if @new_resource.password && !mac_osx_version_greater_than_10_7?
|
96
|
+
# On 10.7 SALTED-SHA512-PBKDF2 is not supported
|
97
|
+
!salted_sha512_pbkdf2?(@new_resource.password)
|
98
|
+
else
|
99
|
+
true
|
100
|
+
end
|
101
|
+
end
|
102
|
+
a.failure_message(Chef::Exceptions::User, "SALTED-SHA512-PBKDF2 shadow hashes are not supported on \
|
103
|
+
Mac OS X version 10.7. Please specify a SALTED-SHA512 shadow hash in 'password' attribute to set the \
|
104
|
+
user password using shadow hash.")
|
105
|
+
end
|
31
106
|
|
32
|
-
def dscl(*args)
|
33
|
-
shell_out("dscl . -#{args.join(' ')}")
|
34
107
|
end
|
35
108
|
|
36
|
-
def
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
109
|
+
def load_current_resource
|
110
|
+
@current_resource = Chef::Resource::User.new(@new_resource.username)
|
111
|
+
@current_resource.username(@new_resource.username)
|
112
|
+
|
113
|
+
user_info = read_user_info
|
114
|
+
if user_info
|
115
|
+
@current_resource.uid(dscl_get(user_info, :uid))
|
116
|
+
@current_resource.gid(dscl_get(user_info, :gid))
|
117
|
+
@current_resource.home(dscl_get(user_info, :home))
|
118
|
+
@current_resource.shell(dscl_get(user_info, :shell))
|
119
|
+
@current_resource.comment(dscl_get(user_info, :comment))
|
120
|
+
@authentication_authority = dscl_get(user_info, :auth_authority)
|
121
|
+
|
122
|
+
if @new_resource.password && dscl_get(user_info, :password) == "********"
|
123
|
+
# A password is set. Let's get the password information from shadow file
|
124
|
+
shadow_hash_binary = dscl_get(user_info, :shadow_hash)
|
125
|
+
|
126
|
+
# Calling shell_out directly since we want to give an input stream
|
127
|
+
shadow_hash_xml = convert_binary_plist_to_xml(shadow_hash_binary.string)
|
128
|
+
shadow_hash = Plist::parse_xml(shadow_hash_xml)
|
129
|
+
|
130
|
+
if shadow_hash["SALTED-SHA512"]
|
131
|
+
# Convert the shadow value from Base64 encoding to hex before consuming them
|
132
|
+
@password_shadow_conversion_algorithm = "SALTED-SHA512"
|
133
|
+
@current_resource.password(shadow_hash["SALTED-SHA512"].string.unpack('H*').first)
|
134
|
+
elsif shadow_hash["SALTED-SHA512-PBKDF2"]
|
135
|
+
@password_shadow_conversion_algorithm = "SALTED-SHA512-PBKDF2"
|
136
|
+
# Convert the entropy from Base64 encoding to hex before consuming them
|
137
|
+
@current_resource.password(shadow_hash["SALTED-SHA512-PBKDF2"]["entropy"].string.unpack('H*').first)
|
138
|
+
@current_resource.iterations(shadow_hash["SALTED-SHA512-PBKDF2"]["iterations"])
|
139
|
+
# Convert the salt from Base64 encoding to hex before consuming them
|
140
|
+
@current_resource.salt(shadow_hash["SALTED-SHA512-PBKDF2"]["salt"].string.unpack('H*').first)
|
141
|
+
else
|
142
|
+
raise(Chef::Exceptions::User,"Unknown shadow_hash format: #{shadow_hash.keys.join(' ')}")
|
143
|
+
end
|
144
|
+
end
|
145
|
+
|
146
|
+
convert_group_name if @new_resource.gid
|
147
|
+
else
|
148
|
+
@user_exists = false
|
149
|
+
Chef::Log.debug("#{@new_resource} user does not exist")
|
150
|
+
end
|
151
|
+
|
152
|
+
@current_resource
|
153
|
+
end
|
154
|
+
|
155
|
+
#
|
156
|
+
# Provider Actions
|
157
|
+
#
|
158
|
+
|
159
|
+
def create_user
|
160
|
+
dscl_create_user
|
161
|
+
dscl_create_comment
|
162
|
+
dscl_set_uid
|
163
|
+
dscl_set_gid
|
164
|
+
dscl_set_home
|
165
|
+
dscl_set_shell
|
166
|
+
set_password
|
42
167
|
end
|
43
168
|
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
169
|
+
def manage_user
|
170
|
+
dscl_create_user if diverged?(:username)
|
171
|
+
dscl_create_comment if diverged?(:comment)
|
172
|
+
dscl_set_uid if diverged?(:uid)
|
173
|
+
dscl_set_gid if diverged?(:gid)
|
174
|
+
dscl_set_home if diverged?(:home)
|
175
|
+
dscl_set_shell if diverged?(:shell)
|
176
|
+
set_password if diverged_password?
|
177
|
+
end
|
49
178
|
|
50
|
-
#
|
179
|
+
#
|
180
|
+
# Action Helpers
|
181
|
+
#
|
182
|
+
|
183
|
+
#
|
184
|
+
# Create a user using dscl
|
185
|
+
#
|
186
|
+
def dscl_create_user
|
187
|
+
run_dscl("create /Users/#{@new_resource.username}")
|
188
|
+
end
|
189
|
+
|
190
|
+
#
|
191
|
+
# Saves the specified Chef user `comment` into RealName attribute
|
192
|
+
# of Mac user.
|
193
|
+
#
|
194
|
+
def dscl_create_comment
|
195
|
+
run_dscl("create /Users/#{@new_resource.username} RealName '#{@new_resource.comment}'")
|
196
|
+
end
|
197
|
+
|
198
|
+
#
|
199
|
+
# Sets the user id for the user using dscl.
|
200
|
+
# If a `uid` is not specified, it finds the next available one starting
|
201
|
+
# from 200 if `system` is set, 500 otherwise.
|
202
|
+
#
|
203
|
+
def dscl_set_uid
|
204
|
+
@new_resource.uid(get_free_uid) if (@new_resource.uid.nil? || @new_resource.uid == '')
|
205
|
+
|
206
|
+
if uid_used?(@new_resource.uid)
|
207
|
+
raise(Chef::Exceptions::RequestedUIDUnavailable, "uid #{@new_resource.uid} is already in use")
|
208
|
+
end
|
209
|
+
|
210
|
+
run_dscl("create /Users/#{@new_resource.username} UniqueID #{@new_resource.uid}")
|
211
|
+
end
|
212
|
+
|
213
|
+
#
|
214
|
+
# Find the next available uid on the system. starting with 200 if `system` is set,
|
215
|
+
# 500 otherwise.
|
216
|
+
#
|
51
217
|
def get_free_uid(search_limit=1000)
|
52
|
-
uid = nil
|
53
|
-
|
54
|
-
|
218
|
+
uid = nil
|
219
|
+
base_uid = @new_resource.system ? 200 : 500
|
220
|
+
next_uid_guess = base_uid
|
221
|
+
users_uids = run_dscl("list /Users uid")
|
222
|
+
while(next_uid_guess < search_limit + base_uid)
|
55
223
|
if users_uids =~ Regexp.new("#{Regexp.escape(next_uid_guess.to_s)}\n")
|
56
224
|
next_uid_guess += 1
|
57
225
|
else
|
@@ -62,22 +230,41 @@ class Chef
|
|
62
230
|
return uid || raise("uid not found. Exhausted. Searched #{search_limit} times")
|
63
231
|
end
|
64
232
|
|
233
|
+
#
|
234
|
+
# Returns true if uid is in use by a different account, false otherwise.
|
235
|
+
#
|
65
236
|
def uid_used?(uid)
|
66
237
|
return false unless uid
|
67
|
-
users_uids =
|
238
|
+
users_uids = run_dscl("list /Users uid")
|
68
239
|
!! ( users_uids =~ Regexp.new("#{Regexp.escape(uid.to_s)}\n") )
|
69
240
|
end
|
70
241
|
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
242
|
+
#
|
243
|
+
# Sets the group id for the user using dscl. Fails if a group doesn't
|
244
|
+
# exist on the system with given group id.
|
245
|
+
#
|
246
|
+
def dscl_set_gid
|
247
|
+
unless @new_resource.gid && @new_resource.gid.to_s.match(/^\d+$/)
|
248
|
+
begin
|
249
|
+
possible_gid = run_dscl("read /Groups/#{@new_resource.gid} PrimaryGroupID").split(" ").last
|
250
|
+
rescue Chef::Exceptions::DsclCommandFailed => e
|
251
|
+
raise Chef::Exceptions::GroupIDNotFound.new("Group not found for #{@new_resource.gid} when creating user #{@new_resource.username}")
|
252
|
+
end
|
253
|
+
@new_resource.gid(possible_gid) if possible_gid && possible_gid.match(/^\d+$/)
|
75
254
|
end
|
76
|
-
|
255
|
+
run_dscl("create /Users/#{@new_resource.username} PrimaryGroupID '#{@new_resource.gid}'")
|
77
256
|
end
|
78
257
|
|
79
|
-
|
80
|
-
|
258
|
+
#
|
259
|
+
# Sets the home directory for the user. If `:manage_home` is set home
|
260
|
+
# directory is managed (moved / created) for the user.
|
261
|
+
#
|
262
|
+
def dscl_set_home
|
263
|
+
if @new_resource.home.nil? || @new_resource.home.empty?
|
264
|
+
run_dscl("delete /Users/#{@new_resource.username} NFSHomeDirectory")
|
265
|
+
return
|
266
|
+
end
|
267
|
+
|
81
268
|
if @new_resource.supports[:manage_home]
|
82
269
|
validate_home_dir_specification!
|
83
270
|
|
@@ -89,199 +276,399 @@ class Chef
|
|
89
276
|
move_home
|
90
277
|
end
|
91
278
|
end
|
92
|
-
|
279
|
+
run_dscl("create /Users/#{@new_resource.username} NFSHomeDirectory '#{@new_resource.home}'")
|
280
|
+
end
|
281
|
+
|
282
|
+
def validate_home_dir_specification!
|
283
|
+
unless @new_resource.home =~ /^\//
|
284
|
+
raise(Chef::Exceptions::InvalidHomeDirectory,"invalid path spec for User: '#{@new_resource.username}', home directory: '#{@new_resource.home}'")
|
285
|
+
end
|
93
286
|
end
|
94
287
|
|
95
|
-
def
|
96
|
-
|
288
|
+
def current_home_exists?
|
289
|
+
::File.exist?("#{@current_resource.home}")
|
97
290
|
end
|
98
291
|
|
99
|
-
def
|
100
|
-
|
292
|
+
def new_home_exists?
|
293
|
+
::File.exist?("#{@new_resource.home}")
|
101
294
|
end
|
102
295
|
|
103
|
-
def
|
104
|
-
|
296
|
+
def ditto_home
|
297
|
+
skel = "/System/Library/User Template/English.lproj"
|
298
|
+
raise(Chef::Exceptions::User,"can't find skel at: #{skel}") unless ::File.exists?(skel)
|
299
|
+
shell_out! "ditto '#{skel}' '#{@new_resource.home}'"
|
300
|
+
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
301
|
+
end
|
302
|
+
|
303
|
+
def move_home
|
304
|
+
Chef::Log.debug("#{@new_resource} moving #{self} home from #{@current_resource.home} to #{@new_resource.home}")
|
305
|
+
|
306
|
+
src = @current_resource.home
|
307
|
+
FileUtils.mkdir_p(@new_resource.home)
|
308
|
+
files = ::Dir.glob("#{src}/*", ::File::FNM_DOTMATCH) - ["#{src}/.","#{src}/.."]
|
309
|
+
::FileUtils.mv(files,@new_resource.home, :force => true)
|
310
|
+
::FileUtils.rmdir(src)
|
311
|
+
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
105
312
|
end
|
106
313
|
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
314
|
+
#
|
315
|
+
# Sets the shell for the user using dscl.
|
316
|
+
#
|
317
|
+
def dscl_set_shell
|
318
|
+
if @new_resource.shell || ::File.exists?("#{@new_resource.shell}")
|
319
|
+
run_dscl("create /Users/#{@new_resource.username} UserShell '#{@new_resource.shell}'")
|
111
320
|
else
|
112
|
-
false
|
321
|
+
run_dscl("create /Users/#{@new_resource.username} UserShell '/usr/bin/false'")
|
113
322
|
end
|
114
323
|
end
|
115
324
|
|
116
|
-
|
117
|
-
|
118
|
-
|
325
|
+
#
|
326
|
+
# Sets the password for the user based on given password parameters.
|
327
|
+
# Chef supports specifying plain-text passwords and password shadow
|
328
|
+
# hash data.
|
329
|
+
#
|
330
|
+
def set_password
|
331
|
+
# Return if there is no password to set
|
332
|
+
return if @new_resource.password.nil?
|
333
|
+
|
334
|
+
shadow_info = prepare_password_shadow_info
|
335
|
+
|
336
|
+
# Shadow info is saved as binary plist. Convert the info to binary plist.
|
337
|
+
shadow_info_binary = StringIO.new
|
338
|
+
command = Mixlib::ShellOut.new("plutil -convert binary1 -o - -",
|
339
|
+
:input => shadow_info.to_plist, :live_stream => shadow_info_binary)
|
340
|
+
command.run_command
|
341
|
+
|
342
|
+
# Replace the shadow info in user's plist
|
343
|
+
user_info = read_user_info
|
344
|
+
dscl_set(user_info, :shadow_hash, shadow_info_binary)
|
345
|
+
|
346
|
+
#
|
347
|
+
# Before saving the user's plist file we need to wait for dscl to
|
348
|
+
# update its caches and flush them to disk. In order to achieve this
|
349
|
+
# we need to wait first for our changes to get into the dscl cache
|
350
|
+
# and then flush the cache to disk before saving password into the
|
351
|
+
# plist file. 3 seconds is the minimum experimental value for dscl
|
352
|
+
# cache to be updated. We can get rid of this sleep when we find a
|
353
|
+
# trigger to update dscl cache.
|
354
|
+
#
|
355
|
+
sleep 3
|
356
|
+
shell_out("dscacheutil '-flushcache'")
|
357
|
+
save_user_info(user_info)
|
358
|
+
end
|
119
359
|
|
120
|
-
|
121
|
-
|
122
|
-
|
360
|
+
#
|
361
|
+
# Prepares the password shadow info based on the platform version.
|
362
|
+
#
|
363
|
+
def prepare_password_shadow_info
|
364
|
+
shadow_info = { }
|
365
|
+
entropy = nil
|
366
|
+
salt = nil
|
367
|
+
iterations = nil
|
368
|
+
|
369
|
+
if mac_osx_version_10_7?
|
370
|
+
hash_value = if salted_sha512?(@new_resource.password)
|
371
|
+
@new_resource.password
|
123
372
|
else
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
OpenSSL::Random.random_bytes(10).each_byte { |b| hex_salt << b.to_i.to_s(16) }
|
129
|
-
hex_salt = hex_salt.slice(0...8)
|
130
|
-
salt = [hex_salt].pack("H*")
|
131
|
-
sha1 = ::OpenSSL::Digest::SHA1.hexdigest(salt+@new_resource.password)
|
132
|
-
salted_sha1 = (hex_salt+sha1).upcase
|
133
|
-
end
|
134
|
-
shadow_hash = String.new("00000000"*155)
|
135
|
-
shadow_hash[168] = salted_sha1
|
373
|
+
# Create a random 4 byte salt
|
374
|
+
salt = OpenSSL::Random.random_bytes(4)
|
375
|
+
encoded_password = OpenSSL::Digest::SHA512.hexdigest(salt + @new_resource.password)
|
376
|
+
hash_value = salt.unpack('H*').first + encoded_password
|
136
377
|
end
|
137
378
|
|
138
|
-
|
139
|
-
|
379
|
+
shadow_info["SALTED-SHA512"] = StringIO.new
|
380
|
+
shadow_info["SALTED-SHA512"].string = convert_to_binary(hash_value)
|
381
|
+
shadow_info
|
382
|
+
else
|
383
|
+
if salted_sha512_pbkdf2?(@new_resource.password)
|
384
|
+
entropy = convert_to_binary(@new_resource.password)
|
385
|
+
salt = convert_to_binary(@new_resource.salt)
|
386
|
+
iterations = @new_resource.iterations
|
387
|
+
else
|
388
|
+
salt = OpenSSL::Random.random_bytes(32)
|
389
|
+
iterations = @new_resource.iterations # Use the default if not specified by the user
|
390
|
+
|
391
|
+
entropy = OpenSSL::PKCS5::pbkdf2_hmac(
|
392
|
+
@new_resource.password,
|
393
|
+
salt,
|
394
|
+
iterations,
|
395
|
+
128,
|
396
|
+
OpenSSL::Digest::SHA512.new
|
397
|
+
)
|
140
398
|
end
|
141
399
|
|
142
|
-
|
143
|
-
|
400
|
+
pbkdf_info = { }
|
401
|
+
pbkdf_info["entropy"] = StringIO.new
|
402
|
+
pbkdf_info["entropy"].string = entropy
|
403
|
+
pbkdf_info["salt"] = StringIO.new
|
404
|
+
pbkdf_info["salt"].string = salt
|
405
|
+
pbkdf_info["iterations"] = iterations
|
406
|
+
|
407
|
+
shadow_info["SALTED-SHA512-PBKDF2"] = pbkdf_info
|
408
|
+
end
|
409
|
+
|
410
|
+
shadow_info
|
411
|
+
end
|
412
|
+
|
413
|
+
#
|
414
|
+
# Removes the user from the system after removing user from his groups
|
415
|
+
# and deleting home directory if needed.
|
416
|
+
#
|
417
|
+
def remove_user
|
418
|
+
if @new_resource.supports[:manage_home]
|
419
|
+
# Remove home directory
|
420
|
+
FileUtils.rm_rf(@current_resource.home)
|
421
|
+
end
|
422
|
+
|
423
|
+
# Remove the user from its groups
|
424
|
+
run_dscl("list /Groups").each_line do |group|
|
425
|
+
if member_of_group?(group.chomp)
|
426
|
+
run_dscl("delete /Groups/#{group.chomp} GroupMembership '#{@new_resource.username}'")
|
144
427
|
end
|
145
428
|
end
|
429
|
+
|
430
|
+
# Remove user account
|
431
|
+
run_dscl("delete /Users/#{@new_resource.username}")
|
146
432
|
end
|
147
433
|
|
148
|
-
|
149
|
-
|
150
|
-
|
434
|
+
#
|
435
|
+
# Locks the user.
|
436
|
+
#
|
437
|
+
def lock_user
|
438
|
+
run_dscl("append /Users/#{@new_resource.username} AuthenticationAuthority ';DisabledUser;'")
|
151
439
|
end
|
152
440
|
|
153
|
-
|
154
|
-
|
155
|
-
|
156
|
-
|
157
|
-
|
158
|
-
|
159
|
-
dscl_set_shell
|
160
|
-
modify_password
|
441
|
+
#
|
442
|
+
# Unlocks the user
|
443
|
+
#
|
444
|
+
def unlock_user
|
445
|
+
auth_string = @authentication_authority.gsub(/AuthenticationAuthority: /,"").gsub(/;DisabledUser;/,"").strip
|
446
|
+
run_dscl("create /Users/#{@new_resource.username} AuthenticationAuthority '#{auth_string}'")
|
161
447
|
end
|
162
448
|
|
163
|
-
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
449
|
+
#
|
450
|
+
# Returns true if the user is locked, false otherwise.
|
451
|
+
#
|
452
|
+
def locked?
|
453
|
+
if @authentication_authority
|
454
|
+
!!(@authentication_authority =~ /DisabledUser/ )
|
455
|
+
else
|
456
|
+
false
|
457
|
+
end
|
171
458
|
end
|
172
459
|
|
173
|
-
|
174
|
-
|
460
|
+
#
|
461
|
+
# This is the interface base User provider requires to provide idempotency.
|
462
|
+
#
|
463
|
+
def check_lock
|
464
|
+
return @locked = locked?
|
175
465
|
end
|
176
466
|
|
177
|
-
|
178
|
-
|
467
|
+
#
|
468
|
+
# Helper functions
|
469
|
+
#
|
470
|
+
|
471
|
+
#
|
472
|
+
# Returns true if the system state and desired state is different for
|
473
|
+
# given attribute.
|
474
|
+
#
|
475
|
+
def diverged?(parameter)
|
476
|
+
parameter_updated?(parameter) && (not @new_resource.send(parameter).nil?)
|
179
477
|
end
|
180
478
|
|
181
|
-
def
|
182
|
-
|
183
|
-
begin
|
184
|
-
possible_gid = safe_dscl("read /Groups/#{@new_resource.gid} PrimaryGroupID").split(" ").last
|
185
|
-
rescue Chef::Exceptions::DsclCommandFailed => e
|
186
|
-
raise Chef::Exceptions::GroupIDNotFound.new("Group not found for #{@new_resource.gid} when creating user #{@new_resource.username}")
|
187
|
-
end
|
188
|
-
@new_resource.gid(possible_gid) if possible_gid && possible_gid.match(/^\d+$/)
|
189
|
-
end
|
190
|
-
safe_dscl("create /Users/#{@new_resource.username} PrimaryGroupID '#{@new_resource.gid}'")
|
479
|
+
def parameter_updated?(parameter)
|
480
|
+
not (@new_resource.send(parameter) == @current_resource.send(parameter))
|
191
481
|
end
|
192
482
|
|
193
|
-
|
194
|
-
|
195
|
-
|
483
|
+
#
|
484
|
+
# We need a special check function for password since we support both
|
485
|
+
# plain text and shadow hash data.
|
486
|
+
#
|
487
|
+
# Checks if password needs update based on platform version and the
|
488
|
+
# type of the password specified.
|
489
|
+
#
|
490
|
+
def diverged_password?
|
491
|
+
return false if @new_resource.password.nil?
|
492
|
+
|
493
|
+
# Dscl provider supports both plain text passwords and shadow hashes.
|
494
|
+
if mac_osx_version_10_7?
|
495
|
+
if salted_sha512?(@new_resource.password)
|
496
|
+
diverged?(:password)
|
497
|
+
else
|
498
|
+
!salted_sha512_password_match?
|
499
|
+
end
|
196
500
|
else
|
197
|
-
|
501
|
+
# When a system is upgraded to a version 10.7+ shadow hashes of the users
|
502
|
+
# will be updated when the user logs in. So it's possible that we will have
|
503
|
+
# SALTED-SHA512 password in the current_resource. In that case we will force
|
504
|
+
# password to be updated.
|
505
|
+
return true if salted_sha512?(@current_resource.password)
|
506
|
+
|
507
|
+
if salted_sha512_pbkdf2?(@new_resource.password)
|
508
|
+
diverged?(:password) || diverged?(:salt) || diverged?(:iterations)
|
509
|
+
else
|
510
|
+
!salted_sha512_pbkdf2_password_match?
|
511
|
+
end
|
198
512
|
end
|
199
513
|
end
|
200
514
|
|
201
|
-
|
202
|
-
|
203
|
-
|
204
|
-
|
205
|
-
|
206
|
-
|
207
|
-
|
208
|
-
|
209
|
-
|
210
|
-
end
|
211
|
-
# remove the user from its groups
|
212
|
-
groups = []
|
213
|
-
Etc.group do |group|
|
214
|
-
groups << group.name if group.mem.include?(@new_resource.username)
|
215
|
-
end
|
216
|
-
groups.each do |group_name|
|
217
|
-
safe_dscl("delete /Groups/#{group_name} GroupMembership '#{@new_resource.username}'")
|
515
|
+
#
|
516
|
+
# Returns true if user is member of the specified group, false otherwise.
|
517
|
+
#
|
518
|
+
def member_of_group?(group_name)
|
519
|
+
membership_info = ""
|
520
|
+
begin
|
521
|
+
membership_info = run_dscl("read /Groups/#{group_name}")
|
522
|
+
rescue Chef::Exceptions::DsclCommandFailed
|
523
|
+
# Raised if the group doesn't contain any members
|
218
524
|
end
|
219
|
-
#
|
220
|
-
|
525
|
+
# Output is something like:
|
526
|
+
# GroupMembership: root admin etc
|
527
|
+
members = membership_info.split(" ")
|
528
|
+
members.shift # Get rid of GroupMembership: string
|
529
|
+
members.include?(@new_resource.username)
|
221
530
|
end
|
222
531
|
|
223
|
-
|
224
|
-
|
225
|
-
|
226
|
-
|
227
|
-
|
228
|
-
|
532
|
+
#
|
533
|
+
# DSCL Helper functions
|
534
|
+
#
|
535
|
+
|
536
|
+
# A simple map of Chef's terms to DSCL's terms.
|
537
|
+
DSCL_PROPERTY_MAP = {
|
538
|
+
:uid => "generateduid",
|
539
|
+
:gid => "gid",
|
540
|
+
:home => "home",
|
541
|
+
:shell => "shell",
|
542
|
+
:comment => "realname",
|
543
|
+
:password => "passwd",
|
544
|
+
:auth_authority => "authentication_authority",
|
545
|
+
:shadow_hash => "ShadowHashData"
|
546
|
+
}.freeze
|
547
|
+
|
548
|
+
# Directory where the user plist files are stored for versions 10.7 and above
|
549
|
+
USER_PLIST_DIRECTORY = "/var/db/dslocal/nodes/Default/users".freeze
|
550
|
+
|
551
|
+
#
|
552
|
+
# Reads the user plist and returns a hash keyed with DSCL properties specified
|
553
|
+
# in DSCL_PROPERTY_MAP. Return nil if the user is not found.
|
554
|
+
#
|
555
|
+
def read_user_info
|
556
|
+
user_info = nil
|
557
|
+
|
558
|
+
begin
|
559
|
+
user_plist_file = "#{USER_PLIST_DIRECTORY}/#{@new_resource.username}.plist"
|
560
|
+
user_plist_info = run_plutil("convert xml1 -o - #{user_plist_file}")
|
561
|
+
user_info = Plist::parse_xml(user_plist_info)
|
562
|
+
rescue Chef::Exceptions::PlistUtilCommandFailed
|
229
563
|
end
|
564
|
+
|
565
|
+
user_info
|
230
566
|
end
|
231
567
|
|
232
|
-
|
233
|
-
|
568
|
+
#
|
569
|
+
# Saves the given hash keyed with DSCL properties specified
|
570
|
+
# in DSCL_PROPERTY_MAP to the disk.
|
571
|
+
#
|
572
|
+
def save_user_info(user_info)
|
573
|
+
user_plist_file = "#{USER_PLIST_DIRECTORY}/#{@new_resource.username}.plist"
|
574
|
+
Plist::Emit.save_plist(user_info, user_plist_file)
|
575
|
+
run_plutil("convert binary1 #{user_plist_file}")
|
234
576
|
end
|
235
577
|
|
236
|
-
|
237
|
-
|
578
|
+
#
|
579
|
+
# Sets a value in user information hash using Chef attributes as keys.
|
580
|
+
#
|
581
|
+
def dscl_set(user_hash, key, value)
|
582
|
+
raise "Unknown dscl key #{key}" unless DSCL_PROPERTY_MAP.keys.include?(key)
|
583
|
+
user_hash[DSCL_PROPERTY_MAP[key]] = [ value ]
|
584
|
+
user_hash
|
238
585
|
end
|
239
586
|
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
|
587
|
+
#
|
588
|
+
# Gets a value from user information hash using Chef attributes as keys.
|
589
|
+
#
|
590
|
+
def dscl_get(user_hash, key)
|
591
|
+
raise "Unknown dscl key #{key}" unless DSCL_PROPERTY_MAP.keys.include?(key)
|
592
|
+
# DSCL values are set as arrays
|
593
|
+
value = user_hash[DSCL_PROPERTY_MAP[key]]
|
594
|
+
value.nil? ? value : value.first
|
244
595
|
end
|
245
596
|
|
246
|
-
|
247
|
-
|
248
|
-
|
249
|
-
|
597
|
+
#
|
598
|
+
# System Helpets
|
599
|
+
#
|
600
|
+
|
601
|
+
def mac_osx_version
|
602
|
+
# This provider will only be invoked on node[:platform] == "mac_os_x"
|
603
|
+
# We do not check or assert that here.
|
604
|
+
node[:platform_version]
|
250
605
|
end
|
251
606
|
|
252
|
-
def
|
253
|
-
|
607
|
+
def mac_osx_version_10_7?
|
608
|
+
mac_osx_version.start_with?("10.7.")
|
254
609
|
end
|
255
610
|
|
256
|
-
def
|
257
|
-
|
611
|
+
def mac_osx_version_less_than_10_7?
|
612
|
+
versions = mac_osx_version.split(".")
|
613
|
+
# Make integer comparison in order not to report 10.10 less than 10.7
|
614
|
+
(versions[0].to_i <= 10 && versions[1].to_i < 7)
|
258
615
|
end
|
259
616
|
|
260
|
-
def
|
261
|
-
|
262
|
-
|
263
|
-
|
264
|
-
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
617
|
+
def mac_osx_version_greater_than_10_7?
|
618
|
+
versions = mac_osx_version.split(".")
|
619
|
+
# Make integer comparison in order not to report 10.10 less than 10.7
|
620
|
+
(versions[0].to_i >= 10 && versions[1].to_i > 7)
|
265
621
|
end
|
266
622
|
|
267
|
-
def
|
268
|
-
|
623
|
+
def run_dscl(*args)
|
624
|
+
result = shell_out("dscl . -#{args.join(' ')}")
|
625
|
+
return "" if ( args.first =~ /^delete/ ) && ( result.exitstatus != 0 )
|
626
|
+
raise(Chef::Exceptions::DsclCommandFailed,"dscl error: #{result.inspect}") unless result.exitstatus == 0
|
627
|
+
raise(Chef::Exceptions::DsclCommandFailed,"dscl error: #{result.inspect}") if result.stdout =~ /No such key: /
|
628
|
+
result.stdout
|
629
|
+
end
|
269
630
|
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
::FileUtils.rmdir(src)
|
275
|
-
::FileUtils.chown_R(@new_resource.username,@new_resource.gid.to_s,@new_resource.home)
|
631
|
+
def run_plutil(*args)
|
632
|
+
result = shell_out("plutil -#{args.join(' ')}")
|
633
|
+
raise(Chef::Exceptions::PlistUtilCommandFailed,"plutil error: #{result.inspect}") unless result.exitstatus == 0
|
634
|
+
result.stdout
|
276
635
|
end
|
277
636
|
|
278
|
-
def
|
279
|
-
|
637
|
+
def convert_binary_plist_to_xml(binary_plist_string)
|
638
|
+
Mixlib::ShellOut.new("plutil -convert xml1 -o - -", :input => binary_plist_string).run_command.stdout
|
280
639
|
end
|
281
640
|
|
282
|
-
def
|
283
|
-
|
641
|
+
def convert_to_binary(string)
|
642
|
+
string.unpack('a2'*(string.size/2)).collect { |i| i.hex.chr }.join
|
643
|
+
end
|
644
|
+
|
645
|
+
def salted_sha512?(string)
|
646
|
+
!!(string =~ /^[[:xdigit:]]{136}$/)
|
647
|
+
end
|
648
|
+
|
649
|
+
def salted_sha512_password_match?
|
650
|
+
# Salt is included in the first 4 bytes of shadow data
|
651
|
+
salt = @current_resource.password.slice(0,8)
|
652
|
+
shadow = OpenSSL::Digest::SHA512.hexdigest(convert_to_binary(salt) + @new_resource.password)
|
653
|
+
@current_resource.password == salt + shadow
|
284
654
|
end
|
655
|
+
|
656
|
+
def salted_sha512_pbkdf2?(string)
|
657
|
+
!!(string =~ /^[[:xdigit:]]{256}$/)
|
658
|
+
end
|
659
|
+
|
660
|
+
def salted_sha512_pbkdf2_password_match?
|
661
|
+
salt = convert_to_binary(@current_resource.salt)
|
662
|
+
|
663
|
+
OpenSSL::PKCS5::pbkdf2_hmac(
|
664
|
+
@new_resource.password,
|
665
|
+
salt,
|
666
|
+
@current_resource.iterations,
|
667
|
+
128,
|
668
|
+
OpenSSL::Digest::SHA512.new
|
669
|
+
).unpack('H*').first == @current_resource.password
|
670
|
+
end
|
671
|
+
|
285
672
|
end
|
286
673
|
end
|
287
674
|
end
|