Adds SetUserPassword plugin
Password management needs to be separated from the CreateUserPlugin.
This commit is contained in:
parent
3e120de02a
commit
af4e772137
@ -102,10 +102,17 @@ class BaseMetadataService(object):
|
||||
def _post_data(self, path, data):
|
||||
raise NotExistingMetadataException()
|
||||
|
||||
def post_password(self, enc_password_b64, version='latest'):
|
||||
path = posixpath.normpath(posixpath.join('openstack',
|
||||
def _get_password_path(self, version='latest'):
|
||||
return posixpath.normpath(posixpath.join('openstack',
|
||||
version,
|
||||
'password'))
|
||||
|
||||
def is_password_set(self, version='latest'):
|
||||
path = self._get_password_path(version)
|
||||
return len(self._get_data(path)) > 0
|
||||
|
||||
def post_password(self, enc_password_b64, version='latest'):
|
||||
path = self._get_password_path(version)
|
||||
action = lambda: self._post_data(path, enc_password_b64)
|
||||
return self._exec_with_retry(action)
|
||||
|
||||
|
@ -14,6 +14,8 @@
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import base64
|
||||
import os
|
||||
import subprocess
|
||||
|
||||
|
||||
@ -24,6 +26,12 @@ class BaseOSUtils(object):
|
||||
def user_exists(self, username):
|
||||
pass
|
||||
|
||||
def generate_random_password(self, length):
|
||||
# On Windows os.urandom() uses CryptGenRandom, which is a
|
||||
# cryptographically secure pseudorandom number generator
|
||||
b64_password = base64.b64encode(os.urandom(256))
|
||||
return b64_password.replace('/', '').replace('+', '')[:length]
|
||||
|
||||
def execute_process(self, args, shell=True):
|
||||
p = subprocess.Popen(args,
|
||||
stdout=subprocess.PIPE,
|
||||
|
@ -107,8 +107,12 @@ class WindowsUtils(base.BaseOSUtils):
|
||||
(out, err, ret_val) = self.execute_process(args)
|
||||
if not ret_val:
|
||||
self._set_user_password_expiration(username, password_expires)
|
||||
|
||||
return ret_val == 0
|
||||
else:
|
||||
if create:
|
||||
msg = "Create user failed: %(err)s"
|
||||
else:
|
||||
msg = "Set user password failed: %(err)s"
|
||||
raise Exception(msg % locals())
|
||||
|
||||
def _sanitize_wmi_input(self, value):
|
||||
return value.replace('\'', '\'\'')
|
||||
@ -122,14 +126,12 @@ class WindowsUtils(base.BaseOSUtils):
|
||||
return True
|
||||
|
||||
def create_user(self, username, password, password_expires=False):
|
||||
if not self._create_or_change_user(username, password, True,
|
||||
password_expires):
|
||||
raise Exception("Create user failed")
|
||||
self._create_or_change_user(username, password, True,
|
||||
password_expires)
|
||||
|
||||
def set_user_password(self, username, password, password_expires=False):
|
||||
if not self._create_or_change_user(username, password, False,
|
||||
password_expires):
|
||||
raise Exception("Set user password failed")
|
||||
self._create_or_change_user(username, password, False,
|
||||
password_expires)
|
||||
|
||||
def _get_user_sid_and_domain(self, username):
|
||||
sid = ctypes.create_string_buffer(1024)
|
||||
|
@ -28,6 +28,7 @@ opts = [
|
||||
'SetUserSSHPublicKeysPlugin',
|
||||
'cloudbaseinit.plugins.windows.extendvolumes.ExtendVolumesPlugin',
|
||||
'cloudbaseinit.plugins.windows.userdata.UserDataPlugin',
|
||||
'cloudbaseinit.plugins.windows.setuserpassword.SetUserPasswordPlugin',
|
||||
],
|
||||
help='List of enabled plugin classes, '
|
||||
'to executed in the provided order'),
|
||||
|
@ -14,15 +14,10 @@
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import base64
|
||||
import os
|
||||
|
||||
from cloudbaseinit.metadata.services import base as services_base
|
||||
from cloudbaseinit.openstack.common import cfg
|
||||
from cloudbaseinit.openstack.common import log as logging
|
||||
from cloudbaseinit.osutils import factory as osutils_factory
|
||||
from cloudbaseinit.plugins import base
|
||||
from cloudbaseinit.utils import crypt
|
||||
|
||||
opts = [
|
||||
cfg.StrOpt('username', default='Admin', help='User to be added to the '
|
||||
@ -42,81 +37,25 @@ LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
class CreateUserPlugin(base.BasePlugin):
|
||||
_post_password_md_ver = '2013-04-04'
|
||||
|
||||
def _generate_random_password(self, length):
|
||||
# On Windows os.urandom() uses CryptGenRandom, which is a
|
||||
# cryptographically secure pseudorandom number generator
|
||||
b64_password = base64.b64encode(os.urandom(256))
|
||||
return b64_password.replace('/', '').replace('+', '')[:length]
|
||||
|
||||
def _encrypt_password(self, ssh_pub_key, password):
|
||||
cm = crypt.CryptManager()
|
||||
with cm.load_ssh_rsa_public_key(ssh_pub_key) as rsa:
|
||||
enc_password = rsa.public_encrypt(password)
|
||||
return base64.b64encode(enc_password)
|
||||
|
||||
def _get_ssh_public_key(self, service):
|
||||
meta_data = service.get_meta_data('openstack',
|
||||
self._post_password_md_ver)
|
||||
if not 'public_keys' in meta_data:
|
||||
return False
|
||||
|
||||
public_keys = meta_data['public_keys']
|
||||
ssh_pub_key = None
|
||||
for k in public_keys:
|
||||
# Get the first key
|
||||
ssh_pub_key = public_keys[k]
|
||||
break
|
||||
return ssh_pub_key
|
||||
|
||||
def _get_password(self, service):
|
||||
def _get_password(self, service, osutils):
|
||||
meta_data = service.get_meta_data('openstack')
|
||||
if 'admin_pass' in meta_data and CONF.inject_user_password:
|
||||
LOG.warn('Using admin_pass metadata user password. Consider '
|
||||
'changing it as soon as possible')
|
||||
password = meta_data['admin_pass']
|
||||
else:
|
||||
LOG.debug('Generating random password')
|
||||
# Generate a random password
|
||||
# Limit to 14 chars for compatibility with NT
|
||||
password = self._generate_random_password(14)
|
||||
# Generate a temporary random password to be replaced
|
||||
# by SetUserPasswordPlugin (starting from Grizzly)
|
||||
password = osutils.generate_random_password(14)
|
||||
return password
|
||||
|
||||
def _set_metadata_password(self, password, service):
|
||||
try:
|
||||
ssh_pub_key = self._get_ssh_public_key(service)
|
||||
if ssh_pub_key:
|
||||
enc_password_b64 = self._encrypt_password(ssh_pub_key,
|
||||
password)
|
||||
return service.post_password(enc_password_b64,
|
||||
self._post_password_md_ver)
|
||||
else:
|
||||
LOG.info('No SSH public key available for password encryption')
|
||||
return True
|
||||
except services_base.NotExistingMetadataException:
|
||||
# Requested version not available or password feature
|
||||
# not implemented
|
||||
LOG.info('Cannot set the password in the metadata as it is not '
|
||||
'supported by this metadata version')
|
||||
return True
|
||||
|
||||
def execute(self, service):
|
||||
user_name = CONF.username
|
||||
|
||||
password = self._get_password(service)
|
||||
|
||||
if service.can_post_password:
|
||||
md_pwd_already_set = not self._set_metadata_password(password,
|
||||
service)
|
||||
else:
|
||||
md_pwd_already_set = False
|
||||
LOG.info('Cannot set the password in the metadata as it is not '
|
||||
'supported by this service')
|
||||
|
||||
osutils = osutils_factory.OSUtilsFactory().get_os_utils()
|
||||
if not osutils.user_exists(user_name):
|
||||
if md_pwd_already_set:
|
||||
LOG.warning('Creating user, but the password was not set in '
|
||||
'the metadata as it was previously set')
|
||||
password = self._get_password(service, osutils)
|
||||
|
||||
osutils.create_user(user_name, password)
|
||||
# Create a user profile in order for other plugins
|
||||
# to access the user home, etc
|
||||
@ -124,12 +63,6 @@ class CreateUserPlugin(base.BasePlugin):
|
||||
password,
|
||||
True)
|
||||
osutils.close_user_logon_session(token)
|
||||
else:
|
||||
if not md_pwd_already_set:
|
||||
osutils.set_user_password(user_name, password)
|
||||
else:
|
||||
LOG.warning('Cannot change the user\'s password as it is '
|
||||
'already set in the metadata')
|
||||
|
||||
for group_name in CONF.groups:
|
||||
try:
|
||||
|
Loading…
Reference in New Issue
Block a user