Drop the `user' password reset rule
[snf-image] / snf-image-helper / tasks / 50ChangePassword.in
1 #! /bin/bash
2
3 # Copyright (C) 2011 GRNET S.A. 
4 #
5 # This program is free software; you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation; either version 2 of the License, or
8 # (at your option) any later version.
9 #
10 # This program is distributed in the hope that it will be useful, but
11 # WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13 # General Public License for more details.
14 #
15 # You should have received a copy of the GNU General Public License
16 # along with this program; if not, write to the Free Software
17 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
18 # 02110-1301, USA.
19
20 ### BEGIN TASK INFO
21 # Provides:             ChangePassword
22 # RunBefore:            EnforcePersonality
23 # RunAfter:             InstallUnattend
24 # Short-Description:    Changes Password for specified users
25 ### END TASK INFO
26
27 set -e
28 . "@commondir@/common.sh"
29
30 trap task_cleanup EXIT
31 report_task_start
32
33 # Check if the task should be prevented from running.
34 check_if_excluded
35
36 windows_password() {
37     local target="$1"
38     local password="$2"
39
40     echo "@echo off" > "$target/Windows/SnfScripts/ChangeAdminPassword.cmd"
41
42     if [ -z "$SNF_IMAGE_PROPERTY_USERS" ]; then
43         SNF_IMAGE_PROPERTY_USERS="Administrator"
44     fi
45
46     for usr in $SNF_IMAGE_PROPERTY_USERS; do
47         echo -n "Installing new password for user \`$usr'..."
48         echo "net user $usr $password" >> \
49             "$target/Windows/SnfScripts/ChangeAdminPassword.cmd"
50         echo done
51     done
52 }
53
54 linux_password() {
55     local target="$1"
56     local password="$2"
57
58     local hash=$("@scriptsdir@/snf-passtohash.py" "$password")
59     if [ ! -e "$target/etc/shadow" ]; then
60        log_error "No /etc/shadow found!" 
61     fi
62     
63     declare -a users
64     
65     if [ -n "$SNF_IMAGE_PROPERTY_USERS" ]; then
66         for usr in $SNF_IMAGE_PROPERTY_USERS; do
67             users+=("$usr")
68         done
69     else
70         users+=("root")
71     fi
72
73     for i in $(seq 0 1 $((${#users[@]}-1))); do
74         local tmp_shadow="$(mktemp)"
75         add_cleanup rm "$tmp_shadow"
76
77         echo -n "Setting ${users[$i]} password..."
78     
79         echo "${users[$i]}:$hash:15103:0:99999:7:::" > "$tmp_shadow"
80         grep -v "${users[$i]}" "$target/etc/shadow" >> "$tmp_shadow"
81         cat "$tmp_shadow" > "$target/etc/shadow"
82         echo "done"
83     done
84 }
85
86 if [ ! -d "$SNF_IMAGE_TARGET" ]; then
87     log_error "Target dir: \`$SNF_IMAGE_TARGET' is missing"
88 fi
89
90 if [ -z "$SNF_IMAGE_PASSWORD" ]; then
91     log_error "Password is missing"
92 fi
93
94 #trim users var
95 SNF_IMAGE_PROPERTY_USERS=$(echo $SNF_IMAGE_PROPERTY_USERS)
96
97 if [ "$SNF_IMAGE_PROPERTY_OSFAMILY" = "windows" ]; then
98     windows_password "$SNF_IMAGE_TARGET" "$SNF_IMAGE_PASSWORD"
99 elif [ "$SNF_IMAGE_PROPERTY_OSFAMILY" = "linux" ]; then
100     linux_password "$SNF_IMAGE_TARGET" "$SNF_IMAGE_PASSWORD"
101 fi
102
103 exit 0
104
105 # vim: set sta sts=4 shiftwidth=4 sw=4 et ai :
106