Statistics
| Branch: | Tag: | Revision:

root / image_creator / os_type / unix.py @ e77e66a9

History | View | Annotate | Download (6.6 kB)

1
# Copyright 2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
import re
35
import sys
36

    
37
from image_creator.os_type import OSBase, sysprep
38

    
39

    
40
class Unix(OSBase):
41

    
42
    sensitive_userdata = [
43
        '.bash_history',
44
        '.gnupg',
45
        '.ssh',
46
        '.mozilla',
47
        '.thunderbird'
48
    ]
49

    
50
    def __init__(self, rootdev, ghandler, output):
51
        super(Unix, self).__init__(rootdev, ghandler, output)
52

    
53
        self.meta["USERS"] = " ".join(self._get_passworded_users())
54

    
55
    def _get_passworded_users(self):
56
        users = []
57
        regexp = re.compile('(\S+):((?:!\S+)|(?:[^!*]\S+)|):(?:\S*:){6}')
58

    
59
        for line in self.g.cat('/etc/shadow').splitlines():
60
            match = regexp.match(line)
61
            if not match:
62
                continue
63

    
64
            user, passwd = match.groups()
65
            if len(passwd) > 0 and passwd[0] == '!':
66
                warn("Ignoring locked %s account." % user)
67
            else:
68
                users.append(user)
69

    
70
        return users
71

    
72
    @sysprep(enabled=False)
73
    def remove_user_accounts(self, print_header=True):
74
        """Remove all user accounts with id greater than 1000"""
75

    
76
        if print_header:
77
            self.out.output(
78
                    'Removing all user accounts with id greater than 1000')
79

    
80
        # Remove users from /etc/passwd
81
        passwd = []
82
        removed_users = {}
83
        metadata_users = self.meta['USERS'].split()
84
        for line in self.g.cat('/etc/passwd').splitlines():
85
            fields = line.split(':')
86
            if int(fields[2]) > 1000:
87
                removed_users[fields[0]] = fields
88
                # remove it from the USERS metadata too
89
                if fields[0] in metadata_users:
90
                    metadata_users.remove(fields[0])
91
            else:
92
                passwd.append(':'.join(fields))
93

    
94
        self.meta['USERS'] = " ".join(metadata_users)
95
        self.g.write('/etc/passwd', '\n'.join(passwd) + '\n')
96

    
97
        # Remove the corresponding /etc/shadow entries
98
        shadow = []
99
        for line in self.g.cat('/etc/shadow').splitlines():
100
            fields = line.split(':')
101
            if fields[0] not in removed_users:
102
                shadow.append(':'.join(fields))
103

    
104
        self.g.write('/etc/shadow', "\n".join(shadow) + '\n')
105

    
106
        # Remove the corresponding /etc/group entries
107
        group = []
108
        for line in self.g.cat('/etc/group').splitlines():
109
            fields = line.split(':')
110
            # Remove groups tha have the same name as the removed users
111
            if fields[0] not in removed_users:
112
                group.append(':'.join(fields))
113

    
114
        self.g.write('/etc/group', '\n'.join(group) + '\n')
115

    
116
        # Remove home directories
117
        for home in [field[5] for field in removed_users.values()]:
118
            if self.g.is_dir(home) and home.startswith('/home/'):
119
                self.g.rm_rf(home)
120

    
121
    @sysprep()
122
    def cleanup_passwords(self, print_header=True):
123
        """Remove all passwords and lock all user accounts"""
124

    
125
        if print_header:
126
            self.out.output(
127
                    'Cleaning up passwords & locking all user accounts')
128

    
129
        shadow = []
130

    
131
        for line in self.g.cat('/etc/shadow').splitlines():
132
            fields = line.split(':')
133
            if fields[1] not in ('*', '!'):
134
                fields[1] = '!'
135

    
136
            shadow.append(":".join(fields))
137

    
138
        self.g.write('/etc/shadow', "\n".join(shadow) + '\n')
139

    
140
    @sysprep()
141
    def cleanup_cache(self, print_header=True):
142
        """Remove all regular files under /var/cache"""
143

    
144
        if print_header:
145
            self.out.output('Removing files under /var/cache')
146

    
147
        self.foreach_file('/var/cache', self.g.rm, ftype='r')
148

    
149
    @sysprep()
150
    def cleanup_tmp(self, print_header=True):
151
        """Remove all files under /tmp and /var/tmp"""
152

    
153
        if print_header:
154
            self.out.output('Removing files under /tmp and /var/tmp')
155

    
156
        self.foreach_file('/tmp', self.g.rm_rf, maxdepth=1)
157
        self.foreach_file('/var/tmp', self.g.rm_rf, maxdepth=1)
158

    
159
    @sysprep()
160
    def cleanup_log(self, print_header=True):
161
        """Empty all files under /var/log"""
162

    
163
        if print_header:
164
            self.out.output('Emptying all files under /var/log')
165

    
166
        self.foreach_file('/var/log', self.g.truncate, ftype='r')
167

    
168
    @sysprep(enabled=False)
169
    def cleanup_mail(self, print_header=True):
170
        """Remove all files under /var/mail and /var/spool/mail"""
171

    
172
        if print_header:
173
            self.out.output('Removing files under /var/mail & /var/spool/mail')
174

    
175
        self.foreach_file('/var/spool/mail', self.g.rm_rf, maxdepth=1)
176
        self.foreach_file('/var/mail', self.g.rm_rf, maxdepth=1)
177

    
178
    @sysprep()
179
    def cleanup_userdata(self, print_header=True):
180
        """Delete sensitive userdata"""
181

    
182
        homedirs = ['/root'] + self.ls('/home/')
183

    
184
        if print_header:
185
            self.out.output('Removing sensitive user data under %s' % " ".
186
                                                        join(homedirs))
187

    
188
        for homedir in homedirs:
189
            for data in self.sensitive_userdata:
190
                fname = "%s/%s" % (homedir, data)
191
                if self.g.is_file(fname):
192
                    self.g.scrub_file(fname)
193

    
194
# vim: set sta sts=4 shiftwidth=4 sw=4 et ai :