107 lines
2.8 KiB
Go
107 lines
2.8 KiB
Go
/*
|
|
Copyright © 2021 NAME HERE <EMAIL ADDRESS>
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
package cmd
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"math/rand"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/GehirnInc/crypt"
|
|
_ "github.com/GehirnInc/crypt/sha512_crypt"
|
|
log "github.com/s00500/env_logger"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
// passwdCmd represents the passwd command
|
|
var passwdCmd = &cobra.Command{
|
|
Use: "passwd",
|
|
Short: "Change a user password by editing /etc/shadow",
|
|
Long: `Change a user password by editing /etc/shadow, first argument is user (defaults to root), second is password, can also be enteres via promt if not specified`,
|
|
|
|
Run: func(cmd *cobra.Command, args []string) {
|
|
log.Println("passwd called")
|
|
|
|
// promt for a user
|
|
user := "root"
|
|
if len(args) > 0 {
|
|
user = args[0]
|
|
}
|
|
|
|
// promt for a password
|
|
newPassword := ""
|
|
if len(args) > 1 {
|
|
newPassword = args[1]
|
|
} else {
|
|
newPassword = promtPassword("New Password")
|
|
}
|
|
|
|
if newPassword == "" {
|
|
log.Fatal("No password specified")
|
|
}
|
|
|
|
prepareWorkdir()
|
|
|
|
// Modify /etc/shadow
|
|
pwHash := encryptPassword(newPassword)
|
|
shadowDat, err := os.ReadFile(workdir + "/etc/shadow")
|
|
log.MustFatal(err)
|
|
newShadow := ""
|
|
scanner := bufio.NewScanner(strings.NewReader(string(shadowDat)))
|
|
for scanner.Scan() {
|
|
if strings.HasPrefix(scanner.Text(), user+":") {
|
|
parts := strings.Split(scanner.Text(), ":")
|
|
//log.Info(scanner.Text())
|
|
parts[1] = pwHash
|
|
//log.Info(strings.Join(parts, ":") + "\n")
|
|
newShadow += strings.Join(parts, ":") + "\n"
|
|
continue
|
|
}
|
|
newShadow += scanner.Text() + "\n"
|
|
}
|
|
|
|
err = os.WriteFile(workdir+"/etc/shadow", []byte(newShadow), 0600)
|
|
log.MustFatal(err)
|
|
|
|
createOutput()
|
|
},
|
|
}
|
|
|
|
func init() {
|
|
rootCmd.AddCommand(passwdCmd)
|
|
}
|
|
|
|
func encryptPassword(userPassword string) string {
|
|
// Generate a random string for use in the salt
|
|
const charset = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
|
seededRand := rand.New(rand.NewSource(time.Now().UnixNano()))
|
|
s := make([]byte, 8)
|
|
for i := range s {
|
|
s[i] = charset[seededRand.Intn(len(charset))]
|
|
}
|
|
salt := []byte(fmt.Sprintf("$6$%s", s))
|
|
// use salt to hash user-supplied password
|
|
crypt := crypt.SHA512.New()
|
|
hash, err := crypt.Generate([]byte(userPassword), salt)
|
|
if err != nil {
|
|
log.Fatalf("error hashing user's supplied password: %s\n", err)
|
|
}
|
|
return string(hash)
|
|
}
|