You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
jade/src/functions/users.rs

125 lines
3.3 KiB
Rust

use crate::internal::exec::*;
use crate::internal::*;
use std::process::Command;
pub fn new_user(username: &str, hasroot: bool, password: &str, do_hash_pass: bool, shell: &str) {
let mut shell: &str = shell;
if do_hash_pass {
let hashed_pass = &*hash_pass(password).stdout;
let _password = match std::str::from_utf8(hashed_pass) {
Ok(v) => v,
Err(e) => panic!("Failed to hash password, invalid UTF-8 sequence {}", e),
};
}
if shell == "fish" {
exec_eval(
exec_chroot(
"bash",
vec![
String::from("pacman -S fish --noconfirm"),
],
),
"installed fish",
);
}
if shell == "zsh" {
exec_eval(
exec_chroot(
"bash",
vec![
String::from("pacman -S zsh --noconfirm"),
],
),
"installed zsh",
);
}
else if shell == "tcsh" || shell == "csh" {
exec_eval(
exec_chroot(
"bash",
vec![
String::from("pacman -S tcsh --noconfirm"),
],
),
"installed tcsh and csh",
);
}
else {
exec_eval(
exec_chroot(
"bash",
vec![
String::from("pacman -S fish --noconfirm"),
],
),
"no shell or unknown shell specified, installed fish",
);
shell = "fish";
}
let shell_path = match shell {
"bash" => "/bin/bash",
"csh" => "/usr/bin/csh",
"fish" => "/usr/bin/fish",
"tcsh" => "/usr/bin/tcsh",
"zsh" => "/usr/bin/zsh",
&_ => "/usr/bin/fish",
};
exec_eval(
exec_chroot(
"useradd",
vec![
String::from("-m"),
String::from("-s"),
String::from(shell_path),
String::from("-p"),
String::from(password).replace('\n', ""),
String::from(username),
],
),
format!("Create user {}", username).as_str(),
);
if hasroot {
exec_eval(
exec_chroot(
"usermod",
vec![
String::from("-aG"),
String::from("wheel"),
String::from(username),
],
),
format!("Add user {} to wheel group", username).as_str(),
);
files_eval(
3 years ago
files::append_file("/mnt/etc/sudoers", "\n%wheel ALL=(ALL) ALL\n"),
"Add wheel group to sudoers",
);
files_eval(
3 years ago
files::append_file("/mnt/etc/sudoers", "\nDefaults pwfeedback\n"),
"Add pwfeedback to sudoers",
);
}
}
pub fn hash_pass(password: &str) -> std::process::Output {
let output = Command::new("openssl")
.args(["passwd", "-6", password])
.output()
.expect("Failed to hash password");
output
}
pub fn root_pass(root_pass: &str) {
exec_eval(
exec_chroot(
"bash",
vec![
String::from("-c"),
format!(r#"'usermod --password {root_pass} root'"#),
],
),
"set root password",
);
}