diff options
author | varac <varacanero@zeromail.org> | 2016-06-09 17:34:25 +0200 |
---|---|---|
committer | varac <varacanero@zeromail.org> | 2016-06-14 12:05:18 +0200 |
commit | 77450777e17522cc56874e35cceed997378ff3f1 (patch) | |
tree | 787552f1da6df3fbea685ac8c70f6a9db86b0ebc /puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb | |
parent | 1e5b7380fbb9da62e08fb0644e309c0afe709331 (diff) |
git subrepo clone https://leap.se/git/puppet_stdlib puppet/modules/stdlib
subrepo:
subdir: "puppet/modules/stdlib"
merged: "7112363"
upstream:
origin: "https://leap.se/git/puppet_stdlib"
branch: "master"
commit: "7112363"
git-subrepo:
version: "0.3.0"
origin: "https://github.com/ingydotnet/git-subrepo.git"
commit: "cb2995b"
Diffstat (limited to 'puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb')
-rw-r--r-- | puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb b/puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb new file mode 100644 index 00000000..e51a861a --- /dev/null +++ b/puppet/modules/stdlib/lib/puppet/parser/functions/str2saltedsha1.rb @@ -0,0 +1,32 @@ +# +# str2saltedsha1.rb +# + +module Puppet::Parser::Functions + newfunction(:str2saltedsha1, :type => :rvalue, :doc => <<-EOS +This converts a string to a salted-SHA1 password hash (which is used for +OS X versions >= 10.7). Given any simple string, you will get a hex version +of a salted-SHA1 password hash that can be inserted into your Puppet +manifests as a valid password attribute. + EOS + ) do |arguments| + require 'digest/sha2' + + raise(Puppet::ParseError, "str2saltedsha1(): Wrong number of arguments " + + "passed (#{arguments.size} but we require 1)") if arguments.size != 1 + + password = arguments[0] + + unless password.is_a?(String) + raise(Puppet::ParseError, 'str2saltedsha1(): Requires a ' + + "String argument, you passed: #{password.class}") + end + + seedint = rand(2**31 - 1) + seedstring = Array(seedint).pack("L") + saltedpass = Digest::SHA1.digest(seedstring + password) + (seedstring + saltedpass).unpack('H*')[0] + end +end + +# vim: set ts=2 sw=2 et : |