the-bastion/bin/plugin/restricted/accountListPasswords
Stéphane Lesimple fde20136ef
Initial commit
2020-10-20 14:30:27 +00:00

55 lines
1.5 KiB
Perl
Executable file

#! /usr/bin/env perl
# vim: set filetype=perl ts=4 sw=4 sts=4 et:
use common::sense;
use File::Basename;
use lib dirname(__FILE__) . '/../../../lib/perl';
use OVH::Result;
use OVH::Bastion;
use OVH::Bastion::Plugin qw( :DEFAULT help );
my $remainingOptions = OVH::Bastion::Plugin::begin(
argv => \@ARGV,
header => "account egress passwords",
options => {"account=s" => \my $account},
helptext => <<'EOF'
List the hashes and metadata of the egress passwords associated to an account
Usage: --osh SCRIPT_NAME --account ACCOUNT
--account ACCOUNT The account name to work on
The passwords corresponding to these hashes are only needed for devices that don't support key-based SSH
EOF
);
# code
my $fnret;
$fnret = OVH::Bastion::is_bastion_account_valid_and_existing(account => $account);
$fnret or osh_exit $fnret;
$account = $fnret->value->{'account'}; # untainted
my $sysaccount = $fnret->value->{'sysaccount'};
my @command = qw{ sudo -n -u };
push @command, $sysaccount;
push @command, qw{ -- /usr/bin/env perl -T };
push @command, $OVH::Bastion::BASEPATH . '/bin/helper/osh-accountListPasswords';
push @command, '--account', $account;
$fnret = OVH::Bastion::helper(cmd => \@command);
$fnret or osh_exit $fnret;
foreach my $item (@{$fnret->value}) {
osh_info $item->{'description'};
foreach my $hash (sort keys %{$item->{'hashes'}}) {
osh_info "... $hash: " . $item->{'hashes'}{$hash};
}
osh_info "\n";
}
if (not @{$fnret->value}) {
osh_info "This account doesn't have any egress password configured";
}
osh_ok($fnret);