1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
|
一、目录
[root@test200 user]
# pwd
/srv/salt/user/group/ops/root
二、命令
openssl
passwd
: Generation of hashed passwords.
# openssl passwd -h
Usage:
passwd
[options] [passwords]
where options are
-crypt standard Unix password algorithm (default)
-1 MD5-based password algorithm
-apr1 MD5-based password algorithm, Apache variant
-salt string use provided salt
-
in
file
read
passwords from
file
-stdin
read
passwords from stdin
-noverify never verify when reading password from terminal
-quiet no warnings
-table
format
output as table
-reverse switch table columns
使用MD5+salt的方式生成密码对应的
hash
值:
[root@test200 user]
# openssl passwd -1 -salt 'root'
Password:
$1$root$abcdylRh83kdjWxfghm.abc
得到一个
hash
后的密码,用于下一步。
三、sls文件
sls-更新root用户:
[root@test200 root]
# cat replace.sls
root:
user.present:
- password:
'$1$root$abcdylRh83kdjWxfghm.abc'
- uid: 0
- gid: 0
四、运行:
salt
'test101.company.com'
state.sls user.group.ops.root.replace
符合预期。
查看结果:
[Jack@test101 ~]$
su
Password:
[root@test101 ~]
#
|
本文转自 pcnk 51CTO博客,原文链接:http://blog.51cto.com/nosmoking/1639834,如需转载请自行联系原作者