d3135898fd
Describe groups with more detail: - groups can be system groups (low GID) or not - groups may be pre-configured (e.g. come from the unpackfs stage)
765 lines
21 KiB
C++
765 lines
21 KiB
C++
/* === This file is part of Calamares - <https://calamares.io> ===
|
|
*
|
|
* SPDX-FileCopyrightText: 2020 Adriaan de Groot <groot@kde.org>
|
|
* SPDX-License-Identifier: GPL-3.0-or-later
|
|
*
|
|
* Calamares is Free Software: see the License-Identifier above.
|
|
*
|
|
*/
|
|
|
|
#include "Config.h"
|
|
|
|
#include "CreateUserJob.h"
|
|
#include "SetHostNameJob.h"
|
|
#include "SetPasswordJob.h"
|
|
|
|
#include "GlobalStorage.h"
|
|
#include "JobQueue.h"
|
|
#include "utils/Logger.h"
|
|
#include "utils/String.h"
|
|
#include "utils/Variant.h"
|
|
|
|
#include <QCoreApplication>
|
|
#include <QFile>
|
|
#include <QRegExp>
|
|
|
|
static const QRegExp USERNAME_RX( "^[a-z_][a-z0-9_-]*[$]?$" );
|
|
static constexpr const int USERNAME_MAX_LENGTH = 31;
|
|
|
|
static const QRegExp HOSTNAME_RX( "^[a-zA-Z0-9][-a-zA-Z0-9_]*$" );
|
|
static constexpr const int HOSTNAME_MIN_LENGTH = 2;
|
|
static constexpr const int HOSTNAME_MAX_LENGTH = 63;
|
|
|
|
static void
|
|
updateGSAutoLogin( bool doAutoLogin, const QString& login )
|
|
{
|
|
Calamares::GlobalStorage* gs = Calamares::JobQueue::instance()->globalStorage();
|
|
|
|
if ( doAutoLogin && !login.isEmpty() )
|
|
{
|
|
gs->insert( "autologinUser", login );
|
|
}
|
|
else
|
|
{
|
|
gs->remove( "autologinUser" );
|
|
}
|
|
|
|
if ( login.isEmpty() )
|
|
{
|
|
gs->remove( "username" );
|
|
}
|
|
else
|
|
{
|
|
gs->insert( "username", login );
|
|
}
|
|
}
|
|
|
|
const NamedEnumTable< HostNameAction >&
|
|
hostNameActionNames()
|
|
{
|
|
// *INDENT-OFF*
|
|
// clang-format off
|
|
static const NamedEnumTable< HostNameAction > names {
|
|
{ QStringLiteral( "none" ), HostNameAction::None },
|
|
{ QStringLiteral( "etcfile" ), HostNameAction::EtcHostname },
|
|
{ QStringLiteral( "hostnamed" ), HostNameAction::SystemdHostname }
|
|
};
|
|
// clang-format on
|
|
// *INDENT-ON*
|
|
|
|
return names;
|
|
}
|
|
|
|
Config::Config( QObject* parent )
|
|
: QObject( parent )
|
|
{
|
|
emit readyChanged( m_isReady ); // false
|
|
|
|
// Gang together all the changes of status to one readyChanged() signal
|
|
connect( this, &Config::hostNameStatusChanged, this, &Config::checkReady );
|
|
connect( this, &Config::loginNameStatusChanged, this, &Config::checkReady );
|
|
connect( this, &Config::fullNameChanged, this, &Config::checkReady );
|
|
connect( this, &Config::userPasswordStatusChanged, this, &Config::checkReady );
|
|
connect( this, &Config::rootPasswordStatusChanged, this, &Config::checkReady );
|
|
connect( this, &Config::reuseUserPasswordForRootChanged, this, &Config::checkReady );
|
|
connect( this, &Config::requireStrongPasswordsChanged, this, &Config::checkReady );
|
|
}
|
|
|
|
Config::~Config() {}
|
|
|
|
void
|
|
Config::setUserShell( const QString& shell )
|
|
{
|
|
if ( !shell.isEmpty() && !shell.startsWith( '/' ) )
|
|
{
|
|
cWarning() << "User shell" << shell << "is not an absolute path.";
|
|
return;
|
|
}
|
|
// The shell is put into GS because the CreateUser job expects it there
|
|
auto* gs = Calamares::JobQueue::instance()->globalStorage();
|
|
if ( gs )
|
|
{
|
|
gs->insert( "userShell", shell );
|
|
}
|
|
}
|
|
|
|
static inline void
|
|
insertInGlobalStorage( const QString& key, const QString& group )
|
|
{
|
|
auto* gs = Calamares::JobQueue::instance()->globalStorage();
|
|
if ( !gs || group.isEmpty() )
|
|
{
|
|
return;
|
|
}
|
|
gs->insert( key, group );
|
|
}
|
|
|
|
void
|
|
Config::setAutologinGroup( const QString& group )
|
|
{
|
|
insertInGlobalStorage( QStringLiteral( "autologinGroup" ), group );
|
|
emit autologinGroupChanged( group );
|
|
}
|
|
|
|
void
|
|
Config::setSudoersGroup( const QString& group )
|
|
{
|
|
insertInGlobalStorage( QStringLiteral( "sudoersGroup" ), group );
|
|
emit sudoersGroupChanged( group );
|
|
}
|
|
|
|
|
|
void
|
|
Config::setLoginName( const QString& login )
|
|
{
|
|
if ( login != m_loginName )
|
|
{
|
|
updateGSAutoLogin( doAutoLogin(), login );
|
|
|
|
m_customLoginName = !login.isEmpty();
|
|
m_loginName = login;
|
|
emit loginNameChanged( login );
|
|
emit loginNameStatusChanged( loginNameStatus() );
|
|
}
|
|
}
|
|
|
|
const QStringList&
|
|
Config::forbiddenLoginNames()
|
|
{
|
|
static QStringList forbidden { "root" };
|
|
return forbidden;
|
|
}
|
|
|
|
QString
|
|
Config::loginNameStatus() const
|
|
{
|
|
// An empty login is "ok", even if it isn't really
|
|
if ( m_loginName.isEmpty() )
|
|
{
|
|
return QString();
|
|
}
|
|
|
|
if ( m_loginName.length() > USERNAME_MAX_LENGTH )
|
|
{
|
|
return tr( "Your username is too long." );
|
|
}
|
|
for ( const QString& badName : forbiddenLoginNames() )
|
|
{
|
|
if ( 0 == QString::compare( badName, m_loginName, Qt::CaseSensitive ) )
|
|
{
|
|
return tr( "'%1' is not allowed as username." ).arg( badName );
|
|
}
|
|
}
|
|
|
|
QRegExp validateFirstLetter( "^[a-z_]" );
|
|
if ( validateFirstLetter.indexIn( m_loginName ) != 0 )
|
|
{
|
|
return tr( "Your username must start with a lowercase letter or underscore." );
|
|
}
|
|
if ( !USERNAME_RX.exactMatch( m_loginName ) )
|
|
{
|
|
return tr( "Only lowercase letters, numbers, underscore and hyphen are allowed." );
|
|
}
|
|
|
|
return QString();
|
|
}
|
|
|
|
void
|
|
Config::setHostName( const QString& host )
|
|
{
|
|
if ( host != m_hostName )
|
|
{
|
|
Calamares::GlobalStorage* gs = Calamares::JobQueue::instance()->globalStorage();
|
|
if ( host.isEmpty() )
|
|
{
|
|
gs->remove( "hostname" );
|
|
}
|
|
else
|
|
{
|
|
gs->insert( "hostname", host );
|
|
}
|
|
|
|
m_customHostName = !host.isEmpty();
|
|
m_hostName = host;
|
|
emit hostNameChanged( host );
|
|
emit hostNameStatusChanged( hostNameStatus() );
|
|
}
|
|
}
|
|
|
|
const QStringList&
|
|
Config::forbiddenHostNames()
|
|
{
|
|
static QStringList forbidden { "localhost" };
|
|
return forbidden;
|
|
}
|
|
|
|
QString
|
|
Config::hostNameStatus() const
|
|
{
|
|
// An empty hostname is "ok", even if it isn't really
|
|
if ( m_hostName.isEmpty() )
|
|
{
|
|
return QString();
|
|
}
|
|
|
|
if ( m_hostName.length() < HOSTNAME_MIN_LENGTH )
|
|
{
|
|
return tr( "Your hostname is too short." );
|
|
}
|
|
if ( m_hostName.length() > HOSTNAME_MAX_LENGTH )
|
|
{
|
|
return tr( "Your hostname is too long." );
|
|
}
|
|
for ( const QString& badName : forbiddenHostNames() )
|
|
{
|
|
if ( 0 == QString::compare( badName, m_hostName, Qt::CaseSensitive ) )
|
|
{
|
|
return tr( "'%1' is not allowed as hostname." ).arg( badName );
|
|
}
|
|
}
|
|
|
|
if ( !HOSTNAME_RX.exactMatch( m_hostName ) )
|
|
{
|
|
return tr( "Only letters, numbers, underscore and hyphen are allowed." );
|
|
}
|
|
|
|
return QString();
|
|
}
|
|
|
|
|
|
/** @brief Guess the machine's name
|
|
*
|
|
* If there is DMI data, use that; otherwise, just call the machine "-pc".
|
|
* Reads the DMI data just once.
|
|
*/
|
|
static QString
|
|
guessProductName()
|
|
{
|
|
static bool tried = false;
|
|
static QString dmiProduct;
|
|
|
|
if ( !tried )
|
|
{
|
|
// yes validateHostnameText() but these files can be a mess
|
|
QRegExp dmirx( "[^a-zA-Z0-9]", Qt::CaseInsensitive );
|
|
QFile dmiFile( QStringLiteral( "/sys/devices/virtual/dmi/id/product_name" ) );
|
|
|
|
if ( dmiFile.exists() && dmiFile.open( QIODevice::ReadOnly ) )
|
|
{
|
|
dmiProduct = QString::fromLocal8Bit( dmiFile.readAll().simplified().data() )
|
|
.toLower()
|
|
.replace( dmirx, " " )
|
|
.remove( ' ' );
|
|
}
|
|
if ( dmiProduct.isEmpty() )
|
|
{
|
|
dmiProduct = QStringLiteral( "pc" );
|
|
}
|
|
tried = true;
|
|
}
|
|
return dmiProduct;
|
|
}
|
|
|
|
static QString
|
|
makeLoginNameSuggestion( const QStringList& parts )
|
|
{
|
|
if ( parts.isEmpty() || parts.first().isEmpty() )
|
|
{
|
|
return QString();
|
|
}
|
|
|
|
QString usernameSuggestion = parts.first();
|
|
for ( int i = 1; i < parts.length(); ++i )
|
|
{
|
|
if ( !parts.value( i ).isEmpty() )
|
|
{
|
|
usernameSuggestion.append( parts.value( i ).at( 0 ) );
|
|
}
|
|
}
|
|
|
|
return USERNAME_RX.indexIn( usernameSuggestion ) != -1 ? usernameSuggestion : QString();
|
|
}
|
|
|
|
static QString
|
|
makeHostnameSuggestion( const QStringList& parts )
|
|
{
|
|
static const QRegExp HOSTNAME_RX( "^[a-zA-Z0-9][-a-zA-Z0-9_]*$" );
|
|
if ( parts.isEmpty() || parts.first().isEmpty() )
|
|
{
|
|
return QString();
|
|
}
|
|
|
|
QString productName = guessProductName();
|
|
QString hostnameSuggestion = QStringLiteral( "%1-%2" ).arg( parts.first() ).arg( productName );
|
|
return HOSTNAME_RX.indexIn( hostnameSuggestion ) != -1 ? hostnameSuggestion : QString();
|
|
}
|
|
|
|
void
|
|
Config::setFullName( const QString& name )
|
|
{
|
|
if ( name.isEmpty() && !m_fullName.isEmpty() )
|
|
{
|
|
if ( !m_customHostName )
|
|
{
|
|
setHostName( name );
|
|
}
|
|
if ( !m_customLoginName )
|
|
{
|
|
setLoginName( name );
|
|
}
|
|
m_fullName = name;
|
|
emit fullNameChanged( name );
|
|
}
|
|
|
|
if ( name != m_fullName )
|
|
{
|
|
m_fullName = name;
|
|
emit fullNameChanged( name );
|
|
|
|
// Build login and hostname, if needed
|
|
QRegExp rx( "[^a-zA-Z0-9 ]", Qt::CaseInsensitive );
|
|
QString cleanName = CalamaresUtils::removeDiacritics( name ).toLower().replace( rx, " " ).simplified();
|
|
QStringList cleanParts = cleanName.split( ' ' );
|
|
|
|
if ( !m_customLoginName )
|
|
{
|
|
QString login = makeLoginNameSuggestion( cleanParts );
|
|
if ( !login.isEmpty() && login != m_loginName )
|
|
{
|
|
setLoginName( login );
|
|
// It's **still** not custom, though setLoginName() sets that
|
|
m_customLoginName = false;
|
|
}
|
|
}
|
|
if ( !m_customHostName )
|
|
{
|
|
QString hostname = makeHostnameSuggestion( cleanParts );
|
|
if ( !hostname.isEmpty() && hostname != m_hostName )
|
|
{
|
|
setHostName( hostname );
|
|
// Still not custom
|
|
m_customHostName = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setAutoLogin( bool b )
|
|
{
|
|
if ( b != m_doAutoLogin )
|
|
{
|
|
updateGSAutoLogin( b, loginName() );
|
|
m_doAutoLogin = b;
|
|
emit autoLoginChanged( b );
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setReuseUserPasswordForRoot( bool reuse )
|
|
{
|
|
if ( reuse != m_reuseUserPasswordForRoot )
|
|
{
|
|
m_reuseUserPasswordForRoot = reuse;
|
|
emit reuseUserPasswordForRootChanged( reuse );
|
|
{
|
|
auto rp = rootPasswordStatus();
|
|
emit rootPasswordStatusChanged( rp.first, rp.second );
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setRequireStrongPasswords( bool strong )
|
|
{
|
|
if ( strong != m_requireStrongPasswords )
|
|
{
|
|
m_requireStrongPasswords = strong;
|
|
emit requireStrongPasswordsChanged( strong );
|
|
{
|
|
auto rp = rootPasswordStatus();
|
|
emit rootPasswordStatusChanged( rp.first, rp.second );
|
|
}
|
|
{
|
|
auto up = userPasswordStatus();
|
|
emit userPasswordStatusChanged( up.first, up.second );
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setUserPassword( const QString& s )
|
|
{
|
|
if ( s != m_userPassword )
|
|
{
|
|
m_userPassword = s;
|
|
const auto p = passwordStatus( m_userPassword, m_userPasswordSecondary );
|
|
emit userPasswordStatusChanged( p.first, p.second );
|
|
emit userPasswordChanged( s );
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setUserPasswordSecondary( const QString& s )
|
|
{
|
|
if ( s != m_userPasswordSecondary )
|
|
{
|
|
m_userPasswordSecondary = s;
|
|
const auto p = passwordStatus( m_userPassword, m_userPasswordSecondary );
|
|
emit userPasswordStatusChanged( p.first, p.second );
|
|
emit userPasswordSecondaryChanged( s );
|
|
}
|
|
}
|
|
|
|
/** @brief Checks two copies of the password for validity
|
|
*
|
|
* Given two copies of the password -- generally the password and
|
|
* the secondary fields -- checks them for validity and returns
|
|
* a pair of <validity, message>.
|
|
*
|
|
*/
|
|
Config::PasswordStatus
|
|
Config::passwordStatus( const QString& pw1, const QString& pw2 ) const
|
|
{
|
|
if ( pw1 != pw2 )
|
|
{
|
|
return qMakePair( PasswordValidity::Invalid, tr( "Your passwords do not match!" ) );
|
|
}
|
|
|
|
bool failureIsFatal = requireStrongPasswords();
|
|
for ( const auto& pc : m_passwordChecks )
|
|
{
|
|
QString message = pc.filter( pw1 );
|
|
|
|
if ( !message.isEmpty() )
|
|
{
|
|
return qMakePair( failureIsFatal ? PasswordValidity::Invalid : PasswordValidity::Weak, message );
|
|
}
|
|
}
|
|
|
|
return qMakePair( PasswordValidity::Valid, QString() );
|
|
}
|
|
|
|
|
|
Config::PasswordStatus
|
|
Config::userPasswordStatus() const
|
|
{
|
|
return passwordStatus( m_userPassword, m_userPasswordSecondary );
|
|
}
|
|
|
|
int
|
|
Config::userPasswordValidity() const
|
|
{
|
|
auto p = userPasswordStatus();
|
|
return p.first;
|
|
}
|
|
|
|
QString
|
|
Config::userPasswordMessage() const
|
|
{
|
|
auto p = userPasswordStatus();
|
|
return p.second;
|
|
}
|
|
|
|
|
|
void
|
|
Config::setRootPassword( const QString& s )
|
|
{
|
|
if ( writeRootPassword() && s != m_rootPassword )
|
|
{
|
|
m_rootPassword = s;
|
|
const auto p = passwordStatus( m_rootPassword, m_rootPasswordSecondary );
|
|
emit rootPasswordStatusChanged( p.first, p.second );
|
|
emit rootPasswordChanged( s );
|
|
}
|
|
}
|
|
|
|
void
|
|
Config::setRootPasswordSecondary( const QString& s )
|
|
{
|
|
if ( writeRootPassword() && s != m_rootPasswordSecondary )
|
|
{
|
|
m_rootPasswordSecondary = s;
|
|
const auto p = passwordStatus( m_rootPassword, m_rootPasswordSecondary );
|
|
emit rootPasswordStatusChanged( p.first, p.second );
|
|
emit rootPasswordSecondaryChanged( s );
|
|
}
|
|
}
|
|
|
|
QString
|
|
Config::rootPassword() const
|
|
{
|
|
if ( writeRootPassword() )
|
|
{
|
|
if ( reuseUserPasswordForRoot() )
|
|
{
|
|
return userPassword();
|
|
}
|
|
return m_rootPassword;
|
|
}
|
|
return QString();
|
|
}
|
|
|
|
QString
|
|
Config::rootPasswordSecondary() const
|
|
{
|
|
if ( writeRootPassword() )
|
|
{
|
|
if ( reuseUserPasswordForRoot() )
|
|
{
|
|
return userPasswordSecondary();
|
|
}
|
|
return m_rootPasswordSecondary;
|
|
}
|
|
return QString();
|
|
}
|
|
|
|
Config::PasswordStatus
|
|
Config::rootPasswordStatus() const
|
|
{
|
|
if ( writeRootPassword() && !reuseUserPasswordForRoot() )
|
|
{
|
|
return passwordStatus( m_rootPassword, m_rootPasswordSecondary );
|
|
}
|
|
else
|
|
{
|
|
return userPasswordStatus();
|
|
}
|
|
}
|
|
|
|
int
|
|
Config::rootPasswordValidity() const
|
|
{
|
|
auto p = rootPasswordStatus();
|
|
return p.first;
|
|
}
|
|
|
|
QString
|
|
Config::rootPasswordMessage() const
|
|
{
|
|
auto p = rootPasswordStatus();
|
|
return p.second;
|
|
}
|
|
|
|
bool
|
|
Config::isReady() const
|
|
{
|
|
bool readyFullName = !fullName().isEmpty(); // Needs some text
|
|
bool readyHostname = hostNameStatus().isEmpty(); // .. no warning message
|
|
bool readyUsername = loginNameStatus().isEmpty(); // .. no warning message
|
|
bool readyUserPassword = userPasswordValidity() != Config::PasswordValidity::Invalid;
|
|
bool readyRootPassword = rootPasswordValidity() != Config::PasswordValidity::Invalid;
|
|
return readyFullName && readyHostname && readyUsername && readyUserPassword && readyRootPassword;
|
|
}
|
|
|
|
/** @brief Update ready status and emit signal
|
|
*
|
|
* This is a "concentrator" private slot for all the status-changed
|
|
* signals, so that readyChanged() is emitted only when needed.
|
|
*/
|
|
void
|
|
Config::checkReady()
|
|
{
|
|
bool b = isReady();
|
|
if ( b != m_isReady )
|
|
{
|
|
m_isReady = b;
|
|
emit readyChanged( b );
|
|
}
|
|
}
|
|
|
|
|
|
STATICTEST void
|
|
setConfigurationDefaultGroups( const QVariantMap& map, QList< GroupDescription >& defaultGroups )
|
|
{
|
|
defaultGroups.clear();
|
|
auto groupsFromConfig = map.value( "defaultGroups" ).toList();
|
|
cDebug() << groupsFromConfig;
|
|
#if 0
|
|
// '#' is not a valid group name; use that to distinguish an empty-list
|
|
// in the configuration (which is a legitimate, if unusual, choice)
|
|
// from a bad or missing configuration value.
|
|
defaultGroups = CalamaresUtils::getStringList( map, QStringLiteral( "defaultGroups" ), QStringList { "#" } );
|
|
if ( defaultGroups.contains( QStringLiteral( "#" ) ) )
|
|
{
|
|
cWarning() << "Using fallback groups. Please check *defaultGroups* in users.conf";
|
|
defaultGroups = QStringList { "lp", "video", "network", "storage", "wheel", "audio" };
|
|
}
|
|
#endif
|
|
}
|
|
|
|
STATICTEST HostNameActions
|
|
getHostNameActions( const QVariantMap& configurationMap )
|
|
{
|
|
HostNameAction setHostName = HostNameAction::EtcHostname;
|
|
QString hostnameActionString = CalamaresUtils::getString( configurationMap, "setHostname" );
|
|
if ( !hostnameActionString.isEmpty() )
|
|
{
|
|
bool ok = false;
|
|
setHostName = hostNameActionNames().find( hostnameActionString, ok );
|
|
if ( !ok )
|
|
{
|
|
setHostName = HostNameAction::EtcHostname; // Rather than none
|
|
}
|
|
}
|
|
|
|
HostNameAction writeHosts = CalamaresUtils::getBool( configurationMap, "writeHostsFile", true )
|
|
? HostNameAction::WriteEtcHosts
|
|
: HostNameAction::None;
|
|
return setHostName | writeHosts;
|
|
}
|
|
|
|
/** @brief Process entries in the passwordRequirements config entry
|
|
*
|
|
* Called once for each item in the config entry, which should
|
|
* be a key-value pair. What makes sense as a value depends on
|
|
* the key. Supported keys are documented in users.conf.
|
|
*
|
|
* @return if the check was added, returns @c true
|
|
*/
|
|
STATICTEST bool
|
|
addPasswordCheck( const QString& key, const QVariant& value, PasswordCheckList& passwordChecks )
|
|
{
|
|
if ( key == "minLength" )
|
|
{
|
|
add_check_minLength( passwordChecks, value );
|
|
}
|
|
else if ( key == "maxLength" )
|
|
{
|
|
add_check_maxLength( passwordChecks, value );
|
|
}
|
|
else if ( key == "nonempty" )
|
|
{
|
|
if ( value.toBool() )
|
|
{
|
|
passwordChecks.push_back(
|
|
PasswordCheck( []() { return QCoreApplication::translate( "PWQ", "Password is empty" ); },
|
|
[]( const QString& s ) { return !s.isEmpty(); },
|
|
PasswordCheck::Weight( 1 ) ) );
|
|
}
|
|
else
|
|
{
|
|
cDebug() << "nonempty check is mentioned but set to false";
|
|
return false;
|
|
}
|
|
}
|
|
#ifdef CHECK_PWQUALITY
|
|
else if ( key == "libpwquality" )
|
|
{
|
|
add_check_libpwquality( passwordChecks, value );
|
|
}
|
|
#endif // CHECK_PWQUALITY
|
|
else
|
|
{
|
|
cWarning() << "Unknown password-check key" << key;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void
|
|
Config::setConfigurationMap( const QVariantMap& configurationMap )
|
|
{
|
|
QString shell( QLatin1String( "/bin/bash" ) ); // as if it's not set at all
|
|
if ( configurationMap.contains( "userShell" ) )
|
|
{
|
|
shell = CalamaresUtils::getString( configurationMap, "userShell" );
|
|
}
|
|
// Now it might be explicitly set to empty, which is ok
|
|
setUserShell( shell );
|
|
|
|
setAutologinGroup( CalamaresUtils::getString( configurationMap, "autologinGroup" ) );
|
|
setSudoersGroup( CalamaresUtils::getString( configurationMap, "sudoersGroup" ) );
|
|
|
|
m_hostNameActions = getHostNameActions( configurationMap );
|
|
|
|
setConfigurationDefaultGroups( configurationMap, m_defaultGroups );
|
|
m_doAutoLogin = CalamaresUtils::getBool( configurationMap, "doAutologin", false );
|
|
|
|
m_writeRootPassword = CalamaresUtils::getBool( configurationMap, "setRootPassword", true );
|
|
Calamares::JobQueue::instance()->globalStorage()->insert( "setRootPassword", m_writeRootPassword );
|
|
|
|
m_reuseUserPasswordForRoot = CalamaresUtils::getBool( configurationMap, "doReusePassword", false );
|
|
|
|
m_permitWeakPasswords = CalamaresUtils::getBool( configurationMap, "allowWeakPasswords", false );
|
|
m_requireStrongPasswords
|
|
= !m_permitWeakPasswords || !CalamaresUtils::getBool( configurationMap, "allowWeakPasswordsDefault", false );
|
|
|
|
// If the value doesn't exist, or isn't a map, this gives an empty map -- no problem
|
|
auto pr_checks( configurationMap.value( "passwordRequirements" ).toMap() );
|
|
for ( decltype( pr_checks )::const_iterator i = pr_checks.constBegin(); i != pr_checks.constEnd(); ++i )
|
|
{
|
|
addPasswordCheck( i.key(), i.value(), m_passwordChecks );
|
|
}
|
|
std::sort( m_passwordChecks.begin(), m_passwordChecks.end() );
|
|
|
|
updateGSAutoLogin( doAutoLogin(), loginName() );
|
|
checkReady();
|
|
}
|
|
|
|
void
|
|
Config::finalizeGlobalStorage() const
|
|
{
|
|
updateGSAutoLogin( doAutoLogin(), loginName() );
|
|
|
|
Calamares::GlobalStorage* gs = Calamares::JobQueue::instance()->globalStorage();
|
|
if ( writeRootPassword() )
|
|
{
|
|
gs->insert( "reuseRootPassword", reuseUserPasswordForRoot() );
|
|
}
|
|
gs->insert( "password", CalamaresUtils::obscure( userPassword() ) );
|
|
}
|
|
|
|
Calamares::JobList
|
|
Config::createJobs() const
|
|
{
|
|
Calamares::JobList jobs;
|
|
|
|
if ( !isReady() )
|
|
{
|
|
return jobs;
|
|
}
|
|
|
|
Calamares::Job* j;
|
|
|
|
QStringList groupNames = std::accumulate(
|
|
m_defaultGroups.begin(),
|
|
m_defaultGroups.end(),
|
|
QStringList(),
|
|
[]( const QStringList& l, const GroupDescription& g ) { return QStringList( l ) << g.name(); } );
|
|
|
|
j = new CreateUserJob( loginName(), fullName().isEmpty() ? loginName() : fullName(), doAutoLogin(), groupNames );
|
|
jobs.append( Calamares::job_ptr( j ) );
|
|
|
|
j = new SetPasswordJob( loginName(), userPassword() );
|
|
jobs.append( Calamares::job_ptr( j ) );
|
|
|
|
j = new SetPasswordJob( "root", rootPassword() );
|
|
jobs.append( Calamares::job_ptr( j ) );
|
|
|
|
j = new SetHostNameJob( hostName(), hostNameActions() );
|
|
jobs.append( Calamares::job_ptr( j ) );
|
|
|
|
return jobs;
|
|
}
|