diff options
author | Richard van der Hoff <richard@matrix.org> | 2016-03-16 09:45:37 +0000 |
---|---|---|
committer | Richard van der Hoff <richard@matrix.org> | 2016-03-16 09:45:37 +0000 |
commit | a877209c8b0c7c476ee6676c6d00c4cacdc83207 (patch) | |
tree | 3a36598959b0dd566ad561754eaba97f06051588 /scripts | |
parent | Merge pull request #646 from matrix-org/erikj/reject_invite_federation (diff) | |
download | synapse-a877209c8b0c7c476ee6676c6d00c4cacdc83207.tar.xz |
Password reset docs and script
Replace the bash/perl gen_password script with a python one, and write a note on how to use it.
Diffstat (limited to '')
-rw-r--r-- | scripts/gen_password | 1 | ||||
-rwxr-xr-x | scripts/hash_password | 39 |
2 files changed, 39 insertions, 1 deletions
diff --git a/scripts/gen_password b/scripts/gen_password deleted file mode 100644 index 7afd3a5dfd..0000000000 --- a/scripts/gen_password +++ /dev/null @@ -1 +0,0 @@ -perl -MCrypt::Random -MCrypt::Eksblowfish::Bcrypt -e 'print Crypt::Eksblowfish::Bcrypt::bcrypt("secret", "\$2\$12\$" . Crypt::Eksblowfish::Bcrypt::en_base64(Crypt::Random::makerandom_octet(Length=>16)))."\n"' diff --git a/scripts/hash_password b/scripts/hash_password new file mode 100755 index 0000000000..e784600989 --- /dev/null +++ b/scripts/hash_password @@ -0,0 +1,39 @@ +#!/usr/bin/env python + +import argparse +import bcrypt +import getpass + +bcrypt_rounds=12 + +def prompt_for_pass(): + password = getpass.getpass("Password: ") + + if not password: + raise Exception("Password cannot be blank.") + + confirm_password = getpass.getpass("Confirm password: ") + + if password != confirm_password: + raise Exception("Passwords do not match.") + + return password + +if __name__ == "__main__": + parser = argparse.ArgumentParser( + description="Calculate the hash of a new password, so that passwords" + " can be reset") + parser.add_argument( + "-p", "--password", + default=None, + help="New password for user. Will prompt if omitted.", + ) + + args = parser.parse_args() + password = args.password + + if not password: + password = prompt_for_pass() + + print bcrypt.hashpw(password, bcrypt.gensalt(bcrypt_rounds)) + |