CN110471744B - Password modification method, device, equipment and computer readable storage medium - Google Patents

Password modification method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110471744B
CN110471744B CN201910772453.9A CN201910772453A CN110471744B CN 110471744 B CN110471744 B CN 110471744B CN 201910772453 A CN201910772453 A CN 201910772453A CN 110471744 B CN110471744 B CN 110471744B
Authority
CN
China
Prior art keywords
virtual machine
information
password
system disk
modified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910772453.9A
Other languages
Chinese (zh)
Other versions
CN110471744A (en
Inventor
闫晓峰
方晨曦
何育松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capitalonline Data Service Co ltd
Original Assignee
Capitalonline Data Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capitalonline Data Service Co ltd filed Critical Capitalonline Data Service Co ltd
Priority to CN201910772453.9A priority Critical patent/CN110471744B/en
Publication of CN110471744A publication Critical patent/CN110471744A/en
Application granted granted Critical
Publication of CN110471744B publication Critical patent/CN110471744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Abstract

The embodiment of the invention provides a password modification method, a password modification device, equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving a password modification request, wherein the password modification request comprises information of a first virtual machine of a password to be modified and modified password information; determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are positioned in the same cluster; the system disk of the first virtual machine is loaded to the second virtual machine; and sending the information of the first virtual machine and the modified password information to the second virtual machine, wherein the information of the first virtual machine and the modified password information are used for the second virtual machine to finish modifying the password information stored in the system disk. The method can realize password modification on the first virtual machine under the condition of not starting the first virtual machine, and reduce the influence on other service programs of the first virtual machine.

Description

Password modification method, device, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a password modification method, apparatus, device, and computer-readable storage medium.
Background
In a cloud environment, a user often forgets a password, and thus needs to reset the password. However, the user sometimes performs the operation of modifying the password after starting the virtual machine, and since the service program of the client may be started at this time, the operation of modifying the password may affect the service of the user, which causes a loss to the user.
Disclosure of Invention
Embodiments of the present invention provide a password modification method, apparatus, device, and computer-readable storage medium, so as to at least solve the above technical problems in the prior art.
In a first aspect, an embodiment of the present invention provides a password modification method, including:
receiving a password modification request, wherein the password modification request comprises information of a first virtual machine of a password to be modified and modified password information;
determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are positioned in the same cluster;
the system disk of the first virtual machine is loaded to the second virtual machine;
and sending the information of the first virtual machine and the modified password information to the second virtual machine, wherein the information of the first virtual machine and the modified password information are used for the second virtual machine to finish modifying the password information stored in the system disk.
In one embodiment, the modify password request further comprises: data center information of the first virtual machine;
before determining the first virtual machine and the second virtual machine according to the information of the first virtual machine, the method further includes: connecting to a data center where the first virtual machine is located according to the data center information of the first virtual machine;
the determining the first virtual machine and the second virtual machine according to the information of the first virtual machine includes: and in the data center, determining the first virtual machine and the second virtual machine according to the information of the first virtual machine.
In one embodiment, the information of the first virtual machine includes: name information of the first virtual machine;
determining the first virtual machine according to the information of the first virtual machine, including: determining the first virtual machine according to the name information of the first virtual machine;
sending the information of the first virtual machine to the second virtual machine includes: and sending the name information of the first virtual machine to the second virtual machine.
In one embodiment, the information of the first virtual machine includes: the cluster name of the first virtual machine;
determining the second virtual machine according to the information of the first virtual machine, including: and determining the second virtual machine according to the cluster name of the first virtual machine.
In one embodiment, the name of the second virtual machine is the same as the name of the cluster in which the first virtual machine is located.
In one embodiment, before the loading the system disk of the first virtual machine to the second virtual machine, the method further includes:
and determining a system disk of the first virtual machine in the hardware equipment of the first virtual machine when the first virtual machine is in a shutdown state.
In a second aspect, an embodiment of the present invention provides a password modification method, including:
receiving information of the first virtual machine and modified password information;
determining a system disk of the first virtual machine in the mounted disk according to the information of the first virtual machine;
and modifying the password information stored in the system disk of the first virtual machine according to the modified password information.
In one embodiment, the modifying the password information of the system disk of the first virtual machine according to the modified password information includes: and establishing a name space of the system disk of the first virtual machine, and modifying the password information of the system disk of the first virtual machine in the name space according to the modified password information.
In a third aspect, an embodiment of the present invention provides a password modification apparatus, including:
the password modification device comprises a request receiving module, a password modification module and a password modification module, wherein the request receiving module is used for receiving a password modification request which comprises information of a first virtual machine of a password to be modified and modified password information;
the virtual machine determining module is used for determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are positioned in the same cluster;
the mounting module is used for mounting the system disk of the first virtual machine to the second virtual machine;
and the information sending module is used for sending the information of the first virtual machine and the modified password information to the second virtual machine, and the information of the first virtual machine and the modified password information are used for the second virtual machine to finish modifying the password information stored in the system disk.
In one embodiment, the modify password request further comprises: data center information of the first virtual machine;
the device further comprises:
the data center connection module is used for connecting to a data center where the first virtual machine is located according to the data center information of the first virtual machine;
the virtual machine determining module is configured to determine the first virtual machine and the second virtual machine according to the information of the first virtual machine in the data center.
In one embodiment, the virtual machine determining module is configured to determine the first virtual machine according to name information of the first virtual machine;
the information sending module is used for sending the name information of the first virtual machine to the second virtual machine.
In one embodiment, the information of the first virtual machine includes: the cluster name of the first virtual machine;
the virtual machine determining module is configured to determine the second virtual machine according to the cluster name of the first virtual machine.
In one embodiment, the method further comprises: a first system disk determining module, configured to determine, in a hardware device of the first virtual machine, a system disk of the first virtual machine in a shutdown state of the first virtual machine before the mount module mounts the system disk of the first virtual machine to the second virtual machine.
In a fourth aspect, an embodiment of the present invention provides a password modification apparatus, including:
the receiving module is used for receiving the information of the first virtual machine and the modified password information;
a mounted system disk determining module, configured to determine, according to the information of the first virtual machine, a system disk of the first virtual machine in a mounted disk;
and the modification module is used for modifying the password information stored in the system disk of the first virtual machine according to the modified password information.
In one embodiment, the modification module includes:
the namespace determining submodule is used for establishing a namespace of a system disk of the first virtual machine;
and the password modification submodule is used for modifying the password information of the system disk of the first virtual machine in the name space according to the modified password information.
In a fifth aspect, an embodiment of the present invention provides a password modification device, where functions of the password modification device may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the configuration of the password modification apparatus includes a processor and a memory, the memory is used for storing a program supporting the password modification apparatus to execute the password modification method provided in the embodiment of the first aspect, and the processor is configured to execute the program stored in the memory. The password modification device may further comprise a communication interface for communicating with other devices or a communication network.
In a sixth aspect, an embodiment of the present invention provides a password modification device, where functions of the password modification device may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible design, the configuration of the password modification apparatus includes a processor and a memory, the memory is used for storing a program supporting the password modification apparatus to execute the password modification method provided by the embodiment of the second aspect, and the processor is configured to execute the program stored in the memory. The password modification device may further comprise a communication interface for communicating with other devices or a communication network.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium for storing computer software instructions for a password modification apparatus, which includes a program for executing the password modification method in the foregoing embodiment.
One of the above technical solutions has the following advantages or beneficial effects: the system disk of the first virtual machine with the password to be modified is mounted on the second virtual machine in the same cluster, and the password information in the mounted disk is modified through the second virtual machine, so that the password of the first virtual machine is modified, the first virtual machine does not need to be started, and the influence on other service programs of the first virtual machine is reduced.
The foregoing summary is provided for the purpose of description only and is not intended to be limiting in any way. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features of the present invention will be readily apparent by reference to the drawings and following detailed description.
Drawings
In the drawings, like reference numerals refer to the same or similar parts or elements throughout the several views unless otherwise specified. The figures are not necessarily to scale. It is appreciated that these drawings depict only some embodiments in accordance with the disclosure and are therefore not to be considered limiting of its scope.
FIG. 1 is a flow diagram illustrating one embodiment of a password modification method provided in accordance with an embodiment of the present invention;
FIG. 2 illustrates a flow diagram of one implementation of another password modification method provided in accordance with an embodiment of the present invention;
FIG. 3 is a block diagram illustrating an implementation of a password modification apparatus according to an embodiment of the present invention;
FIG. 4 is a block diagram illustrating an implementation of another cryptographic modification apparatus provided in accordance with an embodiment of the present invention;
fig. 5 is a block diagram illustrating an implementation of the modification module 43 of the password modification apparatus according to the embodiment of the present invention;
fig. 6 is a block diagram illustrating an implementation of a password modification apparatus according to an embodiment of the present invention.
Detailed Description
In the following, only certain exemplary embodiments are briefly described. As those skilled in the art will recognize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, and not as restrictive.
Fig. 1 is a flowchart illustrating a password modification method according to an embodiment of the present invention. Referring to fig. 1, the method includes:
s11, receiving a password modification request, wherein the password modification request comprises information of a first virtual machine of a password to be modified and modified password information;
s12, determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are located in the same cluster;
s13, loading the system disk of the first virtual machine to the second virtual machine;
and S14, sending the information of the first virtual machine and the modified password information to the second virtual machine, wherein the information of the first virtual machine and the modified password information are used for the second virtual machine to modify the password information stored in the system disk.
According to the method, the system disk of the first virtual machine with the password to be modified is mounted on the second virtual machine in the same cluster, and the password information in the mounted disk is modified through the second virtual machine, so that the password of the first virtual machine is modified, the first virtual machine does not need to be started, and the influence on other service programs of the first virtual machine is reduced.
It should be noted that the system disks of two virtual machines in the same cluster belong to different virtual machines on the virtualization layer, but the bottom physical device resources used by the two system disks are the same on the physical layer, so that the two system disks are associated with each other.
Generally, mounting refers to a process by which a computer's files and directories on a storage device (e.g., hard disk, compact disk read-only, or shared resource) are made available to a user through the computer's file system by an operating system. Generally, when a computer is shut down, each mounted storage will undergo an offload to ensure that all queued data is written and to ensure the integrity of the file system structure on the media.
For example, in the Linux operating system, mount (mount) is a command under Linux, which can mount a partition under a folder of Linux, thereby linking the partition with the directory, and therefore, accessing only this folder is equivalent to accessing the partition. At present, mounting is not limited to Linux, and mounting can also be applied to a Windows system.
In one embodiment, the modify password request in step S11 is from a request entered by a user. Specifically, before the first virtual machine is not started, modified password information and a password instruction for modifying the first virtual machine, which are input by a user, are received, and a password modification request is generated.
In one embodiment, the password of step S11 may be a start password of the virtual machine, a password for the user to log in the virtual machine, or a password corresponding to the virtual machine account of the user.
In one embodiment, the request to modify the password in step S11 further includes: data center information for the first virtual machine.
Before step S12, the method further includes: and connecting to the data center where the first virtual machine is located according to the data center information of the first virtual machine. One data center may include a plurality of clusters.
Step S12, including: and in the data center, determining the first virtual machine and the second virtual machine according to the information of the first virtual machine.
In one embodiment, the information of the first virtual machine of step S12 includes: name information of the first virtual machine. In step S12, determining the first virtual machine according to the information of the first virtual machine includes: and determining the first virtual machine according to the name information of the first virtual machine. The step S14 of sending the information of the first virtual machine to the second virtual machine includes: and sending the name information of the first virtual machine to the second virtual machine.
In one embodiment, the information of the first virtual machine of step S12 includes: and the cluster name of the first virtual machine. In step S12, determining the second virtual machine according to the information of the first virtual machine includes: and determining a second virtual machine according to the cluster name of the first virtual machine.
In one embodiment, the name of the second virtual machine is the same as the name of the cluster in which the first virtual machine resides.
In one embodiment, before step S13, the method further includes:
and under the shutdown state of the first virtual machine, determining a system disk of the first virtual machine in the hardware equipment of the first virtual machine. In one example, a hardware device in a first virtual machine is traversed to obtain a system disk of the first virtual machine. The above embodiment ensures that the modification of the password of the first virtual machine is performed when the first virtual machine is in a shutdown state, thereby avoiding the influence on other running business programs of the first virtual machine.
In one embodiment, step S13 includes: and determining a first configuration parameter of the second virtual machine, wherein the first configuration parameter is used for the second virtual machine to reset the system disk of the second virtual machine, so that the system disk of the first virtual machine is loaded on the second virtual machine. And generating a first reset configuration task according to the first configuration parameter, and issuing the first reset configuration task to the second virtual machine.
In the above embodiment, the system disk of the first virtual machine and the system disk of the second virtual machine belong to different virtual machines on the virtualization layer, and in the physical layer, the first virtual machine and the second virtual machine are in the same cluster, and the bottom physical device resources used by the two system disks are the same, so that the two system disks are associated with each other. That is, the system disk on the first virtual machine is also affected by configuration modification and other operations performed on the system disk in the second virtual machine. Therefore, in the above embodiment, the system disk of the first virtual machine can be loaded on the second virtual machine by organizing the configuration parameters to reset the system disk of the second virtual machine.
In one embodiment, before step S14, the method may further include: and connecting the data center, determining a second virtual machine in the data center, and storing a program related to the second virtual machine for finishing the modification of the password information stored in the system disk in a preset path of the second virtual machine. In other embodiments, the program that the second virtual machine is to complete modifying the password information stored in the system disk may also be pre-stored.
The manner of connecting the data center and determining the second virtual machine may refer to the embodiment of step S12. When the step S14 sends the information of the first virtual machine and the modified password information to the second virtual machine, the second virtual machine is started to complete the modification of the password information stored in the system disk.
In one embodiment, in step S14, the second virtual machine may construct an isolated operating environment through a namespace in which the cryptographic information of the system disk of the first virtual machine is modified. Therefore, the aim of statically modifying the password can be achieved, and other processes cannot be disturbed.
In one embodiment, the second virtual machine may modify the password information of the system disk of the first virtual machine in an isolated operating environment through a system instruction corresponding to the namespace.
It should be noted that namespace (namespace) is also called "namespace" or "namespace". The namespace is a packaging isolation method for global system resources by using an operating system kernel, so that processes in different namespaces have independent global system resources, and changing the system resources in one namespace only affects the processes in the current namespace and has no effect on the processes in other namespaces. The different processes can not feel the existence of the other side at all through the naming space, so that the processes in the naming space can generate illusion and can be considered to be placed in an independent system, and the isolation purpose is achieved.
Based on the technical characteristics of the name space, the file system isolation mechanism is realized. Specifically, in this embodiment, it is first provided that the second virtual machine can perform a password on other virtual machines in the same cluster, and mount the system disk of the first virtual machine whose password is to be modified to the second virtual machine. And in the second virtual machine, the system disk is placed in the isolated operation environment by using the system instruction, and the password modification of the system disk is executed.
In one embodiment, after step S14, the method further includes: and detecting whether the second virtual machine completes the modification of the password information of the system disk of the first virtual machine, and after the modification is determined to be completed, removing the mounting of the system disk of the first virtual machine on the second virtual machine and mounting the system disk of the first virtual machine back to the first virtual machine.
An example of un-mounting a system disk of a first virtual machine on a second virtual machine, comprising: traversing hardware equipment of a second virtual machine, and determining a system disk of a first virtual machine; determining a second configuration parameter of the second virtual machine, wherein the second configuration parameter is used for the second virtual machine to reset a system disk of the second virtual machine, so that the mounting of the system disk of the first virtual machine on the second virtual machine is removed; and generating a second reconfiguration task according to the second configuration parameters, and issuing the second reconfiguration task to the second virtual machine.
In one embodiment, step S14 may further include: and generating a password modification execution instruction and sending the password modification execution instruction to the second virtual machine, wherein the password modification execution instruction is used for triggering the second virtual machine to modify the password information stored in the system disk.
In one embodiment, after step S14, in addition to uninstalling the system disk of the first virtual machine on the second virtual machine, the method further includes: the specified file data is deleted. The specified file data may include a file associated with the mounted system disk and a file associated with execution of the modification of the cryptographic information of the system disk of the first virtual machine at the present time.
The embodiment can be applied to various types of virtual machines in a cloud environment, such as a kvm virtual machine, a vmware virtual machine, and the like.
Fig. 2 shows a flow diagram providing a password modification method according to an embodiment of the present invention. Referring to fig. 2, the apparatus includes:
s21, receiving the information of the first virtual machine and the modified password information;
s22, determining a system disk of the first virtual machine in the mounted disks according to the information of the first virtual machine;
and S23, modifying the password information stored in the system disk of the first virtual machine according to the modified password information.
The above embodiments may be applied to a second virtual machine, where the second virtual machine is a virtual machine in a cluster where the first virtual machine is located.
In one embodiment, in step S21, the information of the first virtual machine is received and includes name information of the first virtual machine, and in step S22, a system disk of the first virtual machine is determined among the mounted disks according to the name information of the first virtual machine.
In one embodiment, step S22 includes: and when the password modification execution instruction is received, determining the system disk of the first virtual machine in the mounted disk according to the information of the first virtual machine.
In one embodiment, step S22 includes: scanning a system interface of the second virtual machine to find a mounted disk; and determining the system disk of the first virtual machine in the mounted disks according to the name information of the first virtual machine.
In one embodiment, step S23 includes: and establishing a name space of the system disk of the first virtual machine, and modifying the password information of the system disk of the first virtual machine in the name space according to the modified password information. After step S23, the method further includes: the system disk is moved out of the namespace. The details of the namespace can refer to the corresponding contents in the previous embodiment, and are not described herein again.
Fig. 3 is a block diagram illustrating a configuration of a password modification apparatus according to an embodiment of the present invention. Referring to fig. 3, the apparatus includes:
a request receiving module 31, configured to receive a password modification request, where the password modification request includes information of a first virtual machine of a password to be modified and modified password information;
a virtual machine determining module 32, configured to determine, according to information of the first virtual machine, a first virtual machine and a second virtual machine, where the second virtual machine and the first virtual machine are located in the same cluster;
a mounting module 33, configured to mount a system disk of the first virtual machine to the second virtual machine;
and the information sending module 34 is configured to send the information of the first virtual machine and the modified password information to the second virtual machine, where the information of the first virtual machine and the modified password information are used for the second virtual machine to complete modification of the password information stored in the system disk.
In one embodiment, modifying the password request further comprises: data center information for the first virtual machine.
The device still includes: and the data center connecting module is used for connecting to a data center where the first virtual machine is located according to the data center information of the first virtual machine.
The virtual machine determining module 32 is configured to determine, in the data center, the first virtual machine and the second virtual machine according to the information of the first virtual machine.
In one embodiment, the virtual machine determining module 32 is configured to determine the first virtual machine according to name information of the first virtual machine. And the information sending module 34 is configured to send the name information of the first virtual machine to the second virtual machine.
In one embodiment, the information of the first virtual machine includes: and the cluster name of the first virtual machine. The virtual machine determining module 32 is configured to determine the second virtual machine according to the cluster name where the first virtual machine is located.
In one embodiment, the method further comprises: the first system disk determining module is configured to determine, in the hardware device of the first virtual machine, the system disk of the first virtual machine in a shutdown state of the first virtual machine before the mounting module mounts the system disk of the first virtual machine to the second virtual machine.
In one embodiment, the method further comprises: the mounting relation removing module is used for detecting whether the second virtual machine completes the modification of the password information of the system disk of the first virtual machine; after the determination is completed, removing the mounting of the system disk of the first virtual machine on the second virtual machine; and mounting the system disk of the first virtual machine back to the first virtual machine.
And the mount relation removing module is also used for removing the mount of the system disk of the first virtual machine on the second virtual machine and deleting the specified file data. The specified file data may include a file associated with the mounted system disk and a file associated with execution of the modification of the cryptographic information of the system disk of the first virtual machine at the present time.
Fig. 4 is a block diagram illustrating a configuration of a password modification apparatus according to an embodiment of the present invention. Referring to fig. 4, the apparatus includes:
a receiving module 41, configured to receive information of the first virtual machine and the modified password information;
a mounted system disk determining module 42, configured to determine, according to the information of the first virtual machine, a system disk of the first virtual machine in a mounted disk;
and a modifying module 43, configured to modify the password information stored in the system disk of the first virtual machine according to the modified password information.
In one embodiment, referring to fig. 5, the modification module 43 includes:
the namespace determining submodule 51 is used for establishing a namespace of a system disk of the first virtual machine;
and the password modification submodule 52 is configured to modify, in the namespace, the password information of the system disk of the first virtual machine according to the modified password information.
In one embodiment, the apparatus further comprises:
and the name space removal module is used for removing the system disk from the name space.
The functions of the modules in the device according to the embodiment of the present invention may refer to the corresponding descriptions in the above method, and are not described herein again.
Fig. 6 shows a block diagram of a configuration of a password modification apparatus according to an embodiment of the present invention. As shown in fig. 6, the password modification apparatus includes: a memory 610 and a processor 620, the memory 610 having stored therein computer programs executable on the processor 620. The processor 620, when executing the computer program, implements the password modification method in the above-described embodiments. The number of the memory 610 and the processor 620 may be one or more.
The password modification apparatus further includes:
the communication interface 630 is used for communicating with an external device to perform data interactive transmission.
Memory 610 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
If the memory 610, the processor 620 and the communication interface 630 are implemented independently, the memory 610, the processor 620 and the communication interface 630 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus.
Optionally, in an implementation, if the memory 610, the processor 620, and the communication interface 630 are integrated on a chip, the memory 610, the processor 620, and the communication interface 630 may complete communication with each other through an internal interface.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and the computer program is executed by a processor to implement the method in any one of the above embodiments.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various changes or substitutions within the technical scope of the present invention, and these should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (16)

1. A password modification method, comprising:
receiving a password modification request, wherein the password modification request comprises information of a first virtual machine of a password to be modified and modified password information;
determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are positioned in the same cluster;
the system disk of the first virtual machine is loaded to the second virtual machine;
sending the information of the first virtual machine and the modified password information to the second virtual machine, wherein the information of the first virtual machine and the modified password information are used for the second virtual machine to modify the password information stored in the system disk;
wherein the modifying of the password information stored in the system disk comprises: the second virtual machine determines a system disk of the first virtual machine in the mounted disk according to the information of the first virtual machine; and the second virtual machine establishes a name space of the system disk of the first virtual machine, and modifies the password information of the system disk of the first virtual machine in the name space according to the modified password information.
2. The method of claim 1, wherein the modify password request further comprises: data center information of the first virtual machine;
before determining the first virtual machine and the second virtual machine according to the information of the first virtual machine, the method further includes: connecting to a data center where the first virtual machine is located according to the data center information of the first virtual machine;
the determining the first virtual machine and the second virtual machine according to the information of the first virtual machine includes: and in the data center, determining the first virtual machine and the second virtual machine according to the information of the first virtual machine.
3. The method of claim 1 or 2, wherein the information of the first virtual machine comprises: name information of the first virtual machine;
determining the first virtual machine according to the information of the first virtual machine, including: determining the first virtual machine according to the name information of the first virtual machine;
sending the information of the first virtual machine to the second virtual machine includes: and sending the name information of the first virtual machine to the second virtual machine.
4. The method of claim 1 or 2, wherein the information of the first virtual machine comprises: the cluster name of the first virtual machine;
determining the second virtual machine according to the information of the first virtual machine, including: and determining the second virtual machine according to the cluster name of the first virtual machine.
5. The method of claim 4, wherein the name of the second virtual machine is the same as the name of the cluster in which the first virtual machine resides.
6. The method of claim 1, wherein before the loading the system disk of the first virtual machine to the second virtual machine, further comprising:
and determining a system disk of the first virtual machine in the hardware equipment of the first virtual machine when the first virtual machine is in a shutdown state.
7. A password modification method, comprising:
the second virtual machine receives the information of the first virtual machine and the modified password information;
the second virtual machine determines a system disk of the first virtual machine in the mounted disk according to the information of the first virtual machine;
and the second virtual machine establishes a name space of the system disk of the first virtual machine, and modifies the password information of the system disk of the first virtual machine in the name space according to the modified password information.
8. A password modification apparatus, comprising:
the password modification device comprises a request receiving module, a password modification module and a password modification module, wherein the request receiving module is used for receiving a password modification request which comprises information of a first virtual machine of a password to be modified and modified password information;
the virtual machine determining module is used for determining a first virtual machine and a second virtual machine according to the information of the first virtual machine, wherein the second virtual machine and the first virtual machine are positioned in the same cluster;
the mounting module is used for mounting the system disk of the first virtual machine to the second virtual machine;
the information sending module is used for sending the information of the first virtual machine and the modified password information to the second virtual machine, and the information of the first virtual machine and the modified password information are used for the second virtual machine to modify the password information stored in the system disk;
wherein the modifying of the password information stored in the system disk comprises: the second virtual machine determines a system disk of the first virtual machine in the mounted disk according to the information of the first virtual machine; and the second virtual machine establishes a name space of the system disk of the first virtual machine, and modifies the password information of the system disk of the first virtual machine in the name space according to the modified password information.
9. The apparatus of claim 8, wherein the modify password request further comprises: data center information of the first virtual machine;
the device further comprises: the data center connection module is used for connecting to a data center where the first virtual machine is located according to the data center information of the first virtual machine;
the virtual machine determining module is configured to determine the first virtual machine and the second virtual machine according to the information of the first virtual machine in the data center.
10. The apparatus according to claim 8 or 9, wherein the virtual machine determining module is configured to determine the first virtual machine according to name information of the first virtual machine;
the information sending module is used for sending the name information of the first virtual machine to the second virtual machine.
11. The apparatus of claim 8 or 9, wherein the information of the first virtual machine comprises: the cluster name of the first virtual machine;
the virtual machine determining module is configured to determine the second virtual machine according to the cluster name of the first virtual machine.
12. The apparatus of claim 8, further comprising: a first system disk determining module, configured to determine, in a hardware device of the first virtual machine, a system disk of the first virtual machine in a shutdown state of the first virtual machine before the mount module mounts the system disk of the first virtual machine to the second virtual machine.
13. A password modification apparatus, comprising:
the receiving module is used for receiving the information of the first virtual machine and the modified password information;
a mounted system disk determining module, configured to determine, according to the information of the first virtual machine, a system disk of the first virtual machine in a mounted disk;
the modification module is used for modifying the password information stored in the system disk of the first virtual machine according to the modified password information;
wherein the modification module comprises:
the namespace determining submodule is used for establishing a namespace of a system disk of the first virtual machine;
and the password modification submodule is used for modifying the password information of the system disk of the first virtual machine in the name space according to the modified password information.
14. A password modification apparatus, characterized in that the apparatus comprises:
one or more processors;
storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method recited in any of claims 1-6.
15. A password modification apparatus, characterized in that the apparatus comprises:
one or more processors;
storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of claim 7.
16. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN201910772453.9A 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium Active CN110471744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910772453.9A CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910772453.9A CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110471744A CN110471744A (en) 2019-11-19
CN110471744B true CN110471744B (en) 2021-11-30

Family

ID=68513250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910772453.9A Active CN110471744B (en) 2019-08-20 2019-08-20 Password modification method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110471744B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111090851B (en) * 2019-12-20 2022-06-21 深信服科技股份有限公司 Method and device for resetting virtual machine authentication information, host machine and storage medium
CN110968852B (en) * 2019-12-20 2022-09-30 深信服科技股份有限公司 Virtual machine password management method, system, equipment and computer storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
CN105389495A (en) * 2015-11-03 2016-03-09 国云科技股份有限公司 Method for externally resetting password of windows virtual machine
CN105468433A (en) * 2015-11-19 2016-04-06 北京北信源软件股份有限公司 Method and system for acquiring disc data of virtual machines
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
CN107291525A (en) * 2016-04-01 2017-10-24 华为技术有限公司 A kind of method, host and system for disposing virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
CN105389495A (en) * 2015-11-03 2016-03-09 国云科技股份有限公司 Method for externally resetting password of windows virtual machine
CN105468433A (en) * 2015-11-19 2016-04-06 北京北信源软件股份有限公司 Method and system for acquiring disc data of virtual machines
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
CN107291525A (en) * 2016-04-01 2017-10-24 华为技术有限公司 A kind of method, host and system for disposing virtual machine
CN109002344A (en) * 2018-06-12 2018-12-14 广东睿江云计算股份有限公司 A kind of method of cloud management platform resetting KVM virtual machine password

Also Published As

Publication number Publication date
CN110471744A (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN106371894B (en) Configuration method and device and data processing server
CN111782339B (en) Container creation method and device, electronic equipment and storage medium
CN111290827B (en) Data processing method, device and server
US11327809B2 (en) Virtual machine memory removal increment selection
CN108073423B (en) Accelerator loading method and system and accelerator loading device
US10901749B2 (en) Running a kernel-dependent application in a container
CN109960569B (en) Virtualization processing method and device
CN110471744B (en) Password modification method, device, equipment and computer readable storage medium
US20160062757A1 (en) Virtual appliance deployment
CN111209080A (en) Transparent transmission method for graphic processor
CN113010265A (en) Pod scheduling method, scheduler, memory plug-in and system
EP3572940A1 (en) Method and device for scheduling vcpu thread
US9924002B1 (en) Managing stateless processes
US11249780B2 (en) VM creation by installation media probe
US8886900B2 (en) Legacy data management
US20140130045A1 (en) Instantiating virtual appliances
US9201699B2 (en) Decommissioning virtual appliances
CN115714706A (en) Access acceleration system and method based on embedded H5, storage medium and electronic equipment
CN114679465A (en) Resource operation method and device, electronic equipment and storage medium
US11126371B2 (en) Caching file data within a clustered computing system
WO2020029995A1 (en) Application upgrading through sharing dependencies
CN113821157A (en) Local disk mounting method, device, equipment and storage medium
CN113157299B (en) Resource allocation method and system
US20240095085A1 (en) Deploying Application Containers of a Distributed Service
CN117421295A (en) Data migration method and device of data disk, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant