ldap-chpw-cgi/index.py

102 lines
3.7 KiB
Python
Raw Permalink Normal View History

2015-10-21 16:05:38 +02:00
#!/usr/bin/env python3
import cgi, cgitb
import re
import sys, os
from subprocess import check_output, Popen, PIPE, STDOUT, CalledProcessError
2015-10-19 18:29:41 +02:00
from os.path import expanduser
cgitb.enable()
home_dir = expanduser("~")
2015-10-21 16:05:38 +02:00
os.environ['HOME'] = home_dir
2015-10-19 18:29:41 +02:00
def check_form(formvars, form):
for varname in formvars:
if varname not in form.keys():
return False
else:
if type(form[varname].value) is not type(''):
return None
return True
def read_template_file(filename, **vars):
2015-10-21 16:05:38 +02:00
with open('tpl/' + filename, mode='r', encoding='utf-8') as f:
2015-10-19 18:29:41 +02:00
template = f.read()
for key in vars:
template = template.replace('{$' + key + '}', vars[key])
return template
def check_oldpw(accountname, oldpass):
try:
2015-10-21 16:05:38 +02:00
dumpvuserargs = ['dumpvuser', accountname]
userdump = check_output(dumpvuserargs).strip().decode('utf-8')
m = re.search('Encrypted-Password: (\$([^\$]+)\$([^\$]+)\$([^\$\n]+))', userdump)
if None == m:
return False
oldhash = m.group(1)
hashtype = m.group(2)
salt = m.group(3)
2015-10-21 16:08:38 +02:00
except CalledProcessError:
2015-10-21 16:05:38 +02:00
return False
opensslargs = ['openssl', 'passwd', '-' + hashtype, '-salt', salt, '-stdin']
p = Popen(opensslargs, stdin=PIPE, stdout=PIPE, stderr=STDOUT)
p.stdin.write(oldpass.encode('utf-8') + b'\n')
p.stdin.close()
if p.wait() == 0:
newhash = p.stdout.readline().strip().decode('utf-8');
if newhash == oldhash:
return True
2015-10-21 16:05:38 +02:00
return False
2015-10-19 18:29:41 +02:00
def generate_headers():
return "Content-Type: text/html; charset=utf-8\n"
def main():
main_content = ''
form = cgi.FieldStorage()
if 'submit' in form.keys():
formvars = ['accountname', 'oldpass', 'newpass', 'newpass2']
form_ok = check_form(formvars, form)
if form_ok == True:
accountname = form['accountname'].value
accountname = accountname.split("@")[0]
oldpass = form['oldpass'].value
newpass = form['newpass'].value
newpass2 = form['newpass2'].value
if newpass == newpass2:
2015-10-21 16:05:38 +02:00
if check_oldpw(accountname, oldpass):
2015-10-19 18:29:41 +02:00
vpasswdargs = ['vpasswd', accountname]
p = Popen(vpasswdargs, stdin=PIPE, stdout=PIPE, stderr=STDOUT)
2015-10-21 16:05:38 +02:00
p.stdin.write(newpass.encode('utf-8') + b'\n')
p.stdin.write(newpass2.encode('utf-8') + b'\n')
2015-10-19 18:29:41 +02:00
p.stdin.close()
if p.wait() == 0:
# We did it
main_content = read_template_file('success.tpl')
else:
main_content = read_template_file('fail.tpl', message=cgi.escape(p.stdout.read()))
else:
2017-06-18 13:59:31 +02:00
main_content = read_template_file('fail.tpl', message='Benutzer nicht gefunden oder Passwort falsch.')
2015-10-19 18:29:41 +02:00
else:
2017-06-18 13:59:31 +02:00
main_content = read_template_file('fail.tpl', message='Passwörter stimmen nicht überein.')
2015-10-19 18:29:41 +02:00
elif form_ok == False:
2017-06-18 13:59:31 +02:00
main_content = read_template_file('fail.tpl', message='Alle Felder müssen ausgefüllt werden.')
2015-10-19 18:29:41 +02:00
else:
2017-06-18 13:59:31 +02:00
main_content = read_template_file('fail.tpl', message='Ungültiger Datentyp.')
2015-10-19 18:29:41 +02:00
else:
# Submit button not pressed, show form
formaction = cgi.escape("https://" + os.environ["HTTP_HOST"] + os.environ["REQUEST_URI"])
form = read_template_file('form.tpl', formaction=formaction)
main_content = form
response = generate_headers() + "\n"
response += read_template_file('main.tpl', main_content=main_content)
2015-10-21 16:05:38 +02:00
sys.stdout.buffer.write(response.encode('utf-8'))
2015-10-19 18:29:41 +02:00
if __name__ == "__main__":
main()