htpasswd.py 2.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879
  1. # -*- coding: utf-8 -*-
  2. #
  3. # This file is part of Radicale Server - Calendar Server
  4. # Copyright © 2008 Nicolas Kandel
  5. # Copyright © 2008 Pascal Halter
  6. # Copyright © 2008-2013 Guillaume Ayoub
  7. #
  8. # This library is free software: you can redistribute it and/or modify
  9. # it under the terms of the GNU General Public License as published by
  10. # the Free Software Foundation, either version 3 of the License, or
  11. # (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License
  19. # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
  20. """
  21. Htpasswd authentication.
  22. Load the list of login/password couples according a the configuration file
  23. created by Apache ``htpasswd`` command. Plain-text, crypt and sha1 are
  24. supported, but md5 is not (see ``htpasswd`` man page to understand why).
  25. """
  26. import base64
  27. import hashlib
  28. import os
  29. from .. import config
  30. FILENAME = os.path.expanduser(config.get("auth", "htpasswd_filename"))
  31. ENCRYPTION = config.get("auth", "htpasswd_encryption")
  32. def _plain(hash_value, password):
  33. """Check if ``hash_value`` and ``password`` match using plain method."""
  34. return hash_value == password
  35. def _crypt(hash_value, password):
  36. """Check if ``hash_value`` and ``password`` match using crypt method."""
  37. # The ``crypt`` module is only present on Unix, import if needed
  38. import crypt
  39. return crypt.crypt(password, hash_value) == hash_value
  40. def _sha1(hash_value, password):
  41. """Check if ``hash_value`` and ``password`` match using sha1 method."""
  42. hash_value = hash_value.replace("{SHA}", "").encode("ascii")
  43. password = password.encode(config.get("encoding", "stock"))
  44. sha1 = hashlib.sha1() # pylint: disable=E1101
  45. sha1.update(password)
  46. return sha1.digest() == base64.b64decode(hash_value)
  47. def _ssha(hash_salt_value, password):
  48. """Check if ``hash_salt_value`` and ``password`` match using salted sha1 method."""
  49. hash_salt_value = hash_salt_value.replace("{SSHA}", "").encode("ascii").decode('base64')
  50. password = password.encode(config.get("encoding", "stock"))
  51. hash_value = hash_salt_value[:20]
  52. salt_value = hash_salt_value[20:]
  53. sha1 = hashlib.sha1() # pylint: disable=E1101
  54. sha1.update(password)
  55. sha1.update(salt_value)
  56. return sha1.digest() == hash_value
  57. def is_authenticated(user, password):
  58. """Check if ``user``/``password`` couple is valid."""
  59. for line in open(FILENAME).readlines():
  60. if line.strip():
  61. login, hash_value = line.strip().split(":")
  62. if login == user:
  63. return globals()["_%s" % ENCRYPTION](hash_value, password)
  64. return False