htpasswd.py 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. # -*- coding: utf-8 -*-
  2. #
  3. # This file is part of Radicale Server - Calendar Server
  4. # Copyright © 2008-2010 Guillaume Ayoub
  5. # Copyright © 2008 Nicolas Kandel
  6. # Copyright © 2008 Pascal Halter
  7. #
  8. # This library is free software: you can redistribute it and/or modify
  9. # it under the terms of the GNU General Public License as published by
  10. # the Free Software Foundation, either version 3 of the License, or
  11. # (at your option) any later version.
  12. #
  13. # This library is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License
  19. # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
  20. """
  21. Htpasswd ACL.
  22. Load the list of login/password couples according a the configuration file
  23. created by Apache ``htpasswd`` command. Plain-text, crypt and sha1 are
  24. supported, but md5 is not (see ``htpasswd`` man page to understand why).
  25. """
  26. import base64
  27. import crypt
  28. import hashlib
  29. from radicale import config
  30. FILENAME = config.get("acl", "filename")
  31. CHECK_PASSWORD = locals()["_%s" % config.get("acl", "encryption")]
  32. def _plain(hash_value, password):
  33. """Check if ``hash_value`` and ``password`` match using plain method."""
  34. return hash_value == password
  35. def _crypt(hash_value, password):
  36. """Check if ``hash_value`` and ``password`` match using crypt method."""
  37. return crypt.crypt(password, hash_value) == hash_value
  38. def _sha1(hash_value, password):
  39. """Check if ``hash_value`` and ``password`` match using sha1 method."""
  40. hash_value = hash_value.replace("{SHA}", "").encode("ascii")
  41. password = password.encode(config.get("encoding", "stock"))
  42. sha1 = hashlib.sha1()
  43. sha1.update(password)
  44. return sha1.digest() == base64.b64decode(hash_value)
  45. def has_right(user, password):
  46. """Check if ``user``/``password`` couple is valid."""
  47. for line in open(FILENAME).readlines():
  48. if line.strip():
  49. login, hash_value = line.strip().split(":")
  50. if login == user:
  51. return CHECK_PASSWORD(hash_value, password)
  52. return False