X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;ds=sidebyside;f=update.cgi;h=ddb8052be31984a74df35d58128d01b357e2fc4f;hb=fc89d53cd2270e917c1ef90f8357dcb326a1c04c;hp=13d847b1a984ac6d79803c7092508db4d1da72f8;hpb=e9a3d262aa18e6469b9372741210014f51b0c9a7;p=mirror%2Fuserdir-ldap-cgi.git
diff --git a/update.cgi b/update.cgi
index 13d847b..ddb8052 100755
--- a/update.cgi
+++ b/update.cgi
@@ -10,11 +10,13 @@ use strict vars;
use CGI;
use Data::UUID;
use Digest::HMAC_SHA1 qw(hmac_sha1_hex);
+use Digest::MD5 qw(md5_hex);
use Util;
use English;
use URI::Escape;
use Crypt::PasswdMD5;
use Net::LDAP qw(LDAP_SUCCESS LDAP_PROTOCOL_ERROR);
+use Net::LDAP::Util qw(ldap_explode_dn);
my %config = &Util::ReadConfigFile;
@@ -42,7 +44,7 @@ sub DieHandler {
$ldap->unbind if (defined($ldap));
}
-$SIG{__DIE__} = \&DieHandler;
+#$SIG{__DIE__} = \&DieHandler;
$ldap = Net::LDAP->new($config{ldaphost});
&Util::UpgradeConnection($ldap) unless $config{usessl} eq 'False';
@@ -144,7 +146,7 @@ if (!($query->param('doupdate'))) {
my $confirmstring = '';
my $sudopassword = '';
for my $e(@{$entry->{'sudopassword'}}) {
- my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$/);
+ my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*-]+) ([^ ]+)$/);
unless (defined $uuid) {
$sudopassword .= "
Unparseable line! |
\n";
next;
@@ -207,7 +209,7 @@ if (!($query->param('doupdate'))) {
# Actually update stuff...
- my ($newpassword, $newstaddress, $newwebpassword);
+ my ($newpassword, $newstaddress, $newwebpassword, $newrtcpassword);
# Good god, why would we want to do that here? it breaks password setting
# etc, and it doesn't prevent people from setting eveil stuff in ldap
@@ -240,19 +242,34 @@ if (!($query->param('doupdate'))) {
if ($query->param('newwebpass') && $query->param('newwebpassvrfy')) {
if ($query->param('newwebpass') ne $query->param('newwebpassvrfy')) {
# passwords don't match...
- &Util::HTMLError("The passwords you specified do not match. Please go back and try again.");
+ &Util::HTMLError("The web-passwords you specified do not match. Please go back and try again.");
}
my ($r, $msg) = &Util::checkPasswordQuality($query->param('newwebpass'), undef, [@ldapinfo_for_pwcheck]);
if ($r) {
- &Util::HTMLError("Password check failed: $msg. Please go back and try again.");
+ &Util::HTMLError("Password check failed for web-password: $msg. Please go back and try again.");
}
# create a md5 crypted password
- $newwebpassword = apache_md5_crypt($query->param('newwebpass'), &Util::CreateCryptSalt());
+ $newwebpassword = apache_md5_crypt($query->param('newwebpass'), &Util::CreateCryptSalt(1, 1));
&Util::LDAPUpdate($ldap, $editdn, 'webPassword', $newwebpassword);
}
+ if ($query->param('newrtcpass') && $query->param('newrtcpassvrfy')) {
+ if ($query->param('newrtcpass') ne $query->param('newrtcpassvrfy')) {
+ # passwords don't match...
+ &Util::HTMLError("The rtc-passwords you specified do not match. Please go back and try again.");
+ }
+
+ my ($r, $msg) = &Util::checkPasswordQuality($query->param('newrtcpass'), undef, [@ldapinfo_for_pwcheck]);
+ if ($r) {
+ &Util::HTMLError("Password check failed for rtc-password: $msg. Please go back and try again.");
+ }
+ # create a md5 crypted password
+ $newrtcpassword = &md5_hex( ldap_explode_dn($editdn)->[0]{UID} . '@debian.org:rtc.debian.org:' . $query->param('newrtcpass') );
+
+ &Util::LDAPUpdate($ldap, $editdn, 'rtcPassword', $newrtcpassword);
+ }
$newstaddress = $query->param('staddress');
$newstaddress =~ s/\n/\$/m;