X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=update.cgi;h=d109bf77fb09013009c7a9ed44c725de1c077819;hb=0b08aabbe6f72411bb2c3c6e7b2407e7dfa29f03;hp=c4d121de6972a32bf34000584fd3e1be64ba5a00;hpb=bb937c32bd6f82064c59c56ef4dc718deb7b581e;p=mirror%2Fuserdir-ldap-cgi.git
diff --git a/update.cgi b/update.cgi
index c4d121d..d109bf7 100755
--- a/update.cgi
+++ b/update.cgi
@@ -25,8 +25,16 @@ my $proto = ($ENV{HTTPS} ? "https" : "http");
my $id = $query->param('id');
my $authtoken = $query->param('authtoken');
-my $password = &Util::CheckAuthToken($authtoken);
-my $editdn = $query->param('editdn');
+
+my $password = undef;
+
+if ($authtoken || $id) {
+ $password = Util::TouchAuthToken($authtoken, $id);
+} else {
+ $password = '';
+ $id = '';
+ $authtoken = '';
+}
if ($proto eq "http" || !($id && $password)) {
print "Location: https://$ENV{SERVER_NAME}/$config{webloginhtml}\n\n";
@@ -45,6 +53,7 @@ sub DieHandler {
}
#$SIG{__DIE__} = \&DieHandler;
+my $editdn = "uid=$id,$config{basedn}";
$ldap = Net::LDAP->new($config{ldaphost});
&Util::UpgradeConnection($ldap) unless $config{usessl} eq 'False';
@@ -146,7 +155,7 @@ if (!($query->param('doupdate'))) {
my $confirmstring = '';
my $sudopassword = '';
for my $e(@{$entry->{'sudopassword'}}) {
- my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$/);
+ my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*-]+) ([^ ]+)$/);
unless (defined $uuid) {
$sudopassword .= "
Unparseable line! |
\n";
next;
@@ -209,7 +218,7 @@ if (!($query->param('doupdate'))) {
# Actually update stuff...
- my ($newpassword, $newstaddress, $newwebpassword, $newvoippassword);
+ my ($newpassword, $newstaddress, $newwebpassword, $newrtcpassword);
# Good god, why would we want to do that here? it breaks password setting
# etc, and it doesn't prevent people from setting eveil stuff in ldap
@@ -255,20 +264,20 @@ if (!($query->param('doupdate'))) {
&Util::LDAPUpdate($ldap, $editdn, 'webPassword', $newwebpassword);
}
- if ($query->param('newvoippass') && $query->param('newvoippassvrfy')) {
- if ($query->param('newvoippass') ne $query->param('newvoippassvrfy')) {
+ if ($query->param('newrtcpass') && $query->param('newrtcpassvrfy')) {
+ if ($query->param('newrtcpass') ne $query->param('newrtcpassvrfy')) {
# passwords don't match...
- &Util::HTMLError("The voip-passwords you specified do not match. Please go back and try again.");
+ &Util::HTMLError("The rtc-passwords you specified do not match. Please go back and try again.");
}
- my ($r, $msg) = &Util::checkPasswordQuality($query->param('newvoippass'), undef, [@ldapinfo_for_pwcheck]);
+ my ($r, $msg) = &Util::checkPasswordQuality($query->param('newrtcpass'), undef, [@ldapinfo_for_pwcheck]);
if ($r) {
- &Util::HTMLError("Password check failed for voip-password: $msg. Please go back and try again.");
+ &Util::HTMLError("Password check failed for rtc-password: $msg. Please go back and try again.");
}
# create a md5 crypted password
- $newvoippassword = &md5_hex( ldap_explode_dn($editid)->[0]{UID} . '@debian.org:sip.debian.org:' . $query->param('newvoippass') );
+ $newrtcpassword = &md5_hex( ldap_explode_dn($editdn)->[0]{UID} . '@debian.org:rtc.debian.org:' . $query->param('newrtcpass') );
- &Util::LDAPUpdate($ldap, $editdn, 'voipPassword', $newvoippassword);
+ &Util::LDAPUpdate($ldap, $editdn, 'rtcPassword', $newrtcpassword);
}
$newstaddress = $query->param('staddress');
@@ -399,8 +408,7 @@ if (!($query->param('doupdate'))) {
&Util::LDAPUpdate($ldap, $editdn, 'sudoPassword', \@keepsudo);
# when we are done, reload the page with the updated details.
- my $url = "https://$ENV{SERVER_NAME}/$config{webupdateurl}?id=$id&authtoken=$authtoken&editdn=";
- $url .= uri_escape($editdn, "\x00-\x40\x7f-\xff");
+ my $url = "https://$ENV{SERVER_NAME}/$config{webupdateurl}?id=$id;authtoken=$authtoken";
print "Location: $url\n\n";
}