X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=update.cgi;h=ddb8052be31984a74df35d58128d01b357e2fc4f;hb=ec323a550634c324c2d02804795af4364656de25;hp=f0ff1acbdc140248413930ad4837de4efb30c148;hpb=a5c0027c487d7b6e1ed6a82dbe3bbdebbaa51c12;p=mirror%2Fuserdir-ldap-cgi.git diff --git a/update.cgi b/update.cgi index f0ff1ac..ddb8052 100755 --- a/update.cgi +++ b/update.cgi @@ -10,10 +10,13 @@ use strict vars; use CGI; use Data::UUID; use Digest::HMAC_SHA1 qw(hmac_sha1_hex); +use Digest::MD5 qw(md5_hex); use Util; use English; use URI::Escape; +use Crypt::PasswdMD5; use Net::LDAP qw(LDAP_SUCCESS LDAP_PROTOCOL_ERROR); +use Net::LDAP::Util qw(ldap_explode_dn); my %config = &Util::ReadConfigFile; @@ -41,7 +44,7 @@ sub DieHandler { $ldap->unbind if (defined($ldap)); } -$SIG{__DIE__} = \&DieHandler; +#$SIG{__DIE__} = \&DieHandler; $ldap = Net::LDAP->new($config{ldaphost}); &Util::UpgradeConnection($ldap) unless $config{usessl} eq 'False'; @@ -143,7 +146,7 @@ if (!($query->param('doupdate'))) { my $confirmstring = ''; my $sudopassword = ''; for my $e(@{$entry->{'sudopassword'}}) { - my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$/); + my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*-]+) ([^ ]+)$/); unless (defined $uuid) { $sudopassword .= "Unparseable line!\n"; next; @@ -206,7 +209,7 @@ if (!($query->param('doupdate'))) { # Actually update stuff... - my ($newpassword, $newstaddress, $newwebpassword); + my ($newpassword, $newstaddress, $newwebpassword, $newrtcpassword); # Good god, why would we want to do that here? it breaks password setting # etc, and it doesn't prevent people from setting eveil stuff in ldap @@ -239,19 +242,34 @@ if (!($query->param('doupdate'))) { if ($query->param('newwebpass') && $query->param('newwebpassvrfy')) { if ($query->param('newwebpass') ne $query->param('newwebpassvrfy')) { # passwords don't match... - &Util::HTMLError("The passwords you specified do not match. Please go back and try again."); + &Util::HTMLError("The web-passwords you specified do not match. Please go back and try again."); } my ($r, $msg) = &Util::checkPasswordQuality($query->param('newwebpass'), undef, [@ldapinfo_for_pwcheck]); if ($r) { - &Util::HTMLError("Password check failed: $msg. Please go back and try again."); + &Util::HTMLError("Password check failed for web-password: $msg. Please go back and try again."); } # create a md5 crypted password - $newwebpassword = '{crypt}'.crypt($query->param('newwebpass'), &Util::CreateCryptSalt(1)); + $newwebpassword = apache_md5_crypt($query->param('newwebpass'), &Util::CreateCryptSalt(1, 1)); &Util::LDAPUpdate($ldap, $editdn, 'webPassword', $newwebpassword); } + if ($query->param('newrtcpass') && $query->param('newrtcpassvrfy')) { + if ($query->param('newrtcpass') ne $query->param('newrtcpassvrfy')) { + # passwords don't match... + &Util::HTMLError("The rtc-passwords you specified do not match. Please go back and try again."); + } + + my ($r, $msg) = &Util::checkPasswordQuality($query->param('newrtcpass'), undef, [@ldapinfo_for_pwcheck]); + if ($r) { + &Util::HTMLError("Password check failed for rtc-password: $msg. Please go back and try again."); + } + # create a md5 crypted password + $newrtcpassword = &md5_hex( ldap_explode_dn($editdn)->[0]{UID} . '@debian.org:rtc.debian.org:' . $query->param('newrtcpass') ); + + &Util::LDAPUpdate($ldap, $editdn, 'rtcPassword', $newrtcpassword); + } $newstaddress = $query->param('staddress'); $newstaddress =~ s/\n/\$/m;