Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(445)

Side by Side Diff: third_party/apache-win32/bin/dbmmanage.pl

Issue 147313008: Check Win32 Apache+PHP into third_party (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 #
2 # Licensed to the Apache Software Foundation (ASF) under one or more
3 # contributor license agreements. See the NOTICE file distributed with
4 # this work for additional information regarding copyright ownership.
5 # The ASF licenses this file to You under the Apache License, Version 2.0
6 # (the "License"); you may not use this file except in compliance with
7 # the License. You may obtain a copy of the License at
8 #
9 # http://www.apache.org/licenses/LICENSE-2.0
10 #
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16
17 #for more functionality see the HTTPD::UserAdmin module:
18 # http://www.perl.com/CPAN/modules/by-module/HTTPD/HTTPD-Tools-x.xx.tar.gz
19 #
20 # usage: dbmmanage <DBMfile> <command> <user> <password> <groups> <comment>
21
22 package dbmmanage;
23 # -ldb -lndbm -lgdbm -lsdbm
24 BEGIN { @AnyDBM_File::ISA = qw(SDBM_File) }
25 use strict;
26 use Fcntl;
27 use AnyDBM_File ();
28
29 sub usage {
30 my $cmds = join "|", sort keys %dbmc::;
31 die <<SYNTAX;
32 Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]]
33
34 where enc is -d for crypt encryption (default except on Win32, Netware)
35 -m for MD5 encryption (default on Win32, Netware)
36 -s for SHA1 encryption
37 -p for plaintext
38
39 command is one of: $cmds
40
41 pw of . for update command retains the old password
42 pw of - (or blank) for update command prompts for the password
43
44 groups or comment of . (or blank) for update command retains old values
45 groups or comment of - for update command clears the existing value
46 groups or comment of - for add and adduser commands is the empty value
47 SYNTAX
48 }
49
50 sub need_sha1_crypt {
51 if (!eval ('require "Digest/SHA1.pm";')) {
52 print STDERR <<SHAERR;
53 dbmmanage SHA1 passwords require the interface or the module Digest::SHA1
54 available from CPAN:
55
56 http://www.cpan.org/modules/by-module/Digest/Digest-MD5-2.12.tar.gz
57
58 Please install Digest::SHA1 and try again, or use a different crypt option:
59
60 SHAERR
61 usage();
62 }
63 }
64
65 sub need_md5_crypt {
66 if (!eval ('require "Crypt/PasswdMD5.pm";')) {
67 print STDERR <<MD5ERR;
68 dbmmanage MD5 passwords require the module Crypt::PasswdMD5 available from CPAN
69
70 http://www.cpan.org/modules/by-module/Crypt/Crypt-PasswdMD5-1.1.tar.gz
71
72 Please install Crypt::PasswdMD5 and try again, or use a different crypt option:
73
74 MD5ERR
75 usage();
76 }
77 }
78
79 # if your osname is in $newstyle_salt, then use new style salt (starts with '_' and contains
80 # four bytes of iteration count and four bytes of salt). Otherwise, just use
81 # the traditional two-byte salt.
82 # see the man page on your system to decide if you have a newer crypt() lib.
83 # I believe that 4.4BSD derived systems do (at least BSD/OS 2.0 does).
84 # The new style crypt() allows up to 20 characters of the password to be
85 # significant rather than only 8.
86 #
87 my $newstyle_salt_platforms = join '|', qw{bsdos}; #others?
88 my $newstyle_salt = $^O =~ /(?:$newstyle_salt_platforms)/;
89
90 # Some platforms just can't crypt() for Apache
91 #
92 my $crypt_not_supported_platforms = join '|', qw{MSWin32 NetWare}; #others?
93 my $crypt_not_supported = $^O =~ /(?:$crypt_not_supported_platforms)/;
94
95 my $crypt_method = "crypt";
96
97 if ($crypt_not_supported) {
98 $crypt_method = "md5";
99 }
100
101 # Some platforms won't jump through our favorite hoops
102 #
103 my $not_unix_platforms = join '|', qw{MSWin32 NetWare}; #others?
104 my $not_unix = $^O =~ /(?:$not_unix_platforms)/;
105
106 if ($crypt_not_supported) {
107 $crypt_method = "md5";
108 }
109
110 if (@ARGV[0] eq "-d") {
111 shift @ARGV;
112 if ($crypt_not_supported) {
113 print STDERR
114 "Warning: Apache/$^O does not support crypt()ed passwords!\n\n";
115 }
116 $crypt_method = "crypt";
117 }
118
119 if (@ARGV[0] eq "-m") {
120 shift @ARGV;
121 $crypt_method = "md5";
122 }
123
124 if (@ARGV[0] eq "-p") {
125 shift @ARGV;
126 if (!$crypt_not_supported) {
127 print STDERR
128 "Warning: Apache/$^O does not support plaintext passwords!\n\n";
129 }
130 $crypt_method = "plain";
131 }
132
133 if (@ARGV[0] eq "-s") {
134 shift @ARGV;
135 need_sha1_crypt();
136 $crypt_method = "sha1";
137 }
138
139 if ($crypt_method eq "md5") {
140 need_md5_crypt();
141 }
142
143 my($file,$command,$key,$crypted_pwd,$groups,$comment) = @ARGV;
144
145 usage() unless $file and $command and defined &{$dbmc::{$command}};
146
147 # remove extension if any
148 my $chop = join '|', qw{db.? pag dir};
149 $file =~ s/\.($chop)$//;
150
151 my $is_update = $command eq "update";
152 my %DB = ();
153 my @range = ();
154 my($mode, $flags) = $command =~
155 /^(?:view|check)$/ ? (0644, O_RDONLY) : (0644, O_RDWR|O_CREAT);
156
157 tie (%DB, "AnyDBM_File", $file, $flags, $mode) || die "Can't tie $file: $!";
158 dbmc->$command();
159 untie %DB;
160
161
162 my $x;
163 sub genseed {
164 my $psf;
165 if ($not_unix) {
166 srand (time ^ $$ or time ^ ($$ + ($$ << 15)));
167 }
168 else {
169 for (qw(-xlwwa -le)) {
170 `ps $_ 2>/dev/null`;
171 $psf = $_, last unless $?;
172 }
173 srand (time ^ $$ ^ unpack("%L*", `ps $psf | gzip -f`));
174 }
175 @range = (qw(. /), '0'..'9','a'..'z','A'..'Z');
176 $x = int scalar @range;
177 }
178
179 sub randchar {
180 join '', map $range[rand $x], 1..shift||1;
181 }
182
183 sub saltpw_crypt {
184 genseed() unless @range;
185 return $newstyle_salt ?
186 join '', "_", randchar, "a..", randchar(4) :
187 randchar(2);
188 }
189
190 sub cryptpw_crypt {
191 my ($pw, $salt) = @_;
192 $salt = saltpw_crypt unless $salt;
193 crypt $pw, $salt;
194 }
195
196 sub saltpw_md5 {
197 genseed() unless @range;
198 randchar(8);
199 }
200
201 sub cryptpw_md5 {
202 my($pw, $salt) = @_;
203 $salt = saltpw_md5 unless $salt;
204 Crypt::PasswdMD5::apache_md5_crypt($pw, $salt);
205 }
206
207 sub cryptpw_sha1 {
208 my($pw, $salt) = @_;
209 '{SHA}' . Digest::SHA1::sha1_base64($pw) . "=";
210 }
211
212 sub cryptpw {
213 if ($crypt_method eq "md5") {
214 return cryptpw_md5(@_);
215 } elsif ($crypt_method eq "sha1") {
216 return cryptpw_sha1(@_);
217 } elsif ($crypt_method eq "crypt") {
218 return cryptpw_crypt(@_);
219 }
220 @_[0]; # otherwise return plaintext
221 }
222
223 sub getpass {
224 my $prompt = shift || "Enter password:";
225
226 unless($not_unix) {
227 open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n";
228 system "stty -echo;";
229 }
230
231 my($c,$pwd);
232 print STDERR $prompt;
233 while (($c = getc(STDIN)) ne '' and $c ne "\n" and $c ne "\r") {
234 $pwd .= $c;
235 }
236
237 system "stty echo" unless $not_unix;
238 print STDERR "\n";
239 die "Can't use empty password!\n" unless length $pwd;
240 return $pwd;
241 }
242
243 sub dbmc::update {
244 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
245 $crypted_pwd = (split /:/, $DB{$key}, 3)[0] if $crypted_pwd eq '.';
246 $groups = (split /:/, $DB{$key}, 3)[1] if !$groups || $groups eq '.';
247 $comment = (split /:/, $DB{$key}, 3)[2] if !$comment || $comment eq '.';
248 if (!$crypted_pwd || $crypted_pwd eq '-') {
249 dbmc->adduser;
250 }
251 else {
252 dbmc->add;
253 }
254 }
255
256 sub dbmc::add {
257 die "Can't use empty password!\n" unless $crypted_pwd;
258 unless($is_update) {
259 die "Sorry, user `$key' already exists!\n" if $DB{$key};
260 }
261 $groups = '' if $groups eq '-';
262 $comment = '' if $comment eq '-';
263 $groups .= ":" . $comment if $comment;
264 $crypted_pwd .= ":" . $groups if $groups;
265 $DB{$key} = $crypted_pwd;
266 my $action = $is_update ? "updated" : "added";
267 print "User $key $action with password encrypted to $DB{$key} using $crypt_m ethod\n";
268 }
269
270 sub dbmc::adduser {
271 my $value = getpass "New password:";
272 die "They don't match, sorry.\n" unless getpass("Re-type new password:") eq $value;
273 $crypted_pwd = cryptpw $value;
274 dbmc->add;
275 }
276
277 sub dbmc::delete {
278 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
279 delete $DB{$key}, print "`$key' deleted\n";
280 }
281
282 sub dbmc::view {
283 print $key ? "$key:$DB{$key}\n" : map { "$_:$DB{$_}\n" if $DB{$_} } keys %DB ;
284 }
285
286 sub dbmc::check {
287 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key};
288 my $chkpass = (split /:/, $DB{$key}, 3)[0];
289 my $testpass = getpass();
290 if (substr($chkpass, 0, 6) eq '$apr1$') {
291 need_md5_crypt;
292 $crypt_method = "md5";
293 } elsif (substr($chkpass, 0, 5) eq '{SHA}') {
294 need_sha1_crypt;
295 $crypt_method = "sha1";
296 } elsif (length($chkpass) == 13 && $chkpass ne $testpass) {
297 $crypt_method = "crypt";
298 } else {
299 $crypt_method = "plain";
300 }
301 print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass
302 ? " password ok\n" : " password mismatch\n");
303 }
304
305 sub dbmc::import {
306 while(defined($_ = <STDIN>) and chomp) {
307 ($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4;
308 dbmc->add;
309 }
310 }
311
OLDNEW
« no previous file with comments | « third_party/apache-win32/bin/apr_ldap-1.dll ('k') | third_party/apache-win32/bin/htcacheclean.exe » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698