summaryrefslogtreecommitdiffstats
path: root/userconfig/unixauthdb.py
diff options
context:
space:
mode:
authortpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2010-03-13 05:43:39 +0000
committertpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2010-03-13 05:43:39 +0000
commit19ae07d0d443ff8b777f46bcbe97119483356bfd (patch)
treedae169167c23ba7c61814101995de21d6abac2e8 /userconfig/unixauthdb.py
downloadtde-guidance-19ae07d0d443ff8b777f46bcbe97119483356bfd.tar.gz
tde-guidance-19ae07d0d443ff8b777f46bcbe97119483356bfd.zip
Added KDE3 version of KDE Guidance utilities
git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/applications/kde-guidance@1102646 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'userconfig/unixauthdb.py')
-rwxr-xr-xuserconfig/unixauthdb.py1154
1 files changed, 1154 insertions, 0 deletions
diff --git a/userconfig/unixauthdb.py b/userconfig/unixauthdb.py
new file mode 100755
index 0000000..92ffcc8
--- /dev/null
+++ b/userconfig/unixauthdb.py
@@ -0,0 +1,1154 @@
+#!/usr/bin/python
+###########################################################################
+# Copyright (C) 2004-2006 by Simon Edwards
+# <simon@simonzone.com>
+#
+# Copyright: See COPYING file that comes with this distribution
+#
+###########################################################################
+# An API for querying and modifying the authorisation database on Unix systems.
+#
+# The first function that you need to use is getContext(). It returns a
+# Context object that contains all relevant information concerning
+# the current authorisation database on this machine.
+
+import crypt
+import random
+import fcntl
+import time
+import os
+import os.path
+import stat
+import shutil
+import codecs
+import locale
+import tempfile
+
+ldaperror = ""
+try:
+ import ldap
+except ImportError:
+ ldaperror = "The LDAP Python Module is not installed, but needed to use LDAP. Install it."
+
+def createTempFile(origfile):
+ origstat = os.stat(origfile)
+ tmp_prefix = os.path.basename(origfile) + "."
+ tmp_dir = os.path.dirname(origfile)
+ try:
+ ret = tempfile.mkstemp(prefix=tmp_prefix, dir=tmp_dir)
+ except:
+ raise IOError, "Unable to create a new temporary file for " + origfile
+ (fd, tmpfile) = ret
+ shutil.copymode(origfile, tmpfile)
+ os.chown(tmpfile, origstat.st_uid, origstat.st_gid)
+
+ return ret
+
+def getContext(editmode=False):
+ """Get a Context object describing the system's authorisation database.
+
+ Parameters:
+
+ editmode - Set to true if you also wish change the information in this
+ context. Root access is required. Defaults to false.
+
+ Returns a Context object.
+
+ If the environmental variable "USERCONFIG_USES_LDAP" is set to "true",
+ userconfig will use LDAP as the backend. This feature is in development
+ and using it is not recommended, it won't work.
+ """
+
+ # Detect what kind of auth system we are running on and create
+ # and initialise the corresponding Context object type.
+
+ # Check for Mandrake
+
+ # Check libuser.conf
+ try:
+ if os.environ["USERCONFIG_USES_LDAP"].lower() == "true":
+ use_ldap = True
+ except KeyError,e:
+ use_ldap = False
+ if not use_ldap:
+ return PwdContext(editmode)
+ else:
+ print "==================================================================="
+ print "Warning:"
+ print "\tYou are using LDAP as backend. This feature is under development"
+ print "\tand it is currently not recommended to use it."
+ print "\tIf you do not want to use LDAP as backend, set the environmental"
+ print "\tvariabale 'USERCONFIG_USES_LDAP' to 'False'."
+ print "==================================================================="
+ return LdapContext(editmode)
+
+###########################################################################
+# Base classes.
+#
+class Context(object):
+ """Contains all of the information about the current authorisation
+ database, plus some useful methods for modify this information.
+
+ """
+ def __init__(self):
+ self._users = []
+ self._groups = []
+ self._shells = None
+ self._setDefaultValues()
+
+ def newUser(self,defaults=False,systemuser=False):
+ """Create a new UnixUser object.
+
+ Creates a new blank UnixUser object. The object is not part of the
+ current Context. You need to add it yourself using addUser().
+
+ Newly allocated UIDs are unique with respect to the list of UnixUser
+ objects in the Context.
+
+ Keyword arguments:
+ defaults -- Set to true if the new object should be filled in with
+ reasonable default values for the UID and username.
+ (default False)
+ systemuser -- Should the new user be allocated a UID from the system
+ range of UIDs. (default is False)
+
+ Returns a new UnixUser object.
+ """
+ newuserobj = self._createUser()
+ if defaults:
+ if systemuser:
+ r = xrange(0,self.last_system_uid)
+ else:
+ r = xrange(self.first_uid,self.last_uid)
+ for candiate in r:
+ for u in self._users:
+ if u.getUID()==candiate:
+ break
+ else:
+ newuserobj.setUID(candiate)
+ break
+
+ if self.lookupUsername(u'new_user') is None:
+ newuserobj.setUsername(u'new_user')
+ else:
+ i = 1
+ while 1:
+ if self.lookupUsername(u'new_user_'+str(i)) is None:
+ newuserobj.setUsername(u'new_user_'+str(i))
+ break
+ i += 1
+ return newuserobj
+
+ def getUsers(self):
+ """Get a list of all existing users.
+
+ Returns an array of UnixUser objects.
+ """
+ #print "USERS:", self._users
+ return self._users[:]
+
+ def getGroups(self):
+ """Get a list of all existing groups.
+
+ Returns an array of UnixGroup objects.
+ """
+ try:
+ self._groups.remove("new_user")
+ except ValueError:
+ print "no user removed"
+ pass
+ return self._groups[:]
+
+ def newGroup(self,defaults=False,systemgroup=False):
+ """Create a new UnixGroup object.
+
+ Creates a new blank UnixGroup object. The object is not part of the
+ current Context. You need to add it yourself using addGroup().
+
+ Newly allocated GIDs are unique with respect to the list of UnixGroup
+ objects in the Context.
+
+ Keyword arguments:
+ defaults -- Set to true if the new object should be filled in with
+ reasonable default values for the GID and groupname.
+ (default False)
+ systemgroup -- Set to True if the newly allocated GID should come
+ from the pool of system group IDs. (default False)
+
+ Returns a new UnixGroup object.
+ """
+ newgroupobj = self._createGroup()
+ if defaults:
+ if systemgroup:
+ r = xrange(0,self.last_system_gid)
+ else:
+ r = xrange(self.first_gid,self.last_gid)
+ for candiate in r:
+ for u in self._groups:
+ if u.getGID()==candiate:
+ break
+ else:
+ newgroupobj.setGID(candiate)
+ break
+ if self.lookupGroupname(u'new_group') is None:
+ newgroupobj.setGroupname(u'new_group')
+ else:
+ i = 1
+ while 1:
+ if self.lookupGroupname(u'new_user_'+str(i)) is None:
+ newgroupobj.setGroupname(u'new_user_'+str(i))
+ break
+ i += 1
+ return newgroupobj
+
+ def _createGroup(self):
+ raise NotImplementedError, "Context.newGroup()"
+
+ def addUser(self,userobj):
+ """Adds the given user to the authorisation database.
+
+ This change only takes effect after calling context.save().
+
+ Keyword arguments:
+ userobj -- The UnixUser object to add.
+ """
+ self._users.append(userobj)
+
+ def addGroup(self,groupobj):
+ """Adds the given group to the authorisation database.
+
+ This change only takes effect after calling context.save().
+
+ Keyword arguments:
+ groupobj -- The UnixGroup object to add.
+ """
+ if groupobj not in self._groups:
+ self._groups.append(groupobj)
+
+ def removeUser(self,userobj):
+ """Removes the given user object from the authorisation database.
+
+ The user is also removed from all groups.
+
+ This change only takes effect after calling context.save().
+ """
+ for g in userobj.getGroups():
+ userobj.removeFromGroup(g)
+
+ self._users.remove(userobj)
+
+ def removeGroup(self,groupobj):
+ """Removes the given group object from the authorisation database.
+
+ All users are removed from the group.
+
+ This change only takes effect after calling context.save().
+ """
+ for u in groupobj.getUsers():
+ u.removeFromGroup(groupobj)
+
+ self._groups.remove(groupobj)
+
+ def lookupUID(self,uid):
+ """Lookup a UnixUser object by its numeric user ID.
+
+ Keyword arguments:
+ uid -- User ID to lookup, integer.
+
+ Returns the matching UnixUser object or None if it was not found.
+ """
+ for user in self._users:
+ if user.getUID()==uid:
+ return user
+ return None
+
+ def lookupUsername(self,username):
+ """Lookup a UnixUser object by username.
+
+ Keyword arguments:
+ username -- Username to lookup, string.
+
+ Returns the matching UnixUser object or None if it was not found.
+ """
+ for user in self._users:
+ if user.getUsername()==username:
+ return user
+ return None
+
+ def lookupGID(self,gid):
+ """Lookup a UnixGroup object by its numeric group ID.
+
+ Keyword arguments:
+ gid -- Group ID to lookup, integer.
+
+ Returns the matching UnixGroup object or None if it was not found.
+ """
+ for group in self._groups:
+ if group.getGID()==gid:
+ return group
+ return None
+
+ def lookupGroupname(self,groupname):
+ """Lookup a UnixGroup object by groupname.
+
+ Returns the matching UnixGroup object or None if it was not found.
+ """
+ for group in self._groups:
+ if group.getGroupname()==groupname:
+ return group
+ return None
+
+ def getUserShells(self):
+ """Get the list of available login shells.
+
+ Returns an array of strings.
+ """
+ if self._shells is None:
+ self._shells = []
+ fhandle = codecs.open('/etc/shells','r',locale.getpreferredencoding())
+ for l in fhandle.readlines():
+ # TODO: strangely this lets some comented lines slip through
+ if len(l.strip()) > 1 and l.strip()[0] is not "#":
+ # Only show existing shells
+ if os.path.isfile(l.strip()):
+ self._shells.append(l.strip())
+ fhandle.close()
+ return self._shells[:]
+
+ def save(self):
+ """Synchronises the Context with the underlying operating system.
+
+ After a successful save, any changes to the Context will be reflected
+ system wide.
+ """
+ raise NotImplementedError, "Context.save()"
+
+ def createHomeDirectory(self,userobj):
+ if os.path.exists(userobj.getHomeDirectory()):
+ raise IOError, u"Home directory %s already exists." % userobj.getHomeDirectory()
+
+ # Copy the skeleton directory over
+ shutil.copytree(self._getSkeletonDirectory(),userobj.getHomeDirectory(),True)
+
+ # Fix the file ownership stuff
+ uid = userobj.getUID()
+ gid = userobj.getPrimaryGroup().getGID()
+ os.chmod(userobj.getHomeDirectory(),self.dir_mode)
+ #os.system("chmod "+self.dir_mode+" "+userobj.getHomeDirectory())
+ #print "Setting permissions:", userobj.getHomeDirectory(),self.dir_mode
+ os.lchown(userobj.getHomeDirectory(),uid,gid)
+ for root,dirs,files in os.walk(userobj.getHomeDirectory()):
+ for d in dirs:
+ os.lchown(os.path.join(root,d),uid,gid)
+ for f in files:
+ os.lchown(os.path.join(root,f),uid,gid)
+
+ def removeHomeDirectory(self,userobj):
+ if os.path.exists(userobj.getHomeDirectory()):
+ shutil.rmtree(userobj.getHomeDirectory())
+
+ def _createUser(self):
+ raise NotImplementedError, "Context._createUser()"
+
+ def _sanityCheck(self):
+ userids = []
+ for u in self._users:
+ if isinstance(u,UnixUser)==False:
+ raise TypeError,"Found an object in the list of users that is not a UnixUser object."
+ uid = u.getUID()
+ if uid in userids:
+ raise ValueError, "User ID %i appears more than once." % uid
+ userids.append(uid)
+ u._sanityCheck()
+
+ groupids = []
+ for g in self._groups:
+ if isinstance(g,UnixGroup)==False:
+ raise TypeError,"Found an object in the list of groups that is not a UnixGroup object."
+ gid = g.getGID()
+ if gid in groupids:
+ raise ValueError, "Group ID %i appears more than once." % gid
+ groupids.append(gid)
+ g._sanityCheck()
+
+ def _getSkeletonDirectory(self):
+ return self.skel
+
+ def _readAdduserConf(self):
+ """ Fill a dictionary with the values from /etc/adduser.conf
+ which then can be used as default values, if the file exists
+ at least.
+ Attention: We're not validating!"""
+ self.defaults = {}
+ self.adduserconf = '/etc/adduser.conf'
+ if not os.path.isfile(self.adduserconf):
+ return
+ fhandle = codecs.open(self.adduserconf,'r',locale.getpreferredencoding())
+ for line in fhandle.readlines():
+ line = line.strip()
+ parts = line.split("=")
+ if len(parts) == 2:
+ self.defaults[str(parts[0].strip())] = parts[1].strip()
+
+ def _setDefaultValues(self):
+ """ Set a lot of default values for UIDs and GIDs, try to use the values
+ from /etc/adduser.conf."""
+ self._readAdduserConf()
+
+ try:
+ self.skel = self.defaults["SKEL"]
+ except KeyError:
+ self.skel = '/etc/skel'
+
+ # IDs for new users and groups.
+ try:
+ self.first_uid = int(self.defaults['FIRST_UID'])
+ except (KeyError,ValueError):
+ self.first_uid = 1000
+
+ try:
+ self.last_uid = int(self.defaults["LAST_UID"])
+ except (KeyError,ValueError):
+ self.last_uid = 29999
+
+ try:
+ self.first_gid = int(self.defaults["FIRST_GID"])
+ except (KeyError,ValueError):
+ self.first_gid = 1000
+
+ try:
+ self.last_gid = int(self.defaults["LAST_GID"])
+ except (KeyError,ValueError):
+ self.last_gid = 65534
+
+ # Which IDs are system user and system groups?
+ try:
+ self.first_system_uid = int(self.defaults["FIRST_SYSTEM_UID"])
+ except (KeyError,ValueError):
+ self.first_system_uid = 500
+
+ try:
+ self.last_system_uid = int(self.defaults["LAST_SYSTEM_UID"])
+ except (KeyError,ValueError):
+ self.last_system_uid = 65534
+
+ try:
+ self.first_system_gid = int(self.defaults["FIRST_SYSTEM_GID"])
+ except (KeyError,ValueError):
+ self.first_system_gid = 500
+
+ try:
+ self.last_system_gid = int(self.defaults["LAST_SYSTEM_GID"])
+ except (KeyError,ValueError):
+ self.last_system_gid = 65534
+
+ # More defaults which might make sense.
+ try:
+ self.dir_mode = int(self.defaults["DIR_MODE"],8)
+ except (KeyError,ValueError):
+ self.dir_mode = int("0755",8)
+ print "Didn't read default DIR_MODE"
+
+ try:
+ self.dhome = self.defaults["DHOME"]
+ except KeyError:
+ self.dhome = "/home"
+
+ try:
+ self.dshell = self.defaults["DSHELL"]
+ except KeyError:
+ # Will be set in showNewUser()
+ self.dshell = None
+
+###########################################################################
+class UnixUser(object):
+ def __init__(self,context):
+ self._context = context
+ self._uid = None
+ self._username = None
+
+ # UnixGroup object.
+ self._primarygroup = None
+
+ # List of UnixGroup objects.
+ self._groups = []
+
+ self._gecos = None
+ self._homedirectory = None
+ self._loginshell = None
+
+ self._islocked = False
+
+ self._encpass = ""
+
+ # FIXME : This should actually be days since epoch or something like this
+ self._passlastchange = 0
+ self._passminimumagebeforechange = 0
+ self._passmaximumage = None
+ self._passexpirewarn = 7
+ self._passexpiredisabledays = None
+ self._disableddays = None
+
+ def polish(self):
+ primary_group = self._context.lookupGID(self._gid)
+ if primary_group is None:
+ # The GID didn't match an existing group. Quickly make a new group.
+ new_group = self._context.newGroup()
+ new_group.setGID(self._gid)
+
+ new_group_name = u"group%i" % self._gid
+ i = 0
+ while self._context.lookupGroupname(new_group_name) is not None:
+ i += 1
+ new_group_name = u"group%i_%i" % (self._gid,i)
+ new_group.setGroupname(new_group_name)
+
+ self._context.addGroup(new_group)
+ primary_group = new_group
+
+ self.setPrimaryGroup(primary_group)
+ for group in self._context._groups:
+ if group.contains(self):
+ self._groups.append(group)
+
+ def getUID(self):
+ """Get the unix user ID.
+
+ Returns the integer.
+ """
+ return self._uid
+
+ def setUID(self,uid):
+ """Set the unix user ID.
+
+ Keyword arguments:
+ uid -- Integer user id.
+ """
+ uid = int(uid)
+ if uid<0:
+ raise ValueError, "User ID (%i) is a negative number." % uid
+ self._uid = uid
+
+ def isSystemUser(self):
+ """See if this user is a system user.
+
+ Returns True or False.
+ """
+ return not (self._context.first_uid <= self._uid < self._context.last_uid)
+
+ def getUsername(self): return self._username
+
+ def setUsername(self,username): self._username = username
+
+ def getPrimaryGroup(self):
+ """Get the primary group for this user.
+
+ Returns a UnixGroup object.
+ """
+ return self._primarygroup
+
+ def setPrimaryGroup(self,groupobj):
+ """Set the primary group for this user.
+
+ If the given group is not part of this user's list of groups, then
+ it will be added.
+
+ Keyword arguments:
+ groupobj -- The group to set as the primary group.
+ """
+ self.addToGroup(groupobj)
+ self._primarygroup = groupobj
+
+ def getGroups(self):
+ """Get the list of groups that this user belongs to.
+
+ The user's primary group is also included in the returned list.
+
+ Returns a list of UnixGroup objects. Modify the list does not affect
+ this UnixUser object.
+ """
+ return self._groups[:]
+
+ def addToGroup(self,groupobj):
+ """Add this user to the given group.
+
+ Keyword arguments:
+ groupobj -- UnixGroup object.
+ """
+ groupobj._addUser(self)
+ if groupobj not in self._groups:
+ self._groups.append(groupobj)
+
+ def removeFromGroup(self,groupobj):
+ """Remove this user from the given group.
+
+ If group is current this user's primary group, then
+
+ Keyword arguments:
+ groupobj -- UnixGroup object.
+ """
+ groupobj._removeUser(self)
+ try:
+ self._groups.remove(groupobj)
+ except ValueError:
+ pass
+ if self._primarygroup is groupobj:
+ if len(self._groups)==0:
+ self._primarygroup = None
+ else:
+ self._primarygroup = self._groups[0]
+
+ def setPassword(self,password):
+ # Make some salt.
+ space = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQSRTUVWXYZ0123456789./'
+ salt = ""
+ for x in range(8):
+ salt += space[random.randint(0,len(space)-1)]
+ self._encpass = crypt.crypt(password,'$1$'+salt+'$')
+
+ def isLocked(self): return self._islocked
+ def setLocked(self,locked): self._islocked = locked
+
+ def getRealName(self):
+ if not self._gecos:
+ return ""
+ try:
+ return self._gecos.split(",")[0]
+ except AttributeError:
+ return self._gecos
+
+ def setRealName(self,realname): self._gecos = realname
+ def getHomeDirectory(self): return self._homedirectory
+ def setHomeDirectory(self,homedirectory): self._homedirectory = homedirectory
+ def getLoginShell(self): return self._loginshell
+ def setLoginShell(self,loginshell): self._loginshell = loginshell
+
+ # 'None' means that there is no maximum password age.
+ def getMaximumPasswordAge(self): return self._passmaximumage
+ def setMaximumPasswordAge(self,days): self._passmaximumage = days
+
+ def getMinimumPasswordAgeBeforeChange(self): return self._passminimumagebeforechange
+ def setMinimumPasswordAgeBeforeChange(self,days): self._passminimumagebeforechange = days
+ def getPasswordDisableAfterExpire(self): return self._passexpiredisabledays
+ def setPasswordDisableAfterExpire(self,days): self._passexpiredisabledays = days
+ def getPasswordExpireWarning(self): return self._passexpirewarn
+ def setPasswordExpireWarning(self,days): self._passexpirewarn = days
+ def getLastPasswordChange(self): return self._passlastchange
+ def getExpirationDate(self): return self._disableddays
+ def setExpirationDate(self,unixdate): self._disableddays = unixdate
+
+ def __str__(self):
+ return "%s(%i)" % (self._username,self._uid)
+
+ def _sanityCheck(self):
+ if self._primarygroup is None:
+ raise ValueError,"Userobj has no primary group!"
+ if self._uid is None:
+ raise ValueError,"Userobj has no UID!"
+
+###########################################################################
+class UnixGroup(object):
+ def __init__(self,context):
+ self._context = context
+
+ # List of UnixUser objects.
+ self._members = []
+
+ self._gid = None
+ self._groupname = None
+
+ def contains(self,userobj):
+ """Check if a the given user is a member of this group.
+
+ Returns True or False.
+ """
+ return userobj in self._members
+
+ def polish(self): pass
+ def isSystemGroup(self):
+ """Check if this group is a system group.
+
+ Returns True or False.
+ """
+ return not (self._context.first_gid <= self._gid < self._context.last_gid)
+ #return not (500 <= self._gid < 65534)
+
+ def getGID(self):
+ """Get the unix group ID.
+
+ Returns the integer group id.
+ """
+ return self._gid
+
+ def setGID(self,gid):
+ """Set the unix group ID.
+
+ Keyword arguments:
+ gid -- new group id, integer.
+ """
+ self._gid = gid
+
+ def getGroupname(self): return self._groupname
+ def setGroupname(self,groupname): self._groupname = groupname
+ def getUsers(self): return self._members[:]
+ def _addUser(self,userobj):
+ if not self.contains(userobj):
+ self._members.append(userobj)
+
+ def _removeUser(self,userobj):
+ try:
+ self._members.remove(userobj)
+ except ValueError:
+ pass
+
+ def __str__(self):
+ # FIXME encoding
+ return str(self._groupname) + " (" + str(self._gid) + ") " + str([str(u) for u in self._members])
+
+ def _sanityCheck(self):
+ pass
+
+###########################################################################
+class PwdContext(Context):
+ #def __init__(self,editmode,passwordfile="etc-passwd",groupfile='etc-group',shadowfile="etc-shadow"):
+ def __init__(self,editmode,passwordfile="/etc/passwd",groupfile='/etc/group',shadowfile="/etc/shadow"):
+ Context.__init__(self)
+ self.__editmode = editmode
+ self.__passwordfile = passwordfile
+ self.__groupfile = groupfile
+ self.__shadowfile = shadowfile
+ self._setDefaultValues()
+
+ # Read in the password file
+ fhandle = codecs.open(passwordfile,'r',locale.getpreferredencoding())
+ if LockFDRead(fhandle.fileno())==False:
+ raise IOError,"Unable to lock the "+passwordfile+" file."
+ try:
+ for line in fhandle.readlines():
+ if line.strip()!="":
+ newuserobj = self.newUser(False)
+ newuserobj._initString(line)
+ self._users.append(newuserobj)
+ finally:
+ UnlockFD(fhandle.fileno())
+ fhandle.close()
+
+ # Read the group file
+ fhandle = codecs.open(groupfile,'r',locale.getpreferredencoding())
+ if LockFDRead(fhandle.fileno())==False:
+ raise IOError,"Unable to lock the "+groupfile+" file."
+ try:
+ for line in fhandle.readlines():
+ if line.strip()!="":
+ newgroupobj = self.newGroup(False)
+ newgroupobj._initString(line)
+ self._groups.append(newgroupobj)
+ finally:
+ UnlockFD(fhandle.fileno())
+ fhandle.close()
+
+ if self.__editmode:
+ # Load up the info from the shadow file too.
+ fhandle = codecs.open(shadowfile,'r',locale.getpreferredencoding())
+ if LockFDRead(fhandle.fileno())==False:
+ raise IOError,"Unable to lock the "+shadowfile+" file."
+ try:
+ for line in fhandle.readlines():
+ if line.strip()!="":
+ try:
+ (username,encpass,passlastchange,passminimumagebeforechange,passmaximumage, \
+ passexpirewarn,passexpiredisabledays,disableddays,reserve) = \
+ tuple(line.strip().split(":"))
+ userobj = self.lookupUsername(username)
+ if userobj is not None:
+ if encpass=="":
+ encpass = u"*"
+ userobj._encpass = encpass
+ if userobj._encpass[0]=='!':
+ userobj._islocked = True
+ userobj._encpass = userobj._encpass[1:]
+ else:
+ userobj._islocked = False
+ # FIXME : set time
+ if passlastchange and passlastchange!=u"None":
+ userobj._passlastchange = int(passlastchange)
+ else:
+ passlastchange = 0
+
+ if passminimumagebeforechange=="":
+ passminimumagebeforechange = None
+ else:
+ passminimumagebeforechange = int(passminimumagebeforechange)
+ if passminimumagebeforechange>=99999:
+ passminimumagebeforechange = None
+ userobj._passminimumagebeforechange = passminimumagebeforechange
+
+ if passmaximumage=="":
+ passmaximumage = None
+ else:
+ passmaximumage = int(passmaximumage)
+ if passmaximumage>=99999:
+ passmaximumage = None
+ userobj._passmaximumage = passmaximumage
+
+ if passexpirewarn=="":
+ passexpirewarn = None
+ else:
+ passexpirewarn = int(passexpirewarn)
+ if passexpirewarn>=99999:
+ passexpirewarn = None
+ userobj._passexpirewarn = passexpirewarn
+
+ if passexpiredisabledays=="":
+ userobj._passexpiredisabledays = None
+ else:
+ userobj._passexpiredisabledays = int(passexpiredisabledays)
+
+ if disableddays=="" or disableddays==u"99999":
+ userobj._disableddays = None
+ else:
+ userobj._disableddays = int(disableddays)
+
+ userobj._reserve = reserve
+ else:
+ print "Couldn't find",username
+ except ValueError:
+ pass
+ finally:
+ UnlockFD(fhandle.fileno())
+ fhandle.close()
+
+ for group in self._groups:
+ group.polish()
+ for user in self._users:
+ user.polish()
+
+ def _createUser(self):
+ return PwdUser(self)
+
+ def _createGroup(self):
+ return PwdGroup(self)
+
+ def save(self):
+ if self.__editmode==False:
+ raise IOError, "Can't save, the context was created Read only."
+
+ self._sanityCheck()
+
+ # Write out the new password file.
+ (fd, tmpname) = createTempFile(self.__passwordfile)
+ for u in self._users:
+ os.write(fd, u._getPasswdEntry().encode(locale.getpreferredencoding(),'replace'))
+ #print u._getPasswdEntry()
+ os.close(fd)
+
+ # Update the passwd file
+ passwordlock = os.open(self.__passwordfile, os.O_WRONLY) # FIXME encoding
+ if LockFDWrite(passwordlock)==False:
+ raise IOError,"Couldn't get a write lock on "+self.__passwordfile
+ try:
+ os.rename(tmpname, self.__passwordfile)
+ finally:
+ UnlockFD(passwordlock)
+ os.close(passwordlock)
+
+ # Write out the new group file
+ (fd, tmpname) = createTempFile(self.__groupfile)
+ origstat = os.stat(self.__groupfile)
+ for g in self._groups:
+ os.write(fd,g._getGroupFileEntry().encode(locale.getpreferredencoding()))
+ #print g._getGroupFileEntry()[:-1]
+ os.close(fd)
+ os.chown(tmpname, origstat.st_uid, origstat.st_gid)
+
+ # Update the group file.
+ grouplock = os.open(self.__groupfile, os.O_WRONLY)
+ if LockFDWrite(grouplock)==False:
+ raise IOError,"Couldn't get write lock on "+self.__groupfile
+ try:
+ os.rename(tmpname, self.__groupfile)
+ finally:
+ UnlockFD(grouplock)
+ os.close(grouplock)
+
+ # Write out the new shadow file
+ origstat = os.stat(self.__shadowfile)
+ (fd, tmpname) = createTempFile(self.__shadowfile)
+ for u in self._users:
+ os.write(fd,u._getShadowEntry().encode(locale.getpreferredencoding()))
+ #print u._getShadowEntry()[:-1]
+ os.close(fd)
+
+ # Update the shadow file.
+
+ # Make sure that it is writable.
+ if (origstat.st_mode & stat.S_IWUSR)==0:
+ os.chmod(self.__shadowfile,origstat.st_mode|stat.S_IWUSR)
+
+ shadowlock = os.open(self.__shadowfile, os.O_WRONLY)
+ if LockFDWrite(shadowlock)==False:
+ raise IOError,"Couldn't get write lock on "+self.__shadowfile
+ try:
+ os.rename(tmpname, self.__shadowfile)
+ finally:
+ UnlockFD(shadowlock)
+ os.close(shadowlock)
+
+ # set the permissions back to thier default.
+ if (origstat.st_mode & stat.S_IWUSR)==0:
+ os.chmod(self.__shadowfile,origstat.st_mode)
+
+###########################################################################
+class LdapContext(Context):
+
+ def __init__(self,editmode,server="localhost",admin_dn="",admin_pass=""):
+ """ Connect to the LDAP server and invoke further actions.
+ """
+ Context.__init__(self)
+ # admin_dn is DistinguishedName? (or dn, for short)
+ self.server = server
+ self.baseDN = "dc=vizZzion,dc=net"
+
+ self.url = "ldap://"+self.server
+
+ self.ldapserver = ldap.initialize(self.url)
+ self.ldapserver.protocol_version = ldap.VERSION3
+
+ self.editmode = editmode
+ if not self.editmode:
+ self.ldapserver.simple_bind("admin",admin_pass)
+ print "Connected to ", self.url
+
+ self._users = self._getUsers()
+
+ def _getUsers(self):
+ """ Retrieve a list of users from the LDAP server.
+ """
+ _users = []
+ print "LdapContext._getUsers"
+ searchScope = ldap.SCOPE_SUBTREE
+ retrieveAttributes = None
+ searchFilter = "cn=*"
+ try:
+ ldap_result_id = self.ldapserver.search(self.baseDN, searchScope, searchFilter, retrieveAttributes)
+ result_set = []
+ while 1:
+ result_type, result_data = self.ldapserver.result(ldap_result_id, 0)
+ if (result_data == []):
+ break
+ else:
+ if result_type == ldap.RES_SEARCH_ENTRY:
+ #print result_data[0][1]
+ #print " --------------------- "
+ result_set.append(result_data[0][1])
+ #print result_set
+ except ldap.LDAPError, e:
+ print "ERROR: ",e
+
+ if len(result_set) == 0:
+ print "No Results."
+ return
+ count = 0
+ """
+ for entry in result_set:
+ for d in entry.keys():
+ print d, "::", entry[d]
+ print "======== Next User =============="
+ """
+ # Walk through result_set and create users.
+ for entry in result_set:
+ try:
+ name = entry['cn'][0]
+ login = entry['uid'][0]
+ loginshell = entry['loginShell'][0]
+ homedirectory = entry['homeDirectory'][0]
+ uid = entry['uidNumber'][0]
+ gid = entry['gidNumber'][0]
+ count = count + 1
+ #print "\n%d. User: %s\n\tName: %s\n\tShell: %s\n\tHomeDir: %s\n\tUID: %s\n\tGID: %s\n" %\
+ # (count, login, name, loginshell, homedirectory, uid, gid)
+ # Create a new userobject
+ new_user = self._createUser()
+ new_user.setHomeDirectory(homedirectory)
+ new_user.setUID(uid)
+ new_user.setRealName(name)
+ new_user.setLoginShell(loginshell)
+ new_user.setUsername(login)
+ _users.append(new_user)
+ print "Number of Users:", len(self._users)
+
+ except KeyError, e:
+ # Debugging output...
+ print "ERR:: ",e
+ print 'err:: ',entry
+ return _users
+
+ def _createUser(self):
+ return LdapUser(self)
+
+ def _createGroup(self):
+ return LdapGroup(self)
+
+ def save(self):
+ print "LdapContext.save() does nothing yet."
+
+###########################################################################
+class LdapUser(UnixUser):
+
+ def __str__(self):
+ return "LdapUser: %s(%i)" % (self._username,self._uid)
+
+
+###########################################################################
+class LdapGroup(UnixGroup):
+
+ def __str__(self):
+ return "LdapGroup: %s(%i)" % (self._username,self._uid)
+
+
+###########################################################################
+class PwdUser(UnixUser):
+ def __init__(self,context):
+ UnixUser.__init__(self,context)
+ self._reserve = u""
+
+ def _initString(self,line):
+ (self._username,x,self._uid,self._gid,self._gecos,self._homedirectory, \
+ self._loginshell) = tuple(line.strip().split(":"))
+ self._uid = int(self._uid)
+ self._gid = int(self._gid)
+
+ def _getPasswdEntry(self):
+ return u":".join( [self._username,
+ u"x",
+ unicode(self._uid),
+ unicode(self._primarygroup.getGID()),
+ self._gecos,
+ self._homedirectory,
+ self._loginshell ] ) + u"\n"
+
+ def _getShadowEntry(self):
+ if self._islocked:
+ encpass = u'!' + self._encpass
+ else:
+ encpass = self._encpass
+
+ if self._passminimumagebeforechange==None:
+ passminimumagebeforechange = ""
+ else:
+ passminimumagebeforechange = str(self._passminimumagebeforechange)
+
+ if self._passmaximumage==None:
+ passmaximumage = u"99999"
+ else:
+ passmaximumage = unicode(self._passmaximumage)
+
+ if self._disableddays==None:
+ disableddays = u""
+ else:
+ disableddays = unicode(self._disableddays)
+
+ if self._passexpiredisabledays==None:
+ passexpiredisabledays = u""
+ else:
+ passexpiredisabledays = unicode(self._passexpiredisabledays)
+
+ if self._passexpirewarn==None:
+ passexpirewarn = u""
+ else:
+ passexpirewarn = unicode(self._passexpirewarn)
+
+ return u":".join( [self._username,
+ encpass,
+ unicode(self._passlastchange),
+ passminimumagebeforechange,
+ passmaximumage,
+ passexpirewarn,
+ passexpiredisabledays,
+ disableddays,
+ self._reserve ])+ u"\n"
+
+###########################################################################
+class PwdGroup(UnixGroup):
+ def __init__(self,context):
+ UnixGroup.__init__(self,context)
+ self._memberids = u""
+ self._encpass = u""
+
+ def _initString(self,line):
+ (self._groupname,self._encpass,self._gid,self._memberids) = tuple(line.strip().split(":"))
+ self._gid = int(self._gid)
+
+ def polish(self):
+ membernames = self._memberids.split(",")
+ for username in membernames:
+ userobj = self._context.lookupUsername(username)
+ if userobj!=None:
+ self._members.append(userobj)
+
+ def _getGroupFileEntry(self):
+ return u":".join( [ self._groupname,
+ self._encpass,
+ unicode(self._gid),
+ u",".join([u.getUsername() for u in self._members if u.getPrimaryGroup() is not self])]) + u"\n"
+
+###########################################################################
+def LockFDRead(fd):
+ retries = 6
+ while retries!=0:
+ try:
+ fcntl.lockf(fd,fcntl.LOCK_SH | fcntl.LOCK_NB)
+ return True
+ except IOError:
+ # Wait a moment
+ time.sleep(1)
+ return False
+
+def LockFDWrite(fd):
+ retries = 6
+ while retries!=0:
+ try:
+ fcntl.lockf(fd,fcntl.LOCK_EX | fcntl.LOCK_NB)
+ return True
+ except IOError:
+ # Wait a moment
+ time.sleep(1)
+ return False
+
+def UnlockFD(fd):
+ fcntl.lockf(fd,fcntl.LOCK_UN)
+
+###########################################################################
+
+if __name__=='__main__':
+ print "Testing"
+ context = getContext(True)
+
+ print "Stopping here..."
+ #import sys
+ #sys.exit(0) ## Remove.
+ #print "Users:"
+ #for user in context.getUsers():
+ for user in context._users:
+ print "--------------------------------------------------"
+ print "UID:",user.getUID()
+ print "Is system user:",user.isSystemUser()
+ print "Username:",user.getUsername()
+ print "Primary Group:",str(user.getPrimaryGroup())
+ print "Groups:",[str(u) for u in user.getGroups()]
+ print "Is locked:",user.isLocked()
+ print "Real name:",user.getRealName()
+ print "Home Dir:",user.getHomeDirectory()
+ print "Maximum password age:",user.getMaximumPasswordAge()
+ print "Minimum password age before change:",user.getMinimumPasswordAgeBeforeChange()
+ print "Expire warning:",user.getPasswordExpireWarning()
+ print "Disable after Expire:",user.getPasswordDisableAfterExpire()
+ #print user._getPasswdEntry()
+
+ print "Groups"
+ for group in context.getGroups():
+ print str(group)
+ #print group._getGroupFileEntry()
+
+ print "Saving"
+ context.save()