mirror of
https://github.com/Kozea/Radicale.git
synced 2025-04-04 21:57:43 +03:00
make htpasswd cache optional
This commit is contained in:
parent
c10ce7ae46
commit
46fe98f60b
4 changed files with 53 additions and 21 deletions
|
@ -872,6 +872,12 @@ Available methods:
|
||||||
|
|
||||||
Default: `autodetect`
|
Default: `autodetect`
|
||||||
|
|
||||||
|
##### htpasswd_cache
|
||||||
|
|
||||||
|
Enable caching of htpasswd file based on size and mtime_ns
|
||||||
|
|
||||||
|
Default: `False`
|
||||||
|
|
||||||
##### delay
|
##### delay
|
||||||
|
|
||||||
Average delay after failed login attempts in seconds.
|
Average delay after failed login attempts in seconds.
|
||||||
|
|
3
config
3
config
|
@ -109,6 +109,9 @@
|
||||||
# bcrypt requires the installation of 'bcrypt' module.
|
# bcrypt requires the installation of 'bcrypt' module.
|
||||||
#htpasswd_encryption = autodetect
|
#htpasswd_encryption = autodetect
|
||||||
|
|
||||||
|
# Enable caching of htpasswd file based on size and mtime_ns
|
||||||
|
#htpasswd_cache = False
|
||||||
|
|
||||||
# Incorrect authentication delay (seconds)
|
# Incorrect authentication delay (seconds)
|
||||||
#delay = 1
|
#delay = 1
|
||||||
|
|
||||||
|
|
|
@ -71,6 +71,7 @@ class Auth(auth.BaseAuth):
|
||||||
_htpasswd_not_ok_time: float
|
_htpasswd_not_ok_time: float
|
||||||
_htpasswd_not_ok_reminder_seconds: int
|
_htpasswd_not_ok_reminder_seconds: int
|
||||||
_htpasswd_bcrypt_use: int
|
_htpasswd_bcrypt_use: int
|
||||||
|
_htpasswd_cache: bool
|
||||||
_has_bcrypt: bool
|
_has_bcrypt: bool
|
||||||
_lock: threading.Lock
|
_lock: threading.Lock
|
||||||
|
|
||||||
|
@ -78,13 +79,15 @@ class Auth(auth.BaseAuth):
|
||||||
super().__init__(configuration)
|
super().__init__(configuration)
|
||||||
self._filename = configuration.get("auth", "htpasswd_filename")
|
self._filename = configuration.get("auth", "htpasswd_filename")
|
||||||
self._encoding = configuration.get("encoding", "stock")
|
self._encoding = configuration.get("encoding", "stock")
|
||||||
|
self._htpasswd_cache = configuration.get("auth", "htpasswd_cache")
|
||||||
|
logger.info("auth htpasswd cache: %s", self._htpasswd_cache)
|
||||||
encryption: str = configuration.get("auth", "htpasswd_encryption")
|
encryption: str = configuration.get("auth", "htpasswd_encryption")
|
||||||
logger.info("auth htpasswd encryption is 'radicale.auth.htpasswd_encryption.%s'", encryption)
|
logger.info("auth htpasswd encryption is 'radicale.auth.htpasswd_encryption.%s'", encryption)
|
||||||
|
|
||||||
self._has_bcrypt = False
|
self._has_bcrypt = False
|
||||||
self._htpasswd_ok = False
|
self._htpasswd_ok = False
|
||||||
self._htpasswd_not_ok_reminder_seconds = 60 # currently hardcoded
|
self._htpasswd_not_ok_reminder_seconds = 60 # currently hardcoded
|
||||||
(self._htpasswd_ok, self._htpasswd_bcrypt_use) = self._read_htpasswd(True)
|
(self._htpasswd_ok, self._htpasswd_bcrypt_use, self._htpasswd, self._htpasswd_size, self._htpasswd_mtime_ns) = self._read_htpasswd(True, False)
|
||||||
self._lock = threading.Lock()
|
self._lock = threading.Lock()
|
||||||
|
|
||||||
if encryption == "plain":
|
if encryption == "plain":
|
||||||
|
@ -154,27 +157,32 @@ class Auth(auth.BaseAuth):
|
||||||
# assumed plaintext
|
# assumed plaintext
|
||||||
return self._plain(hash_value, password)
|
return self._plain(hash_value, password)
|
||||||
|
|
||||||
def _read_htpasswd(self, init: bool) -> Tuple[bool, int]:
|
def _read_htpasswd(self, init: bool, suppress: bool) -> Tuple[bool, int, dict]:
|
||||||
"""Read htpasswd file
|
"""Read htpasswd file
|
||||||
|
|
||||||
init == True: stop on error
|
init == True: stop on error
|
||||||
init == False: warn/skip on error and set mark to log reminder every interval
|
init == False: warn/skip on error and set mark to log reminder every interval
|
||||||
|
suppress == True: suppress warnings, change info to debug (used in non-caching mode)
|
||||||
|
suppress == False: do not suppress warnings (used in caching mode)
|
||||||
|
|
||||||
"""
|
"""
|
||||||
htpasswd_ok = True
|
htpasswd_ok = True
|
||||||
bcrypt_use = 0
|
bcrypt_use = 0
|
||||||
if init is True:
|
if (init is True) or (suppress is True):
|
||||||
info = "Read"
|
info = "Read"
|
||||||
else:
|
else:
|
||||||
info = "Re-read"
|
info = "Re-read"
|
||||||
logger.info("%s content of htpasswd file start: %r", info, self._filename)
|
if suppress is False:
|
||||||
htpasswd: dict[str, str]
|
logger.info("%s content of htpasswd file start: %r", info, self._filename)
|
||||||
htpasswd = dict()
|
else:
|
||||||
|
logger.debug("%s content of htpasswd file start: %r", info, self._filename)
|
||||||
|
htpasswd: dict[str, str] = dict()
|
||||||
|
entries = 0
|
||||||
|
duplicates = 0
|
||||||
|
errors = 0
|
||||||
try:
|
try:
|
||||||
with open(self._filename, encoding=self._encoding) as f:
|
with open(self._filename, encoding=self._encoding) as f:
|
||||||
line_num = 0
|
line_num = 0
|
||||||
entries = 0
|
|
||||||
duplicates = 0
|
|
||||||
for line in f:
|
for line in f:
|
||||||
line_num += 1
|
line_num += 1
|
||||||
line = line.rstrip("\n")
|
line = line.rstrip("\n")
|
||||||
|
@ -186,6 +194,7 @@ class Auth(auth.BaseAuth):
|
||||||
if init is True:
|
if init is True:
|
||||||
raise ValueError("htpasswd file contains problematic line not matching <login>:<digest> in line: %d" % line_num)
|
raise ValueError("htpasswd file contains problematic line not matching <login>:<digest> in line: %d" % line_num)
|
||||||
else:
|
else:
|
||||||
|
errors += 1
|
||||||
logger.warning("htpasswd file contains problematic line not matching <login>:<digest> in line: %d (ignored)", line_num)
|
logger.warning("htpasswd file contains problematic line not matching <login>:<digest> in line: %d (ignored)", line_num)
|
||||||
htpasswd_ok = False
|
htpasswd_ok = False
|
||||||
skip = True
|
skip = True
|
||||||
|
@ -219,16 +228,17 @@ class Auth(auth.BaseAuth):
|
||||||
else:
|
else:
|
||||||
logger.warning("Failed to load htpasswd file on re-read: %r" % self._filename)
|
logger.warning("Failed to load htpasswd file on re-read: %r" % self._filename)
|
||||||
htpasswd_ok = False
|
htpasswd_ok = False
|
||||||
|
htpasswd_size = os.stat(self._filename).st_size
|
||||||
|
htpasswd_mtime_ns = os.stat(self._filename).st_mtime_ns
|
||||||
|
if suppress is False:
|
||||||
|
logger.info("%s content of htpasswd file done: %r (entries: %d, duplicates: %d, errors: %d)", info, self._filename, entries, duplicates, errors)
|
||||||
else:
|
else:
|
||||||
self._htpasswd_size = os.stat(self._filename).st_size
|
logger.debug("%s content of htpasswd file done: %r (entries: %d, duplicates: %d, errors: %d)", info, self._filename, entries, duplicates, errors)
|
||||||
self._htpasswd_time_ns = os.stat(self._filename).st_mtime_ns
|
|
||||||
self._htpasswd = htpasswd
|
|
||||||
logger.info("%s content of htpasswd file done: %r (entries: %d, duplicates: %d)", info, self._filename, entries, duplicates)
|
|
||||||
if htpasswd_ok is True:
|
if htpasswd_ok is True:
|
||||||
self._htpasswd_not_ok_time = 0
|
self._htpasswd_not_ok_time = 0
|
||||||
else:
|
else:
|
||||||
self._htpasswd_not_ok_time = time.time()
|
self._htpasswd_not_ok_time = time.time()
|
||||||
return (htpasswd_ok, bcrypt_use)
|
return (htpasswd_ok, bcrypt_use, htpasswd, htpasswd_size, htpasswd_mtime_ns)
|
||||||
|
|
||||||
def _login(self, login: str, password: str) -> str:
|
def _login(self, login: str, password: str) -> str:
|
||||||
"""Validate credentials.
|
"""Validate credentials.
|
||||||
|
@ -241,19 +251,28 @@ class Auth(auth.BaseAuth):
|
||||||
comparing mtime_ns and size
|
comparing mtime_ns and size
|
||||||
|
|
||||||
"""
|
"""
|
||||||
# check and re-read file if required
|
if self._htpasswd_cache is True:
|
||||||
htpasswd_size = os.stat(self._filename).st_size
|
# check and re-read file if required
|
||||||
htpasswd_time_ns = os.stat(self._filename).st_mtime_ns
|
|
||||||
if (htpasswd_size != self._htpasswd_size) or (htpasswd_time_ns != self._htpasswd_time_ns):
|
|
||||||
with self._lock:
|
with self._lock:
|
||||||
(self._htpasswd_ok, self._htpasswd_bcrypt_use) = self._read_htpasswd(False)
|
htpasswd_size = os.stat(self._filename).st_size
|
||||||
|
htpasswd_mtime_ns = os.stat(self._filename).st_mtime_ns
|
||||||
|
if (htpasswd_size != self._htpasswd_size) or (htpasswd_mtime_ns != self._htpasswd_mtime_ns):
|
||||||
|
(self._htpasswd_ok, self._htpasswd_bcrypt_use, self._htpasswd, self._htpasswd_size, self._htpasswd_mtime_ns) = self._read_htpasswd(False, False)
|
||||||
|
self._htpasswd_not_ok_time = 0
|
||||||
else:
|
else:
|
||||||
# log reminder of problemantic file every interval
|
# read file on every request
|
||||||
if (self._htpasswd_ok is False) and (self._htpasswd_not_ok_time > 0):
|
(self._htpasswd_ok, self._htpasswd_bcrypt_use, self._htpasswd, self._htpasswd_size, self._htpasswd_mtime_ns) = self._read_htpasswd(False, True)
|
||||||
current_time = time.time()
|
|
||||||
|
# log reminder of problemantic file every interval
|
||||||
|
current_time = time.time()
|
||||||
|
if (self._htpasswd_ok is False):
|
||||||
|
if (self._htpasswd_not_ok_time > 0):
|
||||||
if (current_time - self._htpasswd_not_ok_time) > self._htpasswd_not_ok_reminder_seconds:
|
if (current_time - self._htpasswd_not_ok_time) > self._htpasswd_not_ok_reminder_seconds:
|
||||||
logger.warning("htpasswd file still contains issues (REMINDER, check warnings in the past): %r" % self._filename)
|
logger.warning("htpasswd file still contains issues (REMINDER, check warnings in the past): %r" % self._filename)
|
||||||
self._htpasswd_not_ok_time = current_time
|
self._htpasswd_not_ok_time = current_time
|
||||||
|
else:
|
||||||
|
self._htpasswd_not_ok_time = current_time
|
||||||
|
|
||||||
if self._htpasswd.get(login):
|
if self._htpasswd.get(login):
|
||||||
digest = self._htpasswd[login]
|
digest = self._htpasswd[login]
|
||||||
(method, password_ok) = self._verify(digest, password)
|
(method, password_ok) = self._verify(digest, password)
|
||||||
|
|
|
@ -203,6 +203,10 @@ DEFAULT_CONFIG_SCHEMA: types.CONFIG_SCHEMA = OrderedDict([
|
||||||
"value": "autodetect",
|
"value": "autodetect",
|
||||||
"help": "htpasswd encryption method",
|
"help": "htpasswd encryption method",
|
||||||
"type": str}),
|
"type": str}),
|
||||||
|
("htpasswd_cache", {
|
||||||
|
"value": "False",
|
||||||
|
"help": "enable caching of htpasswd file",
|
||||||
|
"type": bool}),
|
||||||
("dovecot_socket", {
|
("dovecot_socket", {
|
||||||
"value": "/var/run/dovecot/auth-client",
|
"value": "/var/run/dovecot/auth-client",
|
||||||
"help": "dovecot auth socket",
|
"help": "dovecot auth socket",
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue