ZeroNet/plugins/disabled-UiPassword/UiPasswordPlugin.py

184 lines
7.0 KiB
Python

import string
import random
import time
import json
import re
import os
from Config import config
from Plugin import PluginManager
from util import helper
plugin_dir = os.path.dirname(__file__)
if "sessions" not in locals().keys(): # To keep sessions between module reloads
sessions = {}
whitelisted_client_ids = {}
def showPasswordAdvice(password):
error_msgs = []
if not password or not isinstance(password, str):
error_msgs.append("You have enabled <b>UiPassword</b> plugin, but you forgot to set a password!")
elif len(password) < 8:
error_msgs.append("You are using a very short UI password!")
return error_msgs
@PluginManager.registerTo("UiRequest")
class UiRequestPlugin(object):
sessions = sessions
whitelisted_client_ids = whitelisted_client_ids
last_cleanup = time.time()
def getClientId(self):
return self.env["REMOTE_ADDR"] + " - " + self.env["HTTP_USER_AGENT"]
def whitelistClientId(self, session_id=None):
if not session_id:
session_id = self.getCookies().get("session_id")
client_id = self.getClientId()
if client_id in self.whitelisted_client_ids:
self.whitelisted_client_ids[client_id]["updated"] = time.time()
return False
self.whitelisted_client_ids[client_id] = {
"added": time.time(),
"updated": time.time(),
"session_id": session_id
}
def route(self, path):
# Restict Ui access by ip
if config.ui_restrict and self.env['REMOTE_ADDR'] not in config.ui_restrict:
return self.error403(details=False)
if path.endswith("favicon.ico"):
return self.actionFile("src/Ui/media/img/favicon.ico")
else:
if config.ui_password:
if time.time() - self.last_cleanup > 60 * 60: # Cleanup expired sessions every hour
self.cleanup()
# Validate session
session_id = self.getCookies().get("session_id")
if session_id not in self.sessions and self.getClientId() not in self.whitelisted_client_ids:
# Invalid session id and not whitelisted ip: display login
return self.actionLogin()
return super(UiRequestPlugin, self).route(path)
def actionWrapper(self, path, *args, **kwargs):
if config.ui_password and self.isWrapperNecessary(path):
session_id = self.getCookies().get("session_id")
if session_id not in self.sessions:
# We only accept cookie based auth on wrapper
return self.actionLogin()
else:
self.whitelistClientId()
return super().actionWrapper(path, *args, **kwargs)
# Action: Login
@helper.encodeResponse
def actionLogin(self):
template = open(plugin_dir + "/login.html").read()
self.sendHeader()
posted = self.getPosted()
if posted: # Validate http posted data
if self.sessionCheckPassword(posted.get("password")):
# Valid password, create session
session_id = self.randomString(26)
self.sessions[session_id] = {
"added": time.time(),
"keep": posted.get("keep")
}
self.whitelistClientId(session_id)
# Redirect to homepage or referer
url = self.env.get("HTTP_REFERER", "")
if not url or re.sub(r"\?.*", "", url).endswith("/Login"):
url = "/" + config.homepage
cookie_header = ('Set-Cookie', "session_id=%s;path=/;max-age=2592000;" % session_id) # Max age = 30 days
self.start_response('301 Redirect', [('Location', url), cookie_header])
yield "Redirecting..."
else:
# Invalid password, show login form again
template = template.replace("{result}", "bad_password")
yield template
def randomString(self, nchars):
return ''.join(random.choice(string.ascii_uppercase + string.ascii_lowercase + string.digits) for _ in range(nchars))
def sessionCheckPassword(self, password):
return password == config.ui_password
def sessionDelete(self, session_id):
del self.sessions[session_id]
for client_id in list(self.whitelisted_client_ids):
if self.whitelisted_client_ids[client_id]["session_id"] == session_id:
del self.whitelisted_client_ids[client_id]
def sessionCleanup(self):
self.last_cleanup = time.time()
for session_id, session in list(self.sessions.items()):
if session["keep"] and time.time() - session["added"] > 60 * 60 * 24 * 60: # Max 60days for keep sessions
self.sessionDelete(session_id)
elif not session["keep"] and time.time() - session["added"] > 60 * 60 * 24: # Max 24h for non-keep sessions
self.sessionDelete(session_id)
# Action: Display sessions
@helper.encodeResponse
def actionSessions(self):
self.sendHeader()
yield "<pre>"
yield json.dumps(self.sessions, indent=4)
yield "\r\n"
yield json.dumps(self.whitelisted_client_ids, indent=4)
# Action: Logout
@helper.encodeResponse
def actionLogout(self):
# Session id has to passed as get parameter or called without referer to avoid remote logout
session_id = self.getCookies().get("session_id")
if not self.env.get("HTTP_REFERER") or session_id == self.get.get("session_id"):
if session_id in self.sessions:
self.sessionDelete(session_id)
self.start_response('301 Redirect', [
('Location', "/"),
('Set-Cookie', "session_id=deleted; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT")
])
yield "Redirecting..."
else:
self.sendHeader()
yield "Error: Invalid session id"
@PluginManager.registerTo("ConfigPlugin")
class ConfigPlugin(object):
def createArguments(self):
group = self.parser.add_argument_group("UiPassword plugin")
group.add_argument('--ui_password', help='Password to access UiServer', default=None, metavar="password")
return super(ConfigPlugin, self).createArguments()
from Translate import translate as lang
@PluginManager.registerTo("UiWebsocket")
class UiWebsocketPlugin(object):
def actionUiLogout(self, to):
permissions = self.getPermissions(to)
if "ADMIN" not in permissions:
return self.response(to, "You don't have permission to run this command")
session_id = self.request.getCookies().get("session_id", "")
self.cmd("redirect", '/Logout?session_id=%s' % session_id)
def addHomepageNotifications(self):
error_msgs = showPasswordAdvice(config.ui_password)
for msg in error_msgs:
self.site.notifications.append(["error", lang[msg]])
return super(UiWebsocketPlugin, self).addHomepageNotifications()