/cli/login_details.py

https://github.com/theosp/finance-manager · Python · 126 lines · 99 code · 10 blank · 17 comment · 3 complexity · be32318bc08a53e08fb31a4c433c8d50 MD5 · raw file

  1. #!/usr/bin/env python
  2. # vim: set fileencoding=utf-8 :
  3. """This module is used to set and get the user's login details to leumi check:
  4. login_details() docstring.
  5. """
  6. from Crypto.Cipher import Blowfish
  7. import crack
  8. import pickle
  9. import os
  10. import re
  11. # Settings:
  12. default_login_details_path = os.path.expanduser('~/.open-leumi')
  13. def _right_pad_to_product(string, product):
  14. """Returns a string that consists of the supplied string right padded with
  15. \0 to make its length a multiple of product.
  16. """
  17. return string + (product - (len(string) % product)) * "\0"
  18. def _unpad(string):
  19. """removes all the \0 at the end of the string.
  20. """
  21. return re.sub("\0*$", '', string)
  22. def _encrypt(encryption_key, string):
  23. cipher_obj = Blowfish.new(encryption_key)
  24. return cipher_obj.encrypt(string)
  25. def _decrypt(encryption_key, string):
  26. cipher_obj = Blowfish.new(encryption_key)
  27. return cipher_obj.decrypt(string)
  28. def _load_login_details(encryption_key,\
  29. login_details_path=default_login_details_path):
  30. return pickle.loads(_unpad(_decrypt(encryption_key, open(login_details_path).read())))
  31. def _save_login_details(encryption_key,\
  32. login_details,
  33. login_details_path=default_login_details_path):
  34. open(login_details_path, 'w').write(_encrypt(encryption_key, _right_pad_to_product(pickle.dumps(login_details), 8)))
  35. def login_details(encryption_key,\
  36. user_id=None, password=None, authentication=None,\
  37. login_details_path=default_login_details_path):
  38. """This function is used to get, set and update the user's login details to
  39. his account managment in Leumi.
  40. To avoid the need to request the login details every time the user wants to
  41. use the open-leumi package we encrypt the login details using the supplied
  42. encryption_key and saves them to the disk.
  43. The Login Details File:
  44. The encrypted login details file saved to the path specified at
  45. default_login_details_path or login_details_path , it contains
  46. pickled dictionary that holds the login details as they named above.
  47. Set:
  48. login_details(encryption_key, user_id, password, authentication) is used to
  49. set the user's login details file.
  50. Update:
  51. If only part of the optional params supplied then login_details updates the
  52. login details file with them.
  53. Actually, that works even if there is no login details file, in which case
  54. we create it, so technically it possible (though not recommanded) to set
  55. the user login details as follow:
  56. login_details(encryption_key, user_id="user_id"):
  57. login_details(encryption_key, password="password"):
  58. login_details(encryption_key, authentication="authentication"):
  59. Get:
  60. login_details(encryption_key) returns the login details as a dictionary.
  61. Exceptions:
  62. """
  63. login_details = {}
  64. login_details_path = os.path.expanduser(login_details_path)
  65. if user_id is not None:
  66. login_details['user_id'] = user_id
  67. if password is not None:
  68. login_details['password'] = password
  69. if authentication is not None:
  70. login_details['authentication'] = authentication
  71. # If Get mode
  72. if not login_details:
  73. return _load_login_details(encryption_key, login_details_path)
  74. # If Set mode
  75. if len(login_details) == 3:
  76. # check password strengh, if the password isn't powerful enouth it raises
  77. # ValueError exception with the specified password weaknes
  78. crack.VeryFascistCheck(encryption_key)
  79. return _save_login_details(encryption_key, login_details, login_details_path)
  80. # Update mode
  81. # There is no login details file yet
  82. if not os.path.exists(login_details_path):
  83. # Initiate a new login details file
  84. # check password strengh, if the password isn't powerful enouth it raises
  85. # ValueError exception with the specified password weaknes
  86. crack.VeryFascistCheck(encryption_key)
  87. return _save_login_details(encryption_key, login_details, login_details_path)
  88. current_login_details = _load_login_details(encryption_key, login_details_path)
  89. current_login_details.update(login_details)
  90. login_details = current_login_details
  91. return _save_login_details(encryption_key, login_details, login_details_path)