$27 GRAYBYTE WORDPRESS FILE MANAGER $43

SERVER : premium201.web-hosting.com #1 SMP Wed Mar 26 12:08:09 UTC 2025
SERVER IP : 172.67.162.162 | ADMIN IP 216.73.217.79
OPTIONS : CRL = ON | WGT = ON | SDO = OFF | PKEX = OFF
DEACTIVATED : NONE

/opt/cloudlinux/venv/lib/python3.11/site-packages/lvestats/lib/commons/

HOME
Current File : /opt/cloudlinux/venv/lib/python3.11/site-packages/lvestats/lib/commons//htpasswd.py
# coding=utf-8

# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2019 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# http://cloudlinux.com/docs/LICENSE.TXT

import base64
import hashlib
import os

__author__ = "Eli Carter"


class HtpasswdDoesNotExists(Exception):
    pass


class HtpasswdFile(object):
    """
    A class for manipulating htpasswd files.
    """

    def __init__(self, filename, create=False):
        self.entries = []
        self.filename = filename
        if not create:
            if os.path.exists(self.filename):
                self.load()
            else:
                raise HtpasswdDoesNotExists(f"{self.filename} does not exist")

    def load(self):
        """
        Read the htpasswd file into memory.
        """
        self.entries = []
        with open(self.filename, 'r', encoding='utf-8') as f:
            for line in f:
                username, pwhash = line.split(':')
                entry = [username, pwhash.rstrip()]
                self.entries.append(entry)

    def save(self):
        """
        Write the htpasswd file to disk
        """
        with open(self.filename, 'w', encoding='utf-8') as f:
            for entry in self.entries:
                f.write(f"{entry[0]}:{entry[1]}\n")

    def update(self, username, password):
        """
        Replace the entry for the given user, or add it if new.
        """
        # Generate a random salt
        salt = os.urandom(16)

        # Hash the password using PBKDF2 with HMAC-SHA256
        pwhash = hashlib.pbkdf2_hmac('sha256', password.encode('utf-8'), salt, 100000)

        # Store the salt along with the hash to use it during password verification
        stored_password = base64.b64encode(salt + pwhash).decode('utf-8')

        # Find matching entries
        matching_entries = [entry for entry in self.entries
                            if entry[0] == username]
        if matching_entries:
            matching_entries[0][1] = stored_password
        else:
            self.entries.append([username, stored_password])

    def delete(self, username):
        """
        Remove the entry for the given user.
        """
        self.entries = [entry for entry in self.entries
                        if entry[0] != username]


Current_dir [ NOT WRITEABLE ] Document_root [ WRITEABLE ]


[ Back ]
NAME
SIZE
LAST TOUCH
USER
CAN-I?
FUNCTIONS
..
--
5 Mar 2026 11.53 PM
root / root
0755
__pycache__
--
5 Mar 2026 11.53 PM
root / root
0755
__init__.py
0.214 KB
17 Feb 2026 11.00 AM
root / root
0644
argparse_utils.py
11.246 KB
17 Feb 2026 11.00 AM
root / root
0644
dateutil.py
5.627 KB
17 Feb 2026 11.00 AM
root / root
0644
decorators.py
0.872 KB
17 Feb 2026 11.00 AM
root / root
0644
func.py
15.887 KB
17 Feb 2026 11.00 AM
root / root
0644
htpasswd.py
2.25 KB
17 Feb 2026 11.00 AM
root / root
0644
litespeed.py
6.673 KB
17 Feb 2026 11.00 AM
root / root
0644
logsetup.py
4.502 KB
17 Feb 2026 11.00 AM
root / root
0644
proctitle.py
2.896 KB
17 Feb 2026 11.00 AM
root / root
0644
profiler.py
0.562 KB
17 Feb 2026 11.00 AM
root / root
0644
progress.py
0.992 KB
17 Feb 2026 11.00 AM
root / root
0644
sentry.py
6.165 KB
17 Feb 2026 11.00 AM
root / root
0644
server_status.py
1.314 KB
17 Feb 2026 11.00 AM
root / root
0644
sizeutil.py
2.591 KB
17 Feb 2026 11.00 AM
root / root
0644
users_manager.py
2.971 KB
17 Feb 2026 11.00 AM
root / root
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2025 CONTACT ME
Static GIF