defmodule Pleroma.Plugs.AuthenticationPlug do
+ alias Comeonin.Pbkdf2
import Plug.Conn
+ alias Pleroma.User
def init(options) do
options
end
+ def call(%{assigns: %{user: %User{}}} = conn, _), do: conn
+
def call(conn, opts) do
with {:ok, username, password} <- decode_header(conn),
{:ok, user} <- opts[:fetcher].(username),
- {:ok, verified_user} <- verify(user, password)
- do
- conn |> assign(:user, verified_user)
+ false <- !!user.info["deactivated"],
+ saved_user_id <- get_session(conn, :user_id),
+ legacy_password <- String.starts_with?(user.password_hash, "$6$"),
+ update_legacy_password <-
+ !(Map.has_key?(opts, :update_legacy_password) && opts[:update_legacy_password] == false),
+ {:ok, verified_user} <- verify(user, password, saved_user_id) do
+ if legacy_password and update_legacy_password do
+ User.reset_password(verified_user, %{
+ :password => password,
+ :password_confirmation => password
+ })
+ end
+
+ conn
+ |> assign(:user, verified_user)
+ |> put_session(:user_id, verified_user.id)
else
_ -> conn |> halt_or_continue(opts)
end
end
- defp verify(nil, _password) do
- Comeonin.Pbkdf2.dummy_checkpw
+ # Short-circuit if we have a cookie with the id for the given user.
+ defp verify(%{id: id} = user, _password, id) do
+ {:ok, user}
+ end
+
+ defp verify(nil, _password, _user_id) do
+ Pbkdf2.dummy_checkpw()
:error
end
- defp verify(user, password) do
- if Comeonin.Pbkdf2.checkpw(password, user[:password_hash]) do
+ defp verify(user, password, _user_id) do
+ is_legacy = String.starts_with?(user.password_hash, "$6$")
+
+ valid =
+ cond do
+ is_legacy ->
+ :crypt.crypt(password, user.password_hash) == user.password_hash
+
+ true ->
+ Pbkdf2.checkpw(password, user.password_hash)
+ end
+
+ if valid do
{:ok, user}
else
:error
defp decode_header(conn) do
with ["Basic " <> header] <- get_req_header(conn, "authorization"),
{:ok, userinfo} <- Base.decode64(header),
- [username, password] <- String.split(userinfo, ":")
- do
- { :ok, username, password }
+ [username, password] <- String.split(userinfo, ":", parts: 2) do
+ {:ok, username, password}
end
end
defp halt_or_continue(conn, _) do
conn
|> put_resp_content_type("application/json")
- |> send_resp(403, Poison.encode!(%{error: "Invalid credentials."}))
+ |> send_resp(403, Jason.encode!(%{error: "Invalid credentials."}))
|> halt
end
end