X-Git-Url: http://git.squeep.com/?a=blobdiff_plain;f=lib%2Fpleroma%2Fplugs%2Fauthentication_plug.ex;h=057ea42f152f5e098a05708ff5d3b8b3571a576f;hb=9c672ecbb5d4477cd16d2139a2cb66d3923ac5c8;hp=60f6faf494496b0e7085134c35b48ff173340283;hpb=0ec5aeb8a76653935caefa0de92861269f98f343;p=akkoma diff --git a/lib/pleroma/plugs/authentication_plug.ex b/lib/pleroma/plugs/authentication_plug.ex index 60f6faf49..057ea42f1 100644 --- a/lib/pleroma/plugs/authentication_plug.ex +++ b/lib/pleroma/plugs/authentication_plug.ex @@ -1,64 +1,80 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2020 Pleroma Authors +# SPDX-License-Identifier: AGPL-3.0-only + defmodule Pleroma.Plugs.AuthenticationPlug do - alias Comeonin.Pbkdf2 - import Plug.Conn + alias Pleroma.Plugs.OAuthScopesPlug alias Pleroma.User - def init(options) do - options + import Plug.Conn + + require Logger + + def init(options), do: options + + def checkpw(password, "$6" <> _ = password_hash) do + :crypt.crypt(password, password_hash) == password_hash end - def call(%{assigns: %{user: %User{}}} = conn, _), do: conn + def checkpw(password, "$2" <> _ = password_hash) do + # Handle bcrypt passwords for Mastodon migration + Bcrypt.verify_pass(password, password_hash) + end - def call(conn, opts) do - with {:ok, username, password} <- decode_header(conn), - {:ok, user} <- opts[:fetcher].(username), - false <- !!user.info["deactivated"], - saved_user_id <- get_session(conn, :user_id), - {:ok, verified_user} <- verify(user, password, saved_user_id) - do - conn - |> assign(:user, verified_user) - |> put_session(:user_id, verified_user.id) - else - _ -> conn |> halt_or_continue(opts) - end + def checkpw(password, "$pbkdf2" <> _ = password_hash) do + Pbkdf2.verify_pass(password, password_hash) end - # Short-circuit if we have a cookie with the id for the given user. - defp verify(%{id: id} = user, _password, id) do - {:ok, user} + def checkpw(_password, _password_hash) do + Logger.error("Password hash not recognized") + false end - defp verify(nil, _password, _user_id) do - Pbkdf2.dummy_checkpw - :error + def maybe_update_password(%User{password_hash: "$2" <> _} = user, password) do + do_update_password(user, password) end - defp verify(user, password, _user_id) do - if Pbkdf2.checkpw(password, user.password_hash) do - {:ok, user} - else - :error - end + def maybe_update_password(%User{password_hash: "$6" <> _} = user, password) do + do_update_password(user, password) end - defp decode_header(conn) do - with ["Basic " <> header] <- get_req_header(conn, "authorization"), - {:ok, userinfo} <- Base.decode64(header), - [username, password] <- String.split(userinfo, ":", parts: 2) - do - {:ok, username, password} - end + def maybe_update_password(user, _), do: {:ok, user} + + defp do_update_password(user, password) do + user + |> User.password_update_changeset(%{ + "password" => password, + "password_confirmation" => password + }) + |> Pleroma.Repo.update() end - defp halt_or_continue(conn, %{optional: true}) do - conn |> assign(:user, nil) + def call(%{assigns: %{user: %User{}}} = conn, _), do: conn + + def call( + %{ + assigns: %{ + auth_user: %{password_hash: password_hash} = auth_user, + auth_credentials: %{password: password} + } + } = conn, + _ + ) do + if checkpw(password, password_hash) do + {:ok, auth_user} = maybe_update_password(auth_user, password) + + conn + |> assign(:user, auth_user) + |> OAuthScopesPlug.skip_plug() + else + conn + end end - defp halt_or_continue(conn, _) do + def call(%{assigns: %{auth_credentials: %{password: _}}} = conn, _) do + Pbkdf2.no_user_verify() conn - |> put_resp_content_type("application/json") - |> send_resp(403, Poison.encode!(%{error: "Invalid credentials."})) - |> halt end + + def call(conn, _), do: conn end