ffa5640ea91c7f2e72e061f7da5797afcd1b1956
[akkoma] / lib / pleroma / captcha.ex
1 defmodule Pleroma.Captcha do
2 use GenServer
3
4 @ets __MODULE__.Ets
5 @ets_options [:ordered_set, :private, :named_table, {:read_concurrency, true}]
6
7
8 @doc false
9 def start_link() do
10 GenServer.start_link(__MODULE__, [], name: __MODULE__)
11 end
12
13
14 @doc false
15 def init(_) do
16 @ets = :ets.new(@ets, @ets_options)
17
18 {:ok, nil}
19 end
20
21 def new() do
22 GenServer.call(__MODULE__, :new)
23 end
24
25 def validate(token, captcha) do
26 GenServer.call(__MODULE__, {:validate, token, captcha})
27 end
28
29 @doc false
30 def handle_call(:new, _from, state) do
31 enabled = Pleroma.Config.get([__MODULE__, :enabled])
32
33 if !enabled do
34 {
35 :reply,
36 %{type: :none},
37 state
38 }
39 else
40 method = Pleroma.Config.get!([__MODULE__, :method])
41
42 case method do
43 __MODULE__.Kocaptcha ->
44 endpoint = Pleroma.Config.get!([method, :endpoint])
45 case HTTPoison.get(endpoint <> "/new") do
46 {:error, _} ->
47 %{error: "Kocaptcha service unavailable"}
48 {:ok, res} ->
49 json_resp = Poison.decode!(res.body)
50
51 token = json_resp["token"]
52
53 true = :ets.insert(@ets, {token, json_resp["md5"]})
54
55 {
56 :reply,
57 %{type: :kocaptcha, token: token, url: endpoint <> json_resp["url"]},
58 state
59 }
60 end
61 end
62 end
63 end
64
65 @doc false
66 def handle_call({:validate, token, captcha}, _from, state) do
67 with false <- is_nil(captcha),
68 [{^token, saved_md5}] <- :ets.lookup(@ets, token),
69 true <- (:crypto.hash(:md5, captcha) |> Base.encode16) == String.upcase(saved_md5) do
70 # Clear the saved value
71 :ets.delete(@ets, token)
72
73 {:reply, true, state}
74 else
75 e -> IO.inspect(e); {:reply, false, state}
76 end
77 end
78 end