aboutsummaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorlain <lain@soykaf.club>2018-09-05 18:53:38 +0200
committerlain <lain@soykaf.club>2018-09-05 18:53:38 +0200
commit32465b9939718f7bc6604594e0404340c3e02cc9 (patch)
tree704435d1b7a7d666f1c816b06c6fc406529c0576 /lib
parent9a96c93be71a1347a0b4f709c89589e6bac8d4de (diff)
downloadpleroma-32465b9939718f7bc6604594e0404340c3e02cc9.tar.gz
Simplify AuthenticationPlug
Diffstat (limited to 'lib')
-rw-r--r--lib/pleroma/plugs/authentication_plug.ex79
1 files changed, 20 insertions, 59 deletions
diff --git a/lib/pleroma/plugs/authentication_plug.ex b/lib/pleroma/plugs/authentication_plug.ex
index ffecb403d..8706b32cd 100644
--- a/lib/pleroma/plugs/authentication_plug.ex
+++ b/lib/pleroma/plugs/authentication_plug.ex
@@ -9,71 +9,32 @@ defmodule Pleroma.Plugs.AuthenticationPlug do
def call(%{assigns: %{user: %User{}}} = conn, _), do: conn
- def call(conn, opts) do
- with {:ok, username, password} <- decode_header(conn),
- {:ok, user} <- opts[:fetcher].(username),
- false <- !!user.info["deactivated"],
- saved_user_id <- get_session(conn, :user_id),
- legacy_password <- String.starts_with?(user.password_hash, "$6$"),
- update_legacy_password <-
- !(Map.has_key?(opts, :update_legacy_password) && opts[:update_legacy_password] == false),
- {:ok, verified_user} <- verify(user, password, saved_user_id) do
- if legacy_password and update_legacy_password do
- User.reset_password(verified_user, %{
- :password => password,
- :password_confirmation => password
- })
- end
-
+ def call(
+ %{
+ assigns: %{
+ auth_user: %{password_hash: password_hash} = auth_user,
+ auth_credentials: %{password: password}
+ }
+ } = conn,
+ _
+ ) do
+ if Pbkdf2.checkpw(password, password_hash) do
conn
- |> assign(:user, verified_user)
- |> put_session(:user_id, verified_user.id)
+ |> assign(:user, auth_user)
else
- _ -> conn |> halt_or_continue(opts)
+ conn
end
end
- # Short-circuit if we have a cookie with the id for the given user.
- defp verify(%{id: id} = user, _password, id) do
- {:ok, user}
- end
-
- defp verify(nil, _password, _user_id) do
+ def call(
+ %{
+ assigns: %{
+ auth_credentials: %{password: password}
+ }
+ } = conn,
+ _
+ ) do
Pbkdf2.dummy_checkpw()
- :error
- end
-
- defp verify(user, password, _user_id) do
- valid =
- if String.starts_with?(user.password_hash, "$6$") do
- :crypt.crypt(password, user.password_hash) == user.password_hash
- else
- Pbkdf2.checkpw(password, user.password_hash)
- end
-
- if valid do
- {:ok, user}
- else
- :error
- end
- end
-
- defp decode_header(conn) do
- with ["Basic " <> header] <- get_req_header(conn, "authorization"),
- {:ok, userinfo} <- Base.decode64(header),
- [username, password] <- String.split(userinfo, ":", parts: 2) do
- {:ok, username, password}
- end
- end
-
- defp halt_or_continue(conn, %{optional: true}) do
- conn |> assign(:user, nil)
- end
-
- defp halt_or_continue(conn, _) do
conn
- |> put_resp_content_type("application/json")
- |> send_resp(403, Jason.encode!(%{error: "Invalid credentials."}))
- |> halt
end
end