honkoma/lib/pleroma/plugs/authentication_plug.ex

63 lines
1.6 KiB
Elixir
Raw Normal View History

2017-03-20 16:45:47 +00:00
defmodule Pleroma.Plugs.AuthenticationPlug do
alias Comeonin.Pbkdf2
2017-03-20 16:45:47 +00:00
import Plug.Conn
2017-05-16 13:31:11 +00:00
alias Pleroma.User
2017-03-20 16:45:47 +00:00
def init(options) do
options
end
2017-05-16 13:31:11 +00:00
def call(%{assigns: %{user: %User{}}} = conn, _), do: conn
2017-03-20 16:45:47 +00:00
def call(conn, opts) do
with {:ok, username, password} <- decode_header(conn),
{:ok, user} <- opts[:fetcher].(username),
2017-12-07 16:41:34 +00:00
false <- !!user.info["deactivated"],
saved_user_id <- get_session(conn, :user_id),
2018-03-30 13:01:53 +00:00
{:ok, verified_user} <- verify(user, password, saved_user_id) do
conn
|> assign(:user, verified_user)
|> put_session(:user_id, verified_user.id)
2017-03-20 16:45:47 +00:00
else
_ -> conn |> halt_or_continue(opts)
end
end
# Short-circuit if we have a cookie with the id for the given user.
defp verify(%{id: id} = user, _password, id) do
{:ok, user}
end
defp verify(nil, _password, _user_id) do
2018-03-30 13:01:53 +00:00
Pbkdf2.dummy_checkpw()
2017-03-20 16:45:47 +00:00
:error
end
defp verify(user, password, _user_id) do
if Pbkdf2.checkpw(password, user.password_hash) do
2017-03-20 16:45:47 +00:00
{:ok, user}
else
:error
end
end
defp decode_header(conn) do
with ["Basic " <> header] <- get_req_header(conn, "authorization"),
{:ok, userinfo} <- Base.decode64(header),
2018-03-30 13:01:53 +00:00
[username, password] <- String.split(userinfo, ":", parts: 2) do
{:ok, username, password}
2017-03-20 16:45:47 +00:00
end
end
defp halt_or_continue(conn, %{optional: true}) do
conn |> assign(:user, nil)
end
defp halt_or_continue(conn, _) do
conn
|> put_resp_content_type("application/json")
2018-03-27 14:45:38 +00:00
|> send_resp(403, Jason.encode!(%{error: "Invalid credentials."}))
2017-03-20 16:45:47 +00:00
|> halt
end
end