gallery.accords-library.com/server/szurubooru/func/auth.py

127 lines
4.0 KiB
Python
Raw Normal View History

from typing import Tuple, Optional
2016-04-03 20:03:58 +00:00
import hashlib
import random
import uuid
2016-05-10 09:58:55 +00:00
from collections import OrderedDict
from datetime import datetime
from nacl import pwhash
from nacl.exceptions import InvalidkeyError
from szurubooru import config, db, model, errors
2016-05-10 09:58:55 +00:00
from szurubooru.func import util
2016-05-10 09:58:55 +00:00
RANK_MAP = OrderedDict([
(model.User.RANK_ANONYMOUS, 'anonymous'),
(model.User.RANK_RESTRICTED, 'restricted'),
(model.User.RANK_REGULAR, 'regular'),
(model.User.RANK_POWER, 'power'),
(model.User.RANK_MODERATOR, 'moderator'),
(model.User.RANK_ADMINISTRATOR, 'administrator'),
(model.User.RANK_NOBODY, 'nobody'),
2016-05-10 09:58:55 +00:00
])
2016-04-03 20:03:58 +00:00
def get_password_hash(salt: str, password: str) -> Tuple[str, int]:
''' Retrieve argon2id password hash. '''
return pwhash.argon2id.str(
(config.config['secret'] + salt + password).encode('utf8')
).decode('utf8'), 3
def get_sha256_legacy_password_hash(
salt: str, password: str) -> Tuple[str, int]:
''' Retrieve old-style sha256 password hash. '''
2016-04-03 20:03:58 +00:00
digest = hashlib.sha256()
2016-04-06 18:38:45 +00:00
digest.update(config.config['secret'].encode('utf8'))
2016-04-03 20:03:58 +00:00
digest.update(salt.encode('utf8'))
digest.update(password.encode('utf8'))
return digest.hexdigest(), 2
2016-04-03 20:03:58 +00:00
def get_sha1_legacy_password_hash(salt: str, password: str) -> Tuple[str, int]:
''' Retrieve old-style sha1 password hash. '''
2016-04-03 20:03:58 +00:00
digest = hashlib.sha1()
digest.update(b'1A2/$_4xVa')
digest.update(salt.encode('utf8'))
digest.update(password.encode('utf8'))
return digest.hexdigest(), 1
2016-04-03 20:03:58 +00:00
def create_password() -> str:
2016-04-03 20:03:58 +00:00
alphabet = {
'c': list('bcdfghijklmnpqrstvwxyz'),
'v': list('aeiou'),
'n': list('0123456789'),
}
pattern = 'cvcvnncvcv'
return ''.join(random.choice(alphabet[l]) for l in list(pattern))
def is_valid_password(user: model.User, password: str) -> bool:
2016-08-14 08:45:00 +00:00
assert user
2016-04-03 20:03:58 +00:00
salt, valid_hash = user.password_salt, user.password_hash
try:
return pwhash.verify(
user.password_hash.encode('utf8'),
(config.config['secret'] + salt + password).encode('utf8'))
except InvalidkeyError:
possible_hashes = [
get_sha256_legacy_password_hash(salt, password)[0],
get_sha1_legacy_password_hash(salt, password)[0]
]
if valid_hash in possible_hashes:
# Convert the user password hash to the new hash
new_hash, revision = get_password_hash(salt, password)
user.password_hash = new_hash
user.password_revision = revision
db.session.commit()
return True
return False
2016-04-03 20:03:58 +00:00
def is_valid_token(user_token: Optional[model.UserToken]) -> bool:
'''
Token must be enabled and if it has an expiration, it must be
greater than now.
'''
if user_token is None:
return False
if not user_token.enabled:
return False
if (user_token.expiration_time is not None
and user_token.expiration_time < datetime.utcnow()):
return False
return True
def has_privilege(user: model.User, privilege_name: str) -> bool:
2016-08-14 08:45:00 +00:00
assert user
2016-05-10 09:58:55 +00:00
all_ranks = list(RANK_MAP.keys())
2016-04-03 20:03:58 +00:00
assert privilege_name in config.config['privileges']
2016-05-10 09:58:55 +00:00
assert user.rank in all_ranks
minimal_rank = util.flip(RANK_MAP)[
config.config['privileges'][privilege_name]]
good_ranks = all_ranks[all_ranks.index(minimal_rank):]
return user.rank in good_ranks
def verify_privilege(user: model.User, privilege_name: str) -> None:
2016-08-14 08:45:00 +00:00
assert user
if not has_privilege(user, privilege_name):
2016-04-03 20:03:58 +00:00
raise errors.AuthError('Insufficient privileges to do this.')
def generate_authentication_token(user: model.User) -> str:
2016-04-03 20:03:58 +00:00
''' Generate nonguessable challenge (e.g. links in password reminder). '''
2016-08-14 08:45:00 +00:00
assert user
digest = hashlib.md5()
2016-04-06 18:38:45 +00:00
digest.update(config.config['secret'].encode('utf8'))
2016-04-03 20:03:58 +00:00
digest.update(user.password_salt.encode('utf8'))
return digest.hexdigest()
def generate_authorization_token() -> str:
return uuid.uuid4().__str__()