| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package Dancer2::Plugin::Auth::Extensible::Role::Provider; |
|
2
|
|
|
|
|
|
|
|
|
3
|
11
|
|
|
11
|
|
38915
|
use Crypt::SaltedHash; |
|
|
11
|
|
|
|
|
32915
|
|
|
|
11
|
|
|
|
|
328
|
|
|
4
|
11
|
|
|
11
|
|
76
|
use Moo::Role; |
|
|
11
|
|
|
|
|
23
|
|
|
|
11
|
|
|
|
|
85
|
|
|
5
|
|
|
|
|
|
|
requires qw(authenticate_user); |
|
6
|
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
our $VERSION = '0.708'; |
|
8
|
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
=head1 NAME |
|
10
|
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
Dancer2::Plugin::Auth::Extensible::Role::Provider - base role for authentication providers |
|
12
|
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
14
|
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
Base L<Moo::Role> for authentication providers. |
|
16
|
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
Also provides secure password matching which automatically handles crypted |
|
18
|
|
|
|
|
|
|
passwords via Crypt::SaltedHash. |
|
19
|
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
=head2 plugin |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
The calling L<Dancer2::Plugin::Auth::Extensible> object. |
|
25
|
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
Required. |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=cut |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
has plugin => ( |
|
31
|
|
|
|
|
|
|
is => 'ro', |
|
32
|
|
|
|
|
|
|
required => 1, |
|
33
|
|
|
|
|
|
|
weaken => 1, |
|
34
|
|
|
|
|
|
|
); |
|
35
|
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
=head2 disable_roles |
|
37
|
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
Defaults to the value of L<Dancer2::Plugin::Auth::Extensible/disable_roles>. |
|
39
|
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
=cut |
|
41
|
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
has disable_roles => ( |
|
43
|
|
|
|
|
|
|
is => 'ro', |
|
44
|
|
|
|
|
|
|
lazy => 1, |
|
45
|
|
|
|
|
|
|
default => sub { $_[0]->plugin->disable_roles }, |
|
46
|
|
|
|
|
|
|
); |
|
47
|
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
=head2 encryption_algorithm |
|
49
|
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
The encryption_algorithm used by L</encrypt_password>. |
|
51
|
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
Defaults to 'SHA-512'; |
|
53
|
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
=cut |
|
55
|
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
has encryption_algorithm => ( |
|
57
|
|
|
|
|
|
|
is => 'ro', |
|
58
|
|
|
|
|
|
|
default => 'SHA-512', |
|
59
|
|
|
|
|
|
|
); |
|
60
|
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
=head1 METHODS |
|
62
|
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
=head2 match_password $given, $correct |
|
64
|
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
Matches C<$given> password with the C<$correct> one. |
|
66
|
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
=cut |
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
sub match_password { |
|
70
|
62
|
|
|
62
|
1
|
15343
|
my ( $self, $given, $correct ) = @_; |
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
# TODO: perhaps we should accept a configuration option to state whether |
|
73
|
|
|
|
|
|
|
# passwords are crypted or not, rather than guessing by looking for the |
|
74
|
|
|
|
|
|
|
# {...} tag at the start. |
|
75
|
|
|
|
|
|
|
# I wanted to let it try straightforward comparison first, then try |
|
76
|
|
|
|
|
|
|
# Crypt::SaltedHash->validate, but that has a weakness: if a list of hashed |
|
77
|
|
|
|
|
|
|
# passwords got leaked, you could use the hashed password *as it is* to log |
|
78
|
|
|
|
|
|
|
# in, rather than cracking it first. That's obviously Not Fucking Good. |
|
79
|
|
|
|
|
|
|
# TODO: think about this more. This shit is important. I'm thinking a |
|
80
|
|
|
|
|
|
|
# config option to indicate whether passwords are crypted - yes, no, auto |
|
81
|
|
|
|
|
|
|
# (where auto would do the current guesswork, and yes/no would just do as |
|
82
|
|
|
|
|
|
|
# told.) |
|
83
|
62
|
100
|
|
|
|
321
|
if ( $correct =~ /^{.+}/ ) { |
|
84
|
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
# Looks like a crypted password starting with the scheme, so try to |
|
86
|
|
|
|
|
|
|
# validate it with Crypt::SaltedHash: |
|
87
|
26
|
|
|
|
|
252
|
return Crypt::SaltedHash->validate( $correct, $given ); |
|
88
|
|
|
|
|
|
|
} |
|
89
|
|
|
|
|
|
|
else { |
|
90
|
|
|
|
|
|
|
# Straightforward comparison, then: |
|
91
|
36
|
|
|
|
|
421
|
return $given eq $correct; |
|
92
|
|
|
|
|
|
|
} |
|
93
|
|
|
|
|
|
|
} |
|
94
|
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
=head2 encrypt_password $password |
|
96
|
|
|
|
|
|
|
|
|
97
|
|
|
|
|
|
|
Encrypts password C<$password> with L</encryption_algorithm> |
|
98
|
|
|
|
|
|
|
and returns the encrypted password. |
|
99
|
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
=cut |
|
101
|
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
sub encrypt_password { |
|
103
|
14
|
|
|
14
|
1
|
2219
|
my ( $self, $password ) = @_; |
|
104
|
14
|
|
|
|
|
131
|
my $crypt = |
|
105
|
|
|
|
|
|
|
Crypt::SaltedHash->new( algorithm => $self->encryption_algorithm ); |
|
106
|
14
|
|
|
|
|
5032
|
$crypt->add($password); |
|
107
|
14
|
|
|
|
|
212
|
$crypt->generate; |
|
108
|
|
|
|
|
|
|
} |
|
109
|
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
=head1 METHODS IMPLEMENTED BY PROVIDER |
|
111
|
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
The following methods must be implemented by the consuming provider class. |
|
113
|
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
=head2 required methods |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
=over |
|
117
|
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
=item * authenticate_user $username, $password |
|
119
|
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
If either of C<$username> or C<$password> are undefined then die. |
|
121
|
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
Return true on success. |
|
123
|
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
=back |
|
125
|
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
=head2 optional methods |
|
127
|
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
The following methods are optional and extend the functionality of the |
|
129
|
|
|
|
|
|
|
provider. |
|
130
|
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
=over |
|
132
|
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
=item * get_user_details $username |
|
134
|
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
Die if C<$username> is undefined. Otherwise return a user object (if |
|
136
|
|
|
|
|
|
|
appropriate) or a hash reference of user details. |
|
137
|
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
=item * get_user_roles $username |
|
139
|
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
Die if C<$username> is undefined. Otherwise return an array reference of |
|
141
|
|
|
|
|
|
|
user roles. |
|
142
|
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
=item * create_user %user |
|
144
|
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
Create user with fields specified in C<%user>. |
|
146
|
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
Method should croak if C<username> key is empty or undefined. If a user with |
|
148
|
|
|
|
|
|
|
the specified username already exists then we would normally expect the |
|
149
|
|
|
|
|
|
|
method to die though this is of course dependent on the backend in use. |
|
150
|
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
The new user should be returned. |
|
152
|
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
=item * get_user_by_code $code |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
Try to find a user which has C<pw_reset_code> field set to C<$code>. |
|
156
|
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
Returns the user on success. |
|
158
|
|
|
|
|
|
|
|
|
159
|
|
|
|
|
|
|
=item * set_user_details $username, %update |
|
160
|
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
Update user with C<$username> according to C<%update>. |
|
162
|
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
Passing an empty or undefined C<$username> should cause the method to die. |
|
164
|
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
The update user should be returned. |
|
166
|
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
=item * set_user_password $username, $password |
|
168
|
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
Set the password for the user specified by C<$username> to <$password> |
|
170
|
|
|
|
|
|
|
encrypted using L</encrypt_password> or via whatever other method is |
|
171
|
|
|
|
|
|
|
appropriate for the backend. |
|
172
|
|
|
|
|
|
|
|
|
173
|
|
|
|
|
|
|
=item * password_expired $user |
|
174
|
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
The C<$user> should be as returned from L</get_user_details>. The method |
|
176
|
|
|
|
|
|
|
checks whether the user's password has expired and returns 1 if it has and |
|
177
|
|
|
|
|
|
|
0 if it has not. |
|
178
|
|
|
|
|
|
|
|
|
179
|
|
|
|
|
|
|
=back |
|
180
|
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
=cut |
|
182
|
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
1; |
|
184
|
|
|
|
|
|
|
|