mirror of
https://github.com/pgadmin-org/pgadmin4.git
synced 2024-12-01 21:09:10 -06:00
c0ef0a893d
2) Fixed incorrect log information for AUTHENTICATION_SOURCES. Fixes #5829
126 lines
3.7 KiB
Python
126 lines
3.7 KiB
Python
import config
|
|
from flask import current_app, session
|
|
from flask_login import current_user
|
|
from pgadmin.model import db, User, Server
|
|
from pgadmin.utils.crypto import encrypt, decrypt
|
|
from pgadmin.utils.constants import KERBEROS
|
|
|
|
|
|
MASTERPASS_CHECK_TEXT = 'ideas are bulletproof'
|
|
|
|
|
|
def set_crypt_key(_key, _new_login=True):
|
|
"""
|
|
Set the crypt key
|
|
:param _key: The key
|
|
:param _new_login: Is fresh login or password change
|
|
"""
|
|
current_app.keyManager.set(_key, _new_login)
|
|
|
|
|
|
def get_crypt_key():
|
|
"""
|
|
Returns the crypt key
|
|
:return: the key
|
|
"""
|
|
enc_key = current_app.keyManager.get()
|
|
|
|
# if desktop mode and master pass disabled then use the password hash
|
|
if not config.MASTER_PASSWORD_REQUIRED \
|
|
and not config.SERVER_MODE:
|
|
return True, current_user.password
|
|
# if desktop mode and master pass enabled
|
|
elif config.MASTER_PASSWORD_REQUIRED \
|
|
and not config.SERVER_MODE and enc_key is None:
|
|
return False, None
|
|
elif config.SERVER_MODE and \
|
|
session['_auth_source_manager_obj']['source_friendly_name']\
|
|
== KERBEROS:
|
|
return True, session['kerberos_key'] if 'kerberos_key' in session \
|
|
else None
|
|
else:
|
|
return True, enc_key
|
|
|
|
|
|
def validate_master_password(password):
|
|
"""
|
|
Validate the password/key against the stored encrypted text
|
|
:param password: password/key
|
|
:return: Valid or not
|
|
"""
|
|
# master pass is incorrect if decryption fails
|
|
try:
|
|
decrypted_text = decrypt(current_user.masterpass_check, password)
|
|
|
|
if isinstance(decrypted_text, bytes):
|
|
decrypted_text = decrypted_text.decode()
|
|
|
|
if MASTERPASS_CHECK_TEXT != decrypted_text:
|
|
return False
|
|
else:
|
|
return True
|
|
except Exception as _:
|
|
False
|
|
|
|
|
|
def set_masterpass_check_text(password, clear=False):
|
|
"""
|
|
Set the encrypted text which will be used later to validate entered key
|
|
:param password: password/key
|
|
:param clear: remove the encrypted text
|
|
"""
|
|
try:
|
|
masterpass_check = None
|
|
if not clear:
|
|
masterpass_check = encrypt(MASTERPASS_CHECK_TEXT, password)
|
|
|
|
# set the encrypted sample text with the new
|
|
# master pass
|
|
db.session.query(User) \
|
|
.filter(User.id == current_user.id) \
|
|
.update({User.masterpass_check: masterpass_check})
|
|
db.session.commit()
|
|
|
|
except Exception as _:
|
|
db.session.rollback()
|
|
raise
|
|
|
|
|
|
def cleanup_master_password():
|
|
"""
|
|
Remove the master password and saved passwords from DB which are
|
|
encrypted using master password. Also remove the encrypted text
|
|
"""
|
|
|
|
# also remove the master password check string as it will help if master
|
|
# password entered/enabled again
|
|
set_masterpass_check_text('', clear=True)
|
|
|
|
from pgadmin.browser.server_groups.servers.utils \
|
|
import remove_saved_passwords
|
|
remove_saved_passwords(current_user.id)
|
|
|
|
current_app.keyManager.hard_reset()
|
|
|
|
from pgadmin.utils.driver import get_driver
|
|
driver = get_driver(config.PG_DEFAULT_DRIVER)
|
|
|
|
for server in Server.query.filter_by(user_id=current_user.id).all():
|
|
manager = driver.connection_manager(server.id)
|
|
manager.update(server)
|
|
|
|
|
|
def process_masterpass_disabled():
|
|
"""
|
|
On master password disable, remove the connection data from session as it
|
|
may have saved password which will cause trouble
|
|
:param session: Flask session
|
|
:param conn_data: connection manager copy from session if any
|
|
"""
|
|
if not config.SERVER_MODE and not config.MASTER_PASSWORD_REQUIRED \
|
|
and current_user.masterpass_check is not None:
|
|
cleanup_master_password()
|
|
return True
|
|
|
|
return False
|