2019-04-25 04:52:08 +07:00
|
|
|
package handlers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2022-01-21 06:46:13 +07:00
|
|
|
"time"
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2021-08-11 08:04:35 +07:00
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
|
|
|
"github.com/authelia/authelia/v4/internal/session"
|
2019-04-25 04:52:08 +07:00
|
|
|
)
|
|
|
|
|
|
|
|
func identityRetrieverFromStorage(ctx *middlewares.AutheliaCtx) (*session.Identity, error) {
|
|
|
|
var requestBody resetPasswordStep1RequestBody
|
|
|
|
err := json.Unmarshal(ctx.PostBody(), &requestBody)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
details, err := ctx.Providers.UserProvider.GetDetails(requestBody.Username)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(details.Emails) == 0 {
|
2021-09-17 12:53:40 +07:00
|
|
|
return nil, fmt.Errorf("user %s has no email address configured", requestBody.Username)
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return &session.Identity{
|
|
|
|
Username: requestBody.Username,
|
|
|
|
Email: details.Emails[0],
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ResetPasswordIdentityStart the handler for initiating the identity validation for resetting a password.
|
2020-01-21 07:10:00 +07:00
|
|
|
// We need to ensure the attacker cannot perform user enumeration by always replying with 200 whatever what happens in backend.
|
2019-04-25 04:52:08 +07:00
|
|
|
var ResetPasswordIdentityStart = middlewares.IdentityVerificationStart(middlewares.IdentityVerificationStartArgs{
|
|
|
|
MailTitle: "Reset your password",
|
|
|
|
MailButtonContent: "Reset",
|
2019-11-19 06:37:36 +07:00
|
|
|
TargetEndpoint: "/reset-password/step2",
|
2021-07-22 10:52:37 +07:00
|
|
|
ActionClaim: ActionResetPassword,
|
2019-04-25 04:52:08 +07:00
|
|
|
IdentityRetrieverFunc: identityRetrieverFromStorage,
|
2022-01-21 06:46:13 +07:00
|
|
|
}, middlewares.TimingAttackDelay(10, 250, 85, time.Millisecond*500))
|
2019-04-25 04:52:08 +07:00
|
|
|
|
|
|
|
func resetPasswordIdentityFinish(ctx *middlewares.AutheliaCtx, username string) {
|
|
|
|
userSession := ctx.GetSession()
|
|
|
|
// TODO(c.michaud): use JWT tokens to expire the request in only few seconds for better security.
|
|
|
|
userSession.PasswordResetUsername = &username
|
2020-12-16 08:47:31 +07:00
|
|
|
|
|
|
|
err := ctx.SaveSession(userSession)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger.Errorf("Unable to clear password reset flag in session for user %s: %s", userSession.Username, err)
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
|
2022-04-03 05:32:57 +07:00
|
|
|
mode := ""
|
|
|
|
if ctx.Configuration.PasswordPolicy.Standard.Enabled {
|
|
|
|
mode = "standard"
|
|
|
|
} else if ctx.Configuration.PasswordPolicy.Zxcvbn.Enabled {
|
|
|
|
mode = "zxcvbn"
|
|
|
|
}
|
|
|
|
|
|
|
|
policyResponse := PassworPolicyBody{
|
|
|
|
Mode: mode,
|
|
|
|
MinLength: ctx.Configuration.PasswordPolicy.Standard.MinLength,
|
|
|
|
MaxLength: ctx.Configuration.PasswordPolicy.Standard.MaxLength,
|
|
|
|
RequireLowercase: ctx.Configuration.PasswordPolicy.Standard.RequireLowercase,
|
|
|
|
RequireUppercase: ctx.Configuration.PasswordPolicy.Standard.RequireUppercase,
|
|
|
|
RequireNumber: ctx.Configuration.PasswordPolicy.Standard.RequireNumber,
|
|
|
|
RequireSpecial: ctx.Configuration.PasswordPolicy.Standard.RequireSpecial,
|
|
|
|
MinScore: ctx.Configuration.PasswordPolicy.Zxcvbn.MinScore,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ctx.SetJSONBody(policyResponse)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Logger.Errorf("Unable to send password Policy: %s", err)
|
|
|
|
}
|
2019-04-25 04:52:08 +07:00
|
|
|
}
|
|
|
|
|
2020-01-21 07:10:00 +07:00
|
|
|
// ResetPasswordIdentityFinish the handler for finishing the identity validation.
|
2019-04-25 04:52:08 +07:00
|
|
|
var ResetPasswordIdentityFinish = middlewares.IdentityVerificationFinish(
|
2021-07-22 10:52:37 +07:00
|
|
|
middlewares.IdentityVerificationFinishArgs{ActionClaim: ActionResetPassword}, resetPasswordIdentityFinish)
|