zrok/controller/resetPassword.go

83 lines
2.9 KiB
Go
Raw Normal View History

package controller
import (
"github.com/go-openapi/runtime/middleware"
"github.com/openziti/zrok/controller/config"
"github.com/openziti/zrok/rest_model_zrok"
"github.com/openziti/zrok/rest_server_zrok/operations/account"
"github.com/sirupsen/logrus"
)
type resetPasswordHandler struct {
cfg *config.Config
}
func newResetPasswordHandler(cfg *config.Config) *resetPasswordHandler {
return &resetPasswordHandler{
cfg: cfg,
}
}
func (handler *resetPasswordHandler) Handle(params account.ResetPasswordParams) middleware.Responder {
2025-02-04 20:10:45 +01:00
if params.Body.ResetToken == "" || params.Body.Password == "" {
logrus.Error("missing token or password")
return account.NewResetPasswordNotFound()
}
2025-02-04 20:10:45 +01:00
logrus.Infof("received password reset request for reset token '%v'", params.Body.ResetToken)
tx, err := str.Begin()
if err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error starting transaction for '%v': %v", params.Body.ResetToken, err)
return account.NewResetPasswordInternalServerError()
}
defer func() { _ = tx.Rollback() }()
2025-02-04 20:10:45 +01:00
prr, err := str.FindPasswordResetRequestWithToken(params.Body.ResetToken, tx)
if err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error finding reset request for reset token '%v': %v", params.Body.ResetToken, err)
return account.NewResetPasswordNotFound()
}
a, err := str.GetAccount(prr.AccountId, tx)
if err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error finding account for reset token '%v': %v", params.Body.ResetToken, err)
return account.NewResetPasswordNotFound()
}
if a.Deleted {
logrus.Errorf("account '%v' for '%v' deleted", a.Email, a.Token)
return account.NewResetPasswordNotFound()
}
if err := validatePassword(handler.cfg, params.Body.Password); err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("password not valid for reset token '%v', (%v): %v", params.Body.ResetToken, a.Email, err)
return account.NewResetPasswordUnprocessableEntity().WithPayload(rest_model_zrok.ErrorMessage(err.Error()))
}
2024-01-30 18:59:56 +01:00
hpwd, err := HashPassword(params.Body.Password)
if err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error hashing password for '%v' (%v): %v", params.Body.ResetToken, a.Email, err)
return account.NewResetPasswordRequestInternalServerError()
}
a.Salt = hpwd.Salt
a.Password = hpwd.Password
if _, err := str.UpdateAccount(a, tx); err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error updating for reset token '%v' (%v): %v", params.Body.ResetToken, a.Email, err)
return account.NewResetPasswordInternalServerError()
}
if err := str.DeletePasswordResetRequest(prr.Id, tx); err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error deleting reset request for reset token '%v' (%v): %v", params.Body.ResetToken, a.Email, err)
return account.NewResetPasswordInternalServerError()
}
if err := tx.Commit(); err != nil {
2025-02-04 20:10:45 +01:00
logrus.Errorf("error committing for reset token '%v' (%v): %v", params.Body.ResetToken, a.Email, err)
return account.NewResetPasswordInternalServerError()
}
logrus.Infof("reset password for '%v'", a.Email)
return account.NewResetPasswordOK()
}