f94ff54cc1
Signed-off-by: Michael Mayer <michael@photoprism.app>
85 lines
2.3 KiB
Go
85 lines
2.3 KiB
Go
package api
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/dustin/go-humanize/english"
|
|
"github.com/gin-gonic/gin"
|
|
|
|
"github.com/photoprism/photoprism/internal/acl"
|
|
"github.com/photoprism/photoprism/internal/event"
|
|
"github.com/photoprism/photoprism/internal/form"
|
|
"github.com/photoprism/photoprism/internal/get"
|
|
"github.com/photoprism/photoprism/internal/i18n"
|
|
"github.com/photoprism/photoprism/internal/server/limiter"
|
|
"github.com/photoprism/photoprism/pkg/clean"
|
|
)
|
|
|
|
// UpdateUserPassword changes the password of the currently authenticated user.
|
|
//
|
|
// PUT /api/v1/users/:uid/password
|
|
func UpdateUserPassword(router *gin.RouterGroup) {
|
|
router.PUT("/users/:uid/password", func(c *gin.Context) {
|
|
conf := get.Config()
|
|
|
|
// You cannot change any passwords without authentication and settings enabled.
|
|
if conf.Public() || conf.DisableSettings() {
|
|
Abort(c, http.StatusForbidden, i18n.ErrPublic)
|
|
return
|
|
}
|
|
|
|
// Check limit for failed auth requests (max. 10 per minute).
|
|
if limiter.Login.Reject(ClientIP(c)) {
|
|
limiter.AbortJSON(c)
|
|
return
|
|
}
|
|
|
|
// Get session.
|
|
s := Auth(c, acl.ResourcePassword, acl.ActionUpdate)
|
|
|
|
if s.Abort(c) {
|
|
return
|
|
}
|
|
|
|
// Users may only change their own password.
|
|
if s.User().UserUID != clean.UID(c.Param("uid")) {
|
|
AbortForbidden(c)
|
|
return
|
|
}
|
|
|
|
u := s.User()
|
|
|
|
if u == nil {
|
|
Abort(c, http.StatusNotFound, i18n.ErrUserNotFound)
|
|
return
|
|
}
|
|
|
|
f := form.ChangePassword{}
|
|
|
|
if err := c.BindJSON(&f); err != nil {
|
|
Error(c, http.StatusBadRequest, err, i18n.ErrInvalidPassword)
|
|
return
|
|
}
|
|
|
|
// Verify that the old password is correct.
|
|
if u.WrongPassword(f.OldPassword) {
|
|
limiter.Login.Reserve(ClientIP(c))
|
|
Abort(c, http.StatusBadRequest, i18n.ErrInvalidPassword)
|
|
return
|
|
}
|
|
|
|
// Change password.
|
|
if err := s.ChangePassword(f.NewPassword); err != nil {
|
|
Error(c, http.StatusBadRequest, err, i18n.ErrInvalidPassword)
|
|
return
|
|
}
|
|
|
|
// Invalidate all other user sessions to protect the account:
|
|
// https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html
|
|
event.AuditInfo([]string{ClientIP(c), "session %s", "password changed", "invalidated %s"}, s.RefID,
|
|
english.Plural(u.DeleteSessions([]string{s.ID}), "session", "sessions"))
|
|
|
|
AddTokenHeaders(c, s)
|
|
c.JSON(http.StatusOK, i18n.NewResponse(http.StatusOK, i18n.MsgPasswordChanged))
|
|
})
|
|
}
|