Skip to content

Add reset password api #474

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Aug 16, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 11 additions & 1 deletion server/src/handlers/http.rs
Original file line number Diff line number Diff line change
Expand Up @@ -195,7 +195,7 @@ pub fn configure_routes(cfg: &mut web::ServiceConfig) {
.service(
web::resource("/{username}")
// PUT /user/{username} => Create a new user
.route(web::put().to(rbac::put_user).authorize(Action::PutUser))
.route(web::post().to(rbac::post_user).authorize(Action::PutUser))
// DELETE /user/{username} => Delete a user
.route(
web::delete()
Expand All @@ -218,6 +218,16 @@ pub fn configure_routes(cfg: &mut web::ServiceConfig) {
.to(rbac::get_role)
.authorize_for_user(Action::GetRole),
),
)
.service(
web::resource("/{username}/generate-new-password")
// POST /user/{username}/generate-new-password => reset password for this user
.route(
web::post()
.to(rbac::post_gen_password)
.authorize(Action::PutUser)
.wrap(DisAllowRootUser),
),
);
// Deny request if username is same as the env variable P_USERNAME.
cfg.service(
Expand Down
88 changes: 43 additions & 45 deletions server/src/handlers/http/rbac.rs
Original file line number Diff line number Diff line change
Expand Up @@ -41,37 +41,59 @@ pub async fn list_users() -> impl Responder {
web::Json(Users.list_users())
}

// Handler for PUT /api/v1/user/{username}
// Handler for POST /api/v1/user/{username}
// Creates a new user by username if it does not exists
// Otherwise make a call to reset password
// returns password generated for this user
pub async fn put_user(
pub async fn post_user(
username: web::Path<String>,
body: Option<web::Json<serde_json::Value>>,
) -> Result<impl Responder, RBACError> {
let username = username.into_inner();
validator::user_name(&username)?;
let _ = UPDATE_LOCK.lock().await;
if Users.contains(&username) {
reset_password(username).await
} else {
let mut metadata = get_metadata().await?;
if metadata.users.iter().any(|user| user.username == username) {
// should be unreachable given state is always consistent
return Err(RBACError::UserExists);
}
let (user, password) = User::create_new(username.clone());
metadata.users.push(user.clone());
put_metadata(&metadata).await?;
// set this user to user map
Users.put_user(user);

if let Some(body) = body {
put_role(web::Path::<String>::from(username), body).await?;
}
return Err(RBACError::UserExists);
}
let mut metadata = get_metadata().await?;
if metadata.users.iter().any(|user| user.username == username) {
// should be unreachable given state is always consistent
return Err(RBACError::UserExists);
}
let (user, password) = User::create_new(username.clone());
metadata.users.push(user.clone());
put_metadata(&metadata).await?;
// set this user to user map
Users.put_user(user);

if let Some(body) = body {
put_role(web::Path::<String>::from(username), body).await?;
}

Ok(password)
}

Ok(password)
// Handler for POST /api/v1/user/{username}/generate-new-password
// Resets password for the user to a newly generated one and returns it
pub async fn post_gen_password(username: web::Path<String>) -> Result<impl Responder, RBACError> {
let username = username.into_inner();
let _ = UPDATE_LOCK.lock().await;
if !Users.contains(&username) {
return Err(RBACError::UserDoesNotExist);
}
let PassCode { password, hash } = User::gen_new_password();
let mut metadata = get_metadata().await?;
if let Some(user) = metadata
.users
.iter_mut()
.find(|user| user.username == username)
{
user.password_hash.clone_from(&hash);
} else {
// should be unreachable given state is always consistent
return Err(RBACError::UserDoesNotExist);
}
put_metadata(&metadata).await?;
Users.change_password_hash(&username, &hash);
Ok(password)
}

// Handler for GET /api/v1/user/{username}/role
Expand Down Expand Up @@ -101,30 +123,6 @@ pub async fn delete_user(username: web::Path<String>) -> Result<impl Responder,
Ok(format!("deleted user: {username}"))
}

// Reset password for given username
// returns new password generated for this user
pub async fn reset_password(username: String) -> Result<String, RBACError> {
// generate new password for this user
let PassCode { password, hash } = User::gen_new_password();
// update parseable.json first
let mut metadata = get_metadata().await?;
if let Some(user) = metadata
.users
.iter_mut()
.find(|user| user.username == username)
{
user.password_hash.clone_from(&hash);
} else {
// should be unreachable given state is always consistent
return Err(RBACError::UserDoesNotExist);
}
put_metadata(&metadata).await?;

// update in mem table
Users.change_password_hash(&username, &hash);
Ok(password)
}

// Put roles for given user
pub async fn put_role(
username: web::Path<String>,
Expand Down