2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-10-14 13:26:04 +01:00
|
|
|
|
|
|
|
package user
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/validate"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
)
|
|
|
|
|
2023-02-22 15:05:26 +00:00
|
|
|
// PasswordChange processes a password change request for the given user.
|
|
|
|
func (p *Processor) PasswordChange(ctx context.Context, user *gtsmodel.User, oldPassword string, newPassword string) gtserror.WithCode {
|
2023-07-23 11:33:17 +01:00
|
|
|
// Ensure provided oldPassword is the correct current password.
|
2021-10-14 13:26:04 +01:00
|
|
|
if err := bcrypt.CompareHashAndPassword([]byte(user.EncryptedPassword), []byte(oldPassword)); err != nil {
|
2023-07-23 11:33:17 +01:00
|
|
|
err := gtserror.Newf("%w", err)
|
2022-08-08 09:40:51 +01:00
|
|
|
return gtserror.NewErrorUnauthorized(err, "old password was incorrect")
|
2021-10-14 13:26:04 +01:00
|
|
|
}
|
|
|
|
|
2023-07-23 11:33:17 +01:00
|
|
|
// Ensure new password is strong enough.
|
|
|
|
if err := validate.Password(newPassword); err != nil {
|
2021-10-14 13:26:04 +01:00
|
|
|
return gtserror.NewErrorBadRequest(err, err.Error())
|
|
|
|
}
|
|
|
|
|
2023-07-23 11:33:17 +01:00
|
|
|
// Ensure new password is different from old password.
|
|
|
|
if newPassword == oldPassword {
|
|
|
|
const help = "new password cannot be the same as previous password"
|
|
|
|
err := gtserror.New(help)
|
|
|
|
return gtserror.NewErrorBadRequest(err, help)
|
2021-10-14 13:26:04 +01:00
|
|
|
}
|
|
|
|
|
2023-07-23 11:33:17 +01:00
|
|
|
// Hash the new password.
|
|
|
|
encryptedPassword, err := bcrypt.GenerateFromPassword(
|
|
|
|
[]byte(newPassword),
|
|
|
|
bcrypt.DefaultCost,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
err := gtserror.Newf("%w", err)
|
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
2022-08-15 11:35:05 +01:00
|
|
|
|
2023-07-23 11:33:17 +01:00
|
|
|
// Set new password on user.
|
|
|
|
user.EncryptedPassword = string(encryptedPassword)
|
|
|
|
if err := p.state.DB.UpdateUser(
|
|
|
|
ctx, user,
|
|
|
|
"encrypted_password",
|
|
|
|
); err != nil {
|
|
|
|
err := gtserror.Newf("db error updating user: %w", err)
|
2023-02-06 08:44:13 +00:00
|
|
|
return gtserror.NewErrorInternalError(err)
|
2021-10-14 13:26:04 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|