Você não pode selecionar mais de 25 tópicos Os tópicos devem começar com uma letra ou um número, podem incluir traços ('-') e podem ter até 35 caracteres.

forgot_password.py 6.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. import base64
  2. import secrets
  3. from flask import request
  4. from flask_restx import Resource, reqparse
  5. from sqlalchemy import select
  6. from sqlalchemy.orm import Session
  7. from controllers.console.auth.error import (
  8. AuthenticationFailedError,
  9. EmailCodeError,
  10. EmailPasswordResetLimitError,
  11. InvalidEmailError,
  12. InvalidTokenError,
  13. PasswordMismatchError,
  14. )
  15. from controllers.console.error import EmailSendIpLimitError
  16. from controllers.console.wraps import email_password_login_enabled, only_edition_enterprise, setup_required
  17. from controllers.web import web_ns
  18. from extensions.ext_database import db
  19. from libs.helper import email, extract_remote_ip
  20. from libs.password import hash_password, valid_password
  21. from models.account import Account
  22. from services.account_service import AccountService
  23. @web_ns.route("/forgot-password")
  24. class ForgotPasswordSendEmailApi(Resource):
  25. @only_edition_enterprise
  26. @setup_required
  27. @email_password_login_enabled
  28. @web_ns.doc("send_forgot_password_email")
  29. @web_ns.doc(description="Send password reset email")
  30. @web_ns.doc(
  31. responses={
  32. 200: "Password reset email sent successfully",
  33. 400: "Bad request - invalid email format",
  34. 404: "Account not found",
  35. 429: "Too many requests - rate limit exceeded",
  36. }
  37. )
  38. def post(self):
  39. parser = reqparse.RequestParser()
  40. parser.add_argument("email", type=email, required=True, location="json")
  41. parser.add_argument("language", type=str, required=False, location="json")
  42. args = parser.parse_args()
  43. ip_address = extract_remote_ip(request)
  44. if AccountService.is_email_send_ip_limit(ip_address):
  45. raise EmailSendIpLimitError()
  46. if args["language"] is not None and args["language"] == "zh-Hans":
  47. language = "zh-Hans"
  48. else:
  49. language = "en-US"
  50. with Session(db.engine) as session:
  51. account = session.execute(select(Account).filter_by(email=args["email"])).scalar_one_or_none()
  52. token = None
  53. if account is None:
  54. raise AuthenticationFailedError()
  55. else:
  56. token = AccountService.send_reset_password_email(account=account, email=args["email"], language=language)
  57. return {"result": "success", "data": token}
  58. @web_ns.route("/forgot-password/validity")
  59. class ForgotPasswordCheckApi(Resource):
  60. @only_edition_enterprise
  61. @setup_required
  62. @email_password_login_enabled
  63. @web_ns.doc("check_forgot_password_token")
  64. @web_ns.doc(description="Verify password reset token validity")
  65. @web_ns.doc(
  66. responses={200: "Token is valid", 400: "Bad request - invalid token format", 401: "Invalid or expired token"}
  67. )
  68. def post(self):
  69. parser = reqparse.RequestParser()
  70. parser.add_argument("email", type=str, required=True, location="json")
  71. parser.add_argument("code", type=str, required=True, location="json")
  72. parser.add_argument("token", type=str, required=True, nullable=False, location="json")
  73. args = parser.parse_args()
  74. user_email = args["email"]
  75. is_forgot_password_error_rate_limit = AccountService.is_forgot_password_error_rate_limit(args["email"])
  76. if is_forgot_password_error_rate_limit:
  77. raise EmailPasswordResetLimitError()
  78. token_data = AccountService.get_reset_password_data(args["token"])
  79. if token_data is None:
  80. raise InvalidTokenError()
  81. if user_email != token_data.get("email"):
  82. raise InvalidEmailError()
  83. if args["code"] != token_data.get("code"):
  84. AccountService.add_forgot_password_error_rate_limit(args["email"])
  85. raise EmailCodeError()
  86. # Verified, revoke the first token
  87. AccountService.revoke_reset_password_token(args["token"])
  88. # Refresh token data by generating a new token
  89. _, new_token = AccountService.generate_reset_password_token(
  90. user_email, code=args["code"], additional_data={"phase": "reset"}
  91. )
  92. AccountService.reset_forgot_password_error_rate_limit(args["email"])
  93. return {"is_valid": True, "email": token_data.get("email"), "token": new_token}
  94. @web_ns.route("/forgot-password/resets")
  95. class ForgotPasswordResetApi(Resource):
  96. @only_edition_enterprise
  97. @setup_required
  98. @email_password_login_enabled
  99. @web_ns.doc("reset_password")
  100. @web_ns.doc(description="Reset user password with verification token")
  101. @web_ns.doc(
  102. responses={
  103. 200: "Password reset successfully",
  104. 400: "Bad request - invalid parameters or password mismatch",
  105. 401: "Invalid or expired token",
  106. 404: "Account not found",
  107. }
  108. )
  109. def post(self):
  110. parser = reqparse.RequestParser()
  111. parser.add_argument("token", type=str, required=True, nullable=False, location="json")
  112. parser.add_argument("new_password", type=valid_password, required=True, nullable=False, location="json")
  113. parser.add_argument("password_confirm", type=valid_password, required=True, nullable=False, location="json")
  114. args = parser.parse_args()
  115. # Validate passwords match
  116. if args["new_password"] != args["password_confirm"]:
  117. raise PasswordMismatchError()
  118. # Validate token and get reset data
  119. reset_data = AccountService.get_reset_password_data(args["token"])
  120. if not reset_data:
  121. raise InvalidTokenError()
  122. # Must use token in reset phase
  123. if reset_data.get("phase", "") != "reset":
  124. raise InvalidTokenError()
  125. # Revoke token to prevent reuse
  126. AccountService.revoke_reset_password_token(args["token"])
  127. # Generate secure salt and hash password
  128. salt = secrets.token_bytes(16)
  129. password_hashed = hash_password(args["new_password"], salt)
  130. email = reset_data.get("email", "")
  131. with Session(db.engine) as session:
  132. account = session.execute(select(Account).filter_by(email=email)).scalar_one_or_none()
  133. if account:
  134. self._update_existing_account(account, password_hashed, salt, session)
  135. else:
  136. raise AuthenticationFailedError()
  137. return {"result": "success"}
  138. def _update_existing_account(self, account, password_hashed, salt, session):
  139. # Update existing account credentials
  140. account.password = base64.b64encode(password_hashed).decode()
  141. account.password_salt = base64.b64encode(salt).decode()
  142. session.commit()