Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

forgot_password.py 7.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. import base64
  2. import secrets
  3. from flask import request
  4. from flask_restful import Resource, reqparse
  5. from sqlalchemy import select
  6. from sqlalchemy.orm import Session
  7. from constants.languages import languages
  8. from controllers.console import api
  9. from controllers.console.auth.error import (
  10. EmailCodeError,
  11. EmailPasswordResetLimitError,
  12. InvalidEmailError,
  13. InvalidTokenError,
  14. PasswordMismatchError,
  15. )
  16. from controllers.console.error import AccountInFreezeError, AccountNotFound, EmailSendIpLimitError
  17. from controllers.console.wraps import email_password_login_enabled, setup_required
  18. from events.tenant_event import tenant_was_created
  19. from extensions.ext_database import db
  20. from libs.helper import email, extract_remote_ip
  21. from libs.password import hash_password, valid_password
  22. from models.account import Account
  23. from services.account_service import AccountService, TenantService
  24. from services.errors.account import AccountRegisterError
  25. from services.errors.workspace import WorkSpaceNotAllowedCreateError, WorkspacesLimitExceededError
  26. from services.feature_service import FeatureService
  27. class ForgotPasswordSendEmailApi(Resource):
  28. @setup_required
  29. @email_password_login_enabled
  30. def post(self):
  31. parser = reqparse.RequestParser()
  32. parser.add_argument("email", type=email, required=True, location="json")
  33. parser.add_argument("language", type=str, required=False, location="json")
  34. args = parser.parse_args()
  35. ip_address = extract_remote_ip(request)
  36. if AccountService.is_email_send_ip_limit(ip_address):
  37. raise EmailSendIpLimitError()
  38. if args["language"] is not None and args["language"] == "zh-Hans":
  39. language = "zh-Hans"
  40. else:
  41. language = "en-US"
  42. with Session(db.engine) as session:
  43. account = session.execute(select(Account).filter_by(email=args["email"])).scalar_one_or_none()
  44. token = None
  45. if account is None:
  46. if FeatureService.get_system_features().is_allow_register:
  47. token = AccountService.send_reset_password_email(email=args["email"], language=language)
  48. return {"result": "fail", "data": token, "code": "account_not_found"}
  49. else:
  50. raise AccountNotFound()
  51. else:
  52. token = AccountService.send_reset_password_email(account=account, email=args["email"], language=language)
  53. return {"result": "success", "data": token}
  54. class ForgotPasswordCheckApi(Resource):
  55. @setup_required
  56. @email_password_login_enabled
  57. def post(self):
  58. parser = reqparse.RequestParser()
  59. parser.add_argument("email", type=str, required=True, location="json")
  60. parser.add_argument("code", type=str, required=True, location="json")
  61. parser.add_argument("token", type=str, required=True, nullable=False, location="json")
  62. args = parser.parse_args()
  63. user_email = args["email"]
  64. is_forgot_password_error_rate_limit = AccountService.is_forgot_password_error_rate_limit(args["email"])
  65. if is_forgot_password_error_rate_limit:
  66. raise EmailPasswordResetLimitError()
  67. token_data = AccountService.get_reset_password_data(args["token"])
  68. if token_data is None:
  69. raise InvalidTokenError()
  70. if user_email != token_data.get("email"):
  71. raise InvalidEmailError()
  72. if args["code"] != token_data.get("code"):
  73. AccountService.add_forgot_password_error_rate_limit(args["email"])
  74. raise EmailCodeError()
  75. # Verified, revoke the first token
  76. AccountService.revoke_reset_password_token(args["token"])
  77. # Refresh token data by generating a new token
  78. _, new_token = AccountService.generate_reset_password_token(
  79. user_email, code=args["code"], additional_data={"phase": "reset"}
  80. )
  81. AccountService.reset_forgot_password_error_rate_limit(args["email"])
  82. return {"is_valid": True, "email": token_data.get("email"), "token": new_token}
  83. class ForgotPasswordResetApi(Resource):
  84. @setup_required
  85. @email_password_login_enabled
  86. def post(self):
  87. parser = reqparse.RequestParser()
  88. parser.add_argument("token", type=str, required=True, nullable=False, location="json")
  89. parser.add_argument("new_password", type=valid_password, required=True, nullable=False, location="json")
  90. parser.add_argument("password_confirm", type=valid_password, required=True, nullable=False, location="json")
  91. args = parser.parse_args()
  92. # Validate passwords match
  93. if args["new_password"] != args["password_confirm"]:
  94. raise PasswordMismatchError()
  95. # Validate token and get reset data
  96. reset_data = AccountService.get_reset_password_data(args["token"])
  97. if not reset_data:
  98. raise InvalidTokenError()
  99. # Must use token in reset phase
  100. if reset_data.get("phase", "") != "reset":
  101. raise InvalidTokenError()
  102. # Must use token in reset phase
  103. if reset_data.get("phase", "") != "reset":
  104. raise InvalidTokenError()
  105. # Revoke token to prevent reuse
  106. AccountService.revoke_reset_password_token(args["token"])
  107. # Generate secure salt and hash password
  108. salt = secrets.token_bytes(16)
  109. password_hashed = hash_password(args["new_password"], salt)
  110. email = reset_data.get("email", "")
  111. with Session(db.engine) as session:
  112. account = session.execute(select(Account).filter_by(email=email)).scalar_one_or_none()
  113. if account:
  114. self._update_existing_account(account, password_hashed, salt, session)
  115. else:
  116. self._create_new_account(email, args["password_confirm"])
  117. return {"result": "success"}
  118. def _update_existing_account(self, account, password_hashed, salt, session):
  119. # Update existing account credentials
  120. account.password = base64.b64encode(password_hashed).decode()
  121. account.password_salt = base64.b64encode(salt).decode()
  122. session.commit()
  123. # Create workspace if needed
  124. if (
  125. not TenantService.get_join_tenants(account)
  126. and FeatureService.get_system_features().is_allow_create_workspace
  127. ):
  128. tenant = TenantService.create_tenant(f"{account.name}'s Workspace")
  129. TenantService.create_tenant_member(tenant, account, role="owner")
  130. account.current_tenant = tenant
  131. tenant_was_created.send(tenant)
  132. def _create_new_account(self, email, password):
  133. # Create new account if allowed
  134. try:
  135. AccountService.create_account_and_tenant(
  136. email=email,
  137. name=email,
  138. password=password,
  139. interface_language=languages[0],
  140. )
  141. except WorkSpaceNotAllowedCreateError:
  142. pass
  143. except WorkspacesLimitExceededError:
  144. pass
  145. except AccountRegisterError:
  146. raise AccountInFreezeError()
  147. api.add_resource(ForgotPasswordSendEmailApi, "/forgot-password")
  148. api.add_resource(ForgotPasswordCheckApi, "/forgot-password/validity")
  149. api.add_resource(ForgotPasswordResetApi, "/forgot-password/resets")