mirror of
https://github.com/mCaptcha/mCaptcha.git
synced 2026-02-11 10:05:41 +00:00
192 lines
5.3 KiB
Rust
192 lines
5.3 KiB
Rust
// Copyright (C) 2022 Aravinth Manivannan <realaravinth@batsense.net>
|
|
// SPDX-FileCopyrightText: 2023 Aravinth Manivannan <realaravinth@batsense.net>
|
|
//
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
use actix_identity::Identity;
|
|
use actix_web::{web, HttpResponse, Responder};
|
|
use argon2_creds::Config;
|
|
use db_core::Login;
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
use crate::errors::*;
|
|
use crate::*;
|
|
|
|
#[derive(Clone, Debug, Deserialize, Serialize)]
|
|
pub struct ChangePasswordReqest {
|
|
pub password: String,
|
|
pub new_password: String,
|
|
pub confirm_new_password: String,
|
|
}
|
|
|
|
pub struct UpdatePassword {
|
|
pub new_password: String,
|
|
pub confirm_new_password: String,
|
|
}
|
|
|
|
impl From<ChangePasswordReqest> for UpdatePassword {
|
|
fn from(s: ChangePasswordReqest) -> Self {
|
|
UpdatePassword {
|
|
new_password: s.new_password,
|
|
confirm_new_password: s.confirm_new_password,
|
|
}
|
|
}
|
|
}
|
|
|
|
async fn update_password_runner(
|
|
user: &str,
|
|
update: UpdatePassword,
|
|
data: &Data,
|
|
) -> ServiceResult<()> {
|
|
if update.new_password != update.confirm_new_password {
|
|
return Err(ServiceError::PasswordsDontMatch);
|
|
}
|
|
|
|
let new_hash = data.creds.password(&update.new_password)?;
|
|
|
|
let p = db_core::NameHash {
|
|
username: user.to_owned(),
|
|
hash: new_hash,
|
|
};
|
|
|
|
data.db.update_password(&p).await?;
|
|
Ok(())
|
|
}
|
|
|
|
#[my_codegen::post(
|
|
path = "crate::V1_API_ROUTES.account.update_password",
|
|
wrap = "crate::api::v1::get_middleware()"
|
|
)]
|
|
async fn update_user_password(
|
|
id: Identity,
|
|
data: AppData,
|
|
payload: web::Json<ChangePasswordReqest>,
|
|
) -> ServiceResult<impl Responder> {
|
|
if payload.new_password != payload.confirm_new_password {
|
|
return Err(ServiceError::PasswordsDontMatch);
|
|
}
|
|
|
|
let username = id.identity().unwrap();
|
|
|
|
// TODO: verify behavior when account is not found
|
|
let res = data.db.get_password(&Login::Username(&username)).await?;
|
|
|
|
if Config::verify(&res.hash, &payload.password)? {
|
|
let update: UpdatePassword = payload.into_inner().into();
|
|
update_password_runner(&username, update, &data).await?;
|
|
Ok(HttpResponse::Ok())
|
|
} else {
|
|
Err(ServiceError::WrongPassword)
|
|
}
|
|
}
|
|
|
|
pub fn services(cfg: &mut actix_web::web::ServiceConfig) {
|
|
cfg.service(update_user_password);
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub mod tests {
|
|
use super::*;
|
|
|
|
use actix_web::http::StatusCode;
|
|
use actix_web::test;
|
|
|
|
use crate::api::v1::ROUTES;
|
|
use crate::tests::*;
|
|
|
|
#[actix_rt::test]
|
|
async fn update_password_works_pg() {
|
|
let data = crate::tests::pg::get_data().await;
|
|
update_password_works(data).await;
|
|
}
|
|
|
|
#[actix_rt::test]
|
|
async fn update_password_works_maria() {
|
|
let data = crate::tests::maria::get_data().await;
|
|
update_password_works(data).await;
|
|
}
|
|
|
|
pub async fn update_password_works(data: ArcData) {
|
|
const NAME: &str = "updatepassuser";
|
|
const PASSWORD: &str = "longpassword2";
|
|
const EMAIL: &str = "updatepassuser@a.com";
|
|
|
|
let data = &data;
|
|
|
|
delete_user(data, NAME).await;
|
|
|
|
let (_, signin_resp) = register_and_signin(data, NAME, EMAIL, PASSWORD).await;
|
|
let cookies = get_cookie!(signin_resp);
|
|
let app = get_app!(data).await;
|
|
|
|
let new_password = "newpassword";
|
|
|
|
let update_password = ChangePasswordReqest {
|
|
password: PASSWORD.into(),
|
|
new_password: new_password.into(),
|
|
confirm_new_password: PASSWORD.into(),
|
|
};
|
|
|
|
let res = update_password_runner(NAME, update_password.into(), data).await;
|
|
assert!(res.is_err());
|
|
assert_eq!(res, Err(ServiceError::PasswordsDontMatch));
|
|
|
|
let update_password = ChangePasswordReqest {
|
|
password: PASSWORD.into(),
|
|
new_password: new_password.into(),
|
|
confirm_new_password: new_password.into(),
|
|
};
|
|
|
|
assert!(update_password_runner(NAME, update_password.into(), data)
|
|
.await
|
|
.is_ok());
|
|
|
|
let update_password = ChangePasswordReqest {
|
|
password: new_password.into(),
|
|
new_password: new_password.into(),
|
|
confirm_new_password: PASSWORD.into(),
|
|
};
|
|
|
|
bad_post_req_test(
|
|
data,
|
|
NAME,
|
|
new_password,
|
|
ROUTES.account.update_password,
|
|
&update_password,
|
|
ServiceError::PasswordsDontMatch,
|
|
)
|
|
.await;
|
|
|
|
let update_password = ChangePasswordReqest {
|
|
password: PASSWORD.into(),
|
|
new_password: PASSWORD.into(),
|
|
confirm_new_password: PASSWORD.into(),
|
|
};
|
|
|
|
bad_post_req_test(
|
|
data,
|
|
NAME,
|
|
new_password,
|
|
ROUTES.account.update_password,
|
|
&update_password,
|
|
ServiceError::WrongPassword,
|
|
)
|
|
.await;
|
|
|
|
let update_password = ChangePasswordReqest {
|
|
password: new_password.into(),
|
|
new_password: PASSWORD.into(),
|
|
confirm_new_password: PASSWORD.into(),
|
|
};
|
|
|
|
let update_password_resp = test::call_service(
|
|
&app,
|
|
post_request!(&update_password, ROUTES.account.update_password)
|
|
.cookie(cookies)
|
|
.to_request(),
|
|
)
|
|
.await;
|
|
assert_eq!(update_password_resp.status(), StatusCode::OK);
|
|
}
|
|
}
|