| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788 |
- // Copyright 2021 The Gitea Authors. All rights reserved.
- // SPDX-License-Identifier: MIT
-
- package db
-
- import (
- "context"
- "fmt"
-
- user_model "code.gitea.io/gitea/models/user"
- "code.gitea.io/gitea/modules/setting"
- "code.gitea.io/gitea/modules/util"
- )
-
- // ErrUserPasswordNotSet represents a "ErrUserPasswordNotSet" kind of error.
- type ErrUserPasswordNotSet struct {
- UID int64
- Name string
- }
-
- func (err ErrUserPasswordNotSet) Error() string {
- return fmt.Sprintf("user's password isn't set [uid: %d, name: %s]", err.UID, err.Name)
- }
-
- // Unwrap unwraps this error as a ErrInvalidArgument error
- func (err ErrUserPasswordNotSet) Unwrap() error {
- return util.ErrInvalidArgument
- }
-
- // ErrUserPasswordInvalid represents a "ErrUserPasswordInvalid" kind of error.
- type ErrUserPasswordInvalid struct {
- UID int64
- Name string
- }
-
- func (err ErrUserPasswordInvalid) Error() string {
- return fmt.Sprintf("user's password is invalid [uid: %d, name: %s]", err.UID, err.Name)
- }
-
- // Unwrap unwraps this error as a ErrInvalidArgument error
- func (err ErrUserPasswordInvalid) Unwrap() error {
- return util.ErrInvalidArgument
- }
-
- // Authenticate authenticates the provided user against the DB
- func Authenticate(ctx context.Context, user *user_model.User, login, password string) (*user_model.User, error) {
- if user == nil {
- return nil, user_model.ErrUserNotExist{Name: login}
- }
-
- if !user.IsPasswordSet() {
- return nil, ErrUserPasswordNotSet{UID: user.ID, Name: user.Name}
- } else if !user.ValidatePassword(password) {
- return nil, ErrUserPasswordInvalid{UID: user.ID, Name: user.Name}
- }
-
- // Update password hash if server password hash algorithm have changed
- // Or update the password when the salt length doesn't match the current
- // recommended salt length, this in order to migrate user's salts to a more secure salt.
- if user.PasswdHashAlgo != setting.PasswordHashAlgo || len(user.Salt) != user_model.SaltByteLength*2 {
- if err := user.SetPassword(password); err != nil {
- return nil, err
- }
- if err := user_model.UpdateUserCols(ctx, user, "passwd", "passwd_hash_algo", "salt"); err != nil {
- return nil, err
- }
- }
-
- // WARN: DON'T check user.IsActive, that will be checked on reqSign so that
- // user could be hinted to resend confirm email.
- if user.ProhibitLogin {
- return nil, user_model.ErrUserProhibitLogin{
- UID: user.ID,
- Name: user.Name,
- }
- }
-
- // attempting to login as a non-user account
- if user.Type != user_model.UserTypeIndividual {
- return nil, user_model.ErrUserProhibitLogin{
- UID: user.ID,
- Name: user.Name,
- }
- }
-
- return user, nil
- }
|