88 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			88 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright 2021 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package db
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	"code.gitea.io/gitea/modules/util"
 | |
| )
 | |
| 
 | |
| // ErrUserPasswordNotSet represents a "ErrUserPasswordNotSet" kind of error.
 | |
| type ErrUserPasswordNotSet struct {
 | |
| 	UID  int64
 | |
| 	Name string
 | |
| }
 | |
| 
 | |
| func (err ErrUserPasswordNotSet) Error() string {
 | |
| 	return fmt.Sprintf("user's password isn't set [uid: %d, name: %s]", err.UID, err.Name)
 | |
| }
 | |
| 
 | |
| // Unwrap unwraps this error as a ErrInvalidArgument error
 | |
| func (err ErrUserPasswordNotSet) Unwrap() error {
 | |
| 	return util.ErrInvalidArgument
 | |
| }
 | |
| 
 | |
| // ErrUserPasswordInvalid represents a "ErrUserPasswordInvalid" kind of error.
 | |
| type ErrUserPasswordInvalid struct {
 | |
| 	UID  int64
 | |
| 	Name string
 | |
| }
 | |
| 
 | |
| func (err ErrUserPasswordInvalid) Error() string {
 | |
| 	return fmt.Sprintf("user's password is invalid [uid: %d, name: %s]", err.UID, err.Name)
 | |
| }
 | |
| 
 | |
| // Unwrap unwraps this error as a ErrInvalidArgument error
 | |
| func (err ErrUserPasswordInvalid) Unwrap() error {
 | |
| 	return util.ErrInvalidArgument
 | |
| }
 | |
| 
 | |
| // Authenticate authenticates the provided user against the DB
 | |
| func Authenticate(ctx context.Context, user *user_model.User, login, password string) (*user_model.User, error) {
 | |
| 	if user == nil {
 | |
| 		return nil, user_model.ErrUserNotExist{Name: login}
 | |
| 	}
 | |
| 
 | |
| 	if !user.IsPasswordSet() {
 | |
| 		return nil, ErrUserPasswordNotSet{UID: user.ID, Name: user.Name}
 | |
| 	} else if !user.ValidatePassword(password) {
 | |
| 		return nil, ErrUserPasswordInvalid{UID: user.ID, Name: user.Name}
 | |
| 	}
 | |
| 
 | |
| 	// Update password hash if server password hash algorithm have changed
 | |
| 	// Or update the password when the salt length doesn't match the current
 | |
| 	// recommended salt length, this in order to migrate user's salts to a more secure salt.
 | |
| 	if user.PasswdHashAlgo != setting.PasswordHashAlgo || len(user.Salt) != user_model.SaltByteLength*2 {
 | |
| 		if err := user.SetPassword(password); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 		if err := user_model.UpdateUserCols(ctx, user, "passwd", "passwd_hash_algo", "salt"); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// WARN: DON'T check user.IsActive, that will be checked on reqSign so that
 | |
| 	// user could be hinted to resend confirm email.
 | |
| 	if user.ProhibitLogin {
 | |
| 		return nil, user_model.ErrUserProhibitLogin{
 | |
| 			UID:  user.ID,
 | |
| 			Name: user.Name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// attempting to login as a non-user account
 | |
| 	if user.Type != user_model.UserTypeIndividual {
 | |
| 		return nil, user_model.ErrUserProhibitLogin{
 | |
| 			UID:  user.ID,
 | |
| 			Name: user.Name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return user, nil
 | |
| }
 |