mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-03 20:36:07 +01:00 
			
		
		
		
	As part of administration sometimes it is appropriate to forcibly tell users to update their passwords. This PR creates a new command `gitea admin user must-change-password` which will set the `MustChangePassword` flag on the provided users. Signed-off-by: Andrew Thornton <art27@cantab.net>
		
			
				
	
	
		
			77 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			77 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2023 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
 | 
						|
	user_model "code.gitea.io/gitea/models/user"
 | 
						|
	pwd "code.gitea.io/gitea/modules/password"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
 | 
						|
	"github.com/urfave/cli"
 | 
						|
)
 | 
						|
 | 
						|
var microcmdUserChangePassword = cli.Command{
 | 
						|
	Name:   "change-password",
 | 
						|
	Usage:  "Change a user's password",
 | 
						|
	Action: runChangePassword,
 | 
						|
	Flags: []cli.Flag{
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "username,u",
 | 
						|
			Value: "",
 | 
						|
			Usage: "The user to change password for",
 | 
						|
		},
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "password,p",
 | 
						|
			Value: "",
 | 
						|
			Usage: "New password to set for user",
 | 
						|
		},
 | 
						|
	},
 | 
						|
}
 | 
						|
 | 
						|
func runChangePassword(c *cli.Context) error {
 | 
						|
	if err := argsSet(c, "username", "password"); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	ctx, cancel := installSignals()
 | 
						|
	defer cancel()
 | 
						|
 | 
						|
	if err := initDB(ctx); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if len(c.String("password")) < setting.MinPasswordLength {
 | 
						|
		return fmt.Errorf("Password is not long enough. Needs to be at least %d", setting.MinPasswordLength)
 | 
						|
	}
 | 
						|
 | 
						|
	if !pwd.IsComplexEnough(c.String("password")) {
 | 
						|
		return errors.New("Password does not meet complexity requirements")
 | 
						|
	}
 | 
						|
	pwned, err := pwd.IsPwned(context.Background(), c.String("password"))
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if pwned {
 | 
						|
		return errors.New("The password you chose is on a list of stolen passwords previously exposed in public data breaches. Please try again with a different password.\nFor more details, see https://haveibeenpwned.com/Passwords")
 | 
						|
	}
 | 
						|
	uname := c.String("username")
 | 
						|
	user, err := user_model.GetUserByName(ctx, uname)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if err = user.SetPassword(c.String("password")); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	if err = user_model.UpdateUserCols(ctx, user, "passwd", "passwd_hash_algo", "salt"); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	fmt.Printf("%s's password has been successfully updated!\n", user.Name)
 | 
						|
	return nil
 | 
						|
}
 |