2018-12-05 23:21:45 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2014-09-02 18:07:02 +05:30
|
|
|
class PasswordsController < Devise::PasswordsController
|
2021-12-11 22:18:48 +05:30
|
|
|
include GitlabRecaptcha
|
2023-01-13 00:05:48 +05:30
|
|
|
include Gitlab::Tracking::Helpers::WeakPasswordErrorEvent
|
2021-12-11 22:18:48 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
skip_before_action :require_no_authentication, only: [:edit, :update]
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
prepend_before_action :check_recaptcha, only: :create
|
|
|
|
before_action :load_recaptcha, only: :new
|
2015-10-24 18:46:33 +05:30
|
|
|
before_action :resource_from_email, only: [:create]
|
2018-03-17 18:26:18 +05:30
|
|
|
before_action :check_password_authentication_available, only: [:create]
|
2019-03-02 22:35:43 +05:30
|
|
|
before_action :throttle_reset, only: [:create]
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
feature_category :system_access
|
2021-01-03 14:25:43 +05:30
|
|
|
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2015-09-11 14:41:01 +05:30
|
|
|
def edit
|
|
|
|
super
|
|
|
|
reset_password_token = Devise.token_generator.digest(
|
|
|
|
User,
|
|
|
|
:reset_password_token,
|
|
|
|
resource.reset_password_token
|
|
|
|
)
|
|
|
|
|
|
|
|
unless reset_password_token.nil?
|
|
|
|
user = User.where(
|
|
|
|
reset_password_token: reset_password_token
|
|
|
|
).first_or_initialize
|
|
|
|
|
|
|
|
unless user.reset_password_period_valid?
|
2019-07-31 22:56:46 +05:30
|
|
|
flash[:alert] = _('Your password reset token has expired.')
|
2015-09-11 14:41:01 +05:30
|
|
|
redirect_to(new_user_password_url(user_email: user['email']))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-12-05 23:21:45 +05:30
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2015-10-24 18:46:33 +05:30
|
|
|
|
2016-06-02 11:05:42 +05:30
|
|
|
def update
|
|
|
|
super do |resource|
|
2020-11-24 15:15:51 +05:30
|
|
|
if resource.valid?
|
|
|
|
resource.password_automatically_set = false
|
|
|
|
resource.password_expires_at = nil
|
|
|
|
resource.save(validate: false) if resource.changed?
|
2023-01-13 00:05:48 +05:30
|
|
|
else
|
|
|
|
track_weak_password_error(@user, self.class.name, 'create')
|
2016-06-02 11:05:42 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-10-24 18:46:33 +05:30
|
|
|
protected
|
|
|
|
|
|
|
|
def resource_from_email
|
|
|
|
email = resource_params[:email]
|
|
|
|
self.resource = resource_class.find_by_email(email)
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def check_password_authentication_available
|
|
|
|
if resource
|
|
|
|
return if resource.allow_password_authentication?
|
2023-03-04 22:38:38 +05:30
|
|
|
elsif Gitlab::CurrentSettings.password_authentication_enabled?
|
|
|
|
return
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
2015-10-24 18:46:33 +05:30
|
|
|
|
|
|
|
redirect_to after_sending_reset_password_instructions_path_for(resource_name),
|
2019-07-31 22:56:46 +05:30
|
|
|
alert: _("Password authentication is unavailable.")
|
2015-10-24 18:46:33 +05:30
|
|
|
end
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
def check_recaptcha
|
|
|
|
return unless resource_params[:email].present?
|
|
|
|
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2015-10-24 18:46:33 +05:30
|
|
|
def throttle_reset
|
|
|
|
return unless resource && resource.recently_sent_password_reset?
|
|
|
|
|
2015-12-23 02:04:40 +05:30
|
|
|
# Throttle reset attempts, but return a normal message to
|
|
|
|
# avoid user enumeration attack.
|
|
|
|
redirect_to new_user_session_path,
|
|
|
|
notice: I18n.t('devise.passwords.send_paranoid_instructions')
|
2015-10-24 18:46:33 +05:30
|
|
|
end
|
2021-09-04 01:27:46 +05:30
|
|
|
|
|
|
|
def context_user
|
|
|
|
resource
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2021-06-08 01:23:25 +05:30
|
|
|
PasswordsController.prepend_mod_with('PasswordsController')
|