mirror of
https://github.com/portainer/portainer.git
synced 2025-07-20 13:59:40 +02:00
* feat(internal-auth): ability to set minimum password length [EE-3175] * pass props to react component * fixes + WIP slider * fix slider updating + add styles * remove nested ternary * fix slider updating + add remind me later button * add length to settings + value & onchange method * finish my account view * fix slider updating * slider styles * update style * move slider in * update size of slider * allow admin to browse to authentication view * use feather icons instead of font awesome * feat(settings): add colors to password rules * clean up tooltip styles * more style changes * styles * fixes + use requiredLength in password field for icon logic * simplify logic * simplify slider logic and remove debug code * use required length for logic to display pwd length warning * fix slider styles * use requiredPasswordLength to determine if password is valid * style tooltip based on theme * reset skips when password is changed * misc cleanup * reset skips when required length is changed * fix formatting * fix issues * implement some suggestions * simplify logic * update broken test * pick min password length from DB * fix suggestions * set up min password length in the DB * fix test after migration * fix formatting issue * fix bug with icon * refactored migration * fix typo * fixes * fix logic * set skips per user * reset skips for all users on length change Co-authored-by: Chaim Lev-Ari <chiptus@gmail.com> Co-authored-by: Dmitry Salakhov <to@dimasalakhov.com>
77 lines
3.2 KiB
Go
77 lines
3.2 KiB
Go
package users
|
|
|
|
import (
|
|
"errors"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
portainer "github.com/portainer/portainer/api"
|
|
|
|
"github.com/portainer/portainer/api/apikey"
|
|
"github.com/portainer/portainer/api/dataservices"
|
|
"github.com/portainer/portainer/api/demo"
|
|
"github.com/portainer/portainer/api/http/security"
|
|
|
|
"net/http"
|
|
|
|
"github.com/gorilla/mux"
|
|
)
|
|
|
|
var (
|
|
errUserAlreadyExists = errors.New("User already exists")
|
|
errAdminAlreadyInitialized = errors.New("An administrator user already exists")
|
|
errAdminCannotRemoveSelf = errors.New("Cannot remove your own user account. Contact another administrator")
|
|
errCannotRemoveLastLocalAdmin = errors.New("Cannot remove the last local administrator account")
|
|
errCryptoHashFailure = errors.New("Unable to hash data")
|
|
)
|
|
|
|
func hideFields(user *portainer.User) {
|
|
user.Password = ""
|
|
}
|
|
|
|
// Handler is the HTTP handler used to handle user operations.
|
|
type Handler struct {
|
|
*mux.Router
|
|
bouncer *security.RequestBouncer
|
|
apiKeyService apikey.APIKeyService
|
|
demoService *demo.Service
|
|
DataStore dataservices.DataStore
|
|
CryptoService portainer.CryptoService
|
|
passwordStrengthChecker security.PasswordStrengthChecker
|
|
}
|
|
|
|
// NewHandler creates a handler to manage user operations.
|
|
func NewHandler(bouncer *security.RequestBouncer, rateLimiter *security.RateLimiter, apiKeyService apikey.APIKeyService, demoService *demo.Service, passwordStrengthChecker security.PasswordStrengthChecker) *Handler {
|
|
h := &Handler{
|
|
Router: mux.NewRouter(),
|
|
bouncer: bouncer,
|
|
apiKeyService: apiKeyService,
|
|
demoService: demoService,
|
|
passwordStrengthChecker: passwordStrengthChecker,
|
|
}
|
|
h.Handle("/users",
|
|
bouncer.AdminAccess(httperror.LoggerHandler(h.userCreate))).Methods(http.MethodPost)
|
|
h.Handle("/users",
|
|
bouncer.RestrictedAccess(httperror.LoggerHandler(h.userList))).Methods(http.MethodGet)
|
|
h.Handle("/users/{id}",
|
|
bouncer.RestrictedAccess(httperror.LoggerHandler(h.userInspect))).Methods(http.MethodGet)
|
|
h.Handle("/users/{id}",
|
|
bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.userUpdate))).Methods(http.MethodPut)
|
|
h.Handle("/users/{id}",
|
|
bouncer.AdminAccess(httperror.LoggerHandler(h.userDelete))).Methods(http.MethodDelete)
|
|
h.Handle("/users/{id}/tokens",
|
|
bouncer.RestrictedAccess(httperror.LoggerHandler(h.userGetAccessTokens))).Methods(http.MethodGet)
|
|
h.Handle("/users/{id}/tokens",
|
|
rateLimiter.LimitAccess(bouncer.RestrictedAccess(httperror.LoggerHandler(h.userCreateAccessToken)))).Methods(http.MethodPost)
|
|
h.Handle("/users/{id}/tokens/{keyID}",
|
|
bouncer.RestrictedAccess(httperror.LoggerHandler(h.userRemoveAccessToken))).Methods(http.MethodDelete)
|
|
h.Handle("/users/{id}/memberships",
|
|
bouncer.RestrictedAccess(httperror.LoggerHandler(h.userMemberships))).Methods(http.MethodGet)
|
|
h.Handle("/users/{id}/passwd",
|
|
rateLimiter.LimitAccess(bouncer.AuthenticatedAccess(httperror.LoggerHandler(h.userUpdatePassword)))).Methods(http.MethodPut)
|
|
h.Handle("/users/admin/check",
|
|
bouncer.PublicAccess(httperror.LoggerHandler(h.adminCheck))).Methods(http.MethodGet)
|
|
h.Handle("/users/admin/init",
|
|
bouncer.PublicAccess(httperror.LoggerHandler(h.adminInit))).Methods(http.MethodPost)
|
|
|
|
return h
|
|
}
|