From 5c2b093102626a48b58cb3b0713e1b01f81c84c9 Mon Sep 17 00:00:00 2001 From: yvesn <yvesn> Date: Wed, 2 Aug 2017 12:06:43 +0000 Subject: [PATCH] SSDM-5398: implemented password reset mechanism for file authentication SVN: 38596 --- .../openbis/generic/server/CommonServer.java | 2 +- .../html/js/controllers/MainController.js | 72 +++++++--- .../eln-lims/html/js/server/ServerFacade.js | 80 ++++++++++- .../PersistentKeyValueStore.java | 27 ++++ .../lib/persistentkeyvaluestore.jar | Bin 0 -> 974 bytes .../password-reset-api/password-reset-api.py | 130 ++++++++++++++++++ .../password-reset-api/plugin.properties | 7 + 7 files changed, 299 insertions(+), 19 deletions(-) create mode 100644 openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore-source/PersistentKeyValueStore.java create mode 100644 openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore.jar create mode 100644 openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/password-reset-api.py create mode 100644 openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/plugin.properties diff --git a/openbis/source/java/ch/systemsx/cisd/openbis/generic/server/CommonServer.java b/openbis/source/java/ch/systemsx/cisd/openbis/generic/server/CommonServer.java index da43cb1ebe7..29964eaaf15 100644 --- a/openbis/source/java/ch/systemsx/cisd/openbis/generic/server/CommonServer.java +++ b/openbis/source/java/ch/systemsx/cisd/openbis/generic/server/CommonServer.java @@ -528,7 +528,7 @@ public final class CommonServer extends AbstractCommonServer<ICommonServerForInt } @Override - @RolesAllowed(RoleWithHierarchy.INSTANCE_ADMIN) + @RolesAllowed(RoleWithHierarchy.INSTANCE_ETL_SERVER) public List<Person> listPersons(String sessionToken) { checkSession(sessionToken); diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/controllers/MainController.js b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/controllers/MainController.js index e8a4a044935..75ba7362cd4 100644 --- a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/controllers/MainController.js +++ b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/controllers/MainController.js @@ -37,22 +37,14 @@ function MainController(profile) { this.openbisV1 = new openbis(); this.openbisV3 = null; - - + + this.loadV3 = function(callback) { - require(['openbis'], function(openbis) { - //Boilerplate - var testProtocol = window.location.protocol; - var testHost = window.location.hostname; - var testPort = window.location.port; - - var testUrl = testProtocol + "//" + testHost + ":" + testPort; - var testApiUrl = testUrl + "/openbis/openbis/rmi-application-server-v3.json"; - - mainController.openbisV3 = new openbis(testApiUrl); - mainController.openbisV3._private.sessionToken = mainController.serverFacade.getSession(); - callback(); - }); + this.serverFacade.getOpenbisV3(function(openbisV3) { + mainController.openbisV3 = openbisV3 + mainController.openbisV3._private.sessionToken = mainController.serverFacade.getSession(); + callback(); + }); }; // Server Facade Object @@ -100,9 +92,12 @@ function MainController(profile) { $("#username").focus(); var callback = function() {Util.unblockUI();}; Util.showError('The given username or password is not correct.', callback); + this.serverFacade.doIfFileAuthenticationService((function() { + this._enablePasswordResetLink(); + }).bind(this)); return; } - + // // Back Button Logic // @@ -207,7 +202,50 @@ function MainController(profile) { ); }); } - + + this._enablePasswordResetLink = function() { + + var userId = $("#username").val(); + var $container = $("#password-reset-container"); + $container.empty(); + + $resetLink = $("<a>").text("reset password by email for user " + userId); + $container.append($resetLink); + var height = $container.height(); + $container.css({ "margin-top" : -height + "px" }); + + $resetLink.on("click", (function() { + Util.blockUI(); + this.serverFacade.sendResetPasswordEmail(userId, function() { + Util.unblockUI(); + Util.showInfo("An email with instructions how to reset the password has been sent to " + userId + " if this user exists."); + }); + + }).bind(this)); + + } + + this.resetPasswordRequested = function() { + var queryString = Util.queryString(); + return queryString.resetPassword == "true"; + } + + this.resetPassword = function() { + var queryString = Util.queryString(); + var userId = queryString.userId; + var token = queryString.token; + + if (userId && token) { + Util.blockUI(); + this.serverFacade.resetPassword(userId, token, function() { + Util.unblockUI(); + Util.showInfo("A new password has been sent as an email to user " + userId + " if this user exists."); + }); + } else { + Util.showError("To reset the password, the parameters 'userId' and 'token' need to be set."); + } + } + // // Main View Changer - Everything on the application rely on this method to alter the views, arg should be a string // diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/server/ServerFacade.js b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/server/ServerFacade.js index dc293a163d5..9b942f6316d 100644 --- a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/server/ServerFacade.js +++ b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/as/webapps/eln-lims/html/js/server/ServerFacade.js @@ -26,8 +26,26 @@ */ function ServerFacade(openbisServer) { this.openbisServer = openbisServer; - + + // + // V3 API creation // + this.getOpenbisV3 = function(callbackFunction) { + require(['openbis'], function(openbis) { + //Boilerplate + var testProtocol = window.location.protocol; + var testHost = window.location.hostname; + var testPort = window.location.port; + + var testUrl = testProtocol + "//" + testHost + ":" + testPort; + var testApiUrl = testUrl + "/openbis/openbis/rmi-application-server-v3.json"; + + var openbisV3 = new openbis(testApiUrl); + callbackFunction(openbisV3); + }); + } + + // // Intercepting general errors // var responseInterceptor = function(response, action){ @@ -560,6 +578,66 @@ function ServerFacade(openbisServer) { // // ELN Custom API // + + this.sendResetPasswordEmail = function(userId, callbackFunction) { + var parameters = { + method : "sendResetPasswordEmail", + userId : userId, + baseUrl : location.protocol + '//' + location.host + location.pathname + }; + this._callPasswordResetService(parameters, callbackFunction); + } + + this.resetPassword = function(userId, token, callbackFunction) { + var parameters = { + method : "resetPassword", + userId : userId, + token : token + }; + this._callPasswordResetService(parameters, callbackFunction); + } + + this.doIfFileAuthenticationService = function(callbackFunction) { + var _this = this; + this.getOpenbisV3(function(openbisV3) { + openbisV3.loginAsAnonymousUser().done(function(sessionToken) { + openbisV3.getServerInformation().done(function(serverInformation) { + var authSystem = serverInformation["authentication-service"]; + if (authSystem && authSystem.indexOf("file") !== -1) { + callbackFunction(); + } + }); + }).fail(function(result) { + console.log("Call failed to server: " + JSON.stringify(result)); + }); + }); + } + + this._callPasswordResetService = function(parameters, callbackFunction) { + var _this = this; + this.getOpenbisV3(function(openbisV3) { + + openbisV3.loginAsAnonymousUser().done(function(sessionToken) { + _this.openbisServer._internal.sessionToken = sessionToken; + + _this.listDataStores(function(dataStores) { + profile.allDataStores = dataStores.result; + _this.customELNApi(parameters, function(error, result) { + if (error) { + Util.showError(error); + } else { + callbackFunction(result); + } + }, "password-reset-api"); + }); + + }).fail(function(result) { + console.log("Call failed to server: " + JSON.stringify(result)); + }); + + }); + } + this.customELNApi = function(parameters, callbackFunction, service) { if(!service) { service = "eln-lims-api"; diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore-source/PersistentKeyValueStore.java b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore-source/PersistentKeyValueStore.java new file mode 100644 index 00000000000..c1aec05d6bb --- /dev/null +++ b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore-source/PersistentKeyValueStore.java @@ -0,0 +1,27 @@ +package ch.ethz.sis; + +import java.io.Serializable; +import java.util.concurrent.ConcurrentHashMap; +import java.util.concurrent.ConcurrentMap; + + + +public class PersistentKeyValueStore { + private static ConcurrentMap<String, Serializable> keyStore = new ConcurrentHashMap<>(); + + public static void put(String key, Serializable value) { + keyStore.put(key, value); + } + + public static Serializable get(String key) { + return keyStore.get(key); + } + + public static void remove(String key) { + keyStore.remove(key); + } + + public static boolean containsKey(String key) { + return keyStore.containsKey(key); + } +} diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore.jar b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/lib/persistentkeyvaluestore.jar new file mode 100644 index 0000000000000000000000000000000000000000..d3f77f6a23766b0947ddd07d80311cdfe1069101 GIT binary patch literal 974 zcmWIWW@Zs#;Nak3kgELe#ef7v7+4s5T|*poJ^kGDeI5Ng-CTo1^nBg^onm14?0e?4 zkGHPgMP6@Rt#fD2Zw@lJV*KFgqo+&^0p9E!o9da~Ndt|N1mXa=1)^vcXaZ%EGxSqS zGOF~8GmG^DQj368Norn+cWPx=Voqsla7lhqs$OzVVsUZrl-v12jv~kQHwGm{-dd!) zEh>L+q(h{>X_i9mN<+1ySxpCTY)_qg;L6*)&2J`csh`XrCpRlAspeb1(Y%?lnvJHd z>}lW5{H%L!T`X4j|K~s917dQ^CniK}-Np8Ox4N7Emmc#wi;q6<+kd)0dYSBpW$&wO zdNtd2GH=e8+V--f=lWabyq`QX`~O6!8muwBQuu)T_J)|_TsHk0$Id1EK4r7YFlF|l z$1~~_RI7zOUiE%n<$GV)Z@HLTOSZ{Qb)V=tGjeBN-^Mv_W%Ra!mi=cZ+|k)8v8?P4 ze~R7t4TX*?r>Cv=erob!##KZ1-o#z&A|ef9E=@dSayZA?qDJ2$r}+KaHD2nx*Nxsz z^YnWW$!e-%=)Lvtx)+9P%++?pf0}2*^}<Pe_T+ETSx*aiuV0Qxi`e-?u2km{+u_TJ zbrwf&RV*=)Q))KJzWIKJeOpL;*`a`*?OwO|mOndXcy{U|)lJ)ZWmoTTUflgr=CMJq z(BT@HUbmMYowxhXZnfZkrS|@%#_24}U5@uf{PM%MNzdM||5^UUiboGUj@g(0=83w@ zYty}7VAH=(_0Qs_2Hja^uH(7iL+Ir7o@*wysuLF0vPE`H((MY-P_y4Df8qZ8q-WAx z@ga{=e@!zAc(td?<Hj9_j0;-+!B2yAdb~DyEo$e~c+}OUo1`gZubwZoqTY33jOF30 zD);6Zo0Lvlen#>rFj97OMxR>kcXzFTruXKU?hbzq_psC6k0h@N|7bmXUU?gr^R`cd zdfv*bTqdLos)#$iQ#%%`dm&2Z&=a;9t9DJA^Glq^Fsftc`~%AcmA#!=bd?Njf+C~q z89^yGQM}tNnTdhHhZU4^8JR>F5SarxRf94ID!`RhkWB&Q0Aw3LIRF6?flQ+FLx49c Q8%Qe?5Y7eC(##+p0P|aWv;Y7A literal 0 HcmV?d00001 diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/password-reset-api.py b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/password-reset-api.py new file mode 100644 index 00000000000..486988df762 --- /dev/null +++ b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/password-reset-api.py @@ -0,0 +1,130 @@ +from ch.systemsx.cisd.openbis.dss.generic.server import DataStoreServer +from ch.systemsx.cisd.openbis.generic.shared.api.v1 import IGeneralInformationService; +from ch.systemsx.cisd.common.exceptions import UserFailureException +from ch.ethz.sis import PersistentKeyValueStore +from ch.ethz.sis.openbis.generic.server.sharedapi.v3.json import GenericObjectMapper; +from ch.systemsx.cisd.openbis.common.api.client import ServiceFinder; +from ch.systemsx.cisd.common.mail import EMailAddress; +from java.lang import String +from java.util import UUID +from random import SystemRandom +import subprocess, os, string, time + + +passwdShPath = '../openBIS-server/jetty/bin/passwd.sh' +RESET_TOKEN_KEY_POSTFIX = "-reset-token" +OPENBISURL = DataStoreServer.getConfigParameters().getServerURL() + "/openbis/openbis" + +# +# API functions +# + +def process(tr, parameters, tableBuilder): + if (parameters["method"] == "sendResetPasswordEmail"): + if (parameters["userId"] is not None and parameters["baseUrl"] is not None): + sendResetPasswordEmail(tr, parameters["userId"], parameters["baseUrl"]) + else: + raise UserFailureException("When invoking method 'sendResetPasswordEmail', the parameter 'userId' is required.") + elif (parameters["method"] == "resetPassword"): + if (parameters["userId"] is not None and parameters["token"] is not None): + resetPassword(tr, parameters["userId"], parameters["token"]) + else: + raise UserFailureException("When invoking method 'resetPassword', the parameters 'userId' and 'token' are required.") + else: + raise UserFailureException("Unknown method: " + parameters["method"]) + + tableBuilder.addHeader("STATUS"); + tableBuilder.addHeader("MESSAGE"); + tableBuilder.addHeader("RESULT"); + row = tableBuilder.addRow(); + row.setCell("STATUS","OK"); + row.setCell("MESSAGE", "Operation Successful"); + row.setCell("RESULT", getJsonForData( { "result" : "success" })); + + +def sendResetPasswordEmail(tr, userId, baseUrl): + print("sendResetPasswordEmail") + # generate and store token + token = UUID.randomUUID().toString() + timestamp = time.time() + print("timestamp: " + str(timestamp)) + PersistentKeyValueStore.put(userId + RESET_TOKEN_KEY_POSTFIX, { "token" : token, "timestamp" : timestamp}) + # send email + emailAddress = getUserEmail(tr, userId) + sendResetPasswordEmailInternal(tr, emailAddress, userId, token, baseUrl) + +def resetPassword(tr, userId, token): + if tokenIsValid(userId, token): + email = getUserEmail(tr, userId) + resetPasswordInternal(tr, email, userId) + PersistentKeyValueStore.remove(userId + RESET_TOKEN_KEY_POSTFIX) + else: + raise UserFailureException("Invalid token.") + +# +# internal functions +# + +def sendMail(tr, email, subject, body): + replyTo = None; + fromAddress = None; + recipient1 = EMailAddress(email); + tr.getGlobalState().getMailClient().sendEmailMessage(subject, body, replyTo, fromAddress, recipient1); + # TODO don't print message - contains password + print "--- MAIL ---" + " Recipient: " + email + " Topic: " + subject + " Message: " + body + +def getJsonForData(data): + objectMapper = GenericObjectMapper(); + jsonValue = objectMapper.writeValueAsString(data); + return jsonValue; + +def tokenIsValid(userId, token): + return PersistentKeyValueStore.get(userId + RESET_TOKEN_KEY_POSTFIX) == token + +def sendResetPasswordEmailInternal(tr, email, userId, token, baseUrl): + passwordResetLink = getPasswordResetLink(email, userId, token, baseUrl) + passwordResetRequestSubject = getProperty(tr, "password-reset-request-subject") % (userId) + passwordResetRequestBody = getProperty(tr, "password-reset-request-body") % (userId, passwordResetLink) + sendMail(tr, email, passwordResetRequestSubject, passwordResetRequestBody) + +def sendEmailWithNewPassword(tr, email, userId, newPassword): + newPasswordSubject = getProperty(tr, "new-password-subject") % (userId) + newPasswordBody = getProperty(tr, "new-password-body") % (newPassword) + sendMail(tr, email, newPasswordSubject, newPasswordBody) + +def getPasswordResetLink(emailAddress, userId, token, baseUrl): + return "%s?resetPassword=true&&userId=%s&token=%s" % (baseUrl, userId, token) + +def resetPasswordInternal(tr, email, userId): + newPassword = getNewPassword() + updateUserPassword(userId, newPassword) + sendEmailWithNewPassword(tr, email, userId, newPassword) + +def getUserEmail(tr, userId): + for person in getPersons(tr): + if person.getUserId() == userId: + return person.getEmail() + raise UserFailureException("User email not found.") + +def getPersons(tr): + servFinder = ServiceFinder("openbis", IGeneralInformationService.SERVICE_URL); + infService = servFinder.createService(IGeneralInformationService, OPENBISURL); + return infService.listPersons(tr.getOpenBisServiceSessionToken()); + +def getNewPassword(): + length = 12 + rng = SystemRandom() + chars = string.ascii_letters + string.digits + '!@#$%^&*()' + return ''.join(rng.choice(chars) for i in range(length)) + +def updateUserPassword(userId, password): + if os.path.isfile(passwdShPath): + subprocess.call([path, 'change', userId, '-p', password]) #Changes the user pass, works always + return True; + else: + return False; + +def getProperty(tr, key): + threadPropertyDict = {} + threadProperties = tr.getGlobalState().getThreadParameters().getThreadProperties() + return threadProperties.getProperty(key) diff --git a/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/plugin.properties b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/plugin.properties new file mode 100644 index 00000000000..18c916fc9a5 --- /dev/null +++ b/openbis_standard_technologies/dist/core-plugins/eln-lims/1/dss/reporting-plugins/password-reset-api/plugin.properties @@ -0,0 +1,7 @@ +label = Password Reset API +class = ch.systemsx.cisd.openbis.dss.generic.server.plugins.jython.JythonIngestionService +script-path = password-reset-api.py +password-reset-request-subject = ELN-LIMS password reset for %s +password-reset-request-body = Hi,\n\nA request has been made to reset the password of user %s.\n\nClick on this link in order to get a new password:\n%s\n\nSincere regards,\nYour ELN-LIMS Team +new-password-subject = ELN-LIMS new password for %s +new-password-body = Hi,\n\nYour new password is: %s\n\nPlease login and change it immediately.\n\nSincere regards,\nYour ELN-LIMS Team -- GitLab