/* * Copyright 2016 Red Hat, Inc. and/or its affiliates * and other contributors as indicated by the @author tags. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.keycloak.client.admin.cli.commands; import org.jboss.aesh.cl.CommandDefinition; import org.jboss.aesh.cl.Option; import org.jboss.aesh.console.command.CommandException; import org.jboss.aesh.console.command.CommandResult; import org.jboss.aesh.console.command.invocation.CommandInvocation; import org.keycloak.client.admin.cli.config.ConfigData; import java.io.PrintWriter; import java.io.StringWriter; import static org.keycloak.client.admin.cli.operations.UserOperations.getIdFromUsername; import static org.keycloak.client.admin.cli.operations.UserOperations.resetUserPassword; import static org.keycloak.client.admin.cli.util.AuthUtil.ensureToken; import static org.keycloak.client.admin.cli.util.ConfigUtil.DEFAULT_CONFIG_FILE_STRING; import static org.keycloak.client.admin.cli.util.ConfigUtil.credentialsAvailable; import static org.keycloak.client.admin.cli.util.ConfigUtil.loadConfig; import static org.keycloak.client.admin.cli.util.IoUtil.readSecret; import static org.keycloak.client.admin.cli.util.OsUtil.CMD; import static org.keycloak.client.admin.cli.util.OsUtil.EOL; import static org.keycloak.client.admin.cli.util.OsUtil.PROMPT; /** * @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a> */ @CommandDefinition(name = "set-password", description = "[ARGUMENTS]") public class SetPasswordCmd extends AbstractAuthOptionsCmd { @Option(name = "username", description = "Username") String username; @Option(name = "userid", description = "User ID") String userid; @Option(shortName = 'p', name = "new-password", description = "New password") String pass; @Option(shortName = 't', name = "temporary", description = "is password temporary", hasValue = false) boolean temporary; @Override public CommandResult execute(CommandInvocation commandInvocation) throws CommandException, InterruptedException { try { if (printHelp()) { return help ? CommandResult.SUCCESS : CommandResult.FAILURE; } processGlobalOptions(); return process(commandInvocation); } catch (IllegalArgumentException e) { throw new IllegalArgumentException(e.getMessage() + suggestHelp(), e); } finally { commandInvocation.stop(); } } public CommandResult process(CommandInvocation commandInvocation) throws CommandException, InterruptedException { if (args != null && args.size() > 0) { throw new IllegalArgumentException("Invalid option: " + args.get(0)); } if (userid == null && username == null) { throw new IllegalArgumentException("No user specified. Use --username or --userid to specify user"); } if (userid != null && username != null) { throw new IllegalArgumentException("Options --userid and --username are mutually exclusive"); } if (pass == null) { pass = readSecret("Enter password: ", commandInvocation); } ConfigData config = loadConfig(); config = copyWithServerInfo(config); setupTruststore(config, commandInvocation); String auth = null; config = ensureAuthInfo(config, commandInvocation); config = copyWithServerInfo(config); if (credentialsAvailable(config)) { auth = ensureToken(config); } auth = auth != null ? "Bearer " + auth : null; final String server = config.getServerUrl(); final String realm = getTargetRealm(config); final String adminRoot = adminRestRoot != null ? adminRestRoot : composeAdminRoot(server); // if username is specified resolve id if (username != null) { userid = getIdFromUsername(adminRoot, realm, auth, username); } resetUserPassword(adminRoot, realm, auth, userid, pass, temporary); return CommandResult.SUCCESS; } @Override protected boolean nothingToDo() { return noOptions() && username == null && userid == null && pass == null; } protected String suggestHelp() { return EOL + "Try '" + CMD + " help set-password' for more information"; } protected String help() { return usage(); } public static String usage() { StringWriter sb = new StringWriter(); PrintWriter out = new PrintWriter(sb); out.println("Usage: " + CMD + " set-password (--username USERNAME | --userid ID) [--password PASSWORD] [ARGUMENTS]"); out.println(); out.println("Command to reset user's password."); out.println(); out.println("Use `" + CMD + " config credentials` to establish an authenticated session, or use CREDENTIALS OPTIONS"); out.println("to perform one time authentication."); out.println(); out.println("Arguments:"); out.println(); out.println(" Global options:"); out.println(" -x Print full stack trace when exiting with error"); out.println(" --config Path to the config file (" + DEFAULT_CONFIG_FILE_STRING + " by default)"); out.println(" --truststore PATH Path to a truststore containing trusted certificates"); out.println(" --trustpass PASSWORD Truststore password (prompted for if not specified and --truststore is used)"); out.println(" CREDENTIALS OPTIONS Same set of options as accepted by '" + CMD + " config credentials' in order to establish"); out.println(" an authenticated sessions. This allows on-the-fly transient authentication that does"); out.println(" not touch a config file."); out.println(); out.println(" Command specific options:"); out.println(" --username USERNAME Identify target user by 'username'"); out.println(" --userid ID Identify target user by 'id'"); out.println(" -p, --new-password New password to set. If not specified you will be prompted for it."); out.println(" -t, --temporary Make the new password temporary - user has to change it on next logon"); out.println(" -a, --admin-root URL URL of Admin REST endpoint root if not default - e.g. http://localhost:8080/auth/admin"); out.println(" -r, --target-realm REALM Target realm to issue requests against if not the one authenticated against"); out.println(); out.println("Examples:"); out.println(); out.println("Set new temporary password for the user:"); out.println(" " + PROMPT + " " + CMD + " set-password -r demorealm --username testuser --password NEWPASS -t"); out.println(); out.println(); out.println("Use '" + CMD + " help' for general information and a list of commands"); return sb.toString(); } }