2014-05-28 01:09:08 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Bernhard Posselt <dev@bernhard-posselt.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Julius Haertl <jus@bitgrid.net>
|
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2016-07-21 18:07:57 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Victor Dubiniuk <dubiniuk@owncloud.com>
|
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
2014-05-28 01:09:08 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2016-01-20 12:42:19 +03:00
|
|
|
namespace OC\Core\Controller;
|
2014-05-28 01:09:08 +04:00
|
|
|
|
|
|
|
use \OCP\AppFramework\Controller;
|
2017-04-14 14:42:40 +03:00
|
|
|
use OCP\AppFramework\Http\JSONResponse;
|
2014-05-28 01:09:08 +04:00
|
|
|
use \OCP\AppFramework\Http\TemplateResponse;
|
2015-08-22 21:42:45 +03:00
|
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
2017-04-07 23:42:43 +03:00
|
|
|
use OCP\Defaults;
|
2016-09-29 17:38:29 +03:00
|
|
|
use OCP\Encryption\IManager;
|
2014-06-06 18:36:10 +04:00
|
|
|
use \OCP\IURLGenerator;
|
|
|
|
use \OCP\IRequest;
|
|
|
|
use \OCP\IL10N;
|
|
|
|
use \OCP\IConfig;
|
2017-03-28 21:39:36 +03:00
|
|
|
use OCP\IUser;
|
2014-10-20 21:05:48 +04:00
|
|
|
use OCP\IUserManager;
|
2015-02-12 18:03:51 +03:00
|
|
|
use OCP\Mail\IMailer;
|
2016-08-28 15:22:29 +03:00
|
|
|
use OCP\Security\ICrypto;
|
2014-10-20 21:05:48 +04:00
|
|
|
use OCP\Security\ISecureRandom;
|
2014-05-28 01:09:08 +04:00
|
|
|
|
2014-10-20 21:05:48 +04:00
|
|
|
/**
|
|
|
|
* Class LostController
|
|
|
|
*
|
2014-10-24 15:41:44 +04:00
|
|
|
* Successfully changing a password will emit the post_passwordReset hook.
|
|
|
|
*
|
2016-01-20 12:42:19 +03:00
|
|
|
* @package OC\Core\Controller
|
2014-10-20 21:05:48 +04:00
|
|
|
*/
|
2014-05-28 01:09:08 +04:00
|
|
|
class LostController extends Controller {
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var IURLGenerator */
|
2014-05-28 01:09:08 +04:00
|
|
|
protected $urlGenerator;
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var IUserManager */
|
2014-06-06 18:36:10 +04:00
|
|
|
protected $userManager;
|
2017-04-07 23:42:43 +03:00
|
|
|
/** @var Defaults */
|
2014-05-28 21:13:07 +04:00
|
|
|
protected $defaults;
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var IL10N */
|
2014-05-28 21:13:07 +04:00
|
|
|
protected $l10n;
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var string */
|
2014-05-28 21:13:07 +04:00
|
|
|
protected $from;
|
2016-09-29 17:38:29 +03:00
|
|
|
/** @var IManager */
|
|
|
|
protected $encryptionManager;
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var IConfig */
|
2014-06-06 18:36:10 +04:00
|
|
|
protected $config;
|
2014-10-20 21:05:48 +04:00
|
|
|
/** @var ISecureRandom */
|
|
|
|
protected $secureRandom;
|
2015-02-12 18:03:51 +03:00
|
|
|
/** @var IMailer */
|
|
|
|
protected $mailer;
|
2015-08-22 21:42:45 +03:00
|
|
|
/** @var ITimeFactory */
|
|
|
|
protected $timeFactory;
|
2016-08-28 15:22:29 +03:00
|
|
|
/** @var ICrypto */
|
|
|
|
protected $crypto;
|
2014-07-24 14:50:39 +04:00
|
|
|
|
|
|
|
/**
|
2014-10-20 21:05:48 +04:00
|
|
|
* @param string $appName
|
|
|
|
* @param IRequest $request
|
|
|
|
* @param IURLGenerator $urlGenerator
|
2014-10-24 15:41:44 +04:00
|
|
|
* @param IUserManager $userManager
|
2017-04-07 23:42:43 +03:00
|
|
|
* @param Defaults $defaults
|
2014-10-20 21:05:48 +04:00
|
|
|
* @param IL10N $l10n
|
|
|
|
* @param IConfig $config
|
|
|
|
* @param ISecureRandom $secureRandom
|
2016-09-29 17:38:29 +03:00
|
|
|
* @param string $defaultMailAddress
|
|
|
|
* @param IManager $encryptionManager
|
2015-02-12 18:03:51 +03:00
|
|
|
* @param IMailer $mailer
|
2015-08-22 21:42:45 +03:00
|
|
|
* @param ITimeFactory $timeFactory
|
2016-08-28 15:22:29 +03:00
|
|
|
* @param ICrypto $crypto
|
2014-07-24 14:50:39 +04:00
|
|
|
*/
|
2014-06-06 18:36:10 +04:00
|
|
|
public function __construct($appName,
|
2014-10-20 21:05:48 +04:00
|
|
|
IRequest $request,
|
|
|
|
IURLGenerator $urlGenerator,
|
|
|
|
IUserManager $userManager,
|
2017-04-07 23:42:43 +03:00
|
|
|
Defaults $defaults,
|
2014-10-20 21:05:48 +04:00
|
|
|
IL10N $l10n,
|
|
|
|
IConfig $config,
|
|
|
|
ISecureRandom $secureRandom,
|
2016-09-29 17:38:29 +03:00
|
|
|
$defaultMailAddress,
|
|
|
|
IManager $encryptionManager,
|
2015-08-22 21:42:45 +03:00
|
|
|
IMailer $mailer,
|
2016-08-28 15:22:29 +03:00
|
|
|
ITimeFactory $timeFactory,
|
|
|
|
ICrypto $crypto) {
|
2014-05-28 01:09:08 +04:00
|
|
|
parent::__construct($appName, $request);
|
|
|
|
$this->urlGenerator = $urlGenerator;
|
2014-06-06 18:36:10 +04:00
|
|
|
$this->userManager = $userManager;
|
2014-05-28 21:13:07 +04:00
|
|
|
$this->defaults = $defaults;
|
|
|
|
$this->l10n = $l10n;
|
2014-10-20 21:05:48 +04:00
|
|
|
$this->secureRandom = $secureRandom;
|
2016-09-29 17:38:29 +03:00
|
|
|
$this->from = $defaultMailAddress;
|
|
|
|
$this->encryptionManager = $encryptionManager;
|
2014-06-06 18:36:10 +04:00
|
|
|
$this->config = $config;
|
2015-02-12 18:03:51 +03:00
|
|
|
$this->mailer = $mailer;
|
2015-08-22 21:42:45 +03:00
|
|
|
$this->timeFactory = $timeFactory;
|
2016-08-28 15:22:29 +03:00
|
|
|
$this->crypto = $crypto;
|
2014-05-28 01:09:08 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-06-06 18:36:10 +04:00
|
|
|
* Someone wants to reset their password:
|
|
|
|
*
|
2014-05-28 01:09:08 +04:00
|
|
|
* @PublicPage
|
|
|
|
* @NoCSRFRequired
|
2014-06-06 18:36:10 +04:00
|
|
|
*
|
2014-05-28 21:13:07 +04:00
|
|
|
* @param string $token
|
2014-06-13 18:18:21 +04:00
|
|
|
* @param string $userId
|
2014-10-20 21:05:48 +04:00
|
|
|
* @return TemplateResponse
|
2014-05-28 01:09:08 +04:00
|
|
|
*/
|
2014-06-13 18:18:21 +04:00
|
|
|
public function resetform($token, $userId) {
|
2017-05-11 17:46:43 +03:00
|
|
|
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
|
|
|
|
return new TemplateResponse('core', 'error', [
|
|
|
|
'errors' => [['error' => $this->l10n->t('Password reset is disabled')]]
|
|
|
|
],
|
|
|
|
'guest'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2016-05-19 14:23:12 +03:00
|
|
|
try {
|
|
|
|
$this->checkPasswordResetToken($token, $userId);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
return new TemplateResponse(
|
|
|
|
'core', 'error', [
|
|
|
|
"errors" => array(array("error" => $e->getMessage()))
|
|
|
|
],
|
|
|
|
'guest'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2014-06-06 18:36:10 +04:00
|
|
|
return new TemplateResponse(
|
2016-01-20 12:42:19 +03:00
|
|
|
'core',
|
|
|
|
'lostpassword/resetpassword',
|
2014-06-06 18:36:10 +04:00
|
|
|
array(
|
2014-10-20 21:05:48 +04:00
|
|
|
'link' => $this->urlGenerator->linkToRouteAbsolute('core.lost.setPassword', array('userId' => $userId, 'token' => $token)),
|
2014-06-06 18:36:10 +04:00
|
|
|
),
|
|
|
|
'guest'
|
|
|
|
);
|
2014-05-28 01:09:08 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2016-05-19 14:23:12 +03:00
|
|
|
/**
|
2016-08-29 22:17:16 +03:00
|
|
|
* @param string $token
|
2016-05-19 14:23:12 +03:00
|
|
|
* @param string $userId
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2016-12-08 13:38:23 +03:00
|
|
|
protected function checkPasswordResetToken($token, $userId) {
|
2016-05-19 14:23:12 +03:00
|
|
|
$user = $this->userManager->get($userId);
|
2016-08-28 15:22:29 +03:00
|
|
|
if($user === null) {
|
|
|
|
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$encryptedToken = $this->config->getUserValue($userId, 'core', 'lostpassword', null);
|
|
|
|
$mailAddress = !is_null($user->getEMailAddress()) ? $user->getEMailAddress() : '';
|
|
|
|
$decryptedToken = $this->crypto->decrypt($encryptedToken, $mailAddress.$this->config->getSystemValue('secret'));
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
|
|
|
}
|
2016-05-19 14:23:12 +03:00
|
|
|
|
2016-08-28 15:22:29 +03:00
|
|
|
$splittedToken = explode(':', $decryptedToken);
|
2016-05-19 14:23:12 +03:00
|
|
|
if(count($splittedToken) !== 2) {
|
|
|
|
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($splittedToken[0] < ($this->timeFactory->getTime() - 60*60*12) ||
|
|
|
|
$user->getLastLogin() > $splittedToken[0]) {
|
|
|
|
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is expired'));
|
|
|
|
}
|
|
|
|
|
2016-08-29 22:17:16 +03:00
|
|
|
if (!hash_equals($splittedToken[1], $token)) {
|
2016-05-19 14:23:12 +03:00
|
|
|
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-20 21:05:48 +04:00
|
|
|
/**
|
|
|
|
* @param $message
|
|
|
|
* @param array $additional
|
|
|
|
* @return array
|
|
|
|
*/
|
2014-06-06 18:51:58 +04:00
|
|
|
private function error($message, array $additional=array()) {
|
2014-06-13 18:18:39 +04:00
|
|
|
return array_merge(array('status' => 'error', 'msg' => $message), $additional);
|
2014-06-06 18:51:58 +04:00
|
|
|
}
|
|
|
|
|
2014-10-20 21:05:48 +04:00
|
|
|
/**
|
|
|
|
* @return array
|
|
|
|
*/
|
2014-06-06 18:51:58 +04:00
|
|
|
private function success() {
|
|
|
|
return array('status'=>'success');
|
|
|
|
}
|
|
|
|
|
2014-05-28 21:13:07 +04:00
|
|
|
/**
|
|
|
|
* @PublicPage
|
2017-04-12 21:32:48 +03:00
|
|
|
* @BruteForceProtection(action=passwordResetEmail)
|
2017-04-22 09:12:54 +03:00
|
|
|
* @AnonRateThrottle(limit=10, period=300)
|
2014-06-06 18:36:10 +04:00
|
|
|
*
|
|
|
|
* @param string $user
|
2017-04-14 14:42:40 +03:00
|
|
|
* @return JSONResponse
|
2014-05-28 21:13:07 +04:00
|
|
|
*/
|
2014-10-20 21:05:48 +04:00
|
|
|
public function email($user){
|
2017-05-11 17:46:43 +03:00
|
|
|
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
|
|
|
|
return new JSONResponse($this->error($this->l10n->t('Password reset is disabled')));
|
|
|
|
}
|
|
|
|
|
2014-06-06 18:36:10 +04:00
|
|
|
// FIXME: use HTTP error codes
|
2014-05-28 21:13:07 +04:00
|
|
|
try {
|
2014-10-20 21:05:48 +04:00
|
|
|
$this->sendEmail($user);
|
2014-05-28 21:13:07 +04:00
|
|
|
} catch (\Exception $e){
|
2017-04-14 14:42:40 +03:00
|
|
|
$response = new JSONResponse($this->error($e->getMessage()));
|
|
|
|
$response->throttle();
|
|
|
|
return $response;
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2017-04-14 14:42:40 +03:00
|
|
|
$response = new JSONResponse($this->success());
|
|
|
|
$response->throttle();
|
|
|
|
return $response;
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-05-28 21:13:07 +04:00
|
|
|
/**
|
|
|
|
* @PublicPage
|
2014-10-20 21:05:48 +04:00
|
|
|
* @param string $token
|
|
|
|
* @param string $userId
|
|
|
|
* @param string $password
|
|
|
|
* @param boolean $proceed
|
|
|
|
* @return array
|
2014-05-28 21:13:07 +04:00
|
|
|
*/
|
2014-10-20 21:05:48 +04:00
|
|
|
public function setPassword($token, $userId, $password, $proceed) {
|
2017-05-11 17:46:43 +03:00
|
|
|
if ($this->config->getSystemValue('lost_password_link', '') !== '') {
|
|
|
|
return $this->error($this->l10n->t('Password reset is disabled'));
|
|
|
|
}
|
|
|
|
|
2016-09-29 17:38:29 +03:00
|
|
|
if ($this->encryptionManager->isEnabled() && !$proceed) {
|
2014-10-20 21:05:48 +04:00
|
|
|
return $this->error('', array('encryption' => true));
|
|
|
|
}
|
|
|
|
|
2014-05-28 21:13:07 +04:00
|
|
|
try {
|
2016-05-19 14:23:12 +03:00
|
|
|
$this->checkPasswordResetToken($token, $userId);
|
2014-06-06 18:51:58 +04:00
|
|
|
$user = $this->userManager->get($userId);
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2017-01-02 23:24:37 +03:00
|
|
|
\OC_Hook::emit('\OC\Core\LostPassword\Controller\LostController', 'pre_passwordReset', array('uid' => $userId, 'password' => $password));
|
|
|
|
|
2014-07-24 14:50:39 +04:00
|
|
|
if (!$user->setPassword($password)) {
|
2014-06-06 18:36:10 +04:00
|
|
|
throw new \Exception();
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-10-29 14:44:15 +03:00
|
|
|
\OC_Hook::emit('\OC\Core\LostPassword\Controller\LostController', 'post_passwordReset', array('uid' => $userId, 'password' => $password));
|
2014-10-24 15:41:44 +04:00
|
|
|
|
2016-08-23 16:01:38 +03:00
|
|
|
$this->config->deleteUserValue($userId, 'core', 'lostpassword');
|
2017-07-24 13:17:53 +03:00
|
|
|
@\OC::$server->getUserSession()->unsetMagicInCookie();
|
2014-06-06 18:36:10 +04:00
|
|
|
} catch (\Exception $e){
|
2014-06-06 18:51:58 +04:00
|
|
|
return $this->error($e->getMessage());
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-06-06 18:51:58 +04:00
|
|
|
return $this->success();
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-10-20 21:05:48 +04:00
|
|
|
/**
|
2017-03-28 21:39:36 +03:00
|
|
|
* @param string $input
|
2014-10-20 21:05:48 +04:00
|
|
|
* @throws \Exception
|
|
|
|
*/
|
2017-03-28 21:39:36 +03:00
|
|
|
protected function sendEmail($input) {
|
|
|
|
$user = $this->findUserByIdOrMail($input);
|
|
|
|
$email = $user->getEMailAddress();
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-05-28 21:13:07 +04:00
|
|
|
if (empty($email)) {
|
2014-06-06 18:36:10 +04:00
|
|
|
throw new \Exception(
|
2015-12-01 14:05:40 +03:00
|
|
|
$this->l10n->t('Could not send reset email because there is no email address for this username. Please contact your administrator.')
|
2014-06-06 18:36:10 +04:00
|
|
|
);
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2016-08-28 15:22:29 +03:00
|
|
|
// Generate the token. It is stored encrypted in the database with the
|
|
|
|
// secret being the users' email address appended with the system secret.
|
|
|
|
// This makes the token automatically invalidate once the user changes
|
|
|
|
// their email address.
|
|
|
|
$token = $this->secureRandom->generate(
|
|
|
|
21,
|
2014-10-20 21:05:48 +04:00
|
|
|
ISecureRandom::CHAR_DIGITS.
|
|
|
|
ISecureRandom::CHAR_LOWER.
|
2016-08-28 15:22:29 +03:00
|
|
|
ISecureRandom::CHAR_UPPER
|
|
|
|
);
|
|
|
|
$tokenValue = $this->timeFactory->getTime() .':'. $token;
|
2017-03-28 21:39:36 +03:00
|
|
|
$encryptedValue = $this->crypto->encrypt($tokenValue, $email . $this->config->getSystemValue('secret'));
|
|
|
|
$this->config->setUserValue($user->getUID(), 'core', 'lostpassword', $encryptedValue);
|
2014-10-20 21:05:48 +04:00
|
|
|
|
2017-03-28 21:39:36 +03:00
|
|
|
$link = $this->urlGenerator->linkToRouteAbsolute('core.lost.resetform', array('userId' => $user->getUID(), 'token' => $token));
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2017-04-12 01:24:58 +03:00
|
|
|
$emailTemplate = $this->mailer->createEMailTemplate();
|
|
|
|
|
|
|
|
$emailTemplate->addHeader();
|
|
|
|
$emailTemplate->addHeading($this->l10n->t('Password reset'));
|
|
|
|
|
|
|
|
$emailTemplate->addBodyText(
|
|
|
|
$this->l10n->t('Click the following button to reset your password. If you have not requested the password reset, then ignore this email.'),
|
|
|
|
$this->l10n->t('Click the following link to reset your password. If you have not requested the password reset, then ignore this email.')
|
|
|
|
);
|
|
|
|
|
|
|
|
$emailTemplate->addBodyButton(
|
|
|
|
$this->l10n->t('Reset your password'),
|
|
|
|
$link,
|
|
|
|
false
|
|
|
|
);
|
|
|
|
$emailTemplate->addFooter();
|
2014-06-06 18:36:10 +04:00
|
|
|
|
2014-05-28 21:13:07 +04:00
|
|
|
try {
|
2015-02-12 18:03:51 +03:00
|
|
|
$message = $this->mailer->createMessage();
|
2017-03-28 21:39:36 +03:00
|
|
|
$message->setTo([$email => $user->getUID()]);
|
2015-02-12 18:03:51 +03:00
|
|
|
$message->setSubject($this->l10n->t('%s password reset', [$this->defaults->getName()]));
|
2017-04-12 01:24:58 +03:00
|
|
|
$message->setPlainBody($emailTemplate->renderText());
|
2017-04-19 01:09:25 +03:00
|
|
|
$message->setHtmlBody($emailTemplate->renderHtml());
|
2015-02-12 18:03:51 +03:00
|
|
|
$message->setFrom([$this->from => $this->defaults->getName()]);
|
|
|
|
$this->mailer->send($message);
|
2014-05-28 21:13:07 +04:00
|
|
|
} catch (\Exception $e) {
|
2014-06-06 18:51:58 +04:00
|
|
|
throw new \Exception($this->l10n->t(
|
2014-06-13 18:02:41 +04:00
|
|
|
'Couldn\'t send reset email. Please contact your administrator.'
|
2014-06-06 18:51:58 +04:00
|
|
|
));
|
2014-05-28 21:13:07 +04:00
|
|
|
}
|
|
|
|
}
|
2014-05-28 01:09:08 +04:00
|
|
|
|
2017-03-28 21:39:36 +03:00
|
|
|
/**
|
|
|
|
* @param string $input
|
|
|
|
* @return IUser
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
protected function findUserByIdOrMail($input) {
|
|
|
|
$user = $this->userManager->get($input);
|
|
|
|
if ($user instanceof IUser) {
|
|
|
|
return $user;
|
|
|
|
}
|
|
|
|
$users = $this->userManager->getByEmail($input);
|
|
|
|
if (count($users) === 1) {
|
|
|
|
return $users[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
throw new \InvalidArgumentException($this->l10n->t('Couldn\'t send reset email. Please make sure your username is correct.'));
|
|
|
|
}
|
2014-05-28 01:09:08 +04:00
|
|
|
}
|