// This file is part of MinIO Console Server
// Copyright (c) 2021 MinIO, Inc.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program.  If not, see <http://www.gnu.org/licenses/>.

package restapi

import (
	"context"
	"github.com/minio/console/pkg/auth/ldap"
	"github.com/minio/minio/pkg/madmin"
	"net/http"
	"time"

	"github.com/go-openapi/runtime"
	"github.com/go-openapi/runtime/middleware"
	"github.com/minio/console/models"
	"github.com/minio/console/restapi/operations"
	"github.com/minio/console/restapi/operations/user_api"
)

func registerAccountHandlers(api *operations.ConsoleAPI) {
	// change user password
	api.UserAPIAccountChangePasswordHandler = user_api.AccountChangePasswordHandlerFunc(func(params user_api.AccountChangePasswordParams, session *models.Principal) middleware.Responder {
		changePasswordResponse, err := getChangePasswordResponse(session, params)
		if err != nil {
			return user_api.NewAccountChangePasswordDefault(int(err.Code)).WithPayload(err)
		}
		// Custom response writer to update the session cookies
		return middleware.ResponderFunc(func(w http.ResponseWriter, p runtime.Producer) {
			cookie := NewSessionCookieForConsole(changePasswordResponse.SessionID)
			http.SetCookie(w, &cookie)
			user_api.NewLoginCreated().WithPayload(changePasswordResponse).WriteResponse(w, p)
		})
	})
}

// changePassword validate current current user password and if it's correct set the new password
func changePassword(ctx context.Context, client MinioAdmin, session *models.Principal, currentSecretKey, newSecretKey string) error {
	if session.AccountSecretKey != currentSecretKey {
		return errChangePassword
	}
	if err := client.changePassword(ctx, session.AccountAccessKey, newSecretKey); err != nil {
		return err
	}
	return nil
}

// getChangePasswordResponse will validate user knows what is the current password (avoid account hijacking), update user account password
// and authenticate the user generating a new session token/cookie
func getChangePasswordResponse(session *models.Principal, params user_api.AccountChangePasswordParams) (*models.LoginResponse, *models.Error) {
	ctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)
	defer cancel()
	// changePassword operations requires an AdminClient initialized with parent account credentials not
	// STS credentials

	var parentAccountClient *madmin.AdminClient
	var err error
	if ldap.GetLDAPEnabled(){
		parentAccountClient, err = newMAdminClient(&models.Principal{
			STSAccessKeyID:     session.STSAccessKeyID,
			STSSecretAccessKey: session.STSSecretAccessKey,
		})
	}else{
		parentAccountClient, err = newMAdminClient(&models.Principal{
			STSAccessKeyID:     session.AccountAccessKey,
			STSSecretAccessKey: session.AccountSecretKey,
		})
	}

	if err != nil {
		return nil, prepareError(err)
	}
	// parentAccountClient will contain access and secret key credentials for the user
	userClient := adminClient{client: parentAccountClient}
	accessKey := session.AccountAccessKey
	currentSecretKey := *params.Body.CurrentSecretKey
	newSecretKey := *params.Body.NewSecretKey
	// currentSecretKey will compare currentSecretKey against the stored secret key inside the encrypted session
	if err := changePassword(ctx, userClient, session, currentSecretKey, newSecretKey); err != nil {
		return nil, prepareError(errChangePassword, nil, err)
	}
	// user credentials are updated at this point, we need to generate a new admin client and authenticate using
	// the new credentials
	credentials, err := getConsoleCredentials(ctx, accessKey, newSecretKey)
	if err != nil {
		return nil, prepareError(errInvalidCredentials, nil, err)
	}
	// authenticate user and generate new session token
	sessionID, err := login(credentials)
	if err != nil {
		return nil, prepareError(errInvalidCredentials, nil, err)
	}
	// serialize output
	loginResponse := &models.LoginResponse{
		SessionID: *sessionID,
	}
	return loginResponse, nil
}
