users.js 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314
  1. /* global WIKI */
  2. const bcrypt = require('bcryptjs-then')
  3. const _ = require('lodash')
  4. const tfa = require('node-2fa')
  5. const securityHelper = require('../helpers/security')
  6. const jwt = require('jsonwebtoken')
  7. const Model = require('objection').Model
  8. const bcryptRegexp = /^\$2[ayb]\$[0-9]{2}\$[A-Za-z0-9./]{53}$/
  9. /**
  10. * Users model
  11. */
  12. module.exports = class User extends Model {
  13. static get tableName() { return 'users' }
  14. static get jsonSchema () {
  15. return {
  16. type: 'object',
  17. required: ['email', 'name', 'provider'],
  18. properties: {
  19. id: {type: 'integer'},
  20. email: {type: 'string', format: 'email'},
  21. name: {type: 'string', minLength: 1, maxLength: 255},
  22. providerId: {type: 'number'},
  23. password: {type: 'string'},
  24. role: {type: 'string', enum: ['admin', 'guest', 'user']},
  25. tfaIsActive: {type: 'boolean', default: false},
  26. tfaSecret: {type: 'string'},
  27. jobTitle: {type: 'string'},
  28. location: {type: 'string'},
  29. pictureUrl: {type: 'string'},
  30. isSystem: {type: 'boolean'},
  31. createdAt: {type: 'string'},
  32. updatedAt: {type: 'string'}
  33. }
  34. }
  35. }
  36. static get relationMappings() {
  37. return {
  38. groups: {
  39. relation: Model.ManyToManyRelation,
  40. modelClass: require('./groups'),
  41. join: {
  42. from: 'users.id',
  43. through: {
  44. from: 'userGroups.userId',
  45. to: 'userGroups.groupId'
  46. },
  47. to: 'groups.id'
  48. }
  49. },
  50. provider: {
  51. relation: Model.BelongsToOneRelation,
  52. modelClass: require('./authentication'),
  53. join: {
  54. from: 'users.providerKey',
  55. to: 'authentication.key'
  56. }
  57. },
  58. defaultEditor: {
  59. relation: Model.BelongsToOneRelation,
  60. modelClass: require('./editors'),
  61. join: {
  62. from: 'users.editorKey',
  63. to: 'editors.key'
  64. }
  65. },
  66. locale: {
  67. relation: Model.BelongsToOneRelation,
  68. modelClass: require('./locales'),
  69. join: {
  70. from: 'users.localeCode',
  71. to: 'locales.code'
  72. }
  73. }
  74. }
  75. }
  76. async $beforeUpdate(opt, context) {
  77. await super.$beforeUpdate(opt, context)
  78. this.updatedAt = new Date().toISOString()
  79. if (!(opt.patch && this.password === undefined)) {
  80. await this.generateHash()
  81. }
  82. }
  83. async $beforeInsert(context) {
  84. await super.$beforeInsert(context)
  85. this.createdAt = new Date().toISOString()
  86. this.updatedAt = new Date().toISOString()
  87. await this.generateHash()
  88. }
  89. async generateHash() {
  90. if (this.password) {
  91. if (bcryptRegexp.test(this.password)) { return }
  92. this.password = await bcrypt.hash(this.password, 12)
  93. }
  94. }
  95. async verifyPassword(pwd) {
  96. if (await bcrypt.compare(pwd, this.password) === true) {
  97. return true
  98. } else {
  99. throw new WIKI.Error.AuthLoginFailed()
  100. }
  101. }
  102. async enableTFA() {
  103. let tfaInfo = tfa.generateSecret({
  104. name: WIKI.config.site.title
  105. })
  106. return this.$query.patch({
  107. tfaIsActive: true,
  108. tfaSecret: tfaInfo.secret
  109. })
  110. }
  111. async disableTFA() {
  112. return this.$query.patch({
  113. tfaIsActive: false,
  114. tfaSecret: ''
  115. })
  116. }
  117. async verifyTFA(code) {
  118. let result = tfa.verifyToken(this.tfaSecret, code)
  119. return (result && _.has(result, 'delta') && result.delta === 0)
  120. }
  121. static async processProfile(profile) {
  122. let primaryEmail = ''
  123. if (_.isArray(profile.emails)) {
  124. let e = _.find(profile.emails, ['primary', true])
  125. primaryEmail = (e) ? e.value : _.first(profile.emails).value
  126. } else if (_.isString(profile.email) && profile.email.length > 5) {
  127. primaryEmail = profile.email
  128. } else if (_.isString(profile.mail) && profile.mail.length > 5) {
  129. primaryEmail = profile.mail
  130. } else if (profile.user && profile.user.email && profile.user.email.length > 5) {
  131. primaryEmail = profile.user.email
  132. } else {
  133. return Promise.reject(new Error(WIKI.lang.t('auth:errors.invaliduseremail')))
  134. }
  135. profile.provider = _.lowerCase(profile.provider)
  136. primaryEmail = _.toLower(primaryEmail)
  137. let user = await WIKI.models.users.query().findOne({
  138. email: primaryEmail,
  139. provider: profile.provider
  140. })
  141. if (user) {
  142. user.$query().patchAdnFetch({
  143. email: primaryEmail,
  144. provider: profile.provider,
  145. providerId: profile.id,
  146. name: profile.displayName || _.split(primaryEmail, '@')[0]
  147. })
  148. } else {
  149. user = await WIKI.models.users.query().insertAndFetch({
  150. email: primaryEmail,
  151. provider: profile.provider,
  152. providerId: profile.id,
  153. name: profile.displayName || _.split(primaryEmail, '@')[0]
  154. })
  155. }
  156. // Handle unregistered accounts
  157. // if (!user && profile.provider !== 'local' && (WIKI.config.auth.defaultReadAccess || profile.provider === 'ldap' || profile.provider === 'azure')) {
  158. // let nUsr = {
  159. // email: primaryEmail,
  160. // provider: profile.provider,
  161. // providerId: profile.id,
  162. // password: '',
  163. // name: profile.displayName || profile.name || profile.cn,
  164. // rights: [{
  165. // role: 'read',
  166. // path: '/',
  167. // exact: false,
  168. // deny: false
  169. // }]
  170. // }
  171. // return WIKI.models.users.query().insert(nUsr)
  172. // }
  173. return user
  174. }
  175. static async login (opts, context) {
  176. if (_.has(WIKI.auth.strategies, opts.strategy)) {
  177. _.set(context.req, 'body.email', opts.username)
  178. _.set(context.req, 'body.password', opts.password)
  179. // Authenticate
  180. return new Promise((resolve, reject) => {
  181. WIKI.auth.passport.authenticate(opts.strategy, { session: false }, async (err, user, info) => {
  182. if (err) { return reject(err) }
  183. if (!user) { return reject(new WIKI.Error.AuthLoginFailed()) }
  184. // Is 2FA required?
  185. if (user.tfaIsActive) {
  186. try {
  187. let loginToken = await securityHelper.generateToken(32)
  188. await WIKI.redis.set(`tfa:${loginToken}`, user.id, 'EX', 600)
  189. return resolve({
  190. tfaRequired: true,
  191. tfaLoginToken: loginToken
  192. })
  193. } catch (err) {
  194. WIKI.logger.warn(err)
  195. return reject(new WIKI.Error.AuthGenericError())
  196. }
  197. } else {
  198. // No 2FA, log in user
  199. return context.req.logIn(user, { session: false }, async err => {
  200. if (err) { return reject(err) }
  201. const jwtToken = await WIKI.models.users.refreshToken(user)
  202. resolve({
  203. jwt: jwtToken.token,
  204. tfaRequired: false
  205. })
  206. })
  207. }
  208. })(context.req, context.res, () => {})
  209. })
  210. } else {
  211. throw new WIKI.Error.AuthProviderInvalid()
  212. }
  213. }
  214. static async refreshToken(user) {
  215. if (_.isSafeInteger(user)) {
  216. user = await WIKI.models.users.query().findById(user)
  217. if (!user) {
  218. WIKI.logger.warn(`Failed to refresh token for user ${user}: Not found.`)
  219. throw new WIKI.Error.AuthGenericError()
  220. }
  221. }
  222. return {
  223. token: jwt.sign({
  224. id: user.id,
  225. email: user.email,
  226. name: user.name,
  227. pictureUrl: user.pictureUrl,
  228. timezone: user.timezone,
  229. localeCode: user.localeCode,
  230. defaultEditor: user.defaultEditor,
  231. permissions: ['manage:system']
  232. }, {
  233. key: WIKI.config.certs.private,
  234. passphrase: WIKI.config.sessionSecret
  235. }, {
  236. algorithm: 'RS256',
  237. expiresIn: '30m',
  238. audience: 'urn:wiki.js', // TODO: use value from admin
  239. issuer: 'urn:wiki.js'
  240. }),
  241. user
  242. }
  243. }
  244. static async loginTFA(opts, context) {
  245. if (opts.securityCode.length === 6 && opts.loginToken.length === 64) {
  246. let result = await WIKI.redis.get(`tfa:${opts.loginToken}`)
  247. if (result) {
  248. let userId = _.toSafeInteger(result)
  249. if (userId && userId > 0) {
  250. let user = await WIKI.models.users.query().findById(userId)
  251. if (user && user.verifyTFA(opts.securityCode)) {
  252. return Promise.fromCallback(clb => {
  253. context.req.logIn(user, clb)
  254. }).return({
  255. succeeded: true,
  256. message: 'Login Successful'
  257. }).catch(err => {
  258. WIKI.logger.warn(err)
  259. throw new WIKI.Error.AuthGenericError()
  260. })
  261. } else {
  262. throw new WIKI.Error.AuthTFAFailed()
  263. }
  264. }
  265. }
  266. }
  267. throw new WIKI.Error.AuthTFAInvalid()
  268. }
  269. static async register ({ email, password, name }, context) {
  270. const usr = await WIKI.models.users.query().findOne({ email, providerKey: 'local' })
  271. if (!usr) {
  272. await WIKI.models.users.query().insert({
  273. provider: 'local',
  274. email,
  275. name,
  276. password,
  277. locale: 'en',
  278. defaultEditor: 'markdown',
  279. tfaIsActive: false,
  280. isSystem: false
  281. })
  282. return true
  283. } else {
  284. throw new WIKI.Error.AuthAccountAlreadyExists()
  285. }
  286. }
  287. }