123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235 |
- /* global WIKI */
- const bcrypt = require('bcryptjs-then')
- const _ = require('lodash')
- const tfa = require('node-2fa')
- const securityHelper = require('../../helpers/security')
- const Model = require('objection').Model
- const bcryptRegexp = /^\$2[ayb]\$[0-9]{2}\$[A-Za-z0-9./]{53}$/
- /**
- * Users model
- */
- module.exports = class User extends Model {
- static get tableName() { return 'users' }
- static get jsonSchema () {
- return {
- type: 'object',
- required: ['email', 'name', 'provider'],
- properties: {
- id: {type: 'integer'},
- email: {type: 'string', format: 'email'},
- name: {type: 'string', minLength: 1, maxLength: 255},
- provider: {type: 'string', minLength: 1, maxLength: 255},
- providerId: {type: 'number'},
- password: {type: 'string'},
- role: {type: 'string', enum: ['admin', 'guest', 'user']},
- tfaIsActive: {type: 'boolean', default: false},
- tfaSecret: {type: 'string'},
- createdAt: {type: 'string'},
- updatedAt: {type: 'string'}
- }
- }
- }
- static get relationMappings() {
- const Group = require('./groups')
- return {
- groups: {
- relation: Model.ManyToManyRelation,
- modelClass: Group,
- join: {
- from: 'users.id',
- through: {
- from: 'userGroups.userId',
- to: 'userGroups.groupId'
- },
- to: 'groups.id'
- }
- }
- }
- }
- async $beforeUpdate(opt, context) {
- await super.$beforeUpdate(opt, context)
- this.updatedAt = new Date().toISOString()
- if (!(opt.patch && this.password === undefined)) {
- await this.generateHash()
- }
- }
- async $beforeInsert(context) {
- await super.$beforeInsert(context)
- this.createdAt = new Date().toISOString()
- this.updatedAt = new Date().toISOString()
- await this.generateHash()
- }
- async generateHash() {
- if (this.password) {
- if (bcryptRegexp.test(this.password)) { return }
- this.password = await bcrypt.hash(this.password, 12)
- }
- }
- async verifyPassword(pwd) {
- if (await bcrypt.compare(this.password, pwd) === true) {
- return true
- } else {
- throw new WIKI.Error.AuthLoginFailed()
- }
- }
- async enableTFA() {
- let tfaInfo = tfa.generateSecret({
- name: WIKI.config.site.title
- })
- return this.$query.patch({
- tfaIsActive: true,
- tfaSecret: tfaInfo.secret
- })
- }
- async disableTFA() {
- return this.$query.patch({
- tfaIsActive: false,
- tfaSecret: ''
- })
- }
- async verifyTFA(code) {
- let result = tfa.verifyToken(this.tfaSecret, code)
- return (result && _.has(result, 'delta') && result.delta === 0)
- }
- static async processProfile(profile) {
- let primaryEmail = ''
- if (_.isArray(profile.emails)) {
- let e = _.find(profile.emails, ['primary', true])
- primaryEmail = (e) ? e.value : _.first(profile.emails).value
- } else if (_.isString(profile.email) && profile.email.length > 5) {
- primaryEmail = profile.email
- } else if (_.isString(profile.mail) && profile.mail.length > 5) {
- primaryEmail = profile.mail
- } else if (profile.user && profile.user.email && profile.user.email.length > 5) {
- primaryEmail = profile.user.email
- } else {
- return Promise.reject(new Error(WIKI.lang.t('auth:errors.invaliduseremail')))
- }
- profile.provider = _.lowerCase(profile.provider)
- primaryEmail = _.toLower(primaryEmail)
- let user = await WIKI.db.users.query().findOne({
- email: primaryEmail,
- provider: profile.provider
- })
- if (user) {
- user.$query().patchAdnFetch({
- email: primaryEmail,
- provider: profile.provider,
- providerId: profile.id,
- name: profile.displayName || _.split(primaryEmail, '@')[0]
- })
- } else {
- user = await WIKI.db.users.query().insertAndFetch({
- email: primaryEmail,
- provider: profile.provider,
- providerId: profile.id,
- name: profile.displayName || _.split(primaryEmail, '@')[0]
- })
- }
- // Handle unregistered accounts
- // if (!user && profile.provider !== 'local' && (WIKI.config.auth.defaultReadAccess || profile.provider === 'ldap' || profile.provider === 'azure')) {
- // let nUsr = {
- // email: primaryEmail,
- // provider: profile.provider,
- // providerId: profile.id,
- // password: '',
- // name: profile.displayName || profile.name || profile.cn,
- // rights: [{
- // role: 'read',
- // path: '/',
- // exact: false,
- // deny: false
- // }]
- // }
- // return WIKI.db.users.query().insert(nUsr)
- // }
- return user
- }
- static async login (opts, context) {
- if (_.has(WIKI.config.auth.strategies, opts.provider)) {
- _.set(context.req, 'body.email', opts.username)
- _.set(context.req, 'body.password', opts.password)
- // Authenticate
- return new Promise((resolve, reject) => {
- WIKI.auth.passport.authenticate(opts.provider, async (err, user, info) => {
- if (err) { return reject(err) }
- if (!user) { return reject(new WIKI.Error.AuthLoginFailed()) }
- // Is 2FA required?
- if (user.tfaIsActive) {
- try {
- let loginToken = await securityHelper.generateToken(32)
- await WIKI.redis.set(`tfa:${loginToken}`, user.id, 'EX', 600)
- return resolve({
- tfaRequired: true,
- tfaLoginToken: loginToken
- })
- } catch (err) {
- WIKI.logger.warn(err)
- return reject(new WIKI.Error.AuthGenericError())
- }
- } else {
- // No 2FA, log in user
- return context.req.logIn(user, err => {
- if (err) { return reject(err) }
- resolve({
- tfaRequired: false
- })
- })
- }
- })(context.req, context.res, () => {})
- })
- } else {
- throw new WIKI.Error.AuthProviderInvalid()
- }
- }
- static async loginTFA(opts, context) {
- if (opts.securityCode.length === 6 && opts.loginToken.length === 64) {
- let result = await WIKI.redis.get(`tfa:${opts.loginToken}`)
- if (result) {
- let userId = _.toSafeInteger(result)
- if (userId && userId > 0) {
- let user = await WIKI.db.users.query().findById(userId)
- if (user && user.verifyTFA(opts.securityCode)) {
- return Promise.fromCallback(clb => {
- context.req.logIn(user, clb)
- }).return({
- succeeded: true,
- message: 'Login Successful'
- }).catch(err => {
- WIKI.logger.warn(err)
- throw new WIKI.Error.AuthGenericError()
- })
- } else {
- throw new WIKI.Error.AuthTFAFailed()
- }
- }
- }
- }
- throw new WIKI.Error.AuthTFAInvalid()
- }
- }
|