/* global WIKI */ const bcrypt = require('bcryptjs-then') const _ = require('lodash') const tfa = require('node-2fa') const securityHelper = require('../helpers/security') const jwt = require('jsonwebtoken') const Model = require('objection').Model const validate = require('validate.js') const bcryptRegexp = /^\$2[ayb]\$[0-9]{2}\$[A-Za-z0-9./]{53}$/ /** * Users model */ module.exports = class User extends Model { static get tableName() { return 'users' } static get jsonSchema () { return { type: 'object', required: ['email', 'name', 'provider'], properties: { id: {type: 'integer'}, email: {type: 'string', format: 'email'}, name: {type: 'string', minLength: 1, maxLength: 255}, providerId: {type: 'number'}, password: {type: 'string'}, role: {type: 'string', enum: ['admin', 'guest', 'user']}, tfaIsActive: {type: 'boolean', default: false}, tfaSecret: {type: 'string'}, jobTitle: {type: 'string'}, location: {type: 'string'}, pictureUrl: {type: 'string'}, isSystem: {type: 'boolean'}, isActive: {type: 'boolean'}, isVerified: {type: 'boolean'}, createdAt: {type: 'string'}, updatedAt: {type: 'string'} } } } static get relationMappings() { return { groups: { relation: Model.ManyToManyRelation, modelClass: require('./groups'), join: { from: 'users.id', through: { from: 'userGroups.userId', to: 'userGroups.groupId' }, to: 'groups.id' } }, provider: { relation: Model.BelongsToOneRelation, modelClass: require('./authentication'), join: { from: 'users.providerKey', to: 'authentication.key' } }, defaultEditor: { relation: Model.BelongsToOneRelation, modelClass: require('./editors'), join: { from: 'users.editorKey', to: 'editors.key' } }, locale: { relation: Model.BelongsToOneRelation, modelClass: require('./locales'), join: { from: 'users.localeCode', to: 'locales.code' } } } } async $beforeUpdate(opt, context) { await super.$beforeUpdate(opt, context) this.updatedAt = new Date().toISOString() if (!(opt.patch && this.password === undefined)) { await this.generateHash() } } async $beforeInsert(context) { await super.$beforeInsert(context) this.createdAt = new Date().toISOString() this.updatedAt = new Date().toISOString() await this.generateHash() } async generateHash() { if (this.password) { if (bcryptRegexp.test(this.password)) { return } this.password = await bcrypt.hash(this.password, 12) } } async verifyPassword(pwd) { if (await bcrypt.compare(pwd, this.password) === true) { return true } else { throw new WIKI.Error.AuthLoginFailed() } } async enableTFA() { let tfaInfo = tfa.generateSecret({ name: WIKI.config.site.title }) return this.$query.patch({ tfaIsActive: true, tfaSecret: tfaInfo.secret }) } async disableTFA() { return this.$query.patch({ tfaIsActive: false, tfaSecret: '' }) } async verifyTFA(code) { let result = tfa.verifyToken(this.tfaSecret, code) return (result && _.has(result, 'delta') && result.delta === 0) } static async processProfile(profile) { let primaryEmail = '' if (_.isArray(profile.emails)) { let e = _.find(profile.emails, ['primary', true]) primaryEmail = (e) ? e.value : _.first(profile.emails).value } else if (_.isString(profile.email) && profile.email.length > 5) { primaryEmail = profile.email } else if (_.isString(profile.mail) && profile.mail.length > 5) { primaryEmail = profile.mail } else if (profile.user && profile.user.email && profile.user.email.length > 5) { primaryEmail = profile.user.email } else { return Promise.reject(new Error(WIKI.lang.t('auth:errors.invaliduseremail'))) } profile.provider = _.lowerCase(profile.provider) primaryEmail = _.toLower(primaryEmail) let user = await WIKI.models.users.query().findOne({ email: primaryEmail, provider: profile.provider }) if (user) { user.$query().patchAdnFetch({ email: primaryEmail, provider: profile.provider, providerId: profile.id, name: profile.displayName || _.split(primaryEmail, '@')[0] }) } else { user = await WIKI.models.users.query().insertAndFetch({ email: primaryEmail, provider: profile.provider, providerId: profile.id, name: profile.displayName || _.split(primaryEmail, '@')[0] }) } // Handle unregistered accounts // if (!user && profile.provider !== 'local' && (WIKI.config.auth.defaultReadAccess || profile.provider === 'ldap' || profile.provider === 'azure')) { // let nUsr = { // email: primaryEmail, // provider: profile.provider, // providerId: profile.id, // password: '', // name: profile.displayName || profile.name || profile.cn, // rights: [{ // role: 'read', // path: '/', // exact: false, // deny: false // }] // } // return WIKI.models.users.query().insert(nUsr) // } return user } static async login (opts, context) { if (_.has(WIKI.auth.strategies, opts.strategy)) { _.set(context.req, 'body.email', opts.username) _.set(context.req, 'body.password', opts.password) // Authenticate return new Promise((resolve, reject) => { WIKI.auth.passport.authenticate(opts.strategy, { session: false }, async (err, user, info) => { if (err) { return reject(err) } if (!user) { return reject(new WIKI.Error.AuthLoginFailed()) } // Is 2FA required? if (user.tfaIsActive) { try { let loginToken = await securityHelper.generateToken(32) await WIKI.redis.set(`tfa:${loginToken}`, user.id, 'EX', 600) return resolve({ tfaRequired: true, tfaLoginToken: loginToken }) } catch (err) { WIKI.logger.warn(err) return reject(new WIKI.Error.AuthGenericError()) } } else { // No 2FA, log in user return context.req.logIn(user, { session: false }, async err => { if (err) { return reject(err) } const jwtToken = await WIKI.models.users.refreshToken(user) resolve({ jwt: jwtToken.token, tfaRequired: false }) }) } })(context.req, context.res, () => {}) }) } else { throw new WIKI.Error.AuthProviderInvalid() } } static async refreshToken(user) { if (_.isSafeInteger(user)) { user = await WIKI.models.users.query().findById(user) if (!user) { WIKI.logger.warn(`Failed to refresh token for user ${user}: Not found.`) throw new WIKI.Error.AuthGenericError() } } return { token: jwt.sign({ id: user.id, email: user.email, name: user.name, pictureUrl: user.pictureUrl, timezone: user.timezone, localeCode: user.localeCode, defaultEditor: user.defaultEditor, permissions: ['manage:system'] }, { key: WIKI.config.certs.private, passphrase: WIKI.config.sessionSecret }, { algorithm: 'RS256', expiresIn: '30m', audience: 'urn:wiki.js', // TODO: use value from admin issuer: 'urn:wiki.js' }), user } } static async loginTFA(opts, context) { if (opts.securityCode.length === 6 && opts.loginToken.length === 64) { let result = await WIKI.redis.get(`tfa:${opts.loginToken}`) if (result) { let userId = _.toSafeInteger(result) if (userId && userId > 0) { let user = await WIKI.models.users.query().findById(userId) if (user && user.verifyTFA(opts.securityCode)) { return Promise.fromCallback(clb => { context.req.logIn(user, clb) }).return({ succeeded: true, message: 'Login Successful' }).catch(err => { WIKI.logger.warn(err) throw new WIKI.Error.AuthGenericError() }) } else { throw new WIKI.Error.AuthTFAFailed() } } } } throw new WIKI.Error.AuthTFAInvalid() } static async register ({ email, password, name, verify = false, bypassChecks = false }, context) { const localStrg = await WIKI.models.authentication.getStrategy('local') // Check if self-registration is enabled if (localStrg.selfRegistration || bypassChecks) { // Input sanitization email = _.toLower(email) // Input validation const validation = validate({ email, password, name }, { email: { email: true, length: { maximum: 255 } }, password: { presence: { allowEmpty: false }, length: { minimum: 6 } }, name: { presence: { allowEmpty: false }, length: { minimum: 2, maximum: 255 } }, }, { format: 'flat' }) if (validation && validation.length > 0) { throw new WIKI.Error.InputInvalid(validation[0]) } // Check if email domain is whitelisted if (_.get(localStrg, 'domainWhitelist.v', []).length > 0 && !bypassChecks) { const emailDomain = _.last(email.split('@')) if (!_.includes(localStrg.domainWhitelist.v, emailDomain)) { throw new WIKI.Error.AuthRegistrationDomainUnauthorized() } } // Check if email already exists const usr = await WIKI.models.users.query().findOne({ email, providerKey: 'local' }) if (!usr) { // Create the account const newUsr = await WIKI.models.users.query().insert({ provider: 'local', email, name, password, locale: 'en', defaultEditor: 'markdown', tfaIsActive: false, isSystem: false, isActive: true, isVerified: false }) if (verify) { // Create verification token const verificationToken = await WIKI.models.userKeys.generateToken({ kind: 'verify', userId: newUsr.id }) // Send verification email await WIKI.mail.send({ template: 'accountVerify', to: email, subject: 'Verify your account', data: { preheadertext: 'Verify your account in order to gain access to the wiki.', title: 'Verify your account', content: 'Click the button below in order to verify your account and gain access to the wiki.', buttonLink: `${WIKI.config.host}/verify/${verificationToken}`, buttonText: 'Verify' }, text: `You must open the following link in your browser to verify your account and gain access to the wiki: ${WIKI.config.host}/verify/${verificationToken}` }) } return true } else { throw new WIKI.Error.AuthAccountAlreadyExists() } } else { throw new WIKI.Error.AuthRegistrationDisabled() } } }