Files
cloudron-box/src/routes/users.js

266 lines
12 KiB
JavaScript
Raw Normal View History

'use strict';
exports = module.exports = {
2020-07-10 07:23:33 -07:00
get,
update,
list,
2021-07-15 09:50:11 -07:00
add,
2021-06-26 09:57:07 -07:00
del,
2021-07-15 09:50:11 -07:00
setPassword,
2020-07-10 07:23:33 -07:00
verifyPassword,
setGroups,
2021-09-17 12:52:41 +02:00
setGhost,
2022-04-24 22:11:27 +02:00
makeLocal,
2020-07-10 07:23:33 -07:00
2021-10-27 18:36:28 +02:00
getPasswordResetLink,
sendPasswordResetEmail,
2021-10-27 19:58:06 +02:00
getInviteLink,
sendInviteEmail,
2021-04-14 20:45:13 -07:00
disableTwoFactorAuthentication,
2020-07-10 07:23:33 -07:00
load
};
2021-06-26 09:57:07 -07:00
const assert = require('assert'),
AuditSource = require('../auditsource.js'),
2019-10-24 14:40:26 -07:00
BoxError = require('../boxerror.js'),
2021-07-15 09:50:11 -07:00
groups = require('../groups.js'),
HttpError = require('connect-lastmile').HttpError,
HttpSuccess = require('connect-lastmile').HttpSuccess,
2021-06-26 09:57:07 -07:00
safe = require('safetydance'),
2019-10-24 14:40:26 -07:00
users = require('../users.js');
2021-07-15 09:50:11 -07:00
async function load(req, res, next) {
assert.strictEqual(typeof req.params.userId, 'string');
2021-07-15 09:50:11 -07:00
const [error, result] = await safe(users.get(req.params.userId));
if (error) return next(BoxError.toHttpError(error));
if (!result) return next(new HttpError(404, 'User not found'));
req.resource = result; // this is not req.user because req.user is already the authenticated user
2021-07-15 09:50:11 -07:00
next();
}
2021-07-15 09:50:11 -07:00
async function add(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
if (typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be string'));
if ('username' in req.body && typeof req.body.username !== 'string') return next(new HttpError(400, 'username must be string'));
if ('fallbackEmail' in req.body && typeof req.body.fallbackEmail !== 'string') return next(new HttpError(400, 'fallbackEmail must be string'));
2016-01-20 00:05:06 -08:00
if ('displayName' in req.body && typeof req.body.displayName !== 'string') return next(new HttpError(400, 'displayName must be string'));
if ('password' in req.body && typeof req.body.password !== 'string') return next(new HttpError(400, 'password must be string'));
if ('role' in req.body) {
if (typeof req.body.role !== 'string') return next(new HttpError(400, 'role must be string'));
2020-03-06 13:16:47 -08:00
if (users.compareRoles(req.user.role, req.body.role) < 0) return next(new HttpError(403, `role '${req.body.role}' is required but you are only '${req.user.role}'`));
2020-02-13 22:06:54 -08:00
}
2021-07-15 09:50:11 -07:00
const password = req.body.password || null;
const email = req.body.email;
const username = 'username' in req.body ? req.body.username : null;
const displayName = req.body.displayName || '';
const fallbackEmail = req.body.fallbackEmail || '';
const [error, id] = await safe(users.add(email, { username, password, displayName, fallbackEmail, invitor: req.user, role: req.body.role || users.ROLE_USER }, AuditSource.fromRequest(req)));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(201, { id }));
}
2021-07-15 09:50:11 -07:00
async function update(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
assert.strictEqual(typeof req.user, 'object');
assert.strictEqual(typeof req.body, 'object');
if ('username' in req.body && typeof req.body.username !== 'string') return next(new HttpError(400, 'username must be string')); // when profile are locked, admin can set username
2016-01-25 14:12:09 +01:00
if ('email' in req.body && typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be string'));
2018-01-21 14:25:39 +01:00
if ('fallbackEmail' in req.body && typeof req.body.fallbackEmail !== 'string') return next(new HttpError(400, 'fallbackEmail must be string'));
2016-01-25 14:08:11 +01:00
if ('displayName' in req.body && typeof req.body.displayName !== 'string') return next(new HttpError(400, 'displayName must be string'));
if ('username' in req.body && typeof req.body.username !== 'string') return next(new HttpError(400, 'username must be a string'));
if ('role' in req.body) {
if (typeof req.body.role !== 'string') return next(new HttpError(400, 'role must be a string'));
if (req.user.id === req.resource.id) return next(new HttpError(409, 'Cannot set role flag on self'));
2020-03-15 15:56:06 -07:00
if (users.compareRoles(req.user.role, req.body.role) < 0) return next(new HttpError(403, `role '${req.body.role}' is required but you are only '${req.user.role}'`));
2020-02-13 22:06:54 -08:00
}
if ('active' in req.body) {
if (typeof req.body.active !== 'boolean') return next(new HttpError(400, 'active must be a boolean'));
if (req.user.id === req.resource.id) return next(new HttpError(409, 'Cannot set active flag on self'));
}
2019-08-08 07:39:32 -07:00
2020-03-15 15:56:06 -07:00
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but you are only '${req.user.role}'`));
const [error] = await safe(users.update(req.resource, req.body, AuditSource.fromRequest(req)));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
2021-07-15 09:50:11 -07:00
next(new HttpSuccess(204));
}
2021-07-15 09:50:11 -07:00
async function list(req, res, next) {
const page = typeof req.query.page !== 'undefined' ? parseInt(req.query.page) : 1;
2019-01-14 16:39:20 +01:00
if (!page || page < 0) return next(new HttpError(400, 'page query param has to be a postive number'));
2022-02-07 16:57:00 +01:00
const perPage = typeof req.query.per_page !== 'undefined' ? parseInt(req.query.per_page) : 25;
2019-01-14 16:39:20 +01:00
if (!perPage || perPage < 0) return next(new HttpError(400, 'per_page query param has to be a postive number'));
if (req.query.search && typeof req.query.search !== 'string') return next(new HttpError(400, 'search must be a string'));
2022-02-07 16:57:00 +01:00
const active = typeof req.query.active !== 'undefined' ? ((req.query.active === '1' || req.query.active === 'true') ? true : false) : null;
let [error, results] = await safe(users.listPaged(req.query.search || null, active, page, perPage));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
results = results.map(users.removePrivateFields);
2021-07-15 09:50:11 -07:00
next(new HttpSuccess(200, { users: results }));
}
2016-04-17 18:27:11 +02:00
function get(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
assert.strictEqual(typeof req.user, 'object');
next(new HttpSuccess(200, users.removePrivateFields(req.resource)));
}
2021-06-26 09:57:07 -07:00
async function del(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
if (req.user.id === req.resource.id) return next(new HttpError(409, 'Not allowed to remove yourself.'));
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
const [error] = await safe(users.del(req.resource, AuditSource.fromRequest(req)));
2021-06-26 09:57:07 -07:00
if (error) return next(BoxError.toHttpError(error));
2021-06-26 09:57:07 -07:00
next(new HttpSuccess(204));
}
2021-07-15 09:50:11 -07:00
async function verifyPassword(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
if (typeof req.body.password !== 'string') return next(new HttpError(400, 'API call requires user password'));
const [error] = await safe(users.verify(req.user.id, req.body.password, users.AP_WEBADMIN));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
2021-07-15 09:50:11 -07:00
req.body.password = '<redacted>'; // this will prevent logs from displaying plain text password
2021-07-15 09:50:11 -07:00
next();
}
2021-09-16 13:18:22 +02:00
async function disableTwoFactorAuthentication(req, res, next) {
2021-04-14 20:45:13 -07:00
assert.strictEqual(typeof req.resource, 'object');
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
const [error] = await safe(users.disableTwoFactorAuthentication(req.resource.id, AuditSource.fromRequest(req)));
2021-09-16 13:18:22 +02:00
if (error) return next(BoxError.toHttpError(error));
2018-08-17 09:49:58 -07:00
2021-09-16 13:18:22 +02:00
next(new HttpSuccess(200, {}));
2018-08-17 09:49:58 -07:00
}
2021-06-28 15:15:28 -07:00
async function setGroups(req, res, next) {
2016-02-09 15:47:02 -08:00
assert.strictEqual(typeof req.body, 'object');
assert.strictEqual(typeof req.resource, 'object');
2016-02-09 15:47:02 -08:00
if (!Array.isArray(req.body.groupIds)) return next(new HttpError(400, 'API call requires a groups array.'));
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
2016-02-09 15:47:02 -08:00
2021-07-15 09:50:11 -07:00
const [error] = await safe(groups.setMembership(req.resource.id, req.body.groupIds));
2021-06-28 15:15:28 -07:00
if (error) return next(BoxError.toHttpError(error));
2016-02-09 15:47:02 -08:00
2021-06-28 15:15:28 -07:00
next(new HttpSuccess(204));
2016-02-09 15:47:02 -08:00
}
2018-06-28 16:48:04 -07:00
2021-09-17 12:52:41 +02:00
async function setGhost(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
assert.strictEqual(typeof req.resource, 'object');
if (typeof req.body.password !== 'string' || !req.body.password) return next(new HttpError(400, 'password must be non-empty string'));
if ('expiresAt' in req.body && typeof req.body.password !== 'number') return next(new HttpError(400, 'expiresAt must be a number'));
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
2021-09-17 12:52:41 +02:00
2021-09-17 15:52:52 +02:00
const [error] = await safe(users.setGhost(req.resource, req.body.password, req.body.expiresAt || 0));
2021-09-17 12:52:41 +02:00
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(204));
}
2021-07-15 09:50:11 -07:00
async function setPassword(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
assert.strictEqual(typeof req.resource, 'object');
if (typeof req.body.password !== 'string') return next(new HttpError(400, 'password must be a string'));
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
const [error] = await safe(users.setPassword(req.resource, req.body.password, AuditSource.fromRequest(req)));
2021-07-15 09:50:11 -07:00
if (error) return next(BoxError.toHttpError(error));
2021-07-15 09:50:11 -07:00
next(new HttpSuccess(204));
}
2020-07-10 07:23:33 -07:00
2022-04-24 22:11:27 +02:00
async function makeLocal(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
if (req.resource.source === '') return next(new HttpError(409, 'user is already local'));
2022-04-24 22:11:27 +02:00
let [error] = await safe(users.update(req.resource, { source: '', inviteToken: '' }, AuditSource.fromRequest(req)));
if (error) return next(BoxError.toHttpError(error));
[error] = await safe(users.sendPasswordResetEmail(req.resource, req.resource.fallbackEmail || req.resource.email, AuditSource.fromRequest(req)));
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(204, {}));
}
2021-10-27 18:36:28 +02:00
// This will always return a reset link, if none is set or expired a new one will be created
async function getPasswordResetLink(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
2021-10-27 19:58:06 +02:00
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
2021-10-27 18:36:28 +02:00
let [error, passwordResetLink] = await safe(users.getPasswordResetLink(req.resource, AuditSource.fromRequest(req)));
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(200, { passwordResetLink }));
}
async function sendPasswordResetEmail(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
if (!req.body.email || typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be a non-empty string'));
2021-10-27 19:58:06 +02:00
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
2021-10-27 18:36:28 +02:00
let [error] = await safe(users.sendPasswordResetEmail(req.resource, req.body.email, AuditSource.fromRequest(req)));
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(202, {}));
}
2021-10-27 19:58:06 +02:00
async function getInviteLink(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
let [error, inviteLink] = await safe(users.getInviteLink(req.resource, AuditSource.fromRequest(req)));
if (error) return next(BoxError.toHttpError(error));
next(new HttpSuccess(200, { inviteLink }));
}
async function sendInviteEmail(req, res, next) {
assert.strictEqual(typeof req.resource, 'object');
if (!req.body.email || typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be a non-empty string'));
if (users.compareRoles(req.user.role, req.resource.role) < 0) return next(new HttpError(403, `role '${req.resource.role}' is required but user has only '${req.user.role}'`));
let [error] = await safe(users.sendInviteEmail(req.resource, req.body.email, AuditSource.fromRequest(req)));
2021-10-27 21:25:43 +02:00
if (error) return next(BoxError.toHttpError(error));
2021-10-27 19:58:06 +02:00
next(new HttpSuccess(202, {}));
}