Files
cloudron-box/src/routes/profile.js
T

106 lines
4.5 KiB
JavaScript
Raw Normal View History

2016-04-17 16:22:39 +02:00
'use strict';
exports = module.exports = {
get: get,
update: update,
2018-04-25 19:08:15 +02:00
changePassword: changePassword,
setTwoFactorAuthenticationSecret: setTwoFactorAuthenticationSecret,
enableTwoFactorAuthentication: enableTwoFactorAuthentication,
disableTwoFactorAuthentication: disableTwoFactorAuthentication
2016-04-17 16:22:39 +02:00
};
var assert = require('assert'),
HttpError = require('connect-lastmile').HttpError,
HttpSuccess = require('connect-lastmile').HttpSuccess,
user = require('../user.js'),
2016-06-02 23:53:06 -07:00
UserError = user.UserError,
_ = require('underscore');
2016-04-17 16:22:39 +02:00
function auditSource(req) {
var ip = req.headers['x-forwarded-for'] || req.connection.remoteAddress || null;
return { ip: ip, username: req.user ? req.user.username : null, userId: req.user ? req.user.id : null };
}
2016-04-17 16:22:39 +02:00
function get(req, res, next) {
assert.strictEqual(typeof req.user, 'object');
2016-06-23 13:03:39 +02:00
next(new HttpSuccess(200, {
id: req.user.id,
username: req.user.username,
email: req.user.email,
2018-01-21 14:50:24 +01:00
fallbackEmail: req.user.fallbackEmail,
2016-06-23 13:03:39 +02:00
admin: req.user.admin,
2017-01-17 09:07:24 -08:00
displayName: req.user.displayName
2016-06-23 13:03:39 +02:00
}));
2016-04-17 16:22:39 +02:00
}
function update(req, res, next) {
assert.strictEqual(typeof req.user, 'object');
assert.strictEqual(typeof req.body, 'object');
if ('email' in req.body && typeof req.body.email !== 'string') return next(new HttpError(400, 'email must be string'));
if ('fallbackEmail' in req.body && typeof req.body.fallbackEmail !== 'string') return next(new HttpError(400, 'fallbackEmail must be string'));
2016-04-17 16:22:39 +02:00
if ('displayName' in req.body && typeof req.body.displayName !== 'string') return next(new HttpError(400, 'displayName must be string'));
var data = _.pick(req.body, 'email', 'fallbackEmail', 'displayName');
2016-06-02 23:53:06 -07:00
user.update(req.user.id, data, auditSource(req), function (error) {
if (error && error.reason === UserError.BAD_FIELD) return next(new HttpError(400, error.message));
if (error && error.reason === UserError.ALREADY_EXISTS) return next(new HttpError(409, error.message));
2016-04-17 16:22:39 +02:00
if (error && error.reason === UserError.NOT_FOUND) return next(new HttpError(404, 'User not found'));
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(204));
});
}
function changePassword(req, res, next) {
assert.strictEqual(typeof req.body, 'object');
assert.strictEqual(typeof req.user, 'object');
2016-06-02 00:31:41 -07:00
if (typeof req.body.newPassword !== 'string') return next(new HttpError(400, 'newPassword must be a string'));
2016-04-17 16:22:39 +02:00
2016-04-17 19:17:01 +02:00
user.setPassword(req.user.id, req.body.newPassword, function (error) {
if (error && error.reason === UserError.BAD_FIELD) return next(new HttpError(400, error.message));
2016-04-17 16:22:39 +02:00
if (error && error.reason === UserError.NOT_FOUND) return next(new HttpError(403, 'Wrong password'));
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(204));
});
}
2018-04-25 19:08:15 +02:00
function setTwoFactorAuthenticationSecret(req, res, next) {
2018-04-26 15:12:14 +02:00
assert.strictEqual(typeof req.user, 'object');
2018-04-25 19:08:15 +02:00
2018-04-26 15:12:14 +02:00
user.setTwoFactorAuthenticationSecret(req.user.id, function (error, result) {
2018-04-25 19:08:15 +02:00
if (error && error.reason === UserError.ALREADY_EXISTS) return next(new HttpError(409, 'TwoFactor Authentication is enabled, disable first'));
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(201, { enabled: false, secret: result.secret, qrcode: result.qrcode }));
});
}
function enableTwoFactorAuthentication(req, res, next) {
2018-04-26 15:12:14 +02:00
assert.strictEqual(typeof req.body, 'object');
assert.strictEqual(typeof req.user, 'object');
2018-04-25 19:08:15 +02:00
if (!req.body.totpToken || typeof req.body.totpToken !== 'string') return next(new HttpError(400, 'totpToken must be a nonempty string'));
2018-04-26 15:12:14 +02:00
user.enableTwoFactorAuthentication(req.user.id, req.body.totpToken, function (error) {
2018-04-26 16:14:37 +02:00
if (error && error.reason === UserError.NOT_FOUND) return next(new HttpError(404, 'User not found'));
if (error && error.reason === UserError.BAD_TOKEN) return next(new HttpError(403, 'Invalid token'));
if (error && error.reason === UserError.ALREADY_EXISTS) return next(new HttpError(409, 'TwoFactor Authentication is already enabled'));
2018-04-25 19:08:15 +02:00
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(202, {}));
});
}
function disableTwoFactorAuthentication(req, res, next) {
2018-04-26 15:12:14 +02:00
assert.strictEqual(typeof req.user, 'object');
2018-04-25 19:08:15 +02:00
2018-04-26 15:12:14 +02:00
user.disableTwoFactorAuthentication(req.user.id, function (error) {
2018-04-25 19:08:15 +02:00
if (error) return next(new HttpError(500, error));
next(new HttpSuccess(202, {}));
});
}