Files
NodeBB/src/user/auth.js

146 lines
4.6 KiB
JavaScript
Raw Normal View History

2014-07-29 00:42:33 -04:00
'use strict';
2019-10-03 23:31:42 -04:00
const winston = require('winston');
const validator = require('validator');
2019-07-11 23:43:00 -04:00
const util = require('util');
const _ = require('lodash');
2019-10-03 23:31:42 -04:00
const db = require('../database');
const meta = require('../meta');
const events = require('../events');
const batch = require('../batch');
const utils = require('../utils');
2014-05-11 11:45:20 -04:00
module.exports = function (User) {
2014-05-11 11:45:20 -04:00
User.auth = {};
2019-07-11 23:43:00 -04:00
User.auth.logAttempt = async function (uid, ip) {
2018-12-10 14:40:11 -05:00
if (!(parseInt(uid, 10) > 0)) {
2019-07-11 23:43:00 -04:00
return;
}
2019-07-11 23:43:00 -04:00
const exists = await db.exists('lockout:' + uid);
if (exists) {
throw new Error('[[error:account-locked]]');
}
const attempts = await db.increment('loginAttempts:' + uid);
if (attempts <= meta.config.loginAttempts) {
return await db.pexpire('loginAttempts:' + uid, 1000 * 60 * 60);
}
// Lock out the account
await db.set('lockout:' + uid, '');
2019-10-03 23:31:42 -04:00
const duration = 1000 * 60 * meta.config.lockoutDuration;
2019-07-11 23:43:00 -04:00
await db.delete('loginAttempts:' + uid);
await db.pexpire('lockout:' + uid, duration);
events.log({
type: 'account-locked',
uid: uid,
ip: ip,
});
throw new Error('[[error:account-locked]]');
2014-05-11 11:45:20 -04:00
};
2019-07-11 23:43:00 -04:00
User.auth.getFeedToken = async function (uid) {
if (!(parseInt(uid, 10) > 0)) {
return;
}
2019-10-03 23:31:42 -04:00
const _token = await db.getObjectField('user:' + uid, 'rss_token');
2019-07-11 23:43:00 -04:00
const token = _token || utils.generateUUID();
if (!_token) {
await User.setUserField(uid, 'rss_token', token);
2017-06-20 16:12:55 -04:00
}
2019-07-11 23:43:00 -04:00
return token;
2017-06-20 16:12:55 -04:00
};
2019-07-11 23:43:00 -04:00
User.auth.clearLoginAttempts = async function (uid) {
await db.delete('loginAttempts:' + uid);
2014-05-11 11:45:20 -04:00
};
2014-08-14 08:34:38 -04:00
2019-07-11 23:43:00 -04:00
User.auth.resetLockout = async function (uid) {
await db.deleteAll([
'loginAttempts:' + uid,
'lockout:' + uid,
]);
2014-10-08 12:18:32 -04:00
};
2019-10-03 23:31:42 -04:00
const getSessionFromStore = util.promisify((sid, callback) => db.sessionStore.get(sid, (err, sessObj) => callback(err, sessObj || null)));
const sessionStoreDestroy = util.promisify((sid, callback) => db.sessionStore.destroy(sid, err => callback(err)));
2019-07-11 23:43:00 -04:00
User.auth.getSessions = async function (uid, curSessionId) {
const sids = await db.getSortedSetRevRange('uid:' + uid + ':sessions', 0, 19);
2019-10-03 23:31:42 -04:00
let sessions = await Promise.all(sids.map(sid => getSessionFromStore(sid)));
2019-07-11 23:43:00 -04:00
sessions.forEach(function (sessionObj, idx) {
if (sessionObj && sessionObj.meta) {
sessionObj.meta.current = curSessionId === sids[idx];
}
});
// Revoke any sessions that have expired, return filtered list
2019-10-03 23:31:42 -04:00
const expiredSids = [];
2019-07-11 23:43:00 -04:00
sessions = sessions.filter(function (sessionObj, idx) {
2019-10-03 23:31:42 -04:00
const expired = !sessionObj || !sessionObj.hasOwnProperty('passport') ||
2019-07-11 23:43:00 -04:00
!sessionObj.passport.hasOwnProperty('user') ||
parseInt(sessionObj.passport.user, 10) !== parseInt(uid, 10);
if (expired) {
expiredSids.push(sids[idx]);
}
return !expired;
});
await Promise.all(expiredSids.map(s => User.auth.revokeSession(s, uid)));
sessions = sessions.map(function (sessObj) {
if (sessObj.meta) {
sessObj.meta.datetimeISO = new Date(sessObj.meta.datetime).toISOString();
sessObj.meta.ip = validator.escape(String(sessObj.meta.ip));
}
return sessObj.meta;
}).filter(Boolean);
return sessions;
};
2019-07-11 23:43:00 -04:00
User.auth.addSession = async function (uid, sessionId) {
if (!(parseInt(uid, 10) > 0)) {
2019-07-11 23:43:00 -04:00
return;
}
2019-07-11 23:43:00 -04:00
await db.sortedSetAdd('uid:' + uid + ':sessions', Date.now(), sessionId);
};
2019-07-11 23:43:00 -04:00
User.auth.revokeSession = async function (sessionId, uid) {
winston.verbose('[user.auth] Revoking session ' + sessionId + ' for user ' + uid);
const sessionObj = await getSessionFromStore(sessionId);
if (sessionObj && sessionObj.meta && sessionObj.meta.uuid) {
await db.deleteObjectField('uid:' + uid + ':sessionUUID:sessionId', sessionObj.meta.uuid);
}
2019-10-03 23:31:42 -04:00
await Promise.all([
db.sortedSetRemove('uid:' + uid + ':sessions', sessionId),
sessionStoreDestroy(sessionId),
2019-07-11 23:43:00 -04:00
]);
};
2019-09-07 18:22:03 -04:00
User.auth.revokeAllSessions = async function (uids) {
uids = Array.isArray(uids) ? uids : [uids];
const sids = await db.getSortedSetsMembers(uids.map(uid => 'uid:' + uid + ':sessions'));
const promises = [];
uids.forEach((uid, index) => {
promises.push(sids[index].map(s => User.auth.revokeSession(s, uid)));
});
2019-07-11 23:43:00 -04:00
await Promise.all(promises);
};
2016-12-15 14:47:42 +03:00
2019-07-11 23:43:00 -04:00
User.auth.deleteAllSessions = async function () {
await batch.processSortedSet('users:joindate', async function (uids) {
const sessionKeys = uids.map(uid => 'uid:' + uid + ':sessions');
const sessionUUIDKeys = uids.map(uid => 'uid:' + uid + ':sessionUUID:sessionId');
const sids = _.flatten(await db.getSortedSetRange(sessionKeys, 0, -1));
2019-10-03 23:31:42 -04:00
const promises = [
db.deleteAll(sessionKeys.concat(sessionUUIDKeys)),
...sids.map(sid => sessionStoreDestroy(sid)),
];
console.log('epic', promises);
await Promise.all(promises);
2019-07-11 23:43:00 -04:00
}, { batch: 1000 });
2016-12-15 14:47:42 +03:00
};
2017-02-18 02:30:48 -07:00
};