2017-07-12 07:28:18 +00:00
|
|
|
// @flow
|
2016-04-29 05:25:37 +00:00
|
|
|
import crypto from 'crypto';
|
2017-10-20 06:30:31 +00:00
|
|
|
import uuid from 'uuid';
|
2017-12-19 03:59:29 +00:00
|
|
|
import JWT from 'jsonwebtoken';
|
2018-06-05 02:07:56 +00:00
|
|
|
import subMinutes from 'date-fns/sub_minutes';
|
2017-04-27 04:47:03 +00:00
|
|
|
import { DataTypes, sequelize, encryptedFields } from '../sequelize';
|
2018-06-01 22:00:48 +00:00
|
|
|
import { publicS3Endpoint, uploadToS3FromUrl } from '../utils/s3';
|
2017-12-19 04:47:48 +00:00
|
|
|
import { sendEmail } from '../mailer';
|
2019-01-27 12:30:53 +00:00
|
|
|
import { Star, Team, Collection, NotificationSetting, ApiKey } from '.';
|
2016-04-29 05:25:37 +00:00
|
|
|
|
2017-04-27 04:47:03 +00:00
|
|
|
const User = sequelize.define(
|
|
|
|
'user',
|
|
|
|
{
|
|
|
|
id: {
|
|
|
|
type: DataTypes.UUID,
|
|
|
|
defaultValue: DataTypes.UUIDV4,
|
|
|
|
primaryKey: true,
|
2016-04-29 05:25:37 +00:00
|
|
|
},
|
2017-07-12 07:28:18 +00:00
|
|
|
email: { type: DataTypes.STRING },
|
|
|
|
username: { type: DataTypes.STRING },
|
2017-04-27 04:47:03 +00:00
|
|
|
name: DataTypes.STRING,
|
2017-10-19 07:49:22 +00:00
|
|
|
avatarUrl: { type: DataTypes.STRING, allowNull: true },
|
2017-04-27 04:47:03 +00:00
|
|
|
isAdmin: DataTypes.BOOLEAN,
|
2018-06-04 19:08:29 +00:00
|
|
|
service: { type: DataTypes.STRING, allowNull: true },
|
2018-05-29 03:31:53 +00:00
|
|
|
serviceId: { type: DataTypes.STRING, allowNull: true, unique: true },
|
2017-04-27 04:47:03 +00:00
|
|
|
slackData: DataTypes.JSONB,
|
|
|
|
jwtSecret: encryptedFields.vault('jwtSecret'),
|
2018-06-05 02:07:56 +00:00
|
|
|
lastActiveAt: DataTypes.DATE,
|
2018-07-11 02:47:15 +00:00
|
|
|
lastActiveIp: { type: DataTypes.STRING, allowNull: true },
|
2018-06-05 02:07:56 +00:00
|
|
|
lastSignedInAt: DataTypes.DATE,
|
2018-07-11 03:44:59 +00:00
|
|
|
lastSignedInIp: { type: DataTypes.STRING, allowNull: true },
|
2018-03-04 23:38:51 +00:00
|
|
|
suspendedAt: DataTypes.DATE,
|
2018-03-07 07:38:52 +00:00
|
|
|
suspendedById: DataTypes.UUID,
|
2017-04-27 04:47:03 +00:00
|
|
|
},
|
|
|
|
{
|
2018-07-07 22:38:22 +00:00
|
|
|
paranoid: true,
|
2018-03-04 23:38:51 +00:00
|
|
|
getterMethods: {
|
|
|
|
isSuspended() {
|
|
|
|
return !!this.suspendedAt;
|
|
|
|
},
|
|
|
|
},
|
2017-04-27 04:47:03 +00:00
|
|
|
}
|
|
|
|
);
|
2016-04-29 05:25:37 +00:00
|
|
|
|
2017-07-12 07:28:18 +00:00
|
|
|
// Class methods
|
|
|
|
User.associate = models => {
|
2018-12-07 03:14:43 +00:00
|
|
|
User.hasMany(models.ApiKey, { as: 'apiKeys', onDelete: 'cascade' });
|
|
|
|
User.hasMany(models.NotificationSetting, {
|
|
|
|
as: 'notificationSettings',
|
|
|
|
onDelete: 'cascade',
|
|
|
|
});
|
2017-07-12 07:28:18 +00:00
|
|
|
User.hasMany(models.Document, { as: 'documents' });
|
|
|
|
User.hasMany(models.View, { as: 'views' });
|
|
|
|
};
|
|
|
|
|
|
|
|
// Instance methods
|
2019-01-05 21:37:33 +00:00
|
|
|
User.prototype.collectionIds = async function() {
|
|
|
|
let models = await Collection.findAll({
|
|
|
|
attributes: ['id', 'private'],
|
|
|
|
where: { teamId: this.teamId },
|
|
|
|
include: [
|
|
|
|
{
|
|
|
|
model: User,
|
|
|
|
through: 'collection_users',
|
|
|
|
as: 'users',
|
|
|
|
where: { id: this.id },
|
|
|
|
required: false,
|
|
|
|
},
|
|
|
|
],
|
|
|
|
});
|
|
|
|
|
|
|
|
// Filter collections that are private and don't have an association
|
|
|
|
return models.filter(c => !c.private || c.users.length).map(c => c.id);
|
|
|
|
};
|
|
|
|
|
2018-06-05 02:07:56 +00:00
|
|
|
User.prototype.updateActiveAt = function(ip) {
|
|
|
|
const fiveMinutesAgo = subMinutes(new Date(), 5);
|
|
|
|
|
|
|
|
// ensure this is updated only every few minutes otherwise
|
|
|
|
// we'll be constantly writing to the DB as API requests happen
|
|
|
|
if (this.lastActiveAt < fiveMinutesAgo) {
|
|
|
|
this.lastActiveAt = new Date();
|
|
|
|
this.lastActiveIp = ip;
|
|
|
|
return this.save({ hooks: false });
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
User.prototype.updateSignedIn = function(ip) {
|
|
|
|
this.lastSignedInAt = new Date();
|
|
|
|
this.lastSignedInIp = ip;
|
|
|
|
return this.save({ hooks: false });
|
|
|
|
};
|
|
|
|
|
2017-07-12 07:28:18 +00:00
|
|
|
User.prototype.getJwtToken = function() {
|
|
|
|
return JWT.sign({ id: this.id }, this.jwtSecret);
|
|
|
|
};
|
2018-06-01 22:00:48 +00:00
|
|
|
|
|
|
|
const uploadAvatar = async model => {
|
|
|
|
const endpoint = publicS3Endpoint();
|
|
|
|
|
|
|
|
if (model.avatarUrl && !model.avatarUrl.startsWith(endpoint)) {
|
|
|
|
const newUrl = await uploadToS3FromUrl(
|
|
|
|
model.avatarUrl,
|
|
|
|
`avatars/${model.id}/${uuid.v4()}`
|
|
|
|
);
|
|
|
|
if (newUrl) model.avatarUrl = newUrl;
|
|
|
|
}
|
2017-10-19 07:49:22 +00:00
|
|
|
};
|
2017-07-12 07:28:18 +00:00
|
|
|
|
2017-04-27 04:47:03 +00:00
|
|
|
const setRandomJwtSecret = model => {
|
2016-04-29 05:25:37 +00:00
|
|
|
model.jwtSecret = crypto.randomBytes(64).toString('hex');
|
|
|
|
};
|
2018-06-04 19:08:29 +00:00
|
|
|
|
2018-12-07 03:14:43 +00:00
|
|
|
const removeIdentifyingInfo = async (model, options) => {
|
|
|
|
await NotificationSetting.destroy({
|
|
|
|
where: { userId: model.id },
|
|
|
|
transaction: options.transaction,
|
|
|
|
});
|
|
|
|
await ApiKey.destroy({
|
|
|
|
where: { userId: model.id },
|
|
|
|
transaction: options.transaction,
|
|
|
|
});
|
|
|
|
await Star.destroy({
|
|
|
|
where: { userId: model.id },
|
|
|
|
transaction: options.transaction,
|
|
|
|
});
|
2018-07-11 03:44:59 +00:00
|
|
|
|
2018-07-07 22:38:22 +00:00
|
|
|
model.email = '';
|
2018-07-11 02:47:15 +00:00
|
|
|
model.name = 'Unknown';
|
|
|
|
model.avatarUrl = '';
|
2018-07-11 03:44:59 +00:00
|
|
|
model.serviceId = null;
|
2018-07-11 02:47:15 +00:00
|
|
|
model.username = null;
|
2018-07-07 22:38:22 +00:00
|
|
|
model.slackData = null;
|
2018-07-11 02:47:15 +00:00
|
|
|
model.lastActiveIp = null;
|
2018-07-11 03:44:59 +00:00
|
|
|
model.lastSignedInIp = null;
|
2018-07-11 02:47:15 +00:00
|
|
|
|
|
|
|
// this shouldn't be needed once this issue is resolved:
|
|
|
|
// https://github.com/sequelize/sequelize/issues/9318
|
2018-12-07 03:14:43 +00:00
|
|
|
await model.save({ hooks: false, transaction: options.transaction });
|
2018-07-07 22:38:22 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
const checkLastAdmin = async model => {
|
|
|
|
const teamId = model.teamId;
|
|
|
|
|
|
|
|
if (model.isAdmin) {
|
|
|
|
const userCount = await User.count({ where: { teamId } });
|
|
|
|
const adminCount = await User.count({ where: { isAdmin: true, teamId } });
|
|
|
|
|
|
|
|
if (userCount > 1 && adminCount <= 1) {
|
|
|
|
throw new Error(
|
|
|
|
'Cannot delete account as only admin. Please transfer admin permissions to another user and try again.'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
User.beforeDestroy(checkLastAdmin);
|
|
|
|
User.beforeDestroy(removeIdentifyingInfo);
|
2018-06-01 22:00:48 +00:00
|
|
|
User.beforeSave(uploadAvatar);
|
2016-04-29 05:25:37 +00:00
|
|
|
User.beforeCreate(setRandomJwtSecret);
|
2019-01-27 12:30:53 +00:00
|
|
|
User.afterCreate(async user => {
|
|
|
|
const team = await Team.findById(user.teamId);
|
|
|
|
sendEmail('welcome', user.email, { teamUrl: team.url });
|
|
|
|
});
|
2016-04-29 05:25:37 +00:00
|
|
|
|
2018-12-05 06:24:30 +00:00
|
|
|
// By default when a user signs up we subscribe them to email notifications
|
2018-12-06 07:44:41 +00:00
|
|
|
// when documents they created are edited by other team members and onboarding
|
|
|
|
User.afterCreate(async (user, options) => {
|
|
|
|
await NotificationSetting.findOrCreate({
|
2018-12-05 06:24:30 +00:00
|
|
|
where: {
|
|
|
|
userId: user.id,
|
|
|
|
teamId: user.teamId,
|
|
|
|
event: 'documents.update',
|
|
|
|
},
|
|
|
|
transaction: options.transaction,
|
2018-12-06 07:44:41 +00:00
|
|
|
});
|
|
|
|
await NotificationSetting.findOrCreate({
|
|
|
|
where: {
|
|
|
|
userId: user.id,
|
|
|
|
teamId: user.teamId,
|
|
|
|
event: 'emails.onboarding',
|
|
|
|
},
|
|
|
|
transaction: options.transaction,
|
|
|
|
});
|
|
|
|
});
|
2018-12-05 06:24:30 +00:00
|
|
|
|
2016-04-29 05:25:37 +00:00
|
|
|
export default User;
|