* feat: API endpoints for email signin * fix: After testing * Initial signin flow working * move shared middleware * feat: Add guest signin toggle, obey on endpoints * feat: Basic email signin when enabled * Improve guest signin email Disable double signin with JWT * fix: Simple rate limiting * create placeholder users in db * fix: Give invited users default avatar add invited users to people settings * test * add transaction * tmp: test CI * derp * md5 * urgh * again * test: pass * test * fix: Remove usage of data values * guest signin page * Visually separator 'Invited' from other people tabs * fix: Edge case attempting SSO signin for guest email account * fix: Correctly set email auth method to cookie * Improve rate limit error display * lint: cleanup / comments * Improve invalid token error display * style tweaks * pass guest value to subdomain * Restore copy link option * feat: Allow invite revoke from people management * fix: Incorrect users email schema does not allow for user deletion * lint * fix: avatarUrl for deleted user failure * change default to off for guest invites * fix: Changing security settings wipes subdomain * fix: user delete permissioning * test: Add user.invite specs
228 lines
6.3 KiB
JavaScript
228 lines
6.3 KiB
JavaScript
// @flow
|
|
import crypto from 'crypto';
|
|
import uuid from 'uuid';
|
|
import JWT from 'jsonwebtoken';
|
|
import subMinutes from 'date-fns/sub_minutes';
|
|
import { DataTypes, sequelize, encryptedFields } from '../sequelize';
|
|
import { publicS3Endpoint, uploadToS3FromUrl } from '../utils/s3';
|
|
import { sendEmail } from '../mailer';
|
|
import { Star, Team, Collection, NotificationSetting, ApiKey } from '.';
|
|
|
|
const DEFAULT_AVATAR_HOST = 'https://tiley.herokuapp.com';
|
|
|
|
const User = sequelize.define(
|
|
'user',
|
|
{
|
|
id: {
|
|
type: DataTypes.UUID,
|
|
defaultValue: DataTypes.UUIDV4,
|
|
primaryKey: true,
|
|
},
|
|
email: { type: DataTypes.STRING },
|
|
username: { type: DataTypes.STRING },
|
|
name: DataTypes.STRING,
|
|
avatarUrl: { type: DataTypes.STRING, allowNull: true },
|
|
isAdmin: DataTypes.BOOLEAN,
|
|
service: { type: DataTypes.STRING, allowNull: true },
|
|
serviceId: { type: DataTypes.STRING, allowNull: true, unique: true },
|
|
slackData: DataTypes.JSONB,
|
|
jwtSecret: encryptedFields.vault('jwtSecret'),
|
|
lastActiveAt: DataTypes.DATE,
|
|
lastActiveIp: { type: DataTypes.STRING, allowNull: true },
|
|
lastSignedInAt: DataTypes.DATE,
|
|
lastSignedInIp: { type: DataTypes.STRING, allowNull: true },
|
|
lastSigninEmailSentAt: DataTypes.DATE,
|
|
suspendedAt: DataTypes.DATE,
|
|
suspendedById: DataTypes.UUID,
|
|
},
|
|
{
|
|
paranoid: true,
|
|
getterMethods: {
|
|
isSuspended() {
|
|
return !!this.suspendedAt;
|
|
},
|
|
avatarUrl() {
|
|
const original = this.getDataValue('avatarUrl');
|
|
if (original) {
|
|
return original;
|
|
}
|
|
|
|
const hash = crypto
|
|
.createHash('md5')
|
|
.update(this.email || '')
|
|
.digest('hex');
|
|
return `${DEFAULT_AVATAR_HOST}/avatar/${hash}/${this.name[0]}.png`;
|
|
},
|
|
},
|
|
}
|
|
);
|
|
|
|
// Class methods
|
|
User.associate = models => {
|
|
User.hasMany(models.ApiKey, { as: 'apiKeys', onDelete: 'cascade' });
|
|
User.hasMany(models.NotificationSetting, {
|
|
as: 'notificationSettings',
|
|
onDelete: 'cascade',
|
|
});
|
|
User.hasMany(models.Document, { as: 'documents' });
|
|
User.hasMany(models.View, { as: 'views' });
|
|
User.belongsTo(models.Team);
|
|
};
|
|
|
|
// Instance methods
|
|
User.prototype.collectionIds = async function(paranoid: boolean = true) {
|
|
let models = await Collection.findAll({
|
|
attributes: ['id', 'private'],
|
|
where: { teamId: this.teamId },
|
|
include: [
|
|
{
|
|
model: User,
|
|
as: 'users',
|
|
where: { id: this.id },
|
|
required: false,
|
|
},
|
|
],
|
|
paranoid,
|
|
});
|
|
|
|
// Filter collections that are private and don't have an association
|
|
return models.filter(c => !c.private || c.users.length).map(c => c.id);
|
|
};
|
|
|
|
User.prototype.updateActiveAt = function(ip) {
|
|
const fiveMinutesAgo = subMinutes(new Date(), 5);
|
|
|
|
// ensure this is updated only every few minutes otherwise
|
|
// we'll be constantly writing to the DB as API requests happen
|
|
if (this.lastActiveAt < fiveMinutesAgo) {
|
|
this.lastActiveAt = new Date();
|
|
this.lastActiveIp = ip;
|
|
return this.save({ hooks: false });
|
|
}
|
|
};
|
|
|
|
User.prototype.updateSignedIn = function(ip) {
|
|
this.lastSignedInAt = new Date();
|
|
this.lastSignedInIp = ip;
|
|
return this.save({ hooks: false });
|
|
};
|
|
|
|
User.prototype.getJwtToken = function() {
|
|
return JWT.sign({ id: this.id }, this.jwtSecret);
|
|
};
|
|
|
|
User.prototype.getEmailSigninToken = function() {
|
|
if (this.service && this.service !== 'email') {
|
|
throw new Error('Cannot generate email signin token for OAuth user');
|
|
}
|
|
|
|
return JWT.sign(
|
|
{ id: this.id, createdAt: new Date().toISOString() },
|
|
this.jwtSecret
|
|
);
|
|
};
|
|
|
|
const uploadAvatar = async model => {
|
|
const endpoint = publicS3Endpoint();
|
|
const { avatarUrl } = model;
|
|
|
|
if (
|
|
avatarUrl &&
|
|
!avatarUrl.startsWith(endpoint) &&
|
|
!avatarUrl.startsWith(DEFAULT_AVATAR_HOST)
|
|
) {
|
|
const newUrl = await uploadToS3FromUrl(
|
|
avatarUrl,
|
|
`avatars/${model.id}/${uuid.v4()}`
|
|
);
|
|
if (newUrl) model.avatarUrl = newUrl;
|
|
}
|
|
};
|
|
|
|
const setRandomJwtSecret = model => {
|
|
model.jwtSecret = crypto.randomBytes(64).toString('hex');
|
|
};
|
|
|
|
const removeIdentifyingInfo = async (model, options) => {
|
|
await NotificationSetting.destroy({
|
|
where: { userId: model.id },
|
|
transaction: options.transaction,
|
|
});
|
|
await ApiKey.destroy({
|
|
where: { userId: model.id },
|
|
transaction: options.transaction,
|
|
});
|
|
await Star.destroy({
|
|
where: { userId: model.id },
|
|
transaction: options.transaction,
|
|
});
|
|
|
|
model.email = null;
|
|
model.name = 'Unknown';
|
|
model.avatarUrl = '';
|
|
model.serviceId = null;
|
|
model.username = null;
|
|
model.slackData = null;
|
|
model.lastActiveIp = null;
|
|
model.lastSignedInIp = null;
|
|
|
|
// this shouldn't be needed once this issue is resolved:
|
|
// https://github.com/sequelize/sequelize/issues/9318
|
|
await model.save({ hooks: false, transaction: options.transaction });
|
|
};
|
|
|
|
const checkLastAdmin = async model => {
|
|
const teamId = model.teamId;
|
|
|
|
if (model.isAdmin) {
|
|
const userCount = await User.count({ where: { teamId } });
|
|
const adminCount = await User.count({ where: { isAdmin: true, teamId } });
|
|
|
|
if (userCount > 1 && adminCount <= 1) {
|
|
throw new Error(
|
|
'Cannot delete account as only admin. Please transfer admin permissions to another user and try again.'
|
|
);
|
|
}
|
|
}
|
|
};
|
|
|
|
User.beforeDestroy(checkLastAdmin);
|
|
User.beforeDestroy(removeIdentifyingInfo);
|
|
User.beforeSave(uploadAvatar);
|
|
User.beforeCreate(setRandomJwtSecret);
|
|
User.afterCreate(async user => {
|
|
const team = await Team.findByPk(user.teamId);
|
|
|
|
// From Slack support:
|
|
// If you wish to contact users at an email address obtained through Slack,
|
|
// you need them to opt-in through a clear and separate process.
|
|
if (user.service && user.service !== 'slack') {
|
|
sendEmail('welcome', user.email, { teamUrl: team.url });
|
|
}
|
|
});
|
|
|
|
// By default when a user signs up we subscribe them to email notifications
|
|
// when documents they created are edited by other team members and onboarding
|
|
User.afterCreate(async (user, options) => {
|
|
await Promise.all([
|
|
NotificationSetting.findOrCreate({
|
|
where: {
|
|
userId: user.id,
|
|
teamId: user.teamId,
|
|
event: 'documents.update',
|
|
},
|
|
transaction: options.transaction,
|
|
}),
|
|
NotificationSetting.findOrCreate({
|
|
where: {
|
|
userId: user.id,
|
|
teamId: user.teamId,
|
|
event: 'emails.onboarding',
|
|
},
|
|
transaction: options.transaction,
|
|
}),
|
|
]);
|
|
});
|
|
|
|
export default User;
|