1
0
Fork 0
mirror of synced 2024-06-28 11:00:55 +12:00
budibase/packages/worker/src/api/controllers/global/users.js

359 lines
8.9 KiB
JavaScript
Raw Normal View History

const {
generateGlobalUserID,
getGlobalUserParams,
StaticDatabases,
generateNewUsageQuotaDoc,
} = require("@budibase/auth/db")
2021-07-17 05:24:32 +12:00
const { hash, getGlobalUserByEmail } = require("@budibase/auth").utils
2021-05-06 02:17:15 +12:00
const { UserStatus, EmailTemplatePurpose } = require("../../../constants")
const { checkInviteCode } = require("../../../utilities/redis")
const { sendEmail } = require("../../../utilities/email")
2021-07-07 05:10:04 +12:00
const { user: userCache } = require("@budibase/auth/cache")
const { invalidateSessions } = require("@budibase/auth/sessions")
const CouchDB = require("../../../db")
const accounts = require("@budibase/auth/accounts")
const {
getGlobalDB,
getTenantId,
doesTenantExist,
tryAddTenant,
updateTenantId,
} = require("@budibase/auth/tenancy")
const { removeUserFromInfoDB } = require("@budibase/auth/deprovision")
const env = require("../../../environment")
2021-04-19 22:34:07 +12:00
const PLATFORM_INFO_DB = StaticDatabases.PLATFORM_INFO.name
2021-07-19 23:57:52 +12:00
async function allUsers() {
const db = getGlobalDB()
const response = await db.allDocs(
getGlobalUserParams(null, {
include_docs: true,
})
)
return response.rows.map(row => row.doc)
}
async function saveUser(
user,
tenantId,
hashPassword = true,
requirePassword = true
) {
if (!tenantId) {
throw "No tenancy specified."
}
// need to set the context for this request, as specified
updateTenantId(tenantId)
// specify the tenancy incase we're making a new admin user (public)
const db = getGlobalDB(tenantId)
let { email, password, _id } = user
// make sure another user isn't using the same email
let dbUser
if (email) {
// check budibase users inside the tenant
dbUser = await getGlobalUserByEmail(email)
if (dbUser != null && (dbUser._id !== _id || Array.isArray(dbUser))) {
throw `Email address ${email} already in use.`
}
// check budibase users in other tenants
if (env.MULTI_TENANCY) {
dbUser = await getTenantUser(email)
if (dbUser != null && dbUser.tenantId !== tenantId) {
throw `Email address ${email} already in use.`
}
}
// check root account users in account portal
if (!env.SELF_HOSTED && !env.DISABLE_ACCOUNT_PORTAL) {
const account = await accounts.getAccount(email)
if (account && account.verified && account.tenantId !== tenantId) {
throw `Email address ${email} already in use.`
}
}
} else {
dbUser = await db.get(_id)
}
// get the password, make sure one is defined
let hashedPassword
if (password) {
hashedPassword = hashPassword ? await hash(password) : password
} else if (dbUser) {
hashedPassword = dbUser.password
} else if (requirePassword) {
throw "Password must be specified."
}
_id = _id || generateGlobalUserID()
user = {
2021-09-22 20:29:51 +12:00
createdAt: Date.now(),
...dbUser,
...user,
_id,
2021-04-19 22:34:07 +12:00
password: hashedPassword,
tenantId,
2021-04-19 22:34:07 +12:00
}
// make sure the roles object is always present
if (!user.roles) {
user.roles = {}
}
2021-04-19 22:34:07 +12:00
// add the active status to a user if its not provided
if (user.status == null) {
user.status = UserStatus.ACTIVE
}
try {
const response = await db.put({
password: hashedPassword,
2021-04-19 22:34:07 +12:00
...user,
})
await tryAddTenant(tenantId, _id, email)
2021-07-07 05:10:04 +12:00
await userCache.invalidateUser(response.id)
return {
2021-04-19 22:34:07 +12:00
_id: response.id,
_rev: response.rev,
email,
}
} catch (err) {
if (err.status === 409) {
throw "User exists already"
2021-04-19 22:34:07 +12:00
} else {
throw err
2021-04-19 22:34:07 +12:00
}
}
}
exports.save = async ctx => {
try {
ctx.body = await saveUser(ctx.request.body, getTenantId())
} catch (err) {
ctx.throw(err.status || 400, err)
}
}
const parseBooleanParam = param => {
if (param && param === "false") {
return false
} else {
return true
}
}
exports.adminUser = async ctx => {
const { email, password, tenantId } = ctx.request.body
// account portal sends a pre-hashed password - honour param to prevent double hashing
const hashPassword = parseBooleanParam(ctx.request.query.hashPassword)
// account portal sends no password for SSO users
const requirePassword = parseBooleanParam(ctx.request.query.requirePassword)
if (await doesTenantExist(tenantId)) {
ctx.throw(403, "Organisation already exists.")
}
const db = getGlobalDB(tenantId)
const response = await db.allDocs(
getGlobalUserParams(null, {
include_docs: true,
})
)
2021-09-24 10:25:25 +12:00
2021-09-24 09:40:14 +12:00
// write usage quotas for cloud
if (!env.SELF_HOSTED) {
// could be a scenario where it exists, make sure its clean
try {
const usageQuota = await db.get(
StaticDatabases.PLATFORM_INFO.docs.usageQuota
)
if (usageQuota) {
await db.remove(usageQuota._id, usageQuota._rev)
}
} catch (err) {
// don't worry about errors
}
await db.post(generateNewUsageQuotaDoc())
}
if (response.rows.some(row => row.doc.admin)) {
ctx.throw(
403,
"You cannot initialise once an global user has been created."
)
}
const user = {
2021-05-06 08:56:43 +12:00
email: email,
password: password,
2021-09-22 20:29:51 +12:00
createdAt: Date.now(),
roles: {},
builder: {
2021-05-06 08:56:43 +12:00
global: true,
},
admin: {
global: true,
},
tenantId,
}
try {
ctx.body = await saveUser(user, tenantId, hashPassword, requirePassword)
} catch (err) {
ctx.throw(err.status || 400, err)
}
}
2021-05-04 22:32:22 +12:00
exports.destroy = async ctx => {
const db = getGlobalDB()
const dbUser = await db.get(ctx.params.id)
await removeUserFromInfoDB(dbUser)
2021-04-19 22:34:07 +12:00
await db.remove(dbUser._id, dbUser._rev)
2021-07-07 05:10:04 +12:00
await userCache.invalidateUser(dbUser._id)
await invalidateSessions(dbUser._id)
2021-04-19 22:34:07 +12:00
ctx.body = {
message: `User ${ctx.params.id} deleted.`,
2021-04-19 22:34:07 +12:00
}
}
exports.removeAppRole = async ctx => {
const { appId } = ctx.params
const db = getGlobalDB()
const users = await allUsers(ctx)
const bulk = []
2021-07-08 10:29:19 +12:00
const cacheInvalidations = []
for (let user of users) {
if (user.roles[appId]) {
2021-07-08 10:29:19 +12:00
cacheInvalidations.push(userCache.invalidateUser(user._id))
delete user.roles[appId]
bulk.push(user)
}
}
await db.bulkDocs(bulk)
2021-07-08 10:29:19 +12:00
await Promise.all(cacheInvalidations)
ctx.body = {
message: "App role removed from all users",
}
}
exports.getSelf = async ctx => {
if (!ctx.user) {
ctx.throw(403, "User not logged in")
}
ctx.params = {
id: ctx.user._id,
}
// this will set the body
await exports.find(ctx)
// forward session information not found in db
ctx.body.account = ctx.user.account
ctx.body.budibaseAccess = ctx.user.budibaseAccess
ctx.body.accountPortalAccess = ctx.user.accountPortalAccess
}
exports.updateSelf = async ctx => {
const db = getGlobalDB()
const user = await db.get(ctx.user._id)
if (ctx.request.body.password) {
ctx.request.body.password = await hash(ctx.request.body.password)
}
// don't allow sending up an ID/Rev, always use the existing one
delete ctx.request.body._id
delete ctx.request.body._rev
const response = await db.put({
...user,
...ctx.request.body,
})
2021-07-08 10:29:19 +12:00
await userCache.invalidateUser(user._id)
ctx.body = {
_id: response.id,
_rev: response.rev,
}
}
2021-04-19 22:34:07 +12:00
// called internally by app server user fetch
2021-05-04 22:32:22 +12:00
exports.fetch = async ctx => {
const users = await allUsers(ctx)
2021-04-19 22:34:07 +12:00
// user hashed password shouldn't ever be returned
for (let user of users) {
if (user) {
delete user.password
}
}
ctx.body = users
}
// called internally by app server user find
2021-05-04 22:32:22 +12:00
exports.find = async ctx => {
const db = getGlobalDB()
2021-04-19 22:34:07 +12:00
let user
try {
user = await db.get(ctx.params.id)
2021-04-19 22:34:07 +12:00
} catch (err) {
// no user found, just return nothing
user = {}
}
if (user) {
delete user.password
}
ctx.body = user
}
// lookup, could be email or userId, either will return a doc
const getTenantUser = async identifier => {
const db = new CouchDB(PLATFORM_INFO_DB)
try {
return await db.get(identifier)
} catch (err) {
return null
}
}
exports.tenantUserLookup = async ctx => {
const id = ctx.params.id
const user = await getTenantUser(id)
if (user) {
ctx.body = user
} else {
2021-09-18 00:41:22 +12:00
ctx.throw(400, "No tenant user found.")
}
}
exports.invite = async ctx => {
let { email, userInfo } = ctx.request.body
const existing = await getGlobalUserByEmail(email)
2021-05-06 02:17:15 +12:00
if (existing) {
ctx.throw(400, "Email address already in use.")
}
if (!userInfo) {
userInfo = {}
}
userInfo.tenantId = getTenantId()
await sendEmail(email, EmailTemplatePurpose.INVITATION, {
2021-05-12 02:24:17 +12:00
subject: "{{ company }} platform invitation",
info: userInfo,
2021-05-12 02:24:17 +12:00
})
2021-05-06 02:17:15 +12:00
ctx.body = {
2021-05-06 02:19:44 +12:00
message: "Invitation has been sent.",
2021-05-06 02:17:15 +12:00
}
}
exports.inviteAccept = async ctx => {
const { inviteCode, password, firstName, lastName } = ctx.request.body
2021-05-06 02:17:15 +12:00
try {
// info is an extension of the user object that was stored by global
const { email, info } = await checkInviteCode(inviteCode)
ctx.body = await saveUser(
{
firstName,
lastName,
password,
email,
...info,
},
info.tenantId
)
2021-05-06 02:17:15 +12:00
} catch (err) {
ctx.throw(400, "Unable to create new user, invitation invalid.")
}
}