n8n
Version:
n8n Workflow Automation Tool
194 lines • 9.73 kB
JavaScript
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.AuthController = void 0;
const validator_1 = __importDefault(require("validator"));
const auth_service_1 = require("../auth/auth.service");
const decorators_1 = require("../decorators");
const constants_1 = require("../constants");
const auth_1 = require("../auth");
const posthog_1 = require("../posthog");
const ssoHelpers_1 = require("../sso/ssoHelpers");
const License_1 = require("../License");
const user_service_1 = require("../services/user.service");
const mfa_service_1 = require("../Mfa/mfa.service");
const Logger_1 = require("../Logger");
const auth_error_1 = require("../errors/response-errors/auth.error");
const bad_request_error_1 = require("../errors/response-errors/bad-request.error");
const forbidden_error_1 = require("../errors/response-errors/forbidden.error");
const n8n_workflow_1 = require("n8n-workflow");
const user_repository_1 = require("../databases/repositories/user.repository");
const event_service_1 = require("../events/event.service");
let AuthController = class AuthController {
constructor(logger, authService, mfaService, userService, license, userRepository, eventService, postHog) {
this.logger = logger;
this.authService = authService;
this.mfaService = mfaService;
this.userService = userService;
this.license = license;
this.userRepository = userRepository;
this.eventService = eventService;
this.postHog = postHog;
}
async login(req, res) {
var _a;
const { email, password, mfaToken, mfaRecoveryCode } = req.body;
if (!email)
throw new n8n_workflow_1.ApplicationError('Email is required to log in');
if (!password)
throw new n8n_workflow_1.ApplicationError('Password is required to log in');
let user;
let usedAuthenticationMethod = (0, ssoHelpers_1.getCurrentAuthenticationMethod)();
if ((0, ssoHelpers_1.isSamlCurrentAuthenticationMethod)()) {
const preliminaryUser = await (0, auth_1.handleEmailLogin)(email, password);
if ((preliminaryUser === null || preliminaryUser === void 0 ? void 0 : preliminaryUser.role) === 'global:owner' ||
((_a = preliminaryUser === null || preliminaryUser === void 0 ? void 0 : preliminaryUser.settings) === null || _a === void 0 ? void 0 : _a.allowSSOManualLogin)) {
user = preliminaryUser;
usedAuthenticationMethod = 'email';
}
else {
throw new auth_error_1.AuthError('SSO is enabled, please log in with SSO');
}
}
else if ((0, ssoHelpers_1.isLdapCurrentAuthenticationMethod)()) {
const preliminaryUser = await (0, auth_1.handleEmailLogin)(email, password);
if ((preliminaryUser === null || preliminaryUser === void 0 ? void 0 : preliminaryUser.role) === 'global:owner') {
user = preliminaryUser;
usedAuthenticationMethod = 'email';
}
else {
user = await (0, auth_1.handleLdapLogin)(email, password);
}
}
else {
user = await (0, auth_1.handleEmailLogin)(email, password);
}
if (user) {
if (user.mfaEnabled) {
if (!mfaToken && !mfaRecoveryCode) {
throw new auth_error_1.AuthError('MFA Error', 998);
}
const isMFATokenValid = await this.mfaService.validateMfa(user.id, mfaToken, mfaRecoveryCode);
if (!isMFATokenValid) {
throw new auth_error_1.AuthError('Invalid mfa token or recovery code');
}
}
this.authService.issueCookie(res, user, req.browserId);
this.eventService.emit('user-logged-in', {
user,
authenticationMethod: usedAuthenticationMethod,
});
return await this.userService.toPublic(user, { posthog: this.postHog, withScopes: true });
}
this.eventService.emit('user-login-failed', {
authenticationMethod: usedAuthenticationMethod,
userEmail: email,
reason: 'wrong credentials',
});
throw new auth_error_1.AuthError('Wrong username or password. Do you have caps lock on?');
}
async currentUser(req) {
return await this.userService.toPublic(req.user, {
posthog: this.postHog,
withScopes: true,
});
}
async resolveSignupToken(req) {
const { inviterId, inviteeId } = req.query;
const isWithinUsersLimit = this.license.isWithinUsersLimit();
if (!isWithinUsersLimit) {
this.logger.debug('Request to resolve signup token failed because of users quota reached', {
inviterId,
inviteeId,
});
throw new forbidden_error_1.ForbiddenError(constants_1.RESPONSE_ERROR_MESSAGES.USERS_QUOTA_REACHED);
}
if (!inviterId || !inviteeId) {
this.logger.debug('Request to resolve signup token failed because of missing user IDs in query string', { inviterId, inviteeId });
throw new bad_request_error_1.BadRequestError('Invalid payload');
}
for (const userId of [inviterId, inviteeId]) {
if (!validator_1.default.isUUID(userId)) {
this.logger.debug('Request to resolve signup token failed because of invalid user ID', {
userId,
});
throw new bad_request_error_1.BadRequestError('Invalid userId');
}
}
const users = await this.userRepository.findManyByIds([inviterId, inviteeId]);
if (users.length !== 2) {
this.logger.debug('Request to resolve signup token failed because the ID of the inviter and/or the ID of the invitee were not found in database', { inviterId, inviteeId });
throw new bad_request_error_1.BadRequestError('Invalid invite URL');
}
const invitee = users.find((user) => user.id === inviteeId);
if (!invitee || invitee.password) {
this.logger.error('Invalid invite URL - invitee already setup', {
inviterId,
inviteeId,
});
throw new bad_request_error_1.BadRequestError('The invitation was likely either deleted or already claimed');
}
const inviter = users.find((user) => user.id === inviterId);
if (!(inviter === null || inviter === void 0 ? void 0 : inviter.email) || !(inviter === null || inviter === void 0 ? void 0 : inviter.firstName)) {
this.logger.error('Request to resolve signup token failed because inviter does not exist or is not set up', {
inviterId: inviter === null || inviter === void 0 ? void 0 : inviter.id,
});
throw new bad_request_error_1.BadRequestError('Invalid request');
}
this.eventService.emit('user-invite-email-click', { inviter, invitee });
const { firstName, lastName } = inviter;
return { inviter: { firstName, lastName } };
}
logout(_, res) {
this.authService.clearCookie(res);
return { loggedOut: true };
}
};
exports.AuthController = AuthController;
__decorate([
(0, decorators_1.Post)('/login', { skipAuth: true, rateLimit: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", Promise)
], AuthController.prototype, "login", null);
__decorate([
(0, decorators_1.Get)('/login'),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object]),
__metadata("design:returntype", Promise)
], AuthController.prototype, "currentUser", null);
__decorate([
(0, decorators_1.Get)('/resolve-signup-token', { skipAuth: true }),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object]),
__metadata("design:returntype", Promise)
], AuthController.prototype, "resolveSignupToken", null);
__decorate([
(0, decorators_1.Post)('/logout'),
__metadata("design:type", Function),
__metadata("design:paramtypes", [Object, Object]),
__metadata("design:returntype", void 0)
], AuthController.prototype, "logout", null);
exports.AuthController = AuthController = __decorate([
(0, decorators_1.RestController)(),
__metadata("design:paramtypes", [Logger_1.Logger,
auth_service_1.AuthService,
mfa_service_1.MfaService,
user_service_1.UserService,
License_1.License,
user_repository_1.UserRepository,
event_service_1.EventService,
posthog_1.PostHogClient])
], AuthController);
//# sourceMappingURL=auth.controller.js.map
;