UNPKG

will-auth

Version:

authentication and authorization module

290 lines (289 loc) 16 kB
"use strict"; var __extends = (this && this.__extends) || (function () { var extendStatics = function (d, b) { extendStatics = Object.setPrototypeOf || ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) || function (d, b) { for (var p in b) if (Object.prototype.hasOwnProperty.call(b, p)) d[p] = b[p]; }; return extendStatics(d, b); }; return function (d, b) { if (typeof b !== "function" && b !== null) throw new TypeError("Class extends value " + String(b) + " is not a constructor or null"); extendStatics(d, b); function __() { this.constructor = d; } d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __()); }; })(); var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; var __generator = (this && this.__generator) || function (thisArg, body) { var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g; function verb(n) { return function (v) { return step([n, v]); }; } function step(op) { if (f) throw new TypeError("Generator is already executing."); while (_) try { if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t; if (y = 0, t) op = [op[0] & 2, t.value]; switch (op[0]) { case 0: case 1: t = op; break; case 4: _.label++; return { value: op[1], done: false }; case 5: _.label++; y = op[1]; op = [0]; continue; case 7: op = _.ops.pop(); _.trys.pop(); continue; default: if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; } if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; } if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; } if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; } if (t[2]) _.ops.pop(); _.trys.pop(); continue; } op = body.call(thisArg, _); } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; } if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true }; } }; Object.defineProperty(exports, "__esModule", { value: true }); exports.ChangePasswordHandler = void 0; var will_sql_1 = require("will-sql"); var will_lib_1 = require("will-lib"); var will_api_1 = require("will-api"); var VerifyError_1 = require("../models/VerifyError"); var SchemeHandler_1 = require("./SchemeHandler"); var bcrypt = require('bcrypt'); var ChangePasswordHandler = /** @class */ (function (_super) { __extends(ChangePasswordHandler, _super); function ChangePasswordHandler() { var _this = _super !== null && _super.apply(this, arguments) || this; _this.model = { name: "tuser", alias: { privateAlias: _this.section } }; //declared addon actions name _this.handlers = [{ name: "change" }, { name: "policy" }]; return _this; } ChangePasswordHandler.prototype.change = function (context) { return __awaiter(this, void 0, void 0, function () { return __generator(this, function (_a) { switch (_a.label) { case 0: if (!(this.model && this.isValidModelConfig("privateAlias", this.model))) return [3 /*break*/, 2]; return [4 /*yield*/, this.exposeFunctional(context, this.model, { operate: "change" })]; case 1: _a.sent(); return [2 /*return*/, this.doChange(context, this.model)]; case 2: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid setting", will_api_1.HTTP.NOT_ACCEPTABLE, -16006))]; } }); }); }; ChangePasswordHandler.prototype.policy = function (context) { return __awaiter(this, void 0, void 0, function () { return __generator(this, function (_a) { switch (_a.label) { case 0: if (!(this.model && this.isValidModelConfig("privateAlias", this.model))) return [3 /*break*/, 2]; return [4 /*yield*/, this.exposeFunctional(context, this.model, { operate: "policy" })]; case 1: _a.sent(); return [2 /*return*/, this.doPolicy(context, this.model)]; case 2: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid setting", will_api_1.HTTP.NOT_ACCEPTABLE, -16006))]; } }); }); }; ChangePasswordHandler.prototype.doChange = function (context, model) { return __awaiter(this, void 0, void 0, function () { var puserid, poldpass, puserpass, pcnfpass, atoken, db, plib, ut, error; return __generator(this, function (_a) { switch (_a.label) { case 0: puserid = context.params.userid; poldpass = context.params.oldpassword; puserpass = context.params.userpassword; pcnfpass = context.params.confirmpassword; return [4 /*yield*/, this.getAuthenToken(context, true, true)]; case 1: atoken = _a.sent(); if (atoken == undefined) { return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Token is invalid", will_api_1.HTTP.UNAUTHORIZED, -16031))]; } db = this.getPrivateConnector(model); _a.label = 2; case 2: _a.trys.push([2, , 4, 5]); plib = new will_lib_1.PasswordLibrary(); return [4 /*yield*/, plib.getUserTokenInfo(db, atoken.identifier)]; case 3: ut = _a.sent(); if (!ut.userid) { return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Token not found", will_api_1.HTTP.UNAUTHORIZED, -16003))]; } puserid = ut.userid; error = this.checkChangePassword(puserid, puserpass, pcnfpass); if (error) { return [2 /*return*/, Promise.reject(error)]; } return [2 /*return*/, this.processChangePassword(db, puserid, puserpass, poldpass)]; case 4: if (db) db.close(); return [7 /*endfinally*/]; case 5: return [2 /*return*/]; } }); }); }; ChangePasswordHandler.prototype.checkChangePassword = function (puserid, puserpass, pcnfpass) { if (puserid == null || puserid == "") { return new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033); } if (puserpass != pcnfpass) { return new VerifyError_1.VerifyError("Confirm Password Mismatch", will_api_1.HTTP.NOT_ACCEPTABLE, -16034); } if (puserpass == puserid) { return new VerifyError_1.VerifyError("Not allow password as same as user", will_api_1.HTTP.NOT_ACCEPTABLE, -16035); } if (puserpass.length < 3) { return new VerifyError_1.VerifyError("Password must be equal to or greater than 3 characters", will_api_1.HTTP.NOT_ACCEPTABLE, -16036); } return null; }; ChangePasswordHandler.prototype.processChangePassword = function (db, puserid, puserpass, poldpass) { return __awaiter(this, void 0, void 0, function () { var sql, rs, row, usrpass, validpass, site, verify; return __generator(this, function (_a) { switch (_a.label) { case 0: sql = new will_sql_1.KnSQL("select tuser.site,tuser.username,tuser.userpassword,tuserinfo.activeflag "); sql.append("from tuser left join tuserinfo on tuserinfo.userid = tuser.userid "); sql.append("where tuser.userid = ?userid "); sql.set("userid", puserid); this.logger.info(sql); return [4 /*yield*/, db.executeQuery(sql)]; case 1: rs = _a.sent(); this.logger.debug("ChangePasswordHandler.processChangePassword: rs", rs.rows.length); if (!(rs.rows && rs.rows.length > 0)) return [3 /*break*/, 5]; row = rs.rows[0]; if (puserpass == row.username) { return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Not allow password as same as user", will_api_1.HTTP.NOT_ACCEPTABLE, -16035))]; } if ("1" == row.activeflag) { return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Not allow active directory user change password", will_api_1.HTTP.NOT_ACCEPTABLE, -16037))]; } usrpass = row.userpassword; validpass = bcrypt.compareSync(poldpass, usrpass); if (!!validpass) return [3 /*break*/, 2]; return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033))]; case 2: site = row.site; return [4 /*yield*/, this.changeUserPassword(db, puserid, poldpass, puserpass, site, new Date())]; case 3: verify = _a.sent(); this.logger.debug("ChangePasswordHandler.processChangePassword: verify", verify); if (verify && !verify.result) { return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError(verify.msg, will_api_1.HTTP.NOT_ACCEPTABLE, verify.errno))]; } _a.label = 4; case 4: return [3 /*break*/, 6]; case 5: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033))]; case 6: return [2 /*return*/, this.createRecordSet()]; } }); }); }; ChangePasswordHandler.prototype.changeUserPassword = function (db, userid, pwd, newpwd, site, date) { return __awaiter(this, void 0, void 0, function () { var result, plib, err_1, ex_1; return __generator(this, function (_a) { switch (_a.label) { case 0: result = { result: false, msg: null, errno: 0, args: null }; _a.label = 1; case 1: _a.trys.push([1, 9, , 10]); return [4 /*yield*/, db.beginWork()]; case 2: _a.sent(); _a.label = 3; case 3: _a.trys.push([3, 6, , 8]); plib = new will_lib_1.PasswordLibrary(); return [4 /*yield*/, plib.changePassword(db, site, userid, pwd, newpwd, date, '0')]; case 4: result = _a.sent(); this.logger.debug("ChangePasswordHandler.changeUserPassword", result); return [4 /*yield*/, db.commitWork()]; case 5: _a.sent(); return [3 /*break*/, 8]; case 6: err_1 = _a.sent(); console.error(err_1); result.result = false; result.errno = -4000; if (err_1.errno) result.errno = err_1.errno; if (typeof err_1 === "string") { result.msg = err_1; } else { result.msg = err_1.message; } return [4 /*yield*/, db.rollbackWork()]; case 7: _a.sent(); return [3 /*break*/, 8]; case 8: return [3 /*break*/, 10]; case 9: ex_1 = _a.sent(); console.error(ex_1); result.result = false; result.errno = -4100; if (ex_1.errno) result.errno = ex_1.errno; if (typeof ex_1 === "string") { result.msg = ex_1; } else { result.msg = ex_1.message; } return [3 /*break*/, 10]; case 10: return [2 /*return*/, Promise.resolve(result)]; } }); }); }; ChangePasswordHandler.prototype.doPolicy = function (context, model) { return __awaiter(this, void 0, void 0, function () { var db, plib, policy; return __generator(this, function (_a) { switch (_a.label) { case 0: db = this.getPrivateConnector(model); _a.label = 1; case 1: _a.trys.push([1, , 3, 4]); plib = new will_lib_1.PasswordLibrary(); return [4 /*yield*/, plib.getPasswordPolicy(db)]; case 2: policy = _a.sent(); return [2 /*return*/, { policy: policy }]; case 3: if (db) db.close(); return [7 /*endfinally*/]; case 4: return [2 /*return*/]; } }); }); }; return ChangePasswordHandler; }(SchemeHandler_1.SchemeHandler)); exports.ChangePasswordHandler = ChangePasswordHandler;