will-auth
Version:
authentication and authorization module
290 lines (289 loc) • 16 kB
JavaScript
"use strict";
var __extends = (this && this.__extends) || (function () {
var extendStatics = function (d, b) {
extendStatics = Object.setPrototypeOf ||
({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||
function (d, b) { for (var p in b) if (Object.prototype.hasOwnProperty.call(b, p)) d[p] = b[p]; };
return extendStatics(d, b);
};
return function (d, b) {
if (typeof b !== "function" && b !== null)
throw new TypeError("Class extends value " + String(b) + " is not a constructor or null");
extendStatics(d, b);
function __() { this.constructor = d; }
d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());
};
})();
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __generator = (this && this.__generator) || function (thisArg, body) {
var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g;
function verb(n) { return function (v) { return step([n, v]); }; }
function step(op) {
if (f) throw new TypeError("Generator is already executing.");
while (_) try {
if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;
if (y = 0, t) op = [op[0] & 2, t.value];
switch (op[0]) {
case 0: case 1: t = op; break;
case 4: _.label++; return { value: op[1], done: false };
case 5: _.label++; y = op[1]; op = [0]; continue;
case 7: op = _.ops.pop(); _.trys.pop(); continue;
default:
if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }
if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }
if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }
if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }
if (t[2]) _.ops.pop();
_.trys.pop(); continue;
}
op = body.call(thisArg, _);
} catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }
if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };
}
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.ChangePasswordHandler = void 0;
var will_sql_1 = require("will-sql");
var will_lib_1 = require("will-lib");
var will_api_1 = require("will-api");
var VerifyError_1 = require("../models/VerifyError");
var SchemeHandler_1 = require("./SchemeHandler");
var bcrypt = require('bcrypt');
var ChangePasswordHandler = /** @class */ (function (_super) {
__extends(ChangePasswordHandler, _super);
function ChangePasswordHandler() {
var _this = _super !== null && _super.apply(this, arguments) || this;
_this.model = { name: "tuser", alias: { privateAlias: _this.section } };
//declared addon actions name
_this.handlers = [{ name: "change" }, { name: "policy" }];
return _this;
}
ChangePasswordHandler.prototype.change = function (context) {
return __awaiter(this, void 0, void 0, function () {
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
if (!(this.model && this.isValidModelConfig("privateAlias", this.model))) return [3 /*break*/, 2];
return [4 /*yield*/, this.exposeFunctional(context, this.model, { operate: "change" })];
case 1:
_a.sent();
return [2 /*return*/, this.doChange(context, this.model)];
case 2: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid setting", will_api_1.HTTP.NOT_ACCEPTABLE, -16006))];
}
});
});
};
ChangePasswordHandler.prototype.policy = function (context) {
return __awaiter(this, void 0, void 0, function () {
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
if (!(this.model && this.isValidModelConfig("privateAlias", this.model))) return [3 /*break*/, 2];
return [4 /*yield*/, this.exposeFunctional(context, this.model, { operate: "policy" })];
case 1:
_a.sent();
return [2 /*return*/, this.doPolicy(context, this.model)];
case 2: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid setting", will_api_1.HTTP.NOT_ACCEPTABLE, -16006))];
}
});
});
};
ChangePasswordHandler.prototype.doChange = function (context, model) {
return __awaiter(this, void 0, void 0, function () {
var puserid, poldpass, puserpass, pcnfpass, atoken, db, plib, ut, error;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
puserid = context.params.userid;
poldpass = context.params.oldpassword;
puserpass = context.params.userpassword;
pcnfpass = context.params.confirmpassword;
return [4 /*yield*/, this.getAuthenToken(context, true, true)];
case 1:
atoken = _a.sent();
if (atoken == undefined) {
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Token is invalid", will_api_1.HTTP.UNAUTHORIZED, -16031))];
}
db = this.getPrivateConnector(model);
_a.label = 2;
case 2:
_a.trys.push([2, , 4, 5]);
plib = new will_lib_1.PasswordLibrary();
return [4 /*yield*/, plib.getUserTokenInfo(db, atoken.identifier)];
case 3:
ut = _a.sent();
if (!ut.userid) {
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Token not found", will_api_1.HTTP.UNAUTHORIZED, -16003))];
}
puserid = ut.userid;
error = this.checkChangePassword(puserid, puserpass, pcnfpass);
if (error) {
return [2 /*return*/, Promise.reject(error)];
}
return [2 /*return*/, this.processChangePassword(db, puserid, puserpass, poldpass)];
case 4:
if (db)
db.close();
return [7 /*endfinally*/];
case 5: return [2 /*return*/];
}
});
});
};
ChangePasswordHandler.prototype.checkChangePassword = function (puserid, puserpass, pcnfpass) {
if (puserid == null || puserid == "") {
return new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033);
}
if (puserpass != pcnfpass) {
return new VerifyError_1.VerifyError("Confirm Password Mismatch", will_api_1.HTTP.NOT_ACCEPTABLE, -16034);
}
if (puserpass == puserid) {
return new VerifyError_1.VerifyError("Not allow password as same as user", will_api_1.HTTP.NOT_ACCEPTABLE, -16035);
}
if (puserpass.length < 3) {
return new VerifyError_1.VerifyError("Password must be equal to or greater than 3 characters", will_api_1.HTTP.NOT_ACCEPTABLE, -16036);
}
return null;
};
ChangePasswordHandler.prototype.processChangePassword = function (db, puserid, puserpass, poldpass) {
return __awaiter(this, void 0, void 0, function () {
var sql, rs, row, usrpass, validpass, site, verify;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
sql = new will_sql_1.KnSQL("select tuser.site,tuser.username,tuser.userpassword,tuserinfo.activeflag ");
sql.append("from tuser left join tuserinfo on tuserinfo.userid = tuser.userid ");
sql.append("where tuser.userid = ?userid ");
sql.set("userid", puserid);
this.logger.info(sql);
return [4 /*yield*/, db.executeQuery(sql)];
case 1:
rs = _a.sent();
this.logger.debug("ChangePasswordHandler.processChangePassword: rs", rs.rows.length);
if (!(rs.rows && rs.rows.length > 0)) return [3 /*break*/, 5];
row = rs.rows[0];
if (puserpass == row.username) {
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Not allow password as same as user", will_api_1.HTTP.NOT_ACCEPTABLE, -16035))];
}
if ("1" == row.activeflag) {
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Not allow active directory user change password", will_api_1.HTTP.NOT_ACCEPTABLE, -16037))];
}
usrpass = row.userpassword;
validpass = bcrypt.compareSync(poldpass, usrpass);
if (!!validpass) return [3 /*break*/, 2];
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033))];
case 2:
site = row.site;
return [4 /*yield*/, this.changeUserPassword(db, puserid, poldpass, puserpass, site, new Date())];
case 3:
verify = _a.sent();
this.logger.debug("ChangePasswordHandler.processChangePassword: verify", verify);
if (verify && !verify.result) {
return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError(verify.msg, will_api_1.HTTP.NOT_ACCEPTABLE, verify.errno))];
}
_a.label = 4;
case 4: return [3 /*break*/, 6];
case 5: return [2 /*return*/, Promise.reject(new VerifyError_1.VerifyError("Invalid user or password", will_api_1.HTTP.NOT_ACCEPTABLE, -16033))];
case 6: return [2 /*return*/, this.createRecordSet()];
}
});
});
};
ChangePasswordHandler.prototype.changeUserPassword = function (db, userid, pwd, newpwd, site, date) {
return __awaiter(this, void 0, void 0, function () {
var result, plib, err_1, ex_1;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
result = { result: false, msg: null, errno: 0, args: null };
_a.label = 1;
case 1:
_a.trys.push([1, 9, , 10]);
return [4 /*yield*/, db.beginWork()];
case 2:
_a.sent();
_a.label = 3;
case 3:
_a.trys.push([3, 6, , 8]);
plib = new will_lib_1.PasswordLibrary();
return [4 /*yield*/, plib.changePassword(db, site, userid, pwd, newpwd, date, '0')];
case 4:
result = _a.sent();
this.logger.debug("ChangePasswordHandler.changeUserPassword", result);
return [4 /*yield*/, db.commitWork()];
case 5:
_a.sent();
return [3 /*break*/, 8];
case 6:
err_1 = _a.sent();
console.error(err_1);
result.result = false;
result.errno = -4000;
if (err_1.errno)
result.errno = err_1.errno;
if (typeof err_1 === "string") {
result.msg = err_1;
}
else {
result.msg = err_1.message;
}
return [4 /*yield*/, db.rollbackWork()];
case 7:
_a.sent();
return [3 /*break*/, 8];
case 8: return [3 /*break*/, 10];
case 9:
ex_1 = _a.sent();
console.error(ex_1);
result.result = false;
result.errno = -4100;
if (ex_1.errno)
result.errno = ex_1.errno;
if (typeof ex_1 === "string") {
result.msg = ex_1;
}
else {
result.msg = ex_1.message;
}
return [3 /*break*/, 10];
case 10: return [2 /*return*/, Promise.resolve(result)];
}
});
});
};
ChangePasswordHandler.prototype.doPolicy = function (context, model) {
return __awaiter(this, void 0, void 0, function () {
var db, plib, policy;
return __generator(this, function (_a) {
switch (_a.label) {
case 0:
db = this.getPrivateConnector(model);
_a.label = 1;
case 1:
_a.trys.push([1, , 3, 4]);
plib = new will_lib_1.PasswordLibrary();
return [4 /*yield*/, plib.getPasswordPolicy(db)];
case 2:
policy = _a.sent();
return [2 /*return*/, { policy: policy }];
case 3:
if (db)
db.close();
return [7 /*endfinally*/];
case 4: return [2 /*return*/];
}
});
});
};
return ChangePasswordHandler;
}(SchemeHandler_1.SchemeHandler));
exports.ChangePasswordHandler = ChangePasswordHandler;