2019-05-29 05:21:06 -04:00
|
|
|
/* eslint-disable
|
|
|
|
camelcase,
|
|
|
|
handle-callback-err,
|
|
|
|
max-len,
|
|
|
|
no-unused-vars,
|
|
|
|
*/
|
|
|
|
// TODO: This file was created by bulk-decaffeinate.
|
|
|
|
// Fix any style issues and re-enable lint.
|
|
|
|
/*
|
|
|
|
* decaffeinate suggestions:
|
|
|
|
* DS102: Remove unnecessary code created because of implicit returns
|
|
|
|
* DS207: Consider shorter variations of null checks
|
|
|
|
* Full docs: https://github.com/decaffeinate/decaffeinate/blob/master/docs/suggestions.md
|
|
|
|
*/
|
|
|
|
let UserController
|
|
|
|
const UserHandler = require('./UserHandler')
|
|
|
|
const UserDeleter = require('./UserDeleter')
|
|
|
|
const UserGetter = require('./UserGetter')
|
|
|
|
const { User } = require('../../models/User')
|
|
|
|
const newsLetterManager = require('../Newsletter/NewsletterManager')
|
|
|
|
const UserRegistrationHandler = require('./UserRegistrationHandler')
|
|
|
|
const logger = require('logger-sharelatex')
|
|
|
|
const metrics = require('metrics-sharelatex')
|
|
|
|
const Url = require('url')
|
|
|
|
const AuthenticationManager = require('../Authentication/AuthenticationManager')
|
|
|
|
const AuthenticationController = require('../Authentication/AuthenticationController')
|
|
|
|
const UserSessionsManager = require('./UserSessionsManager')
|
|
|
|
const UserUpdater = require('./UserUpdater')
|
|
|
|
const SudoModeHandler = require('../SudoMode/SudoModeHandler')
|
|
|
|
const settings = require('settings-sharelatex')
|
|
|
|
const Errors = require('../Errors/Errors')
|
2019-07-19 05:40:23 -04:00
|
|
|
const OError = require('@overleaf/o-error')
|
2019-07-31 04:22:31 -04:00
|
|
|
const HttpErrors = require('@overleaf/o-error/http')
|
2019-06-14 12:31:46 -04:00
|
|
|
const EmailHandler = require('../Email/EmailHandler')
|
2019-05-29 05:21:06 -04:00
|
|
|
|
|
|
|
module.exports = UserController = {
|
|
|
|
tryDeleteUser(req, res, next) {
|
|
|
|
const user_id = AuthenticationController.getLoggedInUserId(req)
|
|
|
|
const { password } = req.body
|
|
|
|
logger.log({ user_id }, 'trying to delete user account')
|
|
|
|
if (password == null || password === '') {
|
|
|
|
logger.err(
|
|
|
|
{ user_id },
|
|
|
|
'no password supplied for attempt to delete account'
|
|
|
|
)
|
|
|
|
return res.sendStatus(403)
|
|
|
|
}
|
2019-07-18 10:18:56 -04:00
|
|
|
AuthenticationManager.authenticate({ _id: user_id }, password, function(
|
|
|
|
err,
|
|
|
|
user
|
|
|
|
) {
|
|
|
|
if (err != null) {
|
|
|
|
logger.warn(
|
|
|
|
{ user_id },
|
|
|
|
'error authenticating during attempt to delete account'
|
|
|
|
)
|
|
|
|
return next(err)
|
|
|
|
}
|
|
|
|
if (!user) {
|
|
|
|
logger.err({ user_id }, 'auth failed during attempt to delete account')
|
|
|
|
return res.sendStatus(403)
|
|
|
|
}
|
|
|
|
UserDeleter.deleteUser(
|
|
|
|
user_id,
|
|
|
|
{ deleterUser: user, ipAddress: req.ip },
|
|
|
|
function(err) {
|
2019-07-19 05:40:23 -04:00
|
|
|
if (err) {
|
|
|
|
let errorData = {
|
|
|
|
message: 'error while deleting user account',
|
|
|
|
info: { user_id }
|
|
|
|
}
|
2019-05-29 05:21:06 -04:00
|
|
|
if (err instanceof Errors.SubscriptionAdminDeletionError) {
|
2019-07-19 05:40:23 -04:00
|
|
|
// set info.public.error for JSON response so frontend can display
|
|
|
|
// a specific message
|
|
|
|
errorData.info.public = {
|
|
|
|
error: 'SubscriptionAdminDeletionError'
|
|
|
|
}
|
|
|
|
return next(
|
|
|
|
new HttpErrors.UnprocessableEntityError(errorData).withCause(
|
|
|
|
err
|
|
|
|
)
|
|
|
|
)
|
2019-05-29 05:21:06 -04:00
|
|
|
} else {
|
2019-07-19 05:40:23 -04:00
|
|
|
return next(new OError(errorData).withCause(err))
|
2019-05-29 05:21:06 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
const sessionId = req.sessionID
|
|
|
|
if (typeof req.logout === 'function') {
|
|
|
|
req.logout()
|
|
|
|
}
|
2019-07-18 10:18:56 -04:00
|
|
|
req.session.destroy(function(err) {
|
2019-05-29 05:21:06 -04:00
|
|
|
if (err != null) {
|
2019-07-01 09:48:09 -04:00
|
|
|
logger.warn({ err }, 'error destorying session')
|
2019-05-29 05:21:06 -04:00
|
|
|
return next(err)
|
|
|
|
}
|
|
|
|
UserSessionsManager.untrackSession(user, sessionId)
|
|
|
|
return res.sendStatus(200)
|
|
|
|
})
|
2019-07-18 10:18:56 -04:00
|
|
|
}
|
|
|
|
)
|
|
|
|
})
|
2019-05-29 05:21:06 -04:00
|
|
|
},
|
|
|
|
|
|
|
|
unsubscribe(req, res) {
|
|
|
|
const user_id = AuthenticationController.getLoggedInUserId(req)
|
|
|
|
return UserGetter.getUser(user_id, (err, user) =>
|
|
|
|
newsLetterManager.unsubscribe(user, () => res.send())
|
|
|
|
)
|
|
|
|
},
|
|
|
|
|
2019-07-31 04:22:31 -04:00
|
|
|
updateUserSettings(req, res, next) {
|
2019-05-29 05:21:06 -04:00
|
|
|
const user_id = AuthenticationController.getLoggedInUserId(req)
|
|
|
|
logger.log({ user_id }, 'updating account settings')
|
|
|
|
return User.findById(user_id, function(err, user) {
|
|
|
|
if (err != null || user == null) {
|
|
|
|
logger.err({ err, user_id }, 'problem updaing user settings')
|
|
|
|
return res.sendStatus(500)
|
|
|
|
}
|
|
|
|
|
|
|
|
if (req.body.first_name != null) {
|
|
|
|
user.first_name = req.body.first_name.trim()
|
|
|
|
}
|
|
|
|
if (req.body.last_name != null) {
|
|
|
|
user.last_name = req.body.last_name.trim()
|
|
|
|
}
|
|
|
|
if (req.body.role != null) {
|
|
|
|
user.role = req.body.role.trim()
|
|
|
|
}
|
|
|
|
if (req.body.institution != null) {
|
|
|
|
user.institution = req.body.institution.trim()
|
|
|
|
}
|
|
|
|
if (req.body.mode != null) {
|
|
|
|
user.ace.mode = req.body.mode
|
|
|
|
}
|
|
|
|
if (req.body.editorTheme != null) {
|
|
|
|
user.ace.theme = req.body.editorTheme
|
|
|
|
}
|
|
|
|
if (req.body.overallTheme != null) {
|
|
|
|
user.ace.overallTheme = req.body.overallTheme
|
|
|
|
}
|
|
|
|
if (req.body.fontSize != null) {
|
|
|
|
user.ace.fontSize = req.body.fontSize
|
|
|
|
}
|
|
|
|
if (req.body.autoComplete != null) {
|
|
|
|
user.ace.autoComplete = req.body.autoComplete
|
|
|
|
}
|
|
|
|
if (req.body.autoPairDelimiters != null) {
|
|
|
|
user.ace.autoPairDelimiters = req.body.autoPairDelimiters
|
|
|
|
}
|
|
|
|
if (req.body.spellCheckLanguage != null) {
|
|
|
|
user.ace.spellCheckLanguage = req.body.spellCheckLanguage
|
|
|
|
}
|
|
|
|
if (req.body.pdfViewer != null) {
|
|
|
|
user.ace.pdfViewer = req.body.pdfViewer
|
|
|
|
}
|
|
|
|
if (req.body.syntaxValidation != null) {
|
|
|
|
user.ace.syntaxValidation = req.body.syntaxValidation
|
|
|
|
}
|
|
|
|
if (req.body.fontFamily != null) {
|
|
|
|
user.ace.fontFamily = req.body.fontFamily
|
|
|
|
}
|
|
|
|
if (req.body.lineHeight != null) {
|
|
|
|
user.ace.lineHeight = req.body.lineHeight
|
|
|
|
}
|
|
|
|
|
|
|
|
return user.save(function(err) {
|
|
|
|
const newEmail =
|
|
|
|
req.body.email != null
|
|
|
|
? req.body.email.trim().toLowerCase()
|
|
|
|
: undefined
|
|
|
|
if (
|
|
|
|
newEmail == null ||
|
|
|
|
newEmail === user.email ||
|
|
|
|
req.externalAuthenticationSystemUsed()
|
|
|
|
) {
|
|
|
|
// end here, don't update email
|
|
|
|
AuthenticationController.setInSessionUser(req, {
|
|
|
|
first_name: user.first_name,
|
|
|
|
last_name: user.last_name
|
|
|
|
})
|
|
|
|
return res.sendStatus(200)
|
|
|
|
} else if (newEmail.indexOf('@') === -1) {
|
|
|
|
// email invalid
|
|
|
|
return res.sendStatus(400)
|
|
|
|
} else {
|
|
|
|
// update the user email
|
|
|
|
return UserUpdater.changeEmailAddress(user_id, newEmail, function(
|
|
|
|
err
|
|
|
|
) {
|
2019-07-31 04:22:31 -04:00
|
|
|
if (err) {
|
|
|
|
let errorData = {
|
|
|
|
message: 'problem updaing users email address',
|
|
|
|
info: { user_id, newEmail, public: {} }
|
|
|
|
}
|
2019-05-29 05:21:06 -04:00
|
|
|
if (err instanceof Errors.EmailExistsError) {
|
2019-07-31 04:22:31 -04:00
|
|
|
errorData.info.public.message = req.i18n.translate(
|
|
|
|
'email_already_registered'
|
|
|
|
)
|
|
|
|
return next(
|
|
|
|
new HttpErrors.ConflictError(errorData).withCause(err)
|
|
|
|
)
|
2019-05-29 05:21:06 -04:00
|
|
|
} else {
|
2019-07-31 04:22:31 -04:00
|
|
|
errorData.info.public.message = req.i18n.translate(
|
|
|
|
'problem_changing_email_address'
|
|
|
|
)
|
|
|
|
next(
|
|
|
|
new HttpErrors.InternalServerError(errorData).withCause(err)
|
|
|
|
)
|
2019-05-29 05:21:06 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return User.findById(user_id, function(err, user) {
|
|
|
|
if (err != null) {
|
|
|
|
logger.err(
|
|
|
|
{ err, user_id },
|
|
|
|
'error getting user for email update'
|
|
|
|
)
|
|
|
|
return res.send(500)
|
|
|
|
}
|
|
|
|
AuthenticationController.setInSessionUser(req, {
|
|
|
|
email: user.email,
|
|
|
|
first_name: user.first_name,
|
|
|
|
last_name: user.last_name
|
|
|
|
})
|
|
|
|
return UserHandler.populateTeamInvites(user, function(err) {
|
|
|
|
// need to refresh this in the background
|
|
|
|
if (err != null) {
|
|
|
|
logger.err({ err }, 'error populateTeamInvites')
|
|
|
|
}
|
|
|
|
return res.sendStatus(200)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
},
|
|
|
|
|
|
|
|
_doLogout(req, cb) {
|
|
|
|
if (cb == null) {
|
|
|
|
cb = function(err) {}
|
|
|
|
}
|
|
|
|
metrics.inc('user.logout')
|
|
|
|
const user = AuthenticationController.getSessionUser(req)
|
|
|
|
logger.log({ user }, 'logging out')
|
|
|
|
const sessionId = req.sessionID
|
|
|
|
if (typeof req.logout === 'function') {
|
|
|
|
req.logout()
|
|
|
|
} // passport logout
|
|
|
|
return req.session.destroy(function(err) {
|
|
|
|
if (err) {
|
2019-07-01 09:48:09 -04:00
|
|
|
logger.warn({ err }, 'error destorying session')
|
2019-05-29 05:21:06 -04:00
|
|
|
cb(err)
|
|
|
|
}
|
|
|
|
if (user != null) {
|
|
|
|
UserSessionsManager.untrackSession(user, sessionId)
|
|
|
|
SudoModeHandler.clearSudoMode(user._id)
|
|
|
|
}
|
|
|
|
return cb()
|
|
|
|
})
|
|
|
|
},
|
|
|
|
|
|
|
|
logout(req, res, next) {
|
|
|
|
return UserController._doLogout(req, function(err) {
|
|
|
|
if (err != null) {
|
|
|
|
return next(err)
|
|
|
|
}
|
2019-07-01 11:20:50 -04:00
|
|
|
const redirect_url = '/login'
|
2019-05-29 05:21:06 -04:00
|
|
|
return res.redirect(redirect_url)
|
|
|
|
})
|
|
|
|
},
|
|
|
|
|
2019-07-18 10:18:56 -04:00
|
|
|
expireDeletedUser(req, res, next) {
|
|
|
|
const userId = req.params.userId
|
|
|
|
UserDeleter.expireDeletedUser(userId, error => {
|
|
|
|
if (error) {
|
|
|
|
return next(error)
|
|
|
|
}
|
|
|
|
|
|
|
|
res.sendStatus(204)
|
|
|
|
})
|
|
|
|
},
|
|
|
|
|
|
|
|
expireDeletedUsersAfterDuration(req, res, next) {
|
|
|
|
UserDeleter.expireDeletedUsersAfterDuration(error => {
|
|
|
|
if (error) {
|
|
|
|
return next(error)
|
|
|
|
}
|
|
|
|
|
|
|
|
res.sendStatus(204)
|
|
|
|
})
|
|
|
|
},
|
|
|
|
|
2019-05-29 05:21:06 -04:00
|
|
|
register(req, res, next) {
|
|
|
|
if (next == null) {
|
|
|
|
next = function(error) {}
|
|
|
|
}
|
|
|
|
const { email } = req.body
|
|
|
|
if (email == null || email === '') {
|
|
|
|
res.sendStatus(422) // Unprocessable Entity
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return UserRegistrationHandler.registerNewUserAndSendActivationEmail(
|
|
|
|
email,
|
|
|
|
function(error, user, setNewPasswordUrl) {
|
|
|
|
if (error != null) {
|
|
|
|
return next(error)
|
|
|
|
}
|
|
|
|
return res.json({
|
|
|
|
email: user.email,
|
|
|
|
setNewPasswordUrl
|
|
|
|
})
|
|
|
|
}
|
|
|
|
)
|
|
|
|
},
|
|
|
|
|
|
|
|
clearSessions(req, res, next) {
|
|
|
|
if (next == null) {
|
|
|
|
next = function(error) {}
|
|
|
|
}
|
|
|
|
metrics.inc('user.clear-sessions')
|
|
|
|
const user = AuthenticationController.getSessionUser(req)
|
|
|
|
logger.log({ user_id: user._id }, 'clearing sessions for user')
|
|
|
|
return UserSessionsManager.revokeAllUserSessions(
|
|
|
|
user,
|
|
|
|
[req.sessionID],
|
|
|
|
function(err) {
|
|
|
|
if (err != null) {
|
|
|
|
return next(err)
|
|
|
|
}
|
|
|
|
return res.sendStatus(201)
|
|
|
|
}
|
|
|
|
)
|
|
|
|
},
|
|
|
|
|
|
|
|
changePassword(req, res, next) {
|
|
|
|
metrics.inc('user.password-change')
|
2019-06-14 12:31:46 -04:00
|
|
|
const internalError = {
|
|
|
|
message: { type: 'error', text: req.i18n.translate('internal_error') }
|
|
|
|
}
|
2019-05-29 05:21:06 -04:00
|
|
|
const user_id = AuthenticationController.getLoggedInUserId(req)
|
2019-06-14 12:31:46 -04:00
|
|
|
AuthenticationManager.authenticate(
|
2019-05-29 05:21:06 -04:00
|
|
|
{ _id: user_id },
|
2019-06-14 12:31:46 -04:00
|
|
|
req.body.currentPassword,
|
|
|
|
(err, user) => {
|
|
|
|
if (err) {
|
|
|
|
return res.status(500).json(internalError)
|
2019-05-29 05:21:06 -04:00
|
|
|
}
|
2019-06-14 12:31:46 -04:00
|
|
|
if (!user) {
|
|
|
|
return res.status(400).json({
|
2019-05-29 05:21:06 -04:00
|
|
|
message: {
|
|
|
|
type: 'error',
|
|
|
|
text: 'Your old password is wrong'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2019-06-14 12:31:46 -04:00
|
|
|
if (req.body.newPassword1 !== req.body.newPassword2) {
|
|
|
|
return res.status(400).json({
|
|
|
|
message: {
|
|
|
|
type: 'error',
|
|
|
|
text: req.i18n.translate('password_change_passwords_do_not_match')
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
const validationError = AuthenticationManager.validatePassword(
|
|
|
|
req.body.newPassword1
|
|
|
|
)
|
|
|
|
if (validationError != null) {
|
|
|
|
return res.status(400).json({
|
|
|
|
message: {
|
|
|
|
type: 'error',
|
|
|
|
text: validationError.message
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
AuthenticationManager.setUserPassword(
|
|
|
|
user._id,
|
|
|
|
req.body.newPassword1,
|
|
|
|
err => {
|
|
|
|
if (err) {
|
|
|
|
return res.status(500).json(internalError)
|
|
|
|
}
|
|
|
|
// log errors but do not wait for response
|
|
|
|
EmailHandler.sendEmail(
|
|
|
|
'passwordChanged',
|
|
|
|
{ to: user.email },
|
|
|
|
err => {
|
|
|
|
if (err) {
|
|
|
|
logger.warn(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
UserSessionsManager.revokeAllUserSessions(
|
|
|
|
user,
|
|
|
|
[req.sessionID],
|
|
|
|
err => {
|
|
|
|
if (err != null) {
|
|
|
|
return res.status(500).json(internalError)
|
|
|
|
}
|
|
|
|
res.json({
|
|
|
|
message: {
|
|
|
|
type: 'success',
|
|
|
|
email: user.email,
|
|
|
|
text: req.i18n.translate('password_change_successful')
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
)
|
|
|
|
}
|
|
|
|
)
|
2019-05-29 05:21:06 -04:00
|
|
|
}
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|