const UserHandler = require('./UserHandler') const UserDeleter = require('./UserDeleter') const UserGetter = require('./UserGetter') const { User } = require('../../models/User') const NewsletterManager = require('../Newsletter/NewsletterManager') const UserRegistrationHandler = require('./UserRegistrationHandler') const logger = require('logger-sharelatex') const metrics = require('metrics-sharelatex') const AuthenticationManager = require('../Authentication/AuthenticationManager') const AuthenticationController = require('../Authentication/AuthenticationController') const Features = require('../../infrastructure/Features') const UserAuditLogHandler = require('./UserAuditLogHandler') const UserSessionsManager = require('./UserSessionsManager') const UserUpdater = require('./UserUpdater') const SudoModeHandler = require('../SudoMode/SudoModeHandler') const Errors = require('../Errors/Errors') const HttpErrorHandler = require('../Errors/HttpErrorHandler') const OError = require('@overleaf/o-error') const EmailHandler = require('../Email/EmailHandler') const UrlHelper = require('../Helpers/UrlHelper') const { promisify } = require('util') const { expressify } = require('../../util/promises') async function _ensureAffiliation(userId, emailData) { if (emailData.samlProviderId) { await UserUpdater.promises.confirmEmail(userId, emailData.email) } else { await UserUpdater.promises.addAffiliationForNewUser(userId, emailData.email) } } async function changePassword(req, res, next) { metrics.inc('user.password-change') const userId = AuthenticationController.getLoggedInUserId(req) const user = await AuthenticationManager.promises.authenticate( { _id: userId }, req.body.currentPassword ) if (!user) { return HttpErrorHandler.badRequest(req, res, 'Your old password is wrong') } if (req.body.newPassword1 !== req.body.newPassword2) { return HttpErrorHandler.badRequest( req, res, req.i18n.translate('password_change_passwords_do_not_match') ) } const validationError = AuthenticationManager.validatePassword( req.body.newPassword1 ) if (validationError != null) { return HttpErrorHandler.badRequest(req, res, validationError.message) } await UserAuditLogHandler.promises.addEntry( user._id, 'update-password', user._id, req.ip ) await AuthenticationManager.promises.setUserPassword( user._id, req.body.newPassword1 ) const emailOptions = { to: user.email, actionDescribed: `your password has been changed on your account ${ user.email }`, action: 'password changed' } EmailHandler.sendEmail('securityAlert', emailOptions, error => { if (error) { // log error when sending security alert email but do not pass back logger.error({ err: error }) } }) await UserSessionsManager.promises.revokeAllUserSessions(user, [ req.sessionID ]) return res.json({ message: { type: 'success', email: user.email, text: req.i18n.translate('password_change_successful') } }) } async function clearSessions(req, res, next) { metrics.inc('user.clear-sessions') const user = AuthenticationController.getSessionUser(req) const sessions = await UserSessionsManager.promises.getAllUserSessions(user, [ req.sessionID ]) await UserAuditLogHandler.promises.addEntry( user._id, 'clear-sessions', user._id, req.ip, { sessions } ) await UserSessionsManager.promises.revokeAllUserSessions(user, [ req.sessionID ]) const emailOptions = { to: user.email, actionDescribed: `active sessions were cleared on your account ${ user.email }`, action: 'active sessions cleared' } try { await EmailHandler.promises.sendEmail('securityAlert', emailOptions) } catch (error) { logger.error( { userId: user._id }, 'could not send security alert email when sessions cleared' ) } res.sendStatus(201) } async function ensureAffiliation(user) { if (!Features.hasFeature('affiliations')) { return } const flaggedEmails = user.emails.filter(email => email.affiliationUnchecked) if (flaggedEmails.length === 0) { return } if (flaggedEmails.length > 1) { logger.error( { userId: user._id }, `Unexpected number of flagged emails: ${flaggedEmails.length}` ) } await _ensureAffiliation(user._id, flaggedEmails[0]) } async function ensureAffiliationMiddleware(req, res, next) { let user if (!Features.hasFeature('affiliations') || !req.query.ensureAffiliation) { return next() } const userId = AuthenticationController.getLoggedInUserId(req) try { user = await UserGetter.promises.getUser(userId) } catch (error) { return new Errors.UserNotFoundError({ info: { userId } }) } try { await ensureAffiliation(user) } catch (error) { return next(error) } return next() } const UserController = { clearSessions: expressify(clearSessions), tryDeleteUser(req, res, next) { const userId = AuthenticationController.getLoggedInUserId(req) const { password } = req.body if (password == null || password === '') { logger.err( { userId }, 'no password supplied for attempt to delete account' ) return res.sendStatus(403) } AuthenticationManager.authenticate( { _id: userId }, password, (err, user) => { if (err != null) { logger.warn( { userId }, 'error authenticating during attempt to delete account' ) return next(err) } if (!user) { logger.err({ userId }, 'auth failed during attempt to delete account') return res.sendStatus(403) } UserDeleter.deleteUser( userId, { deleterUser: user, ipAddress: req.ip }, err => { if (err) { let errorData = { message: 'error while deleting user account', info: { userId } } if (err instanceof Errors.SubscriptionAdminDeletionError) { // set info.public.error for JSON response so frontend can display // a specific message errorData.info.public = { error: 'SubscriptionAdminDeletionError' } logger.warn(OError.tag(err, errorData.message, errorData.info)) return HttpErrorHandler.unprocessableEntity( req, res, errorData.message, errorData.info.public ) } else { return next(OError.tag(err, errorData.message, errorData.info)) } } const sessionId = req.sessionID if (typeof req.logout === 'function') { req.logout() } req.session.destroy(err => { if (err != null) { logger.warn({ err }, 'error destorying session') return next(err) } UserSessionsManager.untrackSession(user, sessionId) res.sendStatus(200) }) } ) } ) }, unsubscribe(req, res, next) { const userId = AuthenticationController.getLoggedInUserId(req) UserGetter.getUser(userId, (err, user) => { if (err != null) { return next(err) } NewsletterManager.unsubscribe(user, err => { if (err != null) { logger.warn( { err, user }, 'Failed to unsubscribe user from newsletter' ) } res.sendStatus(200) }) }) }, updateUserSettings(req, res, next) { const userId = AuthenticationController.getLoggedInUserId(req) User.findById(userId, (err, user) => { if (err != null || user == null) { logger.err({ err, userId }, 'problem updaing user settings') return res.sendStatus(500) } if (req.body.first_name != null) { user.first_name = req.body.first_name.trim() } if (req.body.last_name != null) { user.last_name = req.body.last_name.trim() } if (req.body.role != null) { user.role = req.body.role.trim() } if (req.body.institution != null) { user.institution = req.body.institution.trim() } if (req.body.mode != null) { user.ace.mode = req.body.mode } if (req.body.editorTheme != null) { user.ace.theme = req.body.editorTheme } if (req.body.overallTheme != null) { user.ace.overallTheme = req.body.overallTheme } if (req.body.fontSize != null) { user.ace.fontSize = req.body.fontSize } if (req.body.autoComplete != null) { user.ace.autoComplete = req.body.autoComplete } if (req.body.autoPairDelimiters != null) { user.ace.autoPairDelimiters = req.body.autoPairDelimiters } if (req.body.spellCheckLanguage != null) { user.ace.spellCheckLanguage = req.body.spellCheckLanguage } if (req.body.pdfViewer != null) { user.ace.pdfViewer = req.body.pdfViewer } if (req.body.syntaxValidation != null) { user.ace.syntaxValidation = req.body.syntaxValidation } if (req.body.fontFamily != null) { user.ace.fontFamily = req.body.fontFamily } if (req.body.lineHeight != null) { user.ace.lineHeight = req.body.lineHeight } user.save(err => { if (err != null) { return next(err) } const newEmail = req.body.email != null ? req.body.email.trim().toLowerCase() : undefined if ( newEmail == null || newEmail === user.email || req.externalAuthenticationSystemUsed() ) { // end here, don't update email AuthenticationController.setInSessionUser(req, { first_name: user.first_name, last_name: user.last_name }) res.sendStatus(200) } else if (newEmail.indexOf('@') === -1) { // email invalid res.sendStatus(400) } else { // update the user email UserUpdater.changeEmailAddress(userId, newEmail, err => { if (err) { if (err instanceof Errors.EmailExistsError) { const translation = req.i18n.translate( 'email_already_registered' ) return HttpErrorHandler.conflict(req, res, translation) } else { return HttpErrorHandler.legacyInternal( req, res, req.i18n.translate('problem_changing_email_address'), OError.tag(err, 'problem_changing_email_address', { userId, newEmail }) ) } } User.findById(userId, (err, user) => { if (err != null) { logger.err( { err, userId }, 'error getting user for email update' ) return res.sendStatus(500) } AuthenticationController.setInSessionUser(req, { email: user.email, first_name: user.first_name, last_name: user.last_name }) UserHandler.populateTeamInvites(user, err => { // need to refresh this in the background if (err != null) { logger.err({ err }, 'error populateTeamInvites') } res.sendStatus(200) }) }) }) } }) }) }, doLogout(req, cb) { metrics.inc('user.logout') const user = AuthenticationController.getSessionUser(req) logger.log({ user }, 'logging out') const sessionId = req.sessionID if (typeof req.logout === 'function') { req.logout() } // passport logout req.session.destroy(err => { if (err) { logger.warn({ err }, 'error destorying session') return cb(err) } if (user != null) { UserSessionsManager.untrackSession(user, sessionId) SudoModeHandler.clearSudoMode(user._id) } cb() }) }, logout(req, res, next) { const requestedRedirect = req.body.redirect ? UrlHelper.getSafeRedirectPath(req.body.redirect) : undefined const redirectUrl = requestedRedirect || '/login' UserController.doLogout(req, err => { if (err != null) { return next(err) } res.redirect(redirectUrl) }) }, expireDeletedUser(req, res, next) { const userId = req.params.userId UserDeleter.expireDeletedUser(userId, error => { if (error) { return next(error) } res.sendStatus(204) }) }, expireDeletedUsersAfterDuration(req, res, next) { UserDeleter.expireDeletedUsersAfterDuration(error => { if (error) { return next(error) } res.sendStatus(204) }) }, register(req, res, next) { const { email } = req.body if (email == null || email === '') { return res.sendStatus(422) // Unprocessable Entity } UserRegistrationHandler.registerNewUserAndSendActivationEmail( email, (error, user, setNewPasswordUrl) => { if (error != null) { return next(error) } res.json({ email: user.email, setNewPasswordUrl }) } ) }, changePassword: expressify(changePassword) } UserController.promises = { doLogout: promisify(UserController.doLogout), ensureAffiliation, ensureAffiliationMiddleware } module.exports = UserController