index.ts 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412
  1. import express from 'express'
  2. import RateLimit from 'express-rate-limit'
  3. import { tokensRouter } from '@server/controllers/api/users/token'
  4. import { Hooks } from '@server/lib/plugins/hooks'
  5. import { OAuthTokenModel } from '@server/models/oauth/oauth-token'
  6. import { MUser, MUserAccountDefault } from '@server/types/models'
  7. import { UserCreate, UserCreateResult, UserRight, UserRole, UserUpdate } from '../../../../shared'
  8. import { HttpStatusCode } from '../../../../shared/models/http/http-error-codes'
  9. import { UserAdminFlag } from '../../../../shared/models/users/user-flag.model'
  10. import { UserRegister } from '../../../../shared/models/users/user-register.model'
  11. import { auditLoggerFactory, getAuditIdFromRes, UserAuditView } from '../../../helpers/audit-logger'
  12. import { logger } from '../../../helpers/logger'
  13. import { generateRandomString, getFormattedObjects } from '../../../helpers/utils'
  14. import { CONFIG } from '../../../initializers/config'
  15. import { WEBSERVER } from '../../../initializers/constants'
  16. import { sequelizeTypescript } from '../../../initializers/database'
  17. import { Emailer } from '../../../lib/emailer'
  18. import { Notifier } from '../../../lib/notifier'
  19. import { Redis } from '../../../lib/redis'
  20. import { createUserAccountAndChannelAndPlaylist, sendVerifyUserEmail } from '../../../lib/user'
  21. import {
  22. asyncMiddleware,
  23. asyncRetryTransactionMiddleware,
  24. authenticate,
  25. ensureUserHasRight,
  26. ensureUserRegistrationAllowed,
  27. ensureUserRegistrationAllowedForIP,
  28. paginationValidator,
  29. setDefaultPagination,
  30. setDefaultSort,
  31. userAutocompleteValidator,
  32. usersAddValidator,
  33. usersGetValidator,
  34. usersListValidator,
  35. usersRegisterValidator,
  36. usersRemoveValidator,
  37. usersSortValidator,
  38. usersUpdateValidator
  39. } from '../../../middlewares'
  40. import {
  41. ensureCanManageUser,
  42. usersAskResetPasswordValidator,
  43. usersAskSendVerifyEmailValidator,
  44. usersBlockingValidator,
  45. usersResetPasswordValidator,
  46. usersVerifyEmailValidator
  47. } from '../../../middlewares/validators'
  48. import { UserModel } from '../../../models/user/user'
  49. import { meRouter } from './me'
  50. import { myAbusesRouter } from './my-abuses'
  51. import { myBlocklistRouter } from './my-blocklist'
  52. import { myVideosHistoryRouter } from './my-history'
  53. import { myNotificationsRouter } from './my-notifications'
  54. import { mySubscriptionsRouter } from './my-subscriptions'
  55. import { myVideoPlaylistsRouter } from './my-video-playlists'
  56. const auditLogger = auditLoggerFactory('users')
  57. const signupRateLimiter = RateLimit({
  58. windowMs: CONFIG.RATES_LIMIT.SIGNUP.WINDOW_MS,
  59. max: CONFIG.RATES_LIMIT.SIGNUP.MAX,
  60. skipFailedRequests: true
  61. })
  62. const askSendEmailLimiter = RateLimit({
  63. windowMs: CONFIG.RATES_LIMIT.ASK_SEND_EMAIL.WINDOW_MS,
  64. max: CONFIG.RATES_LIMIT.ASK_SEND_EMAIL.MAX
  65. })
  66. const usersRouter = express.Router()
  67. usersRouter.use('/', tokensRouter)
  68. usersRouter.use('/', myNotificationsRouter)
  69. usersRouter.use('/', mySubscriptionsRouter)
  70. usersRouter.use('/', myBlocklistRouter)
  71. usersRouter.use('/', myVideosHistoryRouter)
  72. usersRouter.use('/', myVideoPlaylistsRouter)
  73. usersRouter.use('/', myAbusesRouter)
  74. usersRouter.use('/', meRouter)
  75. usersRouter.get('/autocomplete',
  76. userAutocompleteValidator,
  77. asyncMiddleware(autocompleteUsers)
  78. )
  79. usersRouter.get('/',
  80. authenticate,
  81. ensureUserHasRight(UserRight.MANAGE_USERS),
  82. paginationValidator,
  83. usersSortValidator,
  84. setDefaultSort,
  85. setDefaultPagination,
  86. usersListValidator,
  87. asyncMiddleware(listUsers)
  88. )
  89. usersRouter.post('/:id/block',
  90. authenticate,
  91. ensureUserHasRight(UserRight.MANAGE_USERS),
  92. asyncMiddleware(usersBlockingValidator),
  93. ensureCanManageUser,
  94. asyncMiddleware(blockUser)
  95. )
  96. usersRouter.post('/:id/unblock',
  97. authenticate,
  98. ensureUserHasRight(UserRight.MANAGE_USERS),
  99. asyncMiddleware(usersBlockingValidator),
  100. ensureCanManageUser,
  101. asyncMiddleware(unblockUser)
  102. )
  103. usersRouter.get('/:id',
  104. authenticate,
  105. ensureUserHasRight(UserRight.MANAGE_USERS),
  106. asyncMiddleware(usersGetValidator),
  107. getUser
  108. )
  109. usersRouter.post('/',
  110. authenticate,
  111. ensureUserHasRight(UserRight.MANAGE_USERS),
  112. asyncMiddleware(usersAddValidator),
  113. asyncRetryTransactionMiddleware(createUser)
  114. )
  115. usersRouter.post('/register',
  116. signupRateLimiter,
  117. asyncMiddleware(ensureUserRegistrationAllowed),
  118. ensureUserRegistrationAllowedForIP,
  119. asyncMiddleware(usersRegisterValidator),
  120. asyncRetryTransactionMiddleware(registerUser)
  121. )
  122. usersRouter.put('/:id',
  123. authenticate,
  124. ensureUserHasRight(UserRight.MANAGE_USERS),
  125. asyncMiddleware(usersUpdateValidator),
  126. ensureCanManageUser,
  127. asyncMiddleware(updateUser)
  128. )
  129. usersRouter.delete('/:id',
  130. authenticate,
  131. ensureUserHasRight(UserRight.MANAGE_USERS),
  132. asyncMiddleware(usersRemoveValidator),
  133. ensureCanManageUser,
  134. asyncMiddleware(removeUser)
  135. )
  136. usersRouter.post('/ask-reset-password',
  137. asyncMiddleware(usersAskResetPasswordValidator),
  138. asyncMiddleware(askResetUserPassword)
  139. )
  140. usersRouter.post('/:id/reset-password',
  141. asyncMiddleware(usersResetPasswordValidator),
  142. asyncMiddleware(resetUserPassword)
  143. )
  144. usersRouter.post('/ask-send-verify-email',
  145. askSendEmailLimiter,
  146. asyncMiddleware(usersAskSendVerifyEmailValidator),
  147. asyncMiddleware(reSendVerifyUserEmail)
  148. )
  149. usersRouter.post('/:id/verify-email',
  150. asyncMiddleware(usersVerifyEmailValidator),
  151. asyncMiddleware(verifyUserEmail)
  152. )
  153. // ---------------------------------------------------------------------------
  154. export {
  155. usersRouter
  156. }
  157. // ---------------------------------------------------------------------------
  158. async function createUser (req: express.Request, res: express.Response) {
  159. const body: UserCreate = req.body
  160. const userToCreate = new UserModel({
  161. username: body.username,
  162. password: body.password,
  163. email: body.email,
  164. nsfwPolicy: CONFIG.INSTANCE.DEFAULT_NSFW_POLICY,
  165. autoPlayVideo: true,
  166. role: body.role,
  167. videoQuota: body.videoQuota,
  168. videoQuotaDaily: body.videoQuotaDaily,
  169. adminFlags: body.adminFlags || UserAdminFlag.NONE
  170. }) as MUser
  171. // NB: due to the validator usersAddValidator, password==='' can only be true if we can send the mail.
  172. const createPassword = userToCreate.password === ''
  173. if (createPassword) {
  174. userToCreate.password = await generateRandomString(20)
  175. }
  176. const { user, account, videoChannel } = await createUserAccountAndChannelAndPlaylist({
  177. userToCreate,
  178. channelNames: body.channelName && { name: body.channelName, displayName: body.channelName }
  179. })
  180. auditLogger.create(getAuditIdFromRes(res), new UserAuditView(user.toFormattedJSON()))
  181. logger.info('User %s with its channel and account created.', body.username)
  182. if (createPassword) {
  183. // this will send an email for newly created users, so then can set their first password.
  184. logger.info('Sending to user %s a create password email', body.username)
  185. const verificationString = await Redis.Instance.setCreatePasswordVerificationString(user.id)
  186. const url = WEBSERVER.URL + '/reset-password?userId=' + user.id + '&verificationString=' + verificationString
  187. await Emailer.Instance.addPasswordCreateEmailJob(userToCreate.username, user.email, url)
  188. }
  189. Hooks.runAction('action:api.user.created', { body, user, account, videoChannel })
  190. return res.json({
  191. user: {
  192. id: user.id,
  193. account: {
  194. id: account.id
  195. }
  196. } as UserCreateResult
  197. })
  198. }
  199. async function registerUser (req: express.Request, res: express.Response) {
  200. const body: UserRegister = req.body
  201. const userToCreate = new UserModel({
  202. username: body.username,
  203. password: body.password,
  204. email: body.email,
  205. nsfwPolicy: CONFIG.INSTANCE.DEFAULT_NSFW_POLICY,
  206. autoPlayVideo: true,
  207. role: UserRole.USER,
  208. videoQuota: CONFIG.USER.VIDEO_QUOTA,
  209. videoQuotaDaily: CONFIG.USER.VIDEO_QUOTA_DAILY,
  210. emailVerified: CONFIG.SIGNUP.REQUIRES_EMAIL_VERIFICATION ? false : null
  211. })
  212. const { user, account, videoChannel } = await createUserAccountAndChannelAndPlaylist({
  213. userToCreate: userToCreate,
  214. userDisplayName: body.displayName || undefined,
  215. channelNames: body.channel
  216. })
  217. auditLogger.create(body.username, new UserAuditView(user.toFormattedJSON()))
  218. logger.info('User %s with its channel and account registered.', body.username)
  219. if (CONFIG.SIGNUP.REQUIRES_EMAIL_VERIFICATION) {
  220. await sendVerifyUserEmail(user)
  221. }
  222. Notifier.Instance.notifyOnNewUserRegistration(user)
  223. Hooks.runAction('action:api.user.registered', { body, user, account, videoChannel })
  224. return res.type('json').status(HttpStatusCode.NO_CONTENT_204).end()
  225. }
  226. async function unblockUser (req: express.Request, res: express.Response) {
  227. const user = res.locals.user
  228. await changeUserBlock(res, user, false)
  229. Hooks.runAction('action:api.user.unblocked', { user })
  230. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  231. }
  232. async function blockUser (req: express.Request, res: express.Response) {
  233. const user = res.locals.user
  234. const reason = req.body.reason
  235. await changeUserBlock(res, user, true, reason)
  236. Hooks.runAction('action:api.user.blocked', { user })
  237. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  238. }
  239. function getUser (req: express.Request, res: express.Response) {
  240. return res.json(res.locals.user.toFormattedJSON({ withAdminFlags: true }))
  241. }
  242. async function autocompleteUsers (req: express.Request, res: express.Response) {
  243. const resultList = await UserModel.autoComplete(req.query.search as string)
  244. return res.json(resultList)
  245. }
  246. async function listUsers (req: express.Request, res: express.Response) {
  247. const resultList = await UserModel.listForApi({
  248. start: req.query.start,
  249. count: req.query.count,
  250. sort: req.query.sort,
  251. search: req.query.search,
  252. blocked: req.query.blocked
  253. })
  254. return res.json(getFormattedObjects(resultList.data, resultList.total, { withAdminFlags: true }))
  255. }
  256. async function removeUser (req: express.Request, res: express.Response) {
  257. const user = res.locals.user
  258. auditLogger.delete(getAuditIdFromRes(res), new UserAuditView(user.toFormattedJSON()))
  259. await sequelizeTypescript.transaction(async t => {
  260. // Use a transaction to avoid inconsistencies with hooks (account/channel deletion & federation)
  261. await user.destroy({ transaction: t })
  262. })
  263. Hooks.runAction('action:api.user.deleted', { user })
  264. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  265. }
  266. async function updateUser (req: express.Request, res: express.Response) {
  267. const body: UserUpdate = req.body
  268. const userToUpdate = res.locals.user
  269. const oldUserAuditView = new UserAuditView(userToUpdate.toFormattedJSON())
  270. const roleChanged = body.role !== undefined && body.role !== userToUpdate.role
  271. const keysToUpdate: (keyof UserUpdate)[] = [
  272. 'password',
  273. 'email',
  274. 'emailVerified',
  275. 'videoQuota',
  276. 'videoQuotaDaily',
  277. 'role',
  278. 'adminFlags',
  279. 'pluginAuth'
  280. ]
  281. for (const key of keysToUpdate) {
  282. if (body[key] !== undefined) userToUpdate.set(key, body[key])
  283. }
  284. const user = await userToUpdate.save()
  285. // Destroy user token to refresh rights
  286. if (roleChanged || body.password !== undefined) await OAuthTokenModel.deleteUserToken(userToUpdate.id)
  287. auditLogger.update(getAuditIdFromRes(res), new UserAuditView(user.toFormattedJSON()), oldUserAuditView)
  288. Hooks.runAction('action:api.user.updated', { user })
  289. // Don't need to send this update to followers, these attributes are not federated
  290. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  291. }
  292. async function askResetUserPassword (req: express.Request, res: express.Response) {
  293. const user = res.locals.user
  294. const verificationString = await Redis.Instance.setResetPasswordVerificationString(user.id)
  295. const url = WEBSERVER.URL + '/reset-password?userId=' + user.id + '&verificationString=' + verificationString
  296. await Emailer.Instance.addPasswordResetEmailJob(user.username, user.email, url)
  297. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  298. }
  299. async function resetUserPassword (req: express.Request, res: express.Response) {
  300. const user = res.locals.user
  301. user.password = req.body.password
  302. await user.save()
  303. await Redis.Instance.removePasswordVerificationString(user.id)
  304. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  305. }
  306. async function reSendVerifyUserEmail (req: express.Request, res: express.Response) {
  307. const user = res.locals.user
  308. await sendVerifyUserEmail(user)
  309. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  310. }
  311. async function verifyUserEmail (req: express.Request, res: express.Response) {
  312. const user = res.locals.user
  313. user.emailVerified = true
  314. if (req.body.isPendingEmail === true) {
  315. user.email = user.pendingEmail
  316. user.pendingEmail = null
  317. }
  318. await user.save()
  319. return res.status(HttpStatusCode.NO_CONTENT_204).end()
  320. }
  321. async function changeUserBlock (res: express.Response, user: MUserAccountDefault, block: boolean, reason?: string) {
  322. const oldUserAuditView = new UserAuditView(user.toFormattedJSON())
  323. user.blocked = block
  324. user.blockedReason = reason || null
  325. await sequelizeTypescript.transaction(async t => {
  326. await OAuthTokenModel.deleteUserToken(user.id, t)
  327. await user.save({ transaction: t })
  328. })
  329. await Emailer.Instance.addUserBlockJob(user, block, reason)
  330. auditLogger.update(getAuditIdFromRes(res), new UserAuditView(user.toFormattedJSON()), oldUserAuditView)
  331. }