2015-10-19 23:21:47 +00:00
|
|
|
/* jslint node: true */
|
|
|
|
'use strict';
|
|
|
|
|
2018-06-23 03:26:46 +00:00
|
|
|
// ENiGMA½
|
|
|
|
const setClientTheme = require('./theme.js').setClientTheme;
|
|
|
|
const clientConnections = require('./client_connections.js').clientConnections;
|
|
|
|
const StatLog = require('./stat_log.js');
|
|
|
|
const logger = require('./logger.js');
|
|
|
|
const Events = require('./events.js');
|
2018-11-11 08:55:38 +00:00
|
|
|
const Config = require('./config.js').get;
|
2018-11-22 02:43:50 +00:00
|
|
|
const {
|
|
|
|
Errors,
|
|
|
|
ErrorReasons
|
|
|
|
} = require('./enig_error.js');
|
2018-11-24 00:41:16 +00:00
|
|
|
const UserProps = require('./user_property.js');
|
2018-11-26 02:05:16 +00:00
|
|
|
const SysProps = require('./system_property.js');
|
|
|
|
const SystemLogKeys = require('./system_log.js');
|
2019-02-23 05:51:12 +00:00
|
|
|
const User = require('./user.js');
|
2019-09-10 03:35:12 +00:00
|
|
|
const {
|
|
|
|
getMessageConferenceByTag,
|
|
|
|
getMessageAreaByTag,
|
2019-09-12 03:21:33 +00:00
|
|
|
getSuitableMessageConfAndAreaTags,
|
2019-09-10 03:35:12 +00:00
|
|
|
} = require('./message_area.js');
|
|
|
|
const {
|
|
|
|
getFileAreaByTag,
|
|
|
|
getDefaultFileAreaTag,
|
|
|
|
} = require('./file_base_area.js');
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-06-23 03:26:46 +00:00
|
|
|
// deps
|
|
|
|
const async = require('async');
|
2018-11-23 06:07:37 +00:00
|
|
|
const _ = require('lodash');
|
2019-05-10 01:56:04 +00:00
|
|
|
const assert = require('assert');
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2019-05-08 03:36:33 +00:00
|
|
|
exports.userLogin = userLogin;
|
|
|
|
exports.recordLogin = recordLogin;
|
|
|
|
exports.transformLoginError = transformLoginError;
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2019-02-21 06:55:09 +00:00
|
|
|
function userLogin(client, username, password, options, cb) {
|
|
|
|
if(!cb && _.isFunction(options)) {
|
|
|
|
cb = options;
|
|
|
|
options = {};
|
|
|
|
}
|
|
|
|
|
2018-12-24 22:32:38 +00:00
|
|
|
const config = Config();
|
|
|
|
|
|
|
|
if(config.users.badUserNames.includes(username.toLowerCase())) {
|
2018-12-27 21:16:59 +00:00
|
|
|
client.log.info( { username, ip : client.remoteAddress }, 'Attempt to login with banned username');
|
2018-12-25 07:18:04 +00:00
|
|
|
|
|
|
|
// slow down a bit to thwart brute force attacks
|
|
|
|
return setTimeout( () => {
|
|
|
|
return cb(Errors.BadLogin('Disallowed username', ErrorReasons.NotAllowed));
|
|
|
|
}, 2000);
|
2018-12-24 22:32:38 +00:00
|
|
|
}
|
2018-11-23 06:07:37 +00:00
|
|
|
|
2019-02-23 05:51:12 +00:00
|
|
|
const authInfo = {
|
|
|
|
username,
|
|
|
|
password,
|
|
|
|
};
|
|
|
|
|
|
|
|
authInfo.type = options.authType || User.AuthFactor1Types.Password;
|
|
|
|
authInfo.pubKey = options.ctx;
|
|
|
|
|
|
|
|
client.user.authenticateFactor1(authInfo, err => {
|
2018-06-22 05:15:04 +00:00
|
|
|
if(err) {
|
2019-05-08 03:36:33 +00:00
|
|
|
return cb(transformLoginError(err, client, username));
|
2018-06-22 05:15:04 +00:00
|
|
|
}
|
2018-11-23 06:07:37 +00:00
|
|
|
|
|
|
|
const user = client.user;
|
|
|
|
|
|
|
|
// Good login; reset any failed attempts
|
2019-05-08 03:36:33 +00:00
|
|
|
delete client.sessionFailedLoginAttempts;
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-06-22 05:15:04 +00:00
|
|
|
//
|
2018-06-23 03:26:46 +00:00
|
|
|
// Ensure this user is not already logged in.
|
2018-06-22 05:15:04 +00:00
|
|
|
//
|
2018-11-22 02:50:03 +00:00
|
|
|
const existingClientConnection = clientConnections.find(cc => {
|
|
|
|
return user !== cc.user && // not current connection
|
|
|
|
user.userId === cc.user.userId; // ...but same user
|
2018-06-22 05:15:04 +00:00
|
|
|
});
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-06-22 05:15:04 +00:00
|
|
|
if(existingClientConnection) {
|
|
|
|
client.log.info(
|
|
|
|
{
|
2020-05-14 01:30:57 +00:00
|
|
|
existingNodeId : existingClientConnection.node,
|
|
|
|
username : user.username,
|
|
|
|
userId : user.userId
|
2018-06-22 05:15:04 +00:00
|
|
|
},
|
|
|
|
'Already logged in'
|
|
|
|
);
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-11-22 02:43:50 +00:00
|
|
|
return cb(Errors.BadLogin(
|
|
|
|
`User ${user.username} already logged in.`,
|
|
|
|
ErrorReasons.AlreadyLoggedIn
|
|
|
|
));
|
2018-06-22 05:15:04 +00:00
|
|
|
}
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-06-23 03:26:46 +00:00
|
|
|
// update client logger with addition of username
|
2018-06-22 05:15:04 +00:00
|
|
|
client.log = logger.log.child(
|
|
|
|
{
|
2020-05-14 01:30:57 +00:00
|
|
|
nodeId : client.log.fields.nodeId,
|
2018-06-23 03:26:46 +00:00
|
|
|
sessionId : client.log.fields.sessionId,
|
|
|
|
username : user.username,
|
2018-06-22 05:15:04 +00:00
|
|
|
}
|
|
|
|
);
|
2020-05-14 01:30:57 +00:00
|
|
|
|
2018-06-22 05:15:04 +00:00
|
|
|
client.log.info('Successful login');
|
2015-10-19 23:21:47 +00:00
|
|
|
|
2018-06-23 03:26:46 +00:00
|
|
|
// User's unique session identifier is the same as the connection itself
|
2018-11-24 00:41:16 +00:00
|
|
|
user.sessionId = client.session.uniqueId; // convenience
|
2018-06-04 01:58:31 +00:00
|
|
|
|
2018-06-22 05:15:04 +00:00
|
|
|
Events.emit(Events.getSystemEvents().UserLogin, { user } );
|
2018-06-03 23:59:16 +00:00
|
|
|
|
2019-05-08 03:36:33 +00:00
|
|
|
setClientTheme(client, user.properties[UserProps.ThemeId]);
|
|
|
|
|
2019-09-10 03:35:12 +00:00
|
|
|
postLoginPrep(client, err => {
|
|
|
|
if(err) {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(user.authenticated) {
|
|
|
|
return recordLogin(client, cb);
|
|
|
|
}
|
|
|
|
|
|
|
|
// recordLogin() must happen after 2FA!
|
|
|
|
return cb(null);
|
|
|
|
});
|
2018-06-22 05:15:04 +00:00
|
|
|
});
|
2019-05-08 03:36:33 +00:00
|
|
|
}
|
|
|
|
|
2019-09-10 03:35:12 +00:00
|
|
|
function postLoginPrep(client, cb) {
|
|
|
|
async.series(
|
|
|
|
[
|
|
|
|
(callback) => {
|
|
|
|
//
|
|
|
|
// User may (no longer) have read (view) rights to their current
|
|
|
|
// message, conferences and/or areas. Move them out if so.
|
|
|
|
//
|
2019-09-12 03:21:33 +00:00
|
|
|
const confTag = client.user.getProperty(UserProps.MessageConfTag);
|
|
|
|
const conf = getMessageConferenceByTag(confTag) || {};
|
|
|
|
const area = getMessageAreaByTag(client.user.getProperty(UserProps.MessageAreaTag), confTag) || {};
|
2019-09-10 03:35:12 +00:00
|
|
|
|
2019-09-12 03:21:33 +00:00
|
|
|
if(!client.acs.hasMessageConfRead(conf) || !client.acs.hasMessageAreaRead(area)) {
|
|
|
|
// move them out of both area and possibly conf to something suitable, hopefully.
|
|
|
|
const [newConfTag, newAreaTag] = getSuitableMessageConfAndAreaTags(client);
|
2019-09-10 03:35:12 +00:00
|
|
|
client.user.persistProperties({
|
2019-09-12 03:21:33 +00:00
|
|
|
[ UserProps.MessageConfTag ] : newConfTag,
|
|
|
|
[ UserProps.MessageAreaTag ] : newAreaTag,
|
2019-09-10 03:35:12 +00:00
|
|
|
},
|
|
|
|
err => {
|
|
|
|
return callback(err);
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
return callback(null);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
// Likewise for file areas
|
|
|
|
const area = getFileAreaByTag(client.user.getProperty(UserProps.FileAreaTag)) || {};
|
|
|
|
if(!client.acs.hasFileAreaRead(area)) {
|
|
|
|
const areaTag = getDefaultFileAreaTag(client) || '';
|
|
|
|
client.user.persistProperty(UserProps.FileAreaTag, areaTag, err => {
|
|
|
|
return callback(err);
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
return callback(null);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-05-08 03:36:33 +00:00
|
|
|
function recordLogin(client, cb) {
|
2019-05-10 01:56:04 +00:00
|
|
|
assert(client.user.authenticated); // don't get in situations where this isn't true
|
|
|
|
|
2019-05-08 03:36:33 +00:00
|
|
|
const user = client.user;
|
|
|
|
async.parallel(
|
|
|
|
[
|
|
|
|
(callback) => {
|
|
|
|
StatLog.incrementNonPersistentSystemStat(SysProps.LoginsToday, 1);
|
|
|
|
return StatLog.incrementSystemStat(SysProps.LoginCount, 1, callback);
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
return StatLog.setUserStat(user, UserProps.LastLoginTs, StatLog.now, callback);
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
return StatLog.incrementUserStat(user, UserProps.LoginCount, 1, callback);
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
const loginHistoryMax = Config().statLog.systemEvents.loginHistoryMax;
|
|
|
|
const historyItem = JSON.stringify({
|
|
|
|
userId : user.userId,
|
|
|
|
sessionId : user.sessionId,
|
|
|
|
});
|
|
|
|
|
|
|
|
return StatLog.appendSystemLogEntry(
|
|
|
|
SystemLogKeys.UserLoginHistory,
|
|
|
|
historyItem,
|
|
|
|
loginHistoryMax,
|
|
|
|
StatLog.KeepType.Max,
|
|
|
|
callback
|
|
|
|
);
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
function transformLoginError(err, client, username) {
|
|
|
|
client.sessionFailedLoginAttempts = _.get(client, 'sessionFailedLoginAttempts', 0) + 1;
|
|
|
|
const disconnect = Config().users.failedLogin.disconnect;
|
|
|
|
if(disconnect > 0 && client.sessionFailedLoginAttempts >= disconnect) {
|
|
|
|
err = Errors.BadLogin('To many failed login attempts', ErrorReasons.TooMany);
|
|
|
|
}
|
|
|
|
|
|
|
|
client.log.info( { username, ip : client.remoteAddress, reason : err.message }, 'Failed login attempt');
|
|
|
|
return err;
|
2015-10-19 23:21:47 +00:00
|
|
|
}
|