2017-02-16 03:27:16 +00:00
|
|
|
/* jslint node: true */
|
|
|
|
/* eslint-disable no-console */
|
|
|
|
'use strict';
|
|
|
|
|
2018-12-16 06:42:19 +00:00
|
|
|
const {
|
|
|
|
printUsageAndSetExitCode,
|
|
|
|
getAnswers,
|
|
|
|
ExitCodes,
|
|
|
|
argv,
|
|
|
|
initConfigAndDatabases
|
|
|
|
} = require('./oputil_common.js');
|
2017-02-20 18:31:24 +00:00
|
|
|
const getHelpFor = require('./oputil_help.js').getHelpFor;
|
2018-05-22 02:36:34 +00:00
|
|
|
const Errors = require('../enig_error.js').Errors;
|
2018-11-23 19:02:41 +00:00
|
|
|
const UserProps = require('../user_property.js');
|
2017-02-16 03:27:16 +00:00
|
|
|
|
|
|
|
const async = require('async');
|
2017-02-18 20:21:18 +00:00
|
|
|
const _ = require('lodash');
|
2018-12-16 07:26:28 +00:00
|
|
|
const moment = require('moment');
|
2019-05-10 01:56:04 +00:00
|
|
|
const fs = require('fs-extra');
|
2017-02-16 03:27:16 +00:00
|
|
|
|
|
|
|
exports.handleUserCommand = handleUserCommand;
|
|
|
|
|
|
|
|
function initAndGetUser(userName, cb) {
|
2018-06-22 05:15:04 +00:00
|
|
|
async.waterfall(
|
|
|
|
[
|
|
|
|
function init(callback) {
|
|
|
|
initConfigAndDatabases(callback);
|
|
|
|
},
|
|
|
|
function getUserObject(callback) {
|
2018-11-23 19:02:41 +00:00
|
|
|
const User = require('../../core/user.js');
|
|
|
|
User.getUserIdAndName(userName, (err, userId) => {
|
2018-06-22 05:15:04 +00:00
|
|
|
if(err) {
|
|
|
|
return callback(err);
|
|
|
|
}
|
2018-11-23 19:02:41 +00:00
|
|
|
return User.getUser(userId, callback);
|
2018-06-22 05:15:04 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
],
|
|
|
|
(err, user) => {
|
|
|
|
return cb(err, user);
|
|
|
|
}
|
|
|
|
);
|
2017-02-16 03:27:16 +00:00
|
|
|
}
|
|
|
|
|
2018-05-22 02:36:34 +00:00
|
|
|
function setAccountStatus(user, status) {
|
2018-06-22 05:15:04 +00:00
|
|
|
if(argv._.length < 3) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
const AccountStatus = require('../../core/user.js').AccountStatus;
|
2018-11-23 06:07:37 +00:00
|
|
|
|
|
|
|
status = {
|
|
|
|
activate : AccountStatus.active,
|
|
|
|
deactivate : AccountStatus.inactive,
|
|
|
|
disable : AccountStatus.disabled,
|
|
|
|
lock : AccountStatus.locked,
|
|
|
|
}[status];
|
|
|
|
|
2018-06-22 05:15:04 +00:00
|
|
|
const statusDesc = _.invert(AccountStatus)[status];
|
2018-11-23 19:02:41 +00:00
|
|
|
|
|
|
|
async.series(
|
|
|
|
[
|
|
|
|
(callback) => {
|
|
|
|
return user.persistProperty(UserProps.AccountStatus, status, callback);
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
if(AccountStatus.active !== status) {
|
|
|
|
return callback(null);
|
|
|
|
}
|
|
|
|
|
|
|
|
return user.unlockAccount(callback);
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
if(err) {
|
|
|
|
process.exitCode = ExitCodes.ERROR;
|
|
|
|
console.error(err.message);
|
|
|
|
} else {
|
|
|
|
console.info(`User status set to ${statusDesc}`);
|
|
|
|
}
|
2018-06-22 05:15:04 +00:00
|
|
|
}
|
2018-11-23 19:02:41 +00:00
|
|
|
);
|
2018-05-22 02:36:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
function setUserPassword(user) {
|
2018-06-22 05:15:04 +00:00
|
|
|
if(argv._.length < 4) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
async.waterfall(
|
|
|
|
[
|
|
|
|
function validate(callback) {
|
|
|
|
// :TODO: prompt if no password provided (more secure, no history, etc.)
|
|
|
|
const password = argv._[argv._.length - 1];
|
|
|
|
if(0 === password.length) {
|
|
|
|
return callback(Errors.Invalid('Invalid password'));
|
|
|
|
}
|
|
|
|
return callback(null, password);
|
|
|
|
},
|
|
|
|
function set(password, callback) {
|
|
|
|
user.setNewAuthCredentials(password, err => {
|
|
|
|
if(err) {
|
|
|
|
process.exitCode = ExitCodes.BAD_ARGS;
|
|
|
|
}
|
|
|
|
return callback(err);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
if(err) {
|
|
|
|
console.error(err.message);
|
|
|
|
} else {
|
|
|
|
console.info('New password set');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
2018-05-22 02:36:34 +00:00
|
|
|
}
|
|
|
|
|
2018-12-16 06:42:19 +00:00
|
|
|
function removeUserRecordsFromDbAndTable(dbName, tableName, userId, col, cb) {
|
|
|
|
const db = require('../../core/database.js').dbs[dbName];
|
|
|
|
db.run(
|
|
|
|
`DELETE FROM ${tableName}
|
|
|
|
WHERE ${col} = ?;`,
|
|
|
|
[ userId ],
|
|
|
|
err => {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
function removeUser(user) {
|
|
|
|
async.series(
|
|
|
|
[
|
2018-12-16 07:26:28 +00:00
|
|
|
(callback) => {
|
|
|
|
if(user.isRoot()) {
|
|
|
|
return callback(Errors.Invalid('Cannot delete root/SysOp user!'));
|
|
|
|
}
|
|
|
|
|
|
|
|
return callback(null);
|
|
|
|
},
|
2018-12-16 06:42:19 +00:00
|
|
|
(callback) => {
|
|
|
|
if(false === argv.prompt) {
|
|
|
|
return callback(null);
|
|
|
|
}
|
|
|
|
|
|
|
|
console.info('About to permanently delete the following user:');
|
|
|
|
console.info(`Username : ${user.username}`);
|
|
|
|
console.info(`Real name: ${user.properties[UserProps.RealName] || 'N/A'}`);
|
|
|
|
console.info(`User ID : ${user.userId}`);
|
|
|
|
console.info('WARNING: This cannot be undone!');
|
|
|
|
getAnswers([
|
|
|
|
{
|
|
|
|
name : 'proceed',
|
|
|
|
message : `Proceed in deleting ${user.username}?`,
|
|
|
|
type : 'confirm',
|
|
|
|
}
|
|
|
|
],
|
|
|
|
answers => {
|
|
|
|
if(answers.proceed) {
|
|
|
|
return callback(null);
|
|
|
|
}
|
|
|
|
return callback(Errors.General('User canceled'));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
// op has confirmed they are wanting ready to proceed (or passed --no-prompt)
|
|
|
|
const DeleteFrom = {
|
|
|
|
message : [ 'user_message_area_last_read' ],
|
|
|
|
system : [ 'user_event_log', ],
|
|
|
|
user : [ 'user_group_member', 'user' ],
|
|
|
|
};
|
|
|
|
|
|
|
|
async.eachSeries(Object.keys(DeleteFrom), (dbName, nextDbName) => {
|
|
|
|
const tables = DeleteFrom[dbName];
|
|
|
|
async.eachSeries(tables, (tableName, nextTableName) => {
|
|
|
|
const col = ('user' === dbName && 'user' === tableName) ? 'id' : 'user_id';
|
|
|
|
removeUserRecordsFromDbAndTable(dbName, tableName, user.userId, col, err => {
|
|
|
|
return nextTableName(err);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
err => {
|
|
|
|
return nextDbName(err);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
err => {
|
|
|
|
return callback(err);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
//
|
|
|
|
// Clean up *private* messages *to* this user
|
|
|
|
//
|
|
|
|
const Message = require('../../core/message.js');
|
|
|
|
const MsgDb = require('../../core/database.js').dbs.message;
|
|
|
|
|
|
|
|
const filter = {
|
|
|
|
resultType : 'id',
|
|
|
|
privateTagUserId : user.userId,
|
|
|
|
};
|
|
|
|
Message.findMessages(filter, (err, ids) => {
|
|
|
|
if(err) {
|
|
|
|
return callback(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
async.eachSeries(ids, (messageId, nextMessageId) => {
|
|
|
|
MsgDb.run(
|
|
|
|
`DELETE FROM message
|
|
|
|
WHERE message_id = ?;`,
|
|
|
|
[ messageId ],
|
|
|
|
err => {
|
|
|
|
return nextMessageId(err);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
},
|
|
|
|
err => {
|
|
|
|
return callback(err);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
if(err) {
|
|
|
|
return console.error(err.reason ? err.reason : err.message);
|
|
|
|
}
|
|
|
|
|
|
|
|
console.info('User has been deleted.');
|
|
|
|
}
|
|
|
|
);
|
2018-05-22 02:36:34 +00:00
|
|
|
}
|
|
|
|
|
2019-02-16 18:03:46 +00:00
|
|
|
function renameUser(user) {
|
|
|
|
if(argv._.length < 3) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
const newUserName = argv._[argv._.length - 1];
|
|
|
|
|
|
|
|
async.series(
|
|
|
|
[
|
|
|
|
(callback) => {
|
|
|
|
const { validateUserNameAvail } = require('../../core/system_view_validate.js');
|
|
|
|
return validateUserNameAvail(newUserName, callback);
|
|
|
|
},
|
|
|
|
(callback) => {
|
|
|
|
const userDb = require('../../core/database.js').dbs.user;
|
|
|
|
userDb.run(
|
|
|
|
`UPDATE user
|
|
|
|
SET user_name = ?
|
|
|
|
WHERE id = ?;`,
|
|
|
|
[ newUserName, user.userId, ],
|
|
|
|
err => {
|
|
|
|
return callback(err);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
if(err) {
|
|
|
|
return console.error(err.reason ? err.reason : err.message);
|
|
|
|
}
|
|
|
|
return console.info(`User "${user.username}" renamed to "${newUserName}"`);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-05-22 02:36:34 +00:00
|
|
|
function modUserGroups(user) {
|
2018-06-22 05:15:04 +00:00
|
|
|
if(argv._.length < 3) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
let groupName = argv._[argv._.length - 1].toString().replace(/["']/g, ''); // remove any quotes - necessary to allow "-foo"
|
|
|
|
let action = groupName[0]; // + or -
|
|
|
|
|
|
|
|
if('-' === action || '+' === action) {
|
|
|
|
groupName = groupName.substr(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
action = action || '+';
|
|
|
|
|
|
|
|
if(0 === groupName.length) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Groups are currently arbritary, so do a slight validation
|
|
|
|
//
|
|
|
|
if(!/[A-Za-z0-9]+/.test(groupName)) {
|
|
|
|
process.exitCode = ExitCodes.BAD_ARGS;
|
|
|
|
return console.error('Bad group name');
|
|
|
|
}
|
|
|
|
|
|
|
|
function done(err) {
|
|
|
|
if(err) {
|
|
|
|
process.exitCode = ExitCodes.BAD_ARGS;
|
|
|
|
console.error(err.message);
|
|
|
|
} else {
|
|
|
|
console.info('User groups modified');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const UserGroup = require('../../core/user_group.js');
|
|
|
|
if('-' === action) {
|
|
|
|
UserGroup.removeUserFromGroup(user.userId, groupName, done);
|
|
|
|
} else {
|
|
|
|
UserGroup.addUserToGroup(user.userId, groupName, done);
|
|
|
|
}
|
2018-05-22 02:36:34 +00:00
|
|
|
}
|
|
|
|
|
2018-12-16 07:26:28 +00:00
|
|
|
function showUserInfo(user) {
|
|
|
|
|
|
|
|
const User = require('../../core/user.js');
|
|
|
|
|
|
|
|
const statusDesc = () => {
|
|
|
|
const status = user.properties[UserProps.AccountStatus];
|
|
|
|
return _.invert(User.AccountStatus)[status] || 'unknown';
|
|
|
|
};
|
|
|
|
|
|
|
|
const created = () => {
|
|
|
|
const ac = user.properties[UserProps.AccountCreated];
|
|
|
|
return ac ? moment(ac).format() : 'N/A';
|
|
|
|
};
|
|
|
|
|
|
|
|
const lastLogin = () => {
|
|
|
|
const ll = user.properties[UserProps.LastLoginTs];
|
|
|
|
return ll ? moment(ll).format() : 'N/A';
|
|
|
|
};
|
|
|
|
|
|
|
|
const propOrNA = p => {
|
|
|
|
return user.properties[p] || 'N/A';
|
|
|
|
};
|
|
|
|
|
2019-05-11 06:21:42 +00:00
|
|
|
const stdInfo = `User information:
|
2018-12-16 07:26:28 +00:00
|
|
|
Username : ${user.username}${user.isRoot() ? ' (root/SysOp)' : ''}
|
|
|
|
Real name : ${propOrNA(UserProps.RealName)}
|
|
|
|
ID : ${user.userId}
|
|
|
|
Status : ${statusDesc()}
|
|
|
|
Groups : ${user.groups.join(', ')}
|
|
|
|
Created : ${created()}
|
|
|
|
Last login : ${lastLogin()}
|
|
|
|
Login count : ${propOrNA(UserProps.LoginCount)}
|
|
|
|
Email : ${propOrNA(UserProps.EmailAddress)}
|
|
|
|
Location : ${propOrNA(UserProps.Location)}
|
2019-05-11 06:21:42 +00:00
|
|
|
Affiliations : ${propOrNA(UserProps.Affiliations)}`;
|
|
|
|
let secInfo = '';
|
|
|
|
if(argv.security) {
|
|
|
|
const otp = user.getProperty(UserProps.AuthFactor2OTP);
|
|
|
|
if(otp) {
|
|
|
|
const backupCodesOrNa = () => {
|
|
|
|
try
|
|
|
|
{
|
|
|
|
return JSON.parse(user.getProperty(UserProps.AuthFactor2OTPBackupCodes)).join(', ');
|
|
|
|
} catch(e) {
|
|
|
|
return 'N/A';
|
|
|
|
}
|
|
|
|
};
|
|
|
|
secInfo = `\n2FA OTP : ${otp}
|
|
|
|
OTP secret : ${user.getProperty(UserProps.AuthFactor2OTPSecret) || 'N/A'}
|
|
|
|
OTP Backup : ${backupCodesOrNa()}`;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
console.info(`${stdInfo}${secInfo}`);
|
2018-12-16 07:26:28 +00:00
|
|
|
}
|
|
|
|
|
2019-05-11 06:21:42 +00:00
|
|
|
function twoFactorAuthOTP(user) {
|
2019-05-10 01:56:04 +00:00
|
|
|
if(argv._.length < 4) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
const {
|
|
|
|
OTPTypes,
|
|
|
|
prepareOTP,
|
2019-06-14 01:47:04 +00:00
|
|
|
createBackupCodes,
|
2019-05-10 01:56:04 +00:00
|
|
|
} = require('../../core/user_2fa_otp.js');
|
|
|
|
|
2019-05-25 04:27:50 +00:00
|
|
|
let otpType = argv._[argv._.length - 1];
|
|
|
|
|
|
|
|
// shortcut for removal
|
|
|
|
if('disable' === otpType) {
|
|
|
|
const props = [
|
|
|
|
UserProps.AuthFactor2OTP,
|
|
|
|
UserProps.AuthFactor2OTPSecret,
|
|
|
|
UserProps.AuthFactor2OTPBackupCodes,
|
|
|
|
];
|
|
|
|
return user.removeProperties(props, err => {
|
|
|
|
if(err) {
|
|
|
|
console.error(err.message);
|
|
|
|
} else {
|
|
|
|
console.info(`2FA OTP disabled for ${user.username}`);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-05-10 01:56:04 +00:00
|
|
|
async.waterfall(
|
|
|
|
[
|
|
|
|
function validate(callback) {
|
|
|
|
// :TODO: Prompt for if not supplied
|
2019-05-11 06:21:42 +00:00
|
|
|
// allow aliases for OTP types
|
|
|
|
otpType = {
|
|
|
|
google : OTPTypes.GoogleAuthenticator,
|
|
|
|
hotp : OTPTypes.RFC4266_HOTP,
|
|
|
|
totp : OTPTypes.RFC6238_TOTP,
|
|
|
|
}[otpType] || otpType;
|
2019-05-10 01:56:04 +00:00
|
|
|
otpType = _.find(OTPTypes, t => {
|
2019-05-11 06:21:42 +00:00
|
|
|
return t.toLowerCase() === otpType.toLowerCase();
|
2019-05-10 01:56:04 +00:00
|
|
|
});
|
|
|
|
if(!otpType) {
|
|
|
|
return callback(Errors.Invalid('Invalid OTP type'));
|
|
|
|
}
|
|
|
|
return callback(null, otpType);
|
|
|
|
},
|
|
|
|
function prepare(otpType, callback) {
|
|
|
|
const otpOpts = {
|
|
|
|
username : user.username,
|
|
|
|
qrType : argv['qr-type'] || 'ascii',
|
|
|
|
};
|
|
|
|
prepareOTP(otpType, otpOpts, (err, otpInfo) => {
|
2019-06-14 01:47:04 +00:00
|
|
|
return callback(err, Object.assign(otpInfo, { otpType, backupCodes : createBackupCodes() }));
|
2019-05-10 01:56:04 +00:00
|
|
|
});
|
|
|
|
},
|
|
|
|
function storeOrDisplayQR(otpInfo, callback) {
|
2019-05-11 06:21:42 +00:00
|
|
|
if(!argv.out || !otpInfo.qr) {
|
2019-05-10 01:56:04 +00:00
|
|
|
return callback(null, otpInfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
fs.writeFile(argv.out, otpInfo.qr, 'utf8', err => {
|
|
|
|
return callback(err, otpInfo);
|
|
|
|
});
|
2019-05-10 02:25:47 +00:00
|
|
|
},
|
|
|
|
function persist(otpInfo, callback) {
|
|
|
|
const props = {
|
|
|
|
[ UserProps.AuthFactor2OTP ] : otpInfo.otpType,
|
|
|
|
[ UserProps.AuthFactor2OTPSecret ] : otpInfo.secret,
|
|
|
|
[ UserProps.AuthFactor2OTPBackupCodes ] : JSON.stringify(otpInfo.backupCodes),
|
|
|
|
};
|
|
|
|
user.persistProperties(props, err => {
|
|
|
|
return callback(err, otpInfo);
|
|
|
|
});
|
2019-05-10 01:56:04 +00:00
|
|
|
}
|
|
|
|
],
|
2019-05-10 02:25:47 +00:00
|
|
|
(err, otpInfo) => {
|
2019-05-10 01:56:04 +00:00
|
|
|
if(err) {
|
|
|
|
console.error(err.message);
|
|
|
|
} else {
|
2019-05-11 06:21:42 +00:00
|
|
|
console.info(`OTP enabled for : ${user.username}`);
|
|
|
|
console.info(`Secret : ${otpInfo.secret}`);
|
|
|
|
console.info(`Backup codes : ${otpInfo.backupCodes.join(', ')}`);
|
|
|
|
|
|
|
|
if(otpInfo.qr) {
|
|
|
|
if(!argv.out) {
|
|
|
|
console.info('--- Begin QR ---');
|
|
|
|
console.info(otpInfo.qr);
|
|
|
|
console.info('--- End QR ---');
|
|
|
|
} else {
|
|
|
|
console.info(`QR code saved to ${argv.out}`);
|
|
|
|
}
|
2019-05-10 02:25:47 +00:00
|
|
|
}
|
2019-05-10 01:56:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2020-05-06 03:18:58 +00:00
|
|
|
function listUsers() {
|
|
|
|
// oputil user list [disabled|inactive|active|locked|all]
|
2020-05-31 04:39:27 +00:00
|
|
|
// :TODO: --created-since SPEC and --last-called SPEC
|
|
|
|
// --created-since SPEC
|
|
|
|
// SPEC can be TIMESTAMP or e.g. "-1hour" or "-90days"
|
2020-05-06 03:18:58 +00:00
|
|
|
// :TODO: --sort name|id
|
|
|
|
let listWhat;
|
|
|
|
if (argv._.length > 2) {
|
|
|
|
listWhat = argv._[argv._.length - 1];
|
|
|
|
} else {
|
|
|
|
listWhat = 'all';
|
|
|
|
}
|
|
|
|
|
|
|
|
const User = require('../../core/user');
|
|
|
|
if (![ 'all' ].concat(Object.keys(User.AccountStatus)).includes(listWhat)) {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
async.waterfall(
|
|
|
|
[
|
|
|
|
(callback) => {
|
|
|
|
const UserProps = require('../../core/user_property');
|
|
|
|
|
|
|
|
const userListOpts = {
|
|
|
|
properties : [
|
|
|
|
UserProps.AccountStatus,
|
|
|
|
],
|
|
|
|
};
|
|
|
|
|
|
|
|
User.getUserList(userListOpts, (err, userList) => {
|
|
|
|
if (err) {
|
|
|
|
return callback(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ('all' === listWhat) {
|
|
|
|
return callback(null, userList);
|
|
|
|
}
|
|
|
|
|
|
|
|
const accountStatusFilter = User.AccountStatus[listWhat].toString();
|
|
|
|
|
|
|
|
return callback(null, userList.filter(user => {
|
|
|
|
return user[UserProps.AccountStatus] === accountStatusFilter;
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
},
|
|
|
|
(userList, callback) => {
|
|
|
|
userList.forEach(user => {
|
|
|
|
|
|
|
|
console.info(`${user.userId}: ${user.userName}`);
|
|
|
|
});
|
|
|
|
},
|
|
|
|
],
|
|
|
|
err => {
|
|
|
|
if(err) {
|
|
|
|
return console.error(err.reason ? err.reason : err.message);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2018-05-22 02:36:34 +00:00
|
|
|
function handleUserCommand() {
|
2018-06-22 05:15:04 +00:00
|
|
|
function errUsage() {
|
|
|
|
return printUsageAndSetExitCode(getHelpFor('User'), ExitCodes.ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(true === argv.help) {
|
|
|
|
return errUsage();
|
|
|
|
}
|
|
|
|
|
2019-02-16 18:03:46 +00:00
|
|
|
const action = argv._[1];
|
2020-05-06 03:18:58 +00:00
|
|
|
const userRequired = ![ 'list' ].includes(action);
|
|
|
|
|
|
|
|
let userName;
|
|
|
|
if (userRequired) {
|
|
|
|
const usernameIdx = [
|
|
|
|
'pw', 'pass', 'passwd', 'password',
|
|
|
|
'group',
|
|
|
|
'mv', 'rename',
|
|
|
|
'2fa-otp', 'otp'
|
|
|
|
].includes(action) ? argv._.length - 2 : argv._.length - 1;
|
|
|
|
userName = argv._[usernameIdx];
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!userName && userRequired) {
|
2018-06-22 05:15:04 +00:00
|
|
|
return errUsage();
|
|
|
|
}
|
|
|
|
|
|
|
|
initAndGetUser(userName, (err, user) => {
|
2020-05-06 03:18:58 +00:00
|
|
|
if(userName && err) {
|
2018-06-22 05:15:04 +00:00
|
|
|
process.exitCode = ExitCodes.ERROR;
|
|
|
|
return console.error(err.message);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ({
|
2018-12-16 07:26:28 +00:00
|
|
|
pw : setUserPassword,
|
2018-06-22 05:15:04 +00:00
|
|
|
passwd : setUserPassword,
|
|
|
|
password : setUserPassword,
|
|
|
|
|
|
|
|
rm : removeUser,
|
|
|
|
remove : removeUser,
|
|
|
|
del : removeUser,
|
|
|
|
delete : removeUser,
|
|
|
|
|
2019-02-16 18:03:46 +00:00
|
|
|
mv : renameUser,
|
|
|
|
rename : renameUser,
|
|
|
|
|
2018-11-23 06:07:37 +00:00
|
|
|
activate : setAccountStatus,
|
|
|
|
deactivate : setAccountStatus,
|
|
|
|
disable : setAccountStatus,
|
|
|
|
lock : setAccountStatus,
|
2018-06-22 05:15:04 +00:00
|
|
|
|
|
|
|
group : modUserGroups,
|
2018-12-16 07:26:28 +00:00
|
|
|
|
|
|
|
info : showUserInfo,
|
2019-05-10 01:56:04 +00:00
|
|
|
|
2019-05-11 06:21:42 +00:00
|
|
|
'2fa-otp' : twoFactorAuthOTP,
|
|
|
|
otp : twoFactorAuthOTP,
|
2020-05-06 03:18:58 +00:00
|
|
|
list : listUsers,
|
2018-11-23 06:07:37 +00:00
|
|
|
}[action] || errUsage)(user, action);
|
2018-06-22 05:15:04 +00:00
|
|
|
});
|
2017-02-16 03:27:16 +00:00
|
|
|
}
|