mirror of
https://github.com/TryGhost/Ghost.git
synced 2025-02-10 23:36:14 -05:00
- Fixed session invalidation for "locked" user - Currently Ghost API was returning 404 for users having status set to "locked". This lead the user to be stuck in Ghost-Admin with "Rousource Not Found" error message. - By returning 401 for non-"active" users it allows for the Ghost-Admin to redirect the user to "signin" screen where they would be instructed to reset their password - Fixed error message returned by session API - Instead of returning generic 'access' denied message when error happens during `User.check` we want to return more specific error thrown inside of the method, e.g.: 'accountLocked' or 'accountSuspended' - Fixed messaging for 'accountLocked' i18n, which not corresponds to the actual UI available to the end user - Added automatic password reset email to locked users on sign-in - uses alternative email for required password reset so it's clear that this is a security related reset and not a user-requested reset - Backported the auto sending of required password reset email to v2 sign-in route - used by 3rd party clients where the email is necessary for users to know why login is failing Co-authored-by: Kevin Ansfield <kevin@lookingsideways.co.uk>
190 lines
6.2 KiB
JavaScript
190 lines
6.2 KiB
JavaScript
const api = require('./index');
|
|
const config = require('../../config');
|
|
const common = require('../../lib/common');
|
|
const web = require('../../web');
|
|
const models = require('../../models');
|
|
const auth = require('../../services/auth');
|
|
const invitations = require('../../services/invitations');
|
|
|
|
module.exports = {
|
|
docName: 'authentication',
|
|
|
|
setup: {
|
|
statusCode: 201,
|
|
permissions: false,
|
|
validation: {
|
|
docName: 'setup'
|
|
},
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(false)();
|
|
})
|
|
.then(() => {
|
|
const setupDetails = {
|
|
name: frame.data.setup[0].name,
|
|
email: frame.data.setup[0].email,
|
|
password: frame.data.setup[0].password,
|
|
blogTitle: frame.data.setup[0].blogTitle,
|
|
status: 'active'
|
|
};
|
|
|
|
return auth.setup.setupUser(setupDetails);
|
|
})
|
|
.then((data) => {
|
|
return auth.setup.doSettings(data, api.settings);
|
|
})
|
|
.then((user) => {
|
|
return auth.setup.sendWelcomeEmail(user.get('email'), api.mail)
|
|
.then(() => user);
|
|
});
|
|
}
|
|
},
|
|
|
|
updateSetup: {
|
|
permissions: (frame) => {
|
|
return models.User.findOne({role: 'Owner', status: 'all'})
|
|
.then((owner) => {
|
|
if (owner.id !== frame.options.context.user) {
|
|
throw new common.errors.NoPermissionError({message: common.i18n.t('errors.api.authentication.notTheBlogOwner')});
|
|
}
|
|
});
|
|
},
|
|
validation: {
|
|
docName: 'setup'
|
|
},
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(true)();
|
|
})
|
|
.then(() => {
|
|
const setupDetails = {
|
|
name: frame.data.setup[0].name,
|
|
email: frame.data.setup[0].email,
|
|
password: frame.data.setup[0].password,
|
|
blogTitle: frame.data.setup[0].blogTitle,
|
|
status: 'active'
|
|
};
|
|
|
|
return auth.setup.setupUser(setupDetails);
|
|
})
|
|
.then((data) => {
|
|
return auth.setup.doSettings(data, api.settings);
|
|
});
|
|
}
|
|
},
|
|
|
|
isSetup: {
|
|
permissions: false,
|
|
query() {
|
|
return auth.setup.checkIsSetup()
|
|
.then((isSetup) => {
|
|
return {
|
|
status: isSetup,
|
|
// Pre-populate from config if, and only if the values exist in config.
|
|
title: config.title || undefined,
|
|
name: config.user_name || undefined,
|
|
email: config.user_email || undefined
|
|
};
|
|
});
|
|
}
|
|
},
|
|
|
|
generateResetToken: {
|
|
validation: {
|
|
docName: 'passwordreset'
|
|
},
|
|
permissions: true,
|
|
options: [
|
|
'email'
|
|
],
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(true)();
|
|
})
|
|
.then(() => {
|
|
return auth.passwordreset.generateToken(frame.data.passwordreset[0].email, api.settings);
|
|
})
|
|
.then((token) => {
|
|
if (frame.data.required) {
|
|
return auth.passwordreset.sendRequiredResetNotification(token, api.mail);
|
|
} else {
|
|
return auth.passwordreset.sendResetNotification(token, api.mail);
|
|
}
|
|
});
|
|
}
|
|
},
|
|
|
|
resetPassword: {
|
|
validation: {
|
|
docName: 'passwordreset',
|
|
data: {
|
|
newPassword: {required: true},
|
|
ne2Password: {required: true}
|
|
}
|
|
},
|
|
permissions: false,
|
|
options: [
|
|
'ip'
|
|
],
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(true)();
|
|
})
|
|
.then(() => {
|
|
return auth.passwordreset.extractTokenParts(frame);
|
|
})
|
|
.then((params) => {
|
|
return auth.passwordreset.protectBruteForce(params);
|
|
})
|
|
.then(({options, tokenParts}) => {
|
|
options = Object.assign(options, {context: {internal: true}});
|
|
return auth.passwordreset.doReset(options, tokenParts, api.settings)
|
|
.then((params) => {
|
|
web.shared.middlewares.api.spamPrevention.userLogin().reset(frame.options.ip, `${tokenParts.email}login`);
|
|
return params;
|
|
});
|
|
});
|
|
}
|
|
},
|
|
|
|
acceptInvitation: {
|
|
validation: {
|
|
docName: 'invitations'
|
|
},
|
|
permissions: false,
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(true)();
|
|
})
|
|
.then(() => {
|
|
return invitations.accept(frame.data);
|
|
});
|
|
}
|
|
},
|
|
|
|
isInvitation: {
|
|
data: [
|
|
'email'
|
|
],
|
|
validation: {
|
|
docName: 'invitations'
|
|
},
|
|
permissions: false,
|
|
query(frame) {
|
|
return Promise.resolve()
|
|
.then(() => {
|
|
return auth.setup.assertSetupCompleted(true)();
|
|
})
|
|
.then(() => {
|
|
const email = frame.data.email;
|
|
|
|
return models.Invite.findOne({email: email, status: 'sent'}, frame.options);
|
|
});
|
|
}
|
|
}
|
|
};
|