-
-
Notifications
You must be signed in to change notification settings - Fork 4
Expand file tree
/
Copy pathDriver.imba
More file actions
471 lines (343 loc) · 13.9 KB
/
Driver.imba
File metadata and controls
471 lines (343 loc) · 13.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
import { Mail } from '@formidablejs/mailer'
import Database from '../../Database/Database'
import DatabaseConfig from '../../Database/Config'
import EmailNotVerifiedException from '../Exceptions/EmailNotVerifiedException'
import EmailVerifiedException from '../Exceptions/EmailVerifiedException'
import Hash from '../../Hashing/Hash'
import isEmpty from '../../Support/Helpers/isEmpty'
import isFunction from '../../Support/Helpers/isFunction'
import now from '../../Support/Helpers/now'
import PersonalAccessToken from '../Tokens/PersonalAccessToken'
import strRandom from '../../Support/Helpers/strRandom'
import URL from '../../Http/URL/URL'
import ValidationException from '../../Validator/Exceptions/ValidationException'
import type { FastifyReply } from 'fastify'
import type { MailHandle, Mailable } from '@formidablejs/mailer'
import type Repository from '../../Config/Repository'
import type Request from '../../Http/Request/Request'
const events = {
onRegistered: null
onAuthenticated: null
onSessionDestroyed: null
onSuccessfulAttempt: null
onCreateUser: null
onEmailVerified: null
onRequestEmailVerificationUrl: null
onRequestForgotPasswordUrl: null
onUpdatePassword: null
onVerificationMailerEvents: null
onResetMailerEvents: null
}
const mailers = {
verificationEmail: null
resetPasswordMailer: null
}
export default class Driver
def constructor protocol\string, request\Request, reply\FastifyReply, params\any[]|null, config\Repository
this.protocol = protocol
this.request = request
this.reply = reply
this.params = params
this.config = config
def attempt name\string, user\object, ttl\number|null = null, abilities = ['*']
const token = await self.createPersonalAccessToken(name, user.id, ttl, abilities)
self.request.request.session.personal_access_token = token
await self.getPersonalAccessToken(token)
def getPersonalAccessToken token\string = null
await PersonalAccessToken.find(!isEmpty(token) ? token : self.request.bearerToken!, self.protocol)
def usingPersonalAccessToken token\object
await PersonalAccessToken.using(token)
def verify
null
def authenticate body\object
null
def register body\object
null
def afterRegistered user\object
if isFunction(events.onRegistered)
events.onRegistered(self.request, self.reply, user, self.protocol, self.params)
def afterAuthenticated user\object
if isFunction(events.onAuthenticated)
events.onAuthenticated(self.request, self.reply, user, self.protocol, self.params)
def afterSessionDestroyed
if isFunction(events.onSessionDestroyed)
events.onSessionDestroyed(self.request, self.reply, self.protocol, self.params)
def afterEmailVerified verified\boolean
if isFunction(events.onEmailVerified)
events.onEmailVerified(self.request, self.reply, verified, self.protocol, self.params)
def afterRequestEmailVerificationUrl
if isFunction(events.onRequestEmailVerificationUrl)
events.onRequestEmailVerificationUrl(self.request, self.reply, self.protocol, self.params)
def afterRequestForgotPasswordUrl
if isFunction(events.onRequestForgotPasswordUrl)
events.onRequestForgotPasswordUrl(self.request, self.reply, self.protocol, self.params)
def afterUpdatePassword
if isFunction(events.onUpdatePassword)
events.onUpdatePassword(self.request, self.reply, self.protocol, self.params)
def onSuccessfulAuthAttemptEvent
events.onSuccessfulAttempt
def getVerificationMailer
mailers.verificationEmail
def getVerificationMailerEvents
events.onVerificationMailerEvents
def sendVerificationEmail user\object
if self.getVerificationMailer!
self.request.verificationUrl = await self.verificationUrl(user)
const events = self.getVerificationMailerEvents!
Mail.to(user.email).send(new (self.getVerificationMailer!)(self.request, user), {
onSuccess: do(response)
events.onSuccess(response, user, self.request) if events && events.onSuccess
onError: do(reason)
if events && events.onError
events.onError(reason, user, self.request)
else
throw reason
onComplete: do
events.onComplete(user, self.request) if events && events.onComplete
})
def getResetPasswordMailer
mailers.resetPasswordMailer
def getResetMailerEvents
events.onResetMailerEvents
def sendResetPasswordEmail user\object, token\string
if self.getResetPasswordMailer!
self.request.passwordResetUrl = await self.passwordResetUrl(user, token)
const events = self.getResetMailerEvents!
Mail.to(user.email).send(new (self.getResetPasswordMailer!)(self.request, user), {
onSuccess: do(response)
events.onSuccess(response, user, self.request) if events && events.onSuccess
onError: do(reason)
if events && events.onError
events.onError(reason, user, self.request)
else
throw reason
onComplete: do
events.onComplete(user, self.request) if events && events.onComplete
})
def verifyEmail
const email = self.request.query 'email'
if !email then throw new Error('Email is required.')
const response = await Database.table(self.getProvider.table)
.where('email', email)
.whereNull('email_verified_at')
.update('email_verified_at', now!)
if response == null || response == undefined || response == 0
const results = await self.afterEmailVerified(false)
throw new EmailNotVerifiedException 'Could not verify email.' if isEmpty(results)
return results
const results = await self.afterEmailVerified(true)
return isEmpty(results) ? { status: 'success' } : results
def requestEmailVerificationUrl body\object = new Object
const user = await self.findUser body
if user
if user.email_verified_at
throw new EmailVerifiedException 'Email is already verified.'
self.sendVerificationEmail user
const results = await self.afterRequestEmailVerificationUrl!
# we will always return success even if the email was not sent
# to prevent attackers from knowing if the email was sent or not.
return isEmpty(results) ? { status: 'success' } : results
def requestForgotPasswordUrl body\object = new Object
const user = await self.findUser body
if user && !user.email_verified_at
throw new EmailNotVerifiedException 'Email is not verified.'
if user
await Database.table('password_resets')
.where('email', user.email)
.delete!
const token = strRandom 60
const results = await Database.table('password_resets')
.insert({
email: user.email
token: token
})
if !results
throw new Error 'Could not create password reset token.'
self.sendResetPasswordEmail user, token
const results = await self.afterRequestForgotPasswordUrl!
return isEmpty(results) ? { status: 'success' } : results
def updatePassword body\object = new Object
# get email and token from url.
const email = self.request.query 'email'
const token = self.request.query 'token'
# get token request/record from database.
const tokenRequest = await Database.table('password_resets')
.join(self.getProvider.table, 'password_resets.email', '=', "{self.getProvider.table}.email")
.where('password_resets.token', token)
.where('password_resets.email', email)
.select(
'users.id',
'users.password',
)
.first!
# if token request is not found, return error.
if !tokenRequest
throw new Error 'Invalid password reset token.'
# if token request is found, compare new password with old password
# and return error if they are the same.
if await Hash.check(body.password, tokenRequest.password)
throw ValidationException.withMessages({
password: [
'Password cannot be the same as the old one.'
]
})
# if new password is different from old password, update password.
const updatedPassword = await Database.table(self.getProvider.table)
.where('id', tokenRequest.id)
.update({
password: await Hash.make(body.password)
})
# if password is not updated, return error.
if !updatedPassword
throw new Error 'Could not update password.'
# if password is updated, delete token request.
await Database.table('password_resets')
.where('email', email)
.delete!
const results = await self.afterUpdatePassword!
return isEmpty(results) ? { status: 'success' } : results
def logout body\object = new Object
self
def destroy token\string = null, body\object = new Object
await PersonalAccessToken.destroy(!isEmpty(token) ? token : self.request.bearerToken!)
def createPersonalAccessToken name\string, id\number, ttl\number|null = null, abilities = ['*']
await PersonalAccessToken.create(name, id, self.getProvider.table, isEmpty(abilities) ? ['*'] : abilities, ttl, {
protocol: self.protocol
ip_address: self.request.ip! || null
user_agent: self.request.header('user-agent', null)
})
get getProvider
const protocol = self.config.get("auth.protocols.{self.protocol}")
self.config.get("auth.providers.{protocol.provider}")
def insertUser body\object
const isValid = await self.validateUser(body)
if isValid !== true
let errors = {}
for field in isValid
errors[field] = [
"The {field} is invalid or has already taken."
]
throw ValidationException.withMessages(errors)
await this.createUser(body)
def validateUser body\object
const dbTable = self.getProvider.table
const dbIdentifier = self.getProvider.identifier || 'email'
if !['email', 'username', 'username-email'].includes(dbIdentifier)
throw new Error "\"{dbIdentifier}\" is not a valid identifier"
if dbIdentifier == 'email'
const results = await Database.table(dbTable)
.whereRaw('LOWER(email) = LOWER(?)', [body.email])
.count!
return ['email'] if results[0]['count(*)'] > 0 || results[0]['count'] > 0
else
const [ emailResults, usernameResults ] = await Promise.all([
Database.table(dbTable).whereRaw('LOWER(email) = LOWER(?)', [body.email]).count!,
Database.table(dbTable).whereRaw('LOWER(username) = LOWER(?)', [body.username]).count!
])
let fields = []
if emailResults[0]['count(*)'] > 0 || emailResults[0]['count'] > 0
fields.push('email')
elif usernameResults[0]['count(*)'] > 0 || usernameResults[0]['count'] > 0
fields.push('username')
return fields if fields.length > 0
return true
def createUser body\object
if events.onCreateUser !== null
return events.onCreateUser(
self.request,
body,
self.getProvider.table
)
const db = self.config.get('database')
let payload = {
name: body.name,
email: body.email,
password: await Hash.make(body.password)
}
if self.getProvider.identifier || 'email' !== 'email'
payload['username'] = body.username
Database.table(self.getProvider.table)
.insert(payload, db.connections[db.default].driver == 'pg' ? ['id'] : null)
.then do([ user\object|Number ])
user = (typeof user === 'object' && user.hasOwnProperty('id')) ? user.id : user
return await Database.table(self.getProvider.table)
.where('id', user)
.first!
def findUser body\object
return await Database.table(self.getProvider.table)
.whereRaw('LOWER(email) = LOWER(?)', [body.email])
.first!
def verificationUrl user\object
const clientUrl = self.config.get('app.client_url', self.config.get('app.url'))
const signature = await URL.temporarySignedRoute('email.verify','2h', {
email: user.email
})
clientUrl + signature
def passwordResetUrl user\object, token\string
const clientUrl = self.config.get('app.client_url', self.config.get('app.url'))
const signature = await URL.temporarySignedRoute('password.reset', '15m', {
email: user.email,
token: token
})
clientUrl + signature
static def onEmailVerified handler\function
if events.onEmailVerified !== null
throw new Error 'onEmailVerified handler is already set.'
return
events.onEmailVerified = handler
static def onCreateUser handler\function
if events.onCreateUser !== null
throw new Error 'onCreateUser handler is already set.'
return
events.onCreateUser = handler
static def onRegistered handler\function
if events.onRegistered !== null
throw new Error 'onRegistered handler is already set.'
return
events.onRegistered = handler
static def onAuthenticated handler\function
if events.onAuthenticated !== null
throw new Error 'onAuthenticated handler is already set.'
return
events.onAuthenticated = handler
static def onSessionDestroyed handler\function
if events.onSessionDestroyed !== null
throw new Error 'onSessionDestroyed handler is already set.'
return
events.onSessionDestroyed = handler
static def onSuccessfulAttempt handler\function
if events.onSuccessfulAttempt !== null
throw new Error 'onSuccessfulAttempt handler is already set.'
return
events.onSuccessfulAttempt = handler
static def onRequestEmailVerificationUrl handler\function
if events.onRequestEmailVerificationUrl !== null
throw new Error 'onRequestEmailVerificationUrl handler is already set.'
return
events.onRequestEmailVerificationUrl = handler
static def onRequestForgotPasswordUrl handler\function
if events.onRequestForgotPasswordUrl !== null
throw new Error 'onRequestForgotPasswordUrl handler is already set.'
return
events.onRequestForgotPasswordUrl = handler
static def onUpdatePassword handler\function
if events.onUpdatePassword !== null
throw new Error 'onUpdatePassword handler is already set.'
return
events.onUpdatePassword = handler
static def verificationMailer mailer\Mailable
if mailers.verificationEmail
throw new Error 'Verification mailer already set'
mailers.verificationEmail = mailer
static def resetPasswordMailer mailer\Mailable
if mailers.resetPasswordMailer
throw new Error 'Reset password mailer already set'
mailers.resetPasswordMailer = mailer
static def verificationMailerEvents mailEvents\MailHandle
if events.onVerificationMailerEvents
throw new Error 'Verification Mailer events already set'
events.onVerificationMailerEvents = mailEvents
static def resetMailerEvents mailEvents\MailHandle
if events.onResetMailerEvents
throw new Error 'Reset Mailer events already set'
events.onResetMailerEvents = mailEvents