2018-04-12 23:06:18 +02:00
|
|
|
import * as Koa from 'koa';
|
2017-01-18 06:19:50 +01:00
|
|
|
import * as bcrypt from 'bcryptjs';
|
2019-04-07 14:50:36 +02:00
|
|
|
import { generateKeyPair } from 'crypto';
|
2017-08-28 16:47:43 +02:00
|
|
|
import generateUserToken from '../common/generate-native-user-token';
|
2018-04-02 06:15:53 +02:00
|
|
|
import config from '../../../config';
|
2019-04-24 01:11:19 +02:00
|
|
|
import { fetchMeta } from '../../../misc/fetch-meta';
|
2019-02-03 14:21:55 +01:00
|
|
|
import * as recaptcha from 'recaptcha-promise';
|
2019-07-22 03:15:00 +02:00
|
|
|
import { Users, Signins, RegistrationTickets, UsedUsernames } from '../../../models';
|
2019-04-07 14:50:36 +02:00
|
|
|
import { genId } from '../../../misc/gen-id';
|
|
|
|
import { usersChart } from '../../../services/chart';
|
|
|
|
import { User } from '../../../models/entities/user';
|
2019-04-07 20:35:02 +02:00
|
|
|
import { UserKeypair } from '../../../models/entities/user-keypair';
|
2019-04-13 09:54:21 +02:00
|
|
|
import { toPunyNullable } from '../../../misc/convert-host';
|
2019-04-10 08:04:27 +02:00
|
|
|
import { UserProfile } from '../../../models/entities/user-profile';
|
2019-04-11 18:52:25 +02:00
|
|
|
import { getConnection } from 'typeorm';
|
2019-07-22 03:15:00 +02:00
|
|
|
import { UsedUsername } from '../../../models/entities/used-username';
|
2016-12-28 23:49:51 +01:00
|
|
|
|
2019-01-22 13:42:05 +01:00
|
|
|
export default async (ctx: Koa.BaseContext) => {
|
2018-07-23 06:56:25 +02:00
|
|
|
const body = ctx.request.body as any;
|
|
|
|
|
2019-04-24 01:11:19 +02:00
|
|
|
const instance = await fetchMeta(true);
|
2018-11-06 16:08:21 +01:00
|
|
|
|
2016-12-28 23:49:51 +01:00
|
|
|
// Verify recaptcha
|
2017-01-17 00:26:59 +01:00
|
|
|
// ただしテスト時はこの機構は障害となるため無効にする
|
2019-04-12 18:43:22 +02:00
|
|
|
if (process.env.NODE_ENV !== 'test' && instance.enableRecaptcha && instance.recaptchaSecretKey) {
|
2018-11-06 16:08:21 +01:00
|
|
|
recaptcha.init({
|
|
|
|
secret_key: instance.recaptchaSecretKey
|
|
|
|
});
|
|
|
|
|
2018-07-23 06:56:25 +02:00
|
|
|
const success = await recaptcha(body['g-recaptcha-response']);
|
2016-12-28 23:49:51 +01:00
|
|
|
|
2017-01-17 00:26:59 +01:00
|
|
|
if (!success) {
|
2018-04-12 23:06:18 +02:00
|
|
|
ctx.throw(400, 'recaptcha-failed');
|
2017-01-17 00:26:59 +01:00
|
|
|
return;
|
|
|
|
}
|
2016-12-28 23:49:51 +01:00
|
|
|
}
|
|
|
|
|
2018-07-23 06:56:25 +02:00
|
|
|
const username = body['username'];
|
|
|
|
const password = body['password'];
|
2019-04-13 08:18:12 +02:00
|
|
|
const host: string | null = process.env.NODE_ENV === 'test' ? (body['host'] || null) : null;
|
2018-08-17 12:17:23 +02:00
|
|
|
const invitationCode = body['invitationCode'];
|
|
|
|
|
2018-11-05 23:14:43 +01:00
|
|
|
if (instance && instance.disableRegistration) {
|
2018-08-17 12:17:23 +02:00
|
|
|
if (invitationCode == null || typeof invitationCode != 'string') {
|
|
|
|
ctx.status = 400;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-07 14:50:36 +02:00
|
|
|
const ticket = await RegistrationTickets.findOne({
|
2018-08-17 12:17:23 +02:00
|
|
|
code: invitationCode
|
|
|
|
});
|
|
|
|
|
|
|
|
if (ticket == null) {
|
|
|
|
ctx.status = 400;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-07 14:50:36 +02:00
|
|
|
RegistrationTickets.delete(ticket.id);
|
2018-08-17 12:17:23 +02:00
|
|
|
}
|
2016-12-28 23:49:51 +01:00
|
|
|
|
|
|
|
// Validate username
|
2019-06-14 17:07:41 +02:00
|
|
|
if (!Users.validateLocalUsername.ok(username)) {
|
2018-04-12 23:06:18 +02:00
|
|
|
ctx.status = 400;
|
2016-12-28 23:49:51 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-01-17 03:37:11 +01:00
|
|
|
// Validate password
|
2019-06-14 17:07:41 +02:00
|
|
|
if (!Users.validatePassword.ok(password)) {
|
2018-04-12 23:06:18 +02:00
|
|
|
ctx.status = 400;
|
2017-01-17 03:37:11 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-07 14:50:36 +02:00
|
|
|
const usersCount = await Users.count({});
|
2016-12-28 23:49:51 +01:00
|
|
|
|
|
|
|
// Generate hash of password
|
2017-11-08 06:58:48 +01:00
|
|
|
const salt = await bcrypt.genSalt(8);
|
|
|
|
const hash = await bcrypt.hash(password, salt);
|
2016-12-28 23:49:51 +01:00
|
|
|
|
|
|
|
// Generate secret
|
2017-08-28 16:47:43 +02:00
|
|
|
const secret = generateUserToken();
|
2016-12-28 23:49:51 +01:00
|
|
|
|
2019-07-22 03:15:00 +02:00
|
|
|
// Check username duplication
|
2019-04-07 14:50:36 +02:00
|
|
|
if (await Users.findOne({ usernameLower: username.toLowerCase(), host: null })) {
|
|
|
|
ctx.status = 400;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-07-22 03:15:00 +02:00
|
|
|
// Check deleted username duplication
|
|
|
|
if (await UsedUsernames.findOne({ username: username.toLowerCase() })) {
|
|
|
|
ctx.status = 400;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-07 20:35:02 +02:00
|
|
|
const keyPair = await new Promise<string[]>((s, j) =>
|
|
|
|
generateKeyPair('rsa', {
|
|
|
|
modulusLength: 4096,
|
|
|
|
publicKeyEncoding: {
|
|
|
|
type: 'pkcs1',
|
|
|
|
format: 'pem'
|
|
|
|
},
|
|
|
|
privateKeyEncoding: {
|
|
|
|
type: 'pkcs1',
|
|
|
|
format: 'pem',
|
|
|
|
cipher: undefined,
|
|
|
|
passphrase: undefined
|
|
|
|
}
|
2019-04-12 21:00:02 +02:00
|
|
|
} as any, (e, publicKey, privateKey) =>
|
2019-04-07 20:35:02 +02:00
|
|
|
e ? j(e) : s([publicKey, privateKey])
|
|
|
|
));
|
|
|
|
|
2019-04-12 18:43:22 +02:00
|
|
|
let account!: User;
|
2019-04-11 18:52:25 +02:00
|
|
|
|
|
|
|
// Start transaction
|
|
|
|
await getConnection().transaction(async transactionalEntityManager => {
|
2019-07-09 20:47:07 +02:00
|
|
|
const exist = await transactionalEntityManager.findOne(User, {
|
|
|
|
usernameLower: username.toLowerCase(),
|
|
|
|
host: null
|
|
|
|
});
|
|
|
|
|
|
|
|
if (exist) throw 'already registered';
|
|
|
|
|
2019-04-11 18:52:25 +02:00
|
|
|
account = await transactionalEntityManager.save(new User({
|
|
|
|
id: genId(),
|
|
|
|
createdAt: new Date(),
|
|
|
|
username: username,
|
|
|
|
usernameLower: username.toLowerCase(),
|
2019-04-13 09:54:21 +02:00
|
|
|
host: toPunyNullable(host),
|
2019-04-11 18:52:25 +02:00
|
|
|
token: secret,
|
|
|
|
isAdmin: config.autoAdmin && usersCount === 0,
|
|
|
|
}));
|
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UserKeypair({
|
|
|
|
publicKey: keyPair[0],
|
|
|
|
privateKey: keyPair[1],
|
|
|
|
userId: account.id
|
|
|
|
}));
|
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UserProfile({
|
|
|
|
userId: account.id,
|
|
|
|
autoAcceptFollowed: true,
|
|
|
|
autoWatch: false,
|
|
|
|
password: hash,
|
|
|
|
}));
|
2019-07-22 03:15:00 +02:00
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UsedUsername({
|
|
|
|
username: username.toLowerCase(),
|
|
|
|
}));
|
2019-04-11 18:52:25 +02:00
|
|
|
});
|
2018-06-16 03:40:53 +02:00
|
|
|
|
2018-10-22 22:36:35 +02:00
|
|
|
usersChart.update(account, true);
|
2018-08-18 22:26:34 +02:00
|
|
|
|
2019-07-17 17:00:03 +02:00
|
|
|
// Append signin history
|
|
|
|
await Signins.save({
|
|
|
|
id: genId(),
|
|
|
|
createdAt: new Date(),
|
|
|
|
userId: account.id,
|
|
|
|
ip: ctx.ip,
|
|
|
|
headers: ctx.headers,
|
|
|
|
success: true
|
|
|
|
});
|
|
|
|
|
2019-04-07 14:50:36 +02:00
|
|
|
const res = await Users.pack(account, account, {
|
2018-10-16 01:54:36 +02:00
|
|
|
detail: true,
|
|
|
|
includeSecrets: true
|
|
|
|
});
|
|
|
|
|
2019-04-23 15:35:26 +02:00
|
|
|
(res as any).token = secret;
|
2018-10-16 01:54:36 +02:00
|
|
|
|
|
|
|
ctx.body = res;
|
2016-12-28 23:49:51 +01:00
|
|
|
};
|