mirror of
https://github.com/plankanban/planka.git
synced 2025-12-20 01:14:12 +03:00
124 lines
3.0 KiB
JavaScript
124 lines
3.0 KiB
JavaScript
/*!
|
|
* Copyright (c) 2024 PLANKA Software GmbH
|
|
* Licensed under the Fair Use License: https://github.com/plankanban/planka/blob/master/LICENSE.md
|
|
*/
|
|
|
|
const { AccessTokenSteps } = require('../../../constants');
|
|
|
|
const Errors = {
|
|
ADMIN_LOGIN_REQUIRED_TO_INITIALIZE_INSTANCE: {
|
|
adminLoginRequiredToInitializeInstance: 'Admin login required to initialize instance',
|
|
},
|
|
};
|
|
|
|
const PENDING_TOKEN_EXPIRES_IN = 10 * 60;
|
|
|
|
module.exports = {
|
|
inputs: {
|
|
user: {
|
|
type: 'ref',
|
|
required: true,
|
|
},
|
|
request: {
|
|
type: 'ref',
|
|
required: true,
|
|
},
|
|
response: {
|
|
type: 'ref',
|
|
required: true,
|
|
},
|
|
remoteAddress: {
|
|
type: 'string',
|
|
required: true,
|
|
},
|
|
withHttpOnlyToken: {
|
|
type: 'boolean',
|
|
},
|
|
},
|
|
|
|
exits: {
|
|
adminLoginRequiredToInitializeInstance: {},
|
|
termsAcceptanceRequired: {},
|
|
},
|
|
|
|
async fn(inputs) {
|
|
const config = await Config.qm.getOneMain();
|
|
|
|
if (!config.isInitialized) {
|
|
if (inputs.user.role === User.Roles.ADMIN) {
|
|
if (inputs.user.termsSignature) {
|
|
await Config.qm.updateOneMain({
|
|
isInitialized: true,
|
|
});
|
|
}
|
|
} else {
|
|
throw Errors.ADMIN_LOGIN_REQUIRED_TO_INITIALIZE_INSTANCE;
|
|
}
|
|
}
|
|
|
|
if (!sails.hooks.terms.hasSignature(inputs.user.termsSignature)) {
|
|
const { token: pendingToken, payload: pendingTokenPayload } =
|
|
sails.helpers.utils.createJwtToken(
|
|
AccessTokenSteps.ACCEPT_TERMS,
|
|
undefined,
|
|
PENDING_TOKEN_EXPIRES_IN,
|
|
);
|
|
|
|
const session = await sails.helpers.sessions.createOne.with({
|
|
values: {
|
|
pendingToken,
|
|
userId: inputs.user.id,
|
|
remoteAddress: inputs.remoteAddress,
|
|
userAgent: inputs.request.headers['user-agent'],
|
|
},
|
|
withHttpOnlyToken: inputs.withHttpOnlyToken,
|
|
});
|
|
|
|
if (session.httpOnlyToken && !inputs.request.isSocket) {
|
|
sails.helpers.utils.setHttpOnlyTokenCookie(
|
|
session.httpOnlyToken,
|
|
pendingTokenPayload,
|
|
inputs.response,
|
|
);
|
|
}
|
|
|
|
const termsType = sails.hooks.terms.getTypeByUserRole(inputs.user.role);
|
|
|
|
throw {
|
|
termsAcceptanceRequired: {
|
|
pendingToken,
|
|
termsType,
|
|
message: 'Terms acceptance required',
|
|
step: AccessTokenSteps.ACCEPT_TERMS,
|
|
},
|
|
};
|
|
}
|
|
|
|
const { token: accessToken, payload: accessTokenPayload } = sails.helpers.utils.createJwtToken(
|
|
inputs.user.id,
|
|
);
|
|
|
|
const session = await sails.helpers.sessions.createOne.with({
|
|
values: {
|
|
accessToken,
|
|
userId: inputs.user.id,
|
|
remoteAddress: inputs.remoteAddress,
|
|
userAgent: inputs.request.headers['user-agent'],
|
|
},
|
|
withHttpOnlyToken: inputs.withHttpOnlyToken,
|
|
});
|
|
|
|
if (session.httpOnlyToken && !inputs.request.isSocket) {
|
|
sails.helpers.utils.setHttpOnlyTokenCookie(
|
|
session.httpOnlyToken,
|
|
accessTokenPayload,
|
|
inputs.response,
|
|
);
|
|
}
|
|
|
|
return {
|
|
item: accessToken,
|
|
};
|
|
},
|
|
};
|