All files helpers.js

97.7% Statements 85/87
92.86% Branches 52/56
100% Functions 25/25
97.44% Lines 76/78
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172        1x 1x 1x 1x 1x   1x 72x           72x         72x 72x     32x 32x 32x 8x     24x       139x 139x     1x 111x 111x     122x   1x 122x 108x     14x   14x   14x 1x     14x       1x 216x 32x       184x 184x   184x         184x 12x       172x     8x       164x 12x       152x 8x       144x 8x       136x     1x 236x 256x 236x 24x           232x 232x             1x 152x   152x 152x 152x 152x 152x 152x 152x 152x   152x     1x 152x 152x 152x     1x 152x   152x 152x   152x       1x     3x 3x                    
 
/* eslint-env node */
/* eslint no-param-reassign: 0 */
 
const bcrypt = require('bcryptjs');
const crypto = require('crypto');
const auth = require('feathers-authentication').hooks;
const errors = require('feathers-errors');
const debug = require('debug')('authManagement:helpers');
 
const hashPassword = (app1, password) => {
  const hook = {
    type: 'before',
    data: { password },
    params: { provider: null },
    app: {
      get (str) {
        return app1.get(str);
      }
    }
  };
 
  return auth.hashPassword()(hook)
    .then(hook1 => hook1.data.password);
};
 
const comparePasswords = (oldPassword, password, getError) => new Promise((resolve, reject) => {
  bcrypt.compare(oldPassword, password, (err, data1) => {
    if (err || !data1) {
      return reject(getError());
    }
 
    return resolve();
  });
});
 
const randomBytes = len => new Promise((resolve, reject) => {
  crypto.randomBytes(len, (err, buf) => (err ? reject(err) : resolve(buf.toString('hex'))));
});
 
const randomDigits = len => {
  const str = Math.random().toString() + Array(len + 1).join('0');
  return str.substr(2, len);
};
 
const getLongToken = len => randomBytes(len);
 
const getShortToken = (len, ifDigits) => {
  if (ifDigits) {
    return Promise.resolve(randomDigits(len));
  }
 
  return randomBytes(Math.floor(len / 2) + 1)
    .then(str => {
      str = str.substr(0, len);
 
      if (str.match(/^[0-9]+$/)) { // tests will fail on all digits
        str = `q${str.substr(1)}`; // shhhh, secret.
      }
 
      return str;
    });
};
 
const getUserData = (data, checks) => {
  if (Array.isArray(data) ? data.length === 0 : data.total === 0) {
    throw new errors.BadRequest('User not found.',
      { errors: { $className: 'badParams' } });
  }
 
  const users = Array.isArray(data) ? data : data.data;
  const user = users[0];
 
  Iif (users.length !== 1) {
    throw new errors.BadRequest('More than 1 user selected.',
      { errors: { $className: 'badParams' } });
  }
 
  if (checks.includes('isNotVerified') && user.isVerified) {
    throw new errors.BadRequest('User is already verified.',
      { errors: { $className: 'isNotVerified' } });
  }
 
  if (checks.includes('isNotVerifiedOrHasVerifyChanges') &&
    user.isVerified && !Object.keys(user.verifyChanges || {}).length
  ) {
    throw new errors.BadRequest('User is already verified & not awaiting changes.',
      { errors: { $className: 'nothingToVerify' } });
  }
 
  if (checks.includes('isVerified') && !user.isVerified) {
    throw new errors.BadRequest('User is not verified.',
      { errors: { $className: 'isVerified' } });
  }
 
  if (checks.includes('verifyNotExpired') && user.verifyExpires < Date.now()) {
    throw new errors.BadRequest('Verification token has expired.',
      { errors: { $className: 'verifyExpired' } });
  }
 
  if (checks.includes('resetNotExpired') && user.resetExpires < Date.now()) {
    throw new errors.BadRequest('Password reset token has expired.',
      { errors: { $className: 'resetExpired' } });
  }
 
  return user;
};
 
const ensureObjPropsValid = (obj, props, allowNone) => {
  const keys = Object.keys(obj);
  const valid = keys.every(key => props.includes(key) && typeof obj[key] === 'string');
  if (!valid || (keys.length === 0 && !allowNone)) {
    throw new errors.BadRequest('User info is not valid. (authManagement)',
      { errors: { $className: 'badParams' } }
    );
  }
};
 
const ensureValuesAreStrings = (...rest) => {
  Iif (!rest.every(str => typeof str === 'string')) {
    throw new errors.BadRequest('Expected string value. (authManagement)',
      { errors: { $className: 'badParams' } }
    );
  }
};
 
const sanitizeUserForClient = user => {
  const user1 = Object.assign({}, user);
 
  delete user1.password;
  delete user1.verifyExpires;
  delete user1.verifyToken;
  delete user1.verifyShortToken;
  delete user1.verifyChanges;
  delete user1.resetExpires;
  delete user1.resetToken;
  delete user1.resetShortToken;
 
  return user1;
};
 
const sanitizeUserForNotifier = user => {
  const user1 = Object.assign({}, user);
  delete user1.password;
  return user1;
};
 
const notifier = (optionsNotifier, type, user, notifierOptions) => {
  debug('notifier', type);
 
  return Promise.resolve().then(() => {
    const promise = optionsNotifier(type, sanitizeUserForNotifier(user), notifierOptions || {});
 
    return promise && typeof promise.then === 'function' ? promise.then(() => user) : user;
  });
};
 
module.exports = {
  hashPassword,
  comparePasswords,
  randomBytes: (...args) => randomBytes(...args), // for testing, make safe from hacking
  randomDigits: (...args) => randomDigits(...args), // for testing, make safe from hacking
  getLongToken,
  getShortToken,
  getUserData,
  ensureObjPropsValid,
  ensureValuesAreStrings,
  sanitizeUserForClient,
  sanitizeUserForNotifier,
  notifier
};