2022-09-17 20:27:08 +02:00
|
|
|
import { generateKeyPair } from 'node:crypto';
|
|
|
|
import { Inject, Injectable } from '@nestjs/common';
|
|
|
|
import bcrypt from 'bcryptjs';
|
|
|
|
import { DataSource, IsNull } from 'typeorm';
|
|
|
|
import { DI } from '@/di-symbols.js';
|
2022-09-24 00:12:11 +02:00
|
|
|
import type { UsedUsernamesRepository, UsersRepository } from '@/models/index.js';
|
2022-09-20 22:33:11 +02:00
|
|
|
import type { Config } from '@/config.js';
|
2022-09-17 20:27:08 +02:00
|
|
|
import { User } from '@/models/entities/User.js';
|
|
|
|
import { UserProfile } from '@/models/entities/UserProfile.js';
|
|
|
|
import { IdService } from '@/core/IdService.js';
|
|
|
|
import { UserKeypair } from '@/models/entities/UserKeypair.js';
|
|
|
|
import { UsedUsername } from '@/models/entities/UsedUsername.js';
|
|
|
|
import generateUserToken from '@/misc/generate-native-user-token.js';
|
2022-12-04 02:16:03 +01:00
|
|
|
import { UserEntityService } from '@/core/entities/UserEntityService.js';
|
2022-12-04 07:03:09 +01:00
|
|
|
import { bindThis } from '@/decorators.js';
|
2023-04-29 10:03:14 +02:00
|
|
|
import UsersChart from '@/core/chart/charts/users.js';
|
|
|
|
import { UtilityService } from '@/core/UtilityService.js';
|
|
|
|
import { MetaService } from '@/core/MetaService.js';
|
2022-09-17 20:27:08 +02:00
|
|
|
|
|
|
|
@Injectable()
|
|
|
|
export class SignupService {
|
|
|
|
constructor(
|
|
|
|
@Inject(DI.db)
|
|
|
|
private db: DataSource,
|
|
|
|
|
|
|
|
@Inject(DI.config)
|
|
|
|
private config: Config,
|
|
|
|
|
|
|
|
@Inject(DI.usersRepository)
|
|
|
|
private usersRepository: UsersRepository,
|
|
|
|
|
|
|
|
@Inject(DI.usedUsernamesRepository)
|
|
|
|
private usedUsernamesRepository: UsedUsernamesRepository,
|
|
|
|
|
|
|
|
private utilityService: UtilityService,
|
|
|
|
private userEntityService: UserEntityService,
|
|
|
|
private idService: IdService,
|
2023-04-29 10:03:14 +02:00
|
|
|
private metaService: MetaService,
|
2022-09-17 20:27:08 +02:00
|
|
|
private usersChart: UsersChart,
|
|
|
|
) {
|
|
|
|
}
|
|
|
|
|
2022-12-04 07:03:09 +01:00
|
|
|
@bindThis
|
2022-09-17 20:27:08 +02:00
|
|
|
public async signup(opts: {
|
|
|
|
username: User['username'];
|
|
|
|
password?: string | null;
|
|
|
|
passwordHash?: UserProfile['password'] | null;
|
|
|
|
host?: string | null;
|
2023-04-29 10:03:14 +02:00
|
|
|
ignorePreservedUsernames?: boolean;
|
2022-09-17 20:27:08 +02:00
|
|
|
}) {
|
|
|
|
const { username, password, passwordHash, host } = opts;
|
|
|
|
let hash = passwordHash;
|
|
|
|
|
|
|
|
// Validate username
|
|
|
|
if (!this.userEntityService.validateLocalUsername(username)) {
|
|
|
|
throw new Error('INVALID_USERNAME');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (password != null && passwordHash == null) {
|
|
|
|
// Validate password
|
|
|
|
if (!this.userEntityService.validatePassword(password)) {
|
|
|
|
throw new Error('INVALID_PASSWORD');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate hash of password
|
|
|
|
const salt = await bcrypt.genSalt(8);
|
|
|
|
hash = await bcrypt.hash(password, salt);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate secret
|
|
|
|
const secret = generateUserToken();
|
|
|
|
|
|
|
|
// Check username duplication
|
|
|
|
if (await this.usersRepository.findOneBy({ usernameLower: username.toLowerCase(), host: IsNull() })) {
|
|
|
|
throw new Error('DUPLICATED_USERNAME');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check deleted username duplication
|
|
|
|
if (await this.usedUsernamesRepository.findOneBy({ username: username.toLowerCase() })) {
|
|
|
|
throw new Error('USED_USERNAME');
|
|
|
|
}
|
2023-04-29 10:03:14 +02:00
|
|
|
|
2023-05-02 12:26:18 +02:00
|
|
|
const isTheFirstUser = (await this.usersRepository.countBy({ host: IsNull() })) === 0;
|
|
|
|
|
2023-05-02 18:21:18 +02:00
|
|
|
if (!opts.ignorePreservedUsernames && !isTheFirstUser) {
|
2023-04-29 10:03:14 +02:00
|
|
|
const instance = await this.metaService.fetch(true);
|
|
|
|
const isPreserved = instance.preservedUsernames.map(x => x.toLowerCase()).includes(username.toLowerCase());
|
|
|
|
if (isPreserved) {
|
|
|
|
throw new Error('USED_USERNAME');
|
|
|
|
}
|
|
|
|
}
|
2023-05-02 12:26:18 +02:00
|
|
|
|
2022-09-17 20:27:08 +02:00
|
|
|
const keyPair = await new Promise<string[]>((res, rej) =>
|
|
|
|
generateKeyPair('rsa', {
|
|
|
|
modulusLength: 4096,
|
|
|
|
publicKeyEncoding: {
|
|
|
|
type: 'spki',
|
|
|
|
format: 'pem',
|
|
|
|
},
|
|
|
|
privateKeyEncoding: {
|
|
|
|
type: 'pkcs8',
|
|
|
|
format: 'pem',
|
|
|
|
cipher: undefined,
|
|
|
|
passphrase: undefined,
|
|
|
|
},
|
2023-03-11 00:51:37 +01:00
|
|
|
}, (err, publicKey, privateKey) =>
|
2022-09-17 20:27:08 +02:00
|
|
|
err ? rej(err) : res([publicKey, privateKey]),
|
|
|
|
));
|
|
|
|
|
|
|
|
let account!: User;
|
|
|
|
|
|
|
|
// Start transaction
|
|
|
|
await this.db.transaction(async transactionalEntityManager => {
|
|
|
|
const exist = await transactionalEntityManager.findOneBy(User, {
|
|
|
|
usernameLower: username.toLowerCase(),
|
|
|
|
host: IsNull(),
|
|
|
|
});
|
|
|
|
|
|
|
|
if (exist) throw new Error(' the username is already used');
|
|
|
|
|
|
|
|
account = await transactionalEntityManager.save(new User({
|
|
|
|
id: this.idService.genId(),
|
|
|
|
createdAt: new Date(),
|
|
|
|
username: username,
|
|
|
|
usernameLower: username.toLowerCase(),
|
|
|
|
host: this.utilityService.toPunyNullable(host),
|
|
|
|
token: secret,
|
2023-05-02 12:26:18 +02:00
|
|
|
isRoot: isTheFirstUser,
|
2022-09-17 20:27:08 +02:00
|
|
|
}));
|
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UserKeypair({
|
|
|
|
publicKey: keyPair[0],
|
|
|
|
privateKey: keyPair[1],
|
|
|
|
userId: account.id,
|
|
|
|
}));
|
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UserProfile({
|
|
|
|
userId: account.id,
|
|
|
|
autoAcceptFollowed: true,
|
|
|
|
password: hash,
|
|
|
|
}));
|
|
|
|
|
|
|
|
await transactionalEntityManager.save(new UsedUsername({
|
|
|
|
createdAt: new Date(),
|
|
|
|
username: username.toLowerCase(),
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
|
|
|
|
this.usersChart.update(account, true);
|
|
|
|
|
|
|
|
return { account, secret };
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|