2013-06-01 18:47:41 +04:00
|
|
|
(function () {
|
|
|
|
"use strict";
|
|
|
|
|
|
|
|
var User,
|
|
|
|
Users,
|
2013-06-15 02:12:04 +04:00
|
|
|
UserRole,
|
|
|
|
// UserRoles,
|
2013-06-01 18:47:41 +04:00
|
|
|
_ = require('underscore'),
|
2013-06-15 18:10:30 +04:00
|
|
|
uuid = require('node-uuid'),
|
2013-06-01 18:47:41 +04:00
|
|
|
when = require('when'),
|
|
|
|
nodefn = require('when/node/function'),
|
|
|
|
bcrypt = require('bcrypt-nodejs'),
|
|
|
|
Posts = require('./post').Posts,
|
2013-06-05 07:47:11 +04:00
|
|
|
GhostBookshelf = require('./base'),
|
|
|
|
Role = require('./role').Role,
|
|
|
|
Permission = require('./permission').Permission;
|
2013-06-01 18:47:41 +04:00
|
|
|
|
2013-06-15 02:12:04 +04:00
|
|
|
|
|
|
|
|
|
|
|
UserRole = GhostBookshelf.Model.extend({
|
|
|
|
tableName: 'roles_users'
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2013-06-01 18:47:41 +04:00
|
|
|
User = GhostBookshelf.Model.extend({
|
|
|
|
|
|
|
|
tableName: 'users',
|
|
|
|
|
|
|
|
hasTimestamps: true,
|
|
|
|
|
2013-06-15 18:10:30 +04:00
|
|
|
defaults: function () {
|
|
|
|
return {
|
|
|
|
uuid: uuid.v4()
|
|
|
|
};
|
|
|
|
},
|
|
|
|
|
2013-06-01 18:47:41 +04:00
|
|
|
posts: function () {
|
|
|
|
return this.hasMany(Posts, 'created_by');
|
2013-06-05 07:47:11 +04:00
|
|
|
},
|
|
|
|
|
|
|
|
roles: function () {
|
|
|
|
return this.belongsToMany(Role);
|
|
|
|
},
|
|
|
|
|
|
|
|
permissions: function () {
|
|
|
|
return this.belongsToMany(Permission);
|
2013-06-01 18:47:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
}, {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Naive user add
|
|
|
|
* @param _user
|
|
|
|
*
|
|
|
|
* Hashes the password provided before saving to the database.
|
|
|
|
*/
|
|
|
|
add: function (_user) {
|
2013-06-15 02:12:04 +04:00
|
|
|
|
2013-06-01 18:47:41 +04:00
|
|
|
var User = this,
|
|
|
|
// Clone the _user so we don't expose the hashed password unnecessarily
|
2013-06-15 02:12:04 +04:00
|
|
|
userData = _.extend({}, _user),
|
|
|
|
fail = false,
|
|
|
|
userRoles = {
|
|
|
|
|
|
|
|
"role_id": 1,
|
|
|
|
"user_id": 1
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* This only allows one user to be added to the database, otherwise fails.
|
|
|
|
* @param {object} user
|
|
|
|
* @author javorszky
|
|
|
|
*/
|
|
|
|
return this.forge().fetch().then(function (user) {
|
|
|
|
|
|
|
|
_.each(user.attributes, function (value, key, list) {
|
|
|
|
fail = true;
|
|
|
|
});
|
|
|
|
|
|
|
|
if (fail) {
|
|
|
|
return when.reject(new Error('A user is already registered. Only one user for now!'));
|
|
|
|
}
|
|
|
|
|
|
|
|
return nodefn.call(bcrypt.hash, _user.password, null, null).then(function (hash) {
|
|
|
|
userData.password = hash;
|
|
|
|
GhostBookshelf.Model.add.call(UserRole, userRoles);
|
|
|
|
return GhostBookshelf.Model.add.call(User, userData);
|
|
|
|
});
|
|
|
|
});
|
2013-06-01 18:47:41 +04:00
|
|
|
|
2013-06-15 02:12:04 +04:00
|
|
|
/**
|
|
|
|
* Temporarily replacing the function below with another one that checks
|
|
|
|
* whether there's anyone registered at all. This is due to #138
|
|
|
|
* @author javorszky
|
|
|
|
*/
|
|
|
|
/**
|
2013-06-01 18:47:41 +04:00
|
|
|
return this.forge({email_address: userData.email_address}).fetch().then(function (user) {
|
|
|
|
if (!!user.attributes.email_address) {
|
2013-06-11 00:26:20 +04:00
|
|
|
return when.reject(new Error('A user with that email address already exists.'));
|
2013-06-01 18:47:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return nodefn.call(bcrypt.hash, _user.password, null, null).then(function (hash) {
|
|
|
|
userData.password = hash;
|
|
|
|
return GhostBookshelf.Model.add.call(User, userData);
|
|
|
|
});
|
|
|
|
});
|
2013-06-15 02:12:04 +04:00
|
|
|
*/
|
2013-06-01 18:47:41 +04:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* User check
|
|
|
|
* @param _userdata
|
|
|
|
*
|
|
|
|
* Finds the user by email, and check's the password
|
|
|
|
*/
|
|
|
|
check: function (_userdata) {
|
|
|
|
return this.forge({
|
|
|
|
email_address: _userdata.email
|
|
|
|
}).fetch({require: true}).then(function (user) {
|
|
|
|
return nodefn.call(bcrypt.compare, _userdata.pw, user.get('password')).then(function (matched) {
|
|
|
|
if (!matched) {
|
|
|
|
return when.reject(new Error('Passwords do not match'));
|
|
|
|
}
|
|
|
|
return user;
|
|
|
|
});
|
|
|
|
});
|
2013-06-05 07:47:11 +04:00
|
|
|
},
|
|
|
|
|
|
|
|
effectivePermissions: function (id) {
|
|
|
|
return this.read({id: id}, { withRelated: ['permissions', 'roles.permissions'] })
|
|
|
|
.then(function (foundUser) {
|
|
|
|
var seenPerms = {},
|
|
|
|
rolePerms = _.map(foundUser.related('roles').models, function (role) {
|
|
|
|
return role.related('permissions').models;
|
|
|
|
}),
|
|
|
|
allPerms = [];
|
|
|
|
|
|
|
|
rolePerms.push(foundUser.related('permissions').models);
|
|
|
|
|
|
|
|
_.each(rolePerms, function (rolePermGroup) {
|
|
|
|
_.each(rolePermGroup, function (perm) {
|
|
|
|
var key = perm.get('action_type') + '-' + perm.get('object_type') + '-' + perm.get('object_id');
|
|
|
|
|
|
|
|
// Only add perms once
|
|
|
|
if (seenPerms[key]) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
allPerms.push(perm);
|
|
|
|
seenPerms[key] = true;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
return when.resolve(allPerms);
|
|
|
|
});
|
2013-06-01 18:47:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
Users = GhostBookshelf.Collection.extend({
|
|
|
|
model: User
|
|
|
|
});
|
|
|
|
|
|
|
|
module.exports = {
|
|
|
|
User: User,
|
|
|
|
Users: Users
|
|
|
|
};
|
|
|
|
|
|
|
|
}());
|