165 lines
3.9 KiB
JavaScript
Raw Normal View History

2017-11-14 11:11:22 +01:00
'use strict';
/**
* User.js service
*
* @description: A set of functions similar to controller's actions to avoid code duplication.
*/
2017-11-16 14:12:03 +01:00
const bcrypt = require('bcryptjs');
const crypto = require('crypto');
const { sanitizeEntity, getAbsoluteServerUrl } = require('strapi-utils');
2017-11-14 11:11:22 +01:00
module.exports = {
/**
* Promise to count users
*
* @return {Promise}
*/
count(params) {
return strapi.query('user', 'users-permissions').count(params);
},
/**
* Promise to search count users
*
* @return {Promise}
*/
countSearch(params) {
return strapi.query('user', 'users-permissions').countSearch(params);
},
2017-11-14 11:11:22 +01:00
/**
* Promise to add a/an user.
* @return {Promise}
*/
async add(values) {
if (values.password) {
values.password = await strapi.plugins['users-permissions'].services.user.hashPassword(
values
);
}
return strapi.query('user', 'users-permissions').create(values);
2017-11-14 11:11:22 +01:00
},
/**
* Promise to edit a/an user.
* @return {Promise}
*/
async edit(params, values) {
if (values.password) {
values.password = await strapi.plugins['users-permissions'].services.user.hashPassword(
values
);
}
return strapi.query('user', 'users-permissions').update(params, values);
2017-11-14 11:11:22 +01:00
},
/**
2017-12-07 15:27:11 +01:00
* Promise to fetch a/an user.
2017-11-14 11:11:22 +01:00
* @return {Promise}
*/
fetch(params, populate) {
return strapi.query('user', 'users-permissions').findOne(params, populate);
2017-12-07 15:27:11 +01:00
},
/**
* Promise to fetch authenticated user.
* @return {Promise}
*/
fetchAuthenticatedUser(id) {
return strapi.query('user', 'users-permissions').findOne({ id }, ['role']);
},
2017-12-07 15:27:11 +01:00
/**
* Promise to fetch all users.
* @return {Promise}
*/
fetchAll(params, populate) {
return strapi.query('user', 'users-permissions').find(params, populate);
2017-11-16 14:12:03 +01:00
},
hashPassword(user = {}) {
return new Promise(resolve => {
2017-11-29 15:46:28 +01:00
if (!user.password || this.isHashed(user.password)) {
2017-11-16 14:12:03 +01:00
resolve(null);
} else {
bcrypt.hash(`${user.password}`, 10, (err, hash) => {
resolve(hash);
2017-11-16 14:12:03 +01:00
});
}
});
},
isHashed(password) {
2017-11-16 14:12:03 +01:00
if (typeof password !== 'string' || !password) {
return false;
}
return password.split('$').length === 4;
},
2017-11-16 14:29:49 +01:00
2017-12-07 15:27:11 +01:00
/**
* Promise to remove a/an user.
* @return {Promise}
*/
async remove(params) {
return strapi.query('user', 'users-permissions').delete(params);
2017-12-07 15:27:11 +01:00
},
async removeAll(params) {
return strapi.query('user', 'users-permissions').delete(params);
},
validatePassword(password, hash) {
return bcrypt.compare(password, hash);
},
async sendConfirmationEmail(user) {
const userPermissionService = strapi.plugins['users-permissions'].services.userspermissions;
const pluginStore = await strapi.store({
environment: '',
type: 'plugin',
name: 'users-permissions',
});
const settings = await pluginStore
.get({ key: 'email' })
.then(storeEmail => storeEmail['email_confirmation'].options);
const userInfo = sanitizeEntity(user, {
model: strapi.query('user', 'users-permissions').model,
});
const confirmationToken = crypto.randomBytes(20).toString('hex');
await this.edit({ id: user.id }, { confirmationToken });
settings.message = await userPermissionService.template(settings.message, {
URL: `${getAbsoluteServerUrl(strapi.config)}/auth/email-confirmation`,
USER: userInfo,
CODE: confirmationToken,
});
settings.object = await userPermissionService.template(settings.object, { USER: userInfo });
// Send an email to the user.
await strapi.plugins['email'].services.email.send({
to: user.email,
from:
settings.from.email && settings.from.name
? `${settings.from.name} <${settings.from.email}>`
: undefined,
replyTo: settings.response_email,
subject: settings.object,
text: settings.message,
html: settings.message,
});
},
2017-11-14 11:11:22 +01:00
};