/* * SPDX-FileCopyrightText: syuilo and misskey-project * SPDX-License-Identifier: AGPL-3.0-only */ import * as argon2 from 'argon2'; import { Inject, Injectable } from '@nestjs/common'; import { Endpoint } from '@/server/api/endpoint-base.js'; import type { UserProfilesRepository, UserSecurityKeysRepository } from '@/models/_.js'; import { UserEntityService } from '@/core/entities/UserEntityService.js'; import { GlobalEventService } from '@/core/GlobalEventService.js'; import { DI } from '@/di-symbols.js'; import { ApiError } from '@/server/api/error.js'; import { UserAuthService } from '@/core/UserAuthService.js'; export const meta = { requireCredential: true, secure: true, errors: { incorrectPassword: { message: 'Incorrect password.', code: 'INCORRECT_PASSWORD', id: '141c598d-a825-44c8-9173-cfb9d92be493', }, }, } as const; export const paramDef = { type: 'object', properties: { password: { type: 'string' }, token: { type: 'string', nullable: true }, credentialId: { type: 'string' }, }, required: ['password', 'credentialId'], } as const; @Injectable() export default class extends Endpoint { // eslint-disable-line import/no-default-export constructor( @Inject(DI.userSecurityKeysRepository) private userSecurityKeysRepository: UserSecurityKeysRepository, @Inject(DI.userProfilesRepository) private userProfilesRepository: UserProfilesRepository, private userEntityService: UserEntityService, private userAuthService: UserAuthService, private globalEventService: GlobalEventService, ) { super(meta, paramDef, async (ps, me) => { const token = ps.token; const profile = await this.userProfilesRepository.findOneByOrFail({ userId: me.id }); if (profile.twoFactorEnabled) { if (token == null) { throw new Error('authentication failed'); } try { await this.userAuthService.twoFactorAuthenticate(profile, token); } catch (e) { throw new Error('authentication failed'); } } const passwordMatched = await argon2.verify(profile.password ?? '', ps.password); if (!passwordMatched) { throw new ApiError(meta.errors.incorrectPassword); } // Make sure we only delete the user's own creds await this.userSecurityKeysRepository.delete({ userId: me.id, id: ps.credentialId, }); // 使われているキーがなくなったらパスワードレスログインをやめる const keyCount = await this.userSecurityKeysRepository.count({ where: { userId: me.id, }, select: { id: true, name: true, lastUsed: true, }, }); if (keyCount === 0) { await this.userProfilesRepository.update(me.id, { usePasswordLessLogin: false, }); } // Publish meUpdated event this.globalEventService.publishMainStream(me.id, 'meUpdated', await this.userEntityService.pack(me.id, me, { schema: 'MeDetailed', includeSecrets: true, })); return {}; }); } }