2017-02-24 02:15:13 +08:00
|
|
|
import { check } from 'meteor/check';
|
|
|
|
import Logger from '/imports/startup/server/logger';
|
2017-10-12 10:00:28 +08:00
|
|
|
import Users from '/imports/api/users';
|
2020-02-07 04:47:28 +08:00
|
|
|
import userJoin from './userJoin';
|
2020-04-29 11:33:45 +08:00
|
|
|
import pendingAuthenticationsStore from '../store/pendingAuthentications';
|
|
|
|
import createDummyUser from '../modifiers/createDummyUser';
|
|
|
|
import setConnectionIdAndAuthToken from '../modifiers/setConnectionIdAndAuthToken';
|
2017-10-12 09:02:23 +08:00
|
|
|
|
2018-02-20 22:21:51 +08:00
|
|
|
const clearOtherSessions = (sessionUserId, current = false) => {
|
|
|
|
const serverSessions = Meteor.server.sessions;
|
|
|
|
Object.keys(serverSessions)
|
|
|
|
.filter(i => serverSessions[i].userId === sessionUserId)
|
|
|
|
.filter(i => i !== current)
|
|
|
|
.forEach(i => serverSessions[i].close());
|
|
|
|
};
|
|
|
|
|
2017-10-12 09:02:23 +08:00
|
|
|
export default function handleValidateAuthToken({ body }, meetingId) {
|
2020-06-13 00:24:11 +08:00
|
|
|
const {
|
|
|
|
userId,
|
|
|
|
valid,
|
|
|
|
authToken,
|
|
|
|
waitForApproval,
|
|
|
|
} = body;
|
2017-02-24 02:15:13 +08:00
|
|
|
|
|
|
|
check(userId, String);
|
2020-04-29 11:33:45 +08:00
|
|
|
check(authToken, String);
|
2017-10-12 09:02:23 +08:00
|
|
|
check(valid, Boolean);
|
|
|
|
check(waitForApproval, Boolean);
|
2017-02-24 02:15:13 +08:00
|
|
|
|
2020-04-29 11:33:45 +08:00
|
|
|
const pendingAuths = pendingAuthenticationsStore.take(meetingId, userId, authToken);
|
|
|
|
|
2020-06-13 00:24:11 +08:00
|
|
|
if (!valid) {
|
|
|
|
pendingAuths.forEach(
|
|
|
|
(pendingAuth) => {
|
2020-04-29 11:33:45 +08:00
|
|
|
try {
|
2020-06-13 00:24:11 +08:00
|
|
|
const { methodInvocationObject } = pendingAuth;
|
2020-04-29 11:33:45 +08:00
|
|
|
const connectionId = methodInvocationObject.connection.id;
|
|
|
|
|
2020-05-09 06:08:50 +08:00
|
|
|
// Schedule socket disconnection for this user, giving some time for client receiving the reason of disconnection
|
2020-06-13 00:24:11 +08:00
|
|
|
Meteor.setTimeout(() => {
|
2020-05-09 06:08:50 +08:00
|
|
|
methodInvocationObject.connection.close();
|
|
|
|
}, 2000);
|
2020-06-13 00:24:11 +08:00
|
|
|
|
2020-04-29 11:33:45 +08:00
|
|
|
Logger.info(`Closed connection ${connectionId} due to invalid auth token.`);
|
|
|
|
} catch (e) {
|
|
|
|
Logger.error(`Error closing socket for meetingId '${meetingId}', userId '${userId}', authToken ${authToken}`);
|
|
|
|
}
|
2020-06-13 00:24:11 +08:00
|
|
|
},
|
2020-04-29 11:33:45 +08:00
|
|
|
);
|
2020-06-13 00:24:11 +08:00
|
|
|
|
2020-04-29 11:33:45 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-13 00:24:11 +08:00
|
|
|
if (valid) {
|
2020-04-29 11:33:45 +08:00
|
|
|
// Define user ID on connections
|
2020-06-13 00:24:11 +08:00
|
|
|
pendingAuths.forEach(
|
|
|
|
(pendingAuth) => {
|
|
|
|
const { methodInvocationObject } = pendingAuth;
|
|
|
|
|
|
|
|
/* Logic migrated from validateAuthToken method ( postponed to only run in case of success response ) - Begin */
|
|
|
|
const sessionId = `${meetingId}--${userId}`;
|
2020-09-30 05:02:03 +08:00
|
|
|
|
|
|
|
if (!methodInvocationObject.userId) methodInvocationObject.setUserId(sessionId);
|
2020-06-13 00:24:11 +08:00
|
|
|
|
|
|
|
const User = Users.findOne({
|
|
|
|
meetingId,
|
|
|
|
userId,
|
|
|
|
});
|
|
|
|
|
|
|
|
if (!User) {
|
|
|
|
createDummyUser(meetingId, userId, authToken);
|
2020-04-29 11:33:45 +08:00
|
|
|
}
|
2020-06-13 00:24:11 +08:00
|
|
|
|
|
|
|
setConnectionIdAndAuthToken(meetingId, userId, methodInvocationObject.connection.id, authToken);
|
|
|
|
/* End of logic migrated from validateAuthToken */
|
|
|
|
},
|
2020-04-29 11:33:45 +08:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2017-02-24 02:15:13 +08:00
|
|
|
const selector = {
|
|
|
|
meetingId,
|
|
|
|
userId,
|
2018-06-15 04:24:55 +08:00
|
|
|
clientType: 'HTML5',
|
2017-02-24 02:15:13 +08:00
|
|
|
};
|
|
|
|
|
2017-03-08 01:18:02 +08:00
|
|
|
const User = Users.findOne(selector);
|
|
|
|
|
2017-03-11 02:33:46 +08:00
|
|
|
// If we dont find the user on our collection is a flash user and we can skip
|
|
|
|
if (!User) return;
|
2017-03-08 01:18:02 +08:00
|
|
|
|
2017-10-12 09:02:23 +08:00
|
|
|
// Publish user join message
|
2020-03-26 04:12:36 +08:00
|
|
|
if (valid && !waitForApproval) {
|
2019-02-14 03:44:21 +08:00
|
|
|
Logger.info('User=', User);
|
2017-10-12 09:02:23 +08:00
|
|
|
userJoin(meetingId, userId, User.authToken);
|
|
|
|
}
|
|
|
|
|
2017-02-24 02:15:13 +08:00
|
|
|
const modifier = {
|
|
|
|
$set: {
|
2017-10-12 09:02:23 +08:00
|
|
|
validated: valid,
|
|
|
|
approved: !waitForApproval,
|
2019-01-14 21:23:35 +08:00
|
|
|
loginTime: Date.now(),
|
2019-02-27 01:40:01 +08:00
|
|
|
inactivityCheck: false,
|
2017-02-24 02:15:13 +08:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
const cb = (err, numChanged) => {
|
|
|
|
if (err) {
|
|
|
|
return Logger.error(`Validating auth token: ${err}`);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (numChanged) {
|
2017-10-12 09:02:23 +08:00
|
|
|
if (valid) {
|
2018-02-20 22:21:51 +08:00
|
|
|
const sessionUserId = `${meetingId}-${userId}`;
|
|
|
|
const currentConnectionId = User.connectionId ? User.connectionId : false;
|
|
|
|
clearOtherSessions(sessionUserId, currentConnectionId);
|
2017-02-24 04:16:10 +08:00
|
|
|
}
|
|
|
|
|
2017-12-19 20:19:47 +08:00
|
|
|
return Logger.info(`Validated auth token as ${valid} user=${userId} meeting=${meetingId}`);
|
2017-02-24 02:15:13 +08:00
|
|
|
}
|
2017-02-24 04:16:10 +08:00
|
|
|
|
2017-10-12 09:02:23 +08:00
|
|
|
return Logger.info('No auth to validate');
|
2017-02-24 04:16:10 +08:00
|
|
|
};
|
|
|
|
|
2017-10-12 09:02:23 +08:00
|
|
|
Users.update(selector, modifier, cb);
|
2020-06-13 03:51:22 +08:00
|
|
|
}
|