summaryrefslogtreecommitdiff
path: root/packages/backend/src/server/api/common/signup.ts
diff options
context:
space:
mode:
Diffstat (limited to 'packages/backend/src/server/api/common/signup.ts')
-rw-r--r--packages/backend/src/server/api/common/signup.ts114
1 files changed, 0 insertions, 114 deletions
diff --git a/packages/backend/src/server/api/common/signup.ts b/packages/backend/src/server/api/common/signup.ts
deleted file mode 100644
index abc142472a..0000000000
--- a/packages/backend/src/server/api/common/signup.ts
+++ /dev/null
@@ -1,114 +0,0 @@
-import bcrypt from 'bcryptjs';
-import { generateKeyPair } from 'node:crypto';
-import generateUserToken from './generate-native-user-token.js';
-import { User } from '@/models/entities/user.js';
-import { Users, UsedUsernames } from '@/models/index.js';
-import { UserProfile } from '@/models/entities/user-profile.js';
-import { IsNull } from 'typeorm';
-import { genId } from '@/misc/gen-id.js';
-import { toPunyNullable } from '@/misc/convert-host.js';
-import { UserKeypair } from '@/models/entities/user-keypair.js';
-import { usersChart } from '@/services/chart/index.js';
-import { UsedUsername } from '@/models/entities/used-username.js';
-import { db } from '@/db/postgre.js';
-
-export async function signup(opts: {
- username: User['username'];
- password?: string | null;
- passwordHash?: UserProfile['password'] | null;
- host?: string | null;
-}) {
- const { username, password, passwordHash, host } = opts;
- let hash = passwordHash;
-
- // Validate username
- if (!Users.validateLocalUsername(username)) {
- throw new Error('INVALID_USERNAME');
- }
-
- if (password != null && passwordHash == null) {
- // Validate password
- if (!Users.validatePassword(password)) {
- throw new Error('INVALID_PASSWORD');
- }
-
- // Generate hash of password
- const salt = await bcrypt.genSalt(8);
- hash = await bcrypt.hash(password, salt);
- }
-
- // Generate secret
- const secret = generateUserToken();
-
- // Check username duplication
- if (await Users.findOneBy({ usernameLower: username.toLowerCase(), host: IsNull() })) {
- throw new Error('DUPLICATED_USERNAME');
- }
-
- // Check deleted username duplication
- if (await UsedUsernames.findOneBy({ username: username.toLowerCase() })) {
- throw new Error('USED_USERNAME');
- }
-
- const keyPair = await new Promise<string[]>((res, rej) =>
- generateKeyPair('rsa', {
- modulusLength: 4096,
- publicKeyEncoding: {
- type: 'spki',
- format: 'pem',
- },
- privateKeyEncoding: {
- type: 'pkcs8',
- format: 'pem',
- cipher: undefined,
- passphrase: undefined,
- },
- } as any, (err, publicKey, privateKey) =>
- err ? rej(err) : res([publicKey, privateKey])
- ));
-
- let account!: User;
-
- // Start transaction
- await db.transaction(async transactionalEntityManager => {
- const exist = await transactionalEntityManager.findOneBy(User, {
- usernameLower: username.toLowerCase(),
- host: IsNull(),
- });
-
- if (exist) throw new Error(' the username is already used');
-
- account = await transactionalEntityManager.save(new User({
- id: genId(),
- createdAt: new Date(),
- username: username,
- usernameLower: username.toLowerCase(),
- host: toPunyNullable(host),
- token: secret,
- isAdmin: (await Users.countBy({
- host: IsNull(),
- })) === 0,
- }));
-
- await transactionalEntityManager.save(new UserKeypair({
- publicKey: keyPair[0],
- privateKey: keyPair[1],
- userId: account.id,
- }));
-
- await transactionalEntityManager.save(new UserProfile({
- userId: account.id,
- autoAcceptFollowed: true,
- password: hash,
- }));
-
- await transactionalEntityManager.save(new UsedUsername({
- createdAt: new Date(),
- username: username.toLowerCase(),
- }));
- });
-
- usersChart.update(account, true);
-
- return { account, secret };
-}