mirror of
https://github.com/Ocelot-Social-Community/Ocelot-Social.git
synced 2025-12-12 23:35:58 +00:00
We had this error in our neo4j pod recently: ``` 2019-12-02 08:29:42.680+0000 ERROR Unable to schedule bolt session 'bolt-1018230' for execution since there are no available threads to serve it at the moment. You can retry at a later time or consider increasing max thread pool size for bolt connector(s). 2019-12-02 08:29:42.680+0000 ERROR Unable to schedule bolt session 'bolt-1018224' for execution since there are no available threads to serve it at the moment. You can retry at a later time or consider increasing max thread pool size for bolt connector(s). 2019-12-02 08:29:42.681+0000 ERROR Unable to schedule bolt session 'bolt-1018352' for execution since there are no available threads to serve it at the moment. You can retry at a later time or consider increasing max thread pool size for bolt connector(s). 2019-12-02 08:29:42.682+0000 ERROR Unable to schedule bolt session 'bolt-1018243' for execution since there are no available threads to serve it at the moment. You can retry at a later time or consider increasing max thread pool size for bolt connector(s). ``` Apparently the default is 400 threads. So we must have a leak somewhere.
77 lines
2.6 KiB
JavaScript
77 lines
2.6 KiB
JavaScript
import encode from '../../jwt/encode'
|
|
import bcrypt from 'bcryptjs'
|
|
import { AuthenticationError } from 'apollo-server'
|
|
import { neode } from '../../bootstrap/neo4j'
|
|
import normalizeEmail from './helpers/normalizeEmail'
|
|
|
|
const instance = neode()
|
|
|
|
export default {
|
|
Query: {
|
|
isLoggedIn: (_, args, { driver, user }) => {
|
|
return Boolean(user && user.id)
|
|
},
|
|
currentUser: async (object, params, ctx, resolveInfo) => {
|
|
if (!ctx.user) return null
|
|
const user = await instance.find('User', ctx.user.id)
|
|
return user.toJson()
|
|
},
|
|
},
|
|
Mutation: {
|
|
login: async (_, { email, password }, { driver, req, user }) => {
|
|
// if (user && user.id) {
|
|
// throw new Error('Already logged in.')
|
|
// }
|
|
email = normalizeEmail(email)
|
|
const session = driver.session()
|
|
try {
|
|
const result = await session.run(
|
|
`
|
|
MATCH (user:User {deleted: false})-[:PRIMARY_EMAIL]->(e:EmailAddress {email: $userEmail})
|
|
RETURN user {.id, .slug, .name, .avatar, .encryptedPassword, .role, .disabled, email:e.email} as user LIMIT 1
|
|
`,
|
|
{ userEmail: email },
|
|
)
|
|
const [currentUser] = await result.records.map(record => {
|
|
return record.get('user')
|
|
})
|
|
|
|
if (
|
|
currentUser &&
|
|
(await bcrypt.compareSync(password, currentUser.encryptedPassword)) &&
|
|
!currentUser.disabled
|
|
) {
|
|
delete currentUser.encryptedPassword
|
|
return encode(currentUser)
|
|
} else if (currentUser && currentUser.disabled) {
|
|
throw new AuthenticationError('Your account has been disabled.')
|
|
} else {
|
|
throw new AuthenticationError('Incorrect email address or password.')
|
|
}
|
|
} finally {
|
|
session.close()
|
|
}
|
|
},
|
|
changePassword: async (_, { oldPassword, newPassword }, { driver, user }) => {
|
|
const currentUser = await instance.find('User', user.id)
|
|
|
|
const encryptedPassword = currentUser.get('encryptedPassword')
|
|
if (!(await bcrypt.compareSync(oldPassword, encryptedPassword))) {
|
|
throw new AuthenticationError('Old password is not correct')
|
|
}
|
|
|
|
if (await bcrypt.compareSync(newPassword, encryptedPassword)) {
|
|
throw new AuthenticationError('Old password and new password should be different')
|
|
}
|
|
|
|
const newEncryptedPassword = await bcrypt.hashSync(newPassword, 10)
|
|
await currentUser.update({
|
|
encryptedPassword: newEncryptedPassword,
|
|
updatedAt: new Date().toISOString(),
|
|
})
|
|
|
|
return encode(await currentUser.toJson())
|
|
},
|
|
},
|
|
}
|