user.js 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. let bcrypt = require('bcryptjs')
  2. let express = require('express')
  3. let router = express.Router()
  4. const Errors = require('../lib/errors.js')
  5. let Models = require('../models')
  6. let User = Models.User
  7. let AdminToken = Models.AdminToken
  8. router.post('/', async (req, res) => {
  9. let user, adminUser, hash, token
  10. let validationErrors = []
  11. let userParams = {}
  12. try {
  13. //Validations
  14. if(req.body.username === undefined) {
  15. validationErrors.push(Errors.missingParameter('username'))
  16. } else {
  17. if(typeof req.body.username !== 'string') {
  18. validationErrors.push(Errors.invalidParameterType('username', 'string'))
  19. } if(req.body.username.length < 6) {
  20. validationErrors.push(Errors.parameterLengthTooSmall('username', 6))
  21. } if(req.body.username.length > 50) {
  22. validationErrors.push(Errors.parameterLengthTooLarge('username', 50))
  23. }
  24. }
  25. if(req.body.password === undefined) {
  26. validationErrors.push(Errors.missingParameter('password'))
  27. } else {
  28. if(typeof req.body.password !== 'string') {
  29. validationErrors.push(Errors.invalidParameterType('password', 'string'))
  30. } if(req.body.password.length < 6) {
  31. validationErrors.push(Errors.parameterLengthTooSmall('password', 6))
  32. } if(req.body.password.length > 100) {
  33. validationErrors.push(Errors.parameterLengthTooLarge('password', 100))
  34. }
  35. }
  36. if(req.body.token !== undefined && typeof req.body.token !== 'string') {
  37. validationErrors.push(Errors.invalidParameterType('token', 'string'))
  38. }
  39. if(req.body.admin !== undefined && typeof req.body.admin !== 'boolean') {
  40. validationErrors.push(Errors.invalidParameterType('admin', 'boolean'))
  41. }
  42. if(validationErrors.length) throw Errors.VALIDATION_ERROR
  43. if(req.body.admin && !req.body.token) {
  44. adminUser = await User.findOne({ where: {
  45. admin: true
  46. }})
  47. if(adminUser) {
  48. validationErrors.push(Errors.missingParameter('token'))
  49. throw Errors.VALIDATION_ERROR
  50. } else {
  51. userParams.admin = true
  52. }
  53. } else if(req.body.admin && req.body.token) {
  54. token = await AdminToken.findOne({ where: {
  55. token: req.body.token
  56. }})
  57. if(token && token.isValid()) {
  58. userParams.admin = true
  59. } else {
  60. validationErrors.push(Errors.invalidToken)
  61. throw Errors.VALIDATION_ERROR
  62. }
  63. }
  64. hash = await bcrypt.hash(req.body.password, 12)
  65. userParams.username = req.body.username
  66. userParams.hash = hash
  67. user = await User.create(userParams)
  68. if(req.body.token) {
  69. await token.destroy()
  70. }
  71. req.session.loggedIn = true
  72. req.session.username = user.username
  73. res.json(user.toJSON())
  74. } catch (err) {
  75. if(err === Errors.VALIDATION_ERROR) {
  76. res.status(400)
  77. res.json({
  78. errors: validationErrors
  79. })
  80. } else if(err.name === 'SequelizeUniqueConstraintError') {
  81. res.status(400)
  82. res.json({
  83. errors: [Errors.accountAlreadyCreated]
  84. })
  85. } else {
  86. res.status(500)
  87. res.json({
  88. errors: [Errors.unknown]
  89. })
  90. }
  91. }
  92. })
  93. router.get('/:username', async (req, res) => {
  94. try {
  95. if(
  96. !req.session.loggedIn ||
  97. req.session.username !== req.params.username
  98. ) {
  99. throw Errors.requestNotAuthorized
  100. }
  101. let user = await User.findOne({
  102. attributes: { exclude: ['hash', 'id'] },
  103. where: { username: req.params.username }
  104. })
  105. res.json(user.toJSON())
  106. } catch (err) {
  107. if(err === Errors.requestNotAuthorized) {
  108. res.status(403)
  109. res.json({
  110. errors: [Errors.requestNotAuthorized]
  111. })
  112. } else {
  113. console.log(err)
  114. res.status(500)
  115. res.json({
  116. errors: [Errors.unknown]
  117. })
  118. }
  119. }
  120. })
  121. router.post('/:username/login', async (req, res) => {
  122. let user, bcryptRes, validationErrors = []
  123. try {
  124. //Validations
  125. if(req.body.password === undefined) {
  126. validationErrors.push(Errors.missingParameter('password'))
  127. } else if(typeof req.body.password !== 'string') {
  128. validationErrors.push(Errors.invalidParameterType('password', 'string'))
  129. }
  130. if(validationErrors.length) throw Errors.VALIDATION_ERROR
  131. user = await User.findOne({
  132. where: {
  133. username: req.params.username,
  134. }
  135. })
  136. if(user) {
  137. bcryptRes = await bcrypt.compare(req.body.password, user.hash)
  138. if(bcryptRes) {
  139. req.session.loggedIn = true
  140. req.session.username = user.username
  141. res.json({
  142. username: user.username,
  143. success: true
  144. })
  145. } else {
  146. res.status(401)
  147. res.json({
  148. errors: [Errors.invalidLoginCredentials]
  149. })
  150. }
  151. } else {
  152. res.status(401)
  153. res.json({
  154. errors: [Errors.invalidLoginCredentials]
  155. })
  156. }
  157. } catch (err) {
  158. if(err === Errors.VALIDATION_ERROR) {
  159. res.status(400)
  160. res.json({
  161. errors: validationErrors
  162. })
  163. } else {
  164. console.log(err)
  165. res.status(500)
  166. res.json({
  167. errors: [Errors.unknown]
  168. })
  169. }
  170. }
  171. })
  172. router.post('/:username/logout', async (req, res) => {
  173. req.session.loggedIn = false
  174. req.session.username = undefined
  175. res.json({
  176. success: true
  177. })
  178. })
  179. module.exports = router