user.js 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. let bcrypt = require('bcryptjs')
  2. let express = require('express')
  3. let router = express.Router()
  4. const Errors = require('../lib/errors.js')
  5. let Models = require('../models')
  6. let User = Models.User
  7. let AdminToken = Models.AdminToken
  8. router.post('/', async (req, res) => {
  9. let user, adminUser, hash, token
  10. let validationErrors = []
  11. let userParams = {}
  12. try {
  13. //Validations
  14. if(req.body.username === undefined) {
  15. validationErrors.push(Errors.missingParameter('username'))
  16. } else {
  17. if(typeof req.body.username !== 'string') {
  18. validationErrors.push(Errors.invalidParameterType('username', 'string'))
  19. } if(req.body.username.length < 6) {
  20. validationErrors.push(Errors.parameterLengthTooSmall('username', 6))
  21. } if(req.body.username.length > 50) {
  22. validationErrors.push(Errors.parameterLengthTooLarge('username', 50))
  23. }
  24. }
  25. if(req.body.password === undefined) {
  26. validationErrors.push(Errors.missingParameter('password'))
  27. } else {
  28. if(typeof req.body.password !== 'string') {
  29. validationErrors.push(Errors.invalidParameterType('password', 'string'))
  30. } if(req.body.password.length < 6) {
  31. validationErrors.push(Errors.parameterLengthTooSmall('password', 6))
  32. } if(req.body.password.length > 100) {
  33. validationErrors.push(Errors.parameterLengthTooLarge('password', 100))
  34. }
  35. }
  36. if(req.body.token !== undefined && typeof req.body.token !== 'string') {
  37. validationErrors.push(Errors.invalidParameterType('token', 'string'))
  38. }
  39. if(req.body.admin !== undefined && typeof req.body.admin !== 'boolean') {
  40. validationErrors.push(Errors.invalidParameterType('admin', 'boolean'))
  41. }
  42. if(validationErrors.length) throw Errors.VALIDATION_ERROR
  43. if(req.body.admin && !req.body.token) {
  44. adminUser = await User.findOne({ where: {
  45. admin: true
  46. }})
  47. if(admin) {
  48. validationErrors.push(Errors.missingParameter('token'))
  49. throw Errors.VALIDATION_ERROR
  50. } else {
  51. userParams.admin = true
  52. }
  53. } else if(req.body.admin && req.body.token) {
  54. token = await AdminToken.findOne({ where: {
  55. token: req.body.token
  56. }})
  57. if(token && token.isValid()) {
  58. userParams.admin = true
  59. } else {
  60. validationErrors.push(Errors.invalidToken)
  61. throw Errors.VALIDATION_ERROR
  62. }
  63. }
  64. hash = await bcrypt.hash(req.body.password, 12)
  65. userParams.username = req.body.username
  66. userParams.hash = hash
  67. user = await User.create(userParams)
  68. req.session.loggedIn = true
  69. req.session.username = user.username
  70. res.json(user.toJSON())
  71. } catch (err) {
  72. if(err === Errors.VALIDATION_ERROR) {
  73. res.status(400)
  74. res.json({
  75. errors: validationErrors
  76. })
  77. } else if(err.name === 'SequelizeUniqueConstraintError') {
  78. res.status(400)
  79. res.json({
  80. errors: [Errors.accountAlreadyCreated]
  81. })
  82. } else {
  83. res.status(500)
  84. res.json({
  85. errors: [Errors.unknown]
  86. })
  87. }
  88. }
  89. })
  90. router.get('/:username', async (req, res) => {
  91. try {
  92. if(
  93. !req.session.loggedIn ||
  94. req.session.username !== req.params.username
  95. ) {
  96. throw Errors.requestNotAuthorized
  97. }
  98. let user = await User.findOne({
  99. attributes: { exclude: ['hash', 'id'] },
  100. where: { username: req.params.username }
  101. })
  102. res.json(user.toJSON())
  103. } catch (err) {
  104. if(err === Errors.requestNotAuthorized) {
  105. res.status(403)
  106. res.json({
  107. errors: [Errors.requestNotAuthorized]
  108. })
  109. } else {
  110. console.log(err)
  111. res.status(500)
  112. res.json({
  113. errors: [Errors.unknown]
  114. })
  115. }
  116. }
  117. })
  118. router.post('/:username/login', async (req, res) => {
  119. let user, bcryptRes, validationErrors = []
  120. try {
  121. //Validations
  122. if(req.body.password === undefined) {
  123. validationErrors.push(Errors.missingParameter('password'))
  124. } else if(typeof req.body.password !== 'string') {
  125. validationErrors.push(Errors.invalidParameterType('password', 'string'))
  126. }
  127. if(validationErrors.length) throw Errors.VALIDATION_ERROR
  128. user = await User.findOne({
  129. where: {
  130. username: req.params.username,
  131. }
  132. })
  133. if(user) {
  134. bcryptRes = await bcrypt.compare(req.body.password, user.hash)
  135. if(bcryptRes) {
  136. req.session.loggedIn = true
  137. req.session.username = user.username
  138. res.json({
  139. username: user.username,
  140. success: true
  141. })
  142. } else {
  143. res.status(401)
  144. res.json({
  145. errors: [Errors.invalidLoginCredentials]
  146. })
  147. }
  148. } else {
  149. res.status(401)
  150. res.json({
  151. errors: [Errors.invalidLoginCredentials]
  152. })
  153. }
  154. } catch (err) {
  155. if(err === Errors.VALIDATION_ERROR) {
  156. res.status(400)
  157. res.json({
  158. errors: validationErrors
  159. })
  160. } else {
  161. console.log(err)
  162. res.status(500)
  163. res.json({
  164. errors: [Errors.unknown]
  165. })
  166. }
  167. }
  168. })
  169. router.post('/:username/logout', async (req, res) => {
  170. req.session.loggedIn = false
  171. req.session.username = undefined
  172. res.json({
  173. success: true
  174. })
  175. })
  176. module.exports = router