user.js 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295
  1. let bcrypt = require('bcryptjs')
  2. let express = require('express')
  3. let router = express.Router()
  4. const Errors = require('../lib/errors.js')
  5. let { User, Post, AdminToken, Thread, Category, Sequelize, Ip, Ban } = require('../models')
  6. let pagination = require('../lib/pagination.js')
  7. function setUserSession(req, res, username, UserId, admin) {
  8. req.session.loggedIn = true
  9. req.session.username = username
  10. req.session.UserId = UserId
  11. res.cookie('username', username)
  12. //Not for security purposes, just so client side can determine
  13. //to show certain parts of ui or not (i.e. could trivially be spoofed
  14. //but the server would not accept any api requests)
  15. res.cookie('admin', !!admin)
  16. if(admin) { req.session.admin = true }
  17. }
  18. router.post('/', async (req, res) => {
  19. try {
  20. await Ban.isIpBanned(req.ip)
  21. let userParams = {
  22. username: req.body.username,
  23. hash: req.body.password,
  24. admin: false
  25. }
  26. if(req.body.admin && await User.canBeAdmin(req.body.token)) {
  27. userParams.admin = true
  28. }
  29. let user = await User.create(userParams)
  30. await Ip.createIfNotExists(req.ip, user)
  31. setUserSession(req, res, user.username, user.id, userParams.admin)
  32. res.json(user.toJSON())
  33. } catch (e) {
  34. if(e instanceof Sequelize.ValidationError) {
  35. res.status(400)
  36. res.json(e)
  37. } else if (e.name in Errors) {
  38. res.status(401)
  39. res.json({
  40. errors: [e]
  41. })
  42. } else {
  43. console.log(e)
  44. res.status(500)
  45. res.json({
  46. errors: [Errors.unknown]
  47. })
  48. }
  49. }
  50. })
  51. router.get('/:username', async (req, res) => {
  52. try {
  53. let queryObj = {
  54. attributes: { exclude: ['hash', 'id'] },
  55. where: { username: req.params.username }
  56. }
  57. if(req.query.posts) {
  58. let { from, limit } = pagination.getPaginationProps(req.query, true)
  59. let postInclude = {
  60. model: Post,
  61. include: Post.includeOptions(),
  62. limit,
  63. order: [['id', 'DESC']]
  64. }
  65. if(from !== null) {
  66. postInclude.where = { id: { $lte: from } }
  67. }
  68. queryObj.include = [postInclude]
  69. let user = await User.findOne(queryObj)
  70. if(!user) throw Errors.accountDoesNotExist
  71. let meta = await user.getMeta(limit)
  72. res.json(Object.assign( user.toJSON(limit), { meta } ))
  73. } else if(req.query.threads) {
  74. let queryString = ''
  75. Object.keys(req.query).forEach(query => {
  76. queryString += `&${query}=${req.query[query]}`
  77. })
  78. res.redirect('/api/v1/category/ALL?username=' + req.params.username + queryString)
  79. } else {
  80. let user = await User.findOne(queryObj)
  81. if(!user) throw Errors.accountDoesNotExist
  82. res.json(user.toJSON())
  83. }
  84. } catch (err) {
  85. if(err === Errors.accountDoesNotExist) {
  86. res.status(400)
  87. res.json({ errors: [err] })
  88. } else {
  89. console.log(err)
  90. res.status(500)
  91. res.json({
  92. errors: [Errors.unknown]
  93. })
  94. }
  95. }
  96. })
  97. router.post('/:username/login', async (req, res) => {
  98. try {
  99. await Ban.isIpBanned(req.ip, req.params.username)
  100. let user = await User.findOne({ where: {
  101. username: req.params.username
  102. }})
  103. if(user) {
  104. if(await user.comparePassword(req.body.password)) {
  105. await Ip.createIfNotExists(req.ip, user)
  106. setUserSession(req, res, user.username, user.id, user.admin)
  107. res.json({
  108. username: user.username,
  109. admin: user.admin,
  110. success: true
  111. })
  112. } else {
  113. res.status(401)
  114. res.json({
  115. errors: [Errors.invalidLoginCredentials]
  116. })
  117. }
  118. } else {
  119. res.status(401)
  120. res.json({
  121. errors: [Errors.invalidLoginCredentials]
  122. })
  123. }
  124. } catch (err) {
  125. if(err instanceof Sequelize.ValidationError) {
  126. res.status(400)
  127. res.json(err)
  128. } else {
  129. console.log(err)
  130. res.status(500)
  131. res.json({
  132. errors: [Errors.unknown]
  133. })
  134. }
  135. }
  136. })
  137. router.post('/:username/logout', async (req, res) => {
  138. req.session.destroy(() => {
  139. res.clearCookie('username')
  140. res.clearCookie('admin')
  141. res.json({
  142. success: true
  143. })
  144. })
  145. })
  146. router.all('*', (req, res, next) => {
  147. if(req.session.username) {
  148. next()
  149. } else {
  150. res.status(401)
  151. res.json({
  152. errors: [Errors.requestNotAuthorized]
  153. })
  154. }
  155. })
  156. router.put('/:username', async (req, res) => {
  157. try {
  158. if(req.session.username !== req.params.username) {
  159. throw Errors.requestNotAuthorized
  160. }
  161. if(req.body.description !== undefined) {
  162. let user = await User.update({ description: req.body.description }, { where: {
  163. username: req.session.username
  164. }})
  165. res.json({ success: true })
  166. } else if(
  167. req.body.currentPassword !== undefined &&
  168. req.body.newPassword !== undefined
  169. ) {
  170. let user = await User.findOne({where: {
  171. username: req.session.username
  172. }})
  173. await user.updatePassword(req.body.currentPassword, req.body.newPassword)
  174. res.json({ success: true })
  175. } else {
  176. res.json({ success: false })
  177. }
  178. } catch (e) {
  179. if(e.name in Errors) {
  180. res.status(400)
  181. res.json({ errors: [e] })
  182. } else if(e instanceof Sequelize.ValidationError) {
  183. res.status(400)
  184. res.json(e)
  185. } else {
  186. console.log(e)
  187. res.status(500)
  188. res.json({errors: Errors.unknown })
  189. }
  190. }
  191. })
  192. router.delete('/:username', async (req, res) => {
  193. try {
  194. if(req.session.username !== req.params.username) {
  195. throw Errors.requestNotAuthorized
  196. }
  197. let user = await User.findOne({ where: {
  198. username: req.session.username
  199. }})
  200. await user.destroy()
  201. req.session.destroy(() => {
  202. res.clearCookie('username')
  203. res.clearCookie('admin')
  204. res.json({ success: true })
  205. })
  206. } catch (e) {
  207. if(e.name in Errors) {
  208. res.status(400)
  209. res.json({ errors: [e] })
  210. } else {
  211. console.log(e)
  212. res.status(500)
  213. res.json({errors: Errors.unknown })
  214. }
  215. }
  216. })
  217. router.all('*', (req, res, next) => {
  218. if(req.session.admin) {
  219. next()
  220. } else {
  221. res.status(401)
  222. res.json({
  223. errors: [Errors.requestNotAuthorized]
  224. })
  225. }
  226. })
  227. router.get('/', async (req, res) => {
  228. try {
  229. console.log('here234')
  230. if(req.query.admin) {
  231. let admins = await User.findAll({
  232. where: { admin: true },
  233. attributes: {
  234. exclude: ['hash']
  235. }
  236. })
  237. res.json(admins)
  238. } else {
  239. res.json({})
  240. }
  241. } catch (e) {
  242. console.log(e)
  243. res.json({
  244. errors: [Errors.unknown]
  245. })
  246. }
  247. })
  248. module.exports = router