user.js 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. let bcrypt = require('bcryptjs')
  2. let express = require('express')
  3. let router = express.Router()
  4. const Errors = require('../lib/errors.js')
  5. let { User, Post, AdminToken, Thread, Category, Sequelize } = require('../models')
  6. let pagination = require('../lib/pagination.js')
  7. function setUserSession(req, res, username, UserId, admin) {
  8. req.session.loggedIn = true
  9. req.session.username = username
  10. req.session.UserId = UserId
  11. res.cookie('username', username)
  12. //Not for security purposes, just so client side can determine
  13. //to show certain parts of ui or not (i.e. could trivially be spoofed
  14. //but the server would not accept any api requests)
  15. res.cookie('admin', !!admin)
  16. if(admin) { req.session.admin = true }
  17. }
  18. router.post('/', async (req, res) => {
  19. try {
  20. let userParams = {
  21. username: req.body.username,
  22. hash: req.body.password,
  23. admin: false
  24. }
  25. if(req.body.admin && await User.canBeAdmin(req.body.token)) {
  26. userParams.admin = true
  27. }
  28. let user = await User.create(userParams)
  29. setUserSession(req, res, user.username, user.id, userParams.admin)
  30. res.json(user.toJSON())
  31. } catch (e) {
  32. if(e instanceof Sequelize.ValidationError) {
  33. res.status(400)
  34. res.json(e)
  35. } else if (e.name in Errors) {
  36. res.status(401)
  37. res.json({
  38. errors: [e]
  39. })
  40. } else {
  41. console.log(e)
  42. res.status(500)
  43. res.json({
  44. errors: [Errors.unknown]
  45. })
  46. }
  47. }
  48. })
  49. router.get('/:username', async (req, res) => {
  50. try {
  51. let queryObj = {
  52. attributes: { exclude: ['hash', 'id'] },
  53. where: { username: req.params.username }
  54. }
  55. if(req.query.posts) {
  56. let { from, limit } = pagination.getPaginationProps(req.query, true)
  57. let postInclude = {
  58. model: Post,
  59. include: Post.includeOptions(),
  60. limit,
  61. order: [['id', 'DESC']]
  62. }
  63. if(from !== null) {
  64. postInclude.where = { id: { $lte: from } }
  65. }
  66. queryObj.include = [postInclude]
  67. let user = await User.findOne(queryObj)
  68. if(!user) throw Errors.accountDoesNotExist
  69. let resUser = user.toJSON()
  70. resUser.meta = {}
  71. let nextId = await pagination.getNextIdDesc(Post, { userId: user.id }, resUser.Posts)
  72. if(nextId === null) {
  73. resUser.meta.nextURL = null
  74. resUser.meta.nextPostsCount = 0
  75. } else {
  76. resUser.meta.nextURL =
  77. `/api/v1/user/${user.username}?posts=true&limit=${limit}&from=${nextId - 1}`
  78. resUser.meta.nextPostsCount = await pagination.getNextCount(
  79. Post, resUser.Posts, limit,
  80. { UserId: user.id },
  81. true
  82. )
  83. }
  84. res.json(resUser)
  85. } else if(req.query.threads) {
  86. let queryString = ''
  87. Object.keys(req.query).forEach(query => {
  88. queryString += `&${query}=${req.query[query]}`
  89. })
  90. res.redirect('/api/v1/category/ALL?username=' + req.params.username + queryString)
  91. } else {
  92. let user = await User.findOne(queryObj)
  93. if(!user) throw Errors.accountDoesNotExist
  94. res.json(user.toJSON())
  95. }
  96. } catch (err) {
  97. if(err === Errors.accountDoesNotExist) {
  98. res.status(400)
  99. res.json({ errors: [err] })
  100. } else {
  101. console.log(err)
  102. res.status(500)
  103. res.json({
  104. errors: [Errors.unknown]
  105. })
  106. }
  107. }
  108. })
  109. router.post('/:username/login', async (req, res) => {
  110. let user, bcryptRes, validationErrors = []
  111. try {
  112. //Validations
  113. if(req.body.password === undefined) {
  114. validationErrors.push(Errors.missingParameter('password'))
  115. } else if(typeof req.body.password !== 'string') {
  116. validationErrors.push(Errors.invalidParameterType('password', 'string'))
  117. }
  118. if(validationErrors.length) throw Errors.VALIDATION_ERROR
  119. user = await User.findOne({
  120. where: {
  121. username: req.params.username,
  122. }
  123. })
  124. if(user) {
  125. bcryptRes = await bcrypt.compare(req.body.password, user.hash)
  126. if(bcryptRes) {
  127. setUserSession(req, res, user.username, user.id, user.admin)
  128. res.json({
  129. username: user.username,
  130. admin: user.admin,
  131. success: true
  132. })
  133. } else {
  134. res.status(401)
  135. res.json({
  136. errors: [Errors.invalidLoginCredentials]
  137. })
  138. }
  139. } else {
  140. res.status(401)
  141. res.json({
  142. errors: [Errors.invalidLoginCredentials]
  143. })
  144. }
  145. } catch (err) {
  146. if(err === Errors.VALIDATION_ERROR) {
  147. res.status(400)
  148. res.json({
  149. errors: validationErrors
  150. })
  151. } else {
  152. console.log(err)
  153. res.status(500)
  154. res.json({
  155. errors: [Errors.unknown]
  156. })
  157. }
  158. }
  159. })
  160. router.post('/:username/logout', async (req, res) => {
  161. req.session.destroy(() => {
  162. res.clearCookie('username')
  163. res.clearCookie('admin')
  164. res.json({
  165. success: true
  166. })
  167. })
  168. })
  169. router.all('*', (req, res, next) => {
  170. if(req.session.username) {
  171. next()
  172. } else {
  173. res.status(401)
  174. res.json({
  175. errors: [Errors.requestNotAuthorized]
  176. })
  177. }
  178. })
  179. router.put('/:username', async (req, res) => {
  180. let validationErrors = []
  181. try {
  182. if(req.session.username !== req.params.username) {
  183. validationErrors.push(Errors.requestNotAuthorized)
  184. throw validationErrors
  185. }
  186. if(req.body.description !== undefined) {
  187. if(typeof req.body.description !== 'string') {
  188. validationErrors.push(Errors.invalidParameterType('description', 'string'))
  189. } else if(req.body.description.length > 1024) {
  190. validationErrors.push(Errors.parameterLengthTooLarge('description', 1024))
  191. }
  192. if(validationErrors.length) throw validationErrors
  193. let user = await User.update({ description: req.body.description }, { where: {
  194. username: req.session.username
  195. }})
  196. res.json({ success: true })
  197. } else if(req.body.newPassword !== undefined) {
  198. if(req.body.currentPassword === undefined) {
  199. validationErrors.push(Errors.missingParameter('current password'))
  200. } if(typeof req.body.currentPassword !== 'string') {
  201. validationErrors.push(Errors.invalidParameterType('currentPassword', 'string'))
  202. } else if(req.body.currentPassword.length < 8) {
  203. validationErrors.push(Errors.parameterLengthTooSmall('current password', 7))
  204. }
  205. if(typeof req.body.newPassword !== 'string') {
  206. validationErrors.push(Errors.invalidParameterType('newPassword', 'string'))
  207. } else {
  208. if(req.body.newPassword.length > 1024) {
  209. validationErrors.push(Errors.parameterLengthTooLarge('new password', 1024))
  210. } if(req.body.newPassword.length < 8) {
  211. validationErrors.push(Errors.parameterLengthTooSmall('new password', 7))
  212. } if(req.body.newPassword === req.body.currentPassword) {
  213. validationErrors.push(Errors.passwordSame)
  214. }
  215. }
  216. if(validationErrors.length) throw validationErrors
  217. let user = await User.findOne({where: {
  218. username: req.session.username
  219. }})
  220. let bcryptRes = await bcrypt.compare(req.body.currentPassword, user.hash)
  221. if(bcryptRes) {
  222. let newHash = await bcrypt.hash(req.body.newPassword, 12)
  223. let user = await User.update({ hash: newHash }, { where: {
  224. username: req.session.username
  225. }})
  226. res.json({ success: true })
  227. } else {
  228. validationErrors.push(Errors.invalidLoginCredentials)
  229. throw validationErrors
  230. }
  231. } else {
  232. res.json({})
  233. }
  234. } catch (e) {
  235. if(validationErrors.length) {
  236. res.status(400)
  237. res.json({ errors: validationErrors })
  238. } else {
  239. console.log(e)
  240. res.status(500)
  241. res.json({errors: Errors.unknown })
  242. }
  243. }
  244. })
  245. router.delete('/:username', async (req, res) => {
  246. let validationErrors = []
  247. try {
  248. if(req.session.username !== req.params.username) {
  249. validationErrors.push(Errors.requestNotAuthorized)
  250. throw validationErrors
  251. }
  252. let user = await User.findOne({ where: {
  253. username: req.session.username
  254. }})
  255. await user.destroy()
  256. req.session.destroy(() => {
  257. res.clearCookie('username')
  258. res.clearCookie('admin')
  259. res.json({ success: true })
  260. })
  261. } catch (e) {
  262. if(validationErrors.length) {
  263. res.status(400)
  264. res.json({ errors: validationErrors })
  265. } else {
  266. console.log(e)
  267. res.status(500)
  268. res.json({errors: Errors.unknown })
  269. }
  270. }
  271. })
  272. module.exports = router