-var db = require("../utils/database");
-var genToken = require("../utils/tokenGenerator");
-var params = require("../config/parameters");
-var sendEmail = require('../utils/mailer');
+const db = require("../utils/database");
+const genToken = require("../utils/tokenGenerator");
+const params = require("../config/parameters");
+const sendEmail = require('../utils/mailer');
/*
* Structure:
* sessionToken: token in cookies for authentication
* notify: boolean (send email notifications for corr games)
* created: datetime
+ * newsRead: datetime
*/
-const UserModel =
-{
- checkNameEmail: function(o)
- {
- if (typeof o.name === "string")
- {
- if (o.name.length == 0)
- return "Empty name";
- if (!o.name.match(/^[\w]+$/))
- return "Bad characters in name";
- }
- if (typeof o.email === "string")
- {
- if (o.email.length == 0)
- return "Empty email";
- if (!o.email.match(/^[\w.+-]+@[\w.+-]+$/))
- return "Bad characters in email";
- }
- return ""; //NOTE: not required, but more consistent... (?!)
+const UserModel = {
+ checkNameEmail: function(o) {
+ return (
+ (!o.name || !!(o.name.match(/^[\w-]+$/))) &&
+ (!o.email || !!(o.email.match(/^[\w.+-]+@[\w.+-]+$/)))
+ );
},
- // NOTE: parameters are already cleaned (in controller), thus no sanitization here
- create: function(name, email, notify, callback)
- {
+ create: function(name, email, notify, cb) {
db.serialize(function() {
- const insertQuery =
+ const query =
"INSERT INTO Users " +
"(name, email, notify, created) VALUES " +
- "('" + name + "', '" + email + "', " + notify + "," + Date.now() + ")";
- db.run(insertQuery, err => {
- if (!!err)
- return callback(err);
- db.get("SELECT last_insert_rowid() AS rowid", callback);
+ "('" + name + "','" + email + "'," + notify + "," + Date.now() + ")";
+ db.run(query, function(err) {
+ cb(err, { id: this.lastID });
});
});
},
- // Find one user (by id, name, email, or token)
- getOne: function(by, value, cb)
- {
+ // Find one user by id, name, email, or token
+ getOne: function(by, value, cb) {
const delimiter = (typeof value === "string" ? "'" : "");
db.serialize(function() {
const query =
/////////
// MODIFY
- setLoginToken: function(token, uid, cb)
- {
+ setLoginToken: function(token, id) {
+ db.serialize(function() {
+ const query =
+ "UPDATE Users " +
+ "SET loginToken = '" + token + "',loginTime = " + Date.now() + " " +
+ "WHERE id = " + id;
+ db.run(query);
+ });
+ },
+
+ setNewsRead: function(id) {
db.serialize(function() {
const query =
"UPDATE Users " +
- "SET loginToken = '" + token + "', loginTime = " + Date.now() + " " +
- "WHERE id = " + uid;
- db.run(query, cb);
+ "SET newsRead = " + Date.now() + " " +
+ "WHERE id = " + id;
+ db.run(query);
});
},
// Set session token only if empty (first login)
// NOTE: weaker security (but avoid to re-login everywhere after each logout)
// TODO: option would be to reset all tokens periodically, e.g. every 3 months
- trySetSessionToken: function(uid, cb)
- {
- // Also empty the login token to invalidate future attempts
+ trySetSessionToken: function(id, cb) {
db.serialize(function() {
- const querySessionToken =
+ let query =
"SELECT sessionToken " +
"FROM Users " +
- "WHERE id = " + uid;
- db.get(querySessionToken, (err,ret) => {
- if (!!err)
- return cb(err);
+ "WHERE id = " + id;
+ db.get(query, (err,ret) => {
const token = ret.sessionToken || genToken(params.token.length);
- const queryUpdate =
+ query =
"UPDATE Users " +
+ // Also empty the login token to invalidate future attempts
"SET loginToken = NULL" +
(!ret.sessionToken ? (", sessionToken = '" + token + "'") : "") + " " +
- "WHERE id = " + uid;
- db.run(queryUpdate);
- cb(null, token);
+ "WHERE id = " + id;
+ db.run(query);
+ cb(token);
});
});
},
- updateSettings: function(user, cb)
- {
+ updateSettings: function(user) {
db.serialize(function() {
const query =
"UPDATE Users " +
", email = '" + user.email + "'" +
", notify = " + user.notify + " " +
"WHERE id = " + user.id;
- db.run(query, cb);
+ db.run(query);
});
},
/////////////////
// NOTIFICATIONS
- notify: function(user, message)
- {
+ notify: function(user, message) {
const subject = "vchess.club - notification";
- const body = "Hello " + user.name + "!" + `
+ const body = "Hello " + user.name + " !" + `
` + message;
sendEmail(params.mail.noreply, user.email, subject, body);
},
- tryNotify: function(id, message)
- {
+ tryNotify: function(id, message) {
UserModel.getOne("id", id, (err,user) => {
- if (!!err || !user.notify)
- return; //NOTE: error is ignored here
- UserModel.notify(user, message);
+ if (!err && user.notify) UserModel.notify(user, message);
});
},
////////////
// CLEANING
- cleanUsersDb: function()
- {
+ cleanUsersDb: function() {
const tsNow = Date.now();
// 86400000 = 24 hours in milliseconds
const day = 86400000;
db.serialize(function() {
const query =
- "SELECT id, sessionToken, created " +
+ "SELECT id, sessionToken, created, name, email " +
"FROM Users";
db.all(query, (err, users) => {
+ let toRemove = [];
users.forEach(u => {
- // Remove unlogged users for >1 day
+ // Remove users unlogged for > 24h
if (!u.sessionToken && tsNow - u.created > day)
- db.run("DELETE FROM Users WHERE id = " + u.id);
+ {
+ UserModel.notify(
+ u,
+ "Your account has been deleted because " +
+ "you didn't log in for 24h after registration"
+ );
+ }
});
+ if (toRemove.length > 0) {
+ db.run(
+ "DELETE FROM Users " +
+ "WHERE id IN (" + toRemove.join(",") + ")"
+ );
+ }
});
});
},