X-Git-Url: https://git.auder.net/?a=blobdiff_plain;f=server%2Froutes%2Fusers.js;h=1d553dba74ecba1e247f273c88b0821fc5dda68a;hb=58e7b94e6e1a8d5721b9211b45c40e65fc13f600;hp=d633d8117c4b5e311cdf99618758ab9c0ca2d5af;hpb=deca03e8aeb7cac9c19b0d43b4642b27299695b5;p=vchess.git diff --git a/server/routes/users.js b/server/routes/users.js index d633d811..1d553dba 100644 --- a/server/routes/users.js +++ b/server/routes/users.js @@ -7,6 +7,7 @@ var genToken = require("../utils/tokenGenerator"); var access = require("../utils/access"); var params = require("../config/parameters"); +// NOTE: this method is safe because the sessionToken must be guessed router.get("/whoami", access.ajax, (req,res) => { const callback = (user) => { return res.json({ @@ -22,11 +23,21 @@ router.get("/whoami", access.ajax, (req,res) => { UserModel.getOne("sessionToken", req.cookies.token, function(err, user) { if (!!err || !user) callback(anonymous); - else (!!user) + else callback(user); }); }); +// NOTE: this method is safe because only IDs and names are returned +router.get("/users", access.ajax, (req,res) => { + const ids = req.query["ids"]; + UserModel.getByIds(ids, (err,users) => { + if (!!err) + return res.json({errmsg: err.toString()}); + return res.json({users:users}); + }); +}); + // to: object user (to who we send an email) function setAndSendLoginToken(subject, to, res) { @@ -36,7 +47,7 @@ function setAndSendLoginToken(subject, to, res) if (!!err) return res.json({errmsg: err.toString()}); const body = - "Hello " + to.name + "!\n" + + "Hello " + to.name + "!\\n" + "Access your account here: " + params.siteURL + "/#/authenticate/" + token + "\\n" + "Token will expire in " + params.token.expire/(1000*60) + " minutes." @@ -81,7 +92,7 @@ router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { router.get('/authenticate', access.unlogged, access.ajax, (req,res) => { UserModel.getOne("loginToken", req.query.token, (err,user) => { access.checkRequest(res, err, user, "Invalid token", () => { - // If token older than params.tokenExpire, do nothing + // If token older than params.tokenExpire, do nothing if (Date.now() > user.loginTime + params.token.expire) return res.json({errmsg: "Token expired"}); // Generate session token (if not exists) + destroy login token