X-Git-Url: https://git.auder.net/?p=vchess.git;a=blobdiff_plain;f=server%2Froutes%2Fusers.js;h=947111342d9b54bf19d09be4b7ee1acfb3e077f3;hp=38c5d744e46dc64cc7ea071050c9e17c3061c2c5;hb=aa6d9b33f70c9baccac98ab41c72d2bd787eac83;hpb=d984579275749c77309722664f7def93066b2096 diff --git a/server/routes/users.js b/server/routes/users.js index 38c5d744..94711134 100644 --- a/server/routes/users.js +++ b/server/routes/users.js @@ -5,6 +5,7 @@ const genToken = require("../utils/tokenGenerator"); const access = require("../utils/access"); const params = require("../config/parameters"); const sanitizeHtml_pkg = require('sanitize-html'); +const { exec } = require("child_process"); const allowedTags = [ 'h3', 'h4', 'h5', 'h6', 'blockquote', 'p', 'a', 'ul', 'ol', 'li', 'b', @@ -73,9 +74,10 @@ router.get("/whoami", access.ajax, (req,res) => { }; if (!req.cookies.token) callback(anonymous); else if (req.cookies.token.match(/^[a-z0-9]+$/)) { - UserModel.getOne("sessionToken", req.cookies.token, (err, user) => { - callback(user || anonymous); - }); + UserModel.getOne( + "sessionToken", req.cookies.token, "name, email, id, notify", + (err, user) => callback(user || anonymous) + ); } }); @@ -126,7 +128,7 @@ router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { const nameOrEmail = decodeURIComponent(req.query.nameOrEmail); const type = (nameOrEmail.indexOf('@') >= 0 ? "email" : "name"); if (UserModel.checkNameEmail({ [type]: nameOrEmail })) { - UserModel.getOne(type, nameOrEmail, (err,user) => { + UserModel.getOne(type, nameOrEmail, "id, name, email", (err, user) => { access.checkRequest(res, err, user, "Unknown user", () => { setAndSendLoginToken("Token for " + params.siteURL, user); res.json({}); @@ -138,29 +140,27 @@ router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { router.get('/authenticate', access.unlogged, access.ajax, (req,res) => { if (!req.query.token.match(/^[a-z0-9]+$/)) return res.json({ errmsg: "Bad token" }); - UserModel.getOne("loginToken", req.query.token, (err,user) => { - access.checkRequest(res, err, user, "Invalid token", () => { - // If token older than params.tokenExpire, do nothing - if (Date.now() > user.loginTime + params.token.expire) - res.json({ errmsg: "Token expired" }); - else { - // Generate session token (if not exists) + destroy login token - UserModel.trySetSessionToken(user.id, (token) => { - res.cookie("token", token, { - httpOnly: true, - secure: !!params.siteURL.match(/^https/), - maxAge: params.cookieExpire, - }); - res.json({ - id: user.id, - name: user.name, - email: user.email, - notify: user.notify + UserModel.getOne( + "loginToken", req.query.token, "id, name, email, notify", + (err,user) => { + access.checkRequest(res, err, user, "Invalid token", () => { + // If token older than params.tokenExpire, do nothing + if (Date.now() > user.loginTime + params.token.expire) + res.json({ errmsg: "Token expired" }); + else { + // Generate session token (if not exists) + destroy login token + UserModel.trySetSessionToken(user.id, (token) => { + res.cookie("token", token, { + httpOnly: true, + secure: !!params.siteURL.match(/^https/), + maxAge: params.cookieExpire, + }); + res.json(user); }); - }); - } - }); - }); + } + }); + } + ); }); router.get('/logout', access.logged, access.ajax, (req,res) => {