X-Git-Url: https://git.auder.net/?p=vchess.git;a=blobdiff_plain;f=server%2Froutes%2Fusers.js;h=947111342d9b54bf19d09be4b7ee1acfb3e077f3;hp=fc29730cf0df686ee3cefcbb11001ca0414b7573;hb=aa6d9b33f70c9baccac98ab41c72d2bd787eac83;hpb=5c026d9a2c5546aa5b0d6882ae54cdb7bb36bdeb diff --git a/server/routes/users.js b/server/routes/users.js index fc29730c..94711134 100644 --- a/server/routes/users.js +++ b/server/routes/users.js @@ -4,29 +4,52 @@ const sendEmail = require('../utils/mailer'); const genToken = require("../utils/tokenGenerator"); const access = require("../utils/access"); const params = require("../config/parameters"); +const sanitizeHtml_pkg = require('sanitize-html'); +const { exec } = require("child_process"); + +const allowedTags = [ + 'h3', 'h4', 'h5', 'h6', 'blockquote', 'p', 'a', 'ul', 'ol', 'li', 'b', + 'i', 'strong', 'em', 'strike', 'code', 'hr', 'br', 'div', 'table', + 'thead', 'caption', 'tbody', 'tr', 'th', 'td', 'pre' +]; +function sanitizeHtml(text) { + return sanitizeHtml_pkg(text, { allowedTags: allowedTags }); +} + +router.get("/userbio", access.ajax, (req,res) => { + const uid = req.query["id"]; + if (!!(uid.toString().match(/^[0-9]+$/))) { + UserModel.getBio(uid, (err, bio) => { + res.json(bio); + }); + } +}); + +router.put('/userbio', access.logged, access.ajax, (req,res) => { + const bio = sanitizeHtml(req.body.bio); + UserModel.setBio(req.userId, bio); + res.json({}); +}); router.post('/register', access.unlogged, access.ajax, (req,res) => { const name = req.body.name; const email = req.body.email; const notify = !!req.body.notify; - if (UserModel.checkNameEmail({name: name, email: email})) - { - UserModel.create(name, email, notify, (err,ret) => { - if (err) - { + if (UserModel.checkNameEmail({ name: name, email: email })) { + UserModel.create(name, email, notify, (err, ret) => { + if (!!err) { const msg = err.code == "SQLITE_CONSTRAINT" ? "User name or email already in use" : "User creation failed. Try again"; - res.json({errmsg: msg}); + res.json({ errmsg: msg }); } - else - { + else { const user = { - id: ret.uid, + id: ret.id, name: name, - email: email, + email: email }; - setAndSendLoginToken("Welcome to " + params.siteURL, user, res); + setAndSendLoginToken("Welcome to " + params.siteURL, user); res.json({}); } }); @@ -40,34 +63,31 @@ router.get("/whoami", access.ajax, (req,res) => { name: user.name, email: user.email, id: user.id, - notify: user.notify, - newsRead: user.newsRead + notify: user.notify }); }; const anonymous = { name: "", email: "", id: 0, - notify: false, - newsRead: 0 + notify: false }; - if (!req.cookies.token) - callback(anonymous); - else if (req.cookies.token.match(/^[a-z0-9]+$/)) - { - UserModel.getOne("sessionToken", req.cookies.token, (err, user) => { - callback(user || anonymous); - }); + if (!req.cookies.token) callback(anonymous); + else if (req.cookies.token.match(/^[a-z0-9]+$/)) { + UserModel.getOne( + "sessionToken", req.cookies.token, "name, email, id, notify", + (err, user) => callback(user || anonymous) + ); } }); // NOTE: this method is safe because only IDs and names are returned router.get("/users", access.ajax, (req,res) => { const ids = req.query["ids"]; - if (ids.match(/^([0-9]+,?)+$/)) //NOTE: slightly too permissive - { - UserModel.getByIds(ids, (err,users) => { - res.json({users:users}); + // NOTE: slightly too permissive RegExp + if (!!ids && !!ids.match(/^([0-9]+,?)+$/)) { + UserModel.getByIds(ids, (err, users) => { + res.json({ users: users }); }); } }); @@ -75,8 +95,7 @@ router.get("/users", access.ajax, (req,res) => { router.put('/update', access.logged, access.ajax, (req,res) => { const name = req.body.name; const email = req.body.email; - if (UserModel.checkNameEmail({name: name, email: email})); - { + if (UserModel.checkNameEmail({ name: name, email: email })) { const user = { id: req.userId, name: name, @@ -88,17 +107,10 @@ router.put('/update', access.logged, access.ajax, (req,res) => { } }); -// Special route to update newsRead timestamp: -router.put('/newsread', access.logged, access.ajax, (req,res) => { - UserModel.setNewsRead(req.userId); - res.json({}); -}); - // Authentication-related methods: // to: object user (to who we send an email) -function setAndSendLoginToken(subject, to, res) -{ +function setAndSendLoginToken(subject, to) { // Set login token and send welcome(back) email with auth link const token = genToken(params.token.length); UserModel.setLoginToken(token, to.id); @@ -115,11 +127,10 @@ function setAndSendLoginToken(subject, to, res) router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { const nameOrEmail = decodeURIComponent(req.query.nameOrEmail); const type = (nameOrEmail.indexOf('@') >= 0 ? "email" : "name"); - if (UserModel.checkNameEmail({[type]: nameOrEmail})) - { - UserModel.getOne(type, nameOrEmail, (err,user) => { + if (UserModel.checkNameEmail({ [type]: nameOrEmail })) { + UserModel.getOne(type, nameOrEmail, "id, name, email", (err, user) => { access.checkRequest(res, err, user, "Unknown user", () => { - setAndSendLoginToken("Token for " + params.siteURL, user, res); + setAndSendLoginToken("Token for " + params.siteURL, user); res.json({}); }); }); @@ -128,31 +139,28 @@ router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { router.get('/authenticate', access.unlogged, access.ajax, (req,res) => { if (!req.query.token.match(/^[a-z0-9]+$/)) - return res.json({errmsg: "Bad token"}); - UserModel.getOne("loginToken", req.query.token, (err,user) => { - access.checkRequest(res, err, user, "Invalid token", () => { - // If token older than params.tokenExpire, do nothing - if (Date.now() > user.loginTime + params.token.expire) - res.json({errmsg: "Token expired"}); - else - { - // Generate session token (if not exists) + destroy login token - UserModel.trySetSessionToken(user.id, (token) => { - res.cookie("token", token, { - httpOnly: true, - secure: !!params.siteURL.match(/^https/), - maxAge: params.cookieExpire, + return res.json({ errmsg: "Bad token" }); + UserModel.getOne( + "loginToken", req.query.token, "id, name, email, notify", + (err,user) => { + access.checkRequest(res, err, user, "Invalid token", () => { + // If token older than params.tokenExpire, do nothing + if (Date.now() > user.loginTime + params.token.expire) + res.json({ errmsg: "Token expired" }); + else { + // Generate session token (if not exists) + destroy login token + UserModel.trySetSessionToken(user.id, (token) => { + res.cookie("token", token, { + httpOnly: true, + secure: !!params.siteURL.match(/^https/), + maxAge: params.cookieExpire, + }); + res.json(user); }); - res.json({ - id: user.id, - name: user.name, - email: user.email, - notify: user.notify, - }); - }); - } - }); - }); + } + }); + } + ); }); router.get('/logout', access.logged, access.ajax, (req,res) => {