Fix Koopa chess + select only required fields in userMode.getOne()
[vchess.git] / server / routes / users.js
CommitLineData
fe4c7e67
BA
1let router = require("express").Router();
2const UserModel = require('../models/User');
3const sendEmail = require('../utils/mailer');
4const genToken = require("../utils/tokenGenerator");
5const access = require("../utils/access");
6const params = require("../config/parameters");
ad65975c
BA
7const sanitizeHtml_pkg = require('sanitize-html');
8
9const allowedTags = [
10 'h3', 'h4', 'h5', 'h6', 'blockquote', 'p', 'a', 'ul', 'ol', 'li', 'b',
11 'i', 'strong', 'em', 'strike', 'code', 'hr', 'br', 'div', 'table',
12 'thead', 'caption', 'tbody', 'tr', 'th', 'td', 'pre'
13];
14function sanitizeHtml(text) {
15 return sanitizeHtml_pkg(text, { allowedTags: allowedTags });
16}
dd10eb93
BA
17
18router.get("/userbio", access.ajax, (req,res) => {
19 const uid = req.query["id"];
20 if (!!(uid.toString().match(/^[0-9]+$/))) {
21 UserModel.getBio(uid, (err, bio) => {
22 res.json(bio);
23 });
24 }
25});
26
27router.put('/userbio', access.logged, access.ajax, (req,res) => {
28 const bio = sanitizeHtml(req.body.bio);
29 UserModel.setBio(req.userId, bio);
30 res.json({});
31});
8d7e2786 32
866842c3
BA
33router.post('/register', access.unlogged, access.ajax, (req,res) => {
34 const name = req.body.name;
35 const email = req.body.email;
36 const notify = !!req.body.notify;
58aedcd1 37 if (UserModel.checkNameEmail({ name: name, email: email })) {
0234201f
BA
38 UserModel.create(name, email, notify, (err, ret) => {
39 if (!!err) {
f0c68a04
BA
40 const msg = err.code == "SQLITE_CONSTRAINT"
41 ? "User name or email already in use"
42 : "User creation failed. Try again";
58aedcd1 43 res.json({ errmsg: msg });
80b38d46
BA
44 }
45 else {
866842c3 46 const user = {
0234201f 47 id: ret.id,
866842c3 48 name: name,
58aedcd1 49 email: email
866842c3 50 };
d9845792 51 setAndSendLoginToken("Welcome to " + params.siteURL, user);
866842c3
BA
52 res.json({});
53 }
54 });
55 }
56});
57
58e7b94e 58// NOTE: this method is safe because the sessionToken must be guessed
e57c4de4 59router.get("/whoami", access.ajax, (req,res) => {
a7f9f050 60 const callback = (user) => {
866842c3 61 res.json({
a7f9f050
BA
62 name: user.name,
63 email: user.email,
64 id: user.id,
dd10eb93 65 notify: user.notify
a7f9f050
BA
66 });
67 };
5c026d9a
BA
68 const anonymous = {
69 name: "",
70 email: "",
71 id: 0,
dd10eb93 72 notify: false
5c026d9a 73 };
0234201f
BA
74 if (!req.cookies.token) callback(anonymous);
75 else if (req.cookies.token.match(/^[a-z0-9]+$/)) {
fccaa878
BA
76 UserModel.getOne(
77 "sessionToken", req.cookies.token, "name, email, id, notify",
78 (err, user) => callback(user || anonymous)
79 );
866842c3 80 }
a7f9f050
BA
81});
82
58e7b94e 83// NOTE: this method is safe because only IDs and names are returned
bebcc8d4 84router.get("/users", access.ajax, (req,res) => {
ed9c9c37 85 const ids = req.query["ids"];
0234201f 86 // NOTE: slightly too permissive RegExp
d639b82a 87 if (!!ids && !!ids.match(/^([0-9]+,?)+$/)) {
dd10eb93 88 UserModel.getByIds(ids, (err, users) => {
58aedcd1 89 res.json({ users: users });
866842c3
BA
90 });
91 }
92});
93
94router.put('/update', access.logged, access.ajax, (req,res) => {
95 const name = req.body.name;
96 const email = req.body.email;
58aedcd1 97 if (UserModel.checkNameEmail({ name: name, email: email })) {
866842c3
BA
98 const user = {
99 id: req.userId,
100 name: name,
101 email: email,
102 notify: !!req.body.notify,
103 };
104 UserModel.updateSettings(user);
105 res.json({});
106 }
bebcc8d4
BA
107});
108
866842c3
BA
109// Authentication-related methods:
110
c018b304 111// to: object user (to who we send an email)
d9845792 112function setAndSendLoginToken(subject, to) {
dac39588
BA
113 // Set login token and send welcome(back) email with auth link
114 const token = genToken(params.token.length);
866842c3
BA
115 UserModel.setLoginToken(token, to.id);
116 const body =
f53871db 117 "Hello " + to.name + " !" + `
a749972c 118` +
866842c3
BA
119 "Access your account here: " +
120 params.siteURL + "/#/authenticate/" + token + `
a749972c 121` +
866842c3
BA
122 "Token will expire in " + params.token.expire/(1000*60) + " minutes."
123 sendEmail(params.mail.noreply, to.email, subject, body);
8d7e2786
BA
124}
125
8a477a7e 126router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => {
dac39588
BA
127 const nameOrEmail = decodeURIComponent(req.query.nameOrEmail);
128 const type = (nameOrEmail.indexOf('@') >= 0 ? "email" : "name");
58aedcd1 129 if (UserModel.checkNameEmail({ [type]: nameOrEmail })) {
fccaa878 130 UserModel.getOne(type, nameOrEmail, "id, name, email", (err, user) => {
866842c3 131 access.checkRequest(res, err, user, "Unknown user", () => {
d9845792 132 setAndSendLoginToken("Token for " + params.siteURL, user);
866842c3
BA
133 res.json({});
134 });
dac39588 135 });
866842c3 136 }
8d7e2786
BA
137});
138
1aeed627 139router.get('/authenticate', access.unlogged, access.ajax, (req,res) => {
99b7a14c 140 if (!req.query.token.match(/^[a-z0-9]+$/))
58aedcd1 141 return res.json({ errmsg: "Bad token" });
fccaa878
BA
142 UserModel.getOne(
143 "loginToken", req.query.token, "id, name, email, notify",
144 (err,user) => {
145 access.checkRequest(res, err, user, "Invalid token", () => {
146 // If token older than params.tokenExpire, do nothing
147 if (Date.now() > user.loginTime + params.token.expire)
148 res.json({ errmsg: "Token expired" });
149 else {
150 // Generate session token (if not exists) + destroy login token
151 UserModel.trySetSessionToken(user.id, (token) => {
152 res.cookie("token", token, {
153 httpOnly: true,
154 secure: !!params.siteURL.match(/^https/),
155 maxAge: params.cookieExpire,
156 });
157 res.json(user);
866842c3 158 });
fccaa878
BA
159 }
160 });
161 }
162 );
8d7e2786
BA
163});
164
1aeed627 165router.get('/logout', access.logged, access.ajax, (req,res) => {
dac39588
BA
166 res.clearCookie("token");
167 res.json({});
8d7e2786
BA
168});
169
170module.exports = router;