4b5c840a6730976a196b8b8f5c15edc5f370edc8
1 var db
= require("../utils/database");
2 var maild
= require("../utils/mailer.js");
3 var genToken
= require("../utils/tokenGenerator");
4 var params
= require("../config/parameters");
11 * loginToken: token on server only
12 * loginTime: datetime (validity)
13 * sessionToken: token in cookies for authentication
14 * notify: boolean (send email notifications for corr games)
17 // NOTE: parameters are already cleaned (in controller), thus no sanitization here
18 exports
.create = function(name
, email
, notify
, callback
)
20 db
.serialize(function() {
22 "INSERT INTO Users " +
23 "(name, email, notify) VALUES " +
24 "('" + name
+ "', '" + email
+ "', " + notify
+ ")";
25 db
.run(insertQuery
, err
=> {
28 db
.get("SELECT last_insert_rowid() AS rowid", callback
);
33 // Find one user (by id, name, email, or token)
34 exports
.getOne = function(by
, value
, cb
)
36 const delimiter
= (typeof value
=== "string" ? "'" : "");
37 db
.serialize(function() {
41 "WHERE " + by
+ " = " + delimiter
+ value
+ delimiter
;
49 exports
.setLoginToken = function(token
, uid
, cb
)
51 db
.serialize(function() {
54 "SET loginToken = '" + token
+ "', loginTime = " + Date
.now() + " " +
60 // Set session token only if empty (first login)
61 // TODO: weaker security (but avoid to re-login everywhere after each logout)
62 exports
.trySetSessionToken = function(uid
, cb
)
64 // Also empty the login token to invalidate future attempts
65 db
.serialize(function() {
66 const querySessionToken
=
67 "SELECT sessionToken " +
70 db
.get(querySessionToken
, (err
,ret
) => {
73 const token
= ret
.sessionToken
|| genToken(params
.token
.length
);
76 "SET loginToken = NULL" +
77 (!ret
.sessionToken
? (", sessionToken = '" + token
+ "'") : "") + " " +
85 exports
.updateSettings = function(user
, cb
)
87 db
.serialize(function() {
90 "SET name = '" + user
.name
+ "'" +
91 ", email = '" + user
.email
+ "'" +
92 ", notify = " + user
.notify
+ " " +
93 "WHERE id = " + user
.id
;