users.js 41 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335
  1. 'use strict';
  2. const async = require('async');
  3. const config = require('config');
  4. const request = require('request');
  5. const bcrypt = require('bcrypt');
  6. const sha256 = require('sha256');
  7. const hooks = require('./hooks');
  8. const moduleManager = require("../../index");
  9. const db = moduleManager.modules["db"];
  10. const mail = moduleManager.modules["mail"];
  11. const cache = moduleManager.modules["cache"];
  12. const punishments = moduleManager.modules["punishments"];
  13. const utils = moduleManager.modules["utils"];
  14. const logger = moduleManager.modules["logger"];
  15. const activities = moduleManager.modules["activities"];
  16. cache.sub('user.updateUsername', user => {
  17. utils.socketsFromUser(user._id, sockets => {
  18. sockets.forEach(socket => {
  19. socket.emit('event:user.username.changed', user.username);
  20. });
  21. });
  22. });
  23. cache.sub('user.removeSessions', userId => {
  24. utils.socketsFromUserWithoutCache(userId, sockets => {
  25. sockets.forEach(socket => {
  26. socket.emit('keep.event:user.session.removed');
  27. });
  28. });
  29. });
  30. cache.sub('user.linkPassword', userId => {
  31. utils.socketsFromUser(userId, sockets => {
  32. sockets.forEach(socket => {
  33. socket.emit('event:user.linkPassword');
  34. });
  35. });
  36. });
  37. cache.sub('user.linkGitHub', userId => {
  38. utils.socketsFromUser(userId, sockets => {
  39. sockets.forEach(socket => {
  40. socket.emit('event:user.linkGitHub');
  41. });
  42. });
  43. });
  44. cache.sub('user.unlinkPassword', userId => {
  45. utils.socketsFromUser(userId, sockets => {
  46. sockets.forEach(socket => {
  47. socket.emit('event:user.unlinkPassword');
  48. });
  49. });
  50. });
  51. cache.sub('user.unlinkGitHub', userId => {
  52. utils.socketsFromUser(userId, sockets => {
  53. sockets.forEach(socket => {
  54. socket.emit('event:user.unlinkGitHub');
  55. });
  56. });
  57. });
  58. cache.sub('user.ban', data => {
  59. utils.socketsFromUser(data.userId, sockets => {
  60. sockets.forEach(socket => {
  61. socket.emit('keep.event:banned', data.punishment);
  62. socket.disconnect(true);
  63. });
  64. });
  65. });
  66. cache.sub('user.favoritedStation', data => {
  67. utils.socketsFromUser(data.userId, sockets => {
  68. sockets.forEach(socket => {
  69. socket.emit('event:user.favoritedStation', data.stationId);
  70. });
  71. });
  72. });
  73. cache.sub('user.unfavoritedStation', data => {
  74. utils.socketsFromUser(data.userId, sockets => {
  75. sockets.forEach(socket => {
  76. socket.emit('event:user.unfavoritedStation', data.stationId);
  77. });
  78. });
  79. });
  80. module.exports = {
  81. /**
  82. * Lists all Users
  83. *
  84. * @param {Object} session - the session object automatically added by socket.io
  85. * @param {Function} cb - gets called with the result
  86. */
  87. index: hooks.adminRequired((session, cb) => {
  88. async.waterfall([
  89. (next) => {
  90. db.models.user.find({}).exec(next);
  91. }
  92. ], async (err, users) => {
  93. if (err) {
  94. err = await utils.getError(err);
  95. logger.error("USER_INDEX", `Indexing users failed. "${err}"`);
  96. return cb({status: 'failure', message: err});
  97. } else {
  98. logger.success("USER_INDEX", `Indexing users successful.`);
  99. let filteredUsers = [];
  100. users.forEach(user => {
  101. filteredUsers.push({
  102. _id: user._id,
  103. username: user.username,
  104. role: user.role,
  105. liked: user.liked,
  106. disliked: user.disliked,
  107. songsRequested: user.statistics.songsRequested,
  108. email: {
  109. address: user.email.address,
  110. verified: user.email.verified
  111. },
  112. hasPassword: !!user.services.password,
  113. services: { github: user.services.github }
  114. });
  115. });
  116. return cb({ status: 'success', data: filteredUsers });
  117. }
  118. });
  119. }),
  120. /**
  121. * Logs user in
  122. *
  123. * @param {Object} session - the session object automatically added by socket.io
  124. * @param {String} identifier - the email of the user
  125. * @param {String} password - the plaintext of the user
  126. * @param {Function} cb - gets called with the result
  127. */
  128. login: (session, identifier, password, cb) => {
  129. identifier = identifier.toLowerCase();
  130. async.waterfall([
  131. // check if a user with the requested identifier exists
  132. (next) => {
  133. db.models.user.findOne({
  134. $or: [{ 'email.address': identifier }]
  135. }, next)
  136. },
  137. // if the user doesn't exist, respond with a failure
  138. // otherwise compare the requested password and the actual users password
  139. (user, next) => {
  140. if (!user) return next('User not found');
  141. if (!user.services.password || !user.services.password.password) return next('The account you are trying to access uses GitHub to log in.');
  142. bcrypt.compare(sha256(password), user.services.password.password, (err, match) => {
  143. if (err) return next(err);
  144. if (!match) return next('Incorrect password');
  145. next(null, user);
  146. });
  147. },
  148. (user, next) => {
  149. utils.guid().then((sessionId) => {
  150. next(null, user, sessionId);
  151. });
  152. },
  153. (user, sessionId, next) => {
  154. cache.hset('sessions', sessionId, cache.schemas.session(sessionId, user._id), (err) => {
  155. if (err) return next(err);
  156. next(null, sessionId);
  157. });
  158. }
  159. ], async (err, sessionId) => {
  160. if (err && err !== true) {
  161. err = await utils.getError(err);
  162. logger.error("USER_PASSWORD_LOGIN", `Login failed with password for user "${identifier}". "${err}"`);
  163. return cb({status: 'failure', message: err});
  164. }
  165. logger.success("USER_PASSWORD_LOGIN", `Login successful with password for user "${identifier}"`);
  166. cb({ status: 'success', message: 'Login successful', user: {}, SID: sessionId });
  167. });
  168. },
  169. /**
  170. * Registers a new user
  171. *
  172. * @param {Object} session - the session object automatically added by socket.io
  173. * @param {String} username - the username for the new user
  174. * @param {String} email - the email for the new user
  175. * @param {String} password - the plaintext password for the new user
  176. * @param {Object} recaptcha - the recaptcha data
  177. * @param {Function} cb - gets called with the result
  178. */
  179. register: async function(session, username, email, password, recaptcha, cb) {
  180. email = email.toLowerCase();
  181. let verificationToken = await utils.generateRandomString(64);
  182. async.waterfall([
  183. // verify the request with google recaptcha
  184. (next) => {
  185. if (!db.passwordValid(password)) return next('Invalid password. Check if it meets all the requirements.');
  186. return next();
  187. },
  188. (next) => {
  189. request({
  190. url: 'https://www.google.com/recaptcha/api/siteverify',
  191. method: 'POST',
  192. form: {
  193. 'secret': config.get("apis").recaptcha.secret,
  194. 'response': recaptcha
  195. }
  196. }, next);
  197. },
  198. // check if the response from Google recaptcha is successful
  199. // if it is, we check if a user with the requested username already exists
  200. (response, body, next) => {
  201. let json = JSON.parse(body);
  202. if (json.success !== true) return next('Response from recaptcha was not successful.');
  203. db.models.user.findOne({ username: new RegExp(`^${username}$`, 'i') }, next);
  204. },
  205. // if the user already exists, respond with that
  206. // otherwise check if a user with the requested email already exists
  207. (user, next) => {
  208. if (user) return next('A user with that username already exists.');
  209. db.models.user.findOne({ 'email.address': email }, next);
  210. },
  211. // if the user already exists, respond with that
  212. // otherwise, generate a salt to use with hashing the new users password
  213. (user, next) => {
  214. if (user) return next('A user with that email already exists.');
  215. bcrypt.genSalt(10, next);
  216. },
  217. // hash the password
  218. (salt, next) => {
  219. bcrypt.hash(sha256(password), salt, next)
  220. },
  221. (hash, next) => {
  222. utils.generateRandomString(12).then((_id) => {
  223. next(null, hash, _id);
  224. });
  225. },
  226. // create the user object
  227. (hash, _id, next) => {
  228. next(null, {
  229. _id,
  230. username,
  231. email: {
  232. address: email,
  233. verificationToken
  234. },
  235. services: {
  236. password: {
  237. password: hash
  238. }
  239. }
  240. });
  241. },
  242. // generate the url for gravatar avatar
  243. (user, next) => {
  244. this.utils.createGravatar(user.email.address).then(url => {
  245. user.avatar = url;
  246. next(null, user);
  247. });
  248. },
  249. // save the new user to the database
  250. (user, next) => {
  251. db.models.user.create(user, next);
  252. },
  253. // respond with the new user
  254. (newUser, next) => {
  255. mail.schemas.verifyEmail(email, username, verificationToken, () => {
  256. next(newUser);
  257. });
  258. }
  259. ], async (user, err) => {
  260. if (err && err !== true) {
  261. err = await utils.getError(err);
  262. logger.error("USER_PASSWORD_REGISTER", `Register failed with password for user "${username}"."${err}"`);
  263. return cb({status: 'failure', message: err});
  264. } else {
  265. module.exports.login(session, email, password, (result) => {
  266. let obj = {status: 'success', message: 'Successfully registered.'};
  267. if (result.status === 'success') {
  268. obj.SID = result.SID;
  269. }
  270. activities.addActivity(user._id, "created_account");
  271. logger.success("USER_PASSWORD_REGISTER", `Register successful with password for user "${username}".`);
  272. return cb(obj);
  273. });
  274. }
  275. });
  276. },
  277. /**
  278. * Logs out a user
  279. *
  280. * @param {Object} session - the session object automatically added by socket.io
  281. * @param {Function} cb - gets called with the result
  282. */
  283. logout: (session, cb) => {
  284. async.waterfall([
  285. (next) => {
  286. cache.hget('sessions', session.sessionId, next);
  287. },
  288. (session, next) => {
  289. if (!session) return next('Session not found');
  290. next(null, session);
  291. },
  292. (session, next) => {
  293. cache.hdel('sessions', session.sessionId, next);
  294. }
  295. ], async (err) => {
  296. if (err && err !== true) {
  297. err = await utils.getError(err);
  298. logger.error("USER_LOGOUT", `Logout failed. "${err}" `);
  299. cb({ status: 'failure', message: err });
  300. } else {
  301. logger.success("USER_LOGOUT", `Logout successful.`);
  302. cb({ status: 'success', message: 'Successfully logged out.' });
  303. }
  304. });
  305. },
  306. /**
  307. * Removes all sessions for a user
  308. *
  309. * @param {Object} session - the session object automatically added by socket.io
  310. * @param {String} userId - the id of the user we are trying to delete the sessions of
  311. * @param {Function} cb - gets called with the result
  312. */
  313. removeSessions: hooks.loginRequired((session, userId, cb) => {
  314. async.waterfall([
  315. (next) => {
  316. db.models.user.findOne({ _id: session.userId }, (err, user) => {
  317. if (err) return next(err);
  318. if (user.role !== 'admin' && session.userId !== userId) return next('Only admins and the owner of the account can remove their sessions.');
  319. else return next();
  320. });
  321. },
  322. (next) => {
  323. cache.hgetall('sessions', next);
  324. },
  325. (sessions, next) => {
  326. if (!sessions) return next('There are no sessions for this user to remove.');
  327. else {
  328. let keys = Object.keys(sessions);
  329. next(null, keys, sessions);
  330. }
  331. },
  332. (keys, sessions, next) => {
  333. cache.pub('user.removeSessions', userId);
  334. async.each(keys, (sessionId, callback) => {
  335. let session = sessions[sessionId];
  336. if (session.userId === userId) {
  337. cache.hdel('sessions', sessionId, err => {
  338. if (err) return callback(err);
  339. else callback(null);
  340. });
  341. }
  342. }, err => {
  343. next(err);
  344. });
  345. }
  346. ], async err => {
  347. if (err) {
  348. err = await utils.getError(err);
  349. logger.error("REMOVE_SESSIONS_FOR_USER", `Couldn't remove all sessions for user "${userId}". "${err}"`);
  350. return cb({ status: 'failure', message: err });
  351. } else {
  352. logger.success("REMOVE_SESSIONS_FOR_USER", `Removed all sessions for user "${userId}".`);
  353. return cb({ status: 'success', message: 'Successfully removed all sessions.' });
  354. }
  355. });
  356. }),
  357. /**
  358. * Gets user object from username (only a few properties)
  359. *
  360. * @param {Object} session - the session object automatically added by socket.io
  361. * @param {String} username - the username of the user we are trying to find
  362. * @param {Function} cb - gets called with the result
  363. */
  364. findByUsername: (session, username, cb) => {
  365. async.waterfall([
  366. (next) => {
  367. db.models.user.findOne({ username: new RegExp(`^${username}$`, 'i') }, next);
  368. },
  369. (account, next) => {
  370. if (!account) return next('User not found.');
  371. next(null, account);
  372. }
  373. ], async (err, account) => {
  374. if (err && err !== true) {
  375. err = await utils.getError(err);
  376. logger.error("FIND_BY_USERNAME", `User not found for username "${username}". "${err}"`);
  377. cb({status: 'failure', message: err});
  378. } else {
  379. logger.success("FIND_BY_USERNAME", `User found for username "${username}".`);
  380. return cb({
  381. status: 'success',
  382. data: {
  383. _id: account._id,
  384. name: account.name,
  385. username: account.username,
  386. location: account.location,
  387. bio: account.bio,
  388. role: account.role,
  389. avatar: account.avatar,
  390. createdAt: account.createdAt
  391. }
  392. });
  393. }
  394. });
  395. },
  396. /**
  397. * Gets a username from an userId
  398. *
  399. * @param {Object} session - the session object automatically added by socket.io
  400. * @param {String} userId - the userId of the person we are trying to get the username from
  401. * @param {Function} cb - gets called with the result
  402. */
  403. getUsernameFromId: (session, userId, cb) => {
  404. db.models.user.findById(userId).then(user => {
  405. if (user) {
  406. logger.success("GET_USERNAME_FROM_ID", `Found username for userId "${userId}".`);
  407. return cb({
  408. status: 'success',
  409. data: user.username
  410. });
  411. } else {
  412. logger.error("GET_USERNAME_FROM_ID", `Getting the username from userId "${userId}" failed. User not found.`);
  413. cb({
  414. status: 'failure',
  415. message: "Couldn't find the user."
  416. });
  417. }
  418. }).catch(async err => {
  419. if (err && err !== true) {
  420. err = await utils.getError(err);
  421. logger.error("GET_USERNAME_FROM_ID", `Getting the username from userId "${userId}" failed. "${err}"`);
  422. cb({ status: 'failure', message: err });
  423. }
  424. });
  425. },
  426. //TODO Fix security issues
  427. /**
  428. * Gets user info from session
  429. *
  430. * @param {Object} session - the session object automatically added by socket.io
  431. * @param {Function} cb - gets called with the result
  432. */
  433. findBySession: (session, cb) => {
  434. async.waterfall([
  435. (next) => {
  436. cache.hget('sessions', session.sessionId, next);
  437. },
  438. (session, next) => {
  439. if (!session) return next('Session not found.');
  440. next(null, session);
  441. },
  442. (session, next) => {
  443. db.models.user.findOne({ _id: session.userId }, next);
  444. },
  445. (user, next) => {
  446. if (!user) return next('User not found.');
  447. next(null, user);
  448. }
  449. ], async (err, user) => {
  450. if (err && err !== true) {
  451. err = await utils.getError(err);
  452. logger.error("FIND_BY_SESSION", `User not found. "${err}"`);
  453. cb({ status: 'failure', message: err });
  454. } else {
  455. let data = {
  456. email: {
  457. address: user.email.address
  458. },
  459. avatar: user.avatar,
  460. username: user.username,
  461. name: user.name,
  462. location: user.location,
  463. bio: user.bio
  464. };
  465. if (user.services.password && user.services.password.password) data.password = true;
  466. if (user.services.github && user.services.github.id) data.github = true;
  467. logger.success("FIND_BY_SESSION", `User found. "${user.username}".`);
  468. return cb({
  469. status: 'success',
  470. data
  471. });
  472. }
  473. });
  474. },
  475. /**
  476. * Updates a user's username
  477. *
  478. * @param {Object} session - the session object automatically added by socket.io
  479. * @param {String} updatingUserId - the updating user's id
  480. * @param {String} newUsername - the new username
  481. * @param {Function} cb - gets called with the result
  482. */
  483. updateUsername: hooks.loginRequired((session, updatingUserId, newUsername, cb) => {
  484. async.waterfall([
  485. (next) => {
  486. if (updatingUserId === session.userId) return next(null, true);
  487. db.models.user.findOne({_id: session.userId}, next);
  488. },
  489. (user, next) => {
  490. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  491. db.models.user.findOne({ _id: updatingUserId }, next);
  492. },
  493. (user, next) => {
  494. if (!user) return next('User not found.');
  495. if (user.username === newUsername) return next('New username can\'t be the same as the old username.');
  496. next(null);
  497. },
  498. (next) => {
  499. db.models.user.findOne({ username: new RegExp(`^${newUsername}$`, 'i') }, next);
  500. },
  501. (user, next) => {
  502. if (!user) return next();
  503. if (user._id === updatingUserId) return next();
  504. next('That username is already in use.');
  505. },
  506. (next) => {
  507. db.models.user.updateOne({ _id: updatingUserId }, {$set: {username: newUsername}}, {runValidators: true}, next);
  508. }
  509. ], async (err) => {
  510. if (err && err !== true) {
  511. err = await utils.getError(err);
  512. logger.error("UPDATE_USERNAME", `Couldn't update username for user "${updatingUserId}" to username "${newUsername}". "${err}"`);
  513. cb({status: 'failure', message: err});
  514. } else {
  515. cache.pub('user.updateUsername', {
  516. username: newUsername,
  517. _id: updatingUserId
  518. });
  519. logger.success("UPDATE_USERNAME", `Updated username for user "${updatingUserId}" to username "${newUsername}".`);
  520. cb({ status: 'success', message: 'Username updated successfully' });
  521. }
  522. });
  523. }),
  524. /**
  525. * Updates a user's email
  526. *
  527. * @param {Object} session - the session object automatically added by socket.io
  528. * @param {String} updatingUserId - the updating user's id
  529. * @param {String} newEmail - the new email
  530. * @param {Function} cb - gets called with the result
  531. */
  532. updateEmail: hooks.loginRequired(async (session, updatingUserId, newEmail, cb) => {
  533. newEmail = newEmail.toLowerCase();
  534. let verificationToken = await utils.generateRandomString(64);
  535. async.waterfall([
  536. (next) => {
  537. if (updatingUserId === session.userId) return next(null, true);
  538. db.models.user.findOne({_id: session.userId}, next);
  539. },
  540. (user, next) => {
  541. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  542. db.models.user.findOne({ _id: updatingUserId }, next);
  543. },
  544. (user, next) => {
  545. if (!user) return next('User not found.');
  546. if (user.email.address === newEmail) return next('New email can\'t be the same as your the old email.');
  547. next();
  548. },
  549. (next) => {
  550. db.models.user.findOne({"email.address": newEmail}, next);
  551. },
  552. (user, next) => {
  553. if (!user) return next();
  554. if (user._id === updatingUserId) return next();
  555. next('That email is already in use.');
  556. },
  557. // regenerate the url for gravatar avatar
  558. (next) => {
  559. utils.createGravatar(newEmail).then(url => next(null, url));
  560. },
  561. (avatar, next) => {
  562. db.models.user.updateOne({ _id: updatingUserId }, {
  563. $set: {
  564. "avatar": avatar,
  565. "email.address": newEmail,
  566. "email.verified": false,
  567. "email.verificationToken": verificationToken
  568. }
  569. }, { runValidators: true }, next);
  570. },
  571. (res, next) => {
  572. db.models.user.findOne({ _id: updatingUserId }, next);
  573. },
  574. (user, next) => {
  575. mail.schemas.verifyEmail(newEmail, user.username, verificationToken, () => {
  576. next();
  577. });
  578. }
  579. ], async (err) => {
  580. if (err && err !== true) {
  581. err = await utils.getError(err);
  582. logger.error("UPDATE_EMAIL", `Couldn't update email for user "${updatingUserId}" to email "${newEmail}". '${err}'`);
  583. cb({status: 'failure', message: err});
  584. } else {
  585. logger.success("UPDATE_EMAIL", `Updated email for user "${updatingUserId}" to email "${newEmail}".`);
  586. cb({ status: 'success', message: 'Email updated successfully.' });
  587. }
  588. });
  589. }),
  590. /**
  591. * Updates a user's name
  592. *
  593. * @param {Object} session - the session object automatically added by socket.io
  594. * @param {String} updatingUserId - the updating user's id
  595. * @param {String} newBio - the new name
  596. * @param {Function} cb - gets called with the result
  597. */
  598. updateName: hooks.loginRequired((session, updatingUserId, newName, cb) => {
  599. async.waterfall([
  600. (next) => {
  601. if (updatingUserId === session.userId) return next(null, true);
  602. db.models.user.findOne({_id: session.userId}, next);
  603. },
  604. (user, next) => {
  605. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  606. db.models.user.findOne({ _id: updatingUserId }, next);
  607. },
  608. (user, next) => {
  609. if (!user) return next('User not found.');
  610. db.models.user.updateOne({ _id: updatingUserId }, {$set: { name: newName }}, {runValidators: true}, next);
  611. }
  612. ], async (err) => {
  613. if (err && err !== true) {
  614. err = await utils.getError(err);
  615. logger.error("UPDATE_NAME", `Couldn't update name for user "${updatingUserId}" to name "${newName}". "${err}"`);
  616. cb({status: 'failure', message: err});
  617. } else {
  618. logger.success("UPDATE_NAME", `Updated name for user "${updatingUserId}" to name "${newName}".`);
  619. cb({ status: 'success', message: 'Name updated successfully' });
  620. }
  621. });
  622. }),
  623. /**
  624. * Updates a user's location
  625. *
  626. * @param {Object} session - the session object automatically added by socket.io
  627. * @param {String} updatingUserId - the updating user's id
  628. * @param {String} newLocation - the new location
  629. * @param {Function} cb - gets called with the result
  630. */
  631. updateLocation: hooks.loginRequired((session, updatingUserId, newLocation, cb) => {
  632. async.waterfall([
  633. (next) => {
  634. if (updatingUserId === session.userId) return next(null, true);
  635. db.models.user.findOne({_id: session.userId}, next);
  636. },
  637. (user, next) => {
  638. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  639. db.models.user.findOne({ _id: updatingUserId }, next);
  640. },
  641. (user, next) => {
  642. if (!user) return next('User not found.');
  643. db.models.user.updateOne({ _id: updatingUserId }, {$set: {location: newLocation}}, {runValidators: true}, next);
  644. }
  645. ], async (err) => {
  646. if (err && err !== true) {
  647. err = await utils.getError(err);
  648. logger.error("UPDATE_LOCATION", `Couldn't update location for user "${updatingUserId}" to location "${newLocation}". "${err}"`);
  649. cb({status: 'failure', message: err});
  650. } else {
  651. logger.success("UPDATE_LOCATION", `Updated location for user "${updatingUserId}" to location "${newLocation}".`);
  652. cb({ status: 'success', message: 'Location updated successfully' });
  653. }
  654. });
  655. }),
  656. /**
  657. * Updates a user's bio
  658. *
  659. * @param {Object} session - the session object automatically added by socket.io
  660. * @param {String} updatingUserId - the updating user's id
  661. * @param {String} newBio - the new bio
  662. * @param {Function} cb - gets called with the result
  663. */
  664. updateBio: hooks.loginRequired((session, updatingUserId, newBio, cb) => {
  665. async.waterfall([
  666. (next) => {
  667. if (updatingUserId === session.userId) return next(null, true);
  668. db.models.user.findOne({_id: session.userId}, next);
  669. },
  670. (user, next) => {
  671. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  672. db.models.user.findOne({ _id: updatingUserId }, next);
  673. },
  674. (user, next) => {
  675. if (!user) return next('User not found.');
  676. db.models.user.updateOne({ _id: updatingUserId }, {$set: {bio: newBio}}, {runValidators: true}, next);
  677. }
  678. ], async (err) => {
  679. if (err && err !== true) {
  680. err = await utils.getError(err);
  681. logger.error("UPDATE_BIO", `Couldn't update bio for user "${updatingUserId}" to bio "${newBio}". "${err}"`);
  682. cb({status: 'failure', message: err});
  683. } else {
  684. logger.success("UPDATE_BIO", `Updated bio for user "${updatingUserId}" to bio "${newBio}".`);
  685. cb({ status: 'success', message: 'Bio updated successfully' });
  686. }
  687. });
  688. }),
  689. /**
  690. * Updates the type of a user's avatar
  691. *
  692. * @param {Object} session - the session object automatically added by socket.io
  693. * @param {String} updatingUserId - the updating user's id
  694. * @param {String} newType - the new type
  695. * @param {Function} cb - gets called with the result
  696. */
  697. updateAvatarType: hooks.loginRequired((session, updatingUserId, newType, cb) => {
  698. async.waterfall([
  699. (next) => {
  700. if (updatingUserId === session.userId) return next(null, true);
  701. db.models.user.findOne({ _id: session.userId }, next);
  702. },
  703. (user, next) => {
  704. if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');
  705. db.models.user.findOne({ _id: updatingUserId }, next);
  706. },
  707. (user, next) => {
  708. if (!user) return next('User not found.');
  709. db.models.user.updateOne({ _id: updatingUserId }, {$set: { "avatar.type": newType }}, { runValidators: true }, next);
  710. }
  711. ], async (err) => {
  712. if (err && err !== true) {
  713. err = await utils.getError(err);
  714. logger.error("UPDATE_AVATAR_TYPE", `Couldn't update avatar type for user "${updatingUserId}" to type "${newType}". "${err}"`);
  715. cb({ status: 'failure', message: err });
  716. } else {
  717. logger.success("UPDATE_AVATAR_TYPE", `Updated avatar type for user "${updatingUserId}" to type "${newType}".`);
  718. cb({ status: 'success', message: 'Avatar type updated successfully' });
  719. }
  720. });
  721. }),
  722. /**
  723. * Updates a user's role
  724. *
  725. * @param {Object} session - the session object automatically added by socket.io
  726. * @param {String} updatingUserId - the updating user's id
  727. * @param {String} newRole - the new role
  728. * @param {Function} cb - gets called with the result
  729. */
  730. updateRole: hooks.adminRequired((session, updatingUserId, newRole, cb) => {
  731. newRole = newRole.toLowerCase();
  732. async.waterfall([
  733. (next) => {
  734. db.models.user.findOne({ _id: updatingUserId }, next);
  735. },
  736. (user, next) => {
  737. if (!user) return next('User not found.');
  738. else if (user.role === newRole) return next('New role can\'t be the same as the old role.');
  739. else return next();
  740. },
  741. (next) => {
  742. db.models.user.updateOne({_id: updatingUserId}, {$set: {role: newRole}}, {runValidators: true}, next);
  743. }
  744. ], async (err) => {
  745. if (err && err !== true) {
  746. err = await utils.getError(err);
  747. logger.error("UPDATE_ROLE", `User "${session.userId}" couldn't update role for user "${updatingUserId}" to role "${newRole}". "${err}"`);
  748. cb({status: 'failure', message: err});
  749. } else {
  750. logger.success("UPDATE_ROLE", `User "${session.userId}" updated the role of user "${updatingUserId}" to role "${newRole}".`);
  751. cb({
  752. status: 'success',
  753. message: 'Role successfully updated.'
  754. });
  755. }
  756. });
  757. }),
  758. /**
  759. * Updates a user's password
  760. *
  761. * @param {Object} session - the session object automatically added by socket.io
  762. * @param {String} newPassword - the new password
  763. * @param {Function} cb - gets called with the result
  764. */
  765. updatePassword: hooks.loginRequired((session, newPassword, cb) => {
  766. async.waterfall([
  767. (next) => {
  768. db.models.user.findOne({_id: session.userId}, next);
  769. },
  770. (user, next) => {
  771. if (!user.services.password) return next('This account does not have a password set.');
  772. next();
  773. },
  774. (next) => {
  775. if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');
  776. return next();
  777. },
  778. (next) => {
  779. bcrypt.genSalt(10, next);
  780. },
  781. // hash the password
  782. (salt, next) => {
  783. bcrypt.hash(sha256(newPassword), salt, next);
  784. },
  785. (hashedPassword, next) => {
  786. db.models.user.updateOne({_id: session.userId}, {$set: {"services.password.password": hashedPassword}}, next);
  787. }
  788. ], async (err) => {
  789. if (err) {
  790. err = await utils.getError(err);
  791. logger.error("UPDATE_PASSWORD", `Failed updating user password of user '${session.userId}'. '${err}'.`);
  792. return cb({ status: 'failure', message: err });
  793. }
  794. logger.success("UPDATE_PASSWORD", `User '${session.userId}' updated their password.`);
  795. cb({
  796. status: 'success',
  797. message: 'Password successfully updated.'
  798. });
  799. });
  800. }),
  801. /**
  802. * Requests a password for a session
  803. *
  804. * @param {Object} session - the session object automatically added by socket.io
  805. * @param {String} email - the email of the user that requests a password reset
  806. * @param {Function} cb - gets called with the result
  807. */
  808. requestPassword: hooks.loginRequired(async (session, cb) => {
  809. let code = await utils.generateRandomString(8);
  810. async.waterfall([
  811. (next) => {
  812. db.models.user.findOne({_id: session.userId}, next);
  813. },
  814. (user, next) => {
  815. if (!user) return next('User not found.');
  816. if (user.services.password && user.services.password.password) return next('You already have a password set.');
  817. next(null, user);
  818. },
  819. (user, next) => {
  820. let expires = new Date();
  821. expires.setDate(expires.getDate() + 1);
  822. db.models.user.findOneAndUpdate({"email.address": user.email.address}, {$set: {"services.password": {set: {code: code, expires}}}}, {runValidators: true}, next);
  823. },
  824. (user, next) => {
  825. mail.schemas.passwordRequest(user.email.address, user.username, code, next);
  826. }
  827. ], async (err) => {
  828. if (err && err !== true) {
  829. err = await utils.getError(err);
  830. logger.error("REQUEST_PASSWORD", `UserId '${session.userId}' failed to request password. '${err}'`);
  831. cb({status: 'failure', message: err});
  832. } else {
  833. logger.success("REQUEST_PASSWORD", `UserId '${session.userId}' successfully requested a password.`);
  834. cb({
  835. status: 'success',
  836. message: 'Successfully requested password.'
  837. });
  838. }
  839. });
  840. }),
  841. /**
  842. * Verifies a password code
  843. *
  844. * @param {Object} session - the session object automatically added by socket.io
  845. * @param {String} code - the password code
  846. * @param {Function} cb - gets called with the result
  847. */
  848. verifyPasswordCode: hooks.loginRequired((session, code, cb) => {
  849. async.waterfall([
  850. (next) => {
  851. if (!code || typeof code !== 'string') return next('Invalid code1.');
  852. db.models.user.findOne({"services.password.set.code": code, _id: session.userId}, next);
  853. },
  854. (user, next) => {
  855. if (!user) return next('Invalid code2.');
  856. if (user.services.password.set.expires < new Date()) return next('That code has expired.');
  857. next(null);
  858. }
  859. ], async(err) => {
  860. if (err && err !== true) {
  861. err = await utils.getError(err);
  862. logger.error("VERIFY_PASSWORD_CODE", `Code '${code}' failed to verify. '${err}'`);
  863. cb({status: 'failure', message: err});
  864. } else {
  865. logger.success("VERIFY_PASSWORD_CODE", `Code '${code}' successfully verified.`);
  866. cb({
  867. status: 'success',
  868. message: 'Successfully verified password code.'
  869. });
  870. }
  871. });
  872. }),
  873. /**
  874. * Adds a password to a user with a code
  875. *
  876. * @param {Object} session - the session object automatically added by socket.io
  877. * @param {String} code - the password code
  878. * @param {String} newPassword - the new password code
  879. * @param {Function} cb - gets called with the result
  880. */
  881. changePasswordWithCode: hooks.loginRequired((session, code, newPassword, cb) => {
  882. async.waterfall([
  883. (next) => {
  884. if (!code || typeof code !== 'string') return next('Invalid code1.');
  885. db.models.user.findOne({"services.password.set.code": code}, next);
  886. },
  887. (user, next) => {
  888. if (!user) return next('Invalid code2.');
  889. if (!user.services.password.set.expires > new Date()) return next('That code has expired.');
  890. next();
  891. },
  892. (next) => {
  893. if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');
  894. return next();
  895. },
  896. (next) => {
  897. bcrypt.genSalt(10, next);
  898. },
  899. // hash the password
  900. (salt, next) => {
  901. bcrypt.hash(sha256(newPassword), salt, next);
  902. },
  903. (hashedPassword, next) => {
  904. db.models.user.updateOne({"services.password.set.code": code}, {$set: {"services.password.password": hashedPassword}, $unset: {"services.password.set": ''}}, {runValidators: true}, next);
  905. }
  906. ], async (err) => {
  907. if (err && err !== true) {
  908. err = await utils.getError(err);
  909. logger.error("ADD_PASSWORD_WITH_CODE", `Code '${code}' failed to add password. '${err}'`);
  910. cb({status: 'failure', message: err});
  911. } else {
  912. logger.success("ADD_PASSWORD_WITH_CODE", `Code '${code}' successfully added password.`);
  913. cache.pub('user.linkPassword', session.userId);
  914. cb({
  915. status: 'success',
  916. message: 'Successfully added password.'
  917. });
  918. }
  919. });
  920. }),
  921. /**
  922. * Unlinks password from user
  923. *
  924. * @param {Object} session - the session object automatically added by socket.io
  925. * @param {Function} cb - gets called with the result
  926. */
  927. unlinkPassword: hooks.loginRequired((session, cb) => {
  928. async.waterfall([
  929. (next) => {
  930. db.models.user.findOne({_id: session.userId}, next);
  931. },
  932. (user, next) => {
  933. if (!user) return next('Not logged in.');
  934. if (!user.services.github || !user.services.github.id) return next('You can\'t remove password login without having GitHub login.');
  935. db.models.user.updateOne({_id: session.userId}, {$unset: {"services.password": ''}}, next);
  936. }
  937. ], async (err) => {
  938. if (err && err !== true) {
  939. err = await utils.getError(err);
  940. logger.error("UNLINK_PASSWORD", `Unlinking password failed for userId '${session.userId}'. '${err}'`);
  941. cb({status: 'failure', message: err});
  942. } else {
  943. logger.success("UNLINK_PASSWORD", `Unlinking password successful for userId '${session.userId}'.`);
  944. cache.pub('user.unlinkPassword', session.userId);
  945. cb({
  946. status: 'success',
  947. message: 'Successfully unlinked password.'
  948. });
  949. }
  950. });
  951. }),
  952. /**
  953. * Unlinks GitHub from user
  954. *
  955. * @param {Object} session - the session object automatically added by socket.io
  956. * @param {Function} cb - gets called with the result
  957. */
  958. unlinkGitHub: hooks.loginRequired((session, cb) => {
  959. async.waterfall([
  960. (next) => {
  961. db.models.user.findOne({_id: session.userId}, next);
  962. },
  963. (user, next) => {
  964. if (!user) return next('Not logged in.');
  965. if (!user.services.password || !user.services.password.password) return next('You can\'t remove GitHub login without having password login.');
  966. db.models.user.updateOne({_id: session.userId}, {$unset: {"services.github": ''}}, next);
  967. }
  968. ], async (err) => {
  969. if (err && err !== true) {
  970. err = await utils.getError(err);
  971. logger.error("UNLINK_GITHUB", `Unlinking GitHub failed for userId '${session.userId}'. '${err}'`);
  972. cb({status: 'failure', message: err});
  973. } else {
  974. logger.success("UNLINK_GITHUB", `Unlinking GitHub successful for userId '${session.userId}'.`);
  975. cache.pub('user.unlinkGitHub', session.userId);
  976. cb({
  977. status: 'success',
  978. message: 'Successfully unlinked GitHub.'
  979. });
  980. }
  981. });
  982. }),
  983. /**
  984. * Requests a password reset for an email
  985. *
  986. * @param {Object} session - the session object automatically added by socket.io
  987. * @param {String} email - the email of the user that requests a password reset
  988. * @param {Function} cb - gets called with the result
  989. */
  990. requestPasswordReset: async (session, email, cb) => {
  991. let code = await utils.generateRandomString(8);
  992. async.waterfall([
  993. (next) => {
  994. if (!email || typeof email !== 'string') return next('Invalid email.');
  995. email = email.toLowerCase();
  996. db.models.user.findOne({"email.address": email}, next);
  997. },
  998. (user, next) => {
  999. if (!user) return next('User not found.');
  1000. if (!user.services.password || !user.services.password.password) return next('User does not have a password set, and probably uses GitHub to log in.');
  1001. next(null, user);
  1002. },
  1003. (user, next) => {
  1004. let expires = new Date();
  1005. expires.setDate(expires.getDate() + 1);
  1006. db.models.user.findOneAndUpdate({"email.address": email}, {$set: {"services.password.reset": {code: code, expires}}}, {runValidators: true}, next);
  1007. },
  1008. (user, next) => {
  1009. mail.schemas.resetPasswordRequest(user.email.address, user.username, code, next);
  1010. }
  1011. ], async (err) => {
  1012. if (err && err !== true) {
  1013. err = await utils.getError(err);
  1014. logger.error("REQUEST_PASSWORD_RESET", `Email '${email}' failed to request password reset. '${err}'`);
  1015. cb({status: 'failure', message: err});
  1016. } else {
  1017. logger.success("REQUEST_PASSWORD_RESET", `Email '${email}' successfully requested a password reset.`);
  1018. cb({
  1019. status: 'success',
  1020. message: 'Successfully requested password reset.'
  1021. });
  1022. }
  1023. });
  1024. },
  1025. /**
  1026. * Verifies a reset code
  1027. *
  1028. * @param {Object} session - the session object automatically added by socket.io
  1029. * @param {String} code - the password reset code
  1030. * @param {Function} cb - gets called with the result
  1031. */
  1032. verifyPasswordResetCode: (session, code, cb) => {
  1033. async.waterfall([
  1034. (next) => {
  1035. if (!code || typeof code !== 'string') return next('Invalid code.');
  1036. db.models.user.findOne({"services.password.reset.code": code}, next);
  1037. },
  1038. (user, next) => {
  1039. if (!user) return next('Invalid code.');
  1040. if (!user.services.password.reset.expires > new Date()) return next('That code has expired.');
  1041. next(null);
  1042. }
  1043. ], async (err) => {
  1044. if (err && err !== true) {
  1045. err = await utils.getError(err);
  1046. logger.error("VERIFY_PASSWORD_RESET_CODE", `Code '${code}' failed to verify. '${err}'`);
  1047. cb({status: 'failure', message: err});
  1048. } else {
  1049. logger.success("VERIFY_PASSWORD_RESET_CODE", `Code '${code}' successfully verified.`);
  1050. cb({
  1051. status: 'success',
  1052. message: 'Successfully verified password reset code.'
  1053. });
  1054. }
  1055. });
  1056. },
  1057. /**
  1058. * Changes a user's password with a reset code
  1059. *
  1060. * @param {Object} session - the session object automatically added by socket.io
  1061. * @param {String} code - the password reset code
  1062. * @param {String} newPassword - the new password reset code
  1063. * @param {Function} cb - gets called with the result
  1064. */
  1065. changePasswordWithResetCode: (session, code, newPassword, cb) => {
  1066. async.waterfall([
  1067. (next) => {
  1068. if (!code || typeof code !== 'string') return next('Invalid code.');
  1069. db.models.user.findOne({"services.password.reset.code": code}, next);
  1070. },
  1071. (user, next) => {
  1072. if (!user) return next('Invalid code.');
  1073. if (!user.services.password.reset.expires > new Date()) return next('That code has expired.');
  1074. next();
  1075. },
  1076. (next) => {
  1077. if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');
  1078. return next();
  1079. },
  1080. (next) => {
  1081. bcrypt.genSalt(10, next);
  1082. },
  1083. // hash the password
  1084. (salt, next) => {
  1085. bcrypt.hash(sha256(newPassword), salt, next);
  1086. },
  1087. (hashedPassword, next) => {
  1088. db.models.user.updateOne({"services.password.reset.code": code}, {$set: {"services.password.password": hashedPassword}, $unset: {"services.password.reset": ''}}, {runValidators: true}, next);
  1089. }
  1090. ], async (err) => {
  1091. if (err && err !== true) {
  1092. err = await utils.getError(err);
  1093. logger.error("CHANGE_PASSWORD_WITH_RESET_CODE", `Code '${code}' failed to change password. '${err}'`);
  1094. cb({status: 'failure', message: err});
  1095. } else {
  1096. logger.success("CHANGE_PASSWORD_WITH_RESET_CODE", `Code '${code}' successfully changed password.`);
  1097. cb({
  1098. status: 'success',
  1099. message: 'Successfully changed password.'
  1100. });
  1101. }
  1102. });
  1103. },
  1104. /**
  1105. * Bans a user by userId
  1106. *
  1107. * @param {Object} session - the session object automatically added by socket.io
  1108. * @param {String} value - the user id that is going to be banned
  1109. * @param {String} reason - the reason for the ban
  1110. * @param {String} expiresAt - the time the ban expires
  1111. * @param {Function} cb - gets called with the result
  1112. */
  1113. banUserById: hooks.adminRequired((session, userId, reason, expiresAt, cb) => {
  1114. async.waterfall([
  1115. (next) => {
  1116. if (!userId) return next('You must provide a userId to ban.');
  1117. else if (!reason) return next('You must provide a reason for the ban.');
  1118. else return next();
  1119. },
  1120. (next) => {
  1121. if (!expiresAt || typeof expiresAt !== 'string') return next('Invalid expire date.');
  1122. let date = new Date();
  1123. switch(expiresAt) {
  1124. case '1h':
  1125. expiresAt = date.setHours(date.getHours() + 1);
  1126. break;
  1127. case '12h':
  1128. expiresAt = date.setHours(date.getHours() + 12);
  1129. break;
  1130. case '1d':
  1131. expiresAt = date.setDate(date.getDate() + 1);
  1132. break;
  1133. case '1w':
  1134. expiresAt = date.setDate(date.getDate() + 7);
  1135. break;
  1136. case '1m':
  1137. expiresAt = date.setMonth(date.getMonth() + 1);
  1138. break;
  1139. case '3m':
  1140. expiresAt = date.setMonth(date.getMonth() + 3);
  1141. break;
  1142. case '6m':
  1143. expiresAt = date.setMonth(date.getMonth() + 6);
  1144. break;
  1145. case '1y':
  1146. expiresAt = date.setFullYear(date.getFullYear() + 1);
  1147. break;
  1148. case 'never':
  1149. expiresAt = new Date(3093527980800000);
  1150. break;
  1151. default:
  1152. return next('Invalid expire date.');
  1153. }
  1154. next();
  1155. },
  1156. (next) => {
  1157. punishments.addPunishment('banUserId', userId, reason, expiresAt, userId, next)
  1158. },
  1159. (punishment, next) => {
  1160. cache.pub('user.ban', { userId, punishment });
  1161. next();
  1162. },
  1163. ], async (err) => {
  1164. if (err && err !== true) {
  1165. err = await utils.getError(err);
  1166. logger.error("BAN_USER_BY_ID", `User ${session.userId} failed to ban user ${userId} with the reason ${reason}. '${err}'`);
  1167. cb({status: 'failure', message: err});
  1168. } else {
  1169. logger.success("BAN_USER_BY_ID", `User ${session.userId} has successfully banned user ${userId} with the reason ${reason}.`);
  1170. cb({
  1171. status: 'success',
  1172. message: 'Successfully banned user.'
  1173. });
  1174. }
  1175. });
  1176. }),
  1177. getFavoriteStations: hooks.loginRequired((session, cb) => {
  1178. async.waterfall([
  1179. (next) => {
  1180. db.models.user.findOne({ _id: session.userId }, next);
  1181. },
  1182. (user, next) => {
  1183. if (!user) return next("User not found.");
  1184. next(null, user);
  1185. }
  1186. ], async (err, user) => {
  1187. if (err && err !== true) {
  1188. err = await utils.getError(err);
  1189. logger.error("GET_FAVORITE_STATIONS", `User ${session.userId} failed to get favorite stations. '${err}'`);
  1190. cb({status: 'failure', message: err});
  1191. } else {
  1192. logger.success("GET_FAVORITE_STATIONS", `User ${session.userId} got favorite stations.`);
  1193. cb({
  1194. status: 'success',
  1195. favoriteStations: user.favoriteStations
  1196. });
  1197. }
  1198. });
  1199. })
  1200. };