users.js 78 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118
  1. "use strict";
  2. const async = require("async");
  3. const config = require("config");
  4. const request = require("request");
  5. const bcrypt = require("bcrypt");
  6. const sha256 = require("sha256");
  7. const hooks = require("./hooks");
  8. // const moduleManager = require("../../index");
  9. const db = require("../db");
  10. const mail = require("../mail");
  11. const cache = require("../cache");
  12. const punishments = require("../punishments");
  13. const utils = require("../utils");
  14. // const logger = require("../logger");
  15. const activities = require("../activities");
  16. cache.runJob("SUB", {
  17. channel: "user.updateUsername",
  18. cb: (user) => {
  19. utils.runJob("SOCKETS_FROM_USER", {
  20. userId: user._id,
  21. cb: (response) => {
  22. response.sockets.forEach((socket) => {
  23. socket.emit("event:user.username.changed", user.username);
  24. });
  25. },
  26. });
  27. },
  28. });
  29. cache.runJob("SUB", {
  30. channel: "user.removeSessions",
  31. cb: (userId) => {
  32. utils.runJob("SOCKETS_FROM_USER_WITHOUT_CACHE", {
  33. userId: userId,
  34. cb: (response) => {
  35. response.sockets.forEach((socket) => {
  36. socket.emit("keep.event:user.session.removed");
  37. });
  38. },
  39. });
  40. },
  41. });
  42. cache.runJob("SUB", {
  43. channel: "user.linkPassword",
  44. cb: (userId) => {
  45. utils.runJob("SOCKETS_FROM_USER", {
  46. userId: userId,
  47. cb: (response) => {
  48. response.sockets.forEach((socket) => {
  49. socket.emit("event:user.linkPassword");
  50. });
  51. },
  52. });
  53. },
  54. });
  55. cache.runJob("SUB", {
  56. channel: "user.linkGitHub",
  57. cb: (userId) => {
  58. utils.runJob("SOCKETS_FROM_USER", {
  59. userId: userId,
  60. cb: (response) => {
  61. response.sockets.forEach((socket) => {
  62. socket.emit("event:user.linkGitHub");
  63. });
  64. },
  65. });
  66. },
  67. });
  68. cache.runJob("SUB", {
  69. channel: "user.unlinkPassword",
  70. cb: (userId) => {
  71. utils.runJob("SOCKETS_FROM_USER", {
  72. userId: userId,
  73. cb: (response) => {
  74. response.sockets.forEach((socket) => {
  75. socket.emit("event:user.unlinkPassword");
  76. });
  77. },
  78. });
  79. },
  80. });
  81. cache.runJob("SUB", {
  82. channel: "user.unlinkGitHub",
  83. cb: (userId) => {
  84. utils.runJob("SOCKETS_FROM_USER", {
  85. userId: userId,
  86. cb: (response) => {
  87. response.sockets.forEach((socket) => {
  88. socket.emit("event:user.unlinkGitHub");
  89. });
  90. },
  91. });
  92. },
  93. });
  94. cache.runJob("SUB", {
  95. channel: "user.ban",
  96. cb: (data) => {
  97. utils.runJob("SOCKETS_FROM_USER", {
  98. userId: data.userId,
  99. cb: (response) => {
  100. response.sockets.forEach((socket) => {
  101. socket.emit("keep.event:banned", data.punishment);
  102. socket.disconnect(true);
  103. });
  104. },
  105. });
  106. },
  107. });
  108. cache.runJob("SUB", {
  109. channel: "user.favoritedStation",
  110. cb: (data) => {
  111. utils.runJob("SOCKETS_FROM_USER", {
  112. userId: data.userId,
  113. cb: (response) => {
  114. response.sockets.forEach((socket) => {
  115. socket.emit("event:user.favoritedStation", data.stationId);
  116. });
  117. },
  118. });
  119. },
  120. });
  121. cache.runJob("SUB", {
  122. channel: "user.unfavoritedStation",
  123. cb: (data) => {
  124. utils.runJob("SOCKETS_FROM_USER", {
  125. userId: data.userId,
  126. cb: (response) => {
  127. response.sockets.forEach((socket) => {
  128. socket.emit(
  129. "event:user.unfavoritedStation",
  130. data.stationId
  131. );
  132. });
  133. },
  134. });
  135. },
  136. });
  137. module.exports = {
  138. /**
  139. * Lists all Users
  140. *
  141. * @param {Object} session - the session object automatically added by socket.io
  142. * @param {Function} cb - gets called with the result
  143. */
  144. index: hooks.adminRequired(async (session, cb) => {
  145. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  146. async.waterfall(
  147. [
  148. (next) => {
  149. userModel.find({}).exec(next);
  150. },
  151. ],
  152. async (err, users) => {
  153. if (err) {
  154. err = await utils.runJob("GET_ERROR", { error: err });
  155. console.log(
  156. "ERROR",
  157. "USER_INDEX",
  158. `Indexing users failed. "${err}"`
  159. );
  160. return cb({ status: "failure", message: err });
  161. } else {
  162. console.log(
  163. "SUCCESS",
  164. "USER_INDEX",
  165. `Indexing users successful.`
  166. );
  167. let filteredUsers = [];
  168. users.forEach((user) => {
  169. filteredUsers.push({
  170. _id: user._id,
  171. username: user.username,
  172. role: user.role,
  173. liked: user.liked,
  174. disliked: user.disliked,
  175. songsRequested: user.statistics.songsRequested,
  176. email: {
  177. address: user.email.address,
  178. verified: user.email.verified,
  179. },
  180. hasPassword: !!user.services.password,
  181. services: { github: user.services.github },
  182. });
  183. });
  184. return cb({ status: "success", data: filteredUsers });
  185. }
  186. }
  187. );
  188. }),
  189. /**
  190. * Logs user in
  191. *
  192. * @param {Object} session - the session object automatically added by socket.io
  193. * @param {String} identifier - the email of the user
  194. * @param {String} password - the plaintext of the user
  195. * @param {Function} cb - gets called with the result
  196. */
  197. login: async (session, identifier, password, cb) => {
  198. identifier = identifier.toLowerCase();
  199. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  200. const sessionSchema = await cache.runJob("GET_SCHEMA", {
  201. schemaName: "session",
  202. });
  203. async.waterfall(
  204. [
  205. // check if a user with the requested identifier exists
  206. (next) => {
  207. userModel.findOne(
  208. {
  209. $or: [{ "email.address": identifier }],
  210. },
  211. next
  212. );
  213. },
  214. // if the user doesn't exist, respond with a failure
  215. // otherwise compare the requested password and the actual users password
  216. (user, next) => {
  217. if (!user) return next("User not found");
  218. if (
  219. !user.services.password ||
  220. !user.services.password.password
  221. )
  222. return next(
  223. "The account you are trying to access uses GitHub to log in."
  224. );
  225. bcrypt.compare(
  226. sha256(password),
  227. user.services.password.password,
  228. (err, match) => {
  229. if (err) return next(err);
  230. if (!match) return next("Incorrect password");
  231. next(null, user);
  232. }
  233. );
  234. },
  235. (user, next) => {
  236. utils.runJob("GUID", {}).then((sessionId) => {
  237. next(null, user, sessionId);
  238. });
  239. },
  240. (user, sessionId, next) => {
  241. cache
  242. .runJob("HSET", {
  243. table: "sessions",
  244. key: sessionId,
  245. value: sessionSchema(sessionId, user._id),
  246. })
  247. .then(() => {
  248. next(null, sessionId);
  249. })
  250. .catch(next);
  251. },
  252. ],
  253. async (err, sessionId) => {
  254. if (err && err !== true) {
  255. err = await utils.runJob("GET_ERROR", { error: err });
  256. console.log(
  257. "ERROR",
  258. "USER_PASSWORD_LOGIN",
  259. `Login failed with password for user "${identifier}". "${err}"`
  260. );
  261. return cb({ status: "failure", message: err });
  262. }
  263. console.log(
  264. "SUCCESS",
  265. "USER_PASSWORD_LOGIN",
  266. `Login successful with password for user "${identifier}"`
  267. );
  268. cb({
  269. status: "success",
  270. message: "Login successful",
  271. user: {},
  272. SID: sessionId,
  273. });
  274. }
  275. );
  276. },
  277. /**
  278. * Registers a new user
  279. *
  280. * @param {Object} session - the session object automatically added by socket.io
  281. * @param {String} username - the username for the new user
  282. * @param {String} email - the email for the new user
  283. * @param {String} password - the plaintext password for the new user
  284. * @param {Object} recaptcha - the recaptcha data
  285. * @param {Function} cb - gets called with the result
  286. */
  287. register: async function(
  288. session,
  289. username,
  290. email,
  291. password,
  292. recaptcha,
  293. cb
  294. ) {
  295. email = email.toLowerCase();
  296. let verificationToken = await utils.runJob("GENERATE_RANDOM_STRING", {
  297. length: 64,
  298. });
  299. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  300. const verifyEmailSchema = await mail.runJob("GET_SCHEMA", {
  301. schemaName: "verifyEmail",
  302. });
  303. async.waterfall(
  304. [
  305. (next) => {
  306. if (config.get("registrationDisabled") === true)
  307. return next("Registration is not allowed at this time.");
  308. return next();
  309. },
  310. (next) => {
  311. if (!db.passwordValid(password))
  312. return next(
  313. "Invalid password. Check if it meets all the requirements."
  314. );
  315. return next();
  316. },
  317. // verify the request with google recaptcha
  318. (next) => {
  319. if (config.get("apis.recaptcha.enabled") === true)
  320. request(
  321. {
  322. url:
  323. "https://www.google.com/recaptcha/api/siteverify",
  324. method: "POST",
  325. form: {
  326. secret: config.get("apis").recaptcha.secret,
  327. response: recaptcha,
  328. },
  329. },
  330. next
  331. );
  332. else next(null, null, null);
  333. },
  334. // check if the response from Google recaptcha is successful
  335. // if it is, we check if a user with the requested username already exists
  336. (response, body, next) => {
  337. if (config.get("apis.recaptcha.enabled") === true) {
  338. let json = JSON.parse(body);
  339. if (json.success !== true)
  340. return next(
  341. "Response from recaptcha was not successful."
  342. );
  343. }
  344. userModel.findOne(
  345. { username: new RegExp(`^${username}$`, "i") },
  346. next
  347. );
  348. },
  349. // if the user already exists, respond with that
  350. // otherwise check if a user with the requested email already exists
  351. (user, next) => {
  352. if (user)
  353. return next(
  354. "A user with that username already exists."
  355. );
  356. userModel.findOne({ "email.address": email }, next);
  357. },
  358. // if the user already exists, respond with that
  359. // otherwise, generate a salt to use with hashing the new users password
  360. (user, next) => {
  361. if (user)
  362. return next("A user with that email already exists.");
  363. bcrypt.genSalt(10, next);
  364. },
  365. // hash the password
  366. (salt, next) => {
  367. bcrypt.hash(sha256(password), salt, next);
  368. },
  369. (hash, next) => {
  370. utils
  371. .runJob("GENERATE_RANDOM_STRING", { length: 12 })
  372. .then((_id) => {
  373. next(null, hash, _id);
  374. });
  375. },
  376. // create the user object
  377. (hash, _id, next) => {
  378. next(null, {
  379. _id,
  380. username,
  381. email: {
  382. address: email,
  383. verificationToken,
  384. },
  385. services: {
  386. password: {
  387. password: hash,
  388. },
  389. },
  390. });
  391. },
  392. // generate the url for gravatar avatar
  393. (user, next) => {
  394. utils
  395. .runJob("CREATE_GRAVATAR", {
  396. email: user.email.address,
  397. })
  398. .then((url) => {
  399. user.avatar = url;
  400. next(null, user);
  401. });
  402. },
  403. // save the new user to the database
  404. (user, next) => {
  405. userModel.create(user, next);
  406. },
  407. // respond with the new user
  408. (newUser, next) => {
  409. verifyEmailSchema(
  410. email,
  411. username,
  412. verificationToken,
  413. () => {
  414. next(null, newUser);
  415. }
  416. );
  417. },
  418. ],
  419. async (err, user) => {
  420. if (err && err !== true) {
  421. err = await utils.runJob("GET_ERROR", { error: err });
  422. console.log(
  423. "ERROR",
  424. "USER_PASSWORD_REGISTER",
  425. `Register failed with password for user "${username}"."${err}"`
  426. );
  427. return cb({ status: "failure", message: err });
  428. } else {
  429. module.exports.login(session, email, password, (result) => {
  430. let obj = {
  431. status: "success",
  432. message: "Successfully registered.",
  433. };
  434. if (result.status === "success") {
  435. obj.SID = result.SID;
  436. }
  437. activities.runJob("ADD_ACTIVITY", {
  438. userId: user._id,
  439. activityType: "created_account",
  440. });
  441. console.log(
  442. "SUCCESS",
  443. "USER_PASSWORD_REGISTER",
  444. `Register successful with password for user "${username}".`
  445. );
  446. return cb(obj);
  447. });
  448. }
  449. }
  450. );
  451. },
  452. /**
  453. * Logs out a user
  454. *
  455. * @param {Object} session - the session object automatically added by socket.io
  456. * @param {Function} cb - gets called with the result
  457. */
  458. logout: (session, cb) => {
  459. async.waterfall(
  460. [
  461. (next) => {
  462. cache
  463. .runJob("HGET", {
  464. table: "sessions",
  465. key: session.sessionId,
  466. })
  467. .then((session) => {
  468. next(null, session);
  469. })
  470. .catch(next);
  471. },
  472. (session, next) => {
  473. if (!session) return next("Session not found");
  474. next(null, session);
  475. },
  476. (session, next) => {
  477. cache
  478. .runJob("HDEL", {
  479. table: "sessions",
  480. key: session.sessionId,
  481. })
  482. .then(() => {
  483. next();
  484. })
  485. .catch(next);
  486. },
  487. ],
  488. async (err) => {
  489. if (err && err !== true) {
  490. err = await utils.runJob("GET_ERROR", { error: err });
  491. console.log(
  492. "ERROR",
  493. "USER_LOGOUT",
  494. `Logout failed. "${err}" `
  495. );
  496. cb({ status: "failure", message: err });
  497. } else {
  498. console.log("SUCCESS", "USER_LOGOUT", `Logout successful.`);
  499. cb({
  500. status: "success",
  501. message: "Successfully logged out.",
  502. });
  503. }
  504. }
  505. );
  506. },
  507. /**
  508. * Removes all sessions for a user
  509. *
  510. * @param {Object} session - the session object automatically added by socket.io
  511. * @param {String} userId - the id of the user we are trying to delete the sessions of
  512. * @param {Function} cb - gets called with the result
  513. */
  514. removeSessions: hooks.loginRequired(async (session, userId, cb) => {
  515. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  516. async.waterfall(
  517. [
  518. (next) => {
  519. userModel.findOne({ _id: session.userId }, (err, user) => {
  520. if (err) return next(err);
  521. if (user.role !== "admin" && session.userId !== userId)
  522. return next(
  523. "Only admins and the owner of the account can remove their sessions."
  524. );
  525. else return next();
  526. });
  527. },
  528. (next) => {
  529. cache
  530. .runJob("HGETALL", { table: "sessions" })
  531. .then((sessions) => {
  532. next(null, sessions);
  533. })
  534. .catch(next);
  535. },
  536. (sessions, next) => {
  537. if (!sessions)
  538. return next(
  539. "There are no sessions for this user to remove."
  540. );
  541. else {
  542. let keys = Object.keys(sessions);
  543. next(null, keys, sessions);
  544. }
  545. },
  546. (keys, sessions, next) => {
  547. cache.runJob("PUB", {
  548. channel: "user.removeSessions",
  549. value: userId,
  550. });
  551. async.each(
  552. keys,
  553. (sessionId, callback) => {
  554. let session = sessions[sessionId];
  555. if (session.userId === userId) {
  556. cache
  557. .runJob("HDEL", {
  558. channel: "sessions",
  559. key: sessionId,
  560. })
  561. .then(() => {
  562. callback(null);
  563. })
  564. .catch(next);
  565. }
  566. },
  567. (err) => {
  568. next(err);
  569. }
  570. );
  571. },
  572. ],
  573. async (err) => {
  574. if (err) {
  575. err = await utils.runJob("GET_ERROR", { error: err });
  576. console.log(
  577. "ERROR",
  578. "REMOVE_SESSIONS_FOR_USER",
  579. `Couldn't remove all sessions for user "${userId}". "${err}"`
  580. );
  581. return cb({ status: "failure", message: err });
  582. } else {
  583. console.log(
  584. "SUCCESS",
  585. "REMOVE_SESSIONS_FOR_USER",
  586. `Removed all sessions for user "${userId}".`
  587. );
  588. return cb({
  589. status: "success",
  590. message: "Successfully removed all sessions.",
  591. });
  592. }
  593. }
  594. );
  595. }),
  596. /**
  597. * Gets user object from username (only a few properties)
  598. *
  599. * @param {Object} session - the session object automatically added by socket.io
  600. * @param {String} username - the username of the user we are trying to find
  601. * @param {Function} cb - gets called with the result
  602. */
  603. findByUsername: async (session, username, cb) => {
  604. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  605. async.waterfall(
  606. [
  607. (next) => {
  608. userModel.findOne(
  609. { username: new RegExp(`^${username}$`, "i") },
  610. next
  611. );
  612. },
  613. (account, next) => {
  614. if (!account) return next("User not found.");
  615. next(null, account);
  616. },
  617. ],
  618. async (err, account) => {
  619. if (err && err !== true) {
  620. err = await utils.runJob("GET_ERROR", { error: err });
  621. console.log(
  622. "ERROR",
  623. "FIND_BY_USERNAME",
  624. `User not found for username "${username}". "${err}"`
  625. );
  626. cb({ status: "failure", message: err });
  627. } else {
  628. console.log(
  629. "SUCCESS",
  630. "FIND_BY_USERNAME",
  631. `User found for username "${username}".`
  632. );
  633. return cb({
  634. status: "success",
  635. data: {
  636. _id: account._id,
  637. name: account.name,
  638. username: account.username,
  639. location: account.location,
  640. bio: account.bio,
  641. role: account.role,
  642. avatar: account.avatar,
  643. createdAt: account.createdAt,
  644. },
  645. });
  646. }
  647. }
  648. );
  649. },
  650. /**
  651. * Gets a username from an userId
  652. *
  653. * @param {Object} session - the session object automatically added by socket.io
  654. * @param {String} userId - the userId of the person we are trying to get the username from
  655. * @param {Function} cb - gets called with the result
  656. */
  657. getUsernameFromId: async (session, userId, cb) => {
  658. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  659. userModel
  660. .findById(userId)
  661. .then((user) => {
  662. if (user) {
  663. console.log(
  664. "SUCCESS",
  665. "GET_USERNAME_FROM_ID",
  666. `Found username for userId "${userId}".`
  667. );
  668. return cb({
  669. status: "success",
  670. data: user.username,
  671. });
  672. } else {
  673. console.log(
  674. "ERROR",
  675. "GET_USERNAME_FROM_ID",
  676. `Getting the username from userId "${userId}" failed. User not found.`
  677. );
  678. cb({
  679. status: "failure",
  680. message: "Couldn't find the user.",
  681. });
  682. }
  683. })
  684. .catch(async (err) => {
  685. if (err && err !== true) {
  686. err = await utils.runJob("GET_ERROR", { error: err });
  687. console.log(
  688. "ERROR",
  689. "GET_USERNAME_FROM_ID",
  690. `Getting the username from userId "${userId}" failed. "${err}"`
  691. );
  692. cb({ status: "failure", message: err });
  693. }
  694. });
  695. },
  696. //TODO Fix security issues
  697. /**
  698. * Gets user info from session
  699. *
  700. * @param {Object} session - the session object automatically added by socket.io
  701. * @param {Function} cb - gets called with the result
  702. */
  703. findBySession: async (session, cb) => {
  704. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  705. async.waterfall(
  706. [
  707. (next) => {
  708. cache
  709. .runJob("HGET", {
  710. table: "sessions",
  711. key: session.sessionId,
  712. })
  713. .then((session) => {
  714. next(null, session);
  715. })
  716. .catch(next);
  717. },
  718. (session, next) => {
  719. if (!session) return next("Session not found.");
  720. next(null, session);
  721. },
  722. (session, next) => {
  723. userModel.findOne({ _id: session.userId }, next);
  724. },
  725. (user, next) => {
  726. if (!user) return next("User not found.");
  727. next(null, user);
  728. },
  729. ],
  730. async (err, user) => {
  731. if (err && err !== true) {
  732. err = await utils.runJob("GET_ERROR", { error: err });
  733. console.log(
  734. "ERROR",
  735. "FIND_BY_SESSION",
  736. `User not found. "${err}"`
  737. );
  738. cb({ status: "failure", message: err });
  739. } else {
  740. let data = {
  741. email: {
  742. address: user.email.address,
  743. },
  744. avatar: user.avatar,
  745. username: user.username,
  746. name: user.name,
  747. location: user.location,
  748. bio: user.bio,
  749. };
  750. if (
  751. user.services.password &&
  752. user.services.password.password
  753. )
  754. data.password = true;
  755. if (user.services.github && user.services.github.id)
  756. data.github = true;
  757. console.log(
  758. "SUCCESS",
  759. "FIND_BY_SESSION",
  760. `User found. "${user.username}".`
  761. );
  762. return cb({
  763. status: "success",
  764. data,
  765. });
  766. }
  767. }
  768. );
  769. },
  770. /**
  771. * Updates a user's username
  772. *
  773. * @param {Object} session - the session object automatically added by socket.io
  774. * @param {String} updatingUserId - the updating user's id
  775. * @param {String} newUsername - the new username
  776. * @param {Function} cb - gets called with the result
  777. */
  778. updateUsername: hooks.loginRequired(
  779. async (session, updatingUserId, newUsername, cb) => {
  780. const userModel = await db.runJob("GET_MODEL", {
  781. modelName: "user",
  782. });
  783. async.waterfall(
  784. [
  785. (next) => {
  786. if (updatingUserId === session.userId)
  787. return next(null, true);
  788. userModel.findOne({ _id: session.userId }, next);
  789. },
  790. (user, next) => {
  791. if (user !== true && (!user || user.role !== "admin"))
  792. return next("Invalid permissions.");
  793. userModel.findOne({ _id: updatingUserId }, next);
  794. },
  795. (user, next) => {
  796. if (!user) return next("User not found.");
  797. if (user.username === newUsername)
  798. return next(
  799. "New username can't be the same as the old username."
  800. );
  801. next(null);
  802. },
  803. (next) => {
  804. userModel.findOne(
  805. { username: new RegExp(`^${newUsername}$`, "i") },
  806. next
  807. );
  808. },
  809. (user, next) => {
  810. if (!user) return next();
  811. if (user._id === updatingUserId) return next();
  812. next("That username is already in use.");
  813. },
  814. (next) => {
  815. userModel.updateOne(
  816. { _id: updatingUserId },
  817. { $set: { username: newUsername } },
  818. { runValidators: true },
  819. next
  820. );
  821. },
  822. ],
  823. async (err) => {
  824. if (err && err !== true) {
  825. err = await utils.runJob("GET_ERROR", { error: err });
  826. console.log(
  827. "ERROR",
  828. "UPDATE_USERNAME",
  829. `Couldn't update username for user "${updatingUserId}" to username "${newUsername}". "${err}"`
  830. );
  831. cb({ status: "failure", message: err });
  832. } else {
  833. cache.runJob("PUB", {
  834. channel: "user.updateUsername",
  835. value: {
  836. username: newUsername,
  837. _id: updatingUserId,
  838. },
  839. });
  840. console.log(
  841. "SUCCESS",
  842. "UPDATE_USERNAME",
  843. `Updated username for user "${updatingUserId}" to username "${newUsername}".`
  844. );
  845. cb({
  846. status: "success",
  847. message: "Username updated successfully",
  848. });
  849. }
  850. }
  851. );
  852. }
  853. ),
  854. /**
  855. * Updates a user's email
  856. *
  857. * @param {Object} session - the session object automatically added by socket.io
  858. * @param {String} updatingUserId - the updating user's id
  859. * @param {String} newEmail - the new email
  860. * @param {Function} cb - gets called with the result
  861. */
  862. updateEmail: hooks.loginRequired(
  863. async (session, updatingUserId, newEmail, cb) => {
  864. newEmail = newEmail.toLowerCase();
  865. let verificationToken = await utils.runJob(
  866. "GENERATE_RANDOM_STRING",
  867. { length: 64 }
  868. );
  869. const userModel = await db.runJob("GET_MODEL", {
  870. modelName: "user",
  871. });
  872. const verifyEmailSchema = await mail.runJob("GET_SCHEMA", {
  873. schemaName: "verifyEmail",
  874. });
  875. async.waterfall(
  876. [
  877. (next) => {
  878. if (updatingUserId === session.userId)
  879. return next(null, true);
  880. userModel.findOne({ _id: session.userId }, next);
  881. },
  882. (user, next) => {
  883. if (user !== true && (!user || user.role !== "admin"))
  884. return next("Invalid permissions.");
  885. userModel.findOne({ _id: updatingUserId }, next);
  886. },
  887. (user, next) => {
  888. if (!user) return next("User not found.");
  889. if (user.email.address === newEmail)
  890. return next(
  891. "New email can't be the same as your the old email."
  892. );
  893. next();
  894. },
  895. (next) => {
  896. userModel.findOne({ "email.address": newEmail }, next);
  897. },
  898. (user, next) => {
  899. if (!user) return next();
  900. if (user._id === updatingUserId) return next();
  901. next("That email is already in use.");
  902. },
  903. // regenerate the url for gravatar avatar
  904. (next) => {
  905. utils
  906. .runJob("CREATE_GRAVATAR", { email: newEmail })
  907. .then((url) => {
  908. next(null, url);
  909. });
  910. },
  911. (avatar, next) => {
  912. userModel.updateOne(
  913. { _id: updatingUserId },
  914. {
  915. $set: {
  916. avatar: avatar,
  917. "email.address": newEmail,
  918. "email.verified": false,
  919. "email.verificationToken": verificationToken,
  920. },
  921. },
  922. { runValidators: true },
  923. next
  924. );
  925. },
  926. (res, next) => {
  927. userModel.findOne({ _id: updatingUserId }, next);
  928. },
  929. (user, next) => {
  930. verifyEmailSchema(
  931. newEmail,
  932. user.username,
  933. verificationToken,
  934. () => {
  935. next();
  936. }
  937. );
  938. },
  939. ],
  940. async (err) => {
  941. if (err && err !== true) {
  942. err = await utils.runJob("GET_ERROR", { error: err });
  943. console.log(
  944. "ERROR",
  945. "UPDATE_EMAIL",
  946. `Couldn't update email for user "${updatingUserId}" to email "${newEmail}". '${err}'`
  947. );
  948. cb({ status: "failure", message: err });
  949. } else {
  950. console.log(
  951. "SUCCESS",
  952. "UPDATE_EMAIL",
  953. `Updated email for user "${updatingUserId}" to email "${newEmail}".`
  954. );
  955. cb({
  956. status: "success",
  957. message: "Email updated successfully.",
  958. });
  959. }
  960. }
  961. );
  962. }
  963. ),
  964. /**
  965. * Updates a user's name
  966. *
  967. * @param {Object} session - the session object automatically added by socket.io
  968. * @param {String} updatingUserId - the updating user's id
  969. * @param {String} newBio - the new name
  970. * @param {Function} cb - gets called with the result
  971. */
  972. updateName: hooks.loginRequired(
  973. async (session, updatingUserId, newName, cb) => {
  974. const userModel = await db.runJob("GET_MODEL", {
  975. modelName: "user",
  976. });
  977. async.waterfall(
  978. [
  979. (next) => {
  980. if (updatingUserId === session.userId)
  981. return next(null, true);
  982. userModel.findOne({ _id: session.userId }, next);
  983. },
  984. (user, next) => {
  985. if (user !== true && (!user || user.role !== "admin"))
  986. return next("Invalid permissions.");
  987. userModel.findOne({ _id: updatingUserId }, next);
  988. },
  989. (user, next) => {
  990. if (!user) return next("User not found.");
  991. userModel.updateOne(
  992. { _id: updatingUserId },
  993. { $set: { name: newName } },
  994. { runValidators: true },
  995. next
  996. );
  997. },
  998. ],
  999. async (err) => {
  1000. if (err && err !== true) {
  1001. err = await utils.runJob("GET_ERROR", { error: err });
  1002. console.log(
  1003. "ERROR",
  1004. "UPDATE_NAME",
  1005. `Couldn't update name for user "${updatingUserId}" to name "${newName}". "${err}"`
  1006. );
  1007. cb({ status: "failure", message: err });
  1008. } else {
  1009. console.log(
  1010. "SUCCESS",
  1011. "UPDATE_NAME",
  1012. `Updated name for user "${updatingUserId}" to name "${newName}".`
  1013. );
  1014. cb({
  1015. status: "success",
  1016. message: "Name updated successfully",
  1017. });
  1018. }
  1019. }
  1020. );
  1021. }
  1022. ),
  1023. /**
  1024. * Updates a user's location
  1025. *
  1026. * @param {Object} session - the session object automatically added by socket.io
  1027. * @param {String} updatingUserId - the updating user's id
  1028. * @param {String} newLocation - the new location
  1029. * @param {Function} cb - gets called with the result
  1030. */
  1031. updateLocation: hooks.loginRequired(
  1032. async (session, updatingUserId, newLocation, cb) => {
  1033. const userModel = await db.runJob("GET_MODEL", {
  1034. modelName: "user",
  1035. });
  1036. async.waterfall(
  1037. [
  1038. (next) => {
  1039. if (updatingUserId === session.userId)
  1040. return next(null, true);
  1041. userModel.findOne({ _id: session.userId }, next);
  1042. },
  1043. (user, next) => {
  1044. if (user !== true && (!user || user.role !== "admin"))
  1045. return next("Invalid permissions.");
  1046. userModel.findOne({ _id: updatingUserId }, next);
  1047. },
  1048. (user, next) => {
  1049. if (!user) return next("User not found.");
  1050. userModel.updateOne(
  1051. { _id: updatingUserId },
  1052. { $set: { location: newLocation } },
  1053. { runValidators: true },
  1054. next
  1055. );
  1056. },
  1057. ],
  1058. async (err) => {
  1059. if (err && err !== true) {
  1060. err = await utils.runJob("GET_ERROR", { error: err });
  1061. console.log(
  1062. "ERROR",
  1063. "UPDATE_LOCATION",
  1064. `Couldn't update location for user "${updatingUserId}" to location "${newLocation}". "${err}"`
  1065. );
  1066. cb({ status: "failure", message: err });
  1067. } else {
  1068. console.log(
  1069. "SUCCESS",
  1070. "UPDATE_LOCATION",
  1071. `Updated location for user "${updatingUserId}" to location "${newLocation}".`
  1072. );
  1073. cb({
  1074. status: "success",
  1075. message: "Location updated successfully",
  1076. });
  1077. }
  1078. }
  1079. );
  1080. }
  1081. ),
  1082. /**
  1083. * Updates a user's bio
  1084. *
  1085. * @param {Object} session - the session object automatically added by socket.io
  1086. * @param {String} updatingUserId - the updating user's id
  1087. * @param {String} newBio - the new bio
  1088. * @param {Function} cb - gets called with the result
  1089. */
  1090. updateBio: hooks.loginRequired(
  1091. async (session, updatingUserId, newBio, cb) => {
  1092. const userModel = await db.runJob("GET_MODEL", {
  1093. modelName: "user",
  1094. });
  1095. async.waterfall(
  1096. [
  1097. (next) => {
  1098. if (updatingUserId === session.userId)
  1099. return next(null, true);
  1100. userModel.findOne({ _id: session.userId }, next);
  1101. },
  1102. (user, next) => {
  1103. if (user !== true && (!user || user.role !== "admin"))
  1104. return next("Invalid permissions.");
  1105. userModel.findOne({ _id: updatingUserId }, next);
  1106. },
  1107. (user, next) => {
  1108. if (!user) return next("User not found.");
  1109. userModel.updateOne(
  1110. { _id: updatingUserId },
  1111. { $set: { bio: newBio } },
  1112. { runValidators: true },
  1113. next
  1114. );
  1115. },
  1116. ],
  1117. async (err) => {
  1118. if (err && err !== true) {
  1119. err = await utils.runJob("GET_ERROR", { error: err });
  1120. console.log(
  1121. "ERROR",
  1122. "UPDATE_BIO",
  1123. `Couldn't update bio for user "${updatingUserId}" to bio "${newBio}". "${err}"`
  1124. );
  1125. cb({ status: "failure", message: err });
  1126. } else {
  1127. console.log(
  1128. "SUCCESS",
  1129. "UPDATE_BIO",
  1130. `Updated bio for user "${updatingUserId}" to bio "${newBio}".`
  1131. );
  1132. cb({
  1133. status: "success",
  1134. message: "Bio updated successfully",
  1135. });
  1136. }
  1137. }
  1138. );
  1139. }
  1140. ),
  1141. /**
  1142. * Updates the type of a user's avatar
  1143. *
  1144. * @param {Object} session - the session object automatically added by socket.io
  1145. * @param {String} updatingUserId - the updating user's id
  1146. * @param {String} newType - the new type
  1147. * @param {Function} cb - gets called with the result
  1148. */
  1149. updateAvatarType: hooks.loginRequired(
  1150. async (session, updatingUserId, newType, cb) => {
  1151. const userModel = await db.runJob("GET_MODEL", {
  1152. modelName: "user",
  1153. });
  1154. async.waterfall(
  1155. [
  1156. (next) => {
  1157. if (updatingUserId === session.userId)
  1158. return next(null, true);
  1159. userModel.findOne({ _id: session.userId }, next);
  1160. },
  1161. (user, next) => {
  1162. if (user !== true && (!user || user.role !== "admin"))
  1163. return next("Invalid permissions.");
  1164. userModel.findOne({ _id: updatingUserId }, next);
  1165. },
  1166. (user, next) => {
  1167. if (!user) return next("User not found.");
  1168. userModel.updateOne(
  1169. { _id: updatingUserId },
  1170. { $set: { "avatar.type": newType } },
  1171. { runValidators: true },
  1172. next
  1173. );
  1174. },
  1175. ],
  1176. async (err) => {
  1177. if (err && err !== true) {
  1178. err = await utils.runJob("GET_ERROR", { error: err });
  1179. console.log(
  1180. "ERROR",
  1181. "UPDATE_AVATAR_TYPE",
  1182. `Couldn't update avatar type for user "${updatingUserId}" to type "${newType}". "${err}"`
  1183. );
  1184. cb({ status: "failure", message: err });
  1185. } else {
  1186. console.log(
  1187. "SUCCESS",
  1188. "UPDATE_AVATAR_TYPE",
  1189. `Updated avatar type for user "${updatingUserId}" to type "${newType}".`
  1190. );
  1191. cb({
  1192. status: "success",
  1193. message: "Avatar type updated successfully",
  1194. });
  1195. }
  1196. }
  1197. );
  1198. }
  1199. ),
  1200. /**
  1201. * Updates a user's role
  1202. *
  1203. * @param {Object} session - the session object automatically added by socket.io
  1204. * @param {String} updatingUserId - the updating user's id
  1205. * @param {String} newRole - the new role
  1206. * @param {Function} cb - gets called with the result
  1207. */
  1208. updateRole: hooks.adminRequired(
  1209. async (session, updatingUserId, newRole, cb) => {
  1210. newRole = newRole.toLowerCase();
  1211. const userModel = await db.runJob("GET_MODEL", {
  1212. modelName: "user",
  1213. });
  1214. async.waterfall(
  1215. [
  1216. (next) => {
  1217. userModel.findOne({ _id: updatingUserId }, next);
  1218. },
  1219. (user, next) => {
  1220. if (!user) return next("User not found.");
  1221. else if (user.role === newRole)
  1222. return next(
  1223. "New role can't be the same as the old role."
  1224. );
  1225. else return next();
  1226. },
  1227. (next) => {
  1228. userModel.updateOne(
  1229. { _id: updatingUserId },
  1230. { $set: { role: newRole } },
  1231. { runValidators: true },
  1232. next
  1233. );
  1234. },
  1235. ],
  1236. async (err) => {
  1237. if (err && err !== true) {
  1238. err = await utils.runJob("GET_ERROR", { error: err });
  1239. console.log(
  1240. "ERROR",
  1241. "UPDATE_ROLE",
  1242. `User "${session.userId}" couldn't update role for user "${updatingUserId}" to role "${newRole}". "${err}"`
  1243. );
  1244. cb({ status: "failure", message: err });
  1245. } else {
  1246. console.log(
  1247. "SUCCESS",
  1248. "UPDATE_ROLE",
  1249. `User "${session.userId}" updated the role of user "${updatingUserId}" to role "${newRole}".`
  1250. );
  1251. cb({
  1252. status: "success",
  1253. message: "Role successfully updated.",
  1254. });
  1255. }
  1256. }
  1257. );
  1258. }
  1259. ),
  1260. /**
  1261. * Updates a user's password
  1262. *
  1263. * @param {Object} session - the session object automatically added by socket.io
  1264. * @param {String} newPassword - the new password
  1265. * @param {Function} cb - gets called with the result
  1266. */
  1267. updatePassword: hooks.loginRequired(async (session, newPassword, cb) => {
  1268. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1269. async.waterfall(
  1270. [
  1271. (next) => {
  1272. userModel.findOne({ _id: session.userId }, next);
  1273. },
  1274. (user, next) => {
  1275. if (!user.services.password)
  1276. return next(
  1277. "This account does not have a password set."
  1278. );
  1279. next();
  1280. },
  1281. (next) => {
  1282. if (!db.passwordValid(newPassword))
  1283. return next(
  1284. "Invalid password. Check if it meets all the requirements."
  1285. );
  1286. return next();
  1287. },
  1288. (next) => {
  1289. bcrypt.genSalt(10, next);
  1290. },
  1291. // hash the password
  1292. (salt, next) => {
  1293. bcrypt.hash(sha256(newPassword), salt, next);
  1294. },
  1295. (hashedPassword, next) => {
  1296. userModel.updateOne(
  1297. { _id: session.userId },
  1298. {
  1299. $set: {
  1300. "services.password.password": hashedPassword,
  1301. },
  1302. },
  1303. next
  1304. );
  1305. },
  1306. ],
  1307. async (err) => {
  1308. if (err) {
  1309. err = await utils.runJob("GET_ERROR", { error: err });
  1310. console.log(
  1311. "ERROR",
  1312. "UPDATE_PASSWORD",
  1313. `Failed updating user password of user '${session.userId}'. '${err}'.`
  1314. );
  1315. return cb({ status: "failure", message: err });
  1316. }
  1317. console.log(
  1318. "SUCCESS",
  1319. "UPDATE_PASSWORD",
  1320. `User '${session.userId}' updated their password.`
  1321. );
  1322. cb({
  1323. status: "success",
  1324. message: "Password successfully updated.",
  1325. });
  1326. }
  1327. );
  1328. }),
  1329. /**
  1330. * Requests a password for a session
  1331. *
  1332. * @param {Object} session - the session object automatically added by socket.io
  1333. * @param {String} email - the email of the user that requests a password reset
  1334. * @param {Function} cb - gets called with the result
  1335. */
  1336. requestPassword: hooks.loginRequired(async (session, cb) => {
  1337. let code = await utils.runJob("GENERATE_RANDOM_STRING", { length: 8 });
  1338. const passwordRequestSchema = await mail.runJob("GET_SCHEMA", {
  1339. schemaName: "passwordRequest",
  1340. });
  1341. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1342. async.waterfall(
  1343. [
  1344. (next) => {
  1345. userModel.findOne({ _id: session.userId }, next);
  1346. },
  1347. (user, next) => {
  1348. if (!user) return next("User not found.");
  1349. if (
  1350. user.services.password &&
  1351. user.services.password.password
  1352. )
  1353. return next("You already have a password set.");
  1354. next(null, user);
  1355. },
  1356. (user, next) => {
  1357. let expires = new Date();
  1358. expires.setDate(expires.getDate() + 1);
  1359. userModel.findOneAndUpdate(
  1360. { "email.address": user.email.address },
  1361. {
  1362. $set: {
  1363. "services.password": {
  1364. set: { code: code, expires },
  1365. },
  1366. },
  1367. },
  1368. { runValidators: true },
  1369. next
  1370. );
  1371. },
  1372. (user, next) => {
  1373. passwordRequestSchema(
  1374. user.email.address,
  1375. user.username,
  1376. code,
  1377. next
  1378. );
  1379. },
  1380. ],
  1381. async (err) => {
  1382. if (err && err !== true) {
  1383. err = await utils.runJob("GET_ERROR", { error: err });
  1384. console.log(
  1385. "ERROR",
  1386. "REQUEST_PASSWORD",
  1387. `UserId '${session.userId}' failed to request password. '${err}'`
  1388. );
  1389. cb({ status: "failure", message: err });
  1390. } else {
  1391. console.log(
  1392. "SUCCESS",
  1393. "REQUEST_PASSWORD",
  1394. `UserId '${session.userId}' successfully requested a password.`
  1395. );
  1396. cb({
  1397. status: "success",
  1398. message: "Successfully requested password.",
  1399. });
  1400. }
  1401. }
  1402. );
  1403. }),
  1404. /**
  1405. * Verifies a password code
  1406. *
  1407. * @param {Object} session - the session object automatically added by socket.io
  1408. * @param {String} code - the password code
  1409. * @param {Function} cb - gets called with the result
  1410. */
  1411. verifyPasswordCode: hooks.loginRequired(async (session, code, cb) => {
  1412. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1413. async.waterfall(
  1414. [
  1415. (next) => {
  1416. if (!code || typeof code !== "string")
  1417. return next("Invalid code1.");
  1418. userModel.findOne(
  1419. {
  1420. "services.password.set.code": code,
  1421. _id: session.userId,
  1422. },
  1423. next
  1424. );
  1425. },
  1426. (user, next) => {
  1427. if (!user) return next("Invalid code2.");
  1428. if (user.services.password.set.expires < new Date())
  1429. return next("That code has expired.");
  1430. next(null);
  1431. },
  1432. ],
  1433. async (err) => {
  1434. if (err && err !== true) {
  1435. err = await utils.runJob("GET_ERROR", { error: err });
  1436. console.log(
  1437. "ERROR",
  1438. "VERIFY_PASSWORD_CODE",
  1439. `Code '${code}' failed to verify. '${err}'`
  1440. );
  1441. cb({ status: "failure", message: err });
  1442. } else {
  1443. console.log(
  1444. "SUCCESS",
  1445. "VERIFY_PASSWORD_CODE",
  1446. `Code '${code}' successfully verified.`
  1447. );
  1448. cb({
  1449. status: "success",
  1450. message: "Successfully verified password code.",
  1451. });
  1452. }
  1453. }
  1454. );
  1455. }),
  1456. /**
  1457. * Adds a password to a user with a code
  1458. *
  1459. * @param {Object} session - the session object automatically added by socket.io
  1460. * @param {String} code - the password code
  1461. * @param {String} newPassword - the new password code
  1462. * @param {Function} cb - gets called with the result
  1463. */
  1464. changePasswordWithCode: hooks.loginRequired(
  1465. async (session, code, newPassword, cb) => {
  1466. const userModel = await db.runJob("GET_MODEL", {
  1467. modelName: "user",
  1468. });
  1469. async.waterfall(
  1470. [
  1471. (next) => {
  1472. if (!code || typeof code !== "string")
  1473. return next("Invalid code1.");
  1474. userModel.findOne(
  1475. { "services.password.set.code": code },
  1476. next
  1477. );
  1478. },
  1479. (user, next) => {
  1480. if (!user) return next("Invalid code2.");
  1481. if (!user.services.password.set.expires > new Date())
  1482. return next("That code has expired.");
  1483. next();
  1484. },
  1485. (next) => {
  1486. if (!db.passwordValid(newPassword))
  1487. return next(
  1488. "Invalid password. Check if it meets all the requirements."
  1489. );
  1490. return next();
  1491. },
  1492. (next) => {
  1493. bcrypt.genSalt(10, next);
  1494. },
  1495. // hash the password
  1496. (salt, next) => {
  1497. bcrypt.hash(sha256(newPassword), salt, next);
  1498. },
  1499. (hashedPassword, next) => {
  1500. userModel.updateOne(
  1501. { "services.password.set.code": code },
  1502. {
  1503. $set: {
  1504. "services.password.password": hashedPassword,
  1505. },
  1506. $unset: { "services.password.set": "" },
  1507. },
  1508. { runValidators: true },
  1509. next
  1510. );
  1511. },
  1512. ],
  1513. async (err) => {
  1514. if (err && err !== true) {
  1515. err = await utils.runJob("GET_ERROR", { error: err });
  1516. console.log(
  1517. "ERROR",
  1518. "ADD_PASSWORD_WITH_CODE",
  1519. `Code '${code}' failed to add password. '${err}'`
  1520. );
  1521. cb({ status: "failure", message: err });
  1522. } else {
  1523. console.log(
  1524. "SUCCESS",
  1525. "ADD_PASSWORD_WITH_CODE",
  1526. `Code '${code}' successfully added password.`
  1527. );
  1528. cache.runJob("PUB", {
  1529. channel: "user.linkPassword",
  1530. value: session.userId,
  1531. });
  1532. cb({
  1533. status: "success",
  1534. message: "Successfully added password.",
  1535. });
  1536. }
  1537. }
  1538. );
  1539. }
  1540. ),
  1541. /**
  1542. * Unlinks password from user
  1543. *
  1544. * @param {Object} session - the session object automatically added by socket.io
  1545. * @param {Function} cb - gets called with the result
  1546. */
  1547. unlinkPassword: hooks.loginRequired(async (session, cb) => {
  1548. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1549. async.waterfall(
  1550. [
  1551. (next) => {
  1552. userModel.findOne({ _id: session.userId }, next);
  1553. },
  1554. (user, next) => {
  1555. if (!user) return next("Not logged in.");
  1556. if (!user.services.github || !user.services.github.id)
  1557. return next(
  1558. "You can't remove password login without having GitHub login."
  1559. );
  1560. userModel.updateOne(
  1561. { _id: session.userId },
  1562. { $unset: { "services.password": "" } },
  1563. next
  1564. );
  1565. },
  1566. ],
  1567. async (err) => {
  1568. if (err && err !== true) {
  1569. err = await utils.runJob("GET_ERROR", { error: err });
  1570. console.log(
  1571. "ERROR",
  1572. "UNLINK_PASSWORD",
  1573. `Unlinking password failed for userId '${session.userId}'. '${err}'`
  1574. );
  1575. cb({ status: "failure", message: err });
  1576. } else {
  1577. console.log(
  1578. "SUCCESS",
  1579. "UNLINK_PASSWORD",
  1580. `Unlinking password successful for userId '${session.userId}'.`
  1581. );
  1582. cache.runJob("PUB", {
  1583. channel: "user.unlinkPassword",
  1584. value: session.userId,
  1585. });
  1586. cb({
  1587. status: "success",
  1588. message: "Successfully unlinked password.",
  1589. });
  1590. }
  1591. }
  1592. );
  1593. }),
  1594. /**
  1595. * Unlinks GitHub from user
  1596. *
  1597. * @param {Object} session - the session object automatically added by socket.io
  1598. * @param {Function} cb - gets called with the result
  1599. */
  1600. unlinkGitHub: hooks.loginRequired(async (session, cb) => {
  1601. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1602. async.waterfall(
  1603. [
  1604. (next) => {
  1605. userModel.findOne({ _id: session.userId }, next);
  1606. },
  1607. (user, next) => {
  1608. if (!user) return next("Not logged in.");
  1609. if (
  1610. !user.services.password ||
  1611. !user.services.password.password
  1612. )
  1613. return next(
  1614. "You can't remove GitHub login without having password login."
  1615. );
  1616. userModel.updateOne(
  1617. { _id: session.userId },
  1618. { $unset: { "services.github": "" } },
  1619. next
  1620. );
  1621. },
  1622. ],
  1623. async (err) => {
  1624. if (err && err !== true) {
  1625. err = await utils.runJob("GET_ERROR", { error: err });
  1626. console.log(
  1627. "ERROR",
  1628. "UNLINK_GITHUB",
  1629. `Unlinking GitHub failed for userId '${session.userId}'. '${err}'`
  1630. );
  1631. cb({ status: "failure", message: err });
  1632. } else {
  1633. console.log(
  1634. "SUCCESS",
  1635. "UNLINK_GITHUB",
  1636. `Unlinking GitHub successful for userId '${session.userId}'.`
  1637. );
  1638. cache.runJob("PUB", {
  1639. channel: "user.unlinkGithub",
  1640. value: session.userId,
  1641. });
  1642. cb({
  1643. status: "success",
  1644. message: "Successfully unlinked GitHub.",
  1645. });
  1646. }
  1647. }
  1648. );
  1649. }),
  1650. /**
  1651. * Requests a password reset for an email
  1652. *
  1653. * @param {Object} session - the session object automatically added by socket.io
  1654. * @param {String} email - the email of the user that requests a password reset
  1655. * @param {Function} cb - gets called with the result
  1656. */
  1657. requestPasswordReset: async (session, email, cb) => {
  1658. let code = await utils.runJob("GENERATE_RANDOM_STRING", { length: 8 });
  1659. console.log(111, code);
  1660. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1661. const resetPasswordRequestSchema = await mail.runJob("GET_SCHEMA", {
  1662. schemaName: "resetPasswordRequest",
  1663. });
  1664. async.waterfall(
  1665. [
  1666. (next) => {
  1667. if (!email || typeof email !== "string")
  1668. return next("Invalid email.");
  1669. email = email.toLowerCase();
  1670. userModel.findOne({ "email.address": email }, next);
  1671. },
  1672. (user, next) => {
  1673. if (!user) return next("User not found.");
  1674. if (
  1675. !user.services.password ||
  1676. !user.services.password.password
  1677. )
  1678. return next(
  1679. "User does not have a password set, and probably uses GitHub to log in."
  1680. );
  1681. next(null, user);
  1682. },
  1683. (user, next) => {
  1684. let expires = new Date();
  1685. expires.setDate(expires.getDate() + 1);
  1686. userModel.findOneAndUpdate(
  1687. { "email.address": email },
  1688. {
  1689. $set: {
  1690. "services.password.reset": {
  1691. code: code,
  1692. expires,
  1693. },
  1694. },
  1695. },
  1696. { runValidators: true },
  1697. next
  1698. );
  1699. },
  1700. (user, next) => {
  1701. resetPasswordRequestSchema(
  1702. user.email.address,
  1703. user.username,
  1704. code,
  1705. next
  1706. );
  1707. },
  1708. ],
  1709. async (err) => {
  1710. if (err && err !== true) {
  1711. err = await utils.runJob("GET_ERROR", { error: err });
  1712. console.log(
  1713. "ERROR",
  1714. "REQUEST_PASSWORD_RESET",
  1715. `Email '${email}' failed to request password reset. '${err}'`
  1716. );
  1717. cb({ status: "failure", message: err });
  1718. } else {
  1719. console.log(
  1720. "SUCCESS",
  1721. "REQUEST_PASSWORD_RESET",
  1722. `Email '${email}' successfully requested a password reset.`
  1723. );
  1724. cb({
  1725. status: "success",
  1726. message: "Successfully requested password reset.",
  1727. });
  1728. }
  1729. }
  1730. );
  1731. },
  1732. /**
  1733. * Verifies a reset code
  1734. *
  1735. * @param {Object} session - the session object automatically added by socket.io
  1736. * @param {String} code - the password reset code
  1737. * @param {Function} cb - gets called with the result
  1738. */
  1739. verifyPasswordResetCode: async (session, code, cb) => {
  1740. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1741. async.waterfall(
  1742. [
  1743. (next) => {
  1744. if (!code || typeof code !== "string")
  1745. return next("Invalid code.");
  1746. userModel.findOne(
  1747. { "services.password.reset.code": code },
  1748. next
  1749. );
  1750. },
  1751. (user, next) => {
  1752. if (!user) return next("Invalid code.");
  1753. if (!user.services.password.reset.expires > new Date())
  1754. return next("That code has expired.");
  1755. next(null);
  1756. },
  1757. ],
  1758. async (err) => {
  1759. if (err && err !== true) {
  1760. err = await utils.runJob("GET_ERROR", { error: err });
  1761. console.log(
  1762. "ERROR",
  1763. "VERIFY_PASSWORD_RESET_CODE",
  1764. `Code '${code}' failed to verify. '${err}'`
  1765. );
  1766. cb({ status: "failure", message: err });
  1767. } else {
  1768. console.log(
  1769. "SUCCESS",
  1770. "VERIFY_PASSWORD_RESET_CODE",
  1771. `Code '${code}' successfully verified.`
  1772. );
  1773. cb({
  1774. status: "success",
  1775. message: "Successfully verified password reset code.",
  1776. });
  1777. }
  1778. }
  1779. );
  1780. },
  1781. /**
  1782. * Changes a user's password with a reset code
  1783. *
  1784. * @param {Object} session - the session object automatically added by socket.io
  1785. * @param {String} code - the password reset code
  1786. * @param {String} newPassword - the new password reset code
  1787. * @param {Function} cb - gets called with the result
  1788. */
  1789. changePasswordWithResetCode: async (session, code, newPassword, cb) => {
  1790. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1791. async.waterfall(
  1792. [
  1793. (next) => {
  1794. if (!code || typeof code !== "string")
  1795. return next("Invalid code.");
  1796. userModel.findOne(
  1797. { "services.password.reset.code": code },
  1798. next
  1799. );
  1800. },
  1801. (user, next) => {
  1802. if (!user) return next("Invalid code.");
  1803. if (!user.services.password.reset.expires > new Date())
  1804. return next("That code has expired.");
  1805. next();
  1806. },
  1807. (next) => {
  1808. if (!db.passwordValid(newPassword))
  1809. return next(
  1810. "Invalid password. Check if it meets all the requirements."
  1811. );
  1812. return next();
  1813. },
  1814. (next) => {
  1815. bcrypt.genSalt(10, next);
  1816. },
  1817. // hash the password
  1818. (salt, next) => {
  1819. bcrypt.hash(sha256(newPassword), salt, next);
  1820. },
  1821. (hashedPassword, next) => {
  1822. userModel.updateOne(
  1823. { "services.password.reset.code": code },
  1824. {
  1825. $set: {
  1826. "services.password.password": hashedPassword,
  1827. },
  1828. $unset: { "services.password.reset": "" },
  1829. },
  1830. { runValidators: true },
  1831. next
  1832. );
  1833. },
  1834. ],
  1835. async (err) => {
  1836. if (err && err !== true) {
  1837. err = await utils.runJob("GET_ERROR", { error: err });
  1838. console.log(
  1839. "ERROR",
  1840. "CHANGE_PASSWORD_WITH_RESET_CODE",
  1841. `Code '${code}' failed to change password. '${err}'`
  1842. );
  1843. cb({ status: "failure", message: err });
  1844. } else {
  1845. console.log(
  1846. "SUCCESS",
  1847. "CHANGE_PASSWORD_WITH_RESET_CODE",
  1848. `Code '${code}' successfully changed password.`
  1849. );
  1850. cb({
  1851. status: "success",
  1852. message: "Successfully changed password.",
  1853. });
  1854. }
  1855. }
  1856. );
  1857. },
  1858. /**
  1859. * Bans a user by userId
  1860. *
  1861. * @param {Object} session - the session object automatically added by socket.io
  1862. * @param {String} value - the user id that is going to be banned
  1863. * @param {String} reason - the reason for the ban
  1864. * @param {String} expiresAt - the time the ban expires
  1865. * @param {Function} cb - gets called with the result
  1866. */
  1867. banUserById: hooks.adminRequired(
  1868. (session, userId, reason, expiresAt, cb) => {
  1869. async.waterfall(
  1870. [
  1871. (next) => {
  1872. if (!userId)
  1873. return next("You must provide a userId to ban.");
  1874. else if (!reason)
  1875. return next(
  1876. "You must provide a reason for the ban."
  1877. );
  1878. else return next();
  1879. },
  1880. (next) => {
  1881. if (!expiresAt || typeof expiresAt !== "string")
  1882. return next("Invalid expire date.");
  1883. let date = new Date();
  1884. switch (expiresAt) {
  1885. case "1h":
  1886. expiresAt = date.setHours(date.getHours() + 1);
  1887. break;
  1888. case "12h":
  1889. expiresAt = date.setHours(date.getHours() + 12);
  1890. break;
  1891. case "1d":
  1892. expiresAt = date.setDate(date.getDate() + 1);
  1893. break;
  1894. case "1w":
  1895. expiresAt = date.setDate(date.getDate() + 7);
  1896. break;
  1897. case "1m":
  1898. expiresAt = date.setMonth(date.getMonth() + 1);
  1899. break;
  1900. case "3m":
  1901. expiresAt = date.setMonth(date.getMonth() + 3);
  1902. break;
  1903. case "6m":
  1904. expiresAt = date.setMonth(date.getMonth() + 6);
  1905. break;
  1906. case "1y":
  1907. expiresAt = date.setFullYear(
  1908. date.getFullYear() + 1
  1909. );
  1910. break;
  1911. case "never":
  1912. expiresAt = new Date(3093527980800000);
  1913. break;
  1914. default:
  1915. return next("Invalid expire date.");
  1916. }
  1917. next();
  1918. },
  1919. (next) => {
  1920. punishments
  1921. .runJob("ADD_PUNISHMENT", {
  1922. type: "banUserId",
  1923. value: userId,
  1924. reason,
  1925. expiresAt,
  1926. punishedBy,
  1927. })
  1928. .then((punishment) => {
  1929. next(null, punishment);
  1930. })
  1931. .catch(next);
  1932. },
  1933. (punishment, next) => {
  1934. cache.runJob("PUB", {
  1935. channel: "user.ban",
  1936. value: { userId, punishment },
  1937. });
  1938. next();
  1939. },
  1940. ],
  1941. async (err) => {
  1942. if (err && err !== true) {
  1943. err = await utils.runJob("GET_ERROR", { error: err });
  1944. console.log(
  1945. "ERROR",
  1946. "BAN_USER_BY_ID",
  1947. `User ${session.userId} failed to ban user ${userId} with the reason ${reason}. '${err}'`
  1948. );
  1949. cb({ status: "failure", message: err });
  1950. } else {
  1951. console.log(
  1952. "SUCCESS",
  1953. "BAN_USER_BY_ID",
  1954. `User ${session.userId} has successfully banned user ${userId} with the reason ${reason}.`
  1955. );
  1956. cb({
  1957. status: "success",
  1958. message: "Successfully banned user.",
  1959. });
  1960. }
  1961. }
  1962. );
  1963. }
  1964. ),
  1965. getFavoriteStations: hooks.loginRequired(async (session, cb) => {
  1966. const userModel = await db.runJob("GET_MODEL", { modelName: "user" });
  1967. async.waterfall(
  1968. [
  1969. (next) => {
  1970. userModel.findOne({ _id: session.userId }, next);
  1971. },
  1972. (user, next) => {
  1973. if (!user) return next("User not found.");
  1974. next(null, user);
  1975. },
  1976. ],
  1977. async (err, user) => {
  1978. if (err && err !== true) {
  1979. err = await utils.runJob("GET_ERROR", { error: err });
  1980. console.log(
  1981. "ERROR",
  1982. "GET_FAVORITE_STATIONS",
  1983. `User ${session.userId} failed to get favorite stations. '${err}'`
  1984. );
  1985. cb({ status: "failure", message: err });
  1986. } else {
  1987. console.log(
  1988. "SUCCESS",
  1989. "GET_FAVORITE_STATIONS",
  1990. `User ${session.userId} got favorite stations.`
  1991. );
  1992. cb({
  1993. status: "success",
  1994. favoriteStations: user.favoriteStations,
  1995. });
  1996. }
  1997. }
  1998. );
  1999. }),
  2000. };