This repository has been archived on 2024-07-22. You can view files and clone it, but cannot push or open issues or pull requests.
Zaimki/server/routes/user.js

471 lines
15 KiB
JavaScript
Raw Normal View History

2020-10-31 13:33:59 -07:00
import { Router } from 'express';
import SQL from 'sql-template-strings';
import {ulid} from "ulid";
import {buildDict, makeId, now, handleErrorAsync} from "../../src/helpers";
2020-10-31 13:33:59 -07:00
import jwt from "../../src/jwt";
import mailer from "../../src/mailer";
2020-11-10 14:41:56 -08:00
import { loadSuml } from '../loader';
2020-11-02 12:12:15 -08:00
import avatar from '../avatar';
2020-11-02 12:45:45 -08:00
import { config as socialLoginConfig, handlers as socialLoginHandlers } from '../social';
import cookieSettings from "../../src/cookieSettings";
2021-08-07 03:03:49 -07:00
import {validateCaptcha} from "../captcha";
2020-10-31 13:33:59 -07:00
2020-11-10 14:41:56 -08:00
const config = loadSuml('config');
const translations = loadSuml('translations');
2020-10-31 13:33:59 -07:00
const USERNAME_CHARS = 'A-Za-zĄĆĘŁŃÓŚŻŹąćęłńóśżź0-9._-';
const normalise = s => s.trim().toLowerCase();
2021-08-07 02:14:53 -07:00
const isSpam = (email) => {
2021-08-07 02:40:03 -07:00
const noDots = email.replace(/\./g, '');
return noDots === 'javierfranciscotmp@gmailcom'
|| noDots === 'leahmarykathryntmp@gmail.com'
2021-08-07 02:52:23 -07:00
|| email.includes('dogazu')
|| email.includes('narodowcy.net')
2021-08-07 02:14:53 -07:00
|| email.length > 128;
}
2020-10-31 13:33:59 -07:00
const saveAuthenticator = async (db, type, user, payload, validForMinutes = null) => {
const id = ulid();
await db.get(SQL`INSERT INTO authenticators (id, userId, type, payload, validUntil) VALUES (
${id},
${user ? user.id : null},
${type},
${JSON.stringify(payload)},
2020-11-02 12:45:45 -08:00
${validForMinutes ? (now() + validForMinutes * 60) : null}
2020-10-31 13:33:59 -07:00
)`);
return id;
}
const findAuthenticator = async (db, id, type) => {
const authenticator = await db.get(SQL`SELECT * FROM authenticators
WHERE id = ${id}
AND type = ${type}
2020-11-02 12:45:45 -08:00
AND (validUntil IS NULL OR validUntil > ${now()})
2020-10-31 13:33:59 -07:00
`);
if (authenticator) {
authenticator.payload = JSON.parse(authenticator.payload);
}
return authenticator
}
2021-04-13 02:29:46 -07:00
const findLatestEmailAuthenticator = async (db, email, type) => {
const authenticator = await db.get(SQL`SELECT * FROM authenticators
WHERE payload LIKE ${'%"email":"' + email + '"%'}
AND type = ${type}
AND (validUntil IS NULL OR validUntil > ${now()})
ORDER BY id DESC
`);
if (authenticator) {
authenticator.payload = JSON.parse(authenticator.payload);
}
return authenticator
}
2020-10-31 13:33:59 -07:00
const invalidateAuthenticator = async (db, id) => {
await db.get(SQL`UPDATE authenticators
2020-11-02 12:45:45 -08:00
SET validUntil = ${now()}
2020-10-31 13:33:59 -07:00
WHERE id = ${id}
`);
}
const defaultUsername = async (db, email) => {
2021-07-14 07:05:34 -07:00
const base = normalise(
email.substring(0, email.includes('@') ? email.indexOf('@') : email.length)
.padEnd(4, '0')
.substring(0, 14)
.replace(new RegExp(`[^${USERNAME_CHARS}]`, 'g'), '_')
);
const conflicts = (await db.all(SQL`SELECT usernameNorm FROM users WHERE usernameNorm LIKE ${normalise(base) + '%'}`))
.map(({usernameNorm}) => usernameNorm);
2020-10-31 13:33:59 -07:00
let c = 0;
while (true) {
let proposal = base + (c || '');
2021-07-14 07:05:34 -07:00
if (!conflicts.includes(proposal)) {
2020-10-31 13:33:59 -07:00
return proposal;
}
c++;
}
}
2020-12-24 04:00:37 -08:00
const fetchOrCreateUser = async (db, user, avatarSource = 'gravatar') => {
2020-10-31 13:33:59 -07:00
let dbUser = await db.get(SQL`SELECT * FROM users WHERE email = ${normalise(user.email)}`);
if (!dbUser) {
dbUser = {
id: ulid(),
2020-11-02 10:31:05 -08:00
username: await defaultUsername(db, user.name || user.email),
2020-10-31 13:33:59 -07:00
email: normalise(user.email),
2020-12-30 15:15:38 -08:00
roles: '',
2020-11-02 12:12:15 -08:00
avatarSource: avatarSource,
2020-10-31 13:33:59 -07:00
}
2021-07-14 06:28:53 -07:00
await db.get(SQL`INSERT INTO users(id, username, usernameNorm, email, roles, avatarSource)
VALUES (${dbUser.id}, ${dbUser.username}, ${normalise(dbUser.username)}, ${dbUser.email}, ${dbUser.roles}, ${dbUser.avatarSource})`)
2020-10-31 13:33:59 -07:00
}
2020-11-02 12:12:15 -08:00
dbUser.avatar = await avatar(db, dbUser);
2020-11-02 10:31:05 -08:00
return dbUser;
}
const issueAuthentication = async (db, user) => {
const dbUser = await fetchOrCreateUser(db, user);
return jwt.sign({
...dbUser,
authenticated: true,
});
2020-10-31 13:33:59 -07:00
}
const validateEmail = async (email) => {
email = String(email).toLowerCase();
if (email.endsWith('.oauth')) {
return;
}
2020-10-31 13:33:59 -07:00
const re = /^(([^<>()\[\]\\.,;:\s@"]+(\.[^<>()\[\]\\.,;:\s@"]+)*)|(".+"))@((\[[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\])|(([a-zA-Z\-0-9]+\.)+[a-zA-Z]{2,}))$/;
if (!re.test(email)) {
return false;
}
2021-04-12 12:19:25 -07:00
const { Resolver } = require('dns').promises;
const dns = new Resolver();
try {
const addresses = await dns.resolveMx(email.split('@')[1]);
return addresses.length > 0;
} catch {
return false;
}
2020-10-31 13:33:59 -07:00
}
2021-04-13 02:29:46 -07:00
const deduplicateEmail = async (db, email, cbSuccess, cbFail) => {
const count = (await db.get(SQL`SELECT COUNT(*) AS c FROM emails WHERE email = ${email} AND sentAt >= ${now() - 5 * 60}`)).c;
if (count > 0) {
console.error('Duplicate email requests for ' + email);
if (cbFail) { await cbFail(); }
return;
}
await cbSuccess();
await db.get(SQL`INSERT INTO emails (email, sentAt) VALUES (${email}, ${now()});`);
}
2020-11-03 00:27:30 -08:00
const reloadUser = async (req, res, next) => {
2021-06-17 16:43:17 -07:00
if (!req.url.startsWith('/user/') && req.method === 'GET') {
next();
return;
}
2020-11-03 00:27:30 -08:00
if (!req.user) {
next();
return;
}
const dbUser = await req.db.get(SQL`SELECT * FROM users WHERE id = ${req.user.id}`);
if (!dbUser) {
res.clearCookie('token');
next();
return;
}
if (req.user.username !== dbUser.username
|| req.user.email !== dbUser.email
|| req.user.roles !== dbUser.roles
|| req.user.avatarSource !== dbUser.avatarSource
2021-06-16 07:08:38 -07:00
|| req.user.bannedReason !== dbUser.bannedReason
2020-11-03 00:27:30 -08:00
) {
const newUser = {
...dbUser,
authenticated: true,
avatar: await avatar(req.db, dbUser),
};
const token = jwt.sign(newUser);
res.cookie('token', token, cookieSettings);
2020-11-03 00:27:30 -08:00
req.user = {...req.user, ...newUser};
}
next();
}
2020-10-31 13:33:59 -07:00
const router = Router();
router.use(handleErrorAsync(reloadUser));
2020-11-03 00:27:30 -08:00
router.post('/user/init', handleErrorAsync(async (req, res) => {
2021-08-07 02:14:53 -07:00
if (req.body.usernameOrEmail && isSpam(req.body.usernameOrEmail || '')) {
2021-08-06 15:00:42 -07:00
req.socket.end();
return;
}
2021-08-07 03:03:49 -07:00
if (!await validateCaptcha(req.body.captchaToken)) {
return res.json({error: 'captcha.invalid'});
}
2020-10-31 13:33:59 -07:00
let user = undefined;
let usernameOrEmail = req.body.usernameOrEmail;
const isEmail = usernameOrEmail.indexOf('@') > -1;
let isTest = false;
if (process.env.NODE_ENV === 'development' && usernameOrEmail.endsWith('+')) {
isTest = true;
usernameOrEmail = usernameOrEmail.substring(0, usernameOrEmail.length - 1);
}
if (isEmail) {
user = await req.db.get(SQL`SELECT * FROM users WHERE email = ${normalise(usernameOrEmail)}`);
} else {
2021-07-14 06:28:53 -07:00
user = await req.db.get(SQL`SELECT * FROM users WHERE usernameNorm = ${normalise(usernameOrEmail)}`);
2020-10-31 13:33:59 -07:00
}
if (!user && !isEmail) {
return res.json({error: 'user.login.userNotFound'})
}
const payload = {
username: isEmail ? (user ? user.username : null) : usernameOrEmail,
email: isEmail ? normalise(usernameOrEmail) : user.email,
code: isTest ? '999999' : makeId(6, '0123456789'),
}
if (!await validateEmail(payload.email)) {
return res.json({ error: 'user.account.changeEmail.invalid' })
}
2021-04-13 02:29:46 -07:00
let codeKey;
if (isTest) {
codeKey = await saveAuthenticator(req.db, 'email', user, payload, 15);
} else {
await deduplicateEmail(
req.db,
2020-10-31 13:33:59 -07:00
payload.email,
2021-04-13 02:29:46 -07:00
async () => {
codeKey = await saveAuthenticator(req.db, 'email', user, payload, 15);
mailer(
payload.email,
`[${translations.title}] ${translations.user.login.email.subject.replace('%code%', payload.code)}`,
translations.user.login.email.content.replace('%code%', payload.code),
)
},
async () => {
const auth = await findLatestEmailAuthenticator(req.db, payload.email, 'email');
codeKey = auth ? auth.id : null;
},
);
2020-10-31 13:33:59 -07:00
}
return res.json({
token: jwt.sign({...payload, code: null, codeKey}, '15m'),
});
}));
2020-10-31 13:33:59 -07:00
router.post('/user/validate', handleErrorAsync(async (req, res) => {
2020-10-31 13:33:59 -07:00
if (!req.rawUser || !req.rawUser.codeKey) {
return res.json({error: 'user.tokenExpired'});
}
const authenticator = await findAuthenticator(req.db, req.rawUser.codeKey, 'email');
if (!authenticator) {
return res.json({error: 'user.tokenExpired'});
}
if (authenticator.payload.code !== normalise(req.body.code)) {
return res.json({error: 'user.code.invalid'});
}
await invalidateAuthenticator(req.db, authenticator);
2020-11-02 10:31:05 -08:00
return res.json({token: await issueAuthentication(req.db, req.rawUser)});
}));
2020-10-31 13:33:59 -07:00
router.post('/user/change-username', handleErrorAsync(async (req, res) => {
2020-10-31 13:33:59 -07:00
if (!req.user) {
return res.status(401).json({error: 'Unauthorised'});
}
if (req.body.username.length < 4 || req.body.username.length > 16 || !req.body.username.match(new RegExp(`^[${USERNAME_CHARS}]+$`))) {
return res.json({ error: 'user.account.changeUsername.invalid' });
2020-10-31 13:33:59 -07:00
}
2021-07-14 06:28:53 -07:00
const dbUser = await req.db.get(SQL`SELECT * FROM users WHERE usernameNorm = ${normalise(req.body.username)}`);
2020-10-31 13:33:59 -07:00
if (dbUser) {
return res.json({ error: 'user.account.changeUsername.taken' })
}
2021-07-14 06:28:53 -07:00
await req.db.get(SQL`UPDATE users SET username = ${req.body.username}, usernameNorm = ${normalise(req.body.username)} WHERE id = ${req.user.id}`);
2020-10-31 13:33:59 -07:00
2020-11-02 10:31:05 -08:00
return res.json({token: await issueAuthentication(req.db, req.user)});
}));
2020-10-31 13:33:59 -07:00
router.post('/user/change-email', handleErrorAsync(async (req, res) => {
2021-08-07 02:14:53 -07:00
if (!req.user || req.user.bannedReason || isSpam(req.body.email || '')) {
2020-10-31 13:33:59 -07:00
return res.status(401).json({error: 'Unauthorised'});
}
if (!await validateCaptcha(req.body.captchaToken)) {
return res.json({error: 'captcha.invalid'});
}
if (!await validateEmail(req.user.email)) {
2020-10-31 13:33:59 -07:00
return res.json({ error: 'user.account.changeEmail.invalid' })
}
const dbUser = await req.db.get(SQL`SELECT * FROM users WHERE lower(trim(email)) = ${normalise(req.body.email)}`);
if (dbUser) {
return res.json({ error: 'user.account.changeEmail.taken' })
}
if (!req.body.authId) {
const payload = {
from: req.user.email,
to: normalise(req.body.email),
code: makeId(6, '0123456789'),
};
const authId = await saveAuthenticator(req.db, 'changeEmail', req.user, payload, 15);
mailer(
payload.to,
`[${translations.title}] ${translations.user.login.email.subject.replace('%code%', payload.code)}`,
translations.user.login.email.content.replace('%code%', payload.code),
)
return res.json({ authId });
}
const authenticator = await findAuthenticator(req.db, req.body.authId, 'changeEmail');
if (!authenticator) {
return res.json({error: 'user.tokenExpired'});
}
if (authenticator.payload.code !== normalise(req.body.code)) {
return res.json({error: 'user.code.invalid'});
}
await invalidateAuthenticator(req.db, authenticator);
2020-11-03 00:27:30 -08:00
await req.db.get(SQL`UPDATE users SET email = ${authenticator.payload.to} WHERE id = ${req.user.id}`);
2020-10-31 13:33:59 -07:00
req.user.email = authenticator.payload.to;
2020-11-02 10:31:05 -08:00
return res.json({token: await issueAuthentication(req.db, req.user)});
}));
2020-10-31 13:33:59 -07:00
router.post('/user/delete', handleErrorAsync(async (req, res) => {
2020-10-31 13:33:59 -07:00
if (!req.user) {
return res.status(401).json({error: 'Unauthorised'});
}
2020-11-03 00:27:30 -08:00
await req.db.get(SQL`DELETE FROM profiles WHERE userId = ${req.user.id}`)
await req.db.get(SQL`DELETE FROM authenticators WHERE userId = ${req.user.id}`)
await req.db.get(SQL`DELETE FROM users WHERE id = ${req.user.id}`)
2020-10-31 13:33:59 -07:00
return res.json(true);
}));
2020-10-31 13:33:59 -07:00
router.post('/user/:id/set-roles', handleErrorAsync(async (req, res) => {
2020-12-30 15:03:30 -08:00
if (!req.isGranted('*')) {
2020-11-03 01:03:07 -08:00
return res.status(401).json({error: 'Unauthorised'});
}
await req.db.get(SQL`UPDATE users SET roles = ${req.body.roles} WHERE id = ${req.params.id}`);
return res.json('ok');
}));
2020-11-03 01:03:07 -08:00
router.get('/user/social/:provider', handleErrorAsync(async (req, res) => {
if (!req.session.grant || !req.session.grant.response || !req.session.grant.response.access_token || !socialLoginHandlers[req.params.provider]) {
return res.status(400).redirect('/' + config.user.route);
}
const payload = socialLoginHandlers[req.params.provider](req.session.grant.response);
if (payload.id === undefined) {
return res.status(400).redirect('/' + config.user.route);
}
2020-11-02 10:31:05 -08:00
const auth = await req.db.get(SQL`
SELECT * FROM authenticators
WHERE type = ${req.params.provider}
AND payload LIKE ${'{"id":"' + payload.id + '"%'}
2020-11-02 12:45:45 -08:00
AND (validUntil IS NULL OR validUntil > ${now()})
2020-11-02 10:31:05 -08:00
`)
const user = auth ? await req.db.get(SQL`
SELECT * FROM users
WHERE id = ${auth.userId}
`) : req.user;
const dbUser = await fetchOrCreateUser(req.db, user || {
email: payload.email || `${payload.id}@${req.params.provider}.oauth`,
name: payload.name,
2020-11-02 12:12:15 -08:00
}, req.params.provider);
2020-11-02 10:31:05 -08:00
const token = jwt.sign({
...dbUser,
authenticated: true,
});
if (auth) {
await invalidateAuthenticator(req.db, auth.id);
}
await saveAuthenticator(req.db, req.params.provider, dbUser, payload);
return res.cookie('token', token).redirect('/' + config.user.route);
}));
2020-11-02 10:31:05 -08:00
router.get('/user/social-connections', handleErrorAsync(async (req, res) => {
2020-11-02 10:31:05 -08:00
if (!req.user) {
return res.status(401).json({error: 'Unauthorised'});
}
const authenticators = await req.db.all(SQL`
SELECT type, payload FROM authenticators
2020-11-02 12:45:45 -08:00
WHERE type IN (`.append(Object.keys(socialLoginConfig).map(k => `'${k}'`).join(',')).append(SQL`)
2020-11-02 10:31:05 -08:00
AND userId = ${req.user.id}
2020-11-02 12:45:45 -08:00
AND (validUntil IS NULL OR validUntil > ${now()})
2020-11-02 10:31:05 -08:00
`));
return res.json(buildDict(function* () {
for (let auth of authenticators) {
yield [auth.type, JSON.parse(auth.payload)];
}
}));
}));
2020-11-02 10:31:05 -08:00
router.post('/user/social-connection/:provider/disconnect', handleErrorAsync(async (req, res) => {
2020-11-02 10:31:05 -08:00
if (!req.user) {
return res.status(401).json({error: 'Unauthorised'});
}
const auth = await req.db.get(SQL`
SELECT id FROM authenticators
WHERE type = ${req.params.provider}
AND userId = ${req.user.id}
2020-11-02 12:45:45 -08:00
AND (validUntil IS NULL OR validUntil > ${now()})
2020-11-02 10:31:05 -08:00
`)
await invalidateAuthenticator(req.db, auth.id)
return res.json('ok');
}));
2020-11-02 10:31:05 -08:00
router.post('/user/set-avatar', handleErrorAsync(async (req, res) => {
2020-11-02 12:12:15 -08:00
if (!req.user) {
return res.status(401).json({error: 'Unauthorised'});
}
await req.db.get(SQL`
UPDATE users
SET avatarSource = ${req.body.source || null}
WHERE id = ${req.user.id}
`)
return res.json({token: await issueAuthentication(req.db, req.user)});
}));
2020-11-02 12:12:15 -08:00
2020-10-31 13:33:59 -07:00
export default router;