868 lines
23 KiB
JavaScript
868 lines
23 KiB
JavaScript
import fs from 'fs-extra'
|
|
import path from 'path'
|
|
import express from 'express'
|
|
import RateLimit from 'express-rate-limit'
|
|
|
|
import ensureLogin from '../../scripts/ensureLogin'
|
|
import config from '../../scripts/load-config'
|
|
import wrap from '../../scripts/asyncRoute'
|
|
import http from '../../scripts/http'
|
|
import API from '../api'
|
|
import News from '../api/news'
|
|
import emailer from '../api/emailer'
|
|
|
|
import apiRouter from './api'
|
|
import oauthRouter from './oauth2'
|
|
import adminRouter from './admin'
|
|
|
|
let router = express.Router()
|
|
|
|
// Restrict account creation
|
|
let accountLimiter = new RateLimit({
|
|
windowMs: 60 * 60 * 1000, // 1 hour
|
|
max: 10,
|
|
delayMs: 0,
|
|
message: 'Whoa, slow down there, buddy! You just hit our rate limits. Try again in 1 hour.'
|
|
})
|
|
|
|
// Set the user session
|
|
function setSession (req, user) {
|
|
req.session.user = {
|
|
id: user.id,
|
|
username: user.username,
|
|
display_name: user.display_name,
|
|
email: user.email,
|
|
avatar_file: user.avatar_file,
|
|
privilege: user.nw_privilege,
|
|
session_refresh: Date.now() + 1800000 // 30 minutes
|
|
}
|
|
}
|
|
|
|
function redirectLogin (req, res) {
|
|
let uri = '/'
|
|
|
|
if (req.session.redirectUri) {
|
|
uri = req.session.redirectUri
|
|
delete req.session.redirectUri
|
|
}
|
|
|
|
res.redirect(uri)
|
|
}
|
|
|
|
router.use(wrap(async (req, res, next) => {
|
|
// Add form messages into the template rendering if present
|
|
let messages = req.flash('message')
|
|
if (!messages || !messages.length) {
|
|
messages = {}
|
|
} else {
|
|
messages = messages[0]
|
|
}
|
|
|
|
res.locals.message = messages
|
|
|
|
// Update user session every 30 minutes
|
|
if (req.session.user) {
|
|
if (!req.session.user.session_refresh) {
|
|
req.session.user.session_refresh = Date.now() + 1800000
|
|
}
|
|
|
|
if (req.session.user.session_refresh < Date.now()) {
|
|
console.debug('User session update')
|
|
|
|
// Check for bans
|
|
let banStatus = await API.User.getBanStatus(req.session.user.id)
|
|
|
|
if (banStatus.length) {
|
|
delete req.session.user
|
|
return next()
|
|
}
|
|
|
|
// Update user session
|
|
let udata = await API.User.get(req.session.user)
|
|
setSession(req, udata)
|
|
|
|
// Update IP address
|
|
await API.User.update(udata, {ip_address: req.realIP})
|
|
}
|
|
}
|
|
|
|
next()
|
|
}))
|
|
|
|
router.use('/oauth2', oauthRouter)
|
|
|
|
/*
|
|
================
|
|
RENDER VIEWS
|
|
================
|
|
*/
|
|
|
|
router.get('/', (req, res) => {
|
|
res.render('index')
|
|
})
|
|
|
|
// Add social media login buttons
|
|
function extraButtons (req, res, next) {
|
|
if (config.twitter && config.twitter.api) {
|
|
res.locals.twitter_auth = true
|
|
}
|
|
|
|
if (config.discord && config.discord.api) {
|
|
res.locals.discord_auth = true
|
|
}
|
|
|
|
if (config.facebook && config.facebook.client) {
|
|
res.locals.facebook_auth = config.facebook.client
|
|
}
|
|
|
|
if (config.google && config.google.api) {
|
|
res.locals.google_auth = config.google.api
|
|
}
|
|
|
|
next()
|
|
}
|
|
|
|
// Retrieve form data if formError was called
|
|
function formKeep (req, res, next) {
|
|
let dataSave = req.flash('formkeep')
|
|
if (dataSave.length) {
|
|
dataSave = dataSave[0]
|
|
} else {
|
|
dataSave = {}
|
|
}
|
|
|
|
res.locals.formkeep = dataSave
|
|
next()
|
|
}
|
|
|
|
// Password reset request endpoint
|
|
router.get('/login/reset', extraButtons, (req, res) => {
|
|
if (req.session.user) return redirectLogin(req, res)
|
|
|
|
res.render('user/reset_password', {sent: req.query.success != null})
|
|
})
|
|
|
|
// Password reset endpoint (emailed link)
|
|
router.get('/reset/:token', wrap(async (req, res) => {
|
|
if (req.session.user) return res.redirect('/login')
|
|
let token = req.params.token
|
|
let success = await API.User.Reset.resetToken(token)
|
|
|
|
if (!success) {
|
|
req.flash('message', {error: true, text: 'Invalid or expired reset token.'})
|
|
res.redirect('/login')
|
|
return
|
|
}
|
|
|
|
res.render('user/password_new', {token: true})
|
|
}))
|
|
|
|
router.get('/login', extraButtons, (req, res) => {
|
|
if (req.session.user) return redirectLogin(req, res)
|
|
|
|
if (req.query.returnTo) {
|
|
req.session.redirectUri = req.query.returnTo
|
|
}
|
|
|
|
res.render('user/login')
|
|
})
|
|
|
|
router.get('/register', extraButtons, formKeep, (req, res) => {
|
|
if (req.session.user) return redirectLogin(req, res)
|
|
|
|
if (config.security.recaptcha && config.security.recaptcha.site_key) {
|
|
res.locals.recaptcha = config.security.recaptcha.site_key
|
|
}
|
|
|
|
res.render('user/register')
|
|
})
|
|
|
|
// User activation endpoint (emailed link)
|
|
router.get('/activate/:token', wrap(async (req, res) => {
|
|
if (req.session.user) return res.redirect('/login')
|
|
let token = req.params.token
|
|
let success = await API.User.Login.activationToken(token)
|
|
|
|
if (!success) {
|
|
req.flash('message', {error: true, text: 'Invalid or expired activation token.'})
|
|
} else {
|
|
req.flash('message', {error: false, text: 'Your account has been activated! You may now log in.'})
|
|
}
|
|
|
|
res.redirect('/login')
|
|
}))
|
|
|
|
// View for enabling Two-Factor Authentication
|
|
router.get('/user/two-factor', ensureLogin, wrap(async (req, res) => {
|
|
let twoFaEnabled = await API.User.Login.totpTokenRequired(req.session.user)
|
|
if (twoFaEnabled) return res.redirect('/')
|
|
|
|
let newToken = await API.User.Login.totpAquire(req.session.user)
|
|
if (!newToken) return res.redirect('/')
|
|
|
|
res.render('user/totp', { uri: newToken })
|
|
}))
|
|
|
|
// View for disabling Two-Factor Authentication
|
|
router.get('/user/two-factor/disable', ensureLogin, wrap(async (req, res) => {
|
|
let twoFaEnabled = await API.User.Login.totpTokenRequired(req.session.user)
|
|
|
|
if (!twoFaEnabled) return res.redirect('/')
|
|
res.render('user/password')
|
|
}))
|
|
|
|
// Two-Factor Authentication verification on login
|
|
router.get('/login/verify', (req, res) => {
|
|
res.render('user/totp-check')
|
|
})
|
|
|
|
// User settings page
|
|
router.get('/user/manage', ensureLogin, wrap(async (req, res) => {
|
|
let totpEnabled = false
|
|
let socialStatus = await API.User.socialStatus(req.session.user)
|
|
|
|
if (socialStatus.password) {
|
|
totpEnabled = await API.User.Login.totpTokenRequired(req.session.user)
|
|
}
|
|
|
|
// Decide whether we need a disconnect or a log in with button for social account logins
|
|
if (config.twitter && config.twitter.api) {
|
|
if (!socialStatus.enabled.twitter) {
|
|
res.locals.twitter_auth = true
|
|
} else if (socialStatus.source !== 'twitter') {
|
|
res.locals.twitter_auth = false
|
|
}
|
|
}
|
|
|
|
if (config.discord && config.discord.api) {
|
|
if (!socialStatus.enabled.discord) {
|
|
res.locals.discord_auth = true
|
|
} else if (socialStatus.source !== 'discord') {
|
|
res.locals.discord_auth = false
|
|
}
|
|
}
|
|
|
|
if (config.facebook && config.facebook.client) {
|
|
if (!socialStatus.enabled.facebook) {
|
|
res.locals.facebook_auth = config.facebook.client
|
|
} else if (socialStatus.source !== 'facebook') {
|
|
res.locals.facebook_auth = false
|
|
}
|
|
}
|
|
|
|
if (config.google && config.google.api) {
|
|
if (!socialStatus.enabled.google) {
|
|
res.locals.google_auth = config.google.api
|
|
} else if (socialStatus.source !== 'google') {
|
|
res.locals.google_auth = false
|
|
}
|
|
}
|
|
|
|
res.render('user/settings', {totp: totpEnabled, password: socialStatus.password})
|
|
}))
|
|
|
|
// Change password
|
|
router.get('/user/manage/password', ensureLogin, wrap(async (req, res) => {
|
|
res.render('user/password_new')
|
|
}))
|
|
|
|
// Change email
|
|
router.get('/user/manage/email', ensureLogin, wrap(async (req, res) => {
|
|
let obfuscated = req.session.user.email
|
|
if (obfuscated) {
|
|
let split = obfuscated.split('@')
|
|
let rep = split[0].charAt(0) + '***' + split[0].charAt(split[0].length - 1)
|
|
obfuscated = rep + '@' + split[1]
|
|
}
|
|
|
|
let socialStatus = await API.User.socialStatus(req.session.user)
|
|
|
|
res.render('user/email_change', {email: obfuscated, password: socialStatus.password})
|
|
}))
|
|
|
|
router.get('/donate', wrap(async (req, res, next) => {
|
|
if (!config.donations || !config.donations.business) return next()
|
|
|
|
res.render('donate', config.donations)
|
|
}))
|
|
|
|
/*
|
|
=================
|
|
POST HANDLING
|
|
=================
|
|
*/
|
|
|
|
// Used to display errors on forms and save data
|
|
function formError (req, res, error, redirect) {
|
|
// Security measures: never store any passwords in any session
|
|
for (let key in req.body) {
|
|
if (key.indexOf('password') !== -1) {
|
|
delete req.body[key]
|
|
}
|
|
}
|
|
|
|
req.flash('formkeep', req.body || {})
|
|
req.flash('message', {error: true, text: error})
|
|
res.redirect(redirect || req.originalUrl)
|
|
}
|
|
|
|
// Make sure characters are UTF-8
|
|
function cleanString (input) {
|
|
let output = ''
|
|
|
|
for (let i = 0; i < input.length; i++) {
|
|
output += input.charCodeAt(i) <= 127 ? input.charAt(i) : ''
|
|
}
|
|
|
|
return output
|
|
}
|
|
|
|
// Make sure CSRF tokens are present and valid in every form
|
|
function csrfValidation (req, res, next) {
|
|
if (req.body.csrf !== req.session.csrf) {
|
|
return formError(req, res, 'Invalid session! Try reloading the page.')
|
|
}
|
|
|
|
next()
|
|
}
|
|
|
|
// Enabling 2fa
|
|
router.post('/user/two-factor', csrfValidation, wrap(async (req, res, next) => {
|
|
if (!req.session.user) return next()
|
|
|
|
if (!req.body.code) {
|
|
return formError(req, res, 'You need to enter the code.')
|
|
}
|
|
|
|
let verified = await API.User.Login.totpCheck(req.session.user, req.body.code)
|
|
if (!verified) {
|
|
return formError(req, res, 'Something went wrong! Try scanning the code again.')
|
|
}
|
|
|
|
res.redirect('/')
|
|
}))
|
|
|
|
// Disabling 2fa
|
|
router.post('/user/two-factor/disable', csrfValidation, wrap(async (req, res, next) => {
|
|
if (!req.session.user) return next()
|
|
|
|
if (!req.body.password) {
|
|
return formError(req, res, 'Please enter your password.')
|
|
}
|
|
|
|
let purge = await API.User.Login.purgeTotp(req.session.user, req.body.password)
|
|
if (!purge) {
|
|
return formError(req, res, 'Invalid password.')
|
|
}
|
|
|
|
res.redirect('/')
|
|
}))
|
|
|
|
// Verify 2FA for login
|
|
router.post('/login/verify', csrfValidation, wrap(async (req, res, next) => {
|
|
if (req.session.user) return next()
|
|
|
|
if (req.session.totp_check === null) return res.redirect('/login')
|
|
|
|
if (!req.body.code && !req.body.recovery) {
|
|
return formError(req, res, 'You need to enter the code.')
|
|
}
|
|
|
|
let totpCheck = await API.User.Login.totpCheck(req.session.totp_check, req.body.code, req.body.recovery || false)
|
|
if (!totpCheck) {
|
|
return formError(req, res, 'Invalid code!')
|
|
}
|
|
|
|
let user = await API.User.get(req.session.totp_check)
|
|
delete req.session.totp_check
|
|
|
|
setSession(req, user)
|
|
redirectLogin(req, res)
|
|
}))
|
|
|
|
// Log the user in. Limited resource
|
|
router.post('/login', accountLimiter, csrfValidation, wrap(async (req, res, next) => {
|
|
if (req.session.user) return next()
|
|
|
|
if (!req.body.username || !req.body.password || req.body.username === '') {
|
|
return res.redirect('/login')
|
|
}
|
|
|
|
let user = await API.User.get(req.body.username)
|
|
if (!user) return formError(req, res, 'Invalid username or password.')
|
|
|
|
if (!user.password || user.password === '') return formError(req, res, 'Please log in using the buttons on the right.')
|
|
|
|
let pwMatch = await API.User.Login.password(user, req.body.password)
|
|
if (!pwMatch) return formError(req, res, 'Invalid username or password.')
|
|
|
|
if (user.activated === 0) return formError(req, res, 'Please activate your account first.')
|
|
|
|
if (user.locked === 1) return formError(req, res, 'This account has been locked.')
|
|
|
|
// Check if the user is banned
|
|
let banStatus = await API.User.getBanStatus(user.id)
|
|
if (banStatus.length) {
|
|
return res.render('user/banned', {bans: banStatus, ipban: false})
|
|
}
|
|
|
|
// Redirect to the verification dialog if 2FA is enabled
|
|
let totpRequired = await API.User.Login.totpTokenRequired(user)
|
|
if (totpRequired) {
|
|
req.session.totp_check = user.id
|
|
return res.redirect('/login/verify')
|
|
}
|
|
|
|
// Set session
|
|
setSession(req, user)
|
|
|
|
let uri = '/'
|
|
if (req.session.redirectUri) {
|
|
uri = req.session.redirectUri
|
|
delete req.session.redirectUri
|
|
}
|
|
|
|
if (req.query.redirect) {
|
|
uri = req.query.redirect
|
|
}
|
|
|
|
res.redirect(uri)
|
|
}))
|
|
|
|
// Password reset
|
|
router.post('/login/reset', accountLimiter, csrfValidation, wrap(async (req, res, next) => {
|
|
if (req.session.user) return next()
|
|
|
|
if (!req.body.email) {
|
|
return formError(req, res, 'You need to enter your email address.')
|
|
}
|
|
|
|
let email = req.body.email
|
|
let validEmail = await API.User.Register.validateEmail(email)
|
|
if (!validEmail) {
|
|
return formError(req, res, 'You need to enter a valid email address.')
|
|
}
|
|
|
|
try {
|
|
await API.User.Reset.reset(email)
|
|
|
|
req.flash('message', {error: false, text: 'We\'ve sent a link to your email address. Please check spam folders, too!'})
|
|
res.redirect('/login/reset?success=true')
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
}))
|
|
|
|
// Password reset endpoint (emailed link)
|
|
router.post('/reset/:token', csrfValidation, wrap(async (req, res) => {
|
|
if (req.session.user) return res.redirect('/login')
|
|
let token = req.params.token
|
|
let user = await API.User.Reset.resetToken(token)
|
|
|
|
if (!user) {
|
|
req.flash('message', {error: true, text: 'Invalid or expired reset token.'})
|
|
res.redirect('/login')
|
|
return
|
|
}
|
|
|
|
// 4th Check: Password length
|
|
let password = req.body.password
|
|
if (!password || password.length < 8) {
|
|
return formError(req, res, 'Invalid password! Please use at least 8 characters!')
|
|
}
|
|
|
|
// 5th Check: Password match
|
|
let passwordAgain = req.body.password_repeat
|
|
if (!passwordAgain || password !== passwordAgain) {
|
|
return formError(req, res, 'Passwords do not match!')
|
|
}
|
|
|
|
try {
|
|
await API.User.Reset.changePassword(user, password, token)
|
|
|
|
console.warn('[SECURITY AUDIT] User \'%s\' password has been changed from %s', user.username, req.realIP)
|
|
|
|
req.flash('message', {error: false, text: 'Your password has been changed successfully. You may now log in!'})
|
|
res.redirect('/login')
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
}))
|
|
|
|
// Protected & Limited resource: Account registration
|
|
router.post('/register', accountLimiter, csrfValidation, wrap(async (req, res, next) => {
|
|
if (req.session.user) return next()
|
|
|
|
if (!req.body.username || !req.body.display_name || !req.body.password || !req.body.email) {
|
|
return formError(req, res, 'Please fill in all the fields.')
|
|
}
|
|
|
|
// Ban check
|
|
let banStatus = await API.User.getBanStatus(req.realIP, true)
|
|
if (banStatus.length) {
|
|
return res.render('user/banned', {bans: banStatus, ipban: true})
|
|
}
|
|
|
|
// 1st Check: Username Characters and length
|
|
let username = req.body.username
|
|
if (!username || !username.match(/^([\w-_]{3,26})$/i)) {
|
|
return formError(req, res, 'Invalid username! Must be between 3-26 characters and composed of alphanumeric characters!')
|
|
}
|
|
|
|
// 2nd Check: Display Name
|
|
let displayName = req.body.display_name
|
|
if (!displayName || !displayName.match(/^([^\\`]{3,32})$/i)) {
|
|
return formError(req, res, 'Invalid display name!')
|
|
}
|
|
|
|
// 3rd Check: Email Address
|
|
let email = req.body.email
|
|
if (!email || !API.User.Register.validateEmail(email)) {
|
|
return formError(req, res, 'Invalid email address!')
|
|
}
|
|
|
|
// 4th Check: Password length
|
|
let password = req.body.password
|
|
if (!password || password.length < 8) {
|
|
return formError(req, res, 'Invalid password! Please use at least 8 characters!')
|
|
}
|
|
|
|
// 5th Check: Password match
|
|
let passwordAgain = req.body.password_repeat
|
|
if (!passwordAgain || password !== passwordAgain) {
|
|
return formError(req, res, 'Passwords do not match!')
|
|
}
|
|
|
|
// 6th Check: reCAPTCHA (if configuration contains key)
|
|
if (config.security && config.security.recaptcha && config.security.recaptcha.site_key) {
|
|
if (!req.body['g-recaptcha-response']) return formError(req, res, 'Please complete the reCAPTCHA!')
|
|
|
|
try {
|
|
let data = await http.POST('https://www.google.com/recaptcha/api/siteverify', {}, {
|
|
secret: config.security.recaptcha.secret_key,
|
|
response: req.body['g-recaptcha-response']
|
|
})
|
|
|
|
data = JSON.parse(data)
|
|
if (!data.success) {
|
|
return formError(req, res, 'Please complete the reCAPTCHA!')
|
|
}
|
|
} catch (e) {
|
|
console.error(e)
|
|
return formError(req, res, 'Internal server error')
|
|
}
|
|
}
|
|
|
|
// Hash the password
|
|
let hash = await API.User.Register.hashPassword(password)
|
|
let newUser
|
|
|
|
// Attempt to create the user
|
|
try {
|
|
newUser = await API.User.Register.newAccount({
|
|
username: username,
|
|
display_name: cleanString(displayName),
|
|
password: hash,
|
|
email: email,
|
|
ip_address: req.realIP
|
|
})
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
|
|
// Do not include activation link message when the user is already activated
|
|
let registerMessage = 'Account created successfully!'
|
|
if (newUser.user && newUser.user.activated !== 1) {
|
|
registerMessage += ' Please check your inbox for an activation link. Also, make sure to look into spam folders.'
|
|
}
|
|
|
|
req.flash('message', {error: false, text: registerMessage})
|
|
res.redirect('/login')
|
|
}))
|
|
|
|
// Change display name
|
|
router.post('/user/manage', csrfValidation, wrap(async (req, res, next) => {
|
|
if (!req.session.user) return next()
|
|
|
|
if (!req.body.display_name) {
|
|
return formError(req, res, 'Display Name cannot be blank.')
|
|
}
|
|
|
|
let displayName = req.body.display_name
|
|
if (!displayName || !displayName.match(/^([^\\`]{3,32})$/i)) {
|
|
return formError(req, res, 'Invalid Display Name!')
|
|
}
|
|
|
|
displayName = cleanString(displayName)
|
|
|
|
// No change
|
|
if (displayName === req.session.user.display_name) {
|
|
return res.redirect('/user/manage')
|
|
}
|
|
|
|
try {
|
|
await API.User.update(req.session.user, {
|
|
display_name: displayName
|
|
})
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
|
|
req.session.user.display_name = displayName
|
|
|
|
req.flash('message', {error: false, text: 'Settings changed successfully.'})
|
|
res.redirect('/user/manage')
|
|
}))
|
|
|
|
// Change user password
|
|
router.post('/user/manage/password', accountLimiter, csrfValidation, wrap(async (req, res, next) => {
|
|
if (!req.session.user) return next()
|
|
|
|
if (!req.body.password_old) {
|
|
return formError(req, res, 'Please enter your current password.')
|
|
}
|
|
|
|
let user = req.session.user
|
|
let passwordMatch = await API.User.Login.password(user, req.body.password_old)
|
|
if (!passwordMatch) {
|
|
return formError(req, res, 'The password you provided is incorrect.')
|
|
}
|
|
|
|
let password = req.body.password
|
|
if (!password || password.length < 8) {
|
|
return formError(req, res, 'Invalid password! Please use at least 8 characters!')
|
|
}
|
|
|
|
let passwordAgain = req.body.password_repeat
|
|
if (!passwordAgain || password !== passwordAgain) {
|
|
return formError(req, res, 'The passwords do not match!')
|
|
}
|
|
|
|
password = await API.User.Register.hashPassword(password)
|
|
|
|
try {
|
|
await API.User.update(user, {
|
|
password: password
|
|
})
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
|
|
console.warn('[SECURITY AUDIT] User \'%s\' password has been changed from %s', user.username, req.realIP)
|
|
|
|
if (config.email && config.email.enabled) {
|
|
await emailer.pushMail('password_alert', user.email, {
|
|
display_name: user.display_name,
|
|
ip: req.realIP
|
|
})
|
|
}
|
|
|
|
req.flash('message', {error: false, text: 'Password changed successfully.'})
|
|
return res.redirect('/user/manage')
|
|
}))
|
|
|
|
// Change email address
|
|
router.post('/user/manage/email', accountLimiter, csrfValidation, wrap(async (req, res, next) => {
|
|
if (!req.session.user) return next()
|
|
|
|
let user = await API.User.get(req.session.user)
|
|
let email = req.body.email
|
|
let newEmail = req.body.email_new
|
|
let password = req.body.password
|
|
|
|
if (!newEmail || (!email && user.email !== '')) {
|
|
return formError(req, res, 'Please fill in all of the fields.')
|
|
}
|
|
|
|
if (req.session.user.email !== '' && email !== user.email) {
|
|
return formError(req, res, 'The email you provided is incorrect.')
|
|
}
|
|
|
|
if (user.password != null && user.password !== '') {
|
|
if (!password) {
|
|
return formError(req, res, 'Enter a password.')
|
|
}
|
|
|
|
let passwordMatch = await API.User.Login.password(user, password)
|
|
if (!passwordMatch) {
|
|
return formError(req, res, 'The password you provided is incorrect.')
|
|
}
|
|
}
|
|
|
|
let emailValid = API.User.Register.validateEmail(newEmail)
|
|
if (!emailValid) {
|
|
return formError(req, res, 'Invalid email address.')
|
|
}
|
|
|
|
let emailTaken = await API.User.get(newEmail)
|
|
if (emailTaken) {
|
|
return formError(req, res, 'This email is already taken.')
|
|
}
|
|
|
|
try {
|
|
await API.User.update(user, {
|
|
email: newEmail
|
|
})
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
|
|
console.warn('[SECURITY AUDIT] User \'%s\' email has been changed from %s', user.username, req.realIP)
|
|
|
|
req.session.user.email = newEmail
|
|
|
|
req.flash('message', {error: false, text: 'Email changed successfully.'})
|
|
return res.redirect('/user/manage')
|
|
}))
|
|
|
|
/*
|
|
=============
|
|
DOCUMENTS
|
|
=============
|
|
*/
|
|
|
|
// Serve a document form the documents directory, cache it.
|
|
const docsDir = path.join(__dirname, '../../documents')
|
|
router.get('/docs/:name', wrap(async (req, res, next) => {
|
|
let doc = path.join(docsDir, req.params.name + '.html')
|
|
if (!await fs.exists(docsDir) || !await fs.exists(doc)) {
|
|
return next()
|
|
}
|
|
|
|
fs.readFile(doc, {encoding: 'utf8'}, (err, contents) => {
|
|
if (err) return next(err)
|
|
res.header('Cache-Control', 'max-age=' + 7 * 24 * 60 * 60 * 1000) // 1 week
|
|
res.render('document', {doc: contents})
|
|
})
|
|
}))
|
|
|
|
/*
|
|
========
|
|
NEWS
|
|
========
|
|
*/
|
|
|
|
function newsPrivilege (req, res, next) {
|
|
if (!req.session.user) return res.redirect('/news')
|
|
if (req.session.user.privilege < 1) return res.redirect('/news')
|
|
next()
|
|
}
|
|
|
|
router.get('/news/compose', newsPrivilege, formKeep, (req, res) => {
|
|
res.render('news/composer')
|
|
})
|
|
|
|
router.post('/news/compose', newsPrivilege, csrfValidation, wrap(async (req, res) => {
|
|
if (!req.body.title || !req.body.content) {
|
|
return formError(req, res, 'Required fields missing!')
|
|
}
|
|
|
|
let result
|
|
try {
|
|
result = await News.compose(req.session.user, req.body)
|
|
} catch (e) {
|
|
return formError(req, res, e.message)
|
|
}
|
|
|
|
res.redirect('/news/' + result.id + '-' + result.slug)
|
|
}))
|
|
|
|
// Serve news
|
|
router.get('/news/:id?-*', wrap(async (req, res) => {
|
|
let id = parseInt(req.params.id)
|
|
if (isNaN(id)) {
|
|
return res.status(404).render('article', {article: null})
|
|
}
|
|
|
|
let article = await News.article(id)
|
|
if (!article.id) {
|
|
return res.status(404).render('article', {article: null})
|
|
}
|
|
|
|
let editing = false
|
|
if (req.query.edit === '1' && req.session.user && req.session.user.privilege > 1) {
|
|
editing = true
|
|
}
|
|
|
|
res.render('news/article', {article: article, editing: editing})
|
|
}))
|
|
|
|
router.get('/news/', wrap(async (req, res) => {
|
|
let page = parseInt(req.query.page)
|
|
if (isNaN(page)) {
|
|
page = 1
|
|
}
|
|
|
|
let news = await News.listNews(page)
|
|
|
|
res.render('news/news', {news: news})
|
|
}))
|
|
|
|
router.get('/news/atom.xml', wrap(async (req, res) => {
|
|
let feed = await News.generateFeed()
|
|
|
|
res.set('Content-Type', 'application/atom+xml')
|
|
res.send(feed.atom1())
|
|
}))
|
|
|
|
router.get('/news/feed.json', wrap(async (req, res) => {
|
|
let feed = await News.generateFeed()
|
|
|
|
res.set('Content-Type', 'application/json')
|
|
res.send(feed.json1())
|
|
}))
|
|
|
|
// Render partials
|
|
router.get('/partials/:view', (req, res, next) => {
|
|
if (!req.params.view) return next()
|
|
|
|
res.render('user/partials/' + req.params.view)
|
|
})
|
|
|
|
/*
|
|
=========
|
|
OTHER
|
|
=========
|
|
*/
|
|
|
|
router.get('/logout', (req, res) => {
|
|
req.session.destroy()
|
|
res.redirect('/')
|
|
})
|
|
|
|
router.use('/api', apiRouter)
|
|
router.use('/admin', adminRouter)
|
|
|
|
/*
|
|
FALLBACK ROUTES BEYOND THIS POINT
|
|
*/
|
|
|
|
// Handle 'Failed to lookup view' errors
|
|
router.use((err, req, res, next) => {
|
|
if (err && err.stack) {
|
|
if (err.stack.indexOf('Failed to lookup view') !== -1) {
|
|
return next() // To 404
|
|
}
|
|
}
|
|
|
|
next(err) // To error handler
|
|
})
|
|
|
|
// 404 - last route
|
|
router.use((req, res) => {
|
|
res.status(404).render('404')
|
|
})
|
|
|
|
// Error handler
|
|
router.use((err, req, res, next) => {
|
|
console.error(err)
|
|
|
|
if (process.env.NODE_ENV !== 'production') {
|
|
return res.end(err.stack)
|
|
}
|
|
|
|
next()
|
|
})
|
|
|
|
module.exports = router
|