expressCart/routes/user.js

310 lines
9.4 KiB
JavaScript
Raw Normal View History

2018-02-05 23:20:44 +10:00
const express = require('express');
const common = require('../lib/common');
2019-06-15 14:46:08 +10:00
const { restrict } = require('../lib/auth');
2018-02-05 23:20:44 +10:00
const colors = require('colors');
const bcrypt = require('bcryptjs');
const router = express.Router();
2019-11-09 09:18:32 +10:00
router.get('/admin/users', restrict, async (req, res) => {
2018-02-05 23:20:44 +10:00
const db = req.app.db;
2019-11-09 09:18:32 +10:00
const users = await db.users.find({}, { projection: { userPassword: 0 } }).toArray();
if(req.apiAuthenticated){
res.status(200).json(users);
return;
}
res.render('users', {
title: 'Users',
users: users,
admin: true,
config: req.app.config,
isAdmin: req.session.isAdmin,
helpers: req.handlebars.helpers,
session: req.session,
message: common.clearSessionValue(req.session, 'message'),
messageType: common.clearSessionValue(req.session, 'messageType')
2018-02-05 23:20:44 +10:00
});
});
// edit user
2019-11-09 09:18:32 +10:00
router.get('/admin/user/edit/:id', restrict, async (req, res) => {
2018-02-05 23:20:44 +10:00
const db = req.app.db;
2019-11-09 09:18:32 +10:00
const user = await db.users.findOne({ _id: common.getId(req.params.id) });
2019-11-06 20:57:00 +10:00
2019-11-09 09:18:32 +10:00
// Check user is found
if(!user){
if(req.apiAuthenticated){
res.status(400).json({ message: 'User not found' });
2019-11-06 20:57:00 +10:00
return;
2019-11-07 16:36:20 +10:00
}
2019-11-09 09:18:32 +10:00
req.session.message = 'User not found';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
// if the user we want to edit is not the current logged in user and the current user is not
// an admin we render an access denied message
if(user.userEmail !== req.session.user && req.session.isAdmin === false){
if(req.apiAuthenticated){
res.status(400).json({ message: 'Access denied' });
2018-02-05 23:20:44 +10:00
return;
}
2019-11-09 09:18:32 +10:00
req.session.message = 'Access denied';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
res.render('user_edit', {
title: 'User edit',
user: user,
admin: true,
session: req.session,
message: common.clearSessionValue(req.session, 'message'),
messageType: common.clearSessionValue(req.session, 'messageType'),
helpers: req.handlebars.helpers,
config: req.app.config
2018-02-05 23:20:44 +10:00
});
});
// users new
2019-06-15 14:46:08 +10:00
router.get('/admin/user/new', restrict, (req, res) => {
2018-02-05 23:20:44 +10:00
res.render('user_new', {
title: 'User - New',
admin: true,
session: req.session,
helpers: req.handlebars.helpers,
message: common.clearSessionValue(req.session, 'message'),
messageType: common.clearSessionValue(req.session, 'messageType'),
2018-02-23 03:41:24 +10:00
config: req.app.config
2018-02-05 23:20:44 +10:00
});
});
// delete user
2019-11-07 16:36:20 +10:00
router.get('/admin/user/delete/:id', restrict, async (req, res) => {
2018-02-05 23:20:44 +10:00
const db = req.app.db;
2019-11-06 20:57:00 +10:00
// userId
2019-11-07 16:36:20 +10:00
if(req.session.isAdmin !== true){
2019-11-09 09:18:32 +10:00
if(req.apiAuthenticated){
res.status(400).json({ message: 'Access denied' });
return;
}
2019-11-07 16:36:20 +10:00
req.session.message = 'Access denied.';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
2019-11-06 20:57:00 +10:00
2019-11-07 16:36:20 +10:00
// Cannot delete your own account
if(req.session.userId === req.params.id){
2019-11-09 09:18:32 +10:00
if(req.apiAuthenticated){
res.status(400).json({ message: 'Unable to delete own user account' });
return;
}
2019-11-07 16:36:20 +10:00
req.session.message = 'Unable to delete own user account.';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
const user = await db.users.findOne({ _id: common.getId(req.params.id) });
// If user is not found
if(!user){
2019-11-09 09:18:32 +10:00
if(req.apiAuthenticated){
res.status(400).json({ message: 'User not found.' });
return;
}
2019-11-07 16:36:20 +10:00
req.session.message = 'User not found.';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
// Cannot delete the original user/owner
if(user.isOwner){
2019-11-09 09:18:32 +10:00
if(req.apiAuthenticated){
res.status(400).json({ message: 'Access denied.' });
return;
}
2018-02-05 23:20:44 +10:00
req.session.message = 'Access denied.';
req.session.messageType = 'danger';
res.redirect('/admin/users');
2019-11-07 16:36:20 +10:00
return;
2018-02-05 23:20:44 +10:00
}
2019-11-07 16:36:20 +10:00
2019-11-09 09:18:32 +10:00
try{
await db.users.deleteOne({ _id: common.getId(req.params.id) }, {});
if(req.apiAuthenticated){
res.status(200).json({ message: 'User deleted.' });
return;
2019-11-07 16:36:20 +10:00
}
req.session.message = 'User deleted.';
req.session.messageType = 'success';
res.redirect('/admin/users');
2019-11-09 09:18:32 +10:00
}catch(ex){
console.log('Failed to delete user', ex);
if(req.apiAuthenticated){
res.status(200).json({ message: 'Cannot delete user' });
return;
}
req.session.message = 'Cannot delete user';
req.session.messageType = 'danger';
res.redirect('/admin/users');
};
2018-02-05 23:20:44 +10:00
});
// update a user
2019-11-09 09:18:32 +10:00
router.post('/admin/user/update', restrict, async (req, res) => {
2018-02-05 23:20:44 +10:00
const db = req.app.db;
2018-02-06 07:28:04 +10:00
let isAdmin = req.body.user_admin === 'on';
2018-02-05 23:20:44 +10:00
// get the user we want to update
2019-11-09 09:18:32 +10:00
const user = await db.users.findOne({ _id: common.getId(req.body.userId) });
2019-11-09 09:18:32 +10:00
// If user not found
if(!user){
if(req.apiAuthenticated){
res.status(400).json({ message: 'User not found' });
return;
}
2019-11-09 09:18:32 +10:00
req.session.message = 'User not found';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
// If the current user changing own account ensure isAdmin retains existing
if(user.userEmail === req.session.user){
isAdmin = user.isAdmin;
}
// if the user we want to edit is not the current logged in user and the current user is not
// an admin we render an access denied message
if(user.userEmail !== req.session.user && req.session.isAdmin === false){
if(req.apiAuthenticated){
res.status(400).json({ message: 'Access denied' });
2018-02-05 23:20:44 +10:00
return;
}
2019-11-09 09:18:32 +10:00
req.session.message = 'Access denied';
req.session.messageType = 'danger';
res.redirect('/admin/users');
return;
}
// create the update doc
const updateDoc = {};
updateDoc.isAdmin = isAdmin;
updateDoc.usersName = req.body.usersName;
if(req.body.userPassword){
updateDoc.userPassword = bcrypt.hashSync(req.body.userPassword);
}
2018-02-05 23:20:44 +10:00
2019-11-09 09:18:32 +10:00
try{
await db.users.updateOne(
{ _id: common.getId(req.body.userId) },
2018-02-05 23:20:44 +10:00
{
$set: updateDoc
2019-11-09 09:18:32 +10:00
}, { multi: false }
);
if(req.apiAuthenticated){
res.status(200).json({ message: 'User account updated.' });
return;
}
// show the view
req.session.message = 'User account updated.';
req.session.messageType = 'success';
res.redirect('/admin/user/edit/' + req.body.userId);
}catch(ex){
if(req.apiAuthenticated){
res.status(400).json({ message: 'Failed to update user' });
return;
}
console.error(colors.red('Failed updating user: ' + ex));
req.session.message = 'Failed to update user';
req.session.messageType = 'danger';
res.redirect('/admin/user/edit/' + req.body.userId);
}
2018-02-05 23:20:44 +10:00
});
// insert a user
2019-11-09 09:18:32 +10:00
router.post('/admin/user/insert', restrict, async (req, res) => {
2018-02-05 23:20:44 +10:00
const db = req.app.db;
// set the account to admin if using the setup form. Eg: First user account
2019-07-12 18:06:34 +10:00
const urlParts = new URL(req.header('Referer'));
2018-02-05 23:20:44 +10:00
// Check number of users
2019-11-09 09:18:32 +10:00
const userCount = await db.users.countDocuments({});
let isAdmin = false;
// if no users, setup user as admin
if(userCount === 0){
isAdmin = true;
}
const doc = {
usersName: req.body.usersName,
userEmail: req.body.userEmail,
userPassword: bcrypt.hashSync(req.body.userPassword, 10),
isAdmin: isAdmin
};
// check for existing user
const user = await db.users.findOne({ userEmail: req.body.userEmail });
if(user){
if(req.apiAuthenticated){
res.status(400).json({ message: 'A user with that email address already exists' });
return;
}
// user already exists with that email address
console.error(colors.red('Failed to insert user, possibly already exists: ' + err));
req.session.message = 'A user with that email address already exists';
req.session.messageType = 'danger';
res.redirect('/admin/user/new');
return;
}
// email is ok to be used.
try{
await db.users.insertOne(doc);
// if from setup we add user to session and redirect to login.
// Otherwise we show users screen
if(urlParts.path === '/admin/setup'){
req.session.user = req.body.userEmail;
res.redirect('/admin/login');
return;
}
if(req.apiAuthenticated){
res.status(200).json({ message: 'User account inserted' });
return;
}
req.session.message = 'User account inserted';
req.session.messageType = 'success';
res.redirect('/admin/users');
}catch(ex){
if(req.apiAuthenticated){
res.status(400).json({ message: 'New user creation failed' });
return;
}
console.error(colors.red('Failed to insert user: ' + ex));
req.session.message = 'New user creation failed';
req.session.messageType = 'danger';
res.redirect('/admin/user/new');
}
2018-02-05 23:20:44 +10:00
});
module.exports = router;