136 lines
3.2 KiB
JavaScript
136 lines
3.2 KiB
JavaScript
var debug = require('debug')('freecc:user:remote');
|
|
var blacklistedUsernames =
|
|
require('../../server/utils/constants').blacklistedUsernames;
|
|
|
|
module.exports = function(User) {
|
|
// NOTE(berks): user email validation currently not needed but build in. This
|
|
// work around should let us sneak by
|
|
// see:
|
|
// https://github.com/strongloop/loopback/issues/1137#issuecomment-109200135
|
|
delete User.validations.email;
|
|
// set salt factor for passwords
|
|
User.settings.saltWorkFactor = 5;
|
|
|
|
// username should not be in blacklist
|
|
User.validatesExclusionOf('username', {
|
|
'in': blacklistedUsernames,
|
|
message: 'is taken'
|
|
});
|
|
|
|
// username should be unique
|
|
User.validatesUniquenessOf('username');
|
|
|
|
debug('setting up user hooks');
|
|
User.afterRemote('confirm', function(ctx) {
|
|
ctx.req.flash('success', {
|
|
msg: [
|
|
'You\'re email has been confirmed!'
|
|
]
|
|
});
|
|
ctx.res.redirect('/email-signin');
|
|
});
|
|
|
|
User.afterRemote('login', function(ctx, user, next) {
|
|
var res = ctx.res;
|
|
var req = ctx.req;
|
|
// var args = ctx.args;
|
|
|
|
var accessToken = {};
|
|
var config = {
|
|
signed: !!req.signedCookies,
|
|
maxAge: accessToken.ttl
|
|
};
|
|
if (accessToken && accessToken.id) {
|
|
res.cookie('access_token', accessToken.id, config);
|
|
res.cookie('userId', accessToken.userId, config);
|
|
}
|
|
debug('before pass login');
|
|
return req.logIn(user, function(err) {
|
|
if (err) {
|
|
return next(err);
|
|
}
|
|
req.flash('success', { msg: 'Success! You are logged in.' });
|
|
return res.redirect('/');
|
|
});
|
|
});
|
|
|
|
User.afterRemoteError('login', function(ctx) {
|
|
var res = ctx.res;
|
|
var req = ctx.req;
|
|
|
|
req.flash('errors', {
|
|
msg: 'Invalid username or password.'
|
|
});
|
|
return res.redirect('/');
|
|
});
|
|
|
|
User.afterRemote('logout', function(ctx, result, next) {
|
|
var res = ctx.result;
|
|
res.clearCookie('access_token');
|
|
res.clearCookie('userId');
|
|
next();
|
|
});
|
|
|
|
User.doesExist = function doesExist(username, email, cb) {
|
|
if (!username && !email) {
|
|
return process.nextTick(function() {
|
|
cb(null, false);
|
|
});
|
|
}
|
|
debug('checking existence');
|
|
|
|
// check to see if username is on blacklist
|
|
if (username && blacklistedUsernames.indexOf(username) !== -1) {
|
|
return cb(null, true);
|
|
}
|
|
|
|
var where = {};
|
|
if (username) {
|
|
where.username = username.toLowerCase();
|
|
} else {
|
|
where.email = email ? email.toLowerCase() : email;
|
|
}
|
|
debug('where', where);
|
|
User.count(
|
|
where,
|
|
function (err, count) {
|
|
if (err) {
|
|
debug('err checking existance: ', err);
|
|
return cb(err);
|
|
}
|
|
if (count > 0) {
|
|
return cb(null, true);
|
|
}
|
|
return cb(null, false);
|
|
}
|
|
);
|
|
};
|
|
|
|
User.remoteMethod(
|
|
'doesExist',
|
|
{
|
|
description: 'checks whether a user exists using email or username',
|
|
accepts: [
|
|
{
|
|
arg: 'username',
|
|
type: 'string'
|
|
},
|
|
{
|
|
arg: 'email',
|
|
type: 'string'
|
|
}
|
|
],
|
|
returns: [
|
|
{
|
|
arg: 'exists',
|
|
type: 'boolean'
|
|
}
|
|
],
|
|
http: {
|
|
path: '/exists',
|
|
verb: 'get'
|
|
}
|
|
}
|
|
);
|
|
};
|