el.xwx.moe/lib/api/controllers/users/userId/updateUserById.ts

264 lines
7.3 KiB
TypeScript
Raw Normal View History

2023-05-20 14:25:00 -05:00
import { prisma } from "@/lib/api/db";
import { AccountSettings } from "@/types/global";
import bcrypt from "bcrypt";
import removeFile from "@/lib/api/storage/removeFile";
import createFile from "@/lib/api/storage/createFile";
2023-08-03 16:54:04 -05:00
import updateCustomerEmail from "@/lib/api/updateCustomerEmail";
import createFolder from "@/lib/api/storage/createFolder";
const emailEnabled =
process.env.EMAIL_FROM && process.env.EMAIL_SERVER ? true : false;
2023-05-20 14:25:00 -05:00
2023-10-23 14:24:22 -05:00
export default async function updateUserById(
2023-11-02 13:59:31 -05:00
userId: number,
data: AccountSettings
) {
2023-12-03 14:01:28 -06:00
const ssoUser = await prisma.account.findFirst({
2023-07-18 11:44:37 -05:00
where: {
2023-12-03 14:01:28 -06:00
userId: userId,
},
});
const user = await prisma.user.findUnique({
where: {
id: userId,
},
});
2023-12-30 08:31:53 -06:00
2023-12-07 15:33:01 -06:00
if (ssoUser) {
// deny changes to SSO-defined properties
2023-12-03 14:01:28 -06:00
if (data.email !== user?.email) {
return {
response: "SSO users cannot change their email.",
status: 400,
};
}
if (data.newPassword) {
return {
response: "SSO Users cannot change their password.",
status: 400,
};
}
if (data.name !== user?.name) {
return {
response: "SSO Users cannot change their name.",
status: 400,
};
}
if (data.username !== user?.username) {
return {
response: "SSO Users cannot change their username.",
status: 400,
};
}
2023-12-30 08:31:53 -06:00
if (data.image?.startsWith("data:image/jpeg;base64")) {
2023-12-03 14:01:28 -06:00
return {
response: "SSO Users cannot change their avatar.",
status: 400,
};
}
2023-12-07 15:33:01 -06:00
} else {
// verify only for non-SSO users
2023-12-03 14:01:28 -06:00
// SSO users cannot change their email, password, name, username, or avatar
if (emailEnabled && !data.email)
return {
response: "Email invalid.",
status: 400,
};
else if (!data.username)
return {
response: "Username invalid.",
status: 400,
};
if (data.newPassword && data.newPassword?.length < 8)
return {
response: "Password must be at least 8 characters.",
status: 400,
};
// Check email (if enabled)
const checkEmail =
/^(([^<>()[\]\.,;:\s@\"]+(\.[^<>()[\]\.,;:\s@\"]+)*)|(\".+\"))@(([^<>()[\]\.,;:\s@\"]+\.)+[^<>()[\]\.,;:\s@\"]{2,})$/i;
if (emailEnabled && !checkEmail.test(data.email?.toLowerCase() || ""))
return {
response: "Please enter a valid email.",
status: 400,
};
const checkUsername = RegExp("^[a-z0-9_-]{3,31}$");
if (!checkUsername.test(data.username.toLowerCase()))
return {
response:
"Username has to be between 3-30 characters, no spaces and special characters are allowed.",
status: 400,
};
const userIsTaken = await prisma.user.findFirst({
where: {
id: { not: userId },
OR: emailEnabled
? [
2024-02-22 02:51:24 -06:00
{
username: data.username.toLowerCase(),
},
{
email: data.email?.toLowerCase(),
},
]
2023-12-03 14:01:28 -06:00
: [
2024-02-22 02:51:24 -06:00
{
username: data.username.toLowerCase(),
},
],
2023-12-03 14:01:28 -06:00
},
});
if (userIsTaken) {
if (data.email?.toLowerCase().trim() === userIsTaken.email?.trim())
return {
response: "Email is taken.",
status: 400,
};
else if (
data.username?.toLowerCase().trim() === userIsTaken.username?.trim()
)
return {
response: "Username is taken.",
status: 400,
};
2023-07-18 11:44:37 -05:00
2023-10-23 00:45:31 -05:00
return {
2023-12-03 14:01:28 -06:00
response: "Username/Email is taken.",
2023-10-23 00:45:31 -05:00
status: 400,
};
2023-12-03 14:01:28 -06:00
}
2023-08-03 16:54:04 -05:00
2023-12-03 14:01:28 -06:00
// Avatar Settings
if (data.image?.startsWith("data:image/jpeg;base64")) {
if (data.image.length < 1572864) {
try {
2023-12-07 15:33:01 -06:00
const base64Data = data.image.replace(
/^data:image\/jpeg;base64,/,
""
);
2023-12-03 14:01:28 -06:00
createFolder({ filePath: `uploads/avatar` });
await createFile({
filePath: `uploads/avatar/${userId}.jpg`,
data: base64Data,
isBase64: true,
});
} catch (err) {
console.log("Error saving image:", err);
}
} else {
console.log("A file larger than 1.5MB was uploaded.");
return {
response: "A file larger than 1.5MB was uploaded.",
status: 400,
};
2023-05-22 07:20:48 -05:00
}
2023-12-03 14:01:28 -06:00
} else if (data.image == "") {
removeFile({ filePath: `uploads/avatar/${userId}.jpg` });
2023-05-22 07:20:48 -05:00
}
}
2023-05-20 14:25:00 -05:00
2023-11-02 13:59:31 -05:00
const previousEmail = (
await prisma.user.findUnique({ where: { id: userId } })
)?.email;
// Other settings
2023-07-12 13:26:34 -05:00
const saltRounds = 10;
const newHashedPassword = bcrypt.hashSync(data.newPassword || "", saltRounds);
2023-07-12 13:26:34 -05:00
2023-05-20 14:25:00 -05:00
const updatedUser = await prisma.user.update({
where: {
2023-11-02 13:59:31 -05:00
id: userId,
2023-05-20 14:25:00 -05:00
},
data: {
name: data.name,
2023-12-03 14:01:28 -06:00
username: data.username?.toLowerCase().trim(),
2023-10-23 00:45:31 -05:00
email: data.email?.toLowerCase().trim(),
isPrivate: data.isPrivate,
2023-11-02 13:59:31 -05:00
image: data.image ? `uploads/avatar/${userId}.jpg` : "",
collectionOrder: data.collectionOrder.filter(
(value, index, self) => self.indexOf(value) === index
),
archiveAsScreenshot: data.archiveAsScreenshot,
archiveAsPDF: data.archiveAsPDF,
archiveAsWaybackMachine: data.archiveAsWaybackMachine,
linksRouteTo: data.linksRouteTo,
2023-07-12 13:26:34 -05:00
password:
data.newPassword && data.newPassword !== ""
2023-07-12 13:26:34 -05:00
? newHashedPassword
: undefined,
2023-05-20 14:25:00 -05:00
},
include: {
2023-08-04 19:32:13 -05:00
whitelistedUsers: true,
subscriptions: true,
2023-08-04 19:32:13 -05:00
},
2023-05-20 14:25:00 -05:00
});
const { whitelistedUsers, password, subscriptions, ...userInfo } =
updatedUser;
// If user.whitelistedUsers is not provided, we will assume the whitelistedUsers should be removed
const newWhitelistedUsernames: string[] = data.whitelistedUsers || [];
// Get the current whitelisted usernames
2023-08-04 19:32:13 -05:00
const currentWhitelistedUsernames: string[] = whitelistedUsers.map(
(data) => data.username
2023-08-04 19:32:13 -05:00
);
// Find the usernames to be deleted (present in current but not in new)
const usernamesToDelete: string[] = currentWhitelistedUsernames.filter(
2023-08-04 19:32:13 -05:00
(username) => !newWhitelistedUsernames.includes(username)
);
// Find the usernames to be created (present in new but not in current)
const usernamesToCreate: string[] = newWhitelistedUsernames.filter(
2023-08-04 19:32:13 -05:00
(username) =>
!currentWhitelistedUsernames.includes(username) && username.trim() !== ""
);
// Delete whitelistedUsers that are not present in the new list
await prisma.whitelistedUser.deleteMany({
where: {
2023-11-02 13:59:31 -05:00
userId: userId,
username: {
in: usernamesToDelete,
},
},
});
// Create new whitelistedUsers that are not in the current list, no create many ;(
for (const username of usernamesToCreate) {
await prisma.whitelistedUser.create({
data: {
username,
2023-11-02 13:59:31 -05:00
userId: userId,
},
});
}
const STRIPE_SECRET_KEY = process.env.STRIPE_SECRET_KEY;
2023-11-02 13:59:31 -05:00
if (STRIPE_SECRET_KEY && emailEnabled && previousEmail !== data.email)
await updateCustomerEmail(
STRIPE_SECRET_KEY,
2023-11-02 13:59:31 -05:00
previousEmail as string,
data.email as string
);
2023-06-08 08:39:22 -05:00
const response: Omit<AccountSettings, "password"> = {
...userInfo,
whitelistedUsers: newWhitelistedUsernames,
image: userInfo.image ? `${userInfo.image}?${Date.now()}` : "",
subscription: { active: subscriptions?.active },
2023-06-08 08:39:22 -05:00
};
return { response, status: 200 };
2023-05-20 14:25:00 -05:00
}