enigma-bbs/core/system_view_validate.js

138 lines
4.0 KiB
JavaScript
Raw Normal View History

/* jslint node: true */
'use strict';
// ENiGMA½
const User = require('./user.js');
const Config = require('./config.js').config;
const Log = require('./logger.js').log;
// deps
const fs = require('graceful-fs');
2015-12-11 04:44:21 +00:00
exports.validateNonEmpty = validateNonEmpty;
exports.validateMessageSubject = validateMessageSubject;
exports.validateUserNameAvail = validateUserNameAvail;
exports.validateUserNameExists = validateUserNameExists;
exports.validateUserNameOrRealNameExists = validateUserNameOrRealNameExists;
exports.validateEmailAvail = validateEmailAvail;
exports.validateBirthdate = validateBirthdate;
exports.validatePasswordSpec = validatePasswordSpec;
2015-12-11 04:44:21 +00:00
function validateNonEmpty(data, cb) {
return cb(data && data.length > 0 ? null : new Error('Field cannot be empty'));
}
function validateMessageSubject(data, cb) {
return cb(data && data.length > 1 ? null : new Error('Subject too short'));
2015-12-24 18:55:37 +00:00
}
2015-12-11 04:44:21 +00:00
function validateUserNameAvail(data, cb) {
if(!data || data.length < Config.users.usernameMin) {
2015-12-11 04:44:21 +00:00
cb(new Error('Username too short'));
} else if(data.length > Config.users.usernameMax) {
// generally should be unreached due to view restraints
return cb(new Error('Username too long'));
2015-12-11 04:44:21 +00:00
} else {
const usernameRegExp = new RegExp(Config.users.usernamePattern);
const invalidNames = Config.users.newUserNames + Config.users.badUserNames;
2015-12-11 04:44:21 +00:00
if(!usernameRegExp.test(data)) {
return cb(new Error('Username contains invalid characters'));
2015-12-11 04:44:21 +00:00
} else if(invalidNames.indexOf(data.toLowerCase()) > -1) {
return cb(new Error('Username is blacklisted'));
} else if(/^[0-9]+$/.test(data)) {
return cb(new Error('Username cannot be a number'));
2015-12-11 04:44:21 +00:00
} else {
// a new user name cannot be an existing user name or an existing real name
User.getUserIdAndNameByLookup(data, function userIdAndName(err) {
2015-12-11 04:44:21 +00:00
if(!err) { // err is null if we succeeded -- meaning this user exists already
return cb(new Error('Username unavailable'));
2015-12-11 04:44:21 +00:00
}
return cb(null);
2015-12-11 04:44:21 +00:00
});
}
}
}
2016-07-25 07:01:14 +00:00
function validateUserNameExists(data, cb) {
const invalidUserNameError = new Error('Invalid username');
if(0 === data.length) {
return cb(invalidUserNameError);
}
User.getUserIdAndName(data, (err) => {
2016-07-25 07:01:14 +00:00
return cb(err ? invalidUserNameError : null);
});
}
function validateUserNameOrRealNameExists(data, cb) {
const invalidUserNameError = new Error('Invalid username');
if(0 === data.length) {
return cb(invalidUserNameError);
}
User.getUserIdAndNameByLookup(data, err => {
return cb(err ? invalidUserNameError : null);
});
}
2015-12-11 04:44:21 +00:00
function validateEmailAvail(data, cb) {
//
// This particular method allows empty data - e.g. no email entered
//
if(!data || 0 === data.length) {
return cb(null);
}
//
// Otherwise, it must be a valid email. We'll be pretty lose here, like
// the HTML5 spec.
//
// See http://stackoverflow.com/questions/7786058/find-the-regex-used-by-html5-forms-for-validation
//
const emailRegExp = /[a-z0-9!#$%&'*+\/=?^_`{|}~.-]+@[a-z0-9-]+(.[a-z0-9-]+)*/;
if(!emailRegExp.test(data)) {
return cb(new Error('Invalid email address'));
}
User.getUserIdsWithProperty('email_address', data, function userIdsWithEmail(err, uids) {
2015-12-11 04:44:21 +00:00
if(err) {
return cb(new Error('Internal system error'));
2015-12-11 04:44:21 +00:00
} else if(uids.length > 0) {
return cb(new Error('Email address not unique'));
2015-12-11 04:44:21 +00:00
}
return cb(null);
2015-12-11 04:44:21 +00:00
});
}
function validateBirthdate(data, cb) {
// :TODO: check for dates in the future, or > reasonable values
return cb(isNaN(Date.parse(data)) ? new Error('Invalid birthdate') : null);
2015-12-11 04:44:21 +00:00
}
function validatePasswordSpec(data, cb) {
if(!data || data.length < Config.users.passwordMin) {
return cb(new Error('Password too short'));
}
// check badpass, if avail
fs.readFile(Config.users.badPassFile, 'utf8', (err, passwords) => {
if(err) {
Log.warn( { error : err.message }, 'Cannot read bad pass file');
return cb(null);
}
passwords = passwords.toString().split(/\r\n|\n/g);
if(passwords.includes(data)) {
return cb(new Error('Password is too common'));
}
return cb(null);
});
2015-12-11 04:44:21 +00:00
}