| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159 | 'use strict';const async = require('async');const config = require('config');const request = require('request');const bcrypt = require('bcrypt');const sha256 = require('sha256');const hooks = require('./hooks');const moduleManager = require("../../index");const db = moduleManager.modules["db"];const mail = moduleManager.modules["mail"];const cache = moduleManager.modules["cache"];const punishments = moduleManager.modules["punishments"];const utils = moduleManager.modules["utils"];const logger = moduleManager.modules["logger"];cache.sub('user.updateUsername', user => {	utils.socketsFromUser(user._id, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.username.changed', user.username);		});	});});cache.sub('user.removeSessions', userId => {	utils.socketsFromUserWithoutCache(userId, sockets => {		sockets.forEach(socket => {			socket.emit('keep.event:user.session.removed');		});	});});cache.sub('user.linkPassword', userId => {	utils.socketsFromUser(userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.linkPassword');		});	});});cache.sub('user.linkGitHub', userId => {	utils.socketsFromUser(userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.linkGitHub');		});	});});cache.sub('user.unlinkPassword', userId => {	utils.socketsFromUser(userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.unlinkPassword');		});	});});cache.sub('user.unlinkGitHub', userId => {	utils.socketsFromUser(userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.unlinkGitHub');		});	});});cache.sub('user.ban', data => {	utils.socketsFromUser(data.userId, sockets => {		sockets.forEach(socket => {			socket.emit('keep.event:banned', data.punishment);			socket.disconnect(true);		});	});});cache.sub('user.favoritedStation', data => {	utils.socketsFromUser(data.userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.favoritedStation', data.stationId);		});	});});cache.sub('user.unfavoritedStation', data => {	utils.socketsFromUser(data.userId, sockets => {		sockets.forEach(socket => {			socket.emit('event:user.unfavoritedStation', data.stationId);		});	});});module.exports = {	/**	 * Lists all Users	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {Function} cb - gets called with the result	 */	index: hooks.adminRequired((session, cb) => {		async.waterfall([			(next) => {				db.models.user.find({}).exec(next);			}		], async (err, users) => {			if (err) {				err = await utils.getError(err);				logger.error("USER_INDEX", `Indexing users failed. "${err}"`);				return cb({status: 'failure', message: err});			} else {				logger.success("USER_INDEX", `Indexing users successful.`);				let filteredUsers = [];				users.forEach(user => {					filteredUsers.push({						_id: user._id,						username: user.username,						role: user.role,						liked: user.liked,						disliked: user.disliked,						songsRequested: user.statistics.songsRequested,						email: {							address: user.email.address,							verified: user.email.verified						},						hasPassword: !!user.services.password,						services: { github: user.services.github }					});				});				return cb({ status: 'success', data: filteredUsers });			}		});	}),	/**	 * Logs user in	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} identifier - the email of the user	 * @param {String} password - the plaintext of the user	 * @param {Function} cb - gets called with the result	 */	login: (session, identifier, password, cb) => {		identifier = identifier.toLowerCase();		async.waterfall([			// check if a user with the requested identifier exists			(next) => {				db.models.user.findOne({					$or: [{ 'email.address': identifier }]				}, next)			},			// if the user doesn't exist, respond with a failure			// otherwise compare the requested password and the actual users password			(user, next) => {				if (!user) return next('User not found');				if (!user.services.password || !user.services.password.password) return next('The account you are trying to access uses GitHub to log in.');				bcrypt.compare(sha256(password), user.services.password.password, (err, match) => {					if (err) return next(err);					if (!match) return next('Incorrect password');					next(null, user);				});			},			(user, next) => {				utils.guid().then((sessionId) => {					next(null, user, sessionId);				});			},			(user, sessionId, next) => {				cache.hset('sessions', sessionId, cache.schemas.session(sessionId, user._id), (err) => {					if (err) return next(err);					next(null, sessionId);				});			}		], async (err, sessionId) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("USER_PASSWORD_LOGIN", `Login failed with password for user "${identifier}". "${err}"`);				return cb({status: 'failure', message: err});			}			logger.success("USER_PASSWORD_LOGIN", `Login successful with password for user "${identifier}"`);			cb({ status: 'success', message: 'Login successful', user: {}, SID: sessionId });		});	},	/**	 * Registers a new user	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} username - the username for the new user	 * @param {String} email - the email for the new user	 * @param {String} password - the plaintext password for the new user	 * @param {Object} recaptcha - the recaptcha data	 * @param {Function} cb - gets called with the result	 */	register: async function(session, username, email, password, recaptcha, cb) {		email = email.toLowerCase();		let verificationToken = await utils.generateRandomString(64);		async.waterfall([			// verify the request with google recaptcha			(next) => {				if (!db.passwordValid(password)) return next('Invalid password. Check if it meets all the requirements.');				return next();			},			(next) => {				request({					url: 'https://www.google.com/recaptcha/api/siteverify',					method: 'POST',					form: {						'secret': config.get("apis").recaptcha.secret,						'response': recaptcha					}				}, next);			},			// check if the response from Google recaptcha is successful			// if it is, we check if a user with the requested username already exists			(response, body, next) => {				let json = JSON.parse(body);				if (json.success !== true) return next('Response from recaptcha was not successful.');				db.models.user.findOne({ username: new RegExp(`^${username}$`, 'i') }, next);			},			// if the user already exists, respond with that			// otherwise check if a user with the requested email already exists			(user, next) => {				if (user) return next('A user with that username already exists.');				db.models.user.findOne({ 'email.address': email }, next);			},			// if the user already exists, respond with that			// otherwise, generate a salt to use with hashing the new users password			(user, next) => {				if (user) return next('A user with that email already exists.');				bcrypt.genSalt(10, next);			},			// hash the password			(salt, next) => {				bcrypt.hash(sha256(password), salt, next)			},			(hash, next) => {				utils.generateRandomString(12).then((_id) => {					next(null, hash, _id);				});			},			// save the new user to the database			(hash, _id, next) => {				db.models.user.create({					_id,					username,					email: {						address: email,						verificationToken					},					services: {						password: {							password: hash						}					}				}, next);			},			// respond with the new user			(newUser, next) => {				//TODO Send verification email				mail.schemas.verifyEmail(email, username, verificationToken, () => {					next();				});			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("USER_PASSWORD_REGISTER", `Register failed with password for user "${username}"."${err}"`);				cb({status: 'failure', message: err});			} else {				module.exports.login(session, email, password, (result) => {					let obj = {status: 'success', message: 'Successfully registered.'};					if (result.status === 'success') {						obj.SID = result.SID;					}					logger.success("USER_PASSWORD_REGISTER", `Register successful with password for user "${username}".`);					cb(obj);				});			}		});	},	/**	 * Logs out a user	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {Function} cb - gets called with the result	 */	logout: (session, cb) => {		async.waterfall([			(next) => {				cache.hget('sessions', session.sessionId, next);			},			(session, next) => {				if (!session) return next('Session not found');				next(null, session);			},			(session, next) => {				cache.hdel('sessions', session.sessionId, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("USER_LOGOUT", `Logout failed. "${err}" `);				cb({ status: 'failure', message: err });			} else {				logger.success("USER_LOGOUT", `Logout successful.`);				cb({ status: 'success', message: 'Successfully logged out.' });			}		});	},	/**	 * Removes all sessions for a user	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} userId - the id of the user we are trying to delete the sessions of	 * @param {Function} cb - gets called with the result	 */	removeSessions:  hooks.loginRequired((session, userId, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({ _id: session.userId }, (err, user) => {					if (err) return next(err);					if (user.role !== 'admin' && session.userId !== userId) return next('Only admins and the owner of the account can remove their sessions.');					else return next();				});			},			(next) => {				cache.hgetall('sessions', next);			},			(sessions, next) => {				if (!sessions) return next('There are no sessions for this user to remove.');				else {					let keys = Object.keys(sessions);					next(null, keys, sessions);				}			},			(keys, sessions, next) => {				cache.pub('user.removeSessions', userId);				async.each(keys, (sessionId, callback) => {					let session = sessions[sessionId];					if (session.userId === userId) {						cache.hdel('sessions', sessionId, err => {							if (err) return callback(err);							else callback(null);						});					}				}, err => {					next(err);				});			}		], async err => {			if (err) {				err = await utils.getError(err);				logger.error("REMOVE_SESSIONS_FOR_USER", `Couldn't remove all sessions for user "${userId}". "${err}"`);				return cb({ status: 'failure', message: err });			} else {				logger.success("REMOVE_SESSIONS_FOR_USER", `Removed all sessions for user "${userId}".`);				return cb({ status: 'success', message: 'Successfully removed all sessions.' });			}		});	}),	/**	 * Gets user object from username (only a few properties)	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} username - the username of the user we are trying to find	 * @param {Function} cb - gets called with the result	 */	findByUsername: (session, username, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({ username: new RegExp(`^${username}$`, 'i') }, next);			},			(account, next) => {				if (!account) return next('User not found.');				next(null, account);			}		], async (err, account) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("FIND_BY_USERNAME", `User not found for username "${username}". "${err}"`);				cb({status: 'failure', message: err});			} else {				logger.success("FIND_BY_USERNAME", `User found for username "${username}".`);				return cb({					status: 'success',					data: {						_id: account._id,						username: account.username,						role: account.role,						email: account.email.address,						createdAt: account.createdAt,						statistics: account.statistics,						liked: account.liked,						disliked: account.disliked					}				});			}		});	},	/**	 * Gets a username from an userId	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} userId - the userId of the person we are trying to get the username from	 * @param {Function} cb - gets called with the result	 */	getUsernameFromId: (session, userId, cb) => {		db.models.user.findById(userId).then(user => {			if (user) {				logger.success("GET_USERNAME_FROM_ID", `Found username for userId "${userId}".`);				return cb({					status: 'success',					data: user.username				});			} else {				logger.error("GET_USERNAME_FROM_ID", `Getting the username from userId "${userId}" failed. User not found.`);				cb({					status: 'failure',					message: "Couldn't find the user."				});			}					}).catch(async err => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("GET_USERNAME_FROM_ID", `Getting the username from userId "${userId}" failed. "${err}"`);				cb({ status: 'failure', message: err });			}		});	},	//TODO Fix security issues	/**	 * Gets user info from session	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {Function} cb - gets called with the result	 */	findBySession: (session, cb) => {		async.waterfall([			(next) => {				cache.hget('sessions', session.sessionId, next);			},			(session, next) => {				if (!session) return next('Session not found.');				next(null, session);			},			(session, next) => {				db.models.user.findOne({ _id: session.userId }, next);			},			(user, next) => {				if (!user) return next('User not found.');				next(null, user);			}		], async (err, user) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("FIND_BY_SESSION", `User not found. "${err}"`);				cb({status: 'failure', message: err});			} else {				let data = {					email: {						address: user.email.address					},					username: user.username				};				if (user.services.password && user.services.password.password) data.password = true;				if (user.services.github && user.services.github.id) data.github = true;				logger.success("FIND_BY_SESSION", `User found. "${user.username}".`);				return cb({					status: 'success',					data				});			}		});	},	/**	 * Updates a user's username	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} updatingUserId - the updating user's id	 * @param {String} newUsername - the new username	 * @param {Function} cb - gets called with the result	 */	updateUsername: hooks.loginRequired((session, updatingUserId, newUsername, cb) => {		async.waterfall([			(next) => {				if (updatingUserId === session.userId) return next(null, true);				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');				db.models.user.findOne({ _id: updatingUserId }, next);			},			(user, next) => {				if (!user) return next('User not found.');				if (user.username === newUsername) return next('New username can\'t be the same as the old username.');				next(null);			},			(next) => {				db.models.user.findOne({ username: new RegExp(`^${newUsername}$`, 'i') }, next);			},			(user, next) => {				if (!user) return next();				if (user._id === updatingUserId) return next();				next('That username is already in use.');			},			(next) => {				db.models.user.updateOne({ _id: updatingUserId }, {$set: {username: newUsername}}, {runValidators: true}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("UPDATE_USERNAME", `Couldn't update username for user "${updatingUserId}" to username "${newUsername}". "${err}"`);				cb({status: 'failure', message: err});			} else {				cache.pub('user.updateUsername', {					username: newUsername,					_id: updatingUserId				});				logger.success("UPDATE_USERNAME", `Updated username for user "${updatingUserId}" to username "${newUsername}".`);				cb({ status: 'success', message: 'Username updated successfully' });			}		});	}),	/**	 * Updates a user's email	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} updatingUserId - the updating user's id	 * @param {String} newEmail - the new email	 * @param {Function} cb - gets called with the result	 */	updateEmail: hooks.loginRequired(async (session, updatingUserId, newEmail, cb) => {		newEmail = newEmail.toLowerCase();		let verificationToken = await utils.generateRandomString(64);		async.waterfall([			(next) => {				if (updatingUserId === session.userId) return next(null, true);				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (user !== true && (!user || user.role !== 'admin')) return next('Invalid permissions.');				db.models.user.findOne({ _id: updatingUserId }, next);			},			(user, next) => {				if (!user) return next('User not found.');				if (user.email.address === newEmail) return next('New email can\'t be the same as your the old email.');				next();			},			(next) => {				db.models.user.findOne({"email.address": newEmail}, next);			},			(user, next) => {				if (!user) return next();				if (user._id === updatingUserId) return next();				next('That email is already in use.');			},			(next) => {				db.models.user.updateOne({_id: updatingUserId}, {$set: {"email.address": newEmail, "email.verified": false, "email.verificationToken": verificationToken}}, {runValidators: true}, next);			},			(res, next) => {				db.models.user.findOne({ _id: updatingUserId }, next);			},			(user, next) => {				mail.schemas.verifyEmail(newEmail, user.username, verificationToken, () => {					next();				});			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("UPDATE_EMAIL", `Couldn't update email for user "${updatingUserId}" to email "${newEmail}". '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("UPDATE_EMAIL", `Updated email for user "${updatingUserId}" to email "${newEmail}".`);				cb({ status: 'success', message: 'Email updated successfully.' });			}		});	}),	/**	 * Updates a user's role	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} updatingUserId - the updating user's id	 * @param {String} newRole - the new role	 * @param {Function} cb - gets called with the result	 */	updateRole: hooks.adminRequired((session, updatingUserId, newRole, cb) => {		newRole = newRole.toLowerCase();		async.waterfall([			(next) => {				db.models.user.findOne({ _id: updatingUserId }, next);			},			(user, next) => {				if (!user) return next('User not found.');				else if (user.role === newRole) return next('New role can\'t be the same as the old role.');				else return next();			},			(next) => {				db.models.user.updateOne({_id: updatingUserId}, {$set: {role: newRole}}, {runValidators: true}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("UPDATE_ROLE", `User "${session.userId}" couldn't update role for user "${updatingUserId}" to role "${newRole}". "${err}"`);				cb({status: 'failure', message: err});			} else {				logger.success("UPDATE_ROLE", `User "${session.userId}" updated the role of user "${updatingUserId}" to role "${newRole}".`);				cb({					status: 'success',					message: 'Role successfully updated.'				});			}		});	}),	/**	 * Updates a user's password	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} newPassword - the new password	 * @param {Function} cb - gets called with the result	 */	updatePassword: hooks.loginRequired((session, newPassword, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (!user.services.password) return next('This account does not have a password set.');				next();			},			(next) => {				if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');				return next();			},			(next) => {				bcrypt.genSalt(10, next);			},			// hash the password			(salt, next) => {				bcrypt.hash(sha256(newPassword), salt, next);			},			(hashedPassword, next) => {				db.models.user.updateOne({_id: session.userId}, {$set: {"services.password.password": hashedPassword}}, next);			}		], async (err) => {			if (err) {				err = await utils.getError(err);				logger.error("UPDATE_PASSWORD", `Failed updating user password of user '${session.userId}'. '${err}'.`);				return cb({ status: 'failure', message: err });			}			logger.success("UPDATE_PASSWORD", `User '${session.userId}' updated their password.`);			cb({				status: 'success',				message: 'Password successfully updated.'			});		});	}),	/**	 * Requests a password for a session	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} email - the email of the user that requests a password reset	 * @param {Function} cb - gets called with the result	 */	requestPassword: hooks.loginRequired(async (session, cb) => {		let code = await utils.generateRandomString(8);		async.waterfall([			(next) => {				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (!user) return next('User not found.');				if (user.services.password && user.services.password.password) return next('You already have a password set.');				next(null, user);			},			(user, next) => {				let expires = new Date();				expires.setDate(expires.getDate() + 1);				db.models.user.findOneAndUpdate({"email.address": user.email.address}, {$set: {"services.password": {set: {code: code, expires}}}}, {runValidators: true}, next);			},			(user, next) => {				mail.schemas.passwordRequest(user.email.address, user.username, code, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("REQUEST_PASSWORD", `UserId '${session.userId}' failed to request password. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("REQUEST_PASSWORD", `UserId '${session.userId}' successfully requested a password.`);				cb({					status: 'success',					message: 'Successfully requested password.'				});			}		});	}),	/**	 * Verifies a password code	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} code - the password code	 * @param {Function} cb - gets called with the result	 */	verifyPasswordCode: hooks.loginRequired((session, code, cb) => {		async.waterfall([			(next) => {				if (!code || typeof code !== 'string') return next('Invalid code1.');				db.models.user.findOne({"services.password.set.code": code, _id: session.userId}, next);			},			(user, next) => {				if (!user) return next('Invalid code2.');				if (user.services.password.set.expires < new Date()) return next('That code has expired.');				next(null);			}		], async(err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("VERIFY_PASSWORD_CODE", `Code '${code}' failed to verify. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("VERIFY_PASSWORD_CODE", `Code '${code}' successfully verified.`);				cb({					status: 'success',					message: 'Successfully verified password code.'				});			}		});	}),	/**	 * Adds a password to a user with a code	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} code - the password code	 * @param {String} newPassword - the new password code	 * @param {Function} cb - gets called with the result	 */	changePasswordWithCode: hooks.loginRequired((session, code, newPassword, cb) => {		async.waterfall([			(next) => {				if (!code || typeof code !== 'string') return next('Invalid code1.');				db.models.user.findOne({"services.password.set.code": code}, next);			},			(user, next) => {				if (!user) return next('Invalid code2.');				if (!user.services.password.set.expires > new Date()) return next('That code has expired.');				next();			},			(next) => {				if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');				return next();			},			(next) => {				bcrypt.genSalt(10, next);			},			// hash the password			(salt, next) => {				bcrypt.hash(sha256(newPassword), salt, next);			},			(hashedPassword, next) => {				db.models.user.updateOne({"services.password.set.code": code}, {$set: {"services.password.password": hashedPassword}, $unset: {"services.password.set": ''}}, {runValidators: true}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("ADD_PASSWORD_WITH_CODE", `Code '${code}' failed to add password. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("ADD_PASSWORD_WITH_CODE", `Code '${code}' successfully added password.`);				cache.pub('user.linkPassword', session.userId);				cb({					status: 'success',					message: 'Successfully added password.'				});			}		});	}),	/**	 * Unlinks password from user	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {Function} cb - gets called with the result	 */	unlinkPassword: hooks.loginRequired((session, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (!user) return next('Not logged in.');				if (!user.services.github || !user.services.github.id) return next('You can\'t remove password login without having GitHub login.');				db.models.user.updateOne({_id: session.userId}, {$unset: {"services.password": ''}}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("UNLINK_PASSWORD", `Unlinking password failed for userId '${session.userId}'. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("UNLINK_PASSWORD", `Unlinking password successful for userId '${session.userId}'.`);				cache.pub('user.unlinkPassword', session.userId);				cb({					status: 'success',					message: 'Successfully unlinked password.'				});			}		});	}),	/**	 * Unlinks GitHub from user	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {Function} cb - gets called with the result	 */	unlinkGitHub: hooks.loginRequired((session, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({_id: session.userId}, next);			},			(user, next) => {				if (!user) return next('Not logged in.');				if (!user.services.password || !user.services.password.password) return next('You can\'t remove GitHub login without having password login.');				db.models.user.updateOne({_id: session.userId}, {$unset: {"services.github": ''}}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("UNLINK_GITHUB", `Unlinking GitHub failed for userId '${session.userId}'. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("UNLINK_GITHUB", `Unlinking GitHub successful for userId '${session.userId}'.`);				cache.pub('user.unlinkGitHub', session.userId);				cb({					status: 'success',					message: 'Successfully unlinked GitHub.'				});			}		});	}),	/**	 * Requests a password reset for an email	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} email - the email of the user that requests a password reset	 * @param {Function} cb - gets called with the result	 */	requestPasswordReset: async (session, email, cb) => {		let code = await utils.generateRandomString(8);		async.waterfall([			(next) => {				if (!email || typeof email !== 'string') return next('Invalid email.');				email = email.toLowerCase();				db.models.user.findOne({"email.address": email}, next);			},			(user, next) => {				if (!user) return next('User not found.');				if (!user.services.password || !user.services.password.password) return next('User does not have a password set, and probably uses GitHub to log in.');				next(null, user);			},			(user, next) => {				let expires = new Date();				expires.setDate(expires.getDate() + 1);				db.models.user.findOneAndUpdate({"email.address": email}, {$set: {"services.password.reset": {code: code, expires}}}, {runValidators: true}, next);			},			(user, next) => {				mail.schemas.resetPasswordRequest(user.email.address, user.username, code, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("REQUEST_PASSWORD_RESET", `Email '${email}' failed to request password reset. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("REQUEST_PASSWORD_RESET", `Email '${email}' successfully requested a password reset.`);				cb({					status: 'success',					message: 'Successfully requested password reset.'				});			}		});	},	/**	 * Verifies a reset code	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} code - the password reset code	 * @param {Function} cb - gets called with the result	 */	verifyPasswordResetCode: (session, code, cb) => {		async.waterfall([			(next) => {				if (!code || typeof code !== 'string') return next('Invalid code.');				db.models.user.findOne({"services.password.reset.code": code}, next);			},			(user, next) => {				if (!user) return next('Invalid code.');				if (!user.services.password.reset.expires > new Date()) return next('That code has expired.');				next(null);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("VERIFY_PASSWORD_RESET_CODE", `Code '${code}' failed to verify. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("VERIFY_PASSWORD_RESET_CODE", `Code '${code}' successfully verified.`);				cb({					status: 'success',					message: 'Successfully verified password reset code.'				});			}		});	},	/**	 * Changes a user's password with a reset code	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} code - the password reset code	 * @param {String} newPassword - the new password reset code	 * @param {Function} cb - gets called with the result	 */	changePasswordWithResetCode: (session, code, newPassword, cb) => {		async.waterfall([			(next) => {				if (!code || typeof code !== 'string') return next('Invalid code.');				db.models.user.findOne({"services.password.reset.code": code}, next);			},			(user, next) => {				if (!user) return next('Invalid code.');				if (!user.services.password.reset.expires > new Date()) return next('That code has expired.');				next();			},			(next) => {				if (!db.passwordValid(newPassword)) return next('Invalid password. Check if it meets all the requirements.');				return next();			},			(next) => {				bcrypt.genSalt(10, next);			},			// hash the password			(salt, next) => {				bcrypt.hash(sha256(newPassword), salt, next);			},			(hashedPassword, next) => {				db.models.user.updateOne({"services.password.reset.code": code}, {$set: {"services.password.password": hashedPassword}, $unset: {"services.password.reset": ''}}, {runValidators: true}, next);			}		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("CHANGE_PASSWORD_WITH_RESET_CODE", `Code '${code}' failed to change password. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("CHANGE_PASSWORD_WITH_RESET_CODE", `Code '${code}' successfully changed password.`);				cb({					status: 'success',					message: 'Successfully changed password.'				});			}		});	},	/**	 * Bans a user by userId	 *	 * @param {Object} session - the session object automatically added by socket.io	 * @param {String} value - the user id that is going to be banned	 * @param {String} reason - the reason for the ban	 * @param {String} expiresAt - the time the ban expires	 * @param {Function} cb - gets called with the result	 */	banUserById: hooks.adminRequired((session, userId, reason, expiresAt, cb) => {		async.waterfall([			(next) => {				if (!userId) return next('You must provide a userId to ban.');				else if (!reason) return next('You must provide a reason for the ban.');				else return next();			},			(next) => {				if (!expiresAt || typeof expiresAt !== 'string') return next('Invalid expire date.');				let date = new Date();				switch(expiresAt) {					case '1h':						expiresAt = date.setHours(date.getHours() + 1);						break;					case '12h':						expiresAt = date.setHours(date.getHours() + 12);						break;					case '1d':						expiresAt = date.setDate(date.getDate() + 1);						break;					case '1w':						expiresAt = date.setDate(date.getDate() + 7);						break;					case '1m':						expiresAt = date.setMonth(date.getMonth() + 1);						break;					case '3m':						expiresAt = date.setMonth(date.getMonth() + 3);						break;					case '6m':						expiresAt = date.setMonth(date.getMonth() + 6);						break;					case '1y':						expiresAt = date.setFullYear(date.getFullYear() + 1);						break;					case 'never':						expiresAt = new Date(3093527980800000);						break;					default:						return next('Invalid expire date.');				}				next();			},			(next) => {				punishments.addPunishment('banUserId', userId, reason, expiresAt, userId, next)			},			(punishment, next) => {				cache.pub('user.ban', { userId, punishment });				next();			},		], async (err) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("BAN_USER_BY_ID", `User ${session.userId} failed to ban user ${userId} with the reason ${reason}. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("BAN_USER_BY_ID", `User ${session.userId} has successfully banned user ${userId} with the reason ${reason}.`);				cb({					status: 'success',					message: 'Successfully banned user.'				});			}		});	}),	getFavoriteStations: hooks.loginRequired((session, cb) => {		async.waterfall([			(next) => {				db.models.user.findOne({ _id: session.userId }, next);			},			(user, next) => {				if (!user) return next("User not found.");				next(null, user);			}		], async (err, user) => {			if (err && err !== true) {				err = await utils.getError(err);				logger.error("GET_FAVORITE_STATIONS", `User ${session.userId} failed to get favorite stations. '${err}'`);				cb({status: 'failure', message: err});			} else {				logger.success("GET_FAVORITE_STATIONS", `User ${session.userId} got favorite stations.`);				cb({					status: 'success',					favoriteStations: user.favoriteStations				});			}		});	})};
 |