slate/pages/api/twitter/link-with-verification.js
2021-12-14 16:49:19 +01:00

127 lines
3.9 KiB
JavaScript

import * as Environment from "~/node_common/environment";
import * as Data from "~/node_common/data";
import * as Utilities from "~/node_common/utilities";
import * as Strings from "~/common/strings";
import * as Validations from "~/common/validations";
import * as Constants from "~/common/constants";
import * as Logging from "~/common/logging";
export default async (req, res) => {
if (!Strings.isEmpty(Environment.ALLOWED_HOST) && req.headers.host !== Environment.ALLOWED_HOST) {
return res.status(403).send({ decorator: "SERVER_TWITTER_OAUTH_NOT_ALLOWED", error: true });
}
if (Strings.isEmpty(req.body?.data?.username)) {
return res
.status(500)
.send({ decorator: "SERVER_TWITTER_LINKING_INVALID_USERNAME", error: true });
}
if (!Validations.legacyPassword(req.body.data.password)) {
return res
.status(500)
.send({ decorator: "SERVER_TWITTER_LINKING_INVALID_PASSWORD", error: true });
}
if (Strings.isEmpty(req.body.data.token)) {
return res.status(500).send({ decorator: "SERVER_TWITTER_OAUTH_NO_OAUTH_TOKEN", error: true });
}
if (!Validations.verificationPin(req.body.data.pin)) {
return res
.status(500)
.send({ decorator: "SERVER_EMAIL_VERIFICATION_INVALID_PIN", error: true });
}
const { token, password, username, pin } = req.body.data;
let user;
if (Validations.email(username)) {
try {
user = await Data.getUserByEmail({ email: username });
} catch (e) {
Logging.error(e);
}
} else {
try {
user = await Data.getUserByUsername({
username: req.body.data.username.toLowerCase(),
});
} catch (e) {
Logging.error(e);
}
}
if (!user || user.error) {
return res
.status(!user ? 404 : 500)
.send({ decorator: "SERVER_SIGN_IN_USER_NOT_FOUND", error: true });
}
// Note(amine): Twitter users won't have a password,
// we should think in the future how to handle this use case
if ((!user.salt || !user.password) && user.twitterId) {
return res.status(403).send({ decorator: "SERVER_TWITTER_ALREADY_LINKED", error: true });
}
const hash = await Utilities.encryptPassword(password, user.salt);
if (hash !== user.password) {
return res.status(403).send({ decorator: "SERVER_TWITTER_WRONG_CREDENTIALS", error: true });
}
const verification = await Data.getVerificationBySid({
sid: token,
});
if (!verification) {
return res.status(404).send({ decorator: "SERVER_EMAIL_VERIFICATION_FAILED", error: true });
}
if (verification.error) {
return res.status(404).send({ decorator: "SERVER_EMAIL_VERIFICATION_FAILED", error: true });
}
const isTokenExpired =
new Date() - new Date(verification.createdAt) > Constants.TOKEN_EXPIRATION_TIME;
if (isTokenExpired) {
return res.status(401).send({ decorator: "SERVER_EMAIL_VERIFICATION_FAILED", error: true });
}
if (verification.type !== "email_twitter_verification") {
return res.status(401).send({ decorator: "SERVER_EMAIL_VERIFICATION_FAILED", error: true });
}
if (verification.pin !== pin) {
return res
.status(401)
.send({ decorator: "SERVER_EMAIL_VERIFICATION_INVALID_PIN", error: true });
}
const twitterUser = await Data.getTwitterToken({ token: verification.twitterToken });
if (!twitterUser) {
return res.status(401).send({ decorator: "SERVER_TWITTER_LINKING_FAILED", error: true });
}
if (!twitterUser) {
return res.status(401).send({ decorator: "SERVER_TWITTER_LINKING_FAILED", error: true });
}
const updates = await Data.updateUserById({
id: user.id,
lastActive: new Date(),
email: verification.email,
twitterId: twitterUser.id_str,
data: {
twitter: {
username: twitterUser.screen_name,
verified: twitterUser.verified,
},
},
});
if (updates.error) {
return res.status(401).send({ decorator: "SERVER_TWITTER_LINKING_FAILED", error: true });
}
return res.status(200).send({ decorator: "SERVER_TWITTER_LINKING" });
};