mirror of
				https://github.com/advplyr/audiobookshelf.git
				synced 2025-11-04 03:17:00 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			494 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			494 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
const { Request, Response, NextFunction } = require('express')
 | 
						|
const uuidv4 = require('uuid').v4
 | 
						|
const Logger = require('../Logger')
 | 
						|
const SocketAuthority = require('../SocketAuthority')
 | 
						|
const Database = require('../Database')
 | 
						|
 | 
						|
const { toNumber } = require('../utils/index')
 | 
						|
 | 
						|
/**
 | 
						|
 * @typedef RequestUserObject
 | 
						|
 * @property {import('../models/User')} user
 | 
						|
 *
 | 
						|
 * @typedef {Request & RequestUserObject} RequestWithUser
 | 
						|
 *
 | 
						|
 * @typedef RequestEntityObject
 | 
						|
 * @property {import('../models/User')} reqUser
 | 
						|
 *
 | 
						|
 * @typedef {RequestWithUser & RequestEntityObject} UserControllerRequest
 | 
						|
 */
 | 
						|
 | 
						|
class UserController {
 | 
						|
  constructor() {}
 | 
						|
 | 
						|
  /**
 | 
						|
   *
 | 
						|
   * @param {RequestWithUser} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async findAll(req, res) {
 | 
						|
    if (!req.user.isAdminOrUp) return res.sendStatus(403)
 | 
						|
    const hideRootToken = !req.user.isRoot
 | 
						|
 | 
						|
    const includes = (req.query.include || '').split(',').map((i) => i.trim())
 | 
						|
 | 
						|
    // Minimal toJSONForBrowser does not include mediaProgress and bookmarks
 | 
						|
    const allUsers = await Database.userModel.findAll()
 | 
						|
    const users = allUsers.map((u) => u.toOldJSONForBrowser(hideRootToken, true))
 | 
						|
 | 
						|
    if (includes.includes('latestSession')) {
 | 
						|
      for (const user of users) {
 | 
						|
        const userSessions = await Database.getPlaybackSessions({ userId: user.id })
 | 
						|
        user.latestSession = userSessions.sort((a, b) => b.updatedAt - a.updatedAt).shift() || null
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    res.json({
 | 
						|
      users
 | 
						|
    })
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * GET: /api/users/:id
 | 
						|
   * Get a single user toJSONForBrowser
 | 
						|
   * Media progress items include: `displayTitle`, `displaySubtitle` (for podcasts), `coverPath` and `mediaUpdatedAt`
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async findOne(req, res) {
 | 
						|
    if (!req.user.isAdminOrUp) {
 | 
						|
      Logger.error(`Non-admin user "${req.user.username}" attempted to get user`)
 | 
						|
      return res.sendStatus(403)
 | 
						|
    }
 | 
						|
 | 
						|
    // Get user media progress with associated mediaItem
 | 
						|
    const mediaProgresses = await Database.mediaProgressModel.findAll({
 | 
						|
      where: {
 | 
						|
        userId: req.reqUser.id
 | 
						|
      },
 | 
						|
      include: [
 | 
						|
        {
 | 
						|
          model: Database.bookModel,
 | 
						|
          attributes: ['id', 'title', 'coverPath', 'updatedAt']
 | 
						|
        },
 | 
						|
        {
 | 
						|
          model: Database.podcastEpisodeModel,
 | 
						|
          attributes: ['id', 'title'],
 | 
						|
          include: {
 | 
						|
            model: Database.podcastModel,
 | 
						|
            attributes: ['id', 'title', 'coverPath', 'updatedAt']
 | 
						|
          }
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    })
 | 
						|
 | 
						|
    const oldMediaProgresses = mediaProgresses.map((mp) => {
 | 
						|
      const oldMediaProgress = mp.getOldMediaProgress()
 | 
						|
      oldMediaProgress.displayTitle = mp.mediaItem?.title
 | 
						|
      if (mp.mediaItem?.podcast) {
 | 
						|
        oldMediaProgress.displaySubtitle = mp.mediaItem.podcast?.title
 | 
						|
        oldMediaProgress.coverPath = mp.mediaItem.podcast?.coverPath
 | 
						|
        oldMediaProgress.mediaUpdatedAt = mp.mediaItem.podcast?.updatedAt
 | 
						|
      } else if (mp.mediaItem) {
 | 
						|
        oldMediaProgress.coverPath = mp.mediaItem.coverPath
 | 
						|
        oldMediaProgress.mediaUpdatedAt = mp.mediaItem.updatedAt
 | 
						|
      }
 | 
						|
      return oldMediaProgress
 | 
						|
    })
 | 
						|
 | 
						|
    const userJson = req.reqUser.toOldJSONForBrowser(!req.user.isRoot)
 | 
						|
 | 
						|
    userJson.mediaProgress = oldMediaProgresses
 | 
						|
 | 
						|
    res.json(userJson)
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * POST: /api/users
 | 
						|
   * Create a new user
 | 
						|
   *
 | 
						|
   * @this {import('../routers/ApiRouter')}
 | 
						|
   *
 | 
						|
   * @param {RequestWithUser} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async create(req, res) {
 | 
						|
    if (!req.body.username || !req.body.password || typeof req.body.username !== 'string' || typeof req.body.password !== 'string') {
 | 
						|
      return res.status(400).send('Username and password are required')
 | 
						|
    }
 | 
						|
    if (req.body.type && !Database.userModel.accountTypes.includes(req.body.type)) {
 | 
						|
      return res.status(400).send('Invalid account type')
 | 
						|
    }
 | 
						|
 | 
						|
    const usernameExists = await Database.userModel.checkUserExistsWithUsername(req.body.username)
 | 
						|
    if (usernameExists) {
 | 
						|
      return res.status(400).send('Username already taken')
 | 
						|
    }
 | 
						|
 | 
						|
    const userId = uuidv4()
 | 
						|
    const pash = await this.auth.hashPass(req.body.password)
 | 
						|
    const token = await this.auth.generateAccessToken({ id: userId, username: req.body.username })
 | 
						|
    const userType = req.body.type || 'user'
 | 
						|
 | 
						|
    // librariesAccessible and itemTagsSelected can be on req.body or req.body.permissions
 | 
						|
    // Old model stored them outside of permissions, new model stores them inside permissions
 | 
						|
    let reqLibrariesAccessible = req.body.librariesAccessible || req.body.permissions?.librariesAccessible
 | 
						|
    if (reqLibrariesAccessible && (!Array.isArray(reqLibrariesAccessible) || reqLibrariesAccessible.some((libId) => typeof libId !== 'string'))) {
 | 
						|
      Logger.warn(`[UserController] create: Invalid librariesAccessible value: ${reqLibrariesAccessible}`)
 | 
						|
      reqLibrariesAccessible = null
 | 
						|
    }
 | 
						|
    let reqItemTagsSelected = req.body.itemTagsSelected || req.body.permissions?.itemTagsSelected
 | 
						|
    if (reqItemTagsSelected && (!Array.isArray(reqItemTagsSelected) || reqItemTagsSelected.some((tagId) => typeof tagId !== 'string'))) {
 | 
						|
      Logger.warn(`[UserController] create: Invalid itemTagsSelected value: ${reqItemTagsSelected}`)
 | 
						|
      reqItemTagsSelected = null
 | 
						|
    }
 | 
						|
    if (req.body.permissions?.itemTagsSelected || req.body.permissions?.librariesAccessible) {
 | 
						|
      delete req.body.permissions.itemTagsSelected
 | 
						|
      delete req.body.permissions.librariesAccessible
 | 
						|
    }
 | 
						|
 | 
						|
    // Map permissions
 | 
						|
    const permissions = Database.userModel.getDefaultPermissionsForUserType(userType)
 | 
						|
    if (req.body.permissions && typeof req.body.permissions === 'object') {
 | 
						|
      for (const key in req.body.permissions) {
 | 
						|
        if (permissions[key] !== undefined) {
 | 
						|
          if (typeof req.body.permissions[key] !== 'boolean') {
 | 
						|
            Logger.warn(`[UserController] create: Invalid permission value for key ${key}. Should be boolean`)
 | 
						|
          } else {
 | 
						|
            permissions[key] = req.body.permissions[key]
 | 
						|
          }
 | 
						|
        } else {
 | 
						|
          Logger.warn(`[UserController] create: Invalid permission key: ${key}`)
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    permissions.itemTagsSelected = reqItemTagsSelected || []
 | 
						|
    permissions.librariesAccessible = reqLibrariesAccessible || []
 | 
						|
 | 
						|
    const newUser = {
 | 
						|
      id: userId,
 | 
						|
      type: userType,
 | 
						|
      username: req.body.username,
 | 
						|
      email: typeof req.body.email === 'string' ? req.body.email : null,
 | 
						|
      pash,
 | 
						|
      token,
 | 
						|
      isActive: !!req.body.isActive,
 | 
						|
      permissions,
 | 
						|
      bookmarks: [],
 | 
						|
      extraData: {
 | 
						|
        seriesHideFromContinueListening: []
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    const user = await Database.userModel.create(newUser)
 | 
						|
    if (user) {
 | 
						|
      SocketAuthority.adminEmitter('user_added', user.toOldJSONForBrowser())
 | 
						|
      res.json({
 | 
						|
        user: user.toOldJSONForBrowser()
 | 
						|
      })
 | 
						|
    } else {
 | 
						|
      return res.status(500).send('Failed to save new user')
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * PATCH: /api/users/:id
 | 
						|
   * Update user
 | 
						|
   *
 | 
						|
   * @this {import('../routers/ApiRouter')}
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async update(req, res) {
 | 
						|
    const user = req.reqUser
 | 
						|
 | 
						|
    if (user.isRoot && !req.user.isRoot) {
 | 
						|
      Logger.error(`[UserController] Admin user "${req.user.username}" attempted to update root user`)
 | 
						|
      return res.sendStatus(403)
 | 
						|
    } else if (user.isRoot) {
 | 
						|
      // Root user cannot update type
 | 
						|
      delete req.body.type
 | 
						|
    }
 | 
						|
 | 
						|
    const updatePayload = req.body
 | 
						|
 | 
						|
    // Validate payload
 | 
						|
    const keysThatCannotBeUpdated = ['id', 'pash', 'token', 'extraData', 'bookmarks']
 | 
						|
    for (const key of keysThatCannotBeUpdated) {
 | 
						|
      if (updatePayload[key] !== undefined) {
 | 
						|
        return res.status(400).send(`Key "${key}" cannot be updated`)
 | 
						|
      }
 | 
						|
    }
 | 
						|
    if (updatePayload.email && typeof updatePayload.email !== 'string') {
 | 
						|
      return res.status(400).send('Invalid email')
 | 
						|
    }
 | 
						|
    if (updatePayload.username && typeof updatePayload.username !== 'string') {
 | 
						|
      return res.status(400).send('Invalid username')
 | 
						|
    }
 | 
						|
    if (updatePayload.type && !Database.userModel.accountTypes.includes(updatePayload.type)) {
 | 
						|
      return res.status(400).send('Invalid account type')
 | 
						|
    }
 | 
						|
    if (updatePayload.permissions && typeof updatePayload.permissions !== 'object') {
 | 
						|
      return res.status(400).send('Invalid permissions')
 | 
						|
    }
 | 
						|
 | 
						|
    let hasUpdates = false
 | 
						|
    let shouldUpdateToken = false
 | 
						|
    // When changing username create a new API token
 | 
						|
    if (updatePayload.username && updatePayload.username !== user.username) {
 | 
						|
      const usernameExists = await Database.userModel.checkUserExistsWithUsername(updatePayload.username)
 | 
						|
      if (usernameExists) {
 | 
						|
        return res.status(400).send('Username already taken')
 | 
						|
      }
 | 
						|
      user.username = updatePayload.username
 | 
						|
      shouldUpdateToken = true
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
 | 
						|
    // Updating password
 | 
						|
    if (updatePayload.password) {
 | 
						|
      user.pash = await this.auth.hashPass(updatePayload.password)
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
 | 
						|
    let hasPermissionsUpdates = false
 | 
						|
    let updateLibrariesAccessible = updatePayload.librariesAccessible || updatePayload.permissions?.librariesAccessible
 | 
						|
    if (updateLibrariesAccessible && (!Array.isArray(updateLibrariesAccessible) || updateLibrariesAccessible.some((libId) => typeof libId !== 'string'))) {
 | 
						|
      Logger.warn(`[UserController] update: Invalid librariesAccessible value: ${updateLibrariesAccessible}`)
 | 
						|
      updateLibrariesAccessible = null
 | 
						|
    }
 | 
						|
    let updateItemTagsSelected = updatePayload.itemTagsSelected || updatePayload.permissions?.itemTagsSelected
 | 
						|
    if (updateItemTagsSelected && (!Array.isArray(updateItemTagsSelected) || updateItemTagsSelected.some((tagId) => typeof tagId !== 'string'))) {
 | 
						|
      Logger.warn(`[UserController] update: Invalid itemTagsSelected value: ${updateItemTagsSelected}`)
 | 
						|
      updateItemTagsSelected = null
 | 
						|
    }
 | 
						|
    if (updatePayload.permissions?.itemTagsSelected || updatePayload.permissions?.librariesAccessible) {
 | 
						|
      delete updatePayload.permissions.itemTagsSelected
 | 
						|
      delete updatePayload.permissions.librariesAccessible
 | 
						|
    }
 | 
						|
    if (updatePayload.permissions && typeof updatePayload.permissions === 'object') {
 | 
						|
      const permissions = {
 | 
						|
        ...user.permissions
 | 
						|
      }
 | 
						|
      const defaultPermissions = Database.userModel.getDefaultPermissionsForUserType(updatePayload.type || user.type || 'user')
 | 
						|
      for (const key in updatePayload.permissions) {
 | 
						|
        // Check that the key is a valid permission key or is included in the default permissions
 | 
						|
        if (permissions[key] !== undefined || defaultPermissions[key] !== undefined) {
 | 
						|
          if (typeof updatePayload.permissions[key] !== 'boolean') {
 | 
						|
            Logger.warn(`[UserController] update: Invalid permission value for key ${key}. Should be boolean`)
 | 
						|
          } else if (permissions[key] !== updatePayload.permissions[key]) {
 | 
						|
            permissions[key] = updatePayload.permissions[key]
 | 
						|
            hasPermissionsUpdates = true
 | 
						|
          }
 | 
						|
        } else {
 | 
						|
          Logger.warn(`[UserController] update: Invalid permission key: ${key}`)
 | 
						|
        }
 | 
						|
      }
 | 
						|
 | 
						|
      if (updateItemTagsSelected && updateItemTagsSelected.join(',') !== user.permissions.itemTagsSelected.join(',')) {
 | 
						|
        permissions.itemTagsSelected = updateItemTagsSelected
 | 
						|
        hasPermissionsUpdates = true
 | 
						|
      }
 | 
						|
      if (updateLibrariesAccessible && updateLibrariesAccessible.join(',') !== user.permissions.librariesAccessible.join(',')) {
 | 
						|
        permissions.librariesAccessible = updateLibrariesAccessible
 | 
						|
        hasPermissionsUpdates = true
 | 
						|
      }
 | 
						|
      updatePayload.permissions = permissions
 | 
						|
    }
 | 
						|
 | 
						|
    // Permissions were updated
 | 
						|
    if (hasPermissionsUpdates) {
 | 
						|
      user.permissions = updatePayload.permissions
 | 
						|
      user.changed('permissions', true)
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
 | 
						|
    if (updatePayload.email && updatePayload.email !== user.email) {
 | 
						|
      user.email = updatePayload.email
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
    if (updatePayload.type && updatePayload.type !== user.type) {
 | 
						|
      user.type = updatePayload.type
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
    if (updatePayload.isActive !== undefined && !!updatePayload.isActive !== user.isActive) {
 | 
						|
      user.isActive = updatePayload.isActive
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
    if (updatePayload.lastSeen && typeof updatePayload.lastSeen === 'number') {
 | 
						|
      user.lastSeen = updatePayload.lastSeen
 | 
						|
      hasUpdates = true
 | 
						|
    }
 | 
						|
 | 
						|
    if (hasUpdates) {
 | 
						|
      if (shouldUpdateToken) {
 | 
						|
        user.token = await this.auth.generateAccessToken(user)
 | 
						|
        Logger.info(`[UserController] User ${user.username} has generated a new api token`)
 | 
						|
      }
 | 
						|
      await user.save()
 | 
						|
      SocketAuthority.clientEmitter(req.user.id, 'user_updated', user.toOldJSONForBrowser())
 | 
						|
    }
 | 
						|
 | 
						|
    res.json({
 | 
						|
      success: true,
 | 
						|
      user: user.toOldJSONForBrowser()
 | 
						|
    })
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * DELETE: /api/users/:id
 | 
						|
   * Delete a user
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async delete(req, res) {
 | 
						|
    if (req.params.id === 'root') {
 | 
						|
      Logger.error('[UserController] Attempt to delete root user. Root user cannot be deleted')
 | 
						|
      return res.sendStatus(400)
 | 
						|
    }
 | 
						|
    if (req.user.id === req.params.id) {
 | 
						|
      Logger.error(`[UserController] User ${req.user.username} is attempting to delete self`)
 | 
						|
      return res.sendStatus(400)
 | 
						|
    }
 | 
						|
    const user = req.reqUser
 | 
						|
 | 
						|
    // Todo: check if user is logged in and cancel streams
 | 
						|
 | 
						|
    // Remove user playlists
 | 
						|
    const userPlaylists = await Database.playlistModel.findAll({
 | 
						|
      where: {
 | 
						|
        userId: user.id
 | 
						|
      }
 | 
						|
    })
 | 
						|
    for (const playlist of userPlaylists) {
 | 
						|
      await playlist.destroy()
 | 
						|
    }
 | 
						|
 | 
						|
    // Set PlaybackSessions userId to null
 | 
						|
    const [sessionsUpdated] = await Database.playbackSessionModel.update(
 | 
						|
      {
 | 
						|
        userId: null
 | 
						|
      },
 | 
						|
      {
 | 
						|
        where: {
 | 
						|
          userId: user.id
 | 
						|
        }
 | 
						|
      }
 | 
						|
    )
 | 
						|
    Logger.info(`[UserController] Updated ${sessionsUpdated} playback sessions to remove user id`)
 | 
						|
 | 
						|
    const userJson = user.toOldJSONForBrowser()
 | 
						|
    await user.destroy()
 | 
						|
    SocketAuthority.adminEmitter('user_removed', userJson)
 | 
						|
    res.json({
 | 
						|
      success: true
 | 
						|
    })
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * PATCH: /api/users/:id/openid-unlink
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async unlinkFromOpenID(req, res) {
 | 
						|
    Logger.debug(`[UserController] Unlinking user "${req.reqUser.username}" from OpenID with sub "${req.reqUser.authOpenIDSub}"`)
 | 
						|
 | 
						|
    if (!req.reqUser.authOpenIDSub) {
 | 
						|
      return res.sendStatus(200)
 | 
						|
    }
 | 
						|
 | 
						|
    req.reqUser.extraData.authOpenIDSub = null
 | 
						|
    req.reqUser.changed('extraData', true)
 | 
						|
    await req.reqUser.save()
 | 
						|
    SocketAuthority.clientEmitter(req.user.id, 'user_updated', req.reqUser.toOldJSONForBrowser())
 | 
						|
    res.sendStatus(200)
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * GET: /api/users/:id/listening-sessions
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async getListeningSessions(req, res) {
 | 
						|
    var listeningSessions = await this.getUserListeningSessionsHelper(req.params.id)
 | 
						|
 | 
						|
    const itemsPerPage = toNumber(req.query.itemsPerPage, 10) || 10
 | 
						|
    const page = toNumber(req.query.page, 0)
 | 
						|
 | 
						|
    const start = page * itemsPerPage
 | 
						|
    const sessions = listeningSessions.slice(start, start + itemsPerPage)
 | 
						|
 | 
						|
    const payload = {
 | 
						|
      total: listeningSessions.length,
 | 
						|
      numPages: Math.ceil(listeningSessions.length / itemsPerPage),
 | 
						|
      page,
 | 
						|
      itemsPerPage,
 | 
						|
      sessions
 | 
						|
    }
 | 
						|
 | 
						|
    res.json(payload)
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * GET: /api/users/:id/listening-stats
 | 
						|
   *
 | 
						|
   * @this {import('../routers/ApiRouter')}
 | 
						|
   *
 | 
						|
   * @param {UserControllerRequest} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async getListeningStats(req, res) {
 | 
						|
    var listeningStats = await this.getUserListeningStatsHelpers(req.params.id)
 | 
						|
    res.json(listeningStats)
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   * GET: /api/users/online
 | 
						|
   *
 | 
						|
   * @this {import('../routers/ApiRouter')}
 | 
						|
   *
 | 
						|
   * @param {RequestWithUser} req
 | 
						|
   * @param {Response} res
 | 
						|
   */
 | 
						|
  async getOnlineUsers(req, res) {
 | 
						|
    if (!req.user.isAdminOrUp) {
 | 
						|
      return res.sendStatus(403)
 | 
						|
    }
 | 
						|
 | 
						|
    res.json({
 | 
						|
      usersOnline: SocketAuthority.getUsersOnline(),
 | 
						|
      openSessions: this.playbackSessionManager.sessions
 | 
						|
    })
 | 
						|
  }
 | 
						|
 | 
						|
  /**
 | 
						|
   *
 | 
						|
   * @param {RequestWithUser} req
 | 
						|
   * @param {Response} res
 | 
						|
   * @param {NextFunction} next
 | 
						|
   */
 | 
						|
  async middleware(req, res, next) {
 | 
						|
    if (!req.user.isAdminOrUp && req.user.id !== req.params.id) {
 | 
						|
      return res.sendStatus(403)
 | 
						|
    } else if ((req.method == 'PATCH' || req.method == 'POST' || req.method == 'DELETE') && !req.user.isAdminOrUp) {
 | 
						|
      return res.sendStatus(403)
 | 
						|
    }
 | 
						|
 | 
						|
    if (req.params.id) {
 | 
						|
      req.reqUser = await Database.userModel.getUserById(req.params.id)
 | 
						|
      if (!req.reqUser) {
 | 
						|
        return res.sendStatus(404)
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    next()
 | 
						|
  }
 | 
						|
}
 | 
						|
module.exports = new UserController()
 |