const config = require('../config.js'); const db = require('knex')(config.database); const bcrypt = require('bcrypt'); const randomstring = require('randomstring'); const utils = require('./utilsController.js'); let authController = {}; authController.verify = async (req, res, next) => { const username = req.body.username; const password = req.body.password; if (username === undefined) return res.json({ success: false, description: 'No username provided' }); if (password === undefined) return res.json({ success: false, description: 'No password provided' }); const user = await db.table('users').where('username', username).first(); if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' }); if (user.enabled === false || user.enabled === 0) return res.json({ success: false, description: 'This account has been disabled' }); bcrypt.compare(password, user.password, (err, result) => { if (err) { console.log(err); return res.json({ success: false, description: 'There was an error' }); } if (result === false) return res.json({ success: false, description: 'Wrong password' }); return res.json({ success: true, token: user.token }); }); }; authController.register = async (req, res, next) => { const currentUser = await utils.getUser(req); if(currentUser && currentUser.username != 'root') { return res.json({ success: false, description: 'Non-root users cannot create more accounts!' }); } if (config.enableUserAccounts === false && !currentUser) { return res.json({ success: false, description: 'Register is disabled at the moment' }); } const username = req.body.username; const password = req.body.password; if (username === undefined) return res.json({ success: false, description: 'No username provided' }); if (password === undefined) return res.json({ success: false, description: 'No password provided' }); if (username.length < 4 || username.length > 32) { return res.json({ success: false, description: 'Username must have 4-32 characters' }); } if (password.length < 6 || password.length > 64) { return res.json({ success: false, description: 'Password must have 6-64 characters' }); } const user = await db.table('users').where('username', username).first(); if (user) return res.json({ success: false, description: 'Username already exists' }); bcrypt.hash(password, 10, async (err, hash) => { if (err) { console.log(err); return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }); } const token = randomstring.generate(64); await db.table('users').insert({ username: username, password: hash, token: token, enabled: 1 }); return res.json({ success: true, token: token }); }); }; authController.changePassword = async (req, res, next) => { const {user, response} = await utils.authorize(req, res); if(!user) return response; let password = req.body.password; if (password === undefined) return res.json({ success: false, description: 'No password provided' }); if (password.length < 6 || password.length > 64) { return res.json({ success: false, description: 'Password must have 6-64 characters' }); } bcrypt.hash(password, 10, async (err, hash) => { if (err) { console.log(err); return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }); } await db.table('users').where('id', user.id).update({ password: hash }); return res.json({ success: true }); }); }; module.exports = authController;