1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798 |
- const config = require('../config.js');
- const db = require('knex')(config.database);
- const bcrypt = require('bcrypt');
- const randomstring = require('randomstring');
- const utils = require('./utilsController.js');
- let authController = {};
- authController.verify = async (req, res, next) => {
- const username = req.body.username;
- const password = req.body.password;
- if (username === undefined) return res.json({ success: false, description: 'No username provided' });
- if (password === undefined) return res.json({ success: false, description: 'No password provided' });
- const user = await db.table('users').where('username', username).first();
- if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' });
- if (user.enabled === false || user.enabled === 0) return res.json({
- success: false,
- description: 'This account has been disabled'
- });
- bcrypt.compare(password, user.password, (err, result) => {
- if (err) {
- console.log(err);
- return res.json({ success: false, description: 'There was an error' });
- }
- if (result === false) return res.json({ success: false, description: 'Wrong password' });
- return res.json({ success: true, token: user.token });
- });
- };
- authController.register = async (req, res, next) => {
- const currentUser = await utils.getUser(req);
- if(currentUser && currentUser.username != 'root') {
- return res.json({ success: false, description: 'Non-root users cannot create more accounts!' });
- }
- if (config.enableUserAccounts === false && !currentUser) {
- return res.json({ success: false, description: 'Register is disabled at the moment' });
- }
- const username = req.body.username;
- const password = req.body.password;
- if (username === undefined) return res.json({ success: false, description: 'No username provided' });
- if (password === undefined) return res.json({ success: false, description: 'No password provided' });
- if (username.length < 4 || username.length > 32) {
- return res.json({ success: false, description: 'Username must have 4-32 characters' });
- }
- if (password.length < 6 || password.length > 64) {
- return res.json({ success: false, description: 'Password must have 6-64 characters' });
- }
- const user = await db.table('users').where('username', username).first();
- if (user) return res.json({ success: false, description: 'Username already exists' });
- bcrypt.hash(password, 10, async (err, hash) => {
- if (err) {
- console.log(err);
- return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
- }
- const token = randomstring.generate(64);
- await db.table('users').insert({
- username: username,
- password: hash,
- token: token,
- enabled: 1
- });
- return res.json({ success: true, token: token });
- });
- };
- authController.changePassword = async (req, res, next) => {
- const {user, response} = await utils.authorize(req, res);
- if(!user) return response;
- let password = req.body.password;
- if (password === undefined) return res.json({ success: false, description: 'No password provided' });
- if (password.length < 6 || password.length > 64) {
- return res.json({ success: false, description: 'Password must have 6-64 characters' });
- }
- bcrypt.hash(password, 10, async (err, hash) => {
- if (err) {
- console.log(err);
- return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
- }
- await db.table('users').where('id', user.id).update({ password: hash });
- return res.json({ success: true });
- });
- };
- module.exports = authController;
|