| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 | const config = require('../config.js');const db = require('knex')(config.database);const bcrypt = require('bcrypt');const randomstring = require('randomstring');const utils = require('./utilsController.js');let authController = {};authController.verify = async (req, res, next) => {	const username = req.body.username;	const password = req.body.password;	if (username === undefined) return res.json({ success: false, description: 'No username provided' });	if (password === undefined) return res.json({ success: false, description: 'No password provided' });	const user = await db.table('users').where('username', username).first();	if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' });	if (user.enabled === false || user.enabled === 0) return res.json({		success: false,		description: 'This account has been disabled'	});	bcrypt.compare(password, user.password, (err, result) => {		if (err) {			console.log(err);			return res.json({ success: false, description: 'There was an error' });		}		if (result === false) return res.json({ success: false, description: 'Wrong password' });		return res.json({ success: true, token: user.token });	});};authController.register = async (req, res, next) => {	if (config.enableUserAccounts === false) {		return res.json({ success: false, description: 'Register is disabled at the moment' });	}	const username = req.body.username;	const password = req.body.password;	if (username === undefined) return res.json({ success: false, description: 'No username provided' });	if (password === undefined) return res.json({ success: false, description: 'No password provided' });	if (username.length < 4 || username.length > 32) {		return res.json({ success: false, description: 'Username must have 4-32 characters' })	}	if (password.length < 6 || password.length > 64) {		return res.json({ success: false, description: 'Password must have 6-64 characters' })	}	const user = await db.table('users').where('username', username).first();	if (user) return res.json({ success: false, description: 'Username already exists' });	bcrypt.hash(password, 10, async (err, hash) => {		if (err) {			console.log(err);			return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });		}		const token = randomstring.generate(64);		await db.table('users').insert({			username: username,			password: hash,			token: token,			enabled: 1		});		return res.json({ success: true, token: token })	});};authController.changePassword = async (req, res, next) => {	const user = await utils.authorize(req, res);	let password = req.body.password;	if (password === undefined) return res.json({ success: false, description: 'No password provided' });	if (password.length < 6 || password.length > 64) {		return res.json({ success: false, description: 'Password must have 6-64 characters' });	}	bcrypt.hash(password, 10, async (err, hash) => {		if (err) {			console.log(err);			return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });		}		await db.table('users').where('id', user.id).update({ password: hash });		return res.json({ success: true });	});};module.exports = authController;
 |