filesafe/controllers/authController.js

94 lines
3.3 KiB
JavaScript
Raw Normal View History

const config = require('../config.js')
const db = require('knex')(config.database)
const bcrypt = require('bcrypt')
const randomstring = require('randomstring')
const utils = require('./utilsController.js')
2017-10-04 00:13:38 +00:00
let authController = {}
2017-10-04 00:13:38 +00:00
authController.verify = async (req, res, next) => {
const username = req.body.username
const password = req.body.password
2017-10-04 00:13:38 +00:00
if (username === undefined) return res.json({ success: false, description: 'No username provided' })
if (password === undefined) return res.json({ success: false, description: 'No password provided' })
2017-10-04 00:13:38 +00:00
const user = await db.table('users').where('username', username).first()
if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' })
if (user.enabled === false || user.enabled === 0) {
return res.json({
success: false,
description: 'This account has been disabled'
})
}
2017-10-04 00:13:38 +00:00
bcrypt.compare(password, user.password, (err, result) => {
if (err) {
console.log(err)
return res.json({ success: false, description: 'There was an error' })
}
if (result === false) return res.json({ success: false, description: 'Wrong password' })
return res.json({ success: true, token: user.token })
})
}
2017-10-04 00:13:38 +00:00
authController.register = async (req, res, next) => {
if (config.enableUserAccounts === false) {
return res.json({ success: false, description: 'Register is disabled at the moment' })
}
const username = req.body.username
const password = req.body.password
if (username === undefined) return res.json({ success: false, description: 'No username provided' })
if (password === undefined) return res.json({ success: false, description: 'No password provided' })
if (username.length < 4 || username.length > 32) {
return res.json({ success: false, description: 'Username must have 4-32 characters' })
}
if (password.length < 6 || password.length > 64) {
return res.json({ success: false, description: 'Password must have 6-64 characters' })
}
const user = await db.table('users').where('username', username).first()
if (user) return res.json({ success: false, description: 'Username already exists' })
bcrypt.hash(password, 10, async (err, hash) => {
if (err) {
console.log(err)
return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' })
}
const token = randomstring.generate(64)
await db.table('users').insert({
username: username,
password: hash,
token: token,
enabled: 1
})
return res.json({ success: true, token: token })
})
}
2017-10-04 00:13:38 +00:00
authController.changePassword = async (req, res, next) => {
const user = await utils.authorize(req, res)
2017-10-04 00:13:38 +00:00
let password = req.body.password
if (password === undefined) return res.json({ success: false, description: 'No password provided' })
2017-10-04 00:13:38 +00:00
if (password.length < 6 || password.length > 64) {
return res.json({ success: false, description: 'Password must have 6-64 characters' })
}
2017-10-04 00:13:38 +00:00
bcrypt.hash(password, 10, async (err, hash) => {
if (err) {
console.log(err)
return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' })
}
2017-10-04 00:13:38 +00:00
await db.table('users').where('id', user.id).update({ password: hash })
return res.json({ success: true })
})
}
2017-10-04 00:13:38 +00:00
module.exports = authController