87 lines
3.1 KiB
JavaScript
87 lines
3.1 KiB
JavaScript
const config = require('../config.js');
|
|
const db = require('knex')(config.database);
|
|
const bcrypt = require('bcrypt');
|
|
const randomstring = require('randomstring');
|
|
const utils = require('./utilsController.js');
|
|
|
|
let authController = {};
|
|
|
|
authController.verify = async (req, res, next) => {
|
|
const username = req.body.username;
|
|
const password = req.body.password;
|
|
|
|
if (username === undefined) return res.json({ success: false, description: 'No username provided' });
|
|
if (password === undefined) return res.json({ success: false, description: 'No password provided' });
|
|
|
|
const user = await db.table('users').where('username', username).first();
|
|
if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' });
|
|
|
|
bcrypt.compare(password, user.password, (err, result) => {
|
|
if (err) {
|
|
console.log(err);
|
|
return res.json({ success: false, description: 'There was an error' });
|
|
}
|
|
if (result === false) return res.json({ success: false, description: 'Wrong password' });
|
|
return res.json({ success: true, token: user.token });
|
|
});
|
|
};
|
|
|
|
authController.register = async (req, res, next) => {
|
|
if (config.enableUserAccounts === false) {
|
|
return res.json({ success: false, description: 'Register is disabled at the moment' });
|
|
}
|
|
|
|
const username = req.body.username;
|
|
const password = req.body.password;
|
|
|
|
if (username === undefined) return res.json({ success: false, description: 'No username provided' });
|
|
if (password === undefined) return res.json({ success: false, description: 'No password provided' });
|
|
|
|
if (username.length < 4 || username.length > 32) {
|
|
return res.json({ success: false, description: 'Username must have 4-32 characters' })
|
|
}
|
|
if (password.length < 6 || password.length > 64) {
|
|
return res.json({ success: false, description: 'Password must have 6-64 characters' })
|
|
}
|
|
|
|
const user = await db.table('users').where('username', username).first();
|
|
if (user) return res.json({ success: false, description: 'Username already exists' });
|
|
|
|
bcrypt.hash(password, 10, async (err, hash) => {
|
|
if (err) {
|
|
console.log(err);
|
|
return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
|
|
}
|
|
const token = randomstring.generate(64);
|
|
await db.table('users').insert({
|
|
username: username,
|
|
password: hash,
|
|
token: token
|
|
});
|
|
return res.json({ success: true, token: token })
|
|
});
|
|
};
|
|
|
|
authController.changePassword = async (req, res, next) => {
|
|
const user = await utils.authorize(req, res);
|
|
|
|
let password = req.body.password;
|
|
if (password === undefined) return res.json({ success: false, description: 'No password provided' });
|
|
|
|
if (password.length < 6 || password.length > 64) {
|
|
return res.json({ success: false, description: 'Password must have 6-64 characters' });
|
|
}
|
|
|
|
bcrypt.hash(password, 10, async (err, hash) => {
|
|
if (err) {
|
|
console.log(err);
|
|
return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
|
|
}
|
|
|
|
await db.table('users').where('id', user.id).update({ password: hash });
|
|
return res.json({ success: true });
|
|
});
|
|
};
|
|
|
|
module.exports = authController;
|