diff options
Diffstat (limited to 'controllers/authController.js')
| -rw-r--r-- | controllers/authController.js | 61 |
1 files changed, 30 insertions, 31 deletions
diff --git a/controllers/authController.js b/controllers/authController.js index 0b398a1..4b872e8 100644 --- a/controllers/authController.js +++ b/controllers/authController.js @@ -6,46 +6,46 @@ const randomstring = require('randomstring') let authController = {} -authController.verify = function(req, res, next){ - +authController.verify = function(req, res, next) { + let username = req.body.username let password = req.body.password - if(username === undefined) return res.json({ success: false, description: 'No username provided' }) - if(password === undefined) return res.json({ success: false, description: 'No password provided' }) + if (username === undefined) return res.json({ success: false, description: 'No username provided' }) + if (password === undefined) return res.json({ success: false, description: 'No password provided' }) db.table('users').where('username', username).then((user) => { - if(user.length === 0) return res.json({ success: false, description: 'Username doesn\'t exist' }) + if (user.length === 0) return res.json({ success: false, description: 'Username doesn\'t exist' }) bcrypt.compare(password, user[0].password, function(err, result) { - if(result === false) return res.json({ success: false, description: 'Wrong password' }) + if (result === false) return res.json({ success: false, description: 'Wrong password' }) return res.json({ success: true, token: user[0].token }) }) - }).catch(function(error) { console.log(error); res.json({success: false, description: 'error'}) }) + }).catch(function(error) { console.log(error); res.json({ success: false, description: 'error' }) }) } -authController.register = function(req, res, next){ +authController.register = function(req, res, next) { - if(config.enableUserAccounts === false) + if (config.enableUserAccounts === false) return res.json({ success: false, description: 'Register is disabled at the moment' }) let username = req.body.username let password = req.body.password - if(username === undefined) return res.json({ success: false, description: 'No username provided' }) - if(password === undefined) return res.json({ success: false, description: 'No password provided' }) + if (username === undefined) return res.json({ success: false, description: 'No username provided' }) + if (password === undefined) return res.json({ success: false, description: 'No password provided' }) - if(username.length < 4 || username.length > 32) + if (username.length < 4 || username.length > 32) return res.json({ success: false, description: 'Username must have 4-32 characters' }) - if(password.length < 6 || password.length > 64) + if (password.length < 6 || password.length > 64) return res.json({ success: false, description: 'Password must have 6-64 characters' }) db.table('users').where('username', username).then((user) => { - if(user.length !== 0) return res.json({ success: false, description: 'Username already exists' }) + if (user.length !== 0) return res.json({ success: false, description: 'Username already exists' }) bcrypt.hash(password, saltRounds, function(err, hash) { - if(err) return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }) + if (err) return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }) let token = randomstring.generate(64) @@ -54,36 +54,35 @@ authController.register = function(req, res, next){ password: hash, token: token }).then(() => { - return res.json({ success: true, token: token}) - }).catch(function(error) { console.log(error); res.json({success: false, description: 'error'}) }) + return res.json({ success: true, token: token }) + }).catch(function(error) { console.log(error); res.json({ success: false, description: 'error' }) }) }) - }).catch(function(error) { console.log(error); res.json({success: false, description: 'error'}) }) + }).catch(function(error) { console.log(error); res.json({ success: false, description: 'error' }) }) } -authController.changePassword = function(req, res, next){ +authController.changePassword = function(req, res, next) { let token = req.headers.token - if(token === undefined) return res.status(401).json({ success: false, description: 'No token provided' }) + if (token === undefined) return res.status(401).json({ success: false, description: 'No token provided' }) db.table('users').where('token', token).then((user) => { - if(user.length === 0) return res.status(401).json({ success: false, description: 'Invalid token'}) - + if (user.length === 0) return res.status(401).json({ success: false, description: 'Invalid token'}) + let password = req.body.password - if(password === undefined) return res.json({ success: false, description: 'No password provided' }) - if(password.length < 6 || password.length > 64) + if (password === undefined) return res.json({ success: false, description: 'No password provided' }) + if (password.length < 6 || password.length > 64) return res.json({ success: false, description: 'Password must have 6-64 characters' }) bcrypt.hash(password, saltRounds, function(err, hash) { - if(err) return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }) + if (err) return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' }) - db.table('users').where('id', user[0].id).update({password: hash}).then(() => { - return res.json({ success: true}) - }).catch(function(error) { console.log(error); res.json({success: false, description: 'error'}) }) + db.table('users').where('id', user[0].id).update({ password: hash }).then(() => { + return res.json({ success: true }) + }).catch(function(error) { console.log(error); res.json({ success: false, description: 'error' }) }) }) - }).catch(function(error) { console.log(error); res.json({success: false, description: 'error'}) }) - + }).catch(function(error) { console.log(error); res.json({ success: false, description: 'error' }) }) } -module.exports = authController
\ No newline at end of file +module.exports = authController |