aboutsummaryrefslogtreecommitdiff
path: root/controllers/authController.js
diff options
context:
space:
mode:
Diffstat (limited to 'controllers/authController.js')
-rw-r--r--controllers/authController.js91
1 files changed, 91 insertions, 0 deletions
diff --git a/controllers/authController.js b/controllers/authController.js
new file mode 100644
index 0000000..eb7df09
--- /dev/null
+++ b/controllers/authController.js
@@ -0,0 +1,91 @@
+const config = require('../config.js');
+const db = require('knex')(config.database);
+const bcrypt = require('bcrypt');
+const randomstring = require('randomstring');
+const utils = require('./utilsController.js');
+
+let authController = {};
+
+authController.verify = async (req, res, next) => {
+ const username = req.body.username;
+ const password = req.body.password;
+
+ if (username === undefined) return res.json({ success: false, description: 'No username provided' });
+ if (password === undefined) return res.json({ success: false, description: 'No password provided' });
+
+ const user = await db.table('users').where('username', username).first();
+ if (!user) return res.json({ success: false, description: 'Username doesn\'t exist' });
+ if (user.enabled === false || user.enabled === 0) return res.json({
+ success: false,
+ description: 'This account has been disabled'
+ });
+
+ bcrypt.compare(password, user.password, (err, result) => {
+ if (err) {
+ console.log(err);
+ return res.json({ success: false, description: 'There was an error' });
+ }
+ if (result === false) return res.json({ success: false, description: 'Wrong password' });
+ return res.json({ success: true, token: user.token });
+ });
+};
+
+authController.register = async (req, res, next) => {
+ if (config.enableUserAccounts === false) {
+ return res.json({ success: false, description: 'Register is disabled at the moment' });
+ }
+
+ const username = req.body.username;
+ const password = req.body.password;
+
+ if (username === undefined) return res.json({ success: false, description: 'No username provided' });
+ if (password === undefined) return res.json({ success: false, description: 'No password provided' });
+
+ if (username.length < 4 || username.length > 32) {
+ return res.json({ success: false, description: 'Username must have 4-32 characters' });
+ }
+ if (password.length < 6 || password.length > 64) {
+ return res.json({ success: false, description: 'Password must have 6-64 characters' });
+ }
+
+ const user = await db.table('users').where('username', username).first();
+ if (user) return res.json({ success: false, description: 'Username already exists' });
+
+ bcrypt.hash(password, 10, async (err, hash) => {
+ if (err) {
+ console.log(err);
+ return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
+ }
+ const token = randomstring.generate(64);
+ await db.table('users').insert({
+ username: username,
+ password: hash,
+ token: token,
+ enabled: 1
+ });
+ return res.json({ success: true, token: token });
+ });
+};
+
+authController.changePassword = async (req, res, next) => {
+ const user = await utils.authorize(req, res);
+
+ let password = req.body.password;
+ if (password === undefined) return res.json({ success: false, description: 'No password provided' });
+
+ if (password.length < 6 || password.length > 64) {
+ return res.json({ success: false, description: 'Password must have 6-64 characters' });
+ }
+
+ bcrypt.hash(password, 10, async (err, hash) => {
+ if (err) {
+ console.log(err);
+ return res.json({ success: false, description: 'Error generating password hash (╯°□°)╯︵ ┻━┻' });
+ }
+
+ await db.table('users').where('id', user.id).update({ password: hash });
+ return res.json({ success: true });
+ });
+};
+
+module.exports = authController;