2019-02-09 20:37:36 +00:00
|
|
|
var common = require('../common');
|
2019-04-06 02:52:00 +00:00
|
|
|
var connect = require('../connect');
|
2019-01-01 16:26:51 +00:00
|
|
|
const jwt = require("jsonwebtoken");
|
2019-05-12 18:09:07 +00:00
|
|
|
var crypto = require('crypto');
|
2019-01-13 22:55:25 +00:00
|
|
|
var logger = require('./logger');
|
2019-01-01 16:26:51 +00:00
|
|
|
|
|
|
|
exports.authenticateUser = (req, res, next) => {
|
2019-02-12 13:36:04 +00:00
|
|
|
if(+common.rtl_sso) {
|
2019-09-19 02:47:18 +00:00
|
|
|
if(req.body.authenticateWith === 'TOKEN' && jwt.verify(req.body.authenticationValue, common.secret_key)) {
|
|
|
|
res.status(200).json({ token: token });
|
|
|
|
} else if (req.body.authenticateWith === 'PASSWORD' && crypto.createHash('sha256').update(common.cookie).digest('hex') === req.body.authenticationValue) {
|
2019-04-06 02:52:00 +00:00
|
|
|
connect.refreshCookie(common.rtl_cookie_path);
|
2019-09-22 18:39:11 +00:00
|
|
|
const token = jwt.sign(
|
2020-01-22 00:18:34 +00:00
|
|
|
{ user: 'SSO_USER', configPath: common.nodes[0].config_path, macaroonPath: common.nodes[0].macaroon_path },
|
2019-02-24 17:00:39 +00:00
|
|
|
common.secret_key
|
2019-02-12 13:36:04 +00:00
|
|
|
);
|
2019-02-24 03:58:51 +00:00
|
|
|
res.status(200).json({ token: token });
|
2019-01-01 16:26:51 +00:00
|
|
|
} else {
|
2019-07-27 18:20:17 +00:00
|
|
|
logger.error({fileName: 'Authenticate', lineNum: 21, msg: 'Password Validation Failed!'});
|
2019-02-12 13:36:04 +00:00
|
|
|
res.status(401).json({
|
2019-02-14 02:31:26 +00:00
|
|
|
message: "Login Failure!",
|
|
|
|
error: "SSO Authentication Failed!"
|
2019-02-12 13:36:04 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
} else {
|
2019-09-19 02:47:18 +00:00
|
|
|
const password = req.body.authenticationValue;
|
2020-01-20 16:15:04 +00:00
|
|
|
if (common.rtl_pass === password) {
|
2020-01-22 00:18:34 +00:00
|
|
|
var rpcUser = 'NODE_USER';
|
2020-01-20 16:15:04 +00:00
|
|
|
const token = jwt.sign(
|
|
|
|
{ user: rpcUser, configPath: common.nodes[0].config_path, macaroonPath: common.nodes[0].macaroon_path },
|
|
|
|
common.secret_key
|
|
|
|
);
|
|
|
|
res.status(200).json({ token: token });
|
2019-04-06 22:42:09 +00:00
|
|
|
} else {
|
2020-01-20 16:15:04 +00:00
|
|
|
logger.error({fileName: 'Authenticate', lineNum: 38, msg: 'Password Validation Failed!'});
|
|
|
|
res.status(401).json({
|
|
|
|
message: "Authentication Failed!",
|
|
|
|
error: "Password Validation Failed!"
|
|
|
|
});
|
2019-02-16 22:43:12 +00:00
|
|
|
}
|
2019-02-12 13:36:04 +00:00
|
|
|
}
|
2019-02-24 14:28:02 +00:00
|
|
|
};
|
2020-01-22 00:18:34 +00:00
|
|
|
|
|
|
|
exports.resetPassword = (req, res, next) => {
|
|
|
|
if(+common.rtl_sso) {
|
|
|
|
logger.error({fileName: 'Authenticate', lineNum: 46, msg: 'Password Reset Failed!'});
|
|
|
|
res.status(402).json({
|
|
|
|
message: "Password Reset Failure!",
|
|
|
|
error: "Password cannot be reset for SSO authentication!"
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
const oldPassword = req.body.oldPassword;
|
|
|
|
if (common.rtl_pass === oldPassword) {
|
|
|
|
common.rtl_pass = connect.replacePasswordWithHash(req.body.newPassword);
|
|
|
|
var rpcUser = 'NODE_USER';
|
|
|
|
const token = jwt.sign(
|
|
|
|
{ user: rpcUser, configPath: common.nodes[0].config_path, macaroonPath: common.nodes[0].macaroon_path },
|
|
|
|
common.secret_key
|
|
|
|
);
|
|
|
|
res.status(200).json({ token: token });
|
|
|
|
} else {
|
|
|
|
logger.error({fileName: 'Authenticate', lineNum: 62, msg: 'Password Reset Failed!'});
|
|
|
|
res.status(402).json({
|
|
|
|
message: "Password Reset Failed!",
|
|
|
|
error: "Old password is not correct!"
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|