2021-10-23 10:35:13 +02:00
|
|
|
const basicAuth = require("express-basic-auth");
|
2021-07-27 19:47:13 +02:00
|
|
|
const passwordHash = require("./password-hash");
|
|
|
|
const { R } = require("redbean-node");
|
2021-08-02 18:08:46 +02:00
|
|
|
const { setting } = require("./util-server");
|
2021-10-23 10:35:13 +02:00
|
|
|
const { loginRateLimiter } = require("./rate-limiter");
|
2021-07-27 18:52:31 +02:00
|
|
|
|
|
|
|
/**
|
2022-04-20 20:56:40 +02:00
|
|
|
* Login to web app
|
|
|
|
* @param {string} username
|
|
|
|
* @param {string} password
|
|
|
|
* @returns {Promise<(Bean|null)>}
|
2021-07-27 18:52:31 +02:00
|
|
|
*/
|
|
|
|
exports.login = async function (username, password) {
|
2022-03-29 11:38:48 +02:00
|
|
|
if (typeof username !== "string" || typeof password !== "string") {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2023-01-01 16:19:00 +02:00
|
|
|
let user = await R.findOne("user", " username = ? AND active = 1 ", [
|
2021-07-27 19:47:13 +02:00
|
|
|
username,
|
2021-10-23 10:35:13 +02:00
|
|
|
]);
|
2021-07-27 18:52:31 +02:00
|
|
|
|
|
|
|
if (user && passwordHash.verify(password, user.password)) {
|
|
|
|
// Upgrade the hash to bcrypt
|
|
|
|
if (passwordHash.needRehash(user.password)) {
|
|
|
|
await R.exec("UPDATE `user` SET password = ? WHERE id = ? ", [
|
|
|
|
passwordHash.generate(password),
|
2021-07-27 19:47:13 +02:00
|
|
|
user.id,
|
2021-07-27 18:52:31 +02:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
return user;
|
|
|
|
}
|
2021-07-27 19:47:13 +02:00
|
|
|
|
|
|
|
return null;
|
2021-10-23 10:35:13 +02:00
|
|
|
};
|
2021-07-27 18:52:31 +02:00
|
|
|
|
2022-04-20 20:56:40 +02:00
|
|
|
/**
|
|
|
|
* Callback for myAuthorizer
|
|
|
|
* @callback myAuthorizerCB
|
|
|
|
* @param {any} err Any error encountered
|
|
|
|
* @param {boolean} authorized Is the client authorized?
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Custom authorizer for express-basic-auth
|
|
|
|
* @param {string} username
|
|
|
|
* @param {string} password
|
|
|
|
* @param {myAuthorizerCB} callback
|
|
|
|
*/
|
2021-07-27 18:52:31 +02:00
|
|
|
function myAuthorizer(username, password, callback) {
|
2022-03-24 12:02:34 +02:00
|
|
|
// Login Rate Limit
|
|
|
|
loginRateLimiter.pass(null, 0).then((pass) => {
|
|
|
|
if (pass) {
|
|
|
|
exports.login(username, password).then((user) => {
|
|
|
|
callback(null, user != null);
|
2021-10-23 10:35:13 +02:00
|
|
|
|
2022-03-24 12:02:34 +02:00
|
|
|
if (user == null) {
|
|
|
|
loginRateLimiter.removeTokens(1);
|
2021-10-23 10:35:13 +02:00
|
|
|
}
|
|
|
|
});
|
2022-03-24 12:02:34 +02:00
|
|
|
} else {
|
|
|
|
callback(null, false);
|
2021-10-23 10:35:13 +02:00
|
|
|
}
|
|
|
|
});
|
2021-07-27 18:52:31 +02:00
|
|
|
}
|
|
|
|
|
2023-01-06 00:19:05 +02:00
|
|
|
/**
|
|
|
|
* Use basic auth if auth is not disabled
|
|
|
|
* @param {express.Request} req Express request object
|
|
|
|
* @param {express.Response} res Express response object
|
|
|
|
* @param {express.NextFunction} next
|
|
|
|
*/
|
2022-03-24 12:02:34 +02:00
|
|
|
exports.basicAuth = async function (req, res, next) {
|
|
|
|
const middleware = basicAuth({
|
|
|
|
authorizer: myAuthorizer,
|
|
|
|
authorizeAsync: true,
|
|
|
|
challenge: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
const disabledAuth = await setting("disableAuth");
|
|
|
|
|
|
|
|
if (!disabledAuth) {
|
|
|
|
middleware(req, res, next);
|
|
|
|
} else {
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
};
|