92 lines
2.6 KiB
TypeScript
92 lines
2.6 KiB
TypeScript
import { Request, Response, Router } from "express";
|
|
import { check, FieldErrors, Length } from "../../util/instanceOf";
|
|
import bcrypt from "bcrypt";
|
|
import jwt from "jsonwebtoken";
|
|
import { UserModel } from "@fosscord/server-util";
|
|
import Config from "../../util/Config";
|
|
import { adjustEmail } from "./register";
|
|
|
|
const router: Router = Router();
|
|
export default router;
|
|
|
|
router.post(
|
|
"/",
|
|
check({
|
|
login: new Length(String, 2, 100), // email or telephone
|
|
password: new Length(String, 8, 64),
|
|
$undelete: Boolean,
|
|
$captcha_key: String,
|
|
$login_source: String,
|
|
$gift_code_sku_id: String,
|
|
}),
|
|
async (req: Request, res: Response) => {
|
|
const { login, password } = req.body;
|
|
const email = adjustEmail(login);
|
|
const query: any[] = [{ phone: login }];
|
|
if (email) query.push({ email });
|
|
|
|
const user = await UserModel.findOne(
|
|
{
|
|
$or: query,
|
|
},
|
|
`user_data.hash id user_settings.locale user_settings.theme`
|
|
).exec();
|
|
|
|
if (!user) {
|
|
throw FieldErrors({
|
|
login: { message: req.t("auth:login.INVALID_LOGIN"), code: "INVALID_LOGIN" },
|
|
});
|
|
}
|
|
|
|
// the salt is saved in the password refer to bcrypt docs
|
|
const same_password = await bcrypt.compare(password, user.user_data.hash);
|
|
if (!same_password) {
|
|
throw FieldErrors({
|
|
password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" },
|
|
});
|
|
}
|
|
|
|
const token = await generateToken(user.id);
|
|
|
|
// Notice this will have a different token structure, than discord
|
|
// Discord header is just the user id as string, which is not possible with npm-jsonwebtoken package
|
|
// https://user-images.githubusercontent.com/6506416/81051916-dd8c9900-8ec2-11ea-8794-daf12d6f31f0.png
|
|
|
|
res.json({ token, user_settings: user.user_settings });
|
|
}
|
|
);
|
|
|
|
export async function generateToken(id: string) {
|
|
const iat = Math.floor(Date.now() / 1000);
|
|
const algorithm = "HS256";
|
|
|
|
return new Promise((res, rej) => {
|
|
jwt.sign(
|
|
{ id: id, iat },
|
|
Config.get().security.jwtSecret,
|
|
{
|
|
algorithm,
|
|
},
|
|
(err, token) => {
|
|
if (err) return rej(err);
|
|
return res(token);
|
|
}
|
|
);
|
|
});
|
|
}
|
|
|
|
/**
|
|
* POST /auth/login
|
|
* @argument { login: "email@gmail.com", password: "cleartextpassword", undelete: false, captcha_key: null, login_source: null, gift_code_sku_id: null, }
|
|
|
|
* MFA required:
|
|
* @returns {"token": null, "mfa": true, "sms": true, "ticket": "SOME TICKET JWT TOKEN"}
|
|
|
|
* Captcha required:
|
|
* @returns {"captcha_key": ["captcha-required"], "captcha_sitekey": null, "captcha_service": "recaptcha"}
|
|
|
|
* Sucess:
|
|
* @returns {"token": "USERTOKEN", "user_settings": {"locale": "en", "theme": "dark"}}
|
|
|
|
*/
|