Notes/src/routes/login.ts

165 lines
4.6 KiB
TypeScript
Raw Normal View History

import utils from "../services/utils.js";
import optionService from "../services/options.js";
import myScryptService from "../services/encryption/my_scrypt.js";
import log from "../services/log.js";
import passwordService from "../services/encryption/password.js";
import assetPath from "../services/asset_path.js";
import appPath from "../services/app_path.js";
import ValidationError from "../errors/validation_error.js";
import type { Request, Response } from 'express';
2025-03-26 02:04:24 +01:00
import totp from '../services/totp.js';
2024-09-07 10:21:41 -07:00
import recoveryCodeService from '../services/encryption/recovery_codes.js';
2025-03-26 02:04:24 +01:00
import openID from '../services/open_id.js';
2024-09-07 10:21:41 -07:00
import openIDEncryption from '../services/encryption/open_id_encryption.js';
2024-04-07 14:22:01 +03:00
function loginPage(req: Request, res: Response) {
2025-03-26 01:48:42 +01:00
res.render('login', {
wrongPassword: false,
wrongTotp: false,
totpEnabled: totp.isTotpEnabled(),
2025-03-26 02:04:24 +01:00
ssoEnabled: openID.isOpenIDEnabled(),
2025-03-26 01:48:42 +01:00
assetPath: assetPath,
appPath: appPath,
});
}
2017-10-15 16:32:49 -04:00
2024-04-07 14:22:01 +03:00
function setPasswordPage(req: Request, res: Response) {
2025-01-09 18:07:02 +02:00
res.render("set_password", {
error: false,
assetPath,
appPath
});
2021-12-29 23:19:05 +01:00
}
2024-04-07 14:22:01 +03:00
function setPassword(req: Request, res: Response) {
if (passwordService.isPasswordSet()) {
throw new ValidationError("Password has been already set");
2021-12-29 23:37:12 +01:00
}
2025-01-09 18:07:02 +02:00
let { password1, password2 } = req.body;
2021-12-29 23:37:12 +01:00
password1 = password1.trim();
password2 = password2.trim();
let error;
if (password1 !== password2) {
error = "Entered passwords don't match.";
} else if (password1.length < 4) {
error = "Password must be at least 4 characters long.";
}
2017-10-15 16:32:49 -04:00
2021-12-29 23:37:12 +01:00
if (error) {
2025-01-09 18:07:02 +02:00
res.render("set_password", {
error,
assetPath,
appPath
});
2021-12-29 23:37:12 +01:00
return;
}
passwordService.setPassword(password1);
2021-12-29 23:37:12 +01:00
2025-01-09 18:07:02 +02:00
res.redirect("login");
2021-12-29 23:37:12 +01:00
}
function login(req: Request, res: Response) {
2025-03-26 02:04:24 +01:00
if (openID.isOpenIDEnabled()) {
2025-03-26 02:39:29 +01:00
res.oidc.login({
returnTo: '/',
authorizationParams: {
prompt: 'consent',
access_type: 'offline'
}
});
2025-03-26 02:04:24 +01:00
return;
}
2025-03-25 23:53:49 +01:00
const submittedPassword = req.body.password;
2025-03-26 00:42:19 +01:00
const submittedTotpToken = req.body.totpToken;
2017-10-15 16:32:49 -04:00
if (totp.isTotpEnabled()) {
2025-03-26 00:42:19 +01:00
if (!verifyTOTP(submittedTotpToken)) {
sendLoginError(req, res, 'totp');
return;
}
2017-10-15 16:32:49 -04:00
}
if (!verifyPassword(submittedPassword)) {
sendLoginError(req, res, 'password');
return;
}
const rememberMe = req.body.rememberMe;
req.session.regenerate(() => {
if (!rememberMe) {
// unset default maxAge set by sessionParser
// Cookie becomes non-persistent and expires
// after current browser session (e.g. when browser is closed)
req.session.cookie.maxAge = undefined;
}
req.session.lastAuthState = {
totpEnabled: totp.isTotpEnabled(),
2025-03-26 02:04:24 +01:00
ssoEnabled: openID.isOpenIDEnabled()
};
req.session.loggedIn = true;
res.redirect('.');
});
}
2017-10-15 16:32:49 -04:00
2025-03-26 00:42:19 +01:00
function verifyTOTP(submittedTotpToken: string) {
if (totp.validateTOTP(submittedTotpToken)) return true;
2025-03-26 00:42:19 +01:00
const recoveryCodeValidates = recoveryCodeService.verifyRecoveryCode(submittedTotpToken);
2024-09-07 10:21:41 -07:00
return recoveryCodeValidates;
}
2025-03-25 23:53:49 +01:00
function verifyPassword(submittedPassword: string) {
2025-01-09 18:07:02 +02:00
const hashed_password = utils.fromBase64(optionService.getOption("passwordVerificationHash"));
2017-10-15 16:32:49 -04:00
2025-03-25 23:53:49 +01:00
const guess_hashed = myScryptService.getVerificationHash(submittedPassword);
2017-10-15 16:32:49 -04:00
return guess_hashed.equals(hashed_password);
}
function sendLoginError(req: Request, res: Response, errorType: 'password' | 'totp' = 'password') {
2024-09-07 10:21:41 -07:00
// note that logged IP address is usually meaningless since the traffic should come from a reverse proxy
if (totp.isTotpEnabled()) {
log.info(`WARNING: Wrong ${errorType} from ${req.ip}, rejecting.`);
} else {
2024-09-07 11:41:54 -07:00
log.info(`WARNING: Wrong password from ${req.ip}, rejecting.`);
}
res.status(401).render('login', {
wrongPassword: errorType === 'password',
wrongTotp: errorType === 'totp',
totpEnabled: totp.isTotpEnabled(),
2025-03-26 02:04:24 +01:00
ssoEnabled: openID.isOpenIDEnabled(),
assetPath: assetPath,
2025-03-25 23:53:49 +01:00
appPath: appPath,
2024-09-07 10:21:41 -07:00
});
}
function logout(req: Request, res: Response) {
req.session.regenerate(() => {
req.session.loggedIn = false;
2025-03-26 02:04:24 +01:00
if (openID.isOpenIDEnabled() && openIDEncryption.isSubjectIdentifierSaved()) {
2025-03-28 04:05:00 +01:00
res.oidc.logout({ returnTo: '/' });
}
res.redirect('login');
});
}
export default {
loginPage,
2021-12-29 23:19:05 +01:00
setPasswordPage,
2021-12-29 23:37:12 +01:00
setPassword,
login,
logout
};