Notes/src/services/auth.js

138 lines
3.4 KiB
JavaScript
Raw Normal View History

2017-10-21 21:10:33 -04:00
"use strict";
2022-01-10 17:09:20 +01:00
const etapiTokenService = require("./etapi_tokens");
2019-07-25 21:05:16 +02:00
const log = require('./log');
const sqlInit = require('./sql_init');
const utils = require('./utils');
const passwordEncryptionService = require('./password_encryption');
const config = require('./config');
2022-01-10 17:09:20 +01:00
const passwordService = require("./password");
const noAuthentication = config.General && config.General.noAuthentication === true;
2017-10-25 22:39:21 -04:00
2020-06-20 12:31:38 +02:00
function checkAuth(req, res, next) {
if (!sqlInit.isDbInitialized()) {
2017-12-03 22:29:23 -05:00
res.redirect("setup");
}
else if (!req.session.loggedIn && !utils.isElectron() && !noAuthentication) {
2022-01-12 19:32:23 +01:00
res.redirect("login");
2017-10-25 22:39:21 -04:00
}
else {
next();
}
}
2018-01-07 09:59:05 -05:00
// for electron things which need network stuff
// currently we're doing that for file upload because handling form data seems to be difficult
2020-06-20 12:31:38 +02:00
function checkApiAuthOrElectron(req, res, next) {
if (!req.session.loggedIn && !utils.isElectron() && !noAuthentication) {
2021-04-05 22:37:12 +02:00
reject(req, res, "Logged in session not found");
2018-01-07 09:59:05 -05:00
}
else {
2017-10-15 16:32:49 -04:00
next();
}
}
2020-06-20 12:31:38 +02:00
function checkApiAuth(req, res, next) {
if (!req.session.loggedIn && !noAuthentication) {
2021-04-05 22:37:12 +02:00
reject(req, res, "Logged in session not found");
}
else {
next();
}
}
2020-06-20 12:31:38 +02:00
function checkAppInitialized(req, res, next) {
if (!sqlInit.isDbInitialized()) {
res.redirect("setup");
}
else {
next();
}
}
2021-12-29 23:19:05 +01:00
function checkPasswordSet(req, res, next) {
if (!utils.isElectron() && !passwordService.isPasswordSet()) {
2021-12-29 23:37:12 +01:00
res.redirect("set-password");
2021-12-29 23:19:05 +01:00
} else {
next();
}
}
2022-01-12 19:32:23 +01:00
function checkPasswordNotSet(req, res, next) {
if (!utils.isElectron() && passwordService.isPasswordSet()) {
res.redirect("login");
} else {
next();
}
}
2020-06-20 12:31:38 +02:00
function checkAppNotInitialized(req, res, next) {
if (sqlInit.isDbInitialized()) {
2019-07-25 21:05:16 +02:00
reject(req, res, "App already initialized.");
2017-12-03 22:29:23 -05:00
}
else {
next();
}
}
2022-01-10 17:09:20 +01:00
function checkEtapiToken(req, res, next) {
if (etapiTokenService.isValidAuthHeader(req.headers.authorization)) {
next();
}
else {
2022-01-10 17:09:20 +01:00
reject(req, res, "Token not found");
}
}
2019-07-25 21:05:16 +02:00
function reject(req, res, message) {
log.info(`${req.method} ${req.path} rejected with 401 ${message}`);
res.setHeader("Content-Type", "text/plain")
.status(401)
.send(message);
2019-07-25 21:05:16 +02:00
}
function checkCredentials(req, res, next) {
if (!sqlInit.isDbInitialized()) {
res.setHeader("Content-Type", "text/plain")
.status(400)
.send('Database is not initialized yet.');
return;
}
if (!passwordService.isPasswordSet()) {
res.setHeader("Content-Type", "text/plain")
.status(400)
.send('Password has not been set yet. Please set a password and repeat the action');
return;
}
const header = req.headers['trilium-cred'] || '';
const auth = new Buffer.from(header, 'base64').toString();
const [username, password] = auth.split(/:/);
2021-12-29 23:37:12 +01:00
// username is ignored
2021-12-29 23:37:12 +01:00
if (!passwordEncryptionService.verifyPassword(password)) {
res.setHeader("Content-Type", "text/plain")
.status(401)
.send('Incorrect password');
}
else {
next();
}
}
2017-10-15 16:32:49 -04:00
module.exports = {
checkAuth,
checkApiAuth,
checkAppInitialized,
2021-12-29 23:19:05 +01:00
checkPasswordSet,
2022-01-12 19:32:23 +01:00
checkPasswordNotSet,
2018-01-07 09:59:05 -05:00
checkAppNotInitialized,
checkApiAuthOrElectron,
2022-01-10 17:09:20 +01:00
checkEtapiToken,
checkCredentials
2020-06-20 12:31:38 +02:00
};