|
|
@@ -1,6 +1,7 @@
|
|
1
|
1
|
var Redis = require("ioredis");
|
|
2
|
2
|
var redis = new Redis();
|
|
3
|
3
|
var bcrypt = require('bcrypt-nodejs');
|
|
|
4
|
+var authgen = require("./../../utils/auth-keys.js");
|
|
4
|
5
|
|
|
5
|
6
|
module.exports = {
|
|
6
|
7
|
perform: function(a,b) {
|
|
|
@@ -10,49 +11,34 @@ module.exports = {
|
|
10
|
11
|
|
|
11
|
12
|
var perform = function(req, res) {
|
|
12
|
13
|
var username = req.body.user || req.query.user;
|
|
13
|
|
- username = username.toLowerCase();
|
|
14
|
14
|
var password = req.body.password || req.query.password;
|
|
15
|
|
- var auth_key = req.body.auth_key || req.query.auth_key;
|
|
16
|
15
|
var uquery = 'user:' + username;
|
|
17
|
16
|
|
|
18
|
17
|
redis.hgetall(uquery).then(function (result) {
|
|
19
|
18
|
if (result.password && result !== undefined && result !== null) {
|
|
20
|
19
|
var user_object = result;
|
|
21
|
|
- if (auth_key !== "" && auth_key !== undefined && auth_key !== null) {
|
|
22
|
|
- if (auth_key === user_object["auth-key"]) {
|
|
23
|
|
- var timestamp_user = Date.now().toString() + username;
|
|
24
|
|
- user_object["auth-key"] = bcrypt.hashSync(timestamp_user);
|
|
25
|
|
- redis.set(uquery, "auth-key", user_object["auth-key"]);
|
|
26
|
|
- res.send({"logged_in": 1,
|
|
27
|
|
- "auth-key": user_object["auth-key"],
|
|
28
|
|
- "error": 0});
|
|
29
|
|
- } else {
|
|
30
|
|
- res.send({"logged_in": 0,
|
|
31
|
|
- "error": 3});
|
|
32
|
|
- }
|
|
33
|
|
- } else {
|
|
34
|
|
- bcrypt.compare(password, user_object["password"], function (err, matched) {
|
|
35
|
|
- if (matched === true) {
|
|
36
|
|
- if (undefined === user_object["auth-key"]) {
|
|
37
|
|
- var timestamp_user = Date.now().toString() + username;
|
|
38
|
|
- user_object["auth-key"] = bcrypt.hashSync(timestamp_user);
|
|
39
|
|
- redis.set(uquery, JSON.stringify(user_object));
|
|
40
|
|
- res.send({"logged_in": 1,
|
|
41
|
|
- "auth-key": user_object["auth-key"],
|
|
42
|
|
- "error": 0});
|
|
43
|
|
- } else {
|
|
44
|
|
- res.send({"logged_in": 1,
|
|
45
|
|
- "auth-key": user_object["auth-key"],
|
|
46
|
|
- "error": 0});
|
|
|
20
|
+ if (username && password) {
|
|
|
21
|
+ username = username.toLowerCase();
|
|
|
22
|
+ bcrypt.compare(password, user_object.password, function (err, matched) {
|
|
|
23
|
+ if (matched) {
|
|
|
24
|
+ var new_auth_key = authgen.generate(username);
|
|
|
25
|
+ var aquery = "auth-key:" + new_auth_key;
|
|
|
26
|
+ redis.set(aquery, username);
|
|
|
27
|
+ redis.hset(uquery, "auth-key", new_auth_key);
|
|
|
28
|
+ if (user_object["auth-key"]) {
|
|
|
29
|
+ redis.del("auth-key:" + user_object["auth-key"]);
|
|
47
|
30
|
}
|
|
48
|
|
- return;
|
|
|
31
|
+ res.send({"logged_in": 1,
|
|
|
32
|
+ "auth-key": new_auth_key,
|
|
|
33
|
+ "error": 0})
|
|
49
|
34
|
} else {
|
|
50
|
35
|
res.send({"logged_in": 0,
|
|
51
|
36
|
"error": 2});
|
|
52
|
|
- return;
|
|
53
|
37
|
}
|
|
54
|
38
|
});
|
|
55
|
|
-
|
|
|
39
|
+ } else {
|
|
|
40
|
+ res.send({"logged_in": 0,
|
|
|
41
|
+ "error": 3});
|
|
56
|
42
|
}
|
|
57
|
43
|
} else {
|
|
58
|
44
|
res.send({"logged_in": 0,
|