trilium/routes/api/login.js

70 lines
2.1 KiB
JavaScript

"use strict";
const express = require('express');
const router = express.Router();
const options = require('../../services/options');
const utils = require('../../services/utils');
const migration = require('../../services/migration');
const SOURCE_ID = require('../../services/source_id');
const auth = require('../../services/auth');
const password_encryption = require('../../services/password_encryption');
const protected_session = require('../../services/protected_session');
router.post('/sync', async (req, res, next) => {
const timestamp = req.body.timestamp;
const now = utils.nowTimestamp();
if (Math.abs(timestamp - now) > 5) {
res.status(400);
res.send({ message: 'Auth request time is out of sync' });
}
const dbVersion = req.body.dbVersion;
if (dbVersion !== migration.APP_DB_VERSION) {
res.status(400);
res.send({ message: 'Non-matching db versions, local is version ' + migration.APP_DB_VERSION });
}
const documentSecret = await options.getOption('document_secret');
const expectedHash = utils.hmac(documentSecret, timestamp);
const givenHash = req.body.hash;
if (expectedHash !== givenHash) {
res.status(400);
res.send({ message: "Hash doesn't match" });
}
req.session.loggedIn = true;
res.send({
sourceId: SOURCE_ID
});
});
// this is for entering protected mode so user has to be already logged-in (that's the reason we don't require username)
router.post('/protected', auth.checkApiAuth, async (req, res, next) => {
const password = req.body.password;
if (!await password_encryption.verifyPassword(password)) {
res.send({
success: false,
message: "Given current password doesn't match hash"
});
return;
}
const decryptedDataKey = await password_encryption.getDecryptedDataKeyCbc(password);
const protectedSessionId = protected_session.setDataKey(req, decryptedDataKey);
res.send({
success: true,
protectedSessionId: protectedSessionId
});
});
module.exports = router;