|
|
|
@ -6,10 +6,30 @@ var upperCase = require('upper-case');
|
|
|
|
|
var atob = require('atob');
|
|
|
|
|
var logger = require('./logger');
|
|
|
|
|
|
|
|
|
|
exports.authenticateUserWithCookie = (req, res, next) => {
|
|
|
|
|
if(+common.rtl_sso) {
|
|
|
|
|
res.cookie('access-key', req.query['access-key'], { signed: true, httpOnly: true, sameSite: true, secure: true });
|
|
|
|
|
res.set(
|
|
|
|
|
{
|
|
|
|
|
'Cache-Control': 'private, no-cache'
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
res.redirect(301, '/rtl/');
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
res.status(404).json({
|
|
|
|
|
message: "Login Failure!",
|
|
|
|
|
error: "SSO not available"
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
exports.authenticateUser = (req, res, next) => {
|
|
|
|
|
password = atob(req.body.password);
|
|
|
|
|
if(+common.rtl_sso) {
|
|
|
|
|
if (common.cookie === password) {
|
|
|
|
|
const access_key = req.cookies['access-key'];
|
|
|
|
|
res.clearCookie("access-key");
|
|
|
|
|
if (common.cookie === access_key) {
|
|
|
|
|
const token = jwt.sign(
|
|
|
|
|
{ user: 'Custom_User', lndConfigPath: common.lnd_config_path, macaroonPath: common.macaroon_path },
|
|
|
|
|
'default_secret_key'
|
|
|
|
@ -22,6 +42,7 @@ exports.authenticateUser = (req, res, next) => {
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
password = atob(req.body.password);
|
|
|
|
|
if(upperCase(common.node_auth_type) === 'CUSTOM') {
|
|
|
|
|
if (common.rtl_pass === password) {
|
|
|
|
|
var rpcUser = 'Custom_User';
|
|
|
|
|