mirror of
https://github.com/Ride-The-Lightning/RTL.git
synced 2025-03-13 11:35:42 +01:00
* rm .DS_Store * Add watchfrontenddev command for npm * Fix toggle issues in sidenav (pinning and on page refresh) * Add copy-to-clipboard fallback if navigator.clipboard is not available (#1336) * add copy-to-clipboard fallback if navigator.clipboard is not available * amend copy fallback * clipboard copy lint fixes and frontend build * fix: add missing boltz state `transaction.lockupFailed` (#1349) * fix: boltzd docs link (#1354) * exit gracefully (#1356) * allow for eclair updated relayed audit format (#1363) * feat: add boltz service to cln (#1352) * lint fix * Request Params Cleanup * cln: Boltz auto-send (#1366) * Bug-fix (CLN Boltz): Hide claim tx id and routing fee for non-zero conf reverse swap * cln: Boltz auto-send - Added auto send option for Swap In - Checking compatiblity with v2.0.0 and above * Test import fixes * Update help.component.ts (#1379) Fixed broken link under "Help" -> "Node Settings" * Backend config fix (#1382) * Updating Common Application Configuration * Fixed get RTL Conf * Update Application Settings * application and settings case change * Unified config models * Default node update * 2FA and Password reset * Final application settings update * Config Settings and Authentication case fixed * Node Setting Fix * Fiat currency Symbol fix * CLN: Fiat symbol fix * All: Fiat symbol fix * Update node settings * Services UI fix * CLN: Removed child node settings * All: Removed child node settings * Test fixes * mempool links for onchain information (#1383) * Tests fix Tests fix * UI for Block Explorer Configuration (#1385) * Bump fee with mempool information (#1386) * Mempool openchannel minfee (#1388) Open channel model block if min fee is higher * Show error on login screen if rune is incorrect and getinfo throws error (#1391) * cln: Removed channel lookup call for update policy (#1392) * ECL: On-chain Transactions, Invoice and Payments pagination (#1393) Done most of the UI changes to accommodate pagination on transactions, payments and invoices tables but true pagination cannot be implemented till total number of records are missing from the API response. Once the issue https://github.com/ACINQ/eclair/issues/2855 is fixed, I will uncomment pagination changes in the frontend. * lnd: Onchain CPFP (#1394) - UTXO label bug fix - Warning on utxo label for "sweep" in text. * Bug fixes after testing * Testing bug fixes (#1401) * Bug fix 2: lnd: Link channel point to explorer and show fee on close channel too * lnd: explorer link on pending channels * Node lookup link on view channel peer pubkey * Testing bug fixes (#1402) * Bug fix 2: lnd: Link channel point to explorer and show fee on close channel too * lnd: explorer link on pending channels * Node lookup link on view channel peer pubkey * test fixes * ng update to v18.0.x * Updating install with --legacy-peer-deps --------- Co-authored-by: Grzegorz Kućmierz <gkucmierz@gmail.com> Co-authored-by: lacksfish <lacksfish@gmail.com> Co-authored-by: jackstar12 <62219658+jackstar12@users.noreply.github.com> Co-authored-by: Kilian <19181985+kilrau@users.noreply.github.com> Co-authored-by: Taylor King <taylorbradleyking@gmail.com> Co-authored-by: Fishcake <128653975+fishcakeday@users.noreply.github.com> Co-authored-by: Ant <72945059+2140data@users.noreply.github.com>
130 lines
7 KiB
TypeScript
130 lines
7 KiB
TypeScript
import jwt from 'jsonwebtoken';
|
|
import * as otplib from 'otplib';
|
|
import * as crypto from 'crypto';
|
|
import { Database, DatabaseService } from '../../utils/database.js';
|
|
import { Logger, LoggerService } from '../../utils/logger.js';
|
|
import { Common, CommonService } from '../../utils/common.js';
|
|
|
|
const logger: LoggerService = Logger;
|
|
const common: CommonService = Common;
|
|
const ONE_MINUTE = 60000;
|
|
const LOCKING_PERIOD = 30 * ONE_MINUTE; // HALF AN HOUR
|
|
const ALLOWED_LOGIN_ATTEMPTS = 5;
|
|
const failedLoginAttempts = {};
|
|
const databaseService: DatabaseService = Database;
|
|
|
|
const loginInterval = setInterval(() => {
|
|
for (const ip in failedLoginAttempts) {
|
|
if (new Date().getTime() > (failedLoginAttempts[ip].lastTried + LOCKING_PERIOD)) {
|
|
delete failedLoginAttempts[ip];
|
|
clearInterval(loginInterval);
|
|
}
|
|
}
|
|
}, LOCKING_PERIOD);
|
|
|
|
export const getFailedInfo = (reqIP, currentTime) => {
|
|
let failed = { count: 0, lastTried: currentTime };
|
|
if ((!failedLoginAttempts[reqIP]) || (currentTime > (failed.lastTried + LOCKING_PERIOD))) {
|
|
failed = { count: 0, lastTried: currentTime };
|
|
failedLoginAttempts[reqIP] = failed;
|
|
} else {
|
|
failed = failedLoginAttempts[reqIP];
|
|
}
|
|
return failed;
|
|
};
|
|
|
|
const handleMultipleFailedAttemptsError = (failed, currentTime, errMsg) => {
|
|
if (failed.count >= ALLOWED_LOGIN_ATTEMPTS && (currentTime <= (failed.lastTried + LOCKING_PERIOD))) {
|
|
return {
|
|
message: 'Multiple Failed Login Attempts!',
|
|
error: 'Application locked for ' + (LOCKING_PERIOD / ONE_MINUTE) + ' minutes due to multiple failed attempts!\nTry again after ' + common.convertTimestampToTime((failed.lastTried + LOCKING_PERIOD) / 1000) + '!'
|
|
};
|
|
} else {
|
|
return {
|
|
message: 'Authentication Failed!',
|
|
error: errMsg + '\nApplication will be locked after ' + (ALLOWED_LOGIN_ATTEMPTS - failed.count) + ' more unsuccessful attempts!'
|
|
};
|
|
}
|
|
};
|
|
|
|
export const verifyToken = (twoFAToken) => !!(common.appConfig.secret2FA && common.appConfig.secret2FA !== '' && otplib.authenticator.check(twoFAToken, common.appConfig.secret2FA));
|
|
|
|
export const authenticateUser = (req, res, next) => {
|
|
const { authenticateWith, authenticationValue, twoFAToken } = req.body;
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'Authenticating User..' });
|
|
if (+common.appConfig.SSO.rtlSso) {
|
|
if (authenticateWith === 'JWT' && jwt.verify(authenticationValue, common.secret_key)) {
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'User Authenticated' });
|
|
res.status(406).json({ message: 'SSO Authentication Error', error: 'Login with Password is not allowed with SSO.' });
|
|
} else if (authenticateWith === 'PASSWORD') {
|
|
if (common.appConfig.SSO.cookieValue.trim().length >= 32 && crypto.timingSafeEqual(Buffer.from(crypto.createHash('sha256').update(common.appConfig.SSO.cookieValue).digest('hex'), 'utf-8'), Buffer.from(authenticationValue, 'utf-8'))) {
|
|
common.refreshCookie();
|
|
if (!req.session.selectedNode) { req.session.selectedNode = common.selectedNode; }
|
|
const token = jwt.sign({ user: 'SSO_USER' }, common.secret_key);
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'User Authenticated' });
|
|
res.status(200).json({ token: token });
|
|
} else {
|
|
const errMsg = 'SSO Authentication Failed! Access key too short or does not match.';
|
|
const err = common.handleError({ statusCode: 406, message: 'SSO Authentication Error', error: errMsg }, 'Authenticate', errMsg, req.session.selectedNode);
|
|
return res.status(err.statusCode).json({ message: err.message, error: err.error });
|
|
}
|
|
}
|
|
} else {
|
|
const currentTime = new Date().getTime();
|
|
const reqIP = common.getRequestIP(req);
|
|
const failed = getFailedInfo(reqIP, currentTime);
|
|
const password = authenticationValue;
|
|
if (common.appConfig.rtlPass === password && failed.count < ALLOWED_LOGIN_ATTEMPTS) {
|
|
if (twoFAToken && twoFAToken !== '') {
|
|
if (!verifyToken(twoFAToken)) {
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'ERROR', fileName: 'Authenticate', msg: 'Invalid Token! Failed IP ' + reqIP, error: { error: 'Invalid token.' } });
|
|
failed.count = failed.count + 1;
|
|
failed.lastTried = currentTime;
|
|
return res.status(401).json(handleMultipleFailedAttemptsError(failed, currentTime, 'Invalid 2FA Token!'));
|
|
}
|
|
}
|
|
if (!req.session.selectedNode) { req.session.selectedNode = common.selectedNode; }
|
|
delete failedLoginAttempts[reqIP];
|
|
const token = jwt.sign({ user: 'NODE_USER' }, common.secret_key);
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'User Authenticated' });
|
|
res.status(200).json({ token: token });
|
|
} else {
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'ERROR', fileName: 'Authenticate', msg: 'Invalid Password! Failed IP ' + reqIP, error: { error: 'Invalid password.' } });
|
|
failed.count = common.appConfig.rtlPass !== password ? (failed.count + 1) : failed.count;
|
|
failed.lastTried = common.appConfig.rtlPass !== password ? currentTime : failed.lastTried;
|
|
return res.status(401).json(handleMultipleFailedAttemptsError(failed, currentTime, 'Invalid Password!'));
|
|
}
|
|
}
|
|
};
|
|
|
|
export const resetPassword = (req, res, next) => {
|
|
const { currPassword, newPassword } = req.body;
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'Resetting Password..' });
|
|
if (+common.appConfig.SSO.rtlSso) {
|
|
const errMsg = 'Password cannot be reset for SSO authentication';
|
|
const err = common.handleError({ statusCode: 401, message: 'Password Reset Error', error: errMsg }, 'Authenticate', errMsg, req.session.selectedNode);
|
|
return res.status(err.statusCode).json({ message: err.message, error: err.error });
|
|
} else {
|
|
if (common.appConfig.rtlPass === currPassword) {
|
|
common.appConfig.rtlPass = common.replacePasswordWithHash(newPassword);
|
|
const token = jwt.sign({ user: 'NODE_USER' }, common.secret_key);
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'Password Reset Successful' });
|
|
res.status(200).json({ token: token });
|
|
} else {
|
|
const errMsg = 'Incorrect Old Password';
|
|
const err = common.handleError({ statusCode: 401, message: 'Password Reset Error', error: errMsg }, 'Authenticate', errMsg, req.session.selectedNode);
|
|
return res.status(err.statusCode).json({ message: err.message, error: err.error });
|
|
}
|
|
}
|
|
};
|
|
|
|
export const logoutUser = (req, res, next) => {
|
|
logger.log({ selectedNode: req.session.selectedNode, level: 'INFO', fileName: 'Authenticate', msg: 'Logged out' });
|
|
if (req.session.selectedNode && req.session.selectedNode.index) {
|
|
databaseService.unloadDatabase(+req.session.selectedNode.index, req.session.id);
|
|
}
|
|
req.session.destroy((err) => {
|
|
res.clearCookie('connect.sid');
|
|
res.status(200).json({ loggedout: true });
|
|
});
|
|
};
|