mirror of
https://github.com/dscalzi/HeliosLauncher.git
synced 2024-12-25 13:12:13 -08:00
daa6faac86
Fixed AuthManager sending incorrect client token to the auth endpoint. Fixed minor issues with the validate selected function. Fixed minor issue related to UI transitions. Added account validations on startup and when account is switched. Updated dependencies.
87 lines
3.0 KiB
JavaScript
87 lines
3.0 KiB
JavaScript
/**
|
|
* AuthManager
|
|
*
|
|
* This module aims to abstract login procedures. Results from Mojang's REST api
|
|
* are retrieved through our Mojang module. These results are processed and stored,
|
|
* if applicable, in the config using the ConfigManager. All login procedures should
|
|
* be made through this module.
|
|
*
|
|
* @module authmanager
|
|
*/
|
|
// Requirements
|
|
const ConfigManager = require('./configmanager.js')
|
|
const Mojang = require('./mojang.js')
|
|
|
|
// Functions
|
|
|
|
/**
|
|
* Add an account. This will authenticate the given credentials with Mojang's
|
|
* authserver. The resultant data will be stored as an auth account in the
|
|
* configuration database.
|
|
*
|
|
* @param {string} username The account username (email if migrated).
|
|
* @param {string} password The account password.
|
|
* @returns {Promise.<Object>} Promise which resolves the resolved authenticated account object.
|
|
*/
|
|
exports.addAccount = async function(username, password){
|
|
try {
|
|
const session = await Mojang.authenticate(username, password, ConfigManager.getClientToken())
|
|
const ret = ConfigManager.addAuthAccount(session.selectedProfile.id, session.accessToken, username, session.selectedProfile.name)
|
|
ConfigManager.save()
|
|
return ret
|
|
} catch (err){
|
|
return Promise.reject(err)
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Remove an account. This will invalidate the access token associated
|
|
* with the account and then remove it from the database.
|
|
*
|
|
* @param {string} uuid The UUID of the account to be removed.
|
|
* @returns {Promise.<void>} Promise which resolves to void when the action is complete.
|
|
*/
|
|
exports.removeAccount = async function(uuid){
|
|
try {
|
|
const authAcc = ConfigManager.getAuthAccount(uuid)
|
|
await Mojang.invalidate(authAcc.accessToken, ConfigManager.getClientToken())
|
|
ConfigManager.removeAuthAccount(uuid)
|
|
ConfigManager.save()
|
|
return Promise.resolve()
|
|
} catch (err){
|
|
return Promise.reject(err)
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Validate the selected account with Mojang's authserver. If the account is not valid,
|
|
* we will attempt to refresh the access token and update that value. If that fails, a
|
|
* new login will be required.
|
|
*
|
|
* **Function is WIP**
|
|
*
|
|
* @returns {Promise.<boolean>} Promise which resolves to true if the access token is valid,
|
|
* otherwise false.
|
|
*/
|
|
exports.validateSelected = async function(){
|
|
const current = ConfigManager.getSelectedAccount()
|
|
const isValid = await Mojang.validate(current.accessToken, ConfigManager.getClientToken())
|
|
console.log(isValid)
|
|
if(!isValid){
|
|
try {
|
|
const session = await Mojang.refresh(current.accessToken, ConfigManager.getClientToken())
|
|
console.log('ses', session)
|
|
ConfigManager.updateAuthAccount(current.uuid, session.accessToken)
|
|
ConfigManager.save()
|
|
} catch(err) {
|
|
console.debug('Error while validating selected profile:', err)
|
|
if(err && err.error === 'ForbiddenOperationException'){
|
|
// What do we do?
|
|
}
|
|
return false
|
|
}
|
|
return true
|
|
} else {
|
|
return true
|
|
}
|
|
} |