burgernotes-client-web/static/js/signup.js

174 lines
6.8 KiB
JavaScript
Raw Normal View History

2024-06-22 14:57:50 +01:00
// @license magnet:?xt=urn:btih:0b31508aeb0634b347b8270c7bee4d411b5d4109&dn=agpl-3.0.txt AGPL-3.0
if (localStorage.getItem("DONOTSHARE-secretkey") !== null || localStorage.getItem("DONOTSHARE-password") !== null) {
window.location.replace("/app/")
2024-03-12 18:34:05 +00:00
document.body.innerHTML = "Redirecting..."
throw new Error();
}
let remote = localStorage.getItem("homeserverURL")
if (remote == null) {
localStorage.setItem("homeserverURL", "https://notes.hectabit.org")
remote = "https://notes.hectabit.org"
}
let usernameBox = document.getElementById("usernameBox")
let passwordBox = document.getElementById("passwordBox")
let statusBox = document.getElementById("statusBox")
let signupButton = document.getElementById("signupButton")
2024-06-21 16:49:44 +01:00
let opButton = document.getElementById("opButton")
2024-03-12 18:34:05 +00:00
// Leave these variables alone, they are used in the WASM code.
async function hashpass(pass) {
return await hashwasm.argon2id({
password: pass,
salt: new TextEncoder().encode("I munch Burgers!!"),
parallelism: 1,
iterations: 32,
memorySize: 19264,
hashLength: 32,
outputType: "hex"
})
}
2024-03-12 18:34:05 +00:00
function showElements(yesorno) {
if (!yesorno) {
usernameBox.classList.add("hidden")
passwordBox.classList.add("hidden")
signupButton.classList.add("hidden")
2024-06-21 16:49:44 +01:00
opButton.classList.add("hidden")
inputContainer.classList.add("hidden")
2024-03-12 18:34:05 +00:00
}
else {
usernameBox.classList.remove("hidden")
passwordBox.classList.remove("hidden")
signupButton.classList.remove("hidden")
2024-06-21 16:49:44 +01:00
opButton.classList.remove("hidden")
inputContainer.classList.remove("hidden")
2024-03-12 18:34:05 +00:00
}
}
2024-06-21 16:49:44 +01:00
document.addEventListener("DOMContentLoaded", function() {
2024-03-12 18:34:05 +00:00
document.getElementById("homeserver").innerText = "Your homeserver is: " + remote + ". "
});
2024-06-21 16:49:44 +01:00
opButton.addEventListener("click", () => {
window.location.href = "/login"
});
complete = new Event("completed");
window.returnCode = undefined;
window.returnVar = undefined;
// This is for the WASM code to call when it's done. Do not remove it, even if it looks like it's never called.
function WASMComplete() {
window.dispatchEvent(complete);
}
signupButton.addEventListener("click", () => {
2024-03-12 18:34:05 +00:00
let username = usernameBox.value
let password = passwordBox.value
if (username === "") {
statusBox.innerText = "Username required!"
2024-03-12 18:34:05 +00:00
return
}
if ((username).length > 20) {
statusBox.innerText = "Username cannot be more than 20 characters!"
2024-03-12 18:34:05 +00:00
return
}
if (password === "") {
statusBox.innerText = "Password required!"
2024-03-12 18:34:05 +00:00
return
}
if ((password).length < 8) {
statusBox.innerText = "Password must be at least 8 characters!"
2024-03-12 18:34:05 +00:00
return
}
showElements(false)
statusBox.innerText = "Computing PoW Challenge... (this may take up to 5 minutes at worst, 3 seconds at best)"
/*
* Compiled version of:
* hashcat-wasm (https://concord.hectabit.org/hectabit/hashcat-wasm)
* (c) Arzumify
* @license AGPL-3.0
* Since this is my software, if you use it with proprietary servers, I will make sure you will walk across hot coals (just kidding, probably).
* I'm not kidding about the license though.
* I should stop including comments into JS and possibly minify this code. Oh, well.
*/
const go = new Go();
WebAssembly.instantiateStreaming(fetch("/static/wasm/hashcat.wasm"), go.importObject).then((result) => {
go.run(result.instance);
2024-03-12 18:34:05 +00:00
})
window.addEventListener("completed", async () => {
if (window.returnCode === 1) {
statusBox.innerText = "Please do not expose your computer to cosmic rays (an impossible logical event has occurred)."
showElements(true)
return
} else if (window.returnCode === 2) {
statusBox.innerText = "The PoW Challenge has failed. Please try again."
showElements(true)
return
}
statusBox.innerText = "Hashing password..."
let hashedPassword = await hashpass(password)
statusBox.innerText = "Contacting server..."
fetch(remote + "/api/signup", {
method: "POST",
body: JSON.stringify({
username: username,
password: hashedPassword,
stamp: window.returnVar,
}),
headers: {
"Content-Type": "application/json; charset=UTF-8",
}
})
.then((response) => response)
.then(async (response) => {
2024-03-12 18:34:05 +00:00
let responseData = await response.json()
if (response.status === 200) {
statusBox.innerText = "Setting up encryption keys..."
2024-03-12 18:34:05 +00:00
localStorage.setItem("DONOTSHARE-secretkey", responseData["key"])
localStorage.setItem("DONOTSHARE-password", await hashwasm.argon2id({
password: password,
salt: new TextEncoder().encode("I love Burgernotes!"),
parallelism: 1,
iterations: 32,
memorySize: 19264,
hashLength: 32,
outputType: "hex"
}))
statusBox.innerText = "Welcome!"
await new Promise(r => setTimeout(r, 200))
window.location.href = "/app/"
2024-07-13 17:32:59 +01:00
} else if (response.status === 409) {
2024-03-12 18:34:05 +00:00
statusBox.innerText = "Username already taken!"
showElements(true)
2024-07-13 17:32:59 +01:00
} else if (response.status === 429) {
statusBox.innerText = "Please don't sign up to new accounts that quickly. If you are using a VPN, please turn it off!"
showElements(true)
} else if (response.status === 409) {
statusBox.innerText = "Pure bad luck... your PoW challenge was accepted, but someone else used the same PoW challenge as you. Please try again. (error: " + responseData["error"] + ")"
showElements(true)
} else if (response.status === 500) {
statusBox.innerText = responseData["error"]
showElements(true)
2024-07-13 17:33:57 +01:00
} else {
statusBox.innerText = "Something went wrong! (error: " + responseData["error"] + ")"
2024-03-12 18:34:05 +00:00
showElements(true)
}
})
})
2024-03-12 18:34:05 +00:00
});
2024-06-22 14:57:50 +01:00
2024-07-13 17:32:59 +01:00
// @license-end