Fixed webserver.js exception.

This commit is contained in:
Ylian Saint-Hilaire 2022-07-21 16:08:38 -07:00
parent 60701f5b7c
commit 4db8ff3946

View File

@ -2883,15 +2883,17 @@ module.exports.CreateWebServer = function (parent, db, args, certificates, doneF
// Send back the login application // Send back the login application
// If this is a 2 factor auth request, look for a hardware key challenge. // If this is a 2 factor auth request, look for a hardware key challenge.
// Normal login 2 factor request // Normal login 2 factor request
const sec = parent.decryptSessionData(req.session.e);
if (req.session && (req.session.loginmode == 4) && (sec.tuserid)) { if (req.session && (req.session.loginmode == 4) && (sec.tuserid)) {
var user = obj.users[sec.tuserid]; const sec = parent.decryptSessionData(req.session.e);
if (sec != null) {
const user = obj.users[sec.tuserid];
if (user != null) { if (user != null) {
parent.debug('web', 'handleRootRequestEx: sending 2FA challenge.'); parent.debug('web', 'handleRootRequestEx: sending 2FA challenge.');
getHardwareKeyChallenge(req, domain, user, function (hwchallenge) { handleRootRequestLogin(req, res, domain, hwchallenge, passRequirements); }); getHardwareKeyChallenge(req, domain, user, function (hwchallenge) { handleRootRequestLogin(req, res, domain, hwchallenge, passRequirements); });
return; return;
} }
} }
}
// Password recovery 2 factor request // Password recovery 2 factor request
if (req.session && (req.session.loginmode == 5) && (req.session.temail)) { if (req.session && (req.session.loginmode == 5) && (req.session.temail)) {
obj.db.GetUserWithVerifiedEmail(domain.id, req.session.temail, function (err, docs) { obj.db.GetUserWithVerifiedEmail(domain.id, req.session.temail, function (err, docs) {