| import { |
| BadRequestException, |
| Body, |
| Controller, |
| Get, |
| HttpCode, |
| InternalServerErrorException, |
| Patch, |
| Post, |
| Query, |
| Res, |
| UseGuards, |
| } from "@nestjs/common"; |
| import { ConfigService } from "@nestjs/config"; |
| import { ApiTags } from "@nestjs/swagger"; |
| import { |
| authResponseSchema, |
| backupCodesSchema, |
| ForgotPasswordDto, |
| messageSchema, |
| RegisterDto, |
| ResetPasswordDto, |
| TwoFactorBackupDto, |
| TwoFactorDto, |
| UpdatePasswordDto, |
| userSchema, |
| UserWithSecrets, |
| } from "@reactive-resume/dto"; |
| import { ErrorMessage } from "@reactive-resume/utils"; |
| import type { Response } from "express"; |
|
|
| import { User } from "../user/decorators/user.decorator"; |
| import { AuthService } from "./auth.service"; |
| import { GitHubGuard } from "./guards/github.guard"; |
| import { GoogleGuard } from "./guards/google.guard"; |
| import { JwtGuard } from "./guards/jwt.guard"; |
| import { LocalGuard } from "./guards/local.guard"; |
| import { OpenIDGuard } from "./guards/openid.guard"; |
| import { RefreshGuard } from "./guards/refresh.guard"; |
| import { TwoFactorGuard } from "./guards/two-factor.guard"; |
| import { getCookieOptions } from "./utils/cookie"; |
| import { payloadSchema } from "./utils/payload"; |
|
|
| @ApiTags("Authentication") |
| @Controller("auth") |
| export class AuthController { |
| constructor( |
| private readonly authService: AuthService, |
| private readonly configService: ConfigService, |
| ) {} |
|
|
| private async exchangeToken(id: string, email: string, isTwoFactorAuth = false) { |
| try { |
| const payload = payloadSchema.parse({ id, isTwoFactorAuth }); |
|
|
| const accessToken = this.authService.generateToken("access", payload); |
| const refreshToken = this.authService.generateToken("refresh", payload); |
|
|
| |
| await this.authService.setRefreshToken(email, refreshToken); |
|
|
| return { accessToken, refreshToken }; |
| } catch (error) { |
| throw new InternalServerErrorException(error, ErrorMessage.SomethingWentWrong); |
| } |
| } |
|
|
| private async handleAuthenticationResponse( |
| user: UserWithSecrets, |
| response: Response, |
| isTwoFactorAuth = false, |
| redirect = false, |
| ) { |
| let status = "authenticated"; |
|
|
| const baseUrl = this.configService.get("PUBLIC_URL"); |
| const redirectUrl = new URL(`${baseUrl}/auth/callback`); |
|
|
| const { accessToken, refreshToken } = await this.exchangeToken( |
| user.id, |
| user.email, |
| isTwoFactorAuth, |
| ); |
|
|
| response.cookie("Authentication", accessToken, getCookieOptions("access")); |
| response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
| if (user.twoFactorEnabled && !isTwoFactorAuth) status = "2fa_required"; |
|
|
| const responseData = authResponseSchema.parse({ status, user }); |
|
|
| redirectUrl.searchParams.set("status", status); |
|
|
| if (redirect) response.redirect(redirectUrl.toString()); |
| else response.status(200).send(responseData); |
| } |
|
|
| @Post("register") |
| async register(@Body() registerDto: RegisterDto, @Res({ passthrough: true }) response: Response) { |
| const user = await this.authService.register(registerDto); |
|
|
| return this.handleAuthenticationResponse(user, response); |
| } |
|
|
| @Post("login") |
| @UseGuards(LocalGuard) |
| async login(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
| return this.handleAuthenticationResponse(user, response); |
| } |
|
|
| @Get("providers") |
| getAuthProviders() { |
| return this.authService.getAuthProviders(); |
| } |
|
|
| |
| @ApiTags("OAuth", "GitHub") |
| @Get("github") |
| @UseGuards(GitHubGuard) |
| githubLogin() { |
| return; |
| } |
|
|
| @ApiTags("OAuth", "GitHub") |
| @Get("github/callback") |
| @UseGuards(GitHubGuard) |
| async githubCallback( |
| @User() user: UserWithSecrets, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| return this.handleAuthenticationResponse(user, response, false, true); |
| } |
|
|
| @ApiTags("OAuth", "Google") |
| @Get("google") |
| @UseGuards(GoogleGuard) |
| googleLogin() { |
| return; |
| } |
|
|
| @ApiTags("OAuth", "Google") |
| @Get("google/callback") |
| @UseGuards(GoogleGuard) |
| async googleCallback( |
| @User() user: UserWithSecrets, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| return this.handleAuthenticationResponse(user, response, false, true); |
| } |
|
|
| @ApiTags("OAuth", "OpenID") |
| @Get("openid") |
| @UseGuards(OpenIDGuard) |
| openidLogin() { |
| return; |
| } |
|
|
| @ApiTags("OAuth", "OpenID") |
| @Get("openid/callback") |
| @UseGuards(OpenIDGuard) |
| async openidCallback( |
| @User() user: UserWithSecrets, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| return this.handleAuthenticationResponse(user, response, false, true); |
| } |
|
|
| @Post("refresh") |
| @UseGuards(RefreshGuard) |
| async refresh(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
| return this.handleAuthenticationResponse(user, response, true); |
| } |
|
|
| @Patch("password") |
| @UseGuards(TwoFactorGuard) |
| async updatePassword( |
| @User("email") email: string, |
| @Body() { currentPassword, newPassword }: UpdatePasswordDto, |
| ) { |
| await this.authService.updatePassword(email, currentPassword, newPassword); |
|
|
| return { message: "Your password has been successfully updated." }; |
| } |
|
|
| @Post("logout") |
| @UseGuards(TwoFactorGuard) |
| async logout(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
| await this.authService.setRefreshToken(user.email, null); |
|
|
| response.clearCookie("Authentication"); |
| response.clearCookie("Refresh"); |
|
|
| const data = messageSchema.parse({ message: "You have been logged out, tschüss!" }); |
| response.status(200).send(data); |
| } |
|
|
| |
| @ApiTags("Two-Factor Auth") |
| @Post("2fa/setup") |
| @UseGuards(JwtGuard) |
| async setup2FASecret(@User("email") email: string) { |
| return this.authService.setup2FASecret(email); |
| } |
|
|
| @ApiTags("Two-Factor Auth") |
| @HttpCode(200) |
| @Post("2fa/enable") |
| @UseGuards(JwtGuard) |
| async enable2FA( |
| @User("id") id: string, |
| @User("email") email: string, |
| @Body() { code }: TwoFactorDto, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| const { backupCodes } = await this.authService.enable2FA(email, code); |
|
|
| const { accessToken, refreshToken } = await this.exchangeToken(id, email, true); |
|
|
| response.cookie("Authentication", accessToken, getCookieOptions("access")); |
| response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
| const data = backupCodesSchema.parse({ backupCodes }); |
| response.status(200).send(data); |
| } |
|
|
| @ApiTags("Two-Factor Auth") |
| @HttpCode(200) |
| @Post("2fa/disable") |
| @UseGuards(TwoFactorGuard) |
| async disable2FA(@User("email") email: string) { |
| await this.authService.disable2FA(email); |
|
|
| return { message: "Two-factor authentication has been successfully disabled on your account." }; |
| } |
|
|
| @ApiTags("Two-Factor Auth") |
| @HttpCode(200) |
| @Post("2fa/verify") |
| @UseGuards(JwtGuard) |
| async verify2FACode( |
| @User() user: UserWithSecrets, |
| @Body() { code }: TwoFactorDto, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| await this.authService.verify2FACode(user.email, code); |
|
|
| const { accessToken, refreshToken } = await this.exchangeToken(user.id, user.email, true); |
|
|
| response.cookie("Authentication", accessToken, getCookieOptions("access")); |
| response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
| response.status(200).send(userSchema.parse(user)); |
| } |
|
|
| @ApiTags("Two-Factor Auth") |
| @HttpCode(200) |
| @Post("2fa/backup") |
| @UseGuards(JwtGuard) |
| async useBackup2FACode( |
| @User("id") id: string, |
| @User("email") email: string, |
| @Body() { code }: TwoFactorBackupDto, |
| @Res({ passthrough: true }) response: Response, |
| ) { |
| const user = await this.authService.useBackup2FACode(email, code); |
|
|
| return this.handleAuthenticationResponse(user, response, true); |
| } |
|
|
| |
| @ApiTags("Password Reset") |
| @HttpCode(200) |
| @Post("forgot-password") |
| async forgotPassword(@Body() { email }: ForgotPasswordDto) { |
| try { |
| await this.authService.forgotPassword(email); |
| } catch { |
| |
| } |
|
|
| return { |
| message: |
| "A password reset link should have been sent to your inbox, if an account existed with the email you provided.", |
| }; |
| } |
|
|
| @ApiTags("Password Reset") |
| @HttpCode(200) |
| @Post("reset-password") |
| async resetPassword(@Body() { token, password }: ResetPasswordDto) { |
| try { |
| await this.authService.resetPassword(token, password); |
|
|
| return { message: "Your password has been successfully reset." }; |
| } catch { |
| throw new BadRequestException(ErrorMessage.InvalidResetToken); |
| } |
| } |
|
|
| |
| @ApiTags("Email Verification") |
| @Post("verify-email") |
| @UseGuards(TwoFactorGuard) |
| async verifyEmail( |
| @User("id") id: string, |
| @User("emailVerified") emailVerified: boolean, |
| @Query("token") token: string, |
| ) { |
| if (!token) throw new BadRequestException(ErrorMessage.InvalidVerificationToken); |
|
|
| if (emailVerified) { |
| throw new BadRequestException(ErrorMessage.EmailAlreadyVerified); |
| } |
|
|
| await this.authService.verifyEmail(id, token); |
|
|
| return { message: "Your email has been successfully verified." }; |
| } |
|
|
| @ApiTags("Email Verification") |
| @Post("verify-email/resend") |
| @UseGuards(TwoFactorGuard) |
| async resendVerificationEmail( |
| @User("email") email: string, |
| @User("emailVerified") emailVerified: boolean, |
| ) { |
| if (emailVerified) { |
| throw new BadRequestException(ErrorMessage.EmailAlreadyVerified); |
| } |
|
|
| await this.authService.sendVerificationEmail(email); |
|
|
| return { |
| message: "You should have received a new email with a link to verify your email address.", |
| }; |
| } |
| } |
|
|