| import { randomBytes } from "node:crypto"; |
|
|
| import { |
| BadRequestException, |
| ForbiddenException, |
| Injectable, |
| InternalServerErrorException, |
| Logger, |
| } from "@nestjs/common"; |
| import { ConfigService } from "@nestjs/config"; |
| import { JwtService } from "@nestjs/jwt"; |
| import { PrismaClientKnownRequestError } from "@prisma/client/runtime/library"; |
| import { AuthProvidersDto, LoginDto, RegisterDto, UserWithSecrets } from "@reactive-resume/dto"; |
| import { ErrorMessage } from "@reactive-resume/utils"; |
| import * as bcryptjs from "bcryptjs"; |
| import { authenticator } from "otplib"; |
|
|
| import { Config } from "../config/schema"; |
| import { MailService } from "../mail/mail.service"; |
| import { UserService } from "../user/user.service"; |
| import { Payload } from "./utils/payload"; |
|
|
| @Injectable() |
| export class AuthService { |
| constructor( |
| private readonly configService: ConfigService<Config>, |
| private readonly userService: UserService, |
| private readonly mailService: MailService, |
| private readonly jwtService: JwtService, |
| ) {} |
|
|
| private hash(password: string): Promise<string> { |
| return bcryptjs.hash(password, 10); |
| } |
|
|
| private compare(password: string, hash: string): Promise<boolean> { |
| return bcryptjs.compare(password, hash); |
| } |
|
|
| private async validatePassword(password: string, hashedPassword: string) { |
| const isValid = await this.compare(password, hashedPassword); |
|
|
| if (!isValid) { |
| throw new BadRequestException(ErrorMessage.InvalidCredentials); |
| } |
| } |
|
|
| generateToken(grantType: "access" | "refresh" | "reset" | "verification", payload?: Payload) { |
| switch (grantType) { |
| case "access": { |
| if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
| return this.jwtService.sign(payload, { |
| secret: this.configService.getOrThrow("ACCESS_TOKEN_SECRET"), |
| expiresIn: "15m", |
| }); |
| } |
|
|
| case "refresh": { |
| if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
| return this.jwtService.sign(payload, { |
| secret: this.configService.getOrThrow("REFRESH_TOKEN_SECRET"), |
| expiresIn: "2d", |
| }); |
| } |
|
|
| case "reset": |
| case "verification": { |
| return randomBytes(32).toString("base64url"); |
| } |
| } |
| } |
|
|
| async setLastSignedIn(email: string) { |
| await this.userService.updateByEmail(email, { |
| secrets: { update: { lastSignedIn: new Date() } }, |
| }); |
| } |
|
|
| async setRefreshToken(email: string, token: string | null) { |
| await this.userService.updateByEmail(email, { |
| secrets: { |
| update: { |
| refreshToken: token, |
| lastSignedIn: token ? new Date() : undefined, |
| }, |
| }, |
| }); |
| } |
|
|
| async validateRefreshToken(payload: Payload, token: string) { |
| const user = await this.userService.findOneById(payload.id); |
| const storedRefreshToken = user.secrets?.refreshToken; |
|
|
| if (!storedRefreshToken || storedRefreshToken !== token) throw new ForbiddenException(); |
|
|
| if (!user.twoFactorEnabled) return user; |
|
|
| if (payload.isTwoFactorAuth) return user; |
| } |
|
|
| async register(registerDto: RegisterDto): Promise<UserWithSecrets> { |
| const hashedPassword = await this.hash(registerDto.password); |
|
|
| try { |
| const user = await this.userService.create({ |
| name: registerDto.name, |
| email: registerDto.email, |
| username: registerDto.username, |
| locale: registerDto.locale, |
| provider: "email", |
| emailVerified: false, |
| secrets: { create: { password: hashedPassword } }, |
| }); |
|
|
| |
| void this.sendVerificationEmail(user.email); |
|
|
| return user; |
| } catch (error) { |
| if (error instanceof PrismaClientKnownRequestError && error.code === "P2002") { |
| throw new BadRequestException(ErrorMessage.UserAlreadyExists); |
| } |
|
|
| Logger.error(error); |
| throw new InternalServerErrorException(error); |
| } |
| } |
|
|
| async authenticate({ identifier, password }: LoginDto) { |
| try { |
| const user = await this.userService.findOneByIdentifierOrThrow(identifier); |
|
|
| if (!user.secrets?.password) { |
| throw new BadRequestException(ErrorMessage.OAuthUser); |
| } |
|
|
| await this.validatePassword(password, user.secrets.password); |
| await this.setLastSignedIn(user.email); |
|
|
| return user; |
| } catch { |
| throw new BadRequestException(ErrorMessage.InvalidCredentials); |
| } |
| } |
|
|
| |
| async forgotPassword(email: string) { |
| const token = this.generateToken("reset"); |
|
|
| await this.userService.updateByEmail(email, { |
| secrets: { update: { resetToken: token } }, |
| }); |
|
|
| const baseUrl = this.configService.get("PUBLIC_URL"); |
| const url = `${baseUrl}/auth/reset-password?token=${token}`; |
| const subject = "Reset your Reactive Resume password"; |
| const text = `Please click on the link below to reset your password:\n\n${url}`; |
|
|
| await this.mailService.sendEmail({ to: email, subject, text }); |
| } |
|
|
| async updatePassword(email: string, currentPassword: string, newPassword: string) { |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| if (!user.secrets?.password) { |
| throw new BadRequestException(ErrorMessage.OAuthUser); |
| } |
|
|
| await this.validatePassword(currentPassword, user.secrets.password); |
|
|
| const newHashedPassword = await this.hash(newPassword); |
|
|
| await this.userService.updateByEmail(email, { |
| secrets: { update: { password: newHashedPassword } }, |
| }); |
| } |
|
|
| async resetPassword(token: string, password: string) { |
| const hashedPassword = await this.hash(password); |
|
|
| await this.userService.updateByResetToken(token, { |
| resetToken: null, |
| password: hashedPassword, |
| }); |
| } |
|
|
| getAuthProviders() { |
| const providers: AuthProvidersDto = []; |
|
|
| if (!this.configService.get("DISABLE_EMAIL_AUTH")) { |
| providers.push("email"); |
| } |
|
|
| if ( |
| this.configService.get("GITHUB_CLIENT_ID") && |
| this.configService.get("GITHUB_CLIENT_SECRET") && |
| this.configService.get("GITHUB_CALLBACK_URL") |
| ) { |
| providers.push("github"); |
| } |
|
|
| if ( |
| this.configService.get("GOOGLE_CLIENT_ID") && |
| this.configService.get("GOOGLE_CLIENT_SECRET") && |
| this.configService.get("GOOGLE_CALLBACK_URL") |
| ) { |
| providers.push("google"); |
| } |
|
|
| if ( |
| this.configService.get("OPENID_AUTHORIZATION_URL") && |
| this.configService.get("OPENID_CALLBACK_URL") && |
| this.configService.get("OPENID_CLIENT_ID") && |
| this.configService.get("OPENID_CLIENT_SECRET") && |
| this.configService.get("OPENID_ISSUER") && |
| this.configService.get("OPENID_SCOPE") && |
| this.configService.get("OPENID_TOKEN_URL") && |
| this.configService.get("OPENID_USER_INFO_URL") |
| ) { |
| providers.push("openid"); |
| } |
|
|
| return providers; |
| } |
|
|
| |
| async sendVerificationEmail(email: string) { |
| try { |
| const token = this.generateToken("verification"); |
|
|
| |
| await this.userService.updateByEmail(email, { |
| secrets: { update: { verificationToken: token } }, |
| }); |
|
|
| const baseUrl = this.configService.get("PUBLIC_URL"); |
| const url = `${baseUrl}/auth/verify-email?token=${token}`; |
| const subject = "Verify your email address"; |
| const text = `Please verify your email address by clicking on the link below:\n\n${url}`; |
|
|
| await this.mailService.sendEmail({ to: email, subject, text }); |
| } catch (error) { |
| Logger.error(error); |
| throw new InternalServerErrorException(error); |
| } |
| } |
|
|
| async verifyEmail(id: string, token: string) { |
| const user = await this.userService.findOneById(id); |
|
|
| const storedToken = user.secrets?.verificationToken; |
|
|
| if (!storedToken || storedToken !== token) { |
| throw new BadRequestException(ErrorMessage.InvalidVerificationToken); |
| } |
|
|
| await this.userService.updateByEmail(user.email, { |
| emailVerified: true, |
| secrets: { update: { verificationToken: null } }, |
| }); |
| } |
|
|
| |
| async setup2FASecret(email: string) { |
| |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| if (user.twoFactorEnabled) { |
| throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
| } |
|
|
| const secret = authenticator.generateSecret(); |
| const uri = authenticator.keyuri(email, "Reactive Resume", secret); |
|
|
| await this.userService.updateByEmail(email, { |
| secrets: { update: { twoFactorSecret: secret } }, |
| }); |
|
|
| return { message: uri }; |
| } |
|
|
| async enable2FA(email: string, code: string) { |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| |
| if (user.twoFactorEnabled) { |
| throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
| } |
|
|
| |
| if (!user.secrets?.twoFactorSecret) { |
| throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| } |
|
|
| const verified = authenticator.verify({ |
| secret: user.secrets.twoFactorSecret, |
| token: code, |
| }); |
|
|
| if (!verified) { |
| throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
| } |
|
|
| |
| const backupCodes = Array.from({ length: 8 }, () => randomBytes(5).toString("hex")); |
|
|
| await this.userService.updateByEmail(email, { |
| twoFactorEnabled: true, |
| secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
| }); |
|
|
| return { backupCodes }; |
| } |
|
|
| async disable2FA(email: string) { |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| |
| if (!user.twoFactorEnabled) { |
| throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| } |
|
|
| await this.userService.updateByEmail(email, { |
| twoFactorEnabled: false, |
| secrets: { update: { twoFactorSecret: null, twoFactorBackupCodes: [] } }, |
| }); |
| } |
|
|
| async verify2FACode(email: string, code: string) { |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| |
| if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
| throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| } |
|
|
| const verified = authenticator.verify({ |
| secret: user.secrets.twoFactorSecret, |
| token: code, |
| }); |
|
|
| if (!verified) { |
| throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
| } |
|
|
| return user; |
| } |
|
|
| async useBackup2FACode(email: string, code: string): Promise<UserWithSecrets> { |
| const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
| |
| if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
| throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| } |
|
|
| const verified = user.secrets.twoFactorBackupCodes.includes(code); |
|
|
| if (!verified) { |
| throw new BadRequestException(ErrorMessage.InvalidTwoFactorBackupCode); |
| } |
|
|
| |
| const backupCodes = user.secrets.twoFactorBackupCodes.filter((c) => c !== code); |
| await this.userService.updateByEmail(email, { |
| secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
| }); |
|
|
| return user; |
| } |
| } |
|
|