| | import { randomBytes } from "node:crypto"; |
| |
|
| | import { |
| | BadRequestException, |
| | ForbiddenException, |
| | Injectable, |
| | InternalServerErrorException, |
| | Logger, |
| | } from "@nestjs/common"; |
| | import { ConfigService } from "@nestjs/config"; |
| | import { JwtService } from "@nestjs/jwt"; |
| | import { PrismaClientKnownRequestError } from "@prisma/client/runtime/library"; |
| | import { AuthProvidersDto, LoginDto, RegisterDto, UserWithSecrets } from "@reactive-resume/dto"; |
| | import { ErrorMessage } from "@reactive-resume/utils"; |
| | import * as bcryptjs from "bcryptjs"; |
| | import { authenticator } from "otplib"; |
| |
|
| | import { Config } from "../config/schema"; |
| | import { MailService } from "../mail/mail.service"; |
| | import { UserService } from "../user/user.service"; |
| | import { Payload } from "./utils/payload"; |
| |
|
| | @Injectable() |
| | export class AuthService { |
| | constructor( |
| | private readonly configService: ConfigService<Config>, |
| | private readonly userService: UserService, |
| | private readonly mailService: MailService, |
| | private readonly jwtService: JwtService, |
| | ) {} |
| |
|
| | private hash(password: string): Promise<string> { |
| | return bcryptjs.hash(password, 10); |
| | } |
| |
|
| | private compare(password: string, hash: string): Promise<boolean> { |
| | return bcryptjs.compare(password, hash); |
| | } |
| |
|
| | private async validatePassword(password: string, hashedPassword: string) { |
| | const isValid = await this.compare(password, hashedPassword); |
| |
|
| | if (!isValid) { |
| | throw new BadRequestException(ErrorMessage.InvalidCredentials); |
| | } |
| | } |
| |
|
| | generateToken(grantType: "access" | "refresh" | "reset" | "verification", payload?: Payload) { |
| | switch (grantType) { |
| | case "access": { |
| | if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
| | return this.jwtService.sign(payload, { |
| | secret: this.configService.getOrThrow("ACCESS_TOKEN_SECRET"), |
| | expiresIn: "15m", |
| | }); |
| | } |
| |
|
| | case "refresh": { |
| | if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
| | return this.jwtService.sign(payload, { |
| | secret: this.configService.getOrThrow("REFRESH_TOKEN_SECRET"), |
| | expiresIn: "2d", |
| | }); |
| | } |
| |
|
| | case "reset": |
| | case "verification": { |
| | return randomBytes(32).toString("base64url"); |
| | } |
| | } |
| | } |
| |
|
| | async setLastSignedIn(email: string) { |
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { lastSignedIn: new Date() } }, |
| | }); |
| | } |
| |
|
| | async setRefreshToken(email: string, token: string | null) { |
| | await this.userService.updateByEmail(email, { |
| | secrets: { |
| | update: { |
| | refreshToken: token, |
| | lastSignedIn: token ? new Date() : undefined, |
| | }, |
| | }, |
| | }); |
| | } |
| |
|
| | async validateRefreshToken(payload: Payload, token: string) { |
| | const user = await this.userService.findOneById(payload.id); |
| | const storedRefreshToken = user.secrets?.refreshToken; |
| |
|
| | if (!storedRefreshToken || storedRefreshToken !== token) throw new ForbiddenException(); |
| |
|
| | if (!user.twoFactorEnabled) return user; |
| |
|
| | if (payload.isTwoFactorAuth) return user; |
| | } |
| |
|
| | async register(registerDto: RegisterDto): Promise<UserWithSecrets> { |
| | const hashedPassword = await this.hash(registerDto.password); |
| |
|
| | try { |
| | const user = await this.userService.create({ |
| | name: registerDto.name, |
| | email: registerDto.email, |
| | username: registerDto.username, |
| | locale: registerDto.locale, |
| | provider: "email", |
| | emailVerified: false, |
| | secrets: { create: { password: hashedPassword } }, |
| | }); |
| |
|
| | |
| | void this.sendVerificationEmail(user.email); |
| |
|
| | return user; |
| | } catch (error) { |
| | if (error instanceof PrismaClientKnownRequestError && error.code === "P2002") { |
| | throw new BadRequestException(ErrorMessage.UserAlreadyExists); |
| | } |
| |
|
| | Logger.error(error); |
| | throw new InternalServerErrorException(error); |
| | } |
| | } |
| |
|
| | async authenticate({ identifier, password }: LoginDto) { |
| | try { |
| | const user = await this.userService.findOneByIdentifierOrThrow(identifier); |
| |
|
| | if (!user.secrets?.password) { |
| | throw new BadRequestException(ErrorMessage.OAuthUser); |
| | } |
| |
|
| | await this.validatePassword(password, user.secrets.password); |
| | await this.setLastSignedIn(user.email); |
| |
|
| | return user; |
| | } catch { |
| | throw new BadRequestException(ErrorMessage.InvalidCredentials); |
| | } |
| | } |
| |
|
| | |
| | async forgotPassword(email: string) { |
| | const token = this.generateToken("reset"); |
| |
|
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { resetToken: token } }, |
| | }); |
| |
|
| | const baseUrl = this.configService.get("PUBLIC_URL"); |
| | const url = `${baseUrl}/auth/reset-password?token=${token}`; |
| | const subject = "Reset your Reactive Resume password"; |
| | const text = `Please click on the link below to reset your password:\n\n${url}`; |
| |
|
| | await this.mailService.sendEmail({ to: email, subject, text }); |
| | } |
| |
|
| | async updatePassword(email: string, currentPassword: string, newPassword: string) { |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | if (!user.secrets?.password) { |
| | throw new BadRequestException(ErrorMessage.OAuthUser); |
| | } |
| |
|
| | await this.validatePassword(currentPassword, user.secrets.password); |
| |
|
| | const newHashedPassword = await this.hash(newPassword); |
| |
|
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { password: newHashedPassword } }, |
| | }); |
| | } |
| |
|
| | async resetPassword(token: string, password: string) { |
| | const hashedPassword = await this.hash(password); |
| |
|
| | await this.userService.updateByResetToken(token, { |
| | resetToken: null, |
| | password: hashedPassword, |
| | }); |
| | } |
| |
|
| | getAuthProviders() { |
| | const providers: AuthProvidersDto = []; |
| |
|
| | if (!this.configService.get("DISABLE_EMAIL_AUTH")) { |
| | providers.push("email"); |
| | } |
| |
|
| | if ( |
| | this.configService.get("GITHUB_CLIENT_ID") && |
| | this.configService.get("GITHUB_CLIENT_SECRET") && |
| | this.configService.get("GITHUB_CALLBACK_URL") |
| | ) { |
| | providers.push("github"); |
| | } |
| |
|
| | if ( |
| | this.configService.get("GOOGLE_CLIENT_ID") && |
| | this.configService.get("GOOGLE_CLIENT_SECRET") && |
| | this.configService.get("GOOGLE_CALLBACK_URL") |
| | ) { |
| | providers.push("google"); |
| | } |
| |
|
| | if ( |
| | this.configService.get("OPENID_AUTHORIZATION_URL") && |
| | this.configService.get("OPENID_CALLBACK_URL") && |
| | this.configService.get("OPENID_CLIENT_ID") && |
| | this.configService.get("OPENID_CLIENT_SECRET") && |
| | this.configService.get("OPENID_ISSUER") && |
| | this.configService.get("OPENID_SCOPE") && |
| | this.configService.get("OPENID_TOKEN_URL") && |
| | this.configService.get("OPENID_USER_INFO_URL") |
| | ) { |
| | providers.push("openid"); |
| | } |
| |
|
| | return providers; |
| | } |
| |
|
| | |
| | async sendVerificationEmail(email: string) { |
| | try { |
| | const token = this.generateToken("verification"); |
| |
|
| | |
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { verificationToken: token } }, |
| | }); |
| |
|
| | const baseUrl = this.configService.get("PUBLIC_URL"); |
| | const url = `${baseUrl}/auth/verify-email?token=${token}`; |
| | const subject = "Verify your email address"; |
| | const text = `Please verify your email address by clicking on the link below:\n\n${url}`; |
| |
|
| | await this.mailService.sendEmail({ to: email, subject, text }); |
| | } catch (error) { |
| | Logger.error(error); |
| | throw new InternalServerErrorException(error); |
| | } |
| | } |
| |
|
| | async verifyEmail(id: string, token: string) { |
| | const user = await this.userService.findOneById(id); |
| |
|
| | const storedToken = user.secrets?.verificationToken; |
| |
|
| | if (!storedToken || storedToken !== token) { |
| | throw new BadRequestException(ErrorMessage.InvalidVerificationToken); |
| | } |
| |
|
| | await this.userService.updateByEmail(user.email, { |
| | emailVerified: true, |
| | secrets: { update: { verificationToken: null } }, |
| | }); |
| | } |
| |
|
| | |
| | async setup2FASecret(email: string) { |
| | |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | if (user.twoFactorEnabled) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
| | } |
| |
|
| | const secret = authenticator.generateSecret(); |
| | const uri = authenticator.keyuri(email, "Reactive Resume", secret); |
| |
|
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { twoFactorSecret: secret } }, |
| | }); |
| |
|
| | return { message: uri }; |
| | } |
| |
|
| | async enable2FA(email: string, code: string) { |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | |
| | if (user.twoFactorEnabled) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
| | } |
| |
|
| | |
| | if (!user.secrets?.twoFactorSecret) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| | } |
| |
|
| | const verified = authenticator.verify({ |
| | secret: user.secrets.twoFactorSecret, |
| | token: code, |
| | }); |
| |
|
| | if (!verified) { |
| | throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
| | } |
| |
|
| | |
| | const backupCodes = Array.from({ length: 8 }, () => randomBytes(5).toString("hex")); |
| |
|
| | await this.userService.updateByEmail(email, { |
| | twoFactorEnabled: true, |
| | secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
| | }); |
| |
|
| | return { backupCodes }; |
| | } |
| |
|
| | async disable2FA(email: string) { |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | |
| | if (!user.twoFactorEnabled) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| | } |
| |
|
| | await this.userService.updateByEmail(email, { |
| | twoFactorEnabled: false, |
| | secrets: { update: { twoFactorSecret: null, twoFactorBackupCodes: [] } }, |
| | }); |
| | } |
| |
|
| | async verify2FACode(email: string, code: string) { |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | |
| | if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| | } |
| |
|
| | const verified = authenticator.verify({ |
| | secret: user.secrets.twoFactorSecret, |
| | token: code, |
| | }); |
| |
|
| | if (!verified) { |
| | throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
| | } |
| |
|
| | return user; |
| | } |
| |
|
| | async useBackup2FACode(email: string, code: string): Promise<UserWithSecrets> { |
| | const user = await this.userService.findOneByIdentifierOrThrow(email); |
| |
|
| | |
| | if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
| | throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
| | } |
| |
|
| | const verified = user.secrets.twoFactorBackupCodes.includes(code); |
| |
|
| | if (!verified) { |
| | throw new BadRequestException(ErrorMessage.InvalidTwoFactorBackupCode); |
| | } |
| |
|
| | |
| | const backupCodes = user.secrets.twoFactorBackupCodes.filter((c) => c !== code); |
| | await this.userService.updateByEmail(email, { |
| | secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
| | }); |
| |
|
| | return user; |
| | } |
| | } |
| |
|