|
import { |
|
BadRequestException, |
|
Body, |
|
Controller, |
|
Get, |
|
HttpCode, |
|
InternalServerErrorException, |
|
Patch, |
|
Post, |
|
Query, |
|
Res, |
|
UseGuards, |
|
} from "@nestjs/common"; |
|
import { ConfigService } from "@nestjs/config"; |
|
import { ApiTags } from "@nestjs/swagger"; |
|
import { |
|
authResponseSchema, |
|
backupCodesSchema, |
|
ForgotPasswordDto, |
|
messageSchema, |
|
RegisterDto, |
|
ResetPasswordDto, |
|
TwoFactorBackupDto, |
|
TwoFactorDto, |
|
UpdatePasswordDto, |
|
userSchema, |
|
UserWithSecrets, |
|
} from "@reactive-resume/dto"; |
|
import { ErrorMessage } from "@reactive-resume/utils"; |
|
import type { Response } from "express"; |
|
|
|
import { User } from "../user/decorators/user.decorator"; |
|
import { AuthService } from "./auth.service"; |
|
import { GitHubGuard } from "./guards/github.guard"; |
|
import { GoogleGuard } from "./guards/google.guard"; |
|
import { JwtGuard } from "./guards/jwt.guard"; |
|
import { LocalGuard } from "./guards/local.guard"; |
|
import { OpenIDGuard } from "./guards/openid.guard"; |
|
import { RefreshGuard } from "./guards/refresh.guard"; |
|
import { TwoFactorGuard } from "./guards/two-factor.guard"; |
|
import { getCookieOptions } from "./utils/cookie"; |
|
import { payloadSchema } from "./utils/payload"; |
|
|
|
@ApiTags("Authentication") |
|
@Controller("auth") |
|
export class AuthController { |
|
constructor( |
|
private readonly authService: AuthService, |
|
private readonly configService: ConfigService, |
|
) {} |
|
|
|
private async exchangeToken(id: string, email: string, isTwoFactorAuth = false) { |
|
try { |
|
const payload = payloadSchema.parse({ id, isTwoFactorAuth }); |
|
|
|
const accessToken = this.authService.generateToken("access", payload); |
|
const refreshToken = this.authService.generateToken("refresh", payload); |
|
|
|
|
|
await this.authService.setRefreshToken(email, refreshToken); |
|
|
|
return { accessToken, refreshToken }; |
|
} catch (error) { |
|
throw new InternalServerErrorException(error, ErrorMessage.SomethingWentWrong); |
|
} |
|
} |
|
|
|
private async handleAuthenticationResponse( |
|
user: UserWithSecrets, |
|
response: Response, |
|
isTwoFactorAuth = false, |
|
redirect = false, |
|
) { |
|
let status = "authenticated"; |
|
|
|
const baseUrl = this.configService.get("PUBLIC_URL"); |
|
const redirectUrl = new URL(`${baseUrl}/auth/callback`); |
|
|
|
const { accessToken, refreshToken } = await this.exchangeToken( |
|
user.id, |
|
user.email, |
|
isTwoFactorAuth, |
|
); |
|
|
|
response.cookie("Authentication", accessToken, getCookieOptions("access")); |
|
response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
|
if (user.twoFactorEnabled && !isTwoFactorAuth) status = "2fa_required"; |
|
|
|
const responseData = authResponseSchema.parse({ status, user }); |
|
|
|
redirectUrl.searchParams.set("status", status); |
|
|
|
if (redirect) response.redirect(redirectUrl.toString()); |
|
else response.status(200).send(responseData); |
|
} |
|
|
|
@Post("register") |
|
async register(@Body() registerDto: RegisterDto, @Res({ passthrough: true }) response: Response) { |
|
const user = await this.authService.register(registerDto); |
|
|
|
return this.handleAuthenticationResponse(user, response); |
|
} |
|
|
|
@Post("login") |
|
@UseGuards(LocalGuard) |
|
async login(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
|
return this.handleAuthenticationResponse(user, response); |
|
} |
|
|
|
@Get("providers") |
|
getAuthProviders() { |
|
return this.authService.getAuthProviders(); |
|
} |
|
|
|
|
|
@ApiTags("OAuth", "GitHub") |
|
@Get("github") |
|
@UseGuards(GitHubGuard) |
|
githubLogin() { |
|
return; |
|
} |
|
|
|
@ApiTags("OAuth", "GitHub") |
|
@Get("github/callback") |
|
@UseGuards(GitHubGuard) |
|
async githubCallback( |
|
@User() user: UserWithSecrets, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
return this.handleAuthenticationResponse(user, response, false, true); |
|
} |
|
|
|
@ApiTags("OAuth", "Google") |
|
@Get("google") |
|
@UseGuards(GoogleGuard) |
|
googleLogin() { |
|
return; |
|
} |
|
|
|
@ApiTags("OAuth", "Google") |
|
@Get("google/callback") |
|
@UseGuards(GoogleGuard) |
|
async googleCallback( |
|
@User() user: UserWithSecrets, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
return this.handleAuthenticationResponse(user, response, false, true); |
|
} |
|
|
|
@ApiTags("OAuth", "OpenID") |
|
@Get("openid") |
|
@UseGuards(OpenIDGuard) |
|
openidLogin() { |
|
return; |
|
} |
|
|
|
@ApiTags("OAuth", "OpenID") |
|
@Get("openid/callback") |
|
@UseGuards(OpenIDGuard) |
|
async openidCallback( |
|
@User() user: UserWithSecrets, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
return this.handleAuthenticationResponse(user, response, false, true); |
|
} |
|
|
|
@Post("refresh") |
|
@UseGuards(RefreshGuard) |
|
async refresh(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
|
return this.handleAuthenticationResponse(user, response, true); |
|
} |
|
|
|
@Patch("password") |
|
@UseGuards(TwoFactorGuard) |
|
async updatePassword( |
|
@User("email") email: string, |
|
@Body() { currentPassword, newPassword }: UpdatePasswordDto, |
|
) { |
|
await this.authService.updatePassword(email, currentPassword, newPassword); |
|
|
|
return { message: "Your password has been successfully updated." }; |
|
} |
|
|
|
@Post("logout") |
|
@UseGuards(TwoFactorGuard) |
|
async logout(@User() user: UserWithSecrets, @Res({ passthrough: true }) response: Response) { |
|
await this.authService.setRefreshToken(user.email, null); |
|
|
|
response.clearCookie("Authentication"); |
|
response.clearCookie("Refresh"); |
|
|
|
const data = messageSchema.parse({ message: "You have been logged out, tschüss!" }); |
|
response.status(200).send(data); |
|
} |
|
|
|
|
|
@ApiTags("Two-Factor Auth") |
|
@Post("2fa/setup") |
|
@UseGuards(JwtGuard) |
|
async setup2FASecret(@User("email") email: string) { |
|
return this.authService.setup2FASecret(email); |
|
} |
|
|
|
@ApiTags("Two-Factor Auth") |
|
@HttpCode(200) |
|
@Post("2fa/enable") |
|
@UseGuards(JwtGuard) |
|
async enable2FA( |
|
@User("id") id: string, |
|
@User("email") email: string, |
|
@Body() { code }: TwoFactorDto, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
const { backupCodes } = await this.authService.enable2FA(email, code); |
|
|
|
const { accessToken, refreshToken } = await this.exchangeToken(id, email, true); |
|
|
|
response.cookie("Authentication", accessToken, getCookieOptions("access")); |
|
response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
|
const data = backupCodesSchema.parse({ backupCodes }); |
|
response.status(200).send(data); |
|
} |
|
|
|
@ApiTags("Two-Factor Auth") |
|
@HttpCode(200) |
|
@Post("2fa/disable") |
|
@UseGuards(TwoFactorGuard) |
|
async disable2FA(@User("email") email: string) { |
|
await this.authService.disable2FA(email); |
|
|
|
return { message: "Two-factor authentication has been successfully disabled on your account." }; |
|
} |
|
|
|
@ApiTags("Two-Factor Auth") |
|
@HttpCode(200) |
|
@Post("2fa/verify") |
|
@UseGuards(JwtGuard) |
|
async verify2FACode( |
|
@User() user: UserWithSecrets, |
|
@Body() { code }: TwoFactorDto, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
await this.authService.verify2FACode(user.email, code); |
|
|
|
const { accessToken, refreshToken } = await this.exchangeToken(user.id, user.email, true); |
|
|
|
response.cookie("Authentication", accessToken, getCookieOptions("access")); |
|
response.cookie("Refresh", refreshToken, getCookieOptions("refresh")); |
|
|
|
response.status(200).send(userSchema.parse(user)); |
|
} |
|
|
|
@ApiTags("Two-Factor Auth") |
|
@HttpCode(200) |
|
@Post("2fa/backup") |
|
@UseGuards(JwtGuard) |
|
async useBackup2FACode( |
|
@User("id") id: string, |
|
@User("email") email: string, |
|
@Body() { code }: TwoFactorBackupDto, |
|
@Res({ passthrough: true }) response: Response, |
|
) { |
|
const user = await this.authService.useBackup2FACode(email, code); |
|
|
|
return this.handleAuthenticationResponse(user, response, true); |
|
} |
|
|
|
|
|
@ApiTags("Password Reset") |
|
@HttpCode(200) |
|
@Post("forgot-password") |
|
async forgotPassword(@Body() { email }: ForgotPasswordDto) { |
|
try { |
|
await this.authService.forgotPassword(email); |
|
} catch { |
|
|
|
} |
|
|
|
return { |
|
message: |
|
"A password reset link should have been sent to your inbox, if an account existed with the email you provided.", |
|
}; |
|
} |
|
|
|
@ApiTags("Password Reset") |
|
@HttpCode(200) |
|
@Post("reset-password") |
|
async resetPassword(@Body() { token, password }: ResetPasswordDto) { |
|
try { |
|
await this.authService.resetPassword(token, password); |
|
|
|
return { message: "Your password has been successfully reset." }; |
|
} catch { |
|
throw new BadRequestException(ErrorMessage.InvalidResetToken); |
|
} |
|
} |
|
|
|
|
|
@ApiTags("Email Verification") |
|
@Post("verify-email") |
|
@UseGuards(TwoFactorGuard) |
|
async verifyEmail( |
|
@User("id") id: string, |
|
@User("emailVerified") emailVerified: boolean, |
|
@Query("token") token: string, |
|
) { |
|
if (!token) throw new BadRequestException(ErrorMessage.InvalidVerificationToken); |
|
|
|
if (emailVerified) { |
|
throw new BadRequestException(ErrorMessage.EmailAlreadyVerified); |
|
} |
|
|
|
await this.authService.verifyEmail(id, token); |
|
|
|
return { message: "Your email has been successfully verified." }; |
|
} |
|
|
|
@ApiTags("Email Verification") |
|
@Post("verify-email/resend") |
|
@UseGuards(TwoFactorGuard) |
|
async resendVerificationEmail( |
|
@User("email") email: string, |
|
@User("emailVerified") emailVerified: boolean, |
|
) { |
|
if (emailVerified) { |
|
throw new BadRequestException(ErrorMessage.EmailAlreadyVerified); |
|
} |
|
|
|
await this.authService.sendVerificationEmail(email); |
|
|
|
return { |
|
message: "You should have received a new email with a link to verify your email address.", |
|
}; |
|
} |
|
} |
|
|