|
import { randomBytes } from "node:crypto"; |
|
|
|
import { |
|
BadRequestException, |
|
ForbiddenException, |
|
Injectable, |
|
InternalServerErrorException, |
|
Logger, |
|
} from "@nestjs/common"; |
|
import { ConfigService } from "@nestjs/config"; |
|
import { JwtService } from "@nestjs/jwt"; |
|
import { PrismaClientKnownRequestError } from "@prisma/client/runtime/library"; |
|
import { AuthProvidersDto, LoginDto, RegisterDto, UserWithSecrets } from "@reactive-resume/dto"; |
|
import { ErrorMessage } from "@reactive-resume/utils"; |
|
import * as bcryptjs from "bcryptjs"; |
|
import { authenticator } from "otplib"; |
|
|
|
import { Config } from "../config/schema"; |
|
import { MailService } from "../mail/mail.service"; |
|
import { UserService } from "../user/user.service"; |
|
import { Payload } from "./utils/payload"; |
|
|
|
@Injectable() |
|
export class AuthService { |
|
constructor( |
|
private readonly configService: ConfigService<Config>, |
|
private readonly userService: UserService, |
|
private readonly mailService: MailService, |
|
private readonly jwtService: JwtService, |
|
) {} |
|
|
|
private hash(password: string): Promise<string> { |
|
return bcryptjs.hash(password, 10); |
|
} |
|
|
|
private compare(password: string, hash: string): Promise<boolean> { |
|
return bcryptjs.compare(password, hash); |
|
} |
|
|
|
private async validatePassword(password: string, hashedPassword: string) { |
|
const isValid = await this.compare(password, hashedPassword); |
|
|
|
if (!isValid) { |
|
throw new BadRequestException(ErrorMessage.InvalidCredentials); |
|
} |
|
} |
|
|
|
generateToken(grantType: "access" | "refresh" | "reset" | "verification", payload?: Payload) { |
|
switch (grantType) { |
|
case "access": { |
|
if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
|
return this.jwtService.sign(payload, { |
|
secret: this.configService.getOrThrow("ACCESS_TOKEN_SECRET"), |
|
expiresIn: "15m", |
|
}); |
|
} |
|
|
|
case "refresh": { |
|
if (!payload) throw new InternalServerErrorException("InvalidTokenPayload"); |
|
return this.jwtService.sign(payload, { |
|
secret: this.configService.getOrThrow("REFRESH_TOKEN_SECRET"), |
|
expiresIn: "2d", |
|
}); |
|
} |
|
|
|
case "reset": |
|
case "verification": { |
|
return randomBytes(32).toString("base64url"); |
|
} |
|
} |
|
} |
|
|
|
async setLastSignedIn(email: string) { |
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { lastSignedIn: new Date() } }, |
|
}); |
|
} |
|
|
|
async setRefreshToken(email: string, token: string | null) { |
|
await this.userService.updateByEmail(email, { |
|
secrets: { |
|
update: { |
|
refreshToken: token, |
|
lastSignedIn: token ? new Date() : undefined, |
|
}, |
|
}, |
|
}); |
|
} |
|
|
|
async validateRefreshToken(payload: Payload, token: string) { |
|
const user = await this.userService.findOneById(payload.id); |
|
const storedRefreshToken = user.secrets?.refreshToken; |
|
|
|
if (!storedRefreshToken || storedRefreshToken !== token) throw new ForbiddenException(); |
|
|
|
if (!user.twoFactorEnabled) return user; |
|
|
|
if (payload.isTwoFactorAuth) return user; |
|
} |
|
|
|
async register(registerDto: RegisterDto): Promise<UserWithSecrets> { |
|
const hashedPassword = await this.hash(registerDto.password); |
|
|
|
try { |
|
const user = await this.userService.create({ |
|
name: registerDto.name, |
|
email: registerDto.email, |
|
username: registerDto.username, |
|
locale: registerDto.locale, |
|
provider: "email", |
|
emailVerified: false, |
|
secrets: { create: { password: hashedPassword } }, |
|
}); |
|
|
|
|
|
void this.sendVerificationEmail(user.email); |
|
|
|
return user; |
|
} catch (error) { |
|
if (error instanceof PrismaClientKnownRequestError && error.code === "P2002") { |
|
throw new BadRequestException(ErrorMessage.UserAlreadyExists); |
|
} |
|
|
|
Logger.error(error); |
|
throw new InternalServerErrorException(error); |
|
} |
|
} |
|
|
|
async authenticate({ identifier, password }: LoginDto) { |
|
try { |
|
const user = await this.userService.findOneByIdentifierOrThrow(identifier); |
|
|
|
if (!user.secrets?.password) { |
|
throw new BadRequestException(ErrorMessage.OAuthUser); |
|
} |
|
|
|
await this.validatePassword(password, user.secrets.password); |
|
await this.setLastSignedIn(user.email); |
|
|
|
return user; |
|
} catch { |
|
throw new BadRequestException(ErrorMessage.InvalidCredentials); |
|
} |
|
} |
|
|
|
|
|
async forgotPassword(email: string) { |
|
const token = this.generateToken("reset"); |
|
|
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { resetToken: token } }, |
|
}); |
|
|
|
const baseUrl = this.configService.get("PUBLIC_URL"); |
|
const url = `${baseUrl}/auth/reset-password?token=${token}`; |
|
const subject = "Reset your Reactive Resume password"; |
|
const text = `Please click on the link below to reset your password:\n\n${url}`; |
|
|
|
await this.mailService.sendEmail({ to: email, subject, text }); |
|
} |
|
|
|
async updatePassword(email: string, currentPassword: string, newPassword: string) { |
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
if (!user.secrets?.password) { |
|
throw new BadRequestException(ErrorMessage.OAuthUser); |
|
} |
|
|
|
await this.validatePassword(currentPassword, user.secrets.password); |
|
|
|
const newHashedPassword = await this.hash(newPassword); |
|
|
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { password: newHashedPassword } }, |
|
}); |
|
} |
|
|
|
async resetPassword(token: string, password: string) { |
|
const hashedPassword = await this.hash(password); |
|
|
|
await this.userService.updateByResetToken(token, { |
|
resetToken: null, |
|
password: hashedPassword, |
|
}); |
|
} |
|
|
|
getAuthProviders() { |
|
const providers: AuthProvidersDto = []; |
|
|
|
if (!this.configService.get("DISABLE_EMAIL_AUTH")) { |
|
providers.push("email"); |
|
} |
|
|
|
if ( |
|
this.configService.get("GITHUB_CLIENT_ID") && |
|
this.configService.get("GITHUB_CLIENT_SECRET") && |
|
this.configService.get("GITHUB_CALLBACK_URL") |
|
) { |
|
providers.push("github"); |
|
} |
|
|
|
if ( |
|
this.configService.get("GOOGLE_CLIENT_ID") && |
|
this.configService.get("GOOGLE_CLIENT_SECRET") && |
|
this.configService.get("GOOGLE_CALLBACK_URL") |
|
) { |
|
providers.push("google"); |
|
} |
|
|
|
if ( |
|
this.configService.get("OPENID_AUTHORIZATION_URL") && |
|
this.configService.get("OPENID_CALLBACK_URL") && |
|
this.configService.get("OPENID_CLIENT_ID") && |
|
this.configService.get("OPENID_CLIENT_SECRET") && |
|
this.configService.get("OPENID_ISSUER") && |
|
this.configService.get("OPENID_SCOPE") && |
|
this.configService.get("OPENID_TOKEN_URL") && |
|
this.configService.get("OPENID_USER_INFO_URL") |
|
) { |
|
providers.push("openid"); |
|
} |
|
|
|
return providers; |
|
} |
|
|
|
|
|
async sendVerificationEmail(email: string) { |
|
try { |
|
const token = this.generateToken("verification"); |
|
|
|
|
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { verificationToken: token } }, |
|
}); |
|
|
|
const baseUrl = this.configService.get("PUBLIC_URL"); |
|
const url = `${baseUrl}/auth/verify-email?token=${token}`; |
|
const subject = "Verify your email address"; |
|
const text = `Please verify your email address by clicking on the link below:\n\n${url}`; |
|
|
|
await this.mailService.sendEmail({ to: email, subject, text }); |
|
} catch (error) { |
|
Logger.error(error); |
|
throw new InternalServerErrorException(error); |
|
} |
|
} |
|
|
|
async verifyEmail(id: string, token: string) { |
|
const user = await this.userService.findOneById(id); |
|
|
|
const storedToken = user.secrets?.verificationToken; |
|
|
|
if (!storedToken || storedToken !== token) { |
|
throw new BadRequestException(ErrorMessage.InvalidVerificationToken); |
|
} |
|
|
|
await this.userService.updateByEmail(user.email, { |
|
emailVerified: true, |
|
secrets: { update: { verificationToken: null } }, |
|
}); |
|
} |
|
|
|
|
|
async setup2FASecret(email: string) { |
|
|
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
if (user.twoFactorEnabled) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
|
} |
|
|
|
const secret = authenticator.generateSecret(); |
|
const uri = authenticator.keyuri(email, "Reactive Resume", secret); |
|
|
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { twoFactorSecret: secret } }, |
|
}); |
|
|
|
return { message: uri }; |
|
} |
|
|
|
async enable2FA(email: string, code: string) { |
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
|
|
if (user.twoFactorEnabled) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorAlreadyEnabled); |
|
} |
|
|
|
|
|
if (!user.secrets?.twoFactorSecret) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
|
} |
|
|
|
const verified = authenticator.verify({ |
|
secret: user.secrets.twoFactorSecret, |
|
token: code, |
|
}); |
|
|
|
if (!verified) { |
|
throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
|
} |
|
|
|
|
|
const backupCodes = Array.from({ length: 8 }, () => randomBytes(5).toString("hex")); |
|
|
|
await this.userService.updateByEmail(email, { |
|
twoFactorEnabled: true, |
|
secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
|
}); |
|
|
|
return { backupCodes }; |
|
} |
|
|
|
async disable2FA(email: string) { |
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
|
|
if (!user.twoFactorEnabled) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
|
} |
|
|
|
await this.userService.updateByEmail(email, { |
|
twoFactorEnabled: false, |
|
secrets: { update: { twoFactorSecret: null, twoFactorBackupCodes: [] } }, |
|
}); |
|
} |
|
|
|
async verify2FACode(email: string, code: string) { |
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
|
|
if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
|
} |
|
|
|
const verified = authenticator.verify({ |
|
secret: user.secrets.twoFactorSecret, |
|
token: code, |
|
}); |
|
|
|
if (!verified) { |
|
throw new BadRequestException(ErrorMessage.InvalidTwoFactorCode); |
|
} |
|
|
|
return user; |
|
} |
|
|
|
async useBackup2FACode(email: string, code: string): Promise<UserWithSecrets> { |
|
const user = await this.userService.findOneByIdentifierOrThrow(email); |
|
|
|
|
|
if (!user.twoFactorEnabled || !user.secrets?.twoFactorSecret) { |
|
throw new BadRequestException(ErrorMessage.TwoFactorNotEnabled); |
|
} |
|
|
|
const verified = user.secrets.twoFactorBackupCodes.includes(code); |
|
|
|
if (!verified) { |
|
throw new BadRequestException(ErrorMessage.InvalidTwoFactorBackupCode); |
|
} |
|
|
|
|
|
const backupCodes = user.secrets.twoFactorBackupCodes.filter((c) => c !== code); |
|
await this.userService.updateByEmail(email, { |
|
secrets: { update: { twoFactorBackupCodes: backupCodes } }, |
|
}); |
|
|
|
return user; |
|
} |
|
} |
|
|