Compare commits
21 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
ecb9a95397
|
|||
|
447e5768a4
|
|||
|
95ed9bf158
|
|||
|
9dc3520989
|
|||
|
62c50964fa
|
|||
|
392414354b
|
|||
|
224eeae092
|
|||
|
64c4345c28
|
|||
|
6921bea5b5
|
|||
|
ebe086e70f
|
|||
|
af943c1e84
|
|||
|
50af0b3065
|
|||
|
50e691cf05
|
|||
|
e706ef1924
|
|||
|
0ad99d3f0a
|
|||
|
bb7b15351d
|
|||
|
bc73ab271b
|
|||
|
b1b1f3e0b9
|
|||
|
30c86accf6
|
|||
|
0882e8754e
|
|||
|
73ac3d2dc6
|
45
.drone.yml
45
.drone.yml
@@ -91,6 +91,7 @@ steps:
|
||||
commands:
|
||||
- yarn set version stable
|
||||
- yarn install
|
||||
- yarn build:package
|
||||
volumes:
|
||||
- name: yarnrc
|
||||
path: /drone/auth/.yarnrc.yml
|
||||
@@ -124,6 +125,11 @@ steps:
|
||||
auto_tag: true
|
||||
repo: git.mifi.dev/mifi/auth-service
|
||||
registry: git.mifi.dev
|
||||
build_args:
|
||||
- MONGO_ENTRY_FILE=latest
|
||||
- MONGO_VERSION=latest
|
||||
- NPM_TOKEN:
|
||||
from_secret: reg_token
|
||||
ssh-agent-key:
|
||||
from_secret: reg_token
|
||||
username: <token>
|
||||
@@ -203,7 +209,7 @@ steps:
|
||||
template: |
|
||||
{
|
||||
"icon_url":"https://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/120/apple/198/freezing-face_1f976.png",
|
||||
"text": "[{{ repo.name }} - Build # {{ build.number }}] Deploy {{ build.status }} {{#success build.status}}:tada:{{else}}:poop:{{/success}}",
|
||||
"text": "[{{ repo.name }} - Build # {{ build.number }}] Staging Deploy {{ build.status }} {{#success build.status}}:tada:{{else}}:poop:{{/success}}",
|
||||
"username":"DroneBot"
|
||||
}
|
||||
when:
|
||||
@@ -244,25 +250,9 @@ clone:
|
||||
|
||||
steps:
|
||||
- name: Deploy Container
|
||||
image: docker
|
||||
privileged: true
|
||||
environment:
|
||||
CONTAINER_PREFIX: staging
|
||||
HOST: area51.mifi.dev
|
||||
ROUTE_PREFIX: /auth
|
||||
PORT: 9001
|
||||
commands:
|
||||
- docker compose -f docker-compose.production-build.yml pull
|
||||
- docker compose -f docker-compose.production-build.yml build --no-cache
|
||||
- docker compose -f docker-compose.production-build.yml rm --stop
|
||||
- docker compose -f docker-compose.production-build.yml up --wait
|
||||
volumes:
|
||||
- name: env-secrets
|
||||
path: /drone/auth/production.env
|
||||
- name: dockersock
|
||||
path: /var/run/docker.sock
|
||||
- name: dockerconfig
|
||||
path: /drone/auth/.docker/config.json
|
||||
image: plugins/webhook
|
||||
settings:
|
||||
urls: https://portainer.mifi.dev/api/stacks/webhooks/968d2244-2548-4f0b-8c18-bbc9bc35305d
|
||||
- name: Send Status Notifications
|
||||
image: plugins/webhook
|
||||
privileged: true
|
||||
@@ -272,7 +262,7 @@ steps:
|
||||
template: |
|
||||
{
|
||||
"icon_url":"https://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/120/apple/198/freezing-face_1f976.png",
|
||||
"text": "[{{ repo.name }} - Build # {{ build.number }}] Deploy {{ build.status }} {{#success build.status}}:tada:{{else}}:poop:{{/success}}",
|
||||
"text": "[{{ repo.name }} - Build # {{ build.number }}] Production Deploy {{ build.status }} {{#success build.status}}:tada:{{else}}:poop:{{/success}}",
|
||||
"username":"DroneBot"
|
||||
}
|
||||
when:
|
||||
@@ -280,19 +270,8 @@ steps:
|
||||
- success
|
||||
- failure
|
||||
|
||||
volumes:
|
||||
- name: dockerconfig
|
||||
host:
|
||||
path: /volume1/docker/dockerconfig.json
|
||||
- name: dockersock
|
||||
host:
|
||||
path: /var/run/docker.sock
|
||||
- name: env-secrets
|
||||
host:
|
||||
path: /volume1/docker/beethoven/labs-auth/staging.env
|
||||
|
||||
depends_on:
|
||||
- Test Pipeline
|
||||
- Publish Pipeline
|
||||
|
||||
trigger:
|
||||
event:
|
||||
|
||||
@@ -7,6 +7,5 @@
|
||||
.yarnrc.yml
|
||||
babel.config.*
|
||||
jest.config.*
|
||||
src
|
||||
tsconfig*.json
|
||||
tslint.json
|
||||
|
||||
20
Dockerfile
20
Dockerfile
@@ -1,18 +1,20 @@
|
||||
ARG ENV=production
|
||||
ARG MONGO_ENTRY_FILE
|
||||
ARG MONGO_VERSION=latest
|
||||
ARG NPM_TOKEN
|
||||
ARG PORT=9001
|
||||
ARG NPM_TOKEN=not_set
|
||||
ARG YARN_VERSION=3.5.0
|
||||
|
||||
## mongo build stage
|
||||
FROM mongo:$MONGO_VERSION AS database
|
||||
COPY docker-entrypoint-initdb.d/mongo-init-$MONGO_VERSION.sh ./docker-entrypoint-initdb.d/mongo-init.sh
|
||||
FROM mongo:${MONGO_VERSION} AS database
|
||||
ARG MONGO_ENTRY_FILE=${MONGO_ENTRY_FILE:-latest}
|
||||
COPY docker-entrypoint-initdb.d/mongo-init-${MONGO_ENTRY_FILE}.sh ./docker-entrypoint-initdb.d/mongo-init.sh
|
||||
|
||||
## stage one, build the service
|
||||
FROM node:20-bullseye-slim AS build
|
||||
ENV YARN_VERSION $YARN_VERSION
|
||||
ENV NODE_ENV development
|
||||
ENV NPM_TOKEN $NPM_TOKEN
|
||||
ENV YARN_VERSION=${YARN_VERSION}
|
||||
ENV NODE_ENV=development
|
||||
ENV NPM_TOKEN=${NPM_TOKEN}
|
||||
WORKDIR /home/node/app
|
||||
COPY .npmrc /root
|
||||
COPY .build.yarnrc.yml /root/.yarnrc.yml
|
||||
@@ -22,9 +24,9 @@ RUN yarn build:production
|
||||
|
||||
## this is stage two , where the app actually runs
|
||||
FROM node:20-bullseye-slim AS containerize
|
||||
ENV YARN_VERSION $YARN_VERSION
|
||||
ENV NODE_ENV $ENV
|
||||
ENV NPM_TOKEN $NPM_TOKEN
|
||||
ENV YARN_VERSION=${YARN_VERSION}
|
||||
ENV NODE_ENV=${ENV}
|
||||
ENV NPM_TOKEN=${NPM_TOKEN}
|
||||
WORKDIR /home/node/app
|
||||
COPY .npmrc /root
|
||||
COPY .build.yarnrc.yml /root/.yarnrc.yml
|
||||
|
||||
@@ -8,7 +8,7 @@ services:
|
||||
context: .
|
||||
target: database
|
||||
args:
|
||||
MONGO_VERSION: 6.0.5
|
||||
MONGO_VERSION: latest
|
||||
ports:
|
||||
- 27017:27017
|
||||
networks:
|
||||
|
||||
@@ -9,7 +9,8 @@ services:
|
||||
context: .
|
||||
target: database
|
||||
args:
|
||||
MONGO_VERSION: 4.4
|
||||
- MONGO_ENTRY_FILE=4.4
|
||||
- MONGO_VERSION=4.4
|
||||
networks:
|
||||
- auth-backend
|
||||
volumes:
|
||||
@@ -55,4 +56,4 @@ networks:
|
||||
|
||||
volumes:
|
||||
auth-db:
|
||||
external: false
|
||||
external: true
|
||||
|
||||
@@ -3,41 +3,57 @@ version: '3.8'
|
||||
services:
|
||||
auth-service_mongo:
|
||||
container_name: ${CONTAINER_PREFIX}-auth-service_mongo
|
||||
env_file:
|
||||
- staging.env
|
||||
networks:
|
||||
- auth-backend
|
||||
- docknet
|
||||
volumes:
|
||||
- auth-db:/data
|
||||
- ./mongo-init.js:/docker-entrypoint-initdb.d/mongo-init.js:ro
|
||||
- auth-db:/data/db
|
||||
- auth-db:/data/configdb
|
||||
restart: unless-stopped
|
||||
image: mongo:4.4
|
||||
image: mongo:${MONGO_VERSION}
|
||||
auth-service:
|
||||
env_file:
|
||||
- staging.env
|
||||
container_name: ${CONTAINER_PREFIX}-auth-service
|
||||
environment:
|
||||
- DB_HOST=${CONTAINER_PREFIX}-auth-service_mongo
|
||||
- DB_NAME=${DB_NAME}
|
||||
- DB_PASSWORD=${DB_PASSWORD}
|
||||
- DB_USERNAME=${DB_USERNAME}
|
||||
- DEFAULT_TOKEN_DAYS=${DEFAULT_TOKEN_DAYS}
|
||||
- JWT_AUDIENCE=${JWT_AUDIENCE}
|
||||
- JWT_ISSUER=${JWT_ISSUER}
|
||||
- JWT_SECRET=${JWT_SECRET}
|
||||
- LOGIN_ROUTE=${LOGIN_ROUTE}
|
||||
- LOGIN_VALID_TIME=${LOGIN_VALID_TIME}
|
||||
- PORT=${PORT}
|
||||
- RESET_ROUTE=${RESET_ROUTE}
|
||||
- RESET_VALID_MINUTES=${RESET_VALID_MINUTES}
|
||||
- ROUTE_PREFIX=${ROUTE_PREFIX}
|
||||
- SESSION_KEY=${SESSION_KEY}
|
||||
labels:
|
||||
- 'traefik.enable=true'
|
||||
- 'traefik.http.routers.grow.rule=Host(`${HOST}`) && Path(`${ROUTE_PREFIX}`)'
|
||||
- 'traefik.http.routers.grow.entrypoints=websecure'
|
||||
- 'traefik.http.routers.grow.tls=true'
|
||||
- 'traefik.http.routers.grow.tls.certresolver=letsencrypt'
|
||||
- 'traefik.http.routers.grow.service=grow-service'
|
||||
- 'traefik.http.services.grow-service.loadbalancer.server.port=${PORT}'
|
||||
- 'traefik.docker.network=docknet'
|
||||
- 'traefik.http.routers.auth.rule=Host(`${HOST}`) && PathPrefix(`${ROUTE_PREFIX}`)'
|
||||
- 'traefik.http.routers.auth.entrypoints=websecure'
|
||||
- 'traefik.http.routers.auth.tls=true'
|
||||
- 'traefik.http.routers.auth.tls.certresolver=letsencrypt'
|
||||
- 'traefik.http.routers.auth.service=auth-service'
|
||||
- 'traefik.http.services.auth-service.loadbalancer.server.port=${PORT}'
|
||||
networks:
|
||||
- auth-backend
|
||||
- docknet
|
||||
restart: unless-stopped
|
||||
depends_on:
|
||||
- auth-service_mongo
|
||||
image: git.mifi.dev/mifi/mifi/auth:latest
|
||||
image: git.mifi.dev/mifi/auth-service:latest
|
||||
|
||||
networks:
|
||||
auth-backend:
|
||||
driver: bridge
|
||||
external: false
|
||||
docknet:
|
||||
name: docknet
|
||||
external: true
|
||||
|
||||
volumes:
|
||||
auth-db:
|
||||
external: false
|
||||
external: true
|
||||
|
||||
51
package.json
51
package.json
@@ -1,10 +1,11 @@
|
||||
{
|
||||
"name": "@mifi/auth-service",
|
||||
"version": "1.0.3",
|
||||
"version": "1.0.17",
|
||||
"author": "mifi (Mike Fitzpatrick)",
|
||||
"license": "MIT",
|
||||
"scripts": {
|
||||
"build": "tsc",
|
||||
"build:package": "tsc -p ./tsconfig.package.json",
|
||||
"build:production": "tsc -p ./tsconfig.production.json",
|
||||
"format": "prettier:fix && lint:fix",
|
||||
"lint": "eslint --ext .ts,.tsx src/",
|
||||
@@ -20,23 +21,18 @@
|
||||
"@babel/core": "^7.21.8",
|
||||
"@babel/preset-env": "^7.21.5",
|
||||
"@babel/preset-typescript": "^7.21.5",
|
||||
"@simplewebauthn/typescript-types": "^7.x.x",
|
||||
"@tsconfig/node16": "^1.0.4",
|
||||
"@types/jest": "^29.5.1",
|
||||
"@types/jsonwebtoken": "^9.0.1",
|
||||
"@types/koa": "^2.13.5",
|
||||
"@types/koa-bodyparser": "^4.3.10",
|
||||
"@types/koa-cookie": "^1.0.0",
|
||||
"@types/koa-passport": "^4.0.3",
|
||||
"@types/koa-router": "^7.4.4",
|
||||
"@types/koa-session": "^5.10.6",
|
||||
"@types/luxon": "^3.2.0",
|
||||
"@types/node": "^18.14.0",
|
||||
"@types/passport": "^1.0.12",
|
||||
"@types/passport-facebook": "^2.1.11",
|
||||
"@types/passport-fido2-webauthn": "^0.1.0",
|
||||
"@types/passport-google-oauth": "^1.0.42",
|
||||
"@types/passport-jwt": "^3.0.8",
|
||||
"@types/passport-local": "^1.0.35",
|
||||
"@types/uuid": "^9.0.1",
|
||||
"@typescript-eslint/eslint-plugin": "^5.59.2",
|
||||
"@typescript-eslint/parser": "^5.59.2",
|
||||
"babel-jest": "^29.5.0",
|
||||
@@ -53,30 +49,27 @@
|
||||
"prettier-eslint": "^15.0.1",
|
||||
"prettier-eslint-cli": "^7.1.0",
|
||||
"reflect-metadata": "^0.1.13",
|
||||
"ts-node": "^10.9.1",
|
||||
"typescript": "^4.9.5"
|
||||
"ts-node": "^10.x.x",
|
||||
"typescript": "^4.x.x"
|
||||
},
|
||||
"dependencies": {
|
||||
"@mifi/auth-db": "^1.x.x",
|
||||
"@mifi/services-common": "^1.x.x",
|
||||
"@simplewebauthn/server": "^7.2.0",
|
||||
"dotenv": "^16.0.3",
|
||||
"http-status-codes": "^2.2.0",
|
||||
"jsonwebtoken": "^9.0.0",
|
||||
"koa": "^2.14.1",
|
||||
"koa-bodyparser": "^4.3.0",
|
||||
"koa-cookie": "^1.0.0",
|
||||
"koa-passport": "^6.0.0",
|
||||
"koa-router": "^12.0.0",
|
||||
"koa-session": "^6.4.0",
|
||||
"@mifi/auth-common": "^1.0.15",
|
||||
"@mifi/auth-db": "^1.0.20",
|
||||
"@mifi/auth-gatekeeper": "^1.0.12",
|
||||
"@mifi/services-common": "^1.0.16",
|
||||
"@simplewebauthn/server": "^7.x.x",
|
||||
"base64url": "^3.x.x",
|
||||
"dotenv": "^16.x.x",
|
||||
"http-status-codes": "^2.x.x",
|
||||
"jsonwebtoken": "^9.x.x",
|
||||
"koa": "^2.x.x",
|
||||
"koa-bodyparser": "^4.x.x",
|
||||
"koa-compose": "^4.1.0",
|
||||
"koa-cookie": "^1.x.x",
|
||||
"koa-router": "^12.x.x",
|
||||
"koa-session": "^6.x.x",
|
||||
"luxon": "^3.3.0",
|
||||
"passport": "^0.6.0",
|
||||
"passport-facebook": "^3.0.0",
|
||||
"passport-fido2-webauthn": "^0.1.0",
|
||||
"passport-google-oauth": "^2.0.0",
|
||||
"passport-http-bearer": "^1.0.1",
|
||||
"passport-jwt": "^4.0.1",
|
||||
"passport-local": "^1.0.0"
|
||||
"uuid": "^9.x.x"
|
||||
},
|
||||
"description": "",
|
||||
"repository": {
|
||||
|
||||
@@ -3,11 +3,12 @@ import bodyparser from 'koa-bodyparser';
|
||||
import cookie from 'koa-cookie';
|
||||
import session from 'koa-session';
|
||||
|
||||
import passport from './passport';
|
||||
import { gatekeeper } from '@mifi/auth-gatekeeper/lib';
|
||||
|
||||
import { performanceLogger, performanceTimer } from './middleware/performance';
|
||||
import { errorHandler } from './middleware/errorHandler';
|
||||
import { authRouter } from './controllers/auth';
|
||||
import { SESSION_KEY } from './constants/env';
|
||||
import { SESSION_KEY } from './env';
|
||||
|
||||
const app: Koa = new Koa();
|
||||
|
||||
@@ -20,8 +21,8 @@ app.use(cookie());
|
||||
app.keys = [SESSION_KEY];
|
||||
app.use(session({}, app));
|
||||
|
||||
app.use(passport.initialize());
|
||||
app.use(passport.session());
|
||||
app.use(gatekeeper.initialize);
|
||||
app.use(gatekeeper.jwt);
|
||||
|
||||
app.use(authRouter.routes());
|
||||
app.use(authRouter.allowedMethods());
|
||||
|
||||
@@ -1,9 +0,0 @@
|
||||
export enum Action {
|
||||
AUTHENTICATE = 'AUTHENTICATE',
|
||||
AUTHENTICATE_FAILURE = 'AUTHENTICATE_FAILURE',
|
||||
CREATE = 'CREATE',
|
||||
DELETE = 'DELETE',
|
||||
RESET = 'RESET',
|
||||
RESET_REQUEST = 'RESET_REQUEST',
|
||||
UPDATE = 'UPDATE',
|
||||
}
|
||||
@@ -1,8 +0,0 @@
|
||||
export enum Status {
|
||||
ACTIVE,
|
||||
BLOCK_HARD,
|
||||
BLOCK_SOFT,
|
||||
DELETED,
|
||||
INACTIVE,
|
||||
UNVERIFIED,
|
||||
}
|
||||
@@ -1,10 +0,0 @@
|
||||
export const DB_HOST = process.env.DB_HOST;
|
||||
export const DB_PORT = process.env.DB_PORT || 27017;
|
||||
export const DB_USERNAME = process.env.DB_USERNAME;
|
||||
export const DB_PASSWORD = process.env.DB_PASSWORD;
|
||||
export const DB_NAME = process.env.DB_NAME;
|
||||
|
||||
export const COLL_AUTH = 'Auth';
|
||||
export const COLL_LOG = 'Log';
|
||||
export const COLL_STRATEGY = 'Strategy';
|
||||
export const COLL_TOKEN = 'Token';
|
||||
@@ -1,20 +0,0 @@
|
||||
export const PACKAGE_NAME = '@mifi/auth';
|
||||
export const PORT = process.env.PORT || 9000;
|
||||
|
||||
export const SESSION_KEY = process.env.SESSION_KEY || 'secret-key';
|
||||
|
||||
export const JWT_AUDIENCE = process.env.JWT_AUDIENCE || 'mifi.dev';
|
||||
export const JWT_ISSUER = process.env.JWT_ISSUER || PACKAGE_NAME;
|
||||
export const JWT_SECRET = process.env.JWT_SECRET || 'secret';
|
||||
|
||||
export const LOGIN_VALID_TIMEOUT = process.env.LOGIN_VALID_TIMEOUT || '12h'; // ###d|h|m
|
||||
export const RESET_VALID_TIMEOUT = process.env.RESET_VALID_TIMEOUT || '15m'; // ###d|h|m
|
||||
export const VERIFY_VALID_TIMEOUT = process.env.VERIFY_VALID_TIMEOUT || '60d'; // ###d|h|m
|
||||
export const DEFAULT_TOKEN_DAYS = process.env.DEFAULT_TOKEN_DAYS || 365;
|
||||
|
||||
export const ROUTE_PREFIX = process.env.ROUTE_PREFIX || '/auth';
|
||||
export const LOGIN_ROUTE = process.env.LOGIN_ROUTE || '/login';
|
||||
export const RESET_ROUTE = process.env.RESET_ROUTE || '/reset';
|
||||
export const VERIFICATION_ROUTE = process.env.VERIFICATION_ROUTE || '/verification';
|
||||
|
||||
export const REQUIRE_VERIFICATION = process.env.REQUIRE_VERIFICATION || true;
|
||||
@@ -1,7 +0,0 @@
|
||||
export enum STRATEGIES {
|
||||
LOCAL,
|
||||
APPLE,
|
||||
FACEBOOK,
|
||||
FIDO2,
|
||||
GOOGLE,
|
||||
}
|
||||
@@ -1,4 +0,0 @@
|
||||
export enum TokenType {
|
||||
RESET = 'RESET',
|
||||
VERIFICATION = 'VERIFICATION',
|
||||
}
|
||||
@@ -3,6 +3,8 @@ import Koa from 'koa';
|
||||
import Router from 'koa-router';
|
||||
import { StringSchemaDefinition } from 'mongoose';
|
||||
|
||||
import { ROUTE_PREFIX as prefix, RESET_ROUTE } from '@mifi/auth-common/lib/env/routes';
|
||||
import { STRATEGIES } from '@mifi/auth-common/lib/enums/strategies';
|
||||
import { Auth } from '@mifi/auth-db/lib';
|
||||
import { deleteStrategy } from '@mifi/auth-db/lib/api/deleteStrategy';
|
||||
import { resetPasswordGet } from '@mifi/auth-db/lib/api/resetPasswordGet';
|
||||
@@ -10,11 +12,9 @@ import { resetPasswordPost } from '@mifi/auth-db/lib/api/resetPasswordPost';
|
||||
import { create } from '@mifi/auth-db/lib/dao/create';
|
||||
import { deleteById } from '@mifi/auth-db/lib/dao/deleteById';
|
||||
import { AuthDocument } from '@mifi/auth-db/lib/schema/auth';
|
||||
import { gatekeeper } from '@mifi/auth-gatekeeper/lib';
|
||||
|
||||
import { ROUTE_PREFIX as prefix, RESET_ROUTE } from '../constants/env';
|
||||
import passport from '../passport';
|
||||
import { ErrorCodes, getErrorBody } from '../constants/errors';
|
||||
import { authenticated } from '../middleware/authenication';
|
||||
|
||||
const routerOpts: Router.IRouterOptions = { prefix };
|
||||
const router: Router = new Router(routerOpts);
|
||||
@@ -34,20 +34,15 @@ router.post('/', async (ctx) => {
|
||||
ctx.body = { success: !!data, data };
|
||||
});
|
||||
|
||||
router.delete('/strategy/:id', async (ctx) => {
|
||||
router.delete('/strategy/:id', gatekeeper.authenticated, async (ctx) => {
|
||||
ctx.body = { success: await deleteStrategy(ctx.params.id as StringSchemaDefinition) };
|
||||
});
|
||||
|
||||
router.delete('/:id', async (ctx) => {
|
||||
router.delete('/:id', gatekeeper.authenticated, async (ctx) => {
|
||||
ctx.body = { success: await deleteById(ctx.params.id as StringSchemaDefinition) };
|
||||
});
|
||||
|
||||
router.post('/login', async (ctx, next) => {
|
||||
return passport.authenticate('local', (err, user) => {
|
||||
ctx.body = user;
|
||||
return user ? ctx.login(user) : ctx.throw(StatusCodes.UNAUTHORIZED);
|
||||
})(ctx, next);
|
||||
});
|
||||
router.post('/login', gatekeeper.authenticate(STRATEGIES[STRATEGIES.LOCAL]));
|
||||
|
||||
router.post(process.env.RESET_ROUTE || RESET_ROUTE, async (ctx) => {
|
||||
const { password, token, username } = ctx.request.body as { token?: string; password?: string; username?: string };
|
||||
@@ -66,8 +61,8 @@ router.post(process.env.RESET_ROUTE || RESET_ROUTE, async (ctx) => {
|
||||
}
|
||||
});
|
||||
|
||||
router.patch('/:record', authenticated(), (ctx: Koa.Context) => {
|
||||
if (ctx.user !== ctx.param.record) {
|
||||
router.patch('/:record', gatekeeper.authenticated, (ctx: Koa.Context) => {
|
||||
if (ctx.user.record !== ctx.param.record) {
|
||||
ctx.throw(StatusCodes.UNAUTHORIZED);
|
||||
}
|
||||
const data = Auth.findOneAndUpdate({ record: ctx.params.record });
|
||||
|
||||
10
src/controllers/passkey.ts
Normal file
10
src/controllers/passkey.ts
Normal file
@@ -0,0 +1,10 @@
|
||||
// import Router from 'koa-router';
|
||||
|
||||
// const routerOpts: Router.IRouterOptions = { prefix: '/passkey' };
|
||||
// const router: Router = new Router(routerOpts);
|
||||
|
||||
// router.post('/login', async (ctx, next) => {});
|
||||
|
||||
// router.post('/login/challenge', async (ctx, next) => {});
|
||||
|
||||
// router.post('/signup/challenge', async (ctx, next) => {});
|
||||
4
src/env.ts
Normal file
4
src/env.ts
Normal file
@@ -0,0 +1,4 @@
|
||||
import { getEnvVar } from '@mifi/services-common/lib/utils/getEnvVar';
|
||||
|
||||
export const SESSION_KEY = getEnvVar<string>('SESSION_KEY', 'secret');
|
||||
export const PORT = getEnvVar<number>('PORT', 9001);
|
||||
@@ -1,6 +1,6 @@
|
||||
import app from './app';
|
||||
import { connection } from '@mifi/auth-db/lib';
|
||||
import { PORT } from './constants/env';
|
||||
import { PORT } from './env';
|
||||
|
||||
connection.then(
|
||||
() => {
|
||||
|
||||
@@ -1,13 +0,0 @@
|
||||
import { Middleware } from 'koa';
|
||||
|
||||
import { LOGIN_ROUTE } from '../constants/env';
|
||||
|
||||
export const authenticated = (): Middleware => {
|
||||
return (ctx, next) => {
|
||||
if (ctx.isAuthenticated()) {
|
||||
return next();
|
||||
} else {
|
||||
ctx.redirect(process.env.LOGIN_ROUTE || LOGIN_ROUTE);
|
||||
}
|
||||
};
|
||||
};
|
||||
@@ -1,7 +1,7 @@
|
||||
import { StatusCodes } from 'http-status-codes';
|
||||
import { Context, Next } from 'koa';
|
||||
import { Middleware } from 'koa';
|
||||
|
||||
export const errorHandler = async (ctx: Context, next: Next) => {
|
||||
export const errorHandler: Middleware = async (ctx, next) => {
|
||||
try {
|
||||
await next();
|
||||
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
import { Context, Next } from 'koa';
|
||||
import { Middleware } from 'koa';
|
||||
|
||||
export const performanceLogger = async (ctx: Context, next: Next) => {
|
||||
export const performanceLogger: Middleware = async (ctx, next) => {
|
||||
await next();
|
||||
const rt = ctx.response.get('X-Response-Time');
|
||||
console.log(`${ctx.method} ${ctx.url} - ${rt}`);
|
||||
console.debug(`${ctx.method} ${ctx.url} - ${rt}`);
|
||||
};
|
||||
|
||||
export const performanceTimer = async (ctx: Context, next: Next) => {
|
||||
export const performanceTimer: Middleware = async (ctx, next) => {
|
||||
const start = Date.now();
|
||||
await next();
|
||||
const ms = Date.now() - start;
|
||||
|
||||
@@ -1,23 +0,0 @@
|
||||
import passport from 'koa-passport';
|
||||
import { Types } from 'mongoose';
|
||||
|
||||
import { AuthDocument } from '@mifi/auth-db/lib/schema/auth';
|
||||
import { readOneByRecord } from '@mifi/auth-db/lib/dao/readOneByRecord';
|
||||
import { readOneById } from '@mifi/auth-db/lib/dao/readOneById';
|
||||
|
||||
import LocalStrategy from './strategies/local';
|
||||
import JwtStrategy from './strategies/jwt';
|
||||
|
||||
passport.use(LocalStrategy);
|
||||
passport.use(JwtStrategy);
|
||||
|
||||
passport.serializeUser((user, done) => {
|
||||
done(null, (user as AuthDocument).record || (user as AuthDocument).id);
|
||||
});
|
||||
|
||||
passport.deserializeUser(async (id, done) => {
|
||||
const user = await readOneByRecord(<Types.ObjectId>id).catch(async () => await readOneById(<Types.ObjectId>id));
|
||||
done(user ? null : 'user not found', user);
|
||||
});
|
||||
|
||||
export default passport;
|
||||
@@ -1,17 +0,0 @@
|
||||
import { ExtractJwt, Strategy as JwtStrategy } from 'passport-jwt';
|
||||
|
||||
import { readOneByRecord } from '@mifi/auth-db/lib/dao/readOneByRecord';
|
||||
|
||||
import { JWT_SECRET } from '../../constants/env';
|
||||
|
||||
const opts = {
|
||||
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
|
||||
secretOrKey: JWT_SECRET,
|
||||
issuer: process.env.JWT_ISSUER,
|
||||
audience: process.env.JWT_AUDIENCE,
|
||||
};
|
||||
|
||||
export default new JwtStrategy(opts, async ({ sub }, done) => {
|
||||
const auth = await readOneByRecord(sub);
|
||||
return done(null, auth || false);
|
||||
});
|
||||
@@ -1,9 +0,0 @@
|
||||
// eslint-disable-next-line import/named
|
||||
import { Strategy as LocalStrategy } from 'passport-local';
|
||||
|
||||
import { authenticate } from '@mifi/auth-db/lib/api/authenticate';
|
||||
|
||||
export default new LocalStrategy(async (username, password, done) => {
|
||||
const user = await authenticate(username, password);
|
||||
done(null, user);
|
||||
});
|
||||
18
src/strategies/LocalStrategy.ts
Normal file
18
src/strategies/LocalStrategy.ts
Normal file
@@ -0,0 +1,18 @@
|
||||
import { Context } from 'koa';
|
||||
|
||||
import { STRATEGIES } from '@mifi/auth-common/lib/enums/strategies';
|
||||
import { authenticate } from '@mifi/auth-db/lib/api/authenticate';
|
||||
import { Strategy } from '@mifi/auth-gatekeeper/lib';
|
||||
import { GatekeeperUser } from '@mifi/auth-gatekeeper/lib/types/GatekeeperUser';
|
||||
|
||||
interface LocalStrategyBody {
|
||||
username: string;
|
||||
password: string;
|
||||
}
|
||||
|
||||
const name = STRATEGIES[STRATEGIES.LOCAL];
|
||||
|
||||
export const LocalStrategy = new Strategy(name, async (ctx: Context) => {
|
||||
const { password, username } = <LocalStrategyBody>ctx.request.body;
|
||||
return authenticate(username, password) as Promise<false | GatekeeperUser>;
|
||||
});
|
||||
5
src/types/PasskeyUser.ts
Normal file
5
src/types/PasskeyUser.ts
Normal file
@@ -0,0 +1,5 @@
|
||||
export interface PasskeyUser {
|
||||
displayName: string;
|
||||
id: Buffer | string;
|
||||
name: string;
|
||||
}
|
||||
@@ -1,35 +0,0 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import { JWT_AUDIENCE, JWT_ISSUER, JWT_SECRET } from '../constants/env';
|
||||
export interface TokenProps {
|
||||
aud?: string;
|
||||
exp?: number | Date;
|
||||
iss?: string;
|
||||
sub: string | null;
|
||||
[key: string]: any;
|
||||
}
|
||||
|
||||
export type SignProps = string | TokenProps | void;
|
||||
|
||||
export const sign = (props: SignProps) => {
|
||||
const today = new Date();
|
||||
const { sub = null, ...rest }: TokenProps =
|
||||
typeof props === 'string' || typeof props === 'undefined' ? { sub: props || null } : props;
|
||||
let { exp } = rest;
|
||||
if (!exp) {
|
||||
exp = new Date(today);
|
||||
exp.setDate(today.getDate() + parseInt(process.env.JWT_DAYS_VALID as string));
|
||||
exp = exp.getTime() / 1000;
|
||||
}
|
||||
return jwt.sign(
|
||||
{
|
||||
exp,
|
||||
sub,
|
||||
aud: rest.aud || JWT_AUDIENCE,
|
||||
iat: today.getTime(),
|
||||
iss: rest.iss || JWT_ISSUER,
|
||||
},
|
||||
JWT_SECRET,
|
||||
);
|
||||
};
|
||||
|
||||
export const verify = (token: string) => jwt.verify(token, JWT_SECRET);
|
||||
@@ -1,4 +1,4 @@
|
||||
import { RESET_ROUTE, ROUTE_PREFIX, VERIFICATION_ROUTE } from '../constants/env';
|
||||
import { RESET_ROUTE, ROUTE_PREFIX, VERIFICATION_ROUTE } from '@mifi/auth-common/lib/env/routes';
|
||||
|
||||
export const getPasswordResetPath = (token: string) => `${ROUTE_PREFIX}${RESET_ROUTE}?t=${token}`;
|
||||
|
||||
|
||||
@@ -1,13 +0,0 @@
|
||||
export const parseTimeoutToMs = (timeout: string) => {
|
||||
const match = timeout.match(/(?<number>\d+)(?<unit>d|h|m)/gi)?.groups || {};
|
||||
const { number, unit } = match;
|
||||
switch (unit) {
|
||||
case 'd':
|
||||
return 1000 * 60 * 60 * 24 * parseInt(number);
|
||||
case 'h':
|
||||
return 1000 * 60 * 60 * parseInt(number);
|
||||
case 'm':
|
||||
default:
|
||||
return 1000 * 60 * parseInt(number) || 1;
|
||||
}
|
||||
};
|
||||
@@ -1,12 +0,0 @@
|
||||
import { pbkdf2Sync, randomBytes } from 'crypto';
|
||||
|
||||
export const encrypt = (password: string) => {
|
||||
const salt = randomBytes(16).toString('hex');
|
||||
const hash = pbkdf2Sync(password, salt, 10000, 512, 'sha512').toString('hex');
|
||||
return `${salt}:${hash}`;
|
||||
};
|
||||
|
||||
export const verify = (test: string, secret: string) => {
|
||||
const [salt, hash] = secret.split(':');
|
||||
return pbkdf2Sync(test, salt, 10000, 512, 'sha512').toString('hex') === hash;
|
||||
};
|
||||
@@ -1,11 +0,0 @@
|
||||
import { sign } from './jwt';
|
||||
import { LOGIN_VALID_TIMEOUT } from '../constants/env';
|
||||
import { Status } from '../constants/auth';
|
||||
import { parseTimeoutToMs } from './parseTimeoutToMs';
|
||||
|
||||
export const generateLoginToken = (sub: string, status: Status) =>
|
||||
sign({
|
||||
sub,
|
||||
status,
|
||||
exp: Date.now() + parseTimeoutToMs(LOGIN_VALID_TIMEOUT),
|
||||
});
|
||||
17
tsconfig.package.json
Normal file
17
tsconfig.package.json
Normal file
@@ -0,0 +1,17 @@
|
||||
{
|
||||
"extends": "@tsconfig/node16/tsconfig.json",
|
||||
"compilerOptions": {
|
||||
"allowSyntheticDefaultImports": true,
|
||||
"declaration": true,
|
||||
"experimentalDecorators": true,
|
||||
"emitDecoratorMetadata": true,
|
||||
"noImplicitAny": true,
|
||||
"outDir": "dist/",
|
||||
"rootDirs": ["./", "src/"],
|
||||
"strict": true,
|
||||
"esModuleInterop": true,
|
||||
"sourceMap": true,
|
||||
"removeComments": false
|
||||
},
|
||||
"include": ["./src"]
|
||||
}
|
||||
@@ -2,7 +2,7 @@
|
||||
"extends": "@tsconfig/node16/tsconfig.json",
|
||||
"compilerOptions": {
|
||||
"allowSyntheticDefaultImports": true,
|
||||
"declaration": true,
|
||||
"declaration": false,
|
||||
"experimentalDecorators": true,
|
||||
"emitDecoratorMetadata": true,
|
||||
"noImplicitAny": true,
|
||||
|
||||
Reference in New Issue
Block a user