Compare commits

...

7 Commits

Author SHA1 Message Date
Kayne Ruse c1155909be Patched a refresh issue 2021-08-09 20:23:05 +10:00
Kayne Ruse 4ec55bed10 Bumped version number 2021-07-28 15:43:47 +01:00
Kayne Ruse b51d22f1a1 SQUASH: I think I got it working 2021-07-29 00:36:20 +10:00
Kayne Ruse 6b3db67a29 Fixed whitespace 2021-07-28 23:19:08 +10:00
Kayne Ruse 81da8ca422 Working on password recovery 2021-07-28 23:02:04 +10:00
Kayne Ruse 72b3babfd8 Reworking JWT authentication 2021-07-28 21:36:04 +10:00
Kayne Ruse c63e14ddf3 Patched some holes when poking with curl 2021-07-24 20:04:35 +10:00
28 changed files with 378 additions and 118 deletions
+1
View File
@@ -1,5 +1,6 @@
WEB_PROTOCOL=http WEB_PROTOCOL=http
WEB_ADDRESS=localhost WEB_ADDRESS=localhost
WEB_RESET_ADDRESS=localhost/reset
WEB_PORT=3200 WEB_PORT=3200
DB_HOSTNAME=database DB_HOSTNAME=database
+32 -1
View File
@@ -19,9 +19,11 @@ Content-Type: application/json
"password": "helloworld" "password": "helloworld"
} }
//DOCS: Used for validating the email address above //DOCS: Used for validating the email address above
GET /auth/validation?username=example&token=12345678 GET /auth/validation?username=example&token=12345678
//DOCS: Login after validation //DOCS: Login after validation
POST /auth/login POST /auth/login
Content-Type: application/json Content-Type: application/json
@@ -37,7 +39,8 @@ Content-Type: application/json
"refreshToken": "fghij" "refreshToken": "fghij"
} }
//Replace an expired authToken pair with these values
//DOCS: Replace an expired authToken pair with these values
POST /auth/token POST /auth/token
Content-Type: application/json Content-Type: application/json
@@ -45,6 +48,7 @@ Content-Type: application/json
"token": "refreshToken" "token": "refreshToken"
} }
//DOCS: After this is called, the refresh route will no longer work //DOCS: After this is called, the refresh route will no longer work
DELETE /auth/logout DELETE /auth/logout
Authorization: Bearer accessToken Authorization: Bearer accessToken
@@ -53,6 +57,7 @@ Authorization: Bearer accessToken
"token": "refreshToken" "token": "refreshToken"
} }
//DOCS: Retreives the private account data, results vary //DOCS: Retreives the private account data, results vary
GET /auth/account GET /auth/account
Authorization: Bearer accessToken Authorization: Bearer accessToken
@@ -63,11 +68,13 @@ Authorization: Bearer accessToken
"refreshToken": "fghij" "refreshToken": "fghij"
} }
//DOCS: Update account data, input varies, but is always JSON //DOCS: Update account data, input varies, but is always JSON
PATCH /auth/account PATCH /auth/account
Content-Type: application/json Content-Type: application/json
Authorization: Bearer accessToken Authorization: Bearer accessToken
//DOCS: Sets the timer, account will be deleted after 2 days //DOCS: Sets the timer, account will be deleted after 2 days
DELETE /auth/account DELETE /auth/account
Authorization: Bearer accessToken Authorization: Bearer accessToken
@@ -76,4 +83,28 @@ Content-Type: application/json
{ {
"password": "helloworld" "password": "helloworld"
} }
//DOCS: Send the link to recover a forgotten password
POST /auth/recover
Content-Type: application/json
{
"email": "kayneruse@gmail.com"
}
//DOCS: Redirect the link to recover a password to the front-end
GET /auth/reset?token=<token>
//Result
301 -> ${WEB_RESET_ADDRESS}?email=<email>&token=<token>
//DOCS: Resets a password for the given email, correct token is required
PATCH /auth/reset?email=<email>&token=<token>
{
"password": "password"
}
``` ```
+2
View File
@@ -30,6 +30,7 @@ const question = (prompt, def = null) => {
//project configuration //project configuration
const appName = await question('App Name', 'auth'); const appName = await question('App Name', 'auth');
const appWebAddress = await question('Web Addr', `${appName}.example.com`); const appWebAddress = await question('Web Addr', `${appName}.example.com`);
const resetAddress = await question('Reset Addr', `example.com/reset`);
const appPort = await question('App Port', '3200'); const appPort = await question('App Port', '3200');
const appDBUser = await question('DB User', appName); const appDBUser = await question('DB User', appName);
@@ -69,6 +70,7 @@ services:
environment: environment:
- WEB_PROTOCOL=https - WEB_PROTOCOL=https
- WEB_ADDRESS=${appWebAddress} - WEB_ADDRESS=${appWebAddress}
- WEB_RESET_ADDRESS=${resetAddress}
- WEB_PORT=${appPort} - WEB_PORT=${appPort}
- DB_HOSTNAME=database - DB_HOSTNAME=database
- DB_DATABASE=${appName} - DB_DATABASE=${appName}
+2 -3
View File
@@ -1,15 +1,14 @@
{ {
"name": "auth-server", "name": "auth-server",
"version": "1.0.0", "version": "1.4.2",
"lockfileVersion": 2, "lockfileVersion": 2,
"requires": true, "requires": true,
"packages": { "packages": {
"": { "": {
"version": "1.0.0", "version": "1.4.2",
"license": "ISC", "license": "ISC",
"dependencies": { "dependencies": {
"bcryptjs": "^2.4.3", "bcryptjs": "^2.4.3",
"body-parser": "^1.19.0",
"cors": "^2.8.5", "cors": "^2.8.5",
"dotenv": "^8.6.0", "dotenv": "^8.6.0",
"express": "^4.17.1", "express": "^4.17.1",
+1 -2
View File
@@ -1,6 +1,6 @@
{ {
"name": "auth-server", "name": "auth-server",
"version": "1.3.1", "version": "1.4.2",
"description": "An API centric auth server. Uses Sequelize and mariaDB by default.", "description": "An API centric auth server. Uses Sequelize and mariaDB by default.",
"main": "server/server.js", "main": "server/server.js",
"scripts": { "scripts": {
@@ -20,7 +20,6 @@
"homepage": "https://github.com/krgamestudios/auth-server#readme", "homepage": "https://github.com/krgamestudios/auth-server#readme",
"dependencies": { "dependencies": {
"bcryptjs": "^2.4.3", "bcryptjs": "^2.4.3",
"body-parser": "^1.19.0",
"cors": "^2.8.5", "cors": "^2.8.5",
"dotenv": "^8.6.0", "dotenv": "^8.6.0",
"express": "^4.17.1", "express": "^4.17.1",
+1 -1
View File
@@ -27,7 +27,7 @@ const route = async (req, res) => {
//forcibly logout //forcibly logout
tokens.destroy({ tokens.destroy({
where: { where: {
username: req.body.username || '' email: req.body.email || ''
} }
}); });
+1 -1
View File
@@ -12,7 +12,7 @@ router.use(tokenAuth);
router.use(async (req, res, next) => { router.use(async (req, res, next) => {
const record = await accounts.findOne({ const record = await accounts.findOne({
where: { where: {
username: req.user.username || '' email: req.user.email || ''
} }
}); });
+11 -3
View File
@@ -9,18 +9,26 @@ const { accounts } = require('../database/models');
//auth/deletion //auth/deletion
const route = async (req, res) => { const route = async (req, res) => {
if (!req.body.password) {
return res.status(401).end('Missing password');
}
const account = await accounts.findOne({ const account = await accounts.findOne({
where: { where: {
index: req.user.index index: req.user.index || ''
} }
}); });
if (!account) {
return res.status(401).end('Missing account');
}
//compare the user's password //compare the user's password
const compare = utils.promisify(bcrypt.compare); const compare = utils.promisify(bcrypt.compare);
const match = await compare(req.body.password || '', account.hash); const match = await compare(req.body.password, account.hash);
if (!match) { if (!match) {
return res.status(401).send('incorrect password'); return res.status(401).send('Incorrect password');
} }
//set the deletion time (2 days from now) //set the deletion time (2 days from now)
+2 -2
View File
@@ -4,12 +4,12 @@ const { accounts } = require('../database/models');
const route = async (req, res) => { const route = async (req, res) => {
const account = await accounts.findOne({ const account = await accounts.findOne({
where: { where: {
index: req.user.index index: req.user.index || ''
} }
}); });
if (!account) { if (!account) {
return res.status(401).send('Unknown account'); return res.status(401).end('Unknown account');
} }
//respond with the private-facing data //respond with the private-facing data
+5 -5
View File
@@ -3,13 +3,13 @@ const { accounts } = require('../database/models');
//auth/update //auth/update
const route = async (req, res) => { const route = async (req, res) => {
//generate the password hash if (!req.body.password) {
let hash; return res.status(401).end('Missing password');
if (req.body.password) {
hash = await bcrypt.hash(req.body.password, await bcrypt.genSalt(11));
} }
//generate the password hash
let hash = await bcrypt.hash(req.body.password, await bcrypt.genSalt(11));
//update the account //update the account
await accounts.update({ await accounts.update({
contact: req.body.contact, contact: req.body.contact,
+9 -2
View File
@@ -14,13 +14,21 @@ router.post('/login', require('./login'));
//refresh token //refresh token
router.post('/token', require('./token')); router.post('/token', require('./token'));
//password recover and reset
router.post('/recover', require('./password-recover'));
router.get('/reset', require('./password-redirect'));
router.patch('/reset', require('./password-reset'));
//middleware //middleware
router.use(tokenAuth); router.use(tokenAuth);
//logouts allowed when banned, still needs tokens
router.delete('/logout', require('./logout'));
router.use(async (req, res, next) => { router.use(async (req, res, next) => {
const record = await accounts.findOne({ const record = await accounts.findOne({
where: { where: {
username: req.user.username || '' email: req.user.email || ''
} }
}); });
@@ -36,7 +44,6 @@ router.use(async (req, res, next) => {
}); });
//basic account management (needs a token) //basic account management (needs a token)
router.delete('/logout', require('./logout'));
router.get('/account', require('./account-query')); router.get('/account', require('./account-query'));
router.patch('/account', require('./account-update')); router.patch('/account', require('./account-update'));
router.delete('/account', require('./account-delete')); router.delete('/account', require('./account-delete'));
+14 -9
View File
@@ -3,7 +3,7 @@ const utils = require('util');
const bcrypt = require('bcryptjs'); const bcrypt = require('bcryptjs');
const { accounts } = require('../database/models'); const { accounts } = require('../database/models');
const generate = require('../utilities/token-generate'); const tokenGenerate = require('../utilities/token-generate');
//utilities //utilities
const validateEmail = require('../utilities/validate-email'); const validateEmail = require('../utilities/validate-email');
@@ -13,7 +13,7 @@ const route = async (req, res) => {
//validate the given details //validate the given details
const validateErr = await validateDetails(req.body); const validateErr = await validateDetails(req.body);
if (validateErr) { if (validateErr) {
return res.status(401).send(validateErr); return res.status(401).end(validateErr);
} }
//get the existing account //get the existing account
@@ -48,20 +48,25 @@ const route = async (req, res) => {
} }
//generate the JWT //generate the JWT
const tokens = generate(account.index, account.username, account.type, account.admin, account.mod); const token = tokenGenerate(account.index, account.email, account.username, account.type, account.admin, account.mod);
//finally //finally
res.status(200).json(tokens); res.status(200).json(token);
}; };
const validateDetails = async (body) => { const validateDetails = async (body) => {
//basic formatting (with an exception for the default admin account) if (!body.email) {
if (!validateEmail(body.email) && body.email != `${process.env.ADMIN_DEFAULT_USERNAME}@${process.env.WEB_ADDRESS}`) { return 'Missing email';
return 'invalid email';
} }
//check for existing (banned) if (!body.password) {
//TODO: restore banning return 'Missing password';
}
//basic formatting (with an exception for the default admin account)
if (!validateEmail(body.email) && body.email != `${process.env.ADMIN_DEFAULT_USERNAME}@${process.env.WEB_ADDRESS}`) {
return 'Invalid email';
}
return null; return null;
} }
+2 -2
View File
@@ -1,8 +1,8 @@
const destroy = require('../utilities/token-destroy'); const tokenDestroy = require('../utilities/token-destroy');
//auth/logout //auth/logout
const route = (req, res) => { const route = (req, res) => {
destroy(req.body.token); tokenDestroy(req.body.token);
return res.status(200).end(); return res.status(200).end();
}; };
+106
View File
@@ -0,0 +1,106 @@
//libraries
const nodemailer = require('nodemailer');
const { accounts, recovery } = require('../database/models');
//utilities
const uuid = require('../utilities/uuid');
const validateEmail = require('../utilities/validate-email');
//auth/recover
const route = async (req, res) => {
//validate details
const validateErr = await validateDetails(req.body);
if (validateErr) {
return res.status(401).end(validateErr);
}
//recovery token
const token = uuid(32);
//send the recovery email
const emailErr = await sendRecoveryEmail(req.body.email, token);
if (emailErr) {
return res.status(500).send(emailErr);
}
//save the token
await recovery.upsert({
email: req.body.email,
token: token
});
//finally
res.status(200).send("Recovery email sent!");
return null;
};
const validateDetails = async (body) => {
//basic formatting
if (!validateEmail(body.email)) {
return 'Invalid email';
}
//check for existing email
const emailRecord = await accounts.findOne({
where: {
email: body.email
}
});
if (!emailRecord) {
return 'Invalid email';
}
//OK
return null;
};
const sendRecoveryEmail = async (email, token) => {
const addr = `${process.env.WEB_PROTOCOL}://${process.env.WEB_ADDRESS}/auth/reset?token=${token}`;
const msg = `Hello,
Please visit the following link to reset your password: ${addr}
If you did not request a password reset, you can safely ignore this message.
`;
let transporter, info;
//what exactly is a transport?
try {
transporter = nodemailer.createTransport({
host: process.env.MAIL_SMTP,
port: 465,
secure: true,
auth: {
user: process.env.MAIL_USERNAME,
pass: process.env.MAIL_PASSWORD
},
});
}
catch(e) {
return `failed to create a mail transport: ${e}`;
}
// send mail with defined transport object
try {
info = await transporter.sendMail({
from: `recovery@${process.env.WEB_ADDRESS}`, //WARNING: google overwrites this
to: email,
subject: 'Password Recovery',
text: msg
});
}
catch(e) {
return `failed to send validation mail: ${e}`;
}
if (info.accepted[0] != email) {
return 'recovery email failed to send';
}
return null;
};
module.exports = route;
+21
View File
@@ -0,0 +1,21 @@
const { accounts, recovery } = require('../database/models');
//auth/reset
const route = async (req, res) => {
//verify the recovery record exists
const record = await recovery.findOne({
where: {
token: req.query.token
}
});
if (!record) {
return res.status(401).end('Failed to recover a password');
}
//redirect to the front-end
res.redirect(`${process.env.WEB_PROTOCOL}://${process.env.WEB_RESET_ADDRESS}?email=${record.email}&token=${record.token}`);
return null;
};
module.exports = route;
+62
View File
@@ -0,0 +1,62 @@
//libraries
const bcrypt = require('bcryptjs');
const { accounts, recovery } = require('../database/models');
//auth/reset
const route = async (req, res) => {
//validate the given details
const validateErr = await validateDetails(req.query, req.body);
if (validateErr) {
return res.status(401).send(validateErr);
}
//generate the password hash
const hash = await bcrypt.hash(req.body.password, await bcrypt.genSalt(11));
//update the account data
await accounts.update({
hash: hash
}, {
where: {
email: req.query.email
}
})
//delete from the recovery table
await recovery.destroy({
where: {
email: req.query.email
}
});
res.status(200).end();
return null;
};
const validateDetails = async (query, body) => {
//verify the recovery record exists
const record = await recovery.findOne({
where: {
email: query.email,
token: query.token
}
});
if (!record) {
return 'Failed to recover a password';
}
//validate password
if (!body.password) {
return 'Missing password';
}
if (body.password.length < 8) {
return 'Password too short';
}
return null;
};
module.exports = route;
+14 -7
View File
@@ -6,7 +6,6 @@ const Op = Sequelize.Op;
const { accounts, pendingSignups } = require('../database/models'); const { accounts, pendingSignups } = require('../database/models');
//utilities //utilities
const uuid = require('../utilities/uuid'); const uuid = require('../utilities/uuid');
const validateEmail = require('../utilities/validate-email'); const validateEmail = require('../utilities/validate-email');
@@ -46,11 +45,11 @@ const route = async (req, res) => {
const validateDetails = async (body) => { const validateDetails = async (body) => {
//basic formatting //basic formatting
if (!validateEmail(body.email)) { if (!validateEmail(body.email)) {
return 'invalid email'; return 'Invalid email';
} }
if (!validateUsername(body.username)) { if (!validateUsername(body.username)) {
return 'invalid username'; return 'Invalid username';
} }
//check for existing (banned) //check for existing (banned)
@@ -64,23 +63,31 @@ const validateDetails = async (body) => {
}); });
if (emailRecord) { if (emailRecord) {
return 'email already exists'; return 'Email already exists';
}
if (!body.username) {
return 'Missing username';
} }
//check for existing username //check for existing username
const usernameRecord = await accounts.findOne({ const usernameRecord = await accounts.findOne({
where: { where: {
username: body.username || '' username: body.username
} }
}); });
if (usernameRecord) { if (usernameRecord) {
return 'username already exists'; return 'Username already exists';
} }
//validate password //validate password
if (!body.password) {
return 'Missing password';
}
if (body.password.length < 8) { if (body.password.length < 8) {
return 'password too short'; return 'Password too short';
} }
return null; return null;
+3 -3
View File
@@ -1,16 +1,16 @@
const jwt = require('jsonwebtoken'); const jwt = require('jsonwebtoken');
const refresh = require('../utilities/token-refresh'); const tokenRefresh = require('../utilities/token-refresh');
//auth/token //auth/token
module.exports = async (req, res) => { module.exports = async (req, res) => {
const refreshToken = req.body.token; const refreshToken = req.body.token;
return refresh(refreshToken, (err, tokens) => { return tokenRefresh(refreshToken, (err, token) => {
if (err) { if (err) {
return res.status(err).end(); return res.status(err).end();
} }
return res.status(200).send(tokens); return res.status(200).send(token);
}); });
}; };
+2 -2
View File
@@ -11,11 +11,11 @@ const route = async (req, res) => {
//check the given info //check the given info
if (!info) { if (!info) {
return res.status(401).send('validation failed'); return res.status(401).send('Validation failed');
} }
if (info.token != req.query.token) { if (info.token != req.query.token) {
return res.status(401).send('tokens do not match'); return res.status(401).send('Tokens do not match');
} }
//move data to the accounts table //move data to the accounts table
+2 -1
View File
@@ -1,5 +1,6 @@
module.exports = { module.exports = {
tokens: require('./tokens'), tokens: require('./tokens'),
accounts: require('./accounts'), accounts: require('./accounts'),
pendingSignups: require('./pending-signups') pendingSignups: require('./pending-signups'),
recovery: require('./recovery')
}; };
+6
View File
@@ -0,0 +1,6 @@
const sequelize = require('..');
module.exports = sequelize.define('recovery', {
token: 'varchar(320)',
email: 'varchar(320)'
});
+1 -1
View File
@@ -3,5 +3,5 @@ const sequelize = require('..');
module.exports = sequelize.define('tokens', { module.exports = sequelize.define('tokens', {
token: 'varchar(320)', token: 'varchar(320)',
username: 'varchar(320)' //TODO: why username? email: 'varchar(320)'
}); });
+3 -2
View File
@@ -2,9 +2,10 @@ const jwt = require('jsonwebtoken');
const { tokens } = require('../database/models'); const { tokens } = require('../database/models');
//generates a JWT token based on the given arguments //generates a JWT token based on the given arguments
module.exports = (index, username, type, admin, mod) => { module.exports = (index, email, username, type, admin, mod) => {
const content = { const content = {
index, index,
email,
username, username,
type, type,
admin, admin,
@@ -14,7 +15,7 @@ module.exports = (index, username, type, admin, mod) => {
const accessToken = jwt.sign(content, process.env.SECRET_ACCESS, { expiresIn: '10m' }); const accessToken = jwt.sign(content, process.env.SECRET_ACCESS, { expiresIn: '10m' });
const refreshToken = jwt.sign(content, process.env.SECRET_REFRESH, { expiresIn: '30d' }); const refreshToken = jwt.sign(content, process.env.SECRET_REFRESH, { expiresIn: '30d' });
tokens.create({ token: refreshToken, username: username }); tokens.create({ token: refreshToken, email: email });
return { accessToken, refreshToken }; return { accessToken, refreshToken };
}; };
+3 -3
View File
@@ -4,12 +4,12 @@ const { tokens } = require('../database/models');
const generate = require('./token-generate'); const generate = require('./token-generate');
const destroy = require('./token-destroy'); const destroy = require('./token-destroy');
module.exports = (token, callback) => { module.exports = async (token, callback) => {
if (!token) { if (!token) {
return callback(401); return callback(401);
} }
const tokenRecord = tokens.findOne({ const tokenRecord = await tokens.findOne({
where: { where: {
token: token || '' token: token || ''
} }
@@ -24,7 +24,7 @@ module.exports = (token, callback) => {
return callback(403); return callback(403);
} }
const result = generate(user.index, user.username, user.type, user.admin, user.mod); const result = generate(user.index, user.email, user.username, user.type, user.admin, user.mod);
destroy(token); destroy(token);
+1
View File
@@ -0,0 +1 @@
ALTER TABLE `accounts` CHANGE `id` `index` INT( 11 ) NOT NULL AUTO_INCREMENT;
+1
View File
@@ -0,0 +1 @@
DROP TABLE tokens;
+4 -2
View File
@@ -15,8 +15,8 @@ POST http://127.0.0.1:3200/auth/login HTTP/1.1
Content-Type: application/json Content-Type: application/json
{ {
"email": "kayneruse@gmail.com", "email": "admin@example.com",
"password": "helloworld" "password": "password"
} }
### ###
@@ -66,3 +66,5 @@ Content-Type: application/json
{ {
"password": "helloworld" "password": "helloworld"
} }
###