2021-01-22 09:29:10 -05:00
|
|
|
/*
|
|
|
|
* SPDX-FileCopyrightText: 2021 The HedgeDoc developers (see AUTHORS file)
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2021-01-15 12:53:09 -05:00
|
|
|
import { Injectable } from '@nestjs/common';
|
|
|
|
import { UsersService } from '../users/users.service';
|
|
|
|
import { User } from '../users/user.entity';
|
2021-01-22 09:29:10 -05:00
|
|
|
import { AuthToken } from './auth-token.entity';
|
|
|
|
import { AuthTokenDto } from './auth-token.dto';
|
|
|
|
import { AuthTokenWithSecretDto } from './auth-token-with-secret.dto';
|
|
|
|
import { compare, hash } from 'bcrypt';
|
|
|
|
import { NotInDBError, TokenNotValidError } from '../errors/errors';
|
|
|
|
import { randomBytes } from 'crypto';
|
|
|
|
import { InjectRepository } from '@nestjs/typeorm';
|
|
|
|
import { Repository } from 'typeorm';
|
|
|
|
import { ConsoleLoggerService } from '../logger/console-logger.service';
|
2021-01-23 15:24:11 -05:00
|
|
|
import { TimestampMillis } from '../utils/timestamp';
|
2021-01-15 12:53:09 -05:00
|
|
|
|
|
|
|
@Injectable()
|
|
|
|
export class AuthService {
|
2021-01-22 09:29:10 -05:00
|
|
|
constructor(
|
|
|
|
private readonly logger: ConsoleLoggerService,
|
|
|
|
private usersService: UsersService,
|
|
|
|
@InjectRepository(AuthToken)
|
|
|
|
private authTokenRepository: Repository<AuthToken>,
|
|
|
|
) {
|
|
|
|
this.logger.setContext(AuthService.name);
|
|
|
|
}
|
2021-01-15 12:53:09 -05:00
|
|
|
|
|
|
|
async validateToken(token: string): Promise<User> {
|
2021-01-23 15:24:11 -05:00
|
|
|
const [keyId, secret] = token.split('.');
|
|
|
|
const accessToken = await this.getAuthTokenAndValidate(keyId, secret);
|
2021-01-22 09:29:10 -05:00
|
|
|
const user = await this.usersService.getUserByUsername(
|
|
|
|
accessToken.user.userName,
|
|
|
|
);
|
2021-01-15 12:53:09 -05:00
|
|
|
if (user) {
|
2021-01-23 15:24:11 -05:00
|
|
|
await this.setLastUsedToken(keyId);
|
2021-01-15 12:53:09 -05:00
|
|
|
return user;
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
2021-01-22 09:29:10 -05:00
|
|
|
|
|
|
|
async hashPassword(cleartext: string): Promise<string> {
|
2021-01-23 13:04:00 -05:00
|
|
|
// hash the password with bcrypt and 2^12 iterations
|
2021-01-23 15:24:11 -05:00
|
|
|
// this was decided on the basis of https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#bcrypt
|
2021-01-22 09:29:10 -05:00
|
|
|
return hash(cleartext, 12);
|
|
|
|
}
|
|
|
|
|
|
|
|
async checkPassword(cleartext: string, password: string): Promise<boolean> {
|
|
|
|
return compare(cleartext, password);
|
|
|
|
}
|
|
|
|
|
2021-01-23 13:04:00 -05:00
|
|
|
async randomString(length: number): Promise<Buffer> {
|
2021-01-22 09:29:10 -05:00
|
|
|
// This is necessary as the is no base64url encoding in the toString method
|
|
|
|
// but as can be seen on https://tools.ietf.org/html/rfc4648#page-7
|
|
|
|
// base64url is quite easy buildable from base64
|
2021-01-23 13:04:00 -05:00
|
|
|
if (length <= 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return randomBytes(length);
|
|
|
|
}
|
|
|
|
|
|
|
|
BufferToBase64Url(text: Buffer): string {
|
|
|
|
return text
|
2021-01-22 09:29:10 -05:00
|
|
|
.toString('base64')
|
|
|
|
.replace('+', '-')
|
|
|
|
.replace('/', '_')
|
|
|
|
.replace(/=+$/, '');
|
|
|
|
}
|
|
|
|
|
|
|
|
async createTokenForUser(
|
|
|
|
userName: string,
|
|
|
|
identifier: string,
|
2021-01-23 15:24:11 -05:00
|
|
|
validUntil: TimestampMillis,
|
2021-01-22 09:29:10 -05:00
|
|
|
): Promise<AuthTokenWithSecretDto> {
|
|
|
|
const user = await this.usersService.getUserByUsername(userName);
|
2021-01-23 13:04:00 -05:00
|
|
|
const secret = await this.randomString(64);
|
|
|
|
const keyId = this.BufferToBase64Url(await this.randomString(8));
|
|
|
|
const accessTokenString = await this.hashPassword(secret.toString());
|
|
|
|
const accessToken = this.BufferToBase64Url(Buffer.from(accessTokenString));
|
2021-01-22 09:29:10 -05:00
|
|
|
let token;
|
2021-01-23 15:24:11 -05:00
|
|
|
if (validUntil === 0) {
|
2021-01-22 09:29:10 -05:00
|
|
|
token = AuthToken.create(user, identifier, keyId, accessToken);
|
|
|
|
} else {
|
2021-01-23 15:24:11 -05:00
|
|
|
token = AuthToken.create(
|
|
|
|
user,
|
|
|
|
identifier,
|
|
|
|
keyId,
|
|
|
|
accessToken,
|
|
|
|
new Date(validUntil),
|
|
|
|
);
|
2021-01-22 09:29:10 -05:00
|
|
|
}
|
|
|
|
const createdToken = await this.authTokenRepository.save(token);
|
|
|
|
return this.toAuthTokenWithSecretDto(createdToken, `${keyId}.${secret}`);
|
|
|
|
}
|
|
|
|
|
|
|
|
async setLastUsedToken(keyId: string) {
|
|
|
|
const accessToken = await this.authTokenRepository.findOne({
|
|
|
|
where: { keyId: keyId },
|
|
|
|
});
|
2021-01-23 15:24:11 -05:00
|
|
|
accessToken.lastUsed = new Date();
|
2021-01-22 09:29:10 -05:00
|
|
|
await this.authTokenRepository.save(accessToken);
|
|
|
|
}
|
|
|
|
|
2021-01-23 13:04:00 -05:00
|
|
|
async getAuthTokenAndValidate(
|
|
|
|
keyId: string,
|
|
|
|
token: string,
|
|
|
|
): Promise<AuthToken> {
|
2021-01-22 09:29:10 -05:00
|
|
|
const accessToken = await this.authTokenRepository.findOne({
|
|
|
|
where: { keyId: keyId },
|
|
|
|
relations: ['user'],
|
|
|
|
});
|
|
|
|
if (accessToken === undefined) {
|
|
|
|
throw new NotInDBError(`AuthToken '${token}' not found`);
|
|
|
|
}
|
|
|
|
if (!(await this.checkPassword(token, accessToken.accessTokenHash))) {
|
|
|
|
// hashes are not the same
|
|
|
|
throw new TokenNotValidError(`AuthToken '${token}' is not valid.`);
|
|
|
|
}
|
|
|
|
if (
|
|
|
|
accessToken.validUntil &&
|
2021-01-23 15:24:11 -05:00
|
|
|
accessToken.validUntil.getTime() < new Date().getTime()
|
2021-01-22 09:29:10 -05:00
|
|
|
) {
|
|
|
|
// tokens validUntil Date lies in the past
|
|
|
|
throw new TokenNotValidError(
|
|
|
|
`AuthToken '${token}' is not valid since ${new Date(
|
|
|
|
accessToken.validUntil,
|
|
|
|
)}.`,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return accessToken;
|
|
|
|
}
|
|
|
|
|
|
|
|
async getTokensByUsername(userName: string): Promise<AuthToken[]> {
|
|
|
|
const user = await this.usersService.getUserByUsername(userName, true);
|
|
|
|
if (user.authTokens === undefined) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
return user.authTokens;
|
|
|
|
}
|
|
|
|
|
2021-01-23 16:24:59 -05:00
|
|
|
async removeToken(keyId: string) {
|
2021-01-22 09:29:10 -05:00
|
|
|
const token = await this.authTokenRepository.findOne({
|
2021-01-23 16:24:59 -05:00
|
|
|
where: { keyId: keyId },
|
2021-01-22 09:29:10 -05:00
|
|
|
});
|
|
|
|
await this.authTokenRepository.remove(token);
|
|
|
|
}
|
|
|
|
|
2021-01-23 15:24:11 -05:00
|
|
|
toAuthTokenDto(authToken: AuthToken): AuthTokenDto | null {
|
2021-01-22 09:29:10 -05:00
|
|
|
if (!authToken) {
|
|
|
|
this.logger.warn(`Recieved ${authToken} argument!`, 'toAuthTokenDto');
|
|
|
|
return null;
|
|
|
|
}
|
2021-01-23 15:24:11 -05:00
|
|
|
const tokenDto: AuthTokenDto = {
|
|
|
|
lastUsed: null,
|
|
|
|
validUntil: null,
|
2021-01-22 09:29:10 -05:00
|
|
|
label: authToken.identifier,
|
|
|
|
keyId: authToken.keyId,
|
2021-01-23 15:24:11 -05:00
|
|
|
createdAt: authToken.createdAt,
|
2021-01-22 09:29:10 -05:00
|
|
|
};
|
2021-01-23 15:24:11 -05:00
|
|
|
|
|
|
|
if (authToken.validUntil) {
|
|
|
|
tokenDto.validUntil = new Date(authToken.validUntil);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (authToken.lastUsed) {
|
|
|
|
tokenDto.lastUsed = new Date(authToken.lastUsed);
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokenDto;
|
2021-01-22 09:29:10 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
toAuthTokenWithSecretDto(
|
|
|
|
authToken: AuthToken | null | undefined,
|
|
|
|
secret: string,
|
|
|
|
): AuthTokenWithSecretDto | null {
|
2021-01-23 13:04:00 -05:00
|
|
|
const tokenDto = this.toAuthTokenDto(authToken);
|
2021-01-22 09:29:10 -05:00
|
|
|
return {
|
2021-01-23 13:04:00 -05:00
|
|
|
...tokenDto,
|
2021-01-22 09:29:10 -05:00
|
|
|
secret: secret,
|
|
|
|
};
|
|
|
|
}
|
2021-01-15 12:53:09 -05:00
|
|
|
}
|