|
| 1 | +"use strict"; |
| 2 | +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { |
| 3 | + if (k2 === undefined) k2 = k; |
| 4 | + var desc = Object.getOwnPropertyDescriptor(m, k); |
| 5 | + if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { |
| 6 | + desc = { enumerable: true, get: function() { return m[k]; } }; |
| 7 | + } |
| 8 | + Object.defineProperty(o, k2, desc); |
| 9 | +}) : (function(o, m, k, k2) { |
| 10 | + if (k2 === undefined) k2 = k; |
| 11 | + o[k2] = m[k]; |
| 12 | +})); |
| 13 | +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { |
| 14 | + Object.defineProperty(o, "default", { enumerable: true, value: v }); |
| 15 | +}) : function(o, v) { |
| 16 | + o["default"] = v; |
| 17 | +}); |
| 18 | +var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) { |
| 19 | + var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d; |
| 20 | + if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc); |
| 21 | + else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r; |
| 22 | + return c > 3 && r && Object.defineProperty(target, key, r), r; |
| 23 | +}; |
| 24 | +var __importStar = (this && this.__importStar) || function (mod) { |
| 25 | + if (mod && mod.__esModule) return mod; |
| 26 | + var result = {}; |
| 27 | + if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); |
| 28 | + __setModuleDefault(result, mod); |
| 29 | + return result; |
| 30 | +}; |
| 31 | +var __param = (this && this.__param) || function (paramIndex, decorator) { |
| 32 | + return function (target, key) { decorator(target, key, paramIndex); } |
| 33 | +}; |
| 34 | +Object.defineProperty(exports, "__esModule", { value: true }); |
| 35 | +exports.Authenticator = void 0; |
| 36 | +const inversify_1 = require("inversify"); |
| 37 | +const inversify_express_utils_1 = require("inversify-express-utils"); |
| 38 | +const qrcode = __importStar(require("qrcode")); |
| 39 | +const time2fa_1 = require("time2fa"); |
| 40 | +const LoggedCheck_1 = require("../middlewares/LoggedCheck"); |
| 41 | +const GenKey_1 = require("../utils/GenKey"); |
| 42 | +const Jwt_1 = require("../utils/Jwt"); |
| 43 | +function handleError(res, error, message, status = 500) { |
| 44 | + const msg = error instanceof Error ? error.message : String(error); |
| 45 | + res.status(status).send({ message, error: msg }); |
| 46 | +} |
| 47 | +let Authenticator = class Authenticator { |
| 48 | + constructor(userService, logService) { |
| 49 | + this.userService = userService; |
| 50 | + this.logService = logService; |
| 51 | + } |
| 52 | + async logAction(req, action, statusCode, metadata) { |
| 53 | + try { |
| 54 | + const requestBody = { ...req.body }; |
| 55 | + if (metadata) |
| 56 | + requestBody.metadata = metadata; |
| 57 | + await this.logService.createLog({ |
| 58 | + ip_address: req.headers['x-real-ip'] || req.socket.remoteAddress, |
| 59 | + table_name: 'authenticator', |
| 60 | + controller: `AuthenticatorController.${action}`, |
| 61 | + original_path: req.originalUrl, |
| 62 | + http_method: req.method, |
| 63 | + request_body: requestBody, |
| 64 | + user_id: req.user?.user_id, |
| 65 | + status_code: statusCode, |
| 66 | + }); |
| 67 | + } |
| 68 | + catch (error) { |
| 69 | + console.error('Error creating log:', error); |
| 70 | + } |
| 71 | + } |
| 72 | + async verifyKey(req, res) { |
| 73 | + const { code, userId } = req.body; |
| 74 | + if (!userId) { |
| 75 | + await this.logAction(req, 'verifyKey', 400); |
| 76 | + return res.status(400).send({ message: 'User ID is required' }); |
| 77 | + } |
| 78 | + try { |
| 79 | + const user = await this.userService.getUser(userId); |
| 80 | + if (!user) { |
| 81 | + await this.logAction(req, 'verifyKey', 404); |
| 82 | + return res.status(404).send({ message: 'User not found' }); |
| 83 | + } |
| 84 | + const key = user.authenticator_secret; |
| 85 | + if (!key || !code) { |
| 86 | + await this.logAction(req, 'verifyKey', 400); |
| 87 | + return res.status(400).send({ message: 'Key and code are required' }); |
| 88 | + } |
| 89 | + const isValid = time2fa_1.Totp.validate({ secret: key, passcode: code }); |
| 90 | + if (isValid) { |
| 91 | + await this.logAction(req, 'verifyKey', 200); |
| 92 | + const apiKey = (0, GenKey_1.genKey)(user.user_id); |
| 93 | + const jwtToken = (0, Jwt_1.generateUserJwt)(user, apiKey); |
| 94 | + return res.status(200).send({ message: 'Key verified successfully', token: jwtToken }); |
| 95 | + } |
| 96 | + else { |
| 97 | + await this.logAction(req, 'verifyKey', 400); |
| 98 | + return res.status(400).send({ message: 'Invalid key or code' }); |
| 99 | + } |
| 100 | + } |
| 101 | + catch (error) { |
| 102 | + await this.logAction(req, 'verifyKey', 500, { error }); |
| 103 | + handleError(res, error, 'Error verifying key'); |
| 104 | + } |
| 105 | + } |
| 106 | + async handleAuthenticatorActions(req, res) { |
| 107 | + const action = req.params.action; |
| 108 | + const user = req.user; |
| 109 | + try { |
| 110 | + switch (action) { |
| 111 | + case 'generateKey': { |
| 112 | + if (!user || !user.email) { |
| 113 | + await this.logAction(req, 'generateKey', 400); |
| 114 | + return res.status(400).send({ message: 'User not authenticated or email missing' }); |
| 115 | + } |
| 116 | + const key = time2fa_1.Totp.generateKey({ issuer: 'Croissant API', user: user.email }); |
| 117 | + qrcode.toDataURL(key.url, async (err, url) => { |
| 118 | + if (err) { |
| 119 | + await this.logAction(req, 'generateKey', 500, { error: err }); |
| 120 | + return res.status(500).send({ message: 'Error generating QR code' }); |
| 121 | + } |
| 122 | + await this.logAction(req, 'generateKey', 200); |
| 123 | + res.status(200).send({ key, qrCode: url }); |
| 124 | + }); |
| 125 | + break; |
| 126 | + } |
| 127 | + case 'registerKey': { |
| 128 | + const { key: regKey, passcode } = req.body; |
| 129 | + if (!user || !user.email || !regKey) { |
| 130 | + await this.logAction(req, 'registerKey', 400); |
| 131 | + return res.status(400).send({ message: 'User not authenticated, email missing, or key missing' }); |
| 132 | + } |
| 133 | + if (!passcode) { |
| 134 | + await this.logAction(req, 'registerKey', 400); |
| 135 | + return res.status(400).send({ message: 'Passcode is required' }); |
| 136 | + } |
| 137 | + if (!time2fa_1.Totp.validate({ secret: regKey.secret, passcode })) { |
| 138 | + await this.logAction(req, 'registerKey', 400); |
| 139 | + return res.status(400).send({ message: 'Invalid passcode' }); |
| 140 | + } |
| 141 | + await this.userService.setAuthenticatorSecret(user.user_id, regKey.secret); |
| 142 | + await this.logAction(req, 'registerKey', 200); |
| 143 | + res.status(200).send({ message: 'Key registered successfully' }); |
| 144 | + break; |
| 145 | + } |
| 146 | + case 'delete': { |
| 147 | + if (!user || !user.email) { |
| 148 | + await this.logAction(req, 'deleteKey', 400); |
| 149 | + return res.status(400).send({ message: 'User not authenticated or email missing' }); |
| 150 | + } |
| 151 | + await this.userService.setAuthenticatorSecret(user.user_id, null); |
| 152 | + await this.logAction(req, 'deleteKey', 200); |
| 153 | + res.status(200).send({ message: 'Google Authenticator deleted successfully' }); |
| 154 | + break; |
| 155 | + } |
| 156 | + default: |
| 157 | + res.status(404).send({ message: 'Unknown action' }); |
| 158 | + } |
| 159 | + } |
| 160 | + catch (error) { |
| 161 | + await this.logAction(req, action, 500, { error }); |
| 162 | + handleError(res, error, `Error in ${action}`); |
| 163 | + } |
| 164 | + } |
| 165 | +}; |
| 166 | +exports.Authenticator = Authenticator; |
| 167 | +__decorate([ |
| 168 | + (0, inversify_express_utils_1.httpPost)('/verifyKey') |
| 169 | +], Authenticator.prototype, "verifyKey", null); |
| 170 | +__decorate([ |
| 171 | + (0, inversify_express_utils_1.httpPost)('/:action', LoggedCheck_1.LoggedCheck.middleware) |
| 172 | +], Authenticator.prototype, "handleAuthenticatorActions", null); |
| 173 | +exports.Authenticator = Authenticator = __decorate([ |
| 174 | + (0, inversify_express_utils_1.controller)('/authenticator'), |
| 175 | + __param(0, (0, inversify_1.inject)('UserService')), |
| 176 | + __param(1, (0, inversify_1.inject)('LogService')) |
| 177 | +], Authenticator); |
0 commit comments