Fixed authentication.

This commit is contained in:
Tom
2025-02-19 21:23:53 +00:00
parent 16f208480d
commit a764e1d441
11 changed files with 218 additions and 108 deletions

View File

@ -1,7 +1,7 @@
import * as moment from 'moment'; import * as moment from 'moment';
import { Injectable } from '@nestjs/common'; import { Injectable } from '@nestjs/common';
import { JwtService } from '@nestjs/jwt'; import { JwtService } from '@nestjs/jwt';
import { UserEntity } from 'src/users/users.entity'; import { UserEntity } from 'src/users/entities/users.entity';
import { ConfigService } from '@nestjs/config'; import { ConfigService } from '@nestjs/config';
import { PinoLogger } from 'nestjs-pino'; import { PinoLogger } from 'nestjs-pino';
@ -22,9 +22,9 @@ export class AuthAccessService {
{ {
username: user.userLogin, username: user.userLogin,
sub: user.userId, sub: user.userId,
iat: now.getTime(), iat: Math.floor(now.getTime() / 1000),
nbf: now.getTime(), nbf: Math.floor(now.getTime() / 1000) - 5 * 60,
exp: expiration.getTime(), exp: Math.floor(expiration.getTime() / 1000),
}, },
{ {
secret: this.config.getOrThrow<string>('AUTH_JWT_ACCESS_TOKEN_SECRET'), secret: this.config.getOrThrow<string>('AUTH_JWT_ACCESS_TOKEN_SECRET'),

View File

@ -1,4 +1,4 @@
import { Controller, Request, Post, UseGuards, Body, Res } from '@nestjs/common'; import { Controller, Request, Post, UseGuards, Body, Res, Delete, Patch } from '@nestjs/common';
import { LoginAuthGuard } from './guards/login-auth.guard'; import { LoginAuthGuard } from './guards/login-auth.guard';
import { AuthService } from './auth.service'; import { AuthService } from './auth.service';
import { UsersService } from 'src/users/users.service'; import { UsersService } from 'src/users/users.service';
@ -6,7 +6,7 @@ import { RegisterUserDto } from './dto/register-user.dto';
import { Response } from 'express'; import { Response } from 'express';
import { JwtRefreshGuard } from './guards/jwt-refresh.guard'; import { JwtRefreshGuard } from './guards/jwt-refresh.guard';
import { OfflineGuard } from './guards/offline.guard'; import { OfflineGuard } from './guards/offline.guard';
import { UserEntity } from 'src/users/users.entity'; import { UserEntity } from 'src/users/entities/users.entity';
import { QueryFailedError } from 'typeorm'; import { QueryFailedError } from 'typeorm';
import { PinoLogger } from 'nestjs-pino'; import { PinoLogger } from 'nestjs-pino';
import { JwtAccessGuard } from './guards/jwt-access.guard'; import { JwtAccessGuard } from './guards/jwt-access.guard';
@ -29,6 +29,7 @@ export class AuthController {
try { try {
data = await this.auth.login(req.user); data = await this.auth.login(req.user);
if (!data.access_token || !data.refresh_token || !data.refresh_exp) { if (!data.access_token || !data.refresh_token || !data.refresh_exp) {
response.statusCode = 500;
return { return {
success: false, success: false,
error_message: 'Something went wrong with tokens while logging in.', error_message: 'Something went wrong with tokens while logging in.',
@ -42,6 +43,8 @@ export class AuthController {
msg: 'Failed to login.', msg: 'Failed to login.',
error: err, error: err,
}); });
response.statusCode = 500;
return { return {
success: false, success: false,
error_message: 'Something went wrong while logging in.', error_message: 'Something went wrong while logging in.',
@ -52,12 +55,14 @@ export class AuthController {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.exp), expires: new Date(data.exp),
sameSite: 'strict',
}); });
response.cookie('Refresh', data.refresh_token, { response.cookie('Refresh', data.refresh_token, {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.refresh_exp), expires: new Date(data.refresh_exp),
sameSite: 'strict',
}); });
this.logger.info({ this.logger.info({
@ -75,17 +80,32 @@ export class AuthController {
} }
@UseGuards(JwtAccessGuard) @UseGuards(JwtAccessGuard)
@Post('logout') @Delete('login')
async logout( async logout(
@Request() req, @Request() req,
@Res({ passthrough: true }) response: Response, @Res({ passthrough: true }) response: Response,
) { ) {
console.log('logout cookie', req.cookies?.Refresh); const accessToken = req.cookies?.Authentication;
// TODO: delete refresh token from database. const refreshToken = req.cookies?.Refresh;
// await this.auth.delete(req.cookies?.Refresh);
response.clearCookie('Refresh');
response.clearCookie('Authentication'); response.clearCookie('Authentication');
response.clearCookie('Refresh');
if (!refreshToken || !await this.auth.revoke(req.user.userId, refreshToken)) {
// User has already logged off.
this.logger.info({
class: AuthController.name,
method: this.login.name,
user: req.user,
msg: 'User has already logged off via ' + (!refreshToken ? 'cookies' : 'database'),
});
response.statusCode = 400;
return {
success: false,
error_message: 'User has already logged off.'
};
}
this.logger.info({ this.logger.info({
class: AuthController.name, class: AuthController.name,
@ -94,23 +114,33 @@ export class AuthController {
msg: 'User logged off', msg: 'User logged off',
}); });
return req.logout(); return {
success: true,
};
} }
@UseGuards(JwtRefreshGuard) @UseGuards(JwtRefreshGuard)
@Post('refresh') @Patch('login')
async refresh( async refresh(
@Request() req, @Request() req,
@Res({ passthrough: true }) response: Response, @Res({ passthrough: true }) response: Response,
) { ) {
try { this.logger.info({
const refresh_token = req.cookies.Refresh; class: AuthController.name,
const data = await this.auth.renew(req.user, refresh_token); method: this.login.name,
user: req.user,
refresh_token: req.cookies.Refresh,
msg: 'User logged in.',
});
const refreshToken = req.cookies.Refresh;
const data = await this.auth.renew(req.user, refreshToken);
response.cookie('Authentication', data.access_token, { response.cookie('Authentication', data.access_token, {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.exp), expires: new Date(data.exp),
sameSite: 'strict',
}); });
this.logger.debug({ this.logger.debug({
class: AuthController.name, class: AuthController.name,
@ -120,11 +150,12 @@ export class AuthController {
msg: 'Updated Authentication cookie for access token.', msg: 'Updated Authentication cookie for access token.',
}); });
if (data.refresh_token != refresh_token) { if (data.refresh_token != refreshToken) {
response.cookie('Refresh', data.refresh_token, { response.cookie('Refresh', data.refresh_token, {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.refresh_exp), expires: new Date(data.refresh_exp),
sameSite: 'strict',
}); });
this.logger.debug({ this.logger.debug({
class: AuthController.name, class: AuthController.name,
@ -136,19 +167,6 @@ export class AuthController {
} }
return { success: true }; return { success: true };
} catch (err) {
this.logger.error({
class: AuthController.name,
method: this.refresh.name,
user: req.user,
msg: 'Failed to refresh tokens.',
error: err,
});
return {
success: false,
error_message: 'Something went wrong.',
};
}
} }
@UseGuards(OfflineGuard) @UseGuards(OfflineGuard)
@ -178,6 +196,8 @@ export class AuthController {
user: req.user, user: req.user,
msg: 'Failed to register due to duplicate userLogin.', msg: 'Failed to register due to duplicate userLogin.',
}); });
response.statusCode = 400;
return { return {
success: false, success: false,
error_message: 'Username already exist.', error_message: 'Username already exist.',
@ -191,6 +211,8 @@ export class AuthController {
msg: 'Failed to register.', msg: 'Failed to register.',
error: err, error: err,
}); });
response.statusCode = 500;
return { return {
success: false, success: false,
error_message: 'Something went wrong when creating user.', error_message: 'Something went wrong when creating user.',
@ -208,6 +230,8 @@ export class AuthController {
refresh_token: data.refresh_token, refresh_token: data.refresh_token,
msg: 'Failed to generate tokens after registering.', msg: 'Failed to generate tokens after registering.',
}); });
response.statusCode = 500;
return { return {
success: false, success: false,
error_message: 'Something went wrong with tokens while logging in.', error_message: 'Something went wrong with tokens while logging in.',
@ -221,6 +245,8 @@ export class AuthController {
msg: 'Failed to login after registering.', msg: 'Failed to login after registering.',
error: err, error: err,
}); });
response.statusCode = 500;
return { return {
success: false, success: false,
error_message: 'Something went wrong while logging in.', error_message: 'Something went wrong while logging in.',
@ -231,12 +257,14 @@ export class AuthController {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.exp), expires: new Date(data.exp),
sameSite: 'strict',
}); });
response.cookie('Refresh', data.refresh_token, { response.cookie('Refresh', data.refresh_token, {
httpOnly: true, httpOnly: true,
secure: true, secure: true,
expires: new Date(data.refresh_exp), expires: new Date(data.refresh_exp),
sameSite: 'strict',
}); });
return { return {

View File

@ -12,13 +12,14 @@ import { AuthRefreshService } from './auth.refresh.service';
import { TypeOrmModule } from '@nestjs/typeorm'; import { TypeOrmModule } from '@nestjs/typeorm';
import { AuthRefreshTokenEntity } from './entities/auth.refresh-token.entity'; import { AuthRefreshTokenEntity } from './entities/auth.refresh-token.entity';
import { AuthAccessService } from './auth.access.service'; import { AuthAccessService } from './auth.access.service';
import { JwtRefreshStrategy } from './strategies/jwt-refresh.strategy';
@Module({ @Module({
imports: [ imports: [
TypeOrmModule.forFeature([AuthRefreshTokenEntity]), TypeOrmModule.forFeature([AuthRefreshTokenEntity]),
ConfigModule, ConfigModule,
UsersModule, UsersModule,
PassportModule, PassportModule.register({ session: false }),
JwtModule.registerAsync({ JwtModule.registerAsync({
imports: [ConfigModule], imports: [ConfigModule],
extraProviders: [ConfigService], extraProviders: [ConfigService],
@ -35,6 +36,7 @@ import { AuthAccessService } from './auth.access.service';
AuthRefreshService, AuthRefreshService,
AuthService, AuthService,
JwtStrategy, JwtStrategy,
JwtRefreshStrategy,
LoginStrategy, LoginStrategy,
], ],
controllers: [AuthController] controllers: [AuthController]

View File

@ -5,7 +5,7 @@ import { ConfigService } from '@nestjs/config';
import { JwtService } from '@nestjs/jwt'; import { JwtService } from '@nestjs/jwt';
import { InjectRepository } from '@nestjs/typeorm'; import { InjectRepository } from '@nestjs/typeorm';
import { UUID } from 'crypto'; import { UUID } from 'crypto';
import { UserEntity } from 'src/users/users.entity'; import { UserEntity } from 'src/users/entities/users.entity';
import { Repository } from 'typeorm'; import { Repository } from 'typeorm';
import { AuthRefreshTokenEntity } from './entities/auth.refresh-token.entity'; import { AuthRefreshTokenEntity } from './entities/auth.refresh-token.entity';
import { PinoLogger } from 'nestjs-pino'; import { PinoLogger } from 'nestjs-pino';
@ -20,7 +20,6 @@ export class AuthRefreshService {
private logger: PinoLogger, private logger: PinoLogger,
) { } ) { }
async generate(user: UserEntity, refreshToken?: string) { async generate(user: UserEntity, refreshToken?: string) {
let expiration: Date | null = null; let expiration: Date | null = null;
if (refreshToken) { if (refreshToken) {
@ -35,7 +34,7 @@ export class AuthRefreshService {
}); });
throw new UnauthorizedException('Invalid refresh token.'); throw new UnauthorizedException('Invalid refresh token.');
} }
if (token.exp.getTime() > new Date().getTime()) { if (token.exp.getTime() < new Date().getTime()) {
this.logger.warn({ this.logger.warn({
class: AuthRefreshService.name, class: AuthRefreshService.name,
method: this.generate.name, method: this.generate.name,
@ -55,13 +54,12 @@ export class AuthRefreshService {
// - token has reached expiration threshold; // - token has reached expiration threshold;
// - token has expired. // - token has expired.
const now = new Date(); const now = new Date();
const expirationTime = parseInt(this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_EXPIRATION_MS'));
const threshhold = parseInt(this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_EXPIRATION_THRESHHOLD_MS')); const threshhold = parseInt(this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_EXPIRATION_THRESHHOLD_MS'));
if (!refreshToken || now.getTime() - expiration.getTime() > threshhold) { if (!refreshToken || expirationTime - (expiration.getTime() - now.getTime()) > threshhold) {
let deletionTask = null;
if (refreshToken) { if (refreshToken) {
this.authRefreshTokenRepository.delete({ deletionTask = this.revoke(user.userId, refreshToken);
tokenHash: refreshToken,
userId: user.userId,
});
this.logger.debug({ this.logger.debug({
class: AuthRefreshService.name, class: AuthRefreshService.name,
@ -73,15 +71,14 @@ export class AuthRefreshService {
}); });
} }
const limit = parseInt(this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_EXPIRATION_MS')); expiration = moment(now).add(expirationTime, 'ms').toDate();
expiration = moment(now).add(limit, 'ms').toDate();
refreshToken = await this.jwts.signAsync( refreshToken = await this.jwts.signAsync(
{ {
username: user.userLogin, username: user.userLogin,
sub: user.userId, sub: user.userId,
iat: now.getTime(), iat: Math.floor(now.getTime() / 1000),
nbf: now.getTime(), nbf: Math.floor(now.getTime() / 1000) - 5 * 60,
exp: expiration.getTime(), exp: Math.floor(expiration.getTime() / 1000),
}, },
{ {
secret: this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_SECRET'), secret: this.config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_SECRET'),
@ -98,7 +95,7 @@ export class AuthRefreshService {
}); });
this.authRefreshTokenRepository.insert({ this.authRefreshTokenRepository.insert({
tokenHash: refreshToken, tokenHash: this.hash(refreshToken),
userId: user.userId, userId: user.userId,
exp: expiration exp: expiration
}); });
@ -109,8 +106,10 @@ export class AuthRefreshService {
user, user,
refresh_token: refreshToken, refresh_token: refreshToken,
exp: expiration, exp: expiration,
msg: 'Inserted the new refresh token.', msg: 'Inserted the new refresh token into the database.',
}); });
await deletionTask;
} }
return { return {
@ -127,15 +126,28 @@ export class AuthRefreshService {
return null; return null;
} }
const buffer = Buffer.from(refreshToken, 'utf8');
const hash = crypto.createHash('sha256').update(buffer).digest('base64');
return await this.authRefreshTokenRepository.findOneBy({ return await this.authRefreshTokenRepository.findOneBy({
tokenHash: hash, tokenHash: this.hash(refreshToken),
userId: userId, userId: userId,
}); });
} }
private hash(refreshToken: string): string {
const buffer = Buffer.from(refreshToken, 'utf8');
return crypto.createHash('sha256').update(buffer).digest('base64');
}
async revoke(userId: UUID, refreshToken: string) {
if (!userId || !refreshToken) {
return null;
}
return await this.authRefreshTokenRepository.delete({
userId,
tokenHash: this.hash(refreshToken),
});
}
async validate( async validate(
refreshToken: string, refreshToken: string,
userId: UUID, userId: UUID,

View File

@ -1,8 +1,9 @@
import { Injectable } from '@nestjs/common'; import { Injectable } from '@nestjs/common';
import { UserEntity } from 'src/users/users.entity'; import { UserEntity } from 'src/users/entities/users.entity';
import { UsersService } from 'src/users/users.service'; import { UsersService } from 'src/users/users.service';
import { AuthRefreshService } from './auth.refresh.service'; import { AuthRefreshService } from './auth.refresh.service';
import { AuthAccessService } from './auth.access.service'; import { AuthAccessService } from './auth.access.service';
import { UUID } from 'crypto';
@Injectable() @Injectable()
export class AuthService { export class AuthService {
@ -26,17 +27,20 @@ export class AuthService {
async renew( async renew(
user: UserEntity, user: UserEntity,
refresh_token: string refresh_token: string | null
): Promise<AuthenticationDto> { ): Promise<AuthenticationDto | null> {
const new_refresh_data = await this.refreshTokens.generate(user, refresh_token); const new_refresh_data = await this.refreshTokens.generate(user, refresh_token);
const new_refresh_token = new_refresh_data.refresh_token;
const new_refresh_exp = new_refresh_data.exp;
const access_token = await this.accessTokens.generate(user); const access_token = await this.accessTokens.generate(user);
return { return {
...access_token, ...access_token,
refresh_token: new_refresh_token, refresh_token: new_refresh_data.refresh_token,
refresh_exp: new_refresh_exp, refresh_exp: new_refresh_data.exp,
} }
} }
async revoke(userId: UUID, refreshToken: string): Promise<boolean> {
const res = await this.refreshTokens.revoke(userId, refreshToken);
return res?.affected === 1
}
} }

View File

@ -1,20 +1,16 @@
import * as crypto from 'crypto'; import * as crypto from 'crypto';
import { IsNotEmpty } from 'class-validator';
import { UUID } from 'crypto'; import { UUID } from 'crypto';
import { BeforeInsert, Column, Entity, PrimaryColumn } from 'typeorm'; import { BeforeInsert, Column, Entity, PrimaryColumn } from 'typeorm';
@Entity("refresh_tokens") @Entity("refresh_tokens")
export class AuthRefreshTokenEntity { export class AuthRefreshTokenEntity {
@PrimaryColumn({ name: 'user_id' }) @PrimaryColumn({ name: 'user_id' })
@IsNotEmpty()
readonly userId: UUID; readonly userId: UUID;
@PrimaryColumn({ name: 'refresh_token_hash' }) @PrimaryColumn({ name: 'refresh_token_hash' })
@IsNotEmpty()
tokenHash: string; tokenHash: string;
@Column() @Column({ name: 'exp' })
@IsNotEmpty()
exp: Date; exp: Date;
@BeforeInsert() @BeforeInsert()

View File

@ -1,17 +1,10 @@
import { ExecutionContext, Injectable, UnauthorizedException } from '@nestjs/common'; import { Injectable, UnauthorizedException } from '@nestjs/common';
import { AuthGuard } from '@nestjs/passport'; import { AuthGuard } from '@nestjs/passport';
@Injectable() @Injectable()
export class JwtAccessAdminGuard extends AuthGuard('jwt') { export class JwtAccessAdminGuard extends AuthGuard('jwt-access') {
canActivate(context: ExecutionContext) {
// Add your custom authentication logic here
// for example, call super.logIn(request) to establish a session.
return super.canActivate(context);
}
handleRequest(err, user, info) { handleRequest(err, user, info) {
// You can throw an exception based on either "info" or "err" arguments
if (err || !user || !user.isAdmin) { if (err || !user || !user.isAdmin) {
throw err || new UnauthorizedException(); throw err || new UnauthorizedException();
} }

View File

@ -1,6 +1,13 @@
import { Injectable } from '@nestjs/common'; import { Injectable, UnauthorizedException } from '@nestjs/common';
import { AuthGuard } from '@nestjs/passport'; import { AuthGuard } from '@nestjs/passport';
@Injectable() @Injectable()
export class JwtAccessGuard extends AuthGuard('jwt') { } export class JwtAccessGuard extends AuthGuard('jwt-access') {
handleRequest(err, user, info) {
if (err || !user || !user.isAdmin) {
throw err || new UnauthorizedException();
}
return user;
}
}

View File

@ -1,25 +1,54 @@
import { ExtractJwt, Strategy } from 'passport-jwt'; import { ExtractJwt, Strategy } from 'passport-jwt';
import { PassportStrategy } from '@nestjs/passport'; import { PassportStrategy } from '@nestjs/passport';
import { Injectable } from '@nestjs/common'; import { Injectable, UnauthorizedException } from '@nestjs/common';
import { ConfigService } from '@nestjs/config'; import { ConfigService } from '@nestjs/config';
import { AuthRefreshService } from '../auth.refresh.service'; import { AuthRefreshService } from '../auth.refresh.service';
import { Request } from 'express'; import { Request } from 'express';
import { UsersService } from 'src/users/users.service';
@Injectable() @Injectable()
export class JwtRefreshStrategy extends PassportStrategy(Strategy, 'jwt-refresh') { export class JwtRefreshStrategy extends PassportStrategy(Strategy, 'jwt-refresh') {
constructor(private auth: AuthRefreshService, private config: ConfigService) { constructor(private auth: AuthRefreshService, private users: UsersService, private config: ConfigService) {
super({ super({
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(), jwtFromRequest: ExtractJwt.fromExtractors([
//ExtractJwt.fromAuthHeaderAsBearerToken(),
JwtRefreshStrategy.extract,
]),
ignoreExpiration: false, ignoreExpiration: false,
secretOrKey: config.get<string>('AUTH_JWT_REFRESH_SECRET'), secretOrKey: config.getOrThrow<string>('AUTH_JWT_REFRESH_TOKEN_SECRET'),
issuer: config.getOrThrow<string>('AUTH_JWT_ISSUER'), issuer: config.getOrThrow<string>('AUTH_JWT_ISSUER'),
audience: config.getOrThrow<string>('AUTH_JWT_AUDIENCE'), audience: config.getOrThrow<string>('AUTH_JWT_AUDIENCE'),
passReqToCallback: true, passReqToCallback: true,
}); });
} }
private static extract(req: any): string | null {
const jwt = req.cookies?.Refresh;
if (!jwt)
return null;
return jwt;
}
async validate(request: Request, payload: any) { async validate(request: Request, payload: any) {
return this.auth.validate(request.cookies?.Refresh, payload.sub); const user = await this.users.findById(payload.sub);
if (!user || user.userLogin != payload.username) {
throw new UnauthorizedException();
}
if (payload.iss != this.config.getOrThrow('AUTH_JWT_ISSUER')) {
throw new UnauthorizedException();
}
if (payload.aud != this.config.getOrThrow('AUTH_JWT_AUDIENCE')) {
throw new UnauthorizedException();
}
const refreshToken = request.cookies?.Refresh;
if (!refreshToken || !this.auth.validate(refreshToken, payload.sub)) {
throw new UnauthorizedException();
}
return user;
} }
} }

View File

@ -6,21 +6,43 @@ import { ConfigService } from '@nestjs/config';
import { UsersService } from 'src/users/users.service'; import { UsersService } from 'src/users/users.service';
@Injectable() @Injectable()
export class JwtStrategy extends PassportStrategy(Strategy, 'jwt') { export class JwtStrategy extends PassportStrategy(Strategy, 'jwt-access') {
constructor(private users: UsersService, private config: ConfigService) { constructor(private users: UsersService, private config: ConfigService) {
super({ super({
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(), jwtFromRequest: ExtractJwt.fromExtractors([
//ExtractJwt.fromAuthHeaderAsBearerToken(),
JwtStrategy.extract,
]),
ignoreExpiration: false, ignoreExpiration: false,
secretOrKey: config.getOrThrow<string>('AUTH_JWT_ACCESS_TOKEN_SECRET'), secretOrKey: config.getOrThrow<string>('AUTH_JWT_ACCESS_TOKEN_SECRET'),
issuer: config.getOrThrow<string>('AUTH_JWT_ISSUER'), issuer: config.getOrThrow<string>('AUTH_JWT_ISSUER'),
audience: config.getOrThrow<string>('AUTH_JWT_AUDIENCE'), audience: config.getOrThrow<string>('AUTH_JWT_AUDIENCE'),
passReqToCallback: true,
}); });
} }
async validate(req: Request, payload: any) { private static extract(req: any): string | null {
const jwt = req.cookies?.Authentication;
if (!jwt)
return null;
return jwt;
}
async validate(payload: any) {
if (!payload) {
throw new UnauthorizedException();
}
if (payload.iss != this.config.getOrThrow('AUTH_JWT_ISSUER')) {
throw new UnauthorizedException();
}
if (payload.aud != this.config.getOrThrow('AUTH_JWT_AUDIENCE')) {
throw new UnauthorizedException();
}
const user = await this.users.findById(payload.sub); const user = await this.users.findById(payload.sub);
if (!user) { if (!user || user.userLogin != payload.username) {
throw new UnauthorizedException(); throw new UnauthorizedException();
} }
return user; return user;

View File

@ -1,4 +1,4 @@
import { UserEntity } from "./users/users.entity"; import { UserEntity } from "./users/entities/users.entity";
export function serialize_user_short(value: UserEntity) { export function serialize_user_short(value: UserEntity) {
if (!value) { if (!value) {
@ -29,13 +29,29 @@ export function serialize_req(value) {
return value; return value;
} }
value = { ...value };
delete value['remoteAddress'] delete value['remoteAddress']
delete value['remotePort'] delete value['remotePort']
if (value.headers) { if (value.headers) {
const headers = value.headers; const headers = value.headers = { ...value.headers };
if (headers['Authorization']) { if (headers['authorization']) {
headers['Authorization'] = headers['Authorization'].substring(Math.max(0, headers['Authorization'].length - 12)) headers['authorization'] = '...' + headers['authorization'].substring(Math.max(0, headers['authorization'].length - 16))
}
if (headers['cookie']) {
const cookies = headers['cookie'].split(';')
.map((c: string) => {
c = c.trim();
const index = c.indexOf('=');
if (index < 0)
return c;
const cookieValue = c.substring(index + 1);
return c.substring(0, index) + '=...' + cookieValue.substring(Math.max(cookieValue.length - 16, cookieValue.length / 2));
});
headers['cookie'] = cookies.join('; ');
} }
} }
return value; return value;
@ -46,7 +62,8 @@ export function serialize_res(value) {
return value; return value;
} }
const headers = value.headers; value = { ...value };
const headers = value.headers = { ...value.headers };
delete headers['x-powered-by']; delete headers['x-powered-by'];
if (headers['set-cookie']) { if (headers['set-cookie']) {