@digitaldefiance/node-express-suite 3.6.13 → 3.6.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (859) hide show
  1. package/package.json +9 -8
  2. package/src/__tests__/fixtures/index.d.ts +2 -0
  3. package/src/__tests__/fixtures/index.d.ts.map +1 -0
  4. package/src/__tests__/fixtures/index.js +5 -0
  5. package/src/__tests__/fixtures/index.js.map +1 -0
  6. package/src/__tests__/fixtures/model-mocks.mock.d.ts +6 -0
  7. package/src/__tests__/fixtures/model-mocks.mock.d.ts.map +1 -0
  8. package/src/__tests__/fixtures/model-mocks.mock.js +94 -0
  9. package/src/__tests__/fixtures/model-mocks.mock.js.map +1 -0
  10. package/src/__tests__/helpers/application.mock.d.ts +8 -0
  11. package/src/__tests__/helpers/application.mock.d.ts.map +1 -0
  12. package/src/__tests__/helpers/application.mock.js +77 -0
  13. package/src/__tests__/helpers/application.mock.js.map +1 -0
  14. package/src/__tests__/helpers/{index.ts → index.d.ts} +2 -1
  15. package/src/__tests__/helpers/index.d.ts.map +1 -0
  16. package/src/__tests__/helpers/index.js +7 -0
  17. package/src/__tests__/helpers/index.js.map +1 -0
  18. package/src/__tests__/helpers/setup-test-env.d.ts +12 -0
  19. package/src/__tests__/helpers/setup-test-env.d.ts.map +1 -0
  20. package/src/__tests__/helpers/setup-test-env.js +119 -0
  21. package/src/__tests__/helpers/setup-test-env.js.map +1 -0
  22. package/src/__tests__/index.d.ts +3 -0
  23. package/src/__tests__/index.d.ts.map +1 -0
  24. package/src/__tests__/index.js +6 -0
  25. package/src/__tests__/index.js.map +1 -0
  26. package/src/application-base.d.ts +122 -0
  27. package/src/application-base.d.ts.map +1 -0
  28. package/src/application-base.js +355 -0
  29. package/src/application-base.js.map +1 -0
  30. package/src/application-concrete.d.ts +12 -0
  31. package/src/application-concrete.d.ts.map +1 -0
  32. package/src/application-concrete.js +21 -0
  33. package/src/application-concrete.js.map +1 -0
  34. package/src/application.d.ts +28 -0
  35. package/src/application.d.ts.map +1 -0
  36. package/src/application.js +167 -0
  37. package/src/application.js.map +1 -0
  38. package/src/backup-code.d.ts +68 -0
  39. package/src/backup-code.d.ts.map +1 -0
  40. package/src/backup-code.js +238 -0
  41. package/src/backup-code.js.map +1 -0
  42. package/src/builders/application-builder.d.ts +34 -0
  43. package/src/builders/application-builder.d.ts.map +1 -0
  44. package/src/builders/application-builder.js +64 -0
  45. package/src/builders/application-builder.js.map +1 -0
  46. package/src/builders/{index.ts → index.d.ts} +1 -0
  47. package/src/builders/index.d.ts.map +1 -0
  48. package/src/builders/index.js +5 -0
  49. package/src/builders/index.js.map +1 -0
  50. package/src/constants.d.ts +16 -0
  51. package/src/constants.d.ts.map +1 -0
  52. package/src/constants.js +58 -0
  53. package/src/constants.js.map +1 -0
  54. package/src/container/{index.ts → index.d.ts} +1 -0
  55. package/src/container/index.d.ts.map +1 -0
  56. package/src/container/index.js +6 -0
  57. package/src/container/index.js.map +1 -0
  58. package/src/container/service-container.d.ts +11 -0
  59. package/src/container/service-container.d.ts.map +1 -0
  60. package/src/container/service-container.js +38 -0
  61. package/src/container/service-container.js.map +1 -0
  62. package/src/container/service-definitions.d.ts +11 -0
  63. package/src/container/service-definitions.d.ts.map +1 -0
  64. package/src/container/service-definitions.js +13 -0
  65. package/src/container/service-definitions.js.map +1 -0
  66. package/src/controllers/base.d.ts +66 -0
  67. package/src/controllers/base.d.ts.map +1 -0
  68. package/src/controllers/base.js +305 -0
  69. package/src/controllers/base.js.map +1 -0
  70. package/src/controllers/{index.ts → index.d.ts} +1 -0
  71. package/src/controllers/index.d.ts.map +1 -0
  72. package/src/controllers/index.js +6 -0
  73. package/src/controllers/index.js.map +1 -0
  74. package/src/controllers/user.d.ts +46 -0
  75. package/src/controllers/user.d.ts.map +1 -0
  76. package/src/controllers/user.js +918 -0
  77. package/src/controllers/user.js.map +1 -0
  78. package/src/database/{database-initializer.ts → database-initializer.d.ts} +3 -3
  79. package/src/database/database-initializer.d.ts.map +1 -0
  80. package/src/database/database-initializer.js +3 -0
  81. package/src/database/database-initializer.js.map +1 -0
  82. package/src/database/{index.ts → index.d.ts} +1 -0
  83. package/src/database/index.d.ts.map +1 -0
  84. package/src/database/index.js +5 -0
  85. package/src/database/index.js.map +1 -0
  86. package/src/decorators/base-controller.d.ts +10 -0
  87. package/src/decorators/base-controller.d.ts.map +1 -0
  88. package/src/decorators/base-controller.js +60 -0
  89. package/src/decorators/base-controller.js.map +1 -0
  90. package/src/decorators/controller.d.ts +38 -0
  91. package/src/decorators/controller.d.ts.map +1 -0
  92. package/src/decorators/controller.js +67 -0
  93. package/src/decorators/controller.js.map +1 -0
  94. package/src/decorators/{index.ts → index.d.ts} +1 -0
  95. package/src/decorators/index.d.ts.map +1 -0
  96. package/src/decorators/index.js +7 -0
  97. package/src/decorators/index.js.map +1 -0
  98. package/src/decorators/zod-validation.d.ts +5 -0
  99. package/src/decorators/zod-validation.d.ts.map +1 -0
  100. package/src/decorators/zod-validation.js +47 -0
  101. package/src/decorators/zod-validation.js.map +1 -0
  102. package/src/defaults.d.ts +7 -0
  103. package/src/defaults.d.ts.map +1 -0
  104. package/src/defaults.js +202 -0
  105. package/src/defaults.js.map +1 -0
  106. package/src/documents/base.d.ts +4 -0
  107. package/src/documents/base.d.ts.map +1 -0
  108. package/src/documents/base.js +3 -0
  109. package/src/documents/base.js.map +1 -0
  110. package/src/documents/{email-token.ts → email-token.d.ts} +3 -9
  111. package/src/documents/email-token.d.ts.map +1 -0
  112. package/src/documents/email-token.js +3 -0
  113. package/src/documents/email-token.js.map +1 -0
  114. package/src/documents/{index.ts → index.d.ts} +1 -0
  115. package/src/documents/index.d.ts.map +1 -0
  116. package/src/documents/index.js +3 -0
  117. package/src/documents/index.js.map +1 -0
  118. package/src/documents/{mnemonic.ts → mnemonic.d.ts} +2 -5
  119. package/src/documents/mnemonic.d.ts.map +1 -0
  120. package/src/documents/mnemonic.js +3 -0
  121. package/src/documents/mnemonic.js.map +1 -0
  122. package/src/documents/{role.ts → role.d.ts} +2 -5
  123. package/src/documents/role.d.ts.map +1 -0
  124. package/src/documents/role.js +3 -0
  125. package/src/documents/role.js.map +1 -0
  126. package/src/documents/{used-direct-login-token.ts → used-direct-login-token.d.ts} +2 -5
  127. package/src/documents/used-direct-login-token.d.ts.map +1 -0
  128. package/src/documents/used-direct-login-token.js +3 -0
  129. package/src/documents/used-direct-login-token.js.map +1 -0
  130. package/src/documents/{user-role.ts → user-role.d.ts} +2 -5
  131. package/src/documents/user-role.d.ts.map +1 -0
  132. package/src/documents/user-role.js +3 -0
  133. package/src/documents/user-role.js.map +1 -0
  134. package/src/documents/{user.ts → user.d.ts} +2 -5
  135. package/src/documents/user.d.ts.map +1 -0
  136. package/src/documents/user.js +3 -0
  137. package/src/documents/user.js.map +1 -0
  138. package/src/enumerations/base-model-name.d.ts +38 -0
  139. package/src/enumerations/base-model-name.d.ts.map +1 -0
  140. package/src/enumerations/base-model-name.js +34 -0
  141. package/src/enumerations/base-model-name.js.map +1 -0
  142. package/src/enumerations/{index.ts → index.d.ts} +1 -0
  143. package/src/enumerations/index.d.ts.map +1 -0
  144. package/src/enumerations/index.js +8 -0
  145. package/src/enumerations/index.js.map +1 -0
  146. package/src/enumerations/length-encoding-type.d.ts +7 -0
  147. package/src/enumerations/length-encoding-type.d.ts.map +1 -0
  148. package/src/enumerations/length-encoding-type.js +11 -0
  149. package/src/enumerations/length-encoding-type.js.map +1 -0
  150. package/src/enumerations/schema-collection.d.ts +34 -0
  151. package/src/enumerations/schema-collection.d.ts.map +1 -0
  152. package/src/enumerations/schema-collection.js +38 -0
  153. package/src/enumerations/schema-collection.js.map +1 -0
  154. package/src/enumerations/symmetric-error-type.d.ts +5 -0
  155. package/src/enumerations/symmetric-error-type.d.ts.map +1 -0
  156. package/src/enumerations/symmetric-error-type.js +9 -0
  157. package/src/enumerations/symmetric-error-type.js.map +1 -0
  158. package/src/environment.d.ts +190 -0
  159. package/src/environment.d.ts.map +1 -0
  160. package/src/environment.js +646 -0
  161. package/src/environment.js.map +1 -0
  162. package/src/errors/express-validation.d.ts +9 -0
  163. package/src/errors/express-validation.d.ts.map +1 -0
  164. package/src/errors/express-validation.js +18 -0
  165. package/src/errors/express-validation.js.map +1 -0
  166. package/src/errors/{index.ts → index.d.ts} +1 -0
  167. package/src/errors/index.d.ts.map +1 -0
  168. package/src/errors/index.js +16 -0
  169. package/src/errors/index.js.map +1 -0
  170. package/src/errors/invalid-backup-code-version.d.ts +6 -0
  171. package/src/errors/invalid-backup-code-version.d.ts.map +1 -0
  172. package/src/errors/invalid-backup-code-version.js +16 -0
  173. package/src/errors/invalid-backup-code-version.js.map +1 -0
  174. package/src/errors/invalid-jwt-token.d.ts +5 -0
  175. package/src/errors/invalid-jwt-token.d.ts.map +1 -0
  176. package/src/errors/invalid-jwt-token.js +12 -0
  177. package/src/errors/invalid-jwt-token.js.map +1 -0
  178. package/src/errors/invalid-model.d.ts +6 -0
  179. package/src/errors/invalid-model.d.ts.map +1 -0
  180. package/src/errors/invalid-model.js +14 -0
  181. package/src/errors/invalid-model.js.map +1 -0
  182. package/src/errors/invalid-new-password.d.ts +5 -0
  183. package/src/errors/invalid-new-password.d.ts.map +1 -0
  184. package/src/errors/invalid-new-password.js +14 -0
  185. package/src/errors/invalid-new-password.js.map +1 -0
  186. package/src/errors/invalid-password.d.ts +5 -0
  187. package/src/errors/invalid-password.d.ts.map +1 -0
  188. package/src/errors/invalid-password.js +14 -0
  189. package/src/errors/invalid-password.js.map +1 -0
  190. package/src/errors/missing-validated-data.d.ts +7 -0
  191. package/src/errors/missing-validated-data.d.ts.map +1 -0
  192. package/src/errors/missing-validated-data.js +36 -0
  193. package/src/errors/missing-validated-data.js.map +1 -0
  194. package/src/errors/mnemonic-or-password-required.d.ts +5 -0
  195. package/src/errors/mnemonic-or-password-required.d.ts.map +1 -0
  196. package/src/errors/mnemonic-or-password-required.js +14 -0
  197. package/src/errors/mnemonic-or-password-required.js.map +1 -0
  198. package/src/errors/model-not-registered.d.ts +6 -0
  199. package/src/errors/model-not-registered.d.ts.map +1 -0
  200. package/src/errors/model-not-registered.js +14 -0
  201. package/src/errors/model-not-registered.js.map +1 -0
  202. package/src/errors/mongoose-validation.d.ts +12 -0
  203. package/src/errors/mongoose-validation.d.ts.map +1 -0
  204. package/src/errors/mongoose-validation.js +17 -0
  205. package/src/errors/mongoose-validation.js.map +1 -0
  206. package/src/errors/symmetric.d.ts +8 -0
  207. package/src/errors/symmetric.d.ts.map +1 -0
  208. package/src/errors/symmetric.js +22 -0
  209. package/src/errors/symmetric.js.map +1 -0
  210. package/src/errors/token-expired.d.ts +5 -0
  211. package/src/errors/token-expired.d.ts.map +1 -0
  212. package/src/errors/token-expired.js +12 -0
  213. package/src/errors/token-expired.js.map +1 -0
  214. package/src/get-language.d.ts +2 -0
  215. package/src/get-language.d.ts.map +1 -0
  216. package/src/get-language.js +30 -0
  217. package/src/get-language.js.map +1 -0
  218. package/src/get-timezone.d.ts +2 -0
  219. package/src/get-timezone.d.ts.map +1 -0
  220. package/src/get-timezone.js +39 -0
  221. package/src/get-timezone.js.map +1 -0
  222. package/src/{index.ts → index.d.ts} +2 -3
  223. package/src/index.d.ts.map +1 -0
  224. package/src/index.js +43 -0
  225. package/src/index.js.map +1 -0
  226. package/src/interfaces/{api-error-response.ts → api-error-response.d.ts} +2 -2
  227. package/src/interfaces/api-error-response.d.ts.map +1 -0
  228. package/src/interfaces/api-error-response.js +3 -0
  229. package/src/interfaces/api-error-response.js.map +1 -0
  230. package/src/interfaces/api-express-validation-error-response.d.ts +7 -0
  231. package/src/interfaces/api-express-validation-error-response.d.ts.map +1 -0
  232. package/src/interfaces/api-express-validation-error-response.js +3 -0
  233. package/src/interfaces/api-express-validation-error-response.js.map +1 -0
  234. package/src/interfaces/api-message-response.d.ts +4 -0
  235. package/src/interfaces/api-message-response.d.ts.map +1 -0
  236. package/src/interfaces/api-message-response.js +3 -0
  237. package/src/interfaces/api-message-response.js.map +1 -0
  238. package/src/interfaces/{api-mongo-validation-error-response.ts → api-mongo-validation-error-response.d.ts} +2 -2
  239. package/src/interfaces/api-mongo-validation-error-response.d.ts.map +1 -0
  240. package/src/interfaces/api-mongo-validation-error-response.js +3 -0
  241. package/src/interfaces/api-mongo-validation-error-response.js.map +1 -0
  242. package/src/interfaces/api-responses/{backup-codes-response.ts → backup-codes-response.d.ts} +2 -2
  243. package/src/interfaces/api-responses/backup-codes-response.d.ts.map +1 -0
  244. package/src/interfaces/api-responses/backup-codes-response.js +3 -0
  245. package/src/interfaces/api-responses/backup-codes-response.js.map +1 -0
  246. package/src/interfaces/api-responses/{challenge-response.ts → challenge-response.d.ts} +3 -3
  247. package/src/interfaces/api-responses/challenge-response.d.ts.map +1 -0
  248. package/src/interfaces/api-responses/challenge-response.js +3 -0
  249. package/src/interfaces/api-responses/challenge-response.js.map +1 -0
  250. package/src/interfaces/api-responses/{code-count-response.ts → code-count-response.d.ts} +2 -2
  251. package/src/interfaces/api-responses/code-count-response.d.ts.map +1 -0
  252. package/src/interfaces/api-responses/code-count-response.js +3 -0
  253. package/src/interfaces/api-responses/code-count-response.js.map +1 -0
  254. package/src/interfaces/api-responses/{index.ts → index.d.ts} +2 -1
  255. package/src/interfaces/api-responses/index.d.ts.map +1 -0
  256. package/src/interfaces/api-responses/index.js +12 -0
  257. package/src/interfaces/api-responses/index.js.map +1 -0
  258. package/src/interfaces/api-responses/{login-response.ts → login-response.d.ts} +4 -4
  259. package/src/interfaces/api-responses/login-response.d.ts.map +1 -0
  260. package/src/interfaces/api-responses/login-response.js +3 -0
  261. package/src/interfaces/api-responses/login-response.js.map +1 -0
  262. package/src/interfaces/api-responses/{mnemonic-response.ts → mnemonic-response.d.ts} +2 -2
  263. package/src/interfaces/api-responses/mnemonic-response.d.ts.map +1 -0
  264. package/src/interfaces/api-responses/mnemonic-response.js +3 -0
  265. package/src/interfaces/api-responses/mnemonic-response.js.map +1 -0
  266. package/src/interfaces/api-responses/{registration-response.ts → registration-response.d.ts} +3 -3
  267. package/src/interfaces/api-responses/registration-response.d.ts.map +1 -0
  268. package/src/interfaces/api-responses/registration-response.js +3 -0
  269. package/src/interfaces/api-responses/registration-response.js.map +1 -0
  270. package/src/interfaces/api-responses/{request-user-response.ts → request-user-response.d.ts} +2 -2
  271. package/src/interfaces/api-responses/request-user-response.d.ts.map +1 -0
  272. package/src/interfaces/api-responses/request-user-response.js +3 -0
  273. package/src/interfaces/api-responses/request-user-response.js.map +1 -0
  274. package/src/interfaces/api-responses/user-settings-response.d.ts +12 -0
  275. package/src/interfaces/api-responses/user-settings-response.d.ts.map +1 -0
  276. package/src/interfaces/api-responses/user-settings-response.js +3 -0
  277. package/src/interfaces/api-responses/user-settings-response.js.map +1 -0
  278. package/src/interfaces/application.d.ts +16 -0
  279. package/src/interfaces/application.d.ts.map +1 -0
  280. package/src/interfaces/application.js +3 -0
  281. package/src/interfaces/application.js.map +1 -0
  282. package/src/interfaces/backend-objects/email-token.d.ts +4 -0
  283. package/src/interfaces/backend-objects/email-token.d.ts.map +1 -0
  284. package/src/interfaces/backend-objects/email-token.js +3 -0
  285. package/src/interfaces/backend-objects/email-token.js.map +1 -0
  286. package/src/interfaces/backend-objects/{index.ts → index.d.ts} +1 -0
  287. package/src/interfaces/backend-objects/index.d.ts.map +1 -0
  288. package/src/interfaces/backend-objects/index.js +8 -0
  289. package/src/interfaces/backend-objects/index.js.map +1 -0
  290. package/src/interfaces/backend-objects/request-user.d.ts +5 -0
  291. package/src/interfaces/backend-objects/request-user.d.ts.map +1 -0
  292. package/src/interfaces/backend-objects/request-user.js +3 -0
  293. package/src/interfaces/backend-objects/request-user.js.map +1 -0
  294. package/src/interfaces/backend-objects/{role.ts → role.d.ts} +1 -1
  295. package/src/interfaces/backend-objects/role.d.ts.map +1 -0
  296. package/src/interfaces/backend-objects/role.js +3 -0
  297. package/src/interfaces/backend-objects/role.js.map +1 -0
  298. package/src/interfaces/backend-objects/user.d.ts +4 -0
  299. package/src/interfaces/backend-objects/user.d.ts.map +1 -0
  300. package/src/interfaces/backend-objects/user.js +3 -0
  301. package/src/interfaces/backend-objects/user.js.map +1 -0
  302. package/src/interfaces/checksum-config.d.ts +5 -0
  303. package/src/interfaces/checksum-config.d.ts.map +1 -0
  304. package/src/interfaces/checksum-config.js +3 -0
  305. package/src/interfaces/checksum-config.js.map +1 -0
  306. package/src/interfaces/checksum-consts.d.ts +11 -0
  307. package/src/interfaces/checksum-consts.d.ts.map +1 -0
  308. package/src/interfaces/checksum-consts.js +3 -0
  309. package/src/interfaces/checksum-consts.js.map +1 -0
  310. package/src/interfaces/constants.d.ts +98 -0
  311. package/src/interfaces/constants.d.ts.map +1 -0
  312. package/src/interfaces/constants.js +3 -0
  313. package/src/interfaces/constants.js.map +1 -0
  314. package/src/interfaces/controller-config.d.ts +21 -0
  315. package/src/interfaces/controller-config.d.ts.map +1 -0
  316. package/src/interfaces/controller-config.js +3 -0
  317. package/src/interfaces/controller-config.js.map +1 -0
  318. package/src/interfaces/create-user-basics.d.ts +18 -0
  319. package/src/interfaces/create-user-basics.d.ts.map +1 -0
  320. package/src/interfaces/create-user-basics.js +3 -0
  321. package/src/interfaces/create-user-basics.js.map +1 -0
  322. package/src/interfaces/csp-config.d.ts +7 -0
  323. package/src/interfaces/csp-config.d.ts.map +1 -0
  324. package/src/interfaces/csp-config.js +13 -0
  325. package/src/interfaces/csp-config.js.map +1 -0
  326. package/src/interfaces/csp-definition.d.ts +13 -0
  327. package/src/interfaces/csp-definition.d.ts.map +1 -0
  328. package/src/interfaces/csp-definition.js +23 -0
  329. package/src/interfaces/csp-definition.js.map +1 -0
  330. package/src/interfaces/{db-init-result.ts → db-init-result.d.ts} +3 -3
  331. package/src/interfaces/db-init-result.d.ts.map +1 -0
  332. package/src/interfaces/db-init-result.js +3 -0
  333. package/src/interfaces/db-init-result.js.map +1 -0
  334. package/src/interfaces/deep-partial.d.ts +4 -0
  335. package/src/interfaces/deep-partial.d.ts.map +1 -0
  336. package/src/interfaces/deep-partial.js +3 -0
  337. package/src/interfaces/deep-partial.js.map +1 -0
  338. package/src/interfaces/{discriminator-collections.ts → discriminator-collections.d.ts} +3 -3
  339. package/src/interfaces/discriminator-collections.d.ts.map +1 -0
  340. package/src/interfaces/discriminator-collections.js +3 -0
  341. package/src/interfaces/discriminator-collections.js.map +1 -0
  342. package/src/interfaces/email-service.d.ts +4 -0
  343. package/src/interfaces/email-service.d.ts.map +1 -0
  344. package/src/interfaces/email-service.js +3 -0
  345. package/src/interfaces/email-service.js.map +1 -0
  346. package/src/interfaces/environment-mongo.d.ts +76 -0
  347. package/src/interfaces/environment-mongo.d.ts.map +1 -0
  348. package/src/interfaces/environment-mongo.js +3 -0
  349. package/src/interfaces/environment-mongo.js.map +1 -0
  350. package/src/interfaces/environment.d.ts +184 -0
  351. package/src/interfaces/environment.d.ts.map +1 -0
  352. package/src/interfaces/environment.js +3 -0
  353. package/src/interfaces/environment.js.map +1 -0
  354. package/src/interfaces/failable-result.d.ts +7 -0
  355. package/src/interfaces/failable-result.d.ts.map +1 -0
  356. package/src/interfaces/failable-result.js +3 -0
  357. package/src/interfaces/failable-result.js.map +1 -0
  358. package/src/interfaces/fec-consts.d.ts +5 -0
  359. package/src/interfaces/fec-consts.d.ts.map +1 -0
  360. package/src/interfaces/fec-consts.js +3 -0
  361. package/src/interfaces/fec-consts.js.map +1 -0
  362. package/src/interfaces/flexible-csp.d.ts +8 -0
  363. package/src/interfaces/flexible-csp.d.ts.map +1 -0
  364. package/src/interfaces/flexible-csp.js +14 -0
  365. package/src/interfaces/flexible-csp.js.map +1 -0
  366. package/src/interfaces/handleable-error-options.d.ts +7 -0
  367. package/src/interfaces/handleable-error-options.d.ts.map +1 -0
  368. package/src/interfaces/handleable-error-options.js +3 -0
  369. package/src/interfaces/handleable-error-options.js.map +1 -0
  370. package/src/interfaces/{index.ts → index.d.ts} +1 -0
  371. package/src/interfaces/index.d.ts.map +1 -0
  372. package/src/interfaces/index.js +38 -0
  373. package/src/interfaces/index.js.map +1 -0
  374. package/src/interfaces/jwt-consts.d.ts +11 -0
  375. package/src/interfaces/jwt-consts.d.ts.map +1 -0
  376. package/src/interfaces/jwt-consts.js +3 -0
  377. package/src/interfaces/jwt-consts.js.map +1 -0
  378. package/src/interfaces/jwt-sign-response.d.ts +11 -0
  379. package/src/interfaces/jwt-sign-response.d.ts.map +1 -0
  380. package/src/interfaces/jwt-sign-response.js +3 -0
  381. package/src/interfaces/jwt-sign-response.js.map +1 -0
  382. package/src/interfaces/models/{email-token.ts → email-token.d.ts} +1 -1
  383. package/src/interfaces/models/email-token.d.ts.map +1 -0
  384. package/src/interfaces/models/email-token.js +3 -0
  385. package/src/interfaces/models/email-token.js.map +1 -0
  386. package/src/interfaces/models/{index.ts → index.d.ts} +1 -0
  387. package/src/interfaces/models/index.d.ts.map +1 -0
  388. package/src/interfaces/models/index.js +11 -0
  389. package/src/interfaces/models/index.js.map +1 -0
  390. package/src/interfaces/models/{mnemonic.ts → mnemonic.d.ts} +1 -1
  391. package/src/interfaces/models/mnemonic.d.ts.map +1 -0
  392. package/src/interfaces/models/mnemonic.js +3 -0
  393. package/src/interfaces/models/mnemonic.js.map +1 -0
  394. package/src/interfaces/models/{role.ts → role.d.ts} +1 -1
  395. package/src/interfaces/models/role.d.ts.map +1 -0
  396. package/src/interfaces/models/role.js +3 -0
  397. package/src/interfaces/models/role.js.map +1 -0
  398. package/src/interfaces/models/{token-role.ts → token-role.d.ts} +1 -1
  399. package/src/interfaces/models/token-role.d.ts.map +1 -0
  400. package/src/interfaces/models/token-role.js +3 -0
  401. package/src/interfaces/models/token-role.js.map +1 -0
  402. package/src/interfaces/models/{used-direct-login-token.ts → used-direct-login-token.d.ts} +2 -3
  403. package/src/interfaces/models/used-direct-login-token.d.ts.map +1 -0
  404. package/src/interfaces/models/used-direct-login-token.js +3 -0
  405. package/src/interfaces/models/used-direct-login-token.js.map +1 -0
  406. package/src/interfaces/models/{user-role.ts → user-role.d.ts} +1 -1
  407. package/src/interfaces/models/user-role.d.ts.map +1 -0
  408. package/src/interfaces/models/user-role.js +3 -0
  409. package/src/interfaces/models/user-role.js.map +1 -0
  410. package/src/interfaces/models/{user.ts → user.d.ts} +3 -11
  411. package/src/interfaces/models/user.d.ts.map +1 -0
  412. package/src/interfaces/models/user.js +3 -0
  413. package/src/interfaces/models/user.js.map +1 -0
  414. package/src/interfaces/mongo-errors.d.ts +5 -0
  415. package/src/interfaces/mongo-errors.d.ts.map +1 -0
  416. package/src/interfaces/mongo-errors.js +3 -0
  417. package/src/interfaces/mongo-errors.js.map +1 -0
  418. package/src/interfaces/request-user.d.ts +58 -0
  419. package/src/interfaces/request-user.d.ts.map +1 -0
  420. package/src/interfaces/request-user.js +3 -0
  421. package/src/interfaces/request-user.js.map +1 -0
  422. package/src/interfaces/required-string-keys.d.ts +22 -0
  423. package/src/interfaces/required-string-keys.d.ts.map +1 -0
  424. package/src/interfaces/required-string-keys.js +3 -0
  425. package/src/interfaces/required-string-keys.js.map +1 -0
  426. package/src/interfaces/schema.d.ts +29 -0
  427. package/src/interfaces/schema.d.ts.map +1 -0
  428. package/src/interfaces/schema.js +3 -0
  429. package/src/interfaces/schema.js.map +1 -0
  430. package/src/interfaces/server-init-result.d.ts +36 -0
  431. package/src/interfaces/server-init-result.d.ts.map +1 -0
  432. package/src/interfaces/server-init-result.js +3 -0
  433. package/src/interfaces/server-init-result.js.map +1 -0
  434. package/src/interfaces/status-code-response.d.ts +7 -0
  435. package/src/interfaces/status-code-response.d.ts.map +1 -0
  436. package/src/interfaces/status-code-response.js +3 -0
  437. package/src/interfaces/status-code-response.js.map +1 -0
  438. package/src/interfaces/symmetric-encryption-results.d.ts +3 -3
  439. package/src/interfaces/symmetric-encryption-results.d.ts.map +1 -1
  440. package/src/interfaces/symmetric-encryption-results.js.map +1 -1
  441. package/src/interfaces/{test-environment.ts → test-environment.d.ts} +6 -6
  442. package/src/interfaces/test-environment.d.ts.map +1 -0
  443. package/src/interfaces/test-environment.js +3 -0
  444. package/src/interfaces/test-environment.js.map +1 -0
  445. package/src/interfaces/{token-response.ts → token-response.d.ts} +2 -2
  446. package/src/interfaces/token-response.d.ts.map +1 -0
  447. package/src/interfaces/token-response.js +3 -0
  448. package/src/interfaces/token-response.js.map +1 -0
  449. package/src/middlewares/authenticate-crypto.d.ts +10 -0
  450. package/src/middlewares/authenticate-crypto.d.ts.map +1 -0
  451. package/src/middlewares/authenticate-crypto.js +126 -0
  452. package/src/middlewares/authenticate-crypto.js.map +1 -0
  453. package/src/middlewares/authenticate-token.d.ts +21 -0
  454. package/src/middlewares/authenticate-token.d.ts.map +1 -0
  455. package/src/middlewares/authenticate-token.js +104 -0
  456. package/src/middlewares/authenticate-token.js.map +1 -0
  457. package/src/middlewares/cleanup-crypto.d.ts +7 -0
  458. package/src/middlewares/cleanup-crypto.d.ts.map +1 -0
  459. package/src/middlewares/cleanup-crypto.js +32 -0
  460. package/src/middlewares/cleanup-crypto.js.map +1 -0
  461. package/src/middlewares/{index.ts → index.d.ts} +1 -0
  462. package/src/middlewares/index.d.ts.map +1 -0
  463. package/src/middlewares/index.js +8 -0
  464. package/src/middlewares/index.js.map +1 -0
  465. package/src/middlewares/set-global-context-language.d.ts +3 -0
  466. package/src/middlewares/set-global-context-language.d.ts.map +1 -0
  467. package/src/middlewares/set-global-context-language.js +14 -0
  468. package/src/middlewares/set-global-context-language.js.map +1 -0
  469. package/src/middlewares.d.ts +8 -0
  470. package/src/middlewares.d.ts.map +1 -0
  471. package/src/middlewares.js +89 -0
  472. package/src/middlewares.js.map +1 -0
  473. package/src/model-registry.d.ts +23 -0
  474. package/src/model-registry.d.ts.map +1 -0
  475. package/src/model-registry.js +47 -0
  476. package/src/model-registry.js.map +1 -0
  477. package/src/models/email-token.d.ts +35 -11
  478. package/src/models/email-token.d.ts.map +1 -0
  479. package/src/models/email-token.js +11 -0
  480. package/src/models/email-token.js.map +1 -0
  481. package/src/models/{index.ts → index.d.ts} +1 -0
  482. package/src/models/index.d.ts.map +1 -0
  483. package/src/models/index.js +10 -0
  484. package/src/models/index.js.map +1 -0
  485. package/src/models/mnemonic.d.ts +35 -11
  486. package/src/models/mnemonic.d.ts.map +1 -0
  487. package/src/models/mnemonic.js +11 -0
  488. package/src/models/mnemonic.js.map +1 -0
  489. package/src/models/role.d.ts +35 -11
  490. package/src/models/role.d.ts.map +1 -0
  491. package/src/models/role.js +11 -0
  492. package/src/models/role.js.map +1 -0
  493. package/src/models/used-direct-login-token.d.ts +35 -11
  494. package/src/models/used-direct-login-token.d.ts.map +1 -0
  495. package/src/models/used-direct-login-token.js +11 -0
  496. package/src/models/used-direct-login-token.js.map +1 -0
  497. package/src/models/user-role.d.ts +3 -10
  498. package/src/models/user-role.d.ts.map +1 -0
  499. package/src/models/user-role.js +10 -0
  500. package/src/models/user-role.js.map +1 -0
  501. package/src/models/user.d.ts +3 -16
  502. package/src/models/user.d.ts.map +1 -0
  503. package/src/models/user.js +11 -0
  504. package/src/models/user.js.map +1 -0
  505. package/src/pipeline/{index.ts → index.d.ts} +1 -0
  506. package/src/pipeline/index.d.ts.map +1 -0
  507. package/src/pipeline/index.js +5 -0
  508. package/src/pipeline/index.js.map +1 -0
  509. package/src/pipeline/pipeline-builder.d.ts +8 -0
  510. package/src/pipeline/pipeline-builder.d.ts.map +1 -0
  511. package/src/pipeline/pipeline-builder.js +18 -0
  512. package/src/pipeline/pipeline-builder.js.map +1 -0
  513. package/src/plugins/{index.ts → index.d.ts} +1 -0
  514. package/src/plugins/index.d.ts.map +1 -0
  515. package/src/plugins/index.js +6 -0
  516. package/src/plugins/index.js.map +1 -0
  517. package/src/plugins/plugin-interface.d.ts +8 -0
  518. package/src/plugins/plugin-interface.d.ts.map +1 -0
  519. package/src/plugins/plugin-interface.js +3 -0
  520. package/src/plugins/plugin-interface.js.map +1 -0
  521. package/src/plugins/plugin-manager.d.ts +12 -0
  522. package/src/plugins/plugin-manager.d.ts.map +1 -0
  523. package/src/plugins/plugin-manager.js +37 -0
  524. package/src/plugins/plugin-manager.js.map +1 -0
  525. package/src/registry/email-service-registry.d.ts +27 -0
  526. package/src/registry/email-service-registry.d.ts.map +1 -0
  527. package/src/registry/email-service-registry.js +42 -0
  528. package/src/registry/email-service-registry.js.map +1 -0
  529. package/src/registry/{index.ts → index.d.ts} +1 -0
  530. package/src/registry/index.d.ts.map +1 -0
  531. package/src/registry/index.js +6 -0
  532. package/src/registry/index.js.map +1 -0
  533. package/src/responses/{index.ts → index.d.ts} +1 -0
  534. package/src/responses/index.d.ts.map +1 -0
  535. package/src/responses/index.js +5 -0
  536. package/src/responses/index.js.map +1 -0
  537. package/src/responses/response-builder.d.ts +24 -0
  538. package/src/responses/response-builder.d.ts.map +1 -0
  539. package/src/responses/response-builder.js +63 -0
  540. package/src/responses/response-builder.js.map +1 -0
  541. package/src/routers/api.d.ts +28 -0
  542. package/src/routers/api.d.ts.map +1 -0
  543. package/src/routers/api.js +80 -0
  544. package/src/routers/api.js.map +1 -0
  545. package/src/routers/app.d.ts +32 -0
  546. package/src/routers/app.d.ts.map +1 -0
  547. package/src/routers/app.js +228 -0
  548. package/src/routers/app.js.map +1 -0
  549. package/src/routers/base.d.ts +8 -0
  550. package/src/routers/base.d.ts.map +1 -0
  551. package/src/routers/base.js +14 -0
  552. package/src/routers/base.js.map +1 -0
  553. package/src/routers/{index.ts → index.d.ts} +1 -0
  554. package/src/routers/index.d.ts.map +1 -0
  555. package/src/routers/index.js +7 -0
  556. package/src/routers/index.js.map +1 -0
  557. package/src/routers/router-config.d.ts +18 -0
  558. package/src/routers/router-config.d.ts.map +1 -0
  559. package/src/routers/router-config.js +8 -0
  560. package/src/routers/router-config.js.map +1 -0
  561. package/src/routing/index.d.ts +2 -0
  562. package/src/routing/index.d.ts.map +1 -0
  563. package/src/routing/index.js +5 -0
  564. package/src/routing/index.js.map +1 -0
  565. package/src/routing/route-builder.d.ts +36 -0
  566. package/src/routing/route-builder.d.ts.map +1 -0
  567. package/src/routing/route-builder.js +86 -0
  568. package/src/routing/route-builder.js.map +1 -0
  569. package/src/schemas/email-token.d.ts +47 -13
  570. package/src/schemas/email-token.d.ts.map +1 -0
  571. package/src/schemas/email-token.js +55 -0
  572. package/src/schemas/email-token.js.map +1 -0
  573. package/src/schemas/{index.ts → index.d.ts} +1 -0
  574. package/src/schemas/index.d.ts.map +1 -0
  575. package/src/schemas/index.js +11 -0
  576. package/src/schemas/index.js.map +1 -0
  577. package/src/schemas/mnemonic.d.ts +26 -10
  578. package/src/schemas/mnemonic.d.ts.map +1 -0
  579. package/src/schemas/mnemonic.js +31 -0
  580. package/src/schemas/mnemonic.js.map +1 -0
  581. package/src/schemas/role.d.ts +40 -13
  582. package/src/schemas/role.d.ts.map +1 -0
  583. package/src/schemas/role.js +88 -0
  584. package/src/schemas/role.js.map +1 -0
  585. package/src/schemas/schema.d.ts +42 -0
  586. package/src/schemas/schema.d.ts.map +1 -0
  587. package/src/schemas/schema.js +70 -0
  588. package/src/schemas/schema.js.map +1 -0
  589. package/src/schemas/used-direct-login-token.d.ts +35 -12
  590. package/src/schemas/used-direct-login-token.d.ts.map +1 -0
  591. package/src/schemas/used-direct-login-token.js +24 -0
  592. package/src/schemas/used-direct-login-token.js.map +1 -0
  593. package/src/schemas/user-role.d.ts +37 -12
  594. package/src/schemas/user-role.d.ts.map +1 -0
  595. package/src/schemas/user-role.js +55 -0
  596. package/src/schemas/user-role.js.map +1 -0
  597. package/src/schemas/user.d.ts +23 -18
  598. package/src/schemas/user.d.ts.map +1 -0
  599. package/src/schemas/user.js +194 -0
  600. package/src/schemas/user.js.map +1 -0
  601. package/src/services/backup-code.d.ts +76 -0
  602. package/src/services/backup-code.d.ts.map +1 -0
  603. package/src/services/backup-code.js +185 -0
  604. package/src/services/backup-code.js.map +1 -0
  605. package/src/services/base.d.ts +10 -0
  606. package/src/services/base.d.ts.map +1 -0
  607. package/src/services/base.js +15 -0
  608. package/src/services/base.js.map +1 -0
  609. package/src/services/checksum.d.ts +69 -0
  610. package/src/services/checksum.d.ts.map +1 -0
  611. package/src/services/checksum.js +145 -0
  612. package/src/services/checksum.js.map +1 -0
  613. package/src/services/crc.d.ts +87 -0
  614. package/src/services/crc.d.ts.map +1 -0
  615. package/src/services/crc.js +198 -0
  616. package/src/services/crc.js.map +1 -0
  617. package/src/services/database-initialization.d.ts +103 -0
  618. package/src/services/database-initialization.d.ts.map +1 -0
  619. package/src/services/database-initialization.js +817 -0
  620. package/src/services/database-initialization.js.map +1 -0
  621. package/src/services/{db-init-cache.ts → db-init-cache.d.ts} +5 -11
  622. package/src/services/db-init-cache.d.ts.map +1 -0
  623. package/src/services/db-init-cache.js +3 -0
  624. package/src/services/db-init-cache.js.map +1 -0
  625. package/src/services/direct-login-token.d.ts +6 -0
  626. package/src/services/direct-login-token.d.ts.map +1 -0
  627. package/src/services/direct-login-token.js +41 -0
  628. package/src/services/direct-login-token.js.map +1 -0
  629. package/src/services/dummy-email-service.d.ts +10 -0
  630. package/src/services/dummy-email-service.d.ts.map +1 -0
  631. package/src/services/dummy-email-service.js +16 -0
  632. package/src/services/dummy-email-service.js.map +1 -0
  633. package/src/services/fec-usage-example.d.ts +38 -0
  634. package/src/services/fec-usage-example.d.ts.map +1 -0
  635. package/src/services/fec-usage-example.js +75 -0
  636. package/src/services/fec-usage-example.js.map +1 -0
  637. package/src/services/fec.d.ts +46 -0
  638. package/src/services/fec.d.ts.map +1 -0
  639. package/src/services/fec.js +214 -0
  640. package/src/services/fec.js.map +1 -0
  641. package/src/services/{index.ts → index.d.ts} +1 -0
  642. package/src/services/index.d.ts.map +1 -0
  643. package/src/services/index.js +23 -0
  644. package/src/services/index.js.map +1 -0
  645. package/src/services/jwt.d.ts +30 -0
  646. package/src/services/jwt.d.ts.map +1 -0
  647. package/src/services/jwt.js +90 -0
  648. package/src/services/jwt.js.map +1 -0
  649. package/src/services/key-wrapping.d.ts +61 -0
  650. package/src/services/key-wrapping.d.ts.map +1 -0
  651. package/src/services/key-wrapping.js +310 -0
  652. package/src/services/key-wrapping.js.map +1 -0
  653. package/src/services/mnemonic.d.ts +61 -0
  654. package/src/services/mnemonic.d.ts.map +1 -0
  655. package/src/services/mnemonic.js +114 -0
  656. package/src/services/mnemonic.js.map +1 -0
  657. package/src/services/request-user.d.ts +23 -0
  658. package/src/services/request-user.d.ts.map +1 -0
  659. package/src/services/request-user.js +66 -0
  660. package/src/services/request-user.js.map +1 -0
  661. package/src/services/role.d.ts +86 -0
  662. package/src/services/role.d.ts.map +1 -0
  663. package/src/services/role.js +285 -0
  664. package/src/services/role.js.map +1 -0
  665. package/src/services/symmetric.d.ts +42 -0
  666. package/src/services/symmetric.d.ts.map +1 -0
  667. package/src/services/symmetric.js +101 -0
  668. package/src/services/symmetric.js.map +1 -0
  669. package/src/services/system-user.d.ts +17 -0
  670. package/src/services/system-user.d.ts.map +1 -0
  671. package/src/services/system-user.js +46 -0
  672. package/src/services/system-user.js.map +1 -0
  673. package/src/services/user.d.ts +349 -0
  674. package/src/services/user.d.ts.map +1 -0
  675. package/src/services/user.js +1452 -0
  676. package/src/services/user.js.map +1 -0
  677. package/src/services/xor.d.ts +24 -0
  678. package/src/services/xor.d.ts.map +1 -0
  679. package/src/services/xor.js +37 -0
  680. package/src/services/xor.js.map +1 -0
  681. package/src/testing.d.ts +3 -0
  682. package/src/testing.d.ts.map +1 -0
  683. package/src/testing.js +7 -0
  684. package/src/testing.js.map +1 -0
  685. package/src/transactions/{index.ts → index.d.ts} +1 -0
  686. package/src/transactions/index.d.ts.map +1 -0
  687. package/src/transactions/index.js +5 -0
  688. package/src/transactions/index.js.map +1 -0
  689. package/src/transactions/transaction-manager.d.ts +12 -0
  690. package/src/transactions/transaction-manager.d.ts.map +1 -0
  691. package/src/transactions/transaction-manager.js +30 -0
  692. package/src/transactions/transaction-manager.js.map +1 -0
  693. package/src/types/{app-config.ts → app-config.d.ts} +9 -10
  694. package/src/types/app-config.d.ts.map +1 -0
  695. package/src/types/app-config.js +3 -0
  696. package/src/types/app-config.js.map +1 -0
  697. package/src/types/{controller-config.ts → controller-config.d.ts} +7 -8
  698. package/src/types/controller-config.d.ts.map +1 -0
  699. package/src/types/controller-config.js +3 -0
  700. package/src/types/controller-config.js.map +1 -0
  701. package/src/types/{environment-variables.ts → environment-variables.d.ts} +5 -26
  702. package/src/types/environment-variables.d.ts.map +1 -0
  703. package/src/types/environment-variables.js +39 -0
  704. package/src/types/environment-variables.js.map +1 -0
  705. package/src/types/id-converters.d.ts +28 -0
  706. package/src/types/id-converters.d.ts.map +1 -0
  707. package/src/types/id-converters.js +45 -0
  708. package/src/types/id-converters.js.map +1 -0
  709. package/src/types/{index.ts → index.d.ts} +1 -0
  710. package/src/types/index.d.ts.map +1 -0
  711. package/src/types/index.js +6 -0
  712. package/src/types/index.js.map +1 -0
  713. package/src/types/{mongoose-helpers.ts → mongoose-helpers.d.ts} +2 -2
  714. package/src/types/mongoose-helpers.d.ts.map +1 -0
  715. package/src/types/mongoose-helpers.js +6 -0
  716. package/src/types/mongoose-helpers.js.map +1 -0
  717. package/src/types.d.ts +68 -40
  718. package/src/types.d.ts.map +1 -0
  719. package/src/types.js +14 -0
  720. package/src/types.js.map +1 -0
  721. package/src/utils.d.ts +210 -0
  722. package/src/utils.d.ts.map +1 -0
  723. package/src/utils.js +819 -0
  724. package/src/utils.js.map +1 -0
  725. package/src/validation/{index.ts → index.d.ts} +1 -0
  726. package/src/validation/index.d.ts.map +1 -0
  727. package/src/validation/index.js +5 -0
  728. package/src/validation/index.js.map +1 -0
  729. package/src/validation/validation-builder.d.ts +32 -0
  730. package/src/validation/validation-builder.d.ts.map +1 -0
  731. package/src/validation/validation-builder.js +81 -0
  732. package/src/validation/validation-builder.js.map +1 -0
  733. package/LICENSE +0 -21
  734. package/src/__tests__/fixtures/index.ts +0 -1
  735. package/src/__tests__/fixtures/model-mocks.mock.ts +0 -122
  736. package/src/__tests__/helpers/application.mock.ts +0 -90
  737. package/src/__tests__/helpers/setup-test-env.ts +0 -163
  738. package/src/__tests__/index.ts +0 -2
  739. package/src/application-base.ts +0 -520
  740. package/src/application-concrete.ts +0 -32
  741. package/src/application.ts +0 -321
  742. package/src/backup-code.ts +0 -348
  743. package/src/builders/application-builder.ts +0 -94
  744. package/src/constants.ts +0 -83
  745. package/src/container/service-container.ts +0 -39
  746. package/src/container/service-definitions.ts +0 -11
  747. package/src/controllers/base.ts +0 -496
  748. package/src/controllers/user.ts +0 -1687
  749. package/src/decorators/base-controller.ts +0 -77
  750. package/src/decorators/controller.ts +0 -140
  751. package/src/decorators/zod-validation.ts +0 -57
  752. package/src/defaults.ts +0 -249
  753. package/src/documents/base.ts +0 -10
  754. package/src/enumerations/base-model-name.ts +0 -41
  755. package/src/enumerations/length-encoding-type.ts +0 -6
  756. package/src/enumerations/schema-collection.ts +0 -33
  757. package/src/enumerations/symmetric-error-type.ts +0 -4
  758. package/src/environment.ts +0 -836
  759. package/src/errors/express-validation.ts +0 -21
  760. package/src/errors/invalid-backup-code-version.ts +0 -15
  761. package/src/errors/invalid-jwt-token.ts +0 -11
  762. package/src/errors/invalid-model.ts +0 -11
  763. package/src/errors/invalid-new-password.ts +0 -18
  764. package/src/errors/invalid-password.ts +0 -13
  765. package/src/errors/missing-validated-data.ts +0 -36
  766. package/src/errors/mnemonic-or-password-required.ts +0 -13
  767. package/src/errors/model-not-registered.ts +0 -11
  768. package/src/errors/mongoose-validation.ts +0 -36
  769. package/src/errors/symmetric.ts +0 -38
  770. package/src/errors/token-expired.ts +0 -11
  771. package/src/get-language.ts +0 -53
  772. package/src/get-timezone.ts +0 -61
  773. package/src/interfaces/api-express-validation-error-response.ts +0 -8
  774. package/src/interfaces/api-message-response.ts +0 -3
  775. package/src/interfaces/api-responses/user-settings-response.ts +0 -12
  776. package/src/interfaces/application.ts +0 -16
  777. package/src/interfaces/backend-objects/email-token.ts +0 -11
  778. package/src/interfaces/backend-objects/request-user.ts +0 -8
  779. package/src/interfaces/backend-objects/user.ts +0 -7
  780. package/src/interfaces/checksum-config.ts +0 -4
  781. package/src/interfaces/checksum-consts.ts +0 -13
  782. package/src/interfaces/constants.ts +0 -103
  783. package/src/interfaces/controller-config.ts +0 -27
  784. package/src/interfaces/create-user-basics.ts +0 -17
  785. package/src/interfaces/csp-config.ts +0 -16
  786. package/src/interfaces/csp-definition.ts +0 -53
  787. package/src/interfaces/deep-partial.ts +0 -3
  788. package/src/interfaces/email-service.ts +0 -8
  789. package/src/interfaces/environment-mongo.ts +0 -76
  790. package/src/interfaces/environment.ts +0 -185
  791. package/src/interfaces/failable-result.ts +0 -6
  792. package/src/interfaces/fec-consts.ts +0 -4
  793. package/src/interfaces/flexible-csp.ts +0 -18
  794. package/src/interfaces/handleable-error-options.ts +0 -6
  795. package/src/interfaces/jwt-consts.ts +0 -23
  796. package/src/interfaces/jwt-sign-response.ts +0 -19
  797. package/src/interfaces/mongo-errors.ts +0 -5
  798. package/src/interfaces/request-user.ts +0 -66
  799. package/src/interfaces/required-string-keys.ts +0 -26
  800. package/src/interfaces/schema.ts +0 -31
  801. package/src/interfaces/server-init-result.ts +0 -38
  802. package/src/interfaces/status-code-response.ts +0 -7
  803. package/src/interfaces/symmetric-encryption-results.ts +0 -4
  804. package/src/middlewares/authenticate-crypto.ts +0 -216
  805. package/src/middlewares/authenticate-token.ts +0 -150
  806. package/src/middlewares/cleanup-crypto.ts +0 -37
  807. package/src/middlewares/set-global-context-language.ts +0 -24
  808. package/src/middlewares.ts +0 -105
  809. package/src/model-registry.ts +0 -75
  810. package/src/models/email-token.ts +0 -16
  811. package/src/models/mnemonic.ts +0 -16
  812. package/src/models/role.ts +0 -16
  813. package/src/models/used-direct-login-token.ts +0 -16
  814. package/src/models/user-role.ts +0 -14
  815. package/src/models/user.ts +0 -16
  816. package/src/pipeline/pipeline-builder.ts +0 -18
  817. package/src/plugins/plugin-interface.ts +0 -8
  818. package/src/plugins/plugin-manager.ts +0 -40
  819. package/src/registry/email-service-registry.ts +0 -53
  820. package/src/responses/response-builder.ts +0 -86
  821. package/src/routers/api.ts +0 -168
  822. package/src/routers/app.ts +0 -340
  823. package/src/routers/base.ts +0 -17
  824. package/src/routers/router-config.ts +0 -16
  825. package/src/routing/index.ts +0 -1
  826. package/src/routing/route-builder.ts +0 -126
  827. package/src/schemas/email-token.ts +0 -97
  828. package/src/schemas/mnemonic.ts +0 -39
  829. package/src/schemas/role.ts +0 -132
  830. package/src/schemas/schema.ts +0 -150
  831. package/src/schemas/used-direct-login-token.ts +0 -44
  832. package/src/schemas/user-role.ts +0 -81
  833. package/src/schemas/user.ts +0 -224
  834. package/src/services/backup-code.ts +0 -321
  835. package/src/services/base.ts +0 -35
  836. package/src/services/checksum.ts +0 -167
  837. package/src/services/crc.ts +0 -213
  838. package/src/services/database-initialization.ts +0 -1564
  839. package/src/services/direct-login-token.ts +0 -62
  840. package/src/services/dummy-email-service.ts +0 -20
  841. package/src/services/fec-usage-example.ts +0 -102
  842. package/src/services/fec.ts +0 -355
  843. package/src/services/jwt.ts +0 -133
  844. package/src/services/key-wrapping.ts +0 -449
  845. package/src/services/mnemonic.ts +0 -166
  846. package/src/services/request-user.ts +0 -99
  847. package/src/services/role.ts +0 -410
  848. package/src/services/symmetric.ts +0 -139
  849. package/src/services/system-user.ts +0 -79
  850. package/src/services/user.ts +0 -2279
  851. package/src/services/xor.ts +0 -34
  852. package/src/testing.ts +0 -3
  853. package/src/transactions/transaction-manager.ts +0 -37
  854. package/src/types/id-converters.ts +0 -53
  855. package/src/types/mongoose-override.d.ts +0 -1
  856. package/src/types/mongoose.d.ts +0 -1
  857. package/src/types.ts +0 -130
  858. package/src/utils.ts +0 -1081
  859. package/src/validation/validation-builder.ts +0 -94
@@ -1,2279 +0,0 @@
1
- import {
2
- EmailString,
3
- IECIESConfig,
4
- MemberType,
5
- SecureBuffer,
6
- SecureString,
7
- } from '@digitaldefiance/ecies-lib';
8
- import {
9
- Member as BackendMember,
10
- ECIESService,
11
- SignatureBuffer,
12
- } from '@digitaldefiance/node-ecies-lib';
13
- import {
14
- AccountLockedError,
15
- AccountStatus,
16
- AccountStatusError,
17
- DirectChallengeNotEnabledError,
18
- EmailInUseError,
19
- EmailTokenExpiredError,
20
- EmailTokenFailedToSendError,
21
- EmailTokenSentTooRecentlyError,
22
- EmailTokenType,
23
- EmailTokenUsedOrInvalidError,
24
- EmailVerifiedError,
25
- getSuiteCoreTranslation,
26
- IBackupCode,
27
- InvalidChallengeResponseError,
28
- InvalidCredentialsError,
29
- InvalidEmailError,
30
- InvalidUsernameError,
31
- IRequestUserDTO,
32
- ITokenRole,
33
- IUserBase,
34
- IUserDTO,
35
- LoginChallengeExpiredError,
36
- PasswordLoginNotEnabledError,
37
- PendingEmailVerificationError,
38
- PrivateKeyRequiredError,
39
- Role,
40
- SuiteCoreStringKey,
41
- TranslatableSuiteError,
42
- TranslatableSuiteHandleableError,
43
- UsernameInUseError,
44
- UsernameOrEmailRequiredError,
45
- UserNotFoundError,
46
- } from '@digitaldefiance/suite-core-lib';
47
- import { Wallet } from '@ethereumjs/wallet';
48
- import { randomBytes } from 'crypto';
49
- import { ClientSession, Document, ProjectionType, Types } from '@digitaldefiance/mongoose-types';
50
- import validator from 'validator';
51
- import { BackupCode } from '../backup-code';
52
- import { IBaseDocument } from '../documents';
53
- import { IEmailTokenDocument } from '../documents/email-token';
54
- import { IMnemonicDocument } from '../documents/mnemonic';
55
- import { IUserDocument } from '../documents/user';
56
- import { BaseModelName } from '../enumerations/base-model-name';
57
- import { Environment } from '../environment';
58
- import { InvalidNewPasswordError } from '../errors';
59
- import { MongooseValidationError } from '../errors/mongoose-validation';
60
- import { ICreateUserBasics } from '../interfaces';
61
- import { IApplication } from '../interfaces/application';
62
- import { IUserBackendObject } from '../interfaces/backend-objects/user';
63
- import { IConstants } from '../interfaces/constants';
64
- import { IEmailService } from '../interfaces/email-service';
65
- import { ModelRegistry } from '../model-registry';
66
- import { convertObjectIdToGenericId } from '../types/id-converters';
67
- import { debugLog } from '../utils';
68
- import { BackupCodeService } from './backup-code';
69
- import { BaseService } from './base';
70
- import { DirectLoginTokenService } from './direct-login-token';
71
- import { KeyWrappingService } from './key-wrapping';
72
- import { MnemonicService } from './mnemonic';
73
- import { RequestUserService } from './request-user';
74
- import { RoleService } from './role';
75
- import { SystemUserService } from './system-user';
76
-
77
- type ProjectionObject = Record<string, 0 | 1 | -1 | boolean>;
78
-
79
- export class UserService<
80
- T,
81
- I extends Types.ObjectId | string,
82
- D extends Date,
83
- S extends string,
84
- A extends string,
85
- TEnvironment extends Environment = Environment,
86
- TConstants extends IConstants = IConstants,
87
- TBaseDocument extends IBaseDocument<T, I> = IBaseDocument<T, I>,
88
- TUser extends IUserBase<I, D, S, A> = IUserBase<I, D, S, A>,
89
- TTokenRole extends ITokenRole<I, D> = ITokenRole<I, D>,
90
- TApplication extends IApplication = IApplication,
91
- > extends BaseService {
92
- protected readonly roleService: RoleService<I, D, TTokenRole>;
93
- protected readonly eciesService: ECIESService;
94
- protected readonly keyWrappingService: KeyWrappingService;
95
- protected readonly mnemonicService: MnemonicService;
96
- protected readonly emailService: IEmailService;
97
- protected readonly backupCodeService: BackupCodeService<
98
- I,
99
- D,
100
- TTokenRole,
101
- TApplication
102
- >;
103
- protected readonly serverUrl: string;
104
- protected readonly disableEmailSend: boolean;
105
- protected readonly idConverter: (id: string) => I;
106
- protected readonly idGenerator: () => I;
107
-
108
- constructor(
109
- application: IApplication,
110
- roleService: RoleService<I, D, TTokenRole>,
111
- emailService: IEmailService,
112
- keyWrappingService: KeyWrappingService,
113
- backupCodeService: BackupCodeService<I, D, TTokenRole, TApplication>,
114
- idConverter?: (id: string) => I,
115
- idGenerator?: () => I,
116
- ) {
117
- super(application);
118
- this.roleService = roleService;
119
- this.emailService = emailService;
120
- this.keyWrappingService = keyWrappingService;
121
- this.backupCodeService = backupCodeService;
122
- this.serverUrl = application.environment.serverUrl;
123
- this.disableEmailSend = application.environment.disableEmailSend;
124
- this.idConverter =
125
- idConverter ?? ((id: string) => new Types.ObjectId(id) as I);
126
- this.idGenerator = idGenerator ?? (() => new Types.ObjectId() as I);
127
- const config: IECIESConfig = {
128
- curveName: this.application.constants.ECIES.CURVE_NAME,
129
- primaryKeyDerivationPath:
130
- this.application.constants.ECIES.PRIMARY_KEY_DERIVATION_PATH,
131
- mnemonicStrength: this.application.constants.ECIES.MNEMONIC_STRENGTH,
132
- symmetricAlgorithm:
133
- this.application.constants.ECIES.SYMMETRIC_ALGORITHM_CONFIGURATION,
134
- symmetricKeyBits: this.application.constants.ECIES.SYMMETRIC.KEY_BITS,
135
- symmetricKeyMode: this.application.constants.ECIES.SYMMETRIC.MODE,
136
- };
137
- this.eciesService = new ECIESService(config);
138
- const mnemonicModel =
139
- ModelRegistry.instance.getTypedModel<IMnemonicDocument>(
140
- BaseModelName.Mnemonic,
141
- );
142
- this.mnemonicService = new MnemonicService(
143
- mnemonicModel,
144
- application.environment.mnemonicHmacSecret,
145
- this.application.constants,
146
- );
147
- }
148
-
149
- public toId(id: string): I {
150
- return this.idConverter(id);
151
- }
152
-
153
- public generateId(): I {
154
- return this.idGenerator();
155
- }
156
-
157
- /**
158
- * Given a User Document, make a User DTO
159
- * @param user a User Document
160
- * @returns An IUserDTO
161
- */
162
- public static userToUserDTO<
163
- S extends string,
164
- I extends string | Types.ObjectId = Types.ObjectId,
165
- >(user: IUserDocument<S, I> | Record<string, unknown>): IUserDTO {
166
- return {
167
- ...(user instanceof Document ? user.toObject() : user),
168
- _id: (user._id instanceof Types.ObjectId
169
- ? user._id.toString()
170
- : user._id) as string,
171
- createdBy: (user.createdBy instanceof Date
172
- ? user.createdBy.toString()
173
- : user.createdBy) as string,
174
- updatedBy: (user.updatedBy instanceof Date
175
- ? user.updatedBy.toString()
176
- : user.updatedBy) as string,
177
- ...(user.lastLogin
178
- ? {
179
- lastLogin: (user.lastLogin instanceof Date
180
- ? user.lastLogin.toString()
181
- : user.lastLogin) as string,
182
- }
183
- : {}),
184
- ...(user.deletedBy
185
- ? {
186
- deletedBy: (user.deletedBy instanceof Date
187
- ? user.deletedBy.toString()
188
- : user.deletedBy) as string,
189
- }
190
- : {}),
191
- } as IUserDTO;
192
- }
193
-
194
- /**
195
- * Given a User DTO, reconstitute ids and dates
196
- * @param user a User DTO
197
- * @returns An IUserBackendObject
198
- */
199
- public hydrateUserDTOToBackend(user: IUserDTO): IUserBackendObject<S, I> {
200
- return {
201
- ...user,
202
- _id: this.idConverter(user._id),
203
- ...(user.lastLogin ? { lastLogin: new Date(user.lastLogin) } : {}),
204
- createdAt: new Date(user.createdAt),
205
- createdBy: this.idConverter(user.createdBy),
206
- updatedAt: new Date(user.updatedAt),
207
- updatedBy: this.idConverter(user.updatedBy),
208
- ...(user.deletedAt ? { deletedAt: new Date(user.deletedAt) } : {}),
209
- ...(user.deletedBy
210
- ? {
211
- deletedBy: this.idConverter(user.deletedBy),
212
- }
213
- : {}),
214
- ...(user.mnemonicId
215
- ? { mnemonicId: this.idConverter(user.mnemonicId) }
216
- : {}),
217
- } as IUserBackendObject<S, I>;
218
- }
219
-
220
- /**
221
- * Create a new email token to send to the user for email verification
222
- * @param userDoc The user to create the email token for
223
- * @param type The type of email token to create
224
- * @param session The session to use for the query
225
- * @returns The email token document
226
- */
227
- public async createEmailToken(
228
- userDoc: IUserDocument<S, I>,
229
- type: EmailTokenType,
230
- session?: ClientSession,
231
- ): Promise<IEmailTokenDocument> {
232
- const EmailTokenModel =
233
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
234
- BaseModelName.EmailToken,
235
- );
236
-
237
- // If we already have a session, use it directly to avoid nested transactions
238
- if (session) {
239
- const now = new Date();
240
- const tokenData = {
241
- userId: userDoc._id,
242
- type: type,
243
- email: userDoc.email,
244
- token: randomBytes(
245
- this.application.constants.EmailTokenLength,
246
- ).toString('hex'),
247
- createdAt: now,
248
- updatedAt: now,
249
- expiresAt: new Date(
250
- now.getTime() + this.application.constants.EmailTokenExpiration,
251
- ),
252
- };
253
-
254
- // Use findOneAndUpdate with upsert to avoid duplicate key errors
255
- const emailToken = await EmailTokenModel.findOneAndUpdate(
256
- {
257
- userId: userDoc._id,
258
- email: userDoc.email,
259
- type: type,
260
- },
261
- tokenData,
262
- {
263
- upsert: true,
264
- new: true,
265
- session,
266
- },
267
- );
268
-
269
- if (!emailToken) {
270
- throw new TranslatableSuiteError(
271
- SuiteCoreStringKey.Error_FailedToCreateEmailToken,
272
- );
273
- }
274
- return emailToken;
275
- }
276
-
277
- // Only create a new transaction if no session is provided
278
- return await this.withTransaction<IEmailTokenDocument>(
279
- async (sess: ClientSession | undefined): Promise<IEmailTokenDocument> => {
280
- const now = new Date();
281
- const tokenData = {
282
- userId: userDoc._id,
283
- type: type,
284
- email: userDoc.email,
285
- token: randomBytes(
286
- this.application.constants.EmailTokenLength,
287
- ).toString('hex'),
288
- createdAt: now,
289
- updatedAt: now,
290
- expiresAt: new Date(
291
- now.getTime() + this.application.constants.EmailTokenExpiration,
292
- ),
293
- };
294
-
295
- // Use findOneAndUpdate with upsert to avoid duplicate key errors
296
- const emailToken = await EmailTokenModel.findOneAndUpdate(
297
- {
298
- userId: userDoc._id,
299
- email: userDoc.email,
300
- type: type,
301
- },
302
- tokenData,
303
- {
304
- upsert: true,
305
- new: true,
306
- session: sess,
307
- },
308
- );
309
-
310
- if (!emailToken) {
311
- throw new TranslatableSuiteError(
312
- SuiteCoreStringKey.Error_FailedToCreateEmailToken,
313
- );
314
- }
315
- return emailToken;
316
- },
317
- undefined,
318
- {
319
- timeoutMs: this.application.environment.mongo.transactionTimeout,
320
- retryAttempts: 2,
321
- },
322
- );
323
- }
324
-
325
- /**
326
- * Create and send an email token to the user for email verification
327
- * @param user The user to send the email token to
328
- * @param type The type of email token to send
329
- * @param session The session to use for the query
330
- * @returns The email token document
331
- */
332
- public async createAndSendEmailToken(
333
- user:
334
- | IUserDocument<S, I>
335
- | (Pick<IUserDocument<S, I>, keyof IUserDocument<S, I>> & { _id: any }),
336
- type: EmailTokenType = EmailTokenType.AccountVerification,
337
- session?: ClientSession,
338
- debug = false,
339
- ): Promise<IEmailTokenDocument> {
340
- const emailToken = await this.createEmailToken(user, type, session);
341
- try {
342
- await this.sendEmailToken(emailToken, session, debug);
343
- } catch (error) {
344
- // keep parity with previous behavior: continue returning token even if email send fails
345
- }
346
- return emailToken;
347
- }
348
-
349
- /**
350
- * Create and send an email token directly within an existing transaction
351
- * @param user The user to send the email token to
352
- * @param type The type of email token to send
353
- * @param session The session to use for the query (required)
354
- * @param debug Whether to enable debug logging
355
- * @returns The email token document
356
- */
357
- public async createAndSendEmailTokenDirect(
358
- user: IUserDocument<S, I>,
359
- type: EmailTokenType = EmailTokenType.AccountVerification,
360
- session: ClientSession,
361
- debug = false,
362
- ): Promise<IEmailTokenDocument> {
363
- const EmailTokenModel =
364
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
365
- BaseModelName.EmailToken,
366
- );
367
-
368
- // Create token directly within the existing session using upsert
369
- const now = new Date();
370
- const tokenData = {
371
- userId: user._id,
372
- type: type,
373
- email: user.email,
374
- token: randomBytes(this.application.constants.EmailTokenLength).toString(
375
- 'hex',
376
- ),
377
- createdAt: now,
378
- updatedAt: now,
379
- expiresAt: new Date(
380
- now.getTime() + this.application.constants.EmailTokenExpiration,
381
- ),
382
- };
383
-
384
- // Use findOneAndUpdate with upsert to avoid duplicate key errors
385
- const emailToken = await EmailTokenModel.findOneAndUpdate(
386
- {
387
- userId: user._id,
388
- email: user.email,
389
- type: type,
390
- },
391
- tokenData,
392
- {
393
- upsert: true,
394
- new: true,
395
- session,
396
- },
397
- );
398
-
399
- if (!emailToken) {
400
- throw new TranslatableSuiteError(
401
- SuiteCoreStringKey.Error_FailedToCreateEmailToken,
402
- );
403
- }
404
-
405
- try {
406
- await this.sendEmailToken(emailToken, session, debug);
407
- } catch (error) {
408
- // Ignore email send errors in direct token creation
409
- }
410
-
411
- return emailToken;
412
- }
413
-
414
- /**
415
- * Send an email token to the user for email verification
416
- * @param emailToken The email token to send
417
- * @param session The session to use for the query
418
- * @returns void
419
- */
420
- public async sendEmailToken(
421
- emailToken: IEmailTokenDocument,
422
- session?: ClientSession,
423
- debug = false,
424
- ): Promise<void> {
425
- if (this.disableEmailSend) {
426
- debugLog(debug, 'log', 'Email sending disabled for testing');
427
- // Still update lastSent and expiration to keep token valid during tests
428
- emailToken.lastSent = new Date();
429
- emailToken.expiresAt = new Date(
430
- Date.now() + this.application.constants.EmailTokenExpiration,
431
- );
432
- await emailToken.save({ session });
433
- return;
434
- }
435
-
436
- if (
437
- emailToken.lastSent &&
438
- emailToken.lastSent.getTime() +
439
- this.application.constants.EmailTokenResendInterval >
440
- Date.now()
441
- ) {
442
- throw new EmailTokenSentTooRecentlyError(emailToken.lastSent);
443
- }
444
-
445
- let subjectString: SuiteCoreStringKey;
446
- let bodyString: SuiteCoreStringKey;
447
- let url: string;
448
- switch (emailToken.type) {
449
- case EmailTokenType.AccountVerification:
450
- subjectString = SuiteCoreStringKey.Email_ConfirmationSubjectTemplate;
451
- bodyString = SuiteCoreStringKey.Email_ConfirmationBody;
452
- url = `${this.serverUrl}/verify-email?token=${emailToken.token}`;
453
- break;
454
- case EmailTokenType.PasswordReset:
455
- subjectString = SuiteCoreStringKey.Email_ResetPasswordSubjectTemplate;
456
- bodyString = SuiteCoreStringKey.Email_ResetPasswordBody;
457
- url = `${this.serverUrl}/forgot-password?token=${emailToken.token}`;
458
- break;
459
- case EmailTokenType.LoginRequest:
460
- subjectString = SuiteCoreStringKey.Email_LoginRequestSubjectTemplate;
461
- bodyString = SuiteCoreStringKey.Email_LoginRequestBody;
462
- url = `${this.serverUrl}/challenge?token=${emailToken.token}`;
463
- break;
464
- case EmailTokenType.MnemonicRecoveryRequest:
465
- case EmailTokenType.PrivateKeyRequest:
466
- default:
467
- throw new TranslatableSuiteError(
468
- SuiteCoreStringKey.Error_InvalidEmailTokenType,
469
- );
470
- }
471
- const emailSubject = getSuiteCoreTranslation(subjectString);
472
- const emailText = `${getSuiteCoreTranslation(bodyString)}\r\n\r\n${url}`;
473
- const emailHtml = `<p>${getSuiteCoreTranslation(
474
- bodyString,
475
- )}</p><br/><p><a href="${url}">${url}</a></p><p>${getSuiteCoreTranslation(
476
- SuiteCoreStringKey.Email_LinkExpiresInTemplate,
477
- )}</p>`;
478
-
479
- try {
480
- // Use the EmailService to send the email
481
- await this.emailService.sendEmail(
482
- emailToken.email,
483
- emailSubject,
484
- emailText,
485
- emailHtml,
486
- );
487
-
488
- // update last sent/expiration
489
- emailToken.lastSent = new Date();
490
- emailToken.expiresAt = new Date(
491
- Date.now() + this.application.constants.EmailTokenExpiration,
492
- );
493
- await emailToken.save({ session });
494
- } catch (error) {
495
- throw new EmailTokenFailedToSendError(emailToken.type);
496
- }
497
- }
498
-
499
- /**
500
- * Find a user by email or username and enforce account status checks
501
- * @param email Optional email
502
- * @param username Optional username
503
- * @param session Optional mongoose session
504
- * @throws UsernameOrEmailRequiredError if neither provided
505
- * @throws InvalidCredentialsError if not found or deleted
506
- * @throws AccountLockedError | PendingEmailVerificationError | AccountStatusError per status
507
- */
508
- public async findUser(
509
- email?: string,
510
- username?: string,
511
- session?: ClientSession,
512
- ): Promise<IUserDocument<S, I>> {
513
- if (!email && !username) {
514
- throw new UsernameOrEmailRequiredError();
515
- }
516
- const UserModel = ModelRegistry.instance.getTypedModel<IUserDocument<S, I>>(
517
- BaseModelName.User,
518
- );
519
- let userDoc: IUserDocument<S, I> | null = null;
520
-
521
- try {
522
- if (email) {
523
- userDoc = await UserModel.findOne({
524
- email: email.toLowerCase(),
525
- })
526
- .session(session ?? null)
527
- .exec();
528
- } else if (username) {
529
- userDoc = await UserModel.findOne({ username })
530
- .collation({ locale: 'en', strength: 2 })
531
- .session(session ?? null)
532
- .exec();
533
- }
534
- } catch (error) {
535
- // Database error in findUser - convert to InvalidCredentialsError for security
536
- throw new InvalidCredentialsError();
537
- }
538
-
539
- if (!userDoc || userDoc.deletedAt) {
540
- if (email) {
541
- throw new InvalidEmailError('Missing');
542
- }
543
- throw new InvalidUsernameError();
544
- }
545
-
546
- switch (userDoc.accountStatus) {
547
- case AccountStatus.Active:
548
- break;
549
- case AccountStatus.AdminLock:
550
- throw new AccountLockedError();
551
- case AccountStatus.PendingEmailVerification:
552
- throw new PendingEmailVerificationError();
553
- default:
554
- throw new AccountStatusError(userDoc.accountStatus);
555
- }
556
-
557
- return userDoc as IUserDocument<S, I>;
558
- }
559
-
560
- /**
561
- * Finds a user record by ID
562
- * @param userId The user ID
563
- * @param throwIfNotActive Whether to throw if the user is inactive
564
- * @param session The active session, if present
565
- * @returns The user document
566
- */
567
- public async findUserById(
568
- userId: I,
569
- throwIfNotActive: boolean,
570
- session?: ClientSession,
571
- select?: ProjectionType<IUserDocument<S, I>>,
572
- ): Promise<IUserDocument<S, I>> {
573
- const UserModel = ModelRegistry.instance.getTypedModel<IUserDocument<S, I>>(
574
- BaseModelName.User,
575
- );
576
- const baseQuery = UserModel.findById(userId).session(session ?? null);
577
- if (select) {
578
- // Always include fields needed for status checks
579
- const merged = this.ensureRequiredFieldsInProjection(select, [
580
- 'deletedAt',
581
- 'accountStatus',
582
- ]);
583
- baseQuery.select(merged);
584
- }
585
- const userDoc = (await baseQuery.exec()) as IUserDocument<S, I> | null;
586
- if (!userDoc || userDoc.deletedAt) {
587
- throw new UserNotFoundError();
588
- }
589
- if (throwIfNotActive) {
590
- switch (userDoc.accountStatus) {
591
- case AccountStatus.Active:
592
- break;
593
- case AccountStatus.AdminLock:
594
- throw new AccountLockedError();
595
- case AccountStatus.PendingEmailVerification:
596
- throw new PendingEmailVerificationError();
597
- default:
598
- throw new AccountStatusError(userDoc.accountStatus);
599
- }
600
- }
601
- return userDoc;
602
- }
603
-
604
- /**
605
- * Ensure required fields are present in a projection for queries that rely on them.
606
- * Supports string and object-style projections. For inclusion projections, adds fields.
607
- * For exclusion projections, ensures required fields are not excluded.
608
- */
609
- private ensureRequiredFieldsInProjection(
610
- select: ProjectionType<IUserDocument<S, I>>,
611
- required: string[],
612
- ): ProjectionType<IUserDocument<S, I>> {
613
- if (typeof select === 'string') {
614
- const parts = select
615
- .split(/\s+/)
616
- .map((s) => s.trim())
617
- .filter(Boolean);
618
- const exclusions = new Set(
619
- parts.filter((p) => p.startsWith('-')).map((p) => p.slice(1)),
620
- );
621
- // Remove exclusions on required fields
622
- for (const r of required) {
623
- exclusions.delete(r);
624
- }
625
- const cleaned = parts.filter((p) => !p.startsWith('-'));
626
- for (const r of required) {
627
- if (!cleaned.includes(r)) cleaned.push(r);
628
- }
629
- const result = [...cleaned, ...[...exclusions].map((r) => `-${r}`)];
630
- return result.join(' ');
631
- }
632
- if (select && typeof select === 'object') {
633
- const proj: ProjectionObject = { ...(select as ProjectionObject) };
634
- const values = Object.values(proj);
635
- const hasInclusions = values.some((v) => v === 1 || v === true);
636
- if (hasInclusions) {
637
- for (const r of required) {
638
- proj[r] = 1;
639
- }
640
- } else {
641
- const keysToRemove = required.filter(
642
- (r) => proj[r] === 0 || proj[r] === false || proj[r] === -1,
643
- );
644
- keysToRemove.forEach((key) => delete proj[key]);
645
- }
646
- return proj as ProjectionType<IUserDocument<S, I>>;
647
- }
648
- return select;
649
- }
650
-
651
- /**
652
- * Fill in the default values to a user object
653
- * @param newUser The user object to fill in
654
- * @param createdBy The user ID of the user creating the new user
655
- * @returns The filled in user
656
- */
657
- public fillUserDefaults(
658
- newUser: ICreateUserBasics,
659
- createdBy: I,
660
- backupCodes: Array<IBackupCode>,
661
- encryptedMnemonic: string,
662
- userId?: I,
663
- ): IUserBackendObject<S, I> {
664
- return {
665
- ...(userId ? { _id: userId } : {}),
666
- timezone: 'UTC',
667
- ...newUser,
668
- email: newUser.email.toLowerCase(),
669
- emailVerified: false,
670
- darkMode: false,
671
- accountStatus: AccountStatus.PendingEmailVerification,
672
- siteLanguage: 'en-US' as S,
673
- duressPasswords: [],
674
- publicKey: '',
675
- backupCodes,
676
- mnemonicRecovery: encryptedMnemonic,
677
- currency: 'USD',
678
- directChallenge: true,
679
- createdAt: new Date(),
680
- createdBy: createdBy,
681
- updatedAt: new Date(),
682
- updatedBy: createdBy,
683
- } as IUserBackendObject<S, I>;
684
- }
685
-
686
- /**
687
- * Create a new user document from an IUser and unhashed password
688
- * @param newUser The user object
689
- * @returns The new user document
690
- */
691
- public async makeUserDoc(newUser: TUser): Promise<IUserDocument<S, I>> {
692
- const UserModel = ModelRegistry.instance.getTypedModel<IUserDocument<S, I>>(
693
- BaseModelName.User,
694
- );
695
-
696
- const newUserDoc: IUserDocument<S, I> = new UserModel(newUser);
697
-
698
- const validationError = newUserDoc.validateSync();
699
- if (validationError) {
700
- throw new MongooseValidationError(validationError.errors);
701
- }
702
-
703
- return newUserDoc;
704
- }
705
-
706
- /**
707
- * Create a new user.
708
- * Do not set createdBy to a new (non-existing) ObjectId unless you also set newUserId to it.
709
- * If newUserId is not set, one will be generated.
710
- * @param systemUser The system user performing the operation
711
- * @param userData Username, email, password in a ICreateUserBasics object
712
- * @param createdBy The user id of the user creating the user
713
- * @param newUserId the user id of the new user object- usually the createdBy user id.
714
- * @param session The session to use for the query
715
- * @param debug Whether to log debug information
716
- * @param password The password to use for the new user (optional, if not provided, mnemonic will be used)
717
- * @returns The new user document
718
- */
719
- public async newUser(
720
- systemUser: BackendMember,
721
- userData: ICreateUserBasics,
722
- createdBy?: I,
723
- newUserId?: I,
724
- session?: ClientSession,
725
- debug = false,
726
- password?: string,
727
- ): Promise<{
728
- user: IUserDocument<S, I>;
729
- mnemonic: string;
730
- backupCodes: Array<string>;
731
- password?: string;
732
- }> {
733
- const _newUserId = newUserId ?? this.idGenerator();
734
- if (!this.application.constants.UsernameRegex.test(userData.username)) {
735
- throw new InvalidUsernameError();
736
- }
737
- if (password && !this.application.constants.PasswordRegex.test(password)) {
738
- throw new InvalidNewPasswordError();
739
- }
740
-
741
- const UserModel = ModelRegistry.instance.getTypedModel<IUserDocument<S, I>>(
742
- BaseModelName.User,
743
- );
744
- return await this.withTransaction<{
745
- user: IUserDocument<S, I>;
746
- backupCodes: Array<string>;
747
- mnemonic: string;
748
- }>(
749
- async (sess: ClientSession | undefined) => {
750
- const existingEmail: IUserDocument<S, I> | null =
751
- await UserModel.findOne({
752
- email: userData.email.toLowerCase(),
753
- }).session(sess ?? null);
754
- if (existingEmail) {
755
- throw new EmailInUseError();
756
- }
757
- const existingUsername: IUserDocument<S, I> | null =
758
- await UserModel.findOne({
759
- username: { $regex: new RegExp(`^${userData.username}$`, 'i') },
760
- }).session(sess ?? null);
761
- if (existingUsername) {
762
- throw new UsernameInUseError();
763
- }
764
-
765
- let mnemonic: SecureString | undefined;
766
- let member: BackendMember | undefined;
767
- while (!mnemonic || !member) {
768
- try {
769
- const { member: newMember, mnemonic: newMnemonic } =
770
- BackendMember.newMember(
771
- this.eciesService,
772
- MemberType.User,
773
- userData.username,
774
- new EmailString(userData.email),
775
- undefined,
776
- createdBy ? Buffer.from(String(createdBy), 'hex') : undefined,
777
- );
778
- // make sure the new mnemonic is not already in the database
779
-
780
- const mnemonicExists = await this.mnemonicService.mnemonicExists(
781
- newMnemonic,
782
- sess,
783
- );
784
- if (!mnemonicExists) {
785
- member = newMember;
786
- mnemonic = newMnemonic;
787
- }
788
- } catch {
789
- // If we fail to create a new member, we will retry until we succeed.
790
- // This is to ensure that we do not end up with duplicate mnemonics.
791
- debugLog(
792
- debug,
793
- 'warn',
794
- 'Failed to create a new member, retrying...',
795
- );
796
- }
797
- }
798
-
799
- const backupCodes = BackupCode.generateBackupCodes();
800
- const encryptedBackupCodes = await BackupCode.encryptBackupCodes(
801
- member,
802
- systemUser,
803
- backupCodes,
804
- );
805
- const encryptedMnemonic = member
806
- .encryptData(Buffer.from(mnemonic.value ?? '', 'utf-8'))
807
- .toString('hex');
808
-
809
- const newUserDoc = new UserModel({
810
- ...this.fillUserDefaults(
811
- userData,
812
- createdBy ?? _newUserId,
813
- encryptedBackupCodes,
814
- encryptedMnemonic,
815
- _newUserId,
816
- ),
817
- publicKey: member.publicKey.toString('hex'),
818
- });
819
-
820
- const validationError = newUserDoc.validateSync();
821
- if (validationError) {
822
- throw new MongooseValidationError(validationError.errors);
823
- }
824
-
825
- // Always add HMAC-only mnemonic doc
826
- const newMnemonicDoc = await this.mnemonicService.addMnemonic(
827
- mnemonic,
828
- sess,
829
- );
830
- if (newMnemonicDoc) {
831
- newUserDoc.mnemonicId = newMnemonicDoc._id as I;
832
- }
833
-
834
- // If password provided, wrap the ECIES private key with the password (Option B)
835
- if (password) {
836
- const passwordSecure = new SecureString(password);
837
- try {
838
- const priv = new SecureBuffer(member.privateKey!.value);
839
- try {
840
- const wrapped = this.keyWrappingService.wrapSecret(
841
- priv,
842
- passwordSecure,
843
- this.application.constants,
844
- );
845
- newUserDoc.passwordWrappedPrivateKey = wrapped;
846
- } finally {
847
- priv.dispose();
848
- }
849
- } finally {
850
- passwordSecure.dispose();
851
- }
852
- }
853
-
854
- const savedUserDoc = await newUserDoc.save({ session: sess });
855
-
856
- const memberRoleId = await this.roleService.getRoleIdByName(
857
- this.application.constants.MemberRole as Role,
858
- sess,
859
- );
860
-
861
- if (!memberRoleId) {
862
- throw new TranslatableSuiteError(
863
- SuiteCoreStringKey.Error_FailedToLookupRoleTemplate,
864
- {
865
- ROLE: getSuiteCoreTranslation(SuiteCoreStringKey.Common_Member),
866
- },
867
- );
868
- }
869
-
870
- await this.roleService.addUserToRole(
871
- memberRoleId,
872
- savedUserDoc._id,
873
- _newUserId,
874
- sess,
875
- );
876
-
877
- return {
878
- user: savedUserDoc,
879
- mnemonic: mnemonic.value ?? '',
880
- backupCodes: backupCodes.map((code: BackupCode) => code.value ?? ''),
881
- ...(password ? { password } : {}),
882
- };
883
- },
884
- session,
885
- {
886
- timeoutMs: this.application.environment.mongo.transactionTimeout * 10,
887
- },
888
- );
889
- }
890
-
891
- /**
892
- * Get the backup codes for a user.
893
- * Requires the user not be deleted or inactive
894
- */
895
- public async getEncryptedUserBackupCodes(
896
- userId: Types.ObjectId,
897
- session?: ClientSession,
898
- ): Promise<Array<IBackupCode>> {
899
- const userWithCodes = await this.findUserById(
900
- convertObjectIdToGenericId<I>(userId),
901
- true,
902
- session,
903
- );
904
- return userWithCodes.backupCodes;
905
- }
906
-
907
- /**
908
- * Resets the given user's backup codes
909
- * @param backupUser The user to generate codes for
910
- * @param session The current session, if any
911
- * @returns A promise of an array of backup codes
912
- */
913
- public async resetUserBackupCodes(
914
- backupUser: BackendMember,
915
- systemUser: BackendMember,
916
- session?: ClientSession,
917
- ): Promise<Array<BackupCode>> {
918
- if (!backupUser.hasPrivateKey) {
919
- throw new PrivateKeyRequiredError();
920
- }
921
- const backupCodes = BackupCode.generateBackupCodes();
922
- const encryptedBackupCodes = await BackupCode.encryptBackupCodes(
923
- backupUser,
924
- systemUser,
925
- backupCodes,
926
- );
927
- const UserModel = ModelRegistry.instance.get('User')?.model;
928
- return await this.withTransaction<Array<BackupCode>>(
929
- async (sess: ClientSession | undefined) => {
930
- await UserModel.updateOne(
931
- { _id: backupUser.id },
932
- { $set: { backupCodes: encryptedBackupCodes } },
933
- { session: sess },
934
- );
935
- return backupCodes;
936
- },
937
- session,
938
- {
939
- timeoutMs: this.application.environment.mongo.transactionTimeout,
940
- },
941
- );
942
- }
943
-
944
- /**
945
- * Recover a user's mnemonic from an encrypted mnemonic
946
- * @param user The user whose mnemonic to recover
947
- * @param encryptedMnemonic The encrypted mnemonic
948
- * @returns The recovered mnemonic
949
- */
950
- public recoverMnemonic(
951
- user: BackendMember<any>,
952
- encryptedMnemonic: string,
953
- ): SecureString {
954
- if (!encryptedMnemonic) {
955
- throw new TranslatableSuiteHandleableError(
956
- SuiteCoreStringKey.MnemonicRecovery_Missing,
957
- undefined,
958
- undefined,
959
- {
960
- statusCode: 400,
961
- },
962
- );
963
- }
964
-
965
- return new SecureString(
966
- user.decryptData(Buffer.from(encryptedMnemonic, 'hex')).toString('utf-8'),
967
- );
968
- }
969
-
970
- /**
971
- * Make a Member from a user document and optional private key
972
- * @param userDoc The user document
973
- * @param privateKey Optional private key to load the wallet
974
- * @param publicKey Optional public key to override the userDoc public key
975
- * @param session The current session, if any
976
- * @returns A promise containing the created Member
977
- */
978
- public async makeUserFromUserDoc(
979
- userDoc: IUserDocument<S, I>,
980
- privateKey?: SecureBuffer,
981
- publicKey?: Buffer,
982
- mnemonic?: SecureString,
983
- wallet?: Wallet,
984
- session?: ClientSession,
985
- ): Promise<BackendMember<any>> {
986
- const memberType = await this.roleService.getMemberType(userDoc, session);
987
- const user = new BackendMember(
988
- this.eciesService,
989
- memberType,
990
- userDoc.username,
991
- new EmailString(userDoc.email),
992
- publicKey ?? Buffer.from(userDoc.publicKey, 'hex'),
993
- privateKey,
994
- wallet,
995
- userDoc._id,
996
- new Date(userDoc.createdAt),
997
- new Date(userDoc.updatedAt),
998
- userDoc.createdBy,
999
- );
1000
- if (
1001
- (privateKey?.originalLength ?? -1) > 0 &&
1002
- user.hasPrivateKey &&
1003
- !wallet
1004
- ) {
1005
- user.loadWallet(
1006
- mnemonic ?? this.recoverMnemonic(user, userDoc.mnemonicRecovery),
1007
- );
1008
- }
1009
- return user;
1010
- }
1011
-
1012
- /**
1013
- * Challenges a given userDoc with a given mnemonic, returns a system and user Member
1014
- * @param userDoc The userDoc in question
1015
- * @param mnemonic The mnemonic to challenge against
1016
- * @returns A promise containing the user and system Members
1017
- * @throws InvalidCredentialsError if the challenge fails
1018
- * @throws AccountLockedError if the account is locked
1019
- * @throws PendingEmailVerificationError if the email is not verified
1020
- * @throws AccountStatusError if the account status is invalid
1021
- */
1022
- public async challengeUserWithMnemonic(
1023
- userDoc: IUserDocument<S, I>,
1024
- mnemonic: SecureString,
1025
- session?: ClientSession,
1026
- ): Promise<{
1027
- userMember: BackendMember;
1028
- adminMember: BackendMember;
1029
- }> {
1030
- try {
1031
- // Verify provided mnemonic corresponds to the stored mnemonic HMAC (no password required)
1032
- // This prevents any valid mnemonic from authenticating as another user.
1033
- const MnemonicModel =
1034
- ModelRegistry.instance.getTypedModel<IMnemonicDocument>(
1035
- BaseModelName.Mnemonic,
1036
- );
1037
- if (!userDoc.mnemonicId) {
1038
- throw new InvalidCredentialsError();
1039
- }
1040
- const mnemonicDoc = await MnemonicModel.findById(userDoc.mnemonicId)
1041
- .select('hmac')
1042
- .session(session ?? null)
1043
- .lean()
1044
- .exec();
1045
- if (!mnemonicDoc) {
1046
- throw new InvalidCredentialsError();
1047
- }
1048
- const computedHmac = this.mnemonicService.getMnemonicHmac(mnemonic);
1049
- if (computedHmac !== mnemonicDoc.hmac) {
1050
- throw new InvalidCredentialsError();
1051
- }
1052
-
1053
- // Create a Member from the provided mnemonic to get the keys
1054
- const { wallet } = this.eciesService.walletAndSeedFromMnemonic(mnemonic);
1055
- const privateKey = wallet.getPrivateKey();
1056
- const publicKey = wallet.getPublicKey();
1057
- const publicKeyWithPrefix = Buffer.concat([
1058
- Buffer.from([this.application.constants.ECIES.PUBLIC_KEY_MAGIC]),
1059
- publicKey,
1060
- ]);
1061
- const userMember = await this.makeUserFromUserDoc(
1062
- userDoc,
1063
- new SecureBuffer(privateKey),
1064
- publicKeyWithPrefix,
1065
- mnemonic,
1066
- wallet,
1067
- session,
1068
- );
1069
-
1070
- // Verify the public key matches the stored userDoc public key
1071
- if (userMember.publicKey.toString('hex') !== userDoc.publicKey) {
1072
- throw new InvalidCredentialsError();
1073
- }
1074
-
1075
- // Generate a nonce challenge to verify they can decrypt with their key
1076
- const adminMember = SystemUserService.getSystemUser(
1077
- this.application.environment,
1078
- this.application.constants,
1079
- );
1080
- const nonce = randomBytes(32);
1081
- const signature = adminMember.sign(nonce);
1082
- const payload = Buffer.concat([nonce, signature]);
1083
-
1084
- const encryptedPayload = userMember.encryptData(payload);
1085
- const decryptedPayload = userMember.decryptData(encryptedPayload);
1086
-
1087
- // Verify the server's signature on the nonce
1088
- const decryptedNonce = decryptedPayload.subarray(0, 32);
1089
- const decryptedSignature = decryptedPayload.subarray(32);
1090
-
1091
- const isSignatureValid = adminMember.verify(
1092
- decryptedSignature as SignatureBuffer,
1093
- decryptedNonce,
1094
- );
1095
-
1096
- if (!isSignatureValid || !nonce.equals(decryptedNonce)) {
1097
- throw new InvalidCredentialsError();
1098
- }
1099
-
1100
- return {
1101
- userMember,
1102
- adminMember: adminMember,
1103
- };
1104
- } catch (error) {
1105
- if (
1106
- error instanceof InvalidCredentialsError ||
1107
- error instanceof AccountLockedError ||
1108
- error instanceof PendingEmailVerificationError ||
1109
- error instanceof AccountStatusError
1110
- ) {
1111
- throw error;
1112
- }
1113
- throw new InvalidCredentialsError();
1114
- }
1115
- }
1116
-
1117
- /**
1118
- * Validates a login challenge response
1119
- * @param challengeResponse The challenge response bytes in hex
1120
- * @param email The email address of the user
1121
- * @param username The username of the user
1122
- * @param session The mongo session for the query
1123
- * @returns A promise that resolves to the user document, user member, and system member
1124
- */
1125
- public async loginWithChallengeResponse(
1126
- challengeResponse: string,
1127
- email?: string,
1128
- username?: string,
1129
- session?: ClientSession,
1130
- ): Promise<{
1131
- userDoc: IUserDocument<S, I>;
1132
- userMember: BackendMember;
1133
- adminMember: BackendMember;
1134
- }> {
1135
- const challengeBuffer = Buffer.from(challengeResponse, 'hex');
1136
- // validate the expected challenge response length (8 + 32 + 64 = 104 bytes)
1137
- if (
1138
- challengeBuffer.length !=
1139
- this.application.constants.DirectLoginChallengeLength
1140
- ) {
1141
- throw new InvalidChallengeResponseError();
1142
- }
1143
- // disassemble the challengeResponse into time, nonce, signature
1144
- const time = challengeBuffer.subarray(0, 8); // 16 hex characters
1145
- const nonce = challengeBuffer.subarray(8, 40); // 64 hex characters
1146
- const signature = challengeBuffer.subarray(40); // 65 * 2 hex characters
1147
-
1148
- const timeMs = parseInt(time.toString('hex'), 16);
1149
- if (
1150
- new Date().getTime() - timeMs >
1151
- this.application.constants.LoginChallengeExpiration
1152
- ) {
1153
- throw new LoginChallengeExpiredError();
1154
- }
1155
-
1156
- const userDoc = await this.findUser(email, username, session);
1157
- if (!userDoc && email) {
1158
- throw new InvalidEmailError('Missing');
1159
- } else if (!userDoc) {
1160
- throw new InvalidUsernameError();
1161
- }
1162
- // re-sign the time + nonce and check if the signature matches
1163
- const adminMember = SystemUserService.getSystemUser(
1164
- this.application.environment,
1165
- this.application.constants,
1166
- );
1167
- const timeAndNonce = Buffer.concat([time, nonce]);
1168
- const expectedSignature = adminMember.sign(timeAndNonce);
1169
- if (expectedSignature.toString('hex') !== signature.toString('hex')) {
1170
- throw new InvalidChallengeResponseError();
1171
- }
1172
-
1173
- const userMember = await this.makeUserFromUserDoc(
1174
- userDoc,
1175
- undefined,
1176
- undefined,
1177
- undefined,
1178
- undefined,
1179
- session,
1180
- );
1181
-
1182
- return {
1183
- userDoc,
1184
- userMember,
1185
- adminMember: adminMember,
1186
- };
1187
- }
1188
-
1189
- /**
1190
- * Authenticate a user with client-verified challenge (skips server-side challenge)
1191
- * @returns The authenticated user document.
1192
- */
1193
- public async loginWithClientVerifiedChallenge(
1194
- usernameOrEmail: string,
1195
- mnemonic: SecureString,
1196
- session?: ClientSession,
1197
- ): Promise<{
1198
- userDoc: IUserDocument<S, I>;
1199
- userMember: BackendMember;
1200
- adminMember: BackendMember;
1201
- }> {
1202
- const UserModel = this.application.getModel<IUserDocument<S, I>>(
1203
- BaseModelName.User,
1204
- );
1205
- const userQuery = validator.isEmail(usernameOrEmail)
1206
- ? UserModel.findOne({ email: usernameOrEmail.toLowerCase() }).select(
1207
- '_id username email accountStatus deletedAt mnemonicId publicKey passwordWrappedPrivateKey',
1208
- )
1209
- : UserModel.findOne({ username: usernameOrEmail })
1210
- .collation({ locale: 'en', strength: 2 })
1211
- .select(
1212
- '_id username email accountStatus deletedAt mnemonicId publicKey passwordWrappedPrivateKey',
1213
- );
1214
- const userDoc = await userQuery.session(session ?? null);
1215
-
1216
- if (!userDoc || userDoc.deletedAt) {
1217
- throw new InvalidCredentialsError();
1218
- }
1219
-
1220
- // Check account status
1221
- switch (userDoc.accountStatus) {
1222
- case AccountStatus.Active:
1223
- break;
1224
- case AccountStatus.AdminLock:
1225
- throw new AccountLockedError();
1226
- case AccountStatus.PendingEmailVerification:
1227
- throw new PendingEmailVerificationError();
1228
- default:
1229
- throw new AccountStatusError(userDoc.accountStatus);
1230
- }
1231
-
1232
- // Verify mnemonic matches user (simplified verification)
1233
- try {
1234
- const MnemonicModel = this.application.getModel<IMnemonicDocument>(
1235
- BaseModelName.Mnemonic,
1236
- );
1237
- if (!userDoc.mnemonicId) {
1238
- throw new InvalidCredentialsError();
1239
- }
1240
- const mnemonicDoc = await MnemonicModel.findById(userDoc.mnemonicId)
1241
- .select('hmac')
1242
- .session(session ?? null)
1243
- .lean()
1244
- .exec();
1245
- if (!mnemonicDoc) {
1246
- throw new InvalidCredentialsError();
1247
- }
1248
- const computedHmac = this.mnemonicService.getMnemonicHmac(mnemonic);
1249
- if (computedHmac !== mnemonicDoc.hmac) {
1250
- throw new InvalidCredentialsError();
1251
- }
1252
-
1253
- // Create Member from mnemonic
1254
- const { wallet } = this.eciesService.walletAndSeedFromMnemonic(mnemonic);
1255
- const privateKey = wallet.getPrivateKey();
1256
- const publicKey = wallet.getPublicKey();
1257
- const publicKeyWithPrefix = Buffer.concat([
1258
- Buffer.from([this.application.constants.ECIES.PUBLIC_KEY_MAGIC]),
1259
- publicKey,
1260
- ]);
1261
- const userMember = await this.makeUserFromUserDoc(
1262
- userDoc,
1263
- new SecureBuffer(privateKey),
1264
- publicKeyWithPrefix,
1265
- mnemonic,
1266
- wallet,
1267
- session,
1268
- );
1269
-
1270
- // Verify public key matches
1271
- if (userMember.publicKey.toString('hex') !== userDoc.publicKey) {
1272
- throw new InvalidCredentialsError();
1273
- }
1274
-
1275
- const adminMember = SystemUserService.getSystemUser(
1276
- this.application.environment,
1277
- this.application.constants,
1278
- );
1279
-
1280
- return {
1281
- userMember,
1282
- adminMember,
1283
- userDoc,
1284
- };
1285
- } catch (error) {
1286
- if (
1287
- error instanceof InvalidCredentialsError ||
1288
- error instanceof AccountLockedError ||
1289
- error instanceof PendingEmailVerificationError ||
1290
- error instanceof AccountStatusError
1291
- ) {
1292
- throw error;
1293
- }
1294
- throw new InvalidCredentialsError();
1295
- }
1296
- }
1297
-
1298
- /**
1299
- * Authenticate a user with their mnemonic.
1300
- * @returns The authenticated user document.
1301
- */
1302
- public async loginWithMnemonic(
1303
- usernameOrEmail: string,
1304
- mnemonic: SecureString,
1305
- session?: ClientSession,
1306
- ): Promise<{
1307
- userDoc: IUserDocument<S, I>;
1308
- userMember: BackendMember;
1309
- adminMember: BackendMember;
1310
- }> {
1311
- const UserModel = ModelRegistry.instance.getTypedModel<IUserDocument<S, I>>(
1312
- BaseModelName.User,
1313
- );
1314
- const userQuery = validator.isEmail(usernameOrEmail)
1315
- ? UserModel.findOne({ email: usernameOrEmail.toLowerCase() }).select(
1316
- '_id username email accountStatus deletedAt mnemonicId publicKey passwordWrappedPrivateKey',
1317
- )
1318
- : UserModel.findOne({ username: usernameOrEmail })
1319
- .collation({ locale: 'en', strength: 2 })
1320
- .select(
1321
- '_id username email accountStatus deletedAt mnemonicId publicKey passwordWrappedPrivateKey',
1322
- );
1323
- const userDoc = await userQuery.session(session ?? null);
1324
-
1325
- if (!userDoc || userDoc.deletedAt) {
1326
- throw new InvalidCredentialsError();
1327
- }
1328
-
1329
- // Check account status
1330
- switch (userDoc.accountStatus) {
1331
- case AccountStatus.Active:
1332
- break;
1333
- case AccountStatus.AdminLock:
1334
- throw new AccountLockedError();
1335
- case AccountStatus.PendingEmailVerification:
1336
- throw new PendingEmailVerificationError();
1337
- default:
1338
- throw new AccountStatusError(userDoc.accountStatus);
1339
- }
1340
-
1341
- const challengeResponse = await this.challengeUserWithMnemonic(
1342
- userDoc,
1343
- mnemonic,
1344
- session,
1345
- );
1346
- return { ...challengeResponse, userDoc };
1347
- }
1348
-
1349
- /**
1350
- * Authenticate a user with their password (for key-wrapped accounts).
1351
- * @returns The authenticated user document.
1352
- */
1353
- public async loginWithPassword(
1354
- usernameOrEmail: string,
1355
- password: string,
1356
- session?: ClientSession,
1357
- ): Promise<{
1358
- userDoc: IUserDocument<S, I>;
1359
- userMember: BackendMember;
1360
- adminMember: BackendMember;
1361
- }> {
1362
- const UserModel = this.application.getModel<IUserDocument<S, I>>(
1363
- BaseModelName.User,
1364
- );
1365
- const query = validator.isEmail(usernameOrEmail)
1366
- ? UserModel.findOne({ email: usernameOrEmail.toLowerCase() })
1367
- : UserModel.findOne({ username: usernameOrEmail }).collation({
1368
- locale: 'en',
1369
- strength: 2,
1370
- });
1371
-
1372
- const userDoc: IUserDocument<S, I> | null = await query
1373
- .session(session ?? null)
1374
- .exec();
1375
-
1376
- if (!userDoc || userDoc.deletedAt) {
1377
- throw new InvalidCredentialsError();
1378
- }
1379
-
1380
- // Check account status
1381
- switch (userDoc.accountStatus) {
1382
- case AccountStatus.Active:
1383
- break;
1384
- case AccountStatus.AdminLock:
1385
- throw new AccountLockedError();
1386
- case AccountStatus.PendingEmailVerification:
1387
- throw new PendingEmailVerificationError();
1388
- default:
1389
- throw new AccountStatusError(userDoc.accountStatus);
1390
- }
1391
-
1392
- // Check if user has password-based authentication set up (Option B requires passwordWrappedPrivateKey)
1393
- if (!userDoc.passwordWrappedPrivateKey || !userDoc.mnemonicId) {
1394
- throw new PasswordLoginNotEnabledError();
1395
- }
1396
- // Unwrap password-wrapped private key and complete challenge with possession of private key
1397
- const unwrapped = await this.keyWrappingService.unwrapSecretAsync(
1398
- userDoc.passwordWrappedPrivateKey!,
1399
- password,
1400
- this.application.constants,
1401
- );
1402
-
1403
- // Build user member with unwrapped private key to decrypt challenge
1404
- // Note: userMember now owns the unwrapped SecureBuffer, so we don't dispose it here
1405
- const userMember = await this.makeUserFromUserDoc(
1406
- userDoc,
1407
- unwrapped,
1408
- undefined,
1409
- undefined,
1410
- undefined,
1411
- session,
1412
- );
1413
-
1414
- // Generate a nonce challenge signed by system
1415
- const adminMember = SystemUserService.getSystemUser(
1416
- this.application.environment,
1417
- this.application.constants,
1418
- );
1419
- const nonce = randomBytes(32);
1420
- const signature = adminMember.sign(nonce);
1421
- const payload = Buffer.concat([nonce, signature]);
1422
-
1423
- const encryptedPayload = userMember.encryptData(payload);
1424
- const decryptedPayload = userMember.decryptData(encryptedPayload);
1425
-
1426
- const decryptedNonce = decryptedPayload.subarray(0, 32);
1427
- const decryptedSignature = decryptedPayload.subarray(32);
1428
-
1429
- const isSignatureValid = adminMember.verify(
1430
- decryptedSignature as SignatureBuffer,
1431
- decryptedNonce,
1432
- );
1433
- if (!isSignatureValid || !nonce.equals(decryptedNonce)) {
1434
- throw new InvalidCredentialsError();
1435
- }
1436
- return { userDoc, userMember, adminMember: adminMember };
1437
- }
1438
-
1439
- /**
1440
- * Re-send a previously sent email token
1441
- * @param userId The user id
1442
- * @param session The session to use for the query
1443
- * @returns void
1444
- * @throws EmailTokenUsedOrInvalidError
1445
- */
1446
- public async resendEmailToken(
1447
- userId: string,
1448
- type: EmailTokenType,
1449
- session?: ClientSession,
1450
- debug = false,
1451
- ): Promise<void> {
1452
- const EmailTokenModel =
1453
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
1454
- BaseModelName.EmailToken,
1455
- );
1456
- return await this.withTransaction<void>(
1457
- async (sess: ClientSession | undefined) => {
1458
- // look up the most recent email token for a given user, then send it
1459
- const emailToken: IEmailTokenDocument | null =
1460
- await EmailTokenModel.findOne({
1461
- userId,
1462
- type,
1463
- expiresAt: { $gt: new Date() },
1464
- })
1465
- .session(sess ?? null)
1466
- .sort({ createdAt: -1 })
1467
- .limit(1);
1468
-
1469
- if (!emailToken) {
1470
- throw new EmailTokenUsedOrInvalidError();
1471
- }
1472
-
1473
- await this.sendEmailToken(emailToken, sess, debug);
1474
- },
1475
- session,
1476
- {
1477
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1478
- },
1479
- );
1480
- }
1481
-
1482
- /**
1483
- * Verify the email token and update the user's account status
1484
- * @param emailToken The email token to verify
1485
- * @param session The session to use for the query
1486
- * @returns void
1487
- * @throws EmailTokenUsedOrInvalidError
1488
- * @throws EmailTokenExpiredError
1489
- * @throws EmailVerifiedError
1490
- * @throws UserNotFoundError
1491
- */
1492
- public async verifyAccountTokenAndComplete(
1493
- emailToken: string,
1494
- session?: ClientSession,
1495
- ): Promise<void> {
1496
- let alreadyVerified = false;
1497
-
1498
- await this.withTransaction<void>(
1499
- async (sess: ClientSession | undefined) => {
1500
- const EmailTokenModel =
1501
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
1502
- BaseModelName.EmailToken,
1503
- );
1504
- const UserModel = ModelRegistry.instance.getTypedModel<
1505
- IUserDocument<S, I>
1506
- >(BaseModelName.User);
1507
- const token: IEmailTokenDocument | null = await this.findEmailToken(
1508
- emailToken,
1509
- EmailTokenType.AccountVerification,
1510
- sess,
1511
- );
1512
-
1513
- if (!token) {
1514
- throw new EmailTokenUsedOrInvalidError();
1515
- }
1516
-
1517
- if (token.expiresAt < new Date()) {
1518
- await EmailTokenModel.deleteOne({ _id: token._id }).session(
1519
- sess ?? null,
1520
- );
1521
- throw new EmailTokenExpiredError();
1522
- }
1523
-
1524
- const user: IUserDocument<S, I> | null = await UserModel.findById(
1525
- token.userId,
1526
- ).session(sess ?? null);
1527
-
1528
- if (!user || user.deletedAt) {
1529
- throw new UserNotFoundError();
1530
- }
1531
-
1532
- if (user.emailVerified) {
1533
- // Delete the token and mark to throw error after transaction commits
1534
- await EmailTokenModel.deleteOne({ _id: token._id }).session(
1535
- sess ?? null,
1536
- );
1537
- alreadyVerified = true;
1538
- return;
1539
- }
1540
-
1541
- // set user email to token email and mark as verified
1542
- user.email = token.email;
1543
- user.emailVerified = true;
1544
- user.accountStatus = AccountStatus.Active;
1545
- user.updatedBy = user._id;
1546
- await user.save({ session: sess });
1547
-
1548
- // Delete the token after successful verification
1549
- await EmailTokenModel.deleteOne({ _id: token._id }).session(
1550
- sess ?? null,
1551
- );
1552
-
1553
- // add the user to the member role
1554
- const memberRoleId = await this.roleService.getRoleIdByName(
1555
- this.application.constants.MemberRole as Role,
1556
- sess,
1557
- );
1558
- if (memberRoleId) {
1559
- await this.roleService.addUserToRole(
1560
- memberRoleId,
1561
- user._id,
1562
- user._id,
1563
- sess,
1564
- );
1565
- } else {
1566
- throw new Error('Member role not found');
1567
- }
1568
- },
1569
- session,
1570
- {
1571
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1572
- },
1573
- );
1574
-
1575
- if (alreadyVerified) {
1576
- throw new EmailVerifiedError(409);
1577
- }
1578
- }
1579
-
1580
- /**
1581
- * Validate the email token
1582
- * @param token The token to validate
1583
- * @param restrictType The type of email token to validate (or throw)
1584
- * @param session The session to use for the query
1585
- * @returns void
1586
- * @throws EmailTokenUsedOrInvalidError
1587
- */
1588
- public async validateEmailToken(
1589
- token: string,
1590
- restrictType?: EmailTokenType,
1591
- session?: ClientSession,
1592
- ): Promise<void> {
1593
- return await this.withTransaction<void>(
1594
- async (ses: ClientSession | undefined) => {
1595
- const EmailTokenModel = this.application.getModel<IEmailTokenDocument>(
1596
- BaseModelName.EmailToken,
1597
- );
1598
- const emailToken = await EmailTokenModel.findOne({
1599
- token,
1600
- ...(restrictType ? { type: EmailTokenType.PasswordReset } : {}),
1601
- }).session(ses ?? null);
1602
-
1603
- if (!emailToken) {
1604
- throw new EmailTokenUsedOrInvalidError();
1605
- } else if (emailToken.expiresAt < new Date()) {
1606
- await EmailTokenModel.deleteOne({ _id: emailToken._id }).session(
1607
- ses ?? null,
1608
- );
1609
- throw new EmailTokenExpiredError();
1610
- }
1611
-
1612
- // nothing else to do here, token is valid
1613
- },
1614
- session,
1615
- {
1616
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1617
- },
1618
- );
1619
- }
1620
-
1621
- /**
1622
- * Updates the user's language
1623
- * @param userId - The ID of the user
1624
- * @param newLanguage - The new language
1625
- * @param session - The session to use for the query
1626
- * @returns The updated user
1627
- */
1628
- public async updateSiteLanguage(
1629
- userId: string,
1630
- newLanguage: string,
1631
- session?: ClientSession,
1632
- ): Promise<IRequestUserDTO> {
1633
- return await this.withTransaction<IRequestUserDTO>(
1634
- async (sess: ClientSession | undefined) => {
1635
- const UserModel = ModelRegistry.instance.getTypedModel<
1636
- IUserDocument<S, I>
1637
- >(BaseModelName.User);
1638
- const userDoc = await UserModel.findByIdAndUpdate(
1639
- this.idConverter(userId),
1640
- {
1641
- siteLanguage: newLanguage,
1642
- },
1643
- { new: true },
1644
- ).session(sess ?? null);
1645
- if (!userDoc) {
1646
- throw new UserNotFoundError();
1647
- }
1648
- const roles = await this.roleService.getUserRoles(userDoc._id);
1649
- const tokenRoles = this.roleService.rolesToTokenRoles(roles);
1650
- return RequestUserService.makeRequestUserDTO(userDoc, tokenRoles);
1651
- },
1652
- session,
1653
- {
1654
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1655
- },
1656
- );
1657
- }
1658
-
1659
- /**
1660
- * Updates the user's Dark Mode preference
1661
- * @param userId - The ID of the user
1662
- * @param newDarkMode - The new Dark Mode preference
1663
- * @param session - The session to use for the query
1664
- * @returns The updated user
1665
- */
1666
- public async updateDarkMode(
1667
- userId: string,
1668
- newDarkMode: boolean,
1669
- session?: ClientSession,
1670
- ): Promise<IRequestUserDTO> {
1671
- return await this.withTransaction<IRequestUserDTO>(
1672
- async (sess: ClientSession | undefined) => {
1673
- const UserModel = ModelRegistry.instance.getTypedModel<
1674
- IUserDocument<S, I>
1675
- >(BaseModelName.User);
1676
- const userDoc = await UserModel.findByIdAndUpdate(
1677
- this.idConverter(userId),
1678
- {
1679
- darkMode: newDarkMode,
1680
- },
1681
- { new: true },
1682
- ).session(sess ?? null);
1683
- if (!userDoc) {
1684
- throw new UserNotFoundError();
1685
- }
1686
- const roles = await this.roleService.getUserRoles(userDoc._id);
1687
- const tokenRoles = this.roleService.rolesToTokenRoles(roles);
1688
- return RequestUserService.makeRequestUserDTO(userDoc, tokenRoles);
1689
- },
1690
- session,
1691
- {
1692
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1693
- },
1694
- );
1695
- }
1696
-
1697
- /**
1698
- * Updates multiple user settings at once
1699
- * @param userId - The ID of the user
1700
- * @param settings - Object containing settings to update
1701
- * @param session - The session to use for the query
1702
- * @returns The updated user
1703
- */
1704
- public async updateUserSettings(
1705
- userId: string,
1706
- settings: {
1707
- email?: string;
1708
- timezone?: string;
1709
- siteLanguage?: string;
1710
- currency?: string;
1711
- darkMode?: boolean;
1712
- directChallenge?: boolean;
1713
- },
1714
- session?: ClientSession,
1715
- ): Promise<IRequestUserDTO> {
1716
- return await this.withTransaction<IRequestUserDTO>(
1717
- async (sess: ClientSession | undefined) => {
1718
- const UserModel = ModelRegistry.instance.getTypedModel<
1719
- IUserDocument<S, I>
1720
- >(BaseModelName.User);
1721
- const userDoc = await UserModel.findById(
1722
- this.idConverter(userId),
1723
- ).session(sess ?? null);
1724
- if (!userDoc) {
1725
- throw new UserNotFoundError();
1726
- }
1727
-
1728
- // Check if email is changing and if it's already in use
1729
- if (
1730
- settings.email &&
1731
- settings.email.toLowerCase() !== userDoc.email.toLowerCase()
1732
- ) {
1733
- const existingUser = await UserModel.findOne({
1734
- email: settings.email.toLowerCase(),
1735
- _id: { $ne: userDoc._id },
1736
- }).session(sess ?? null);
1737
- if (existingUser) {
1738
- throw new EmailInUseError();
1739
- }
1740
- // Send verification email for new address
1741
- userDoc.email = settings.email.toLowerCase();
1742
- await this.createAndSendEmailTokenDirect(
1743
- userDoc,
1744
- EmailTokenType.AccountVerification,
1745
- sess!,
1746
- this.application.environment.debug,
1747
- );
1748
- }
1749
-
1750
- // Update other settings
1751
- if (settings.timezone !== undefined)
1752
- userDoc.timezone = settings.timezone;
1753
- if (settings.siteLanguage !== undefined)
1754
- userDoc.siteLanguage = settings.siteLanguage as S;
1755
- if (settings.darkMode !== undefined)
1756
- userDoc.darkMode = settings.darkMode;
1757
- if (settings.currency !== undefined)
1758
- userDoc.currency = settings.currency;
1759
- if (settings.directChallenge !== undefined)
1760
- userDoc.directChallenge = settings.directChallenge;
1761
-
1762
- await userDoc.save({ session: sess });
1763
-
1764
- const roles = await this.roleService.getUserRoles(userDoc._id);
1765
- const tokenRoles = this.roleService.rolesToTokenRoles(roles);
1766
- return RequestUserService.makeRequestUserDTO(userDoc, tokenRoles);
1767
- },
1768
- session,
1769
- {
1770
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1771
- },
1772
- );
1773
- }
1774
-
1775
- /**
1776
- * Changes the user's password by re-wrapping their master key
1777
- * @param userId - The ID of the user
1778
- * @param currentPassword - The current password
1779
- * @param newPassword - The new password
1780
- * @param session - The session to use for the query
1781
- * @returns void
1782
- */
1783
- public async changePassword(
1784
- userId: string,
1785
- currentPassword: string,
1786
- newPassword: string,
1787
- session?: ClientSession,
1788
- ): Promise<void> {
1789
- return await this.withTransaction<void>(
1790
- async (sess: ClientSession | undefined) => {
1791
- const UserModel = ModelRegistry.instance.getTypedModel<
1792
- IUserDocument<S, I>
1793
- >(BaseModelName.User);
1794
- const userDoc = await UserModel.findById(
1795
- this.idConverter(userId),
1796
- ).session(sess ?? null);
1797
- if (!userDoc || !userDoc.passwordWrappedPrivateKey) {
1798
- throw new UserNotFoundError();
1799
- }
1800
-
1801
- if (!this.application.constants.PasswordRegex.test(newPassword)) {
1802
- throw new InvalidNewPasswordError();
1803
- }
1804
-
1805
- const currentPasswordSecure = new SecureString(currentPassword);
1806
- const newPasswordSecure = new SecureString(newPassword);
1807
-
1808
- try {
1809
- // Unwrap existing private key and rewrap under new password
1810
- const priv = this.keyWrappingService.unwrapSecret(
1811
- userDoc.passwordWrappedPrivateKey,
1812
- currentPasswordSecure,
1813
- );
1814
- try {
1815
- const wrapped = this.keyWrappingService.wrapSecret(
1816
- priv,
1817
- newPasswordSecure,
1818
- this.application.constants,
1819
- );
1820
- userDoc.passwordWrappedPrivateKey = wrapped;
1821
- await userDoc.save({ session: sess });
1822
- } finally {
1823
- priv.dispose();
1824
- }
1825
- } catch (error: unknown) {
1826
- // Re-throw original error so controller can map it properly
1827
- // Re-throw original error so controller can map it properly
1828
- throw error as Error;
1829
- } finally {
1830
- currentPasswordSecure.dispose();
1831
- newPasswordSecure.dispose();
1832
- }
1833
- },
1834
- session,
1835
- {
1836
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1837
- },
1838
- );
1839
- }
1840
-
1841
- /**
1842
- * Retrieve an email token by its token string and type
1843
- * @param token - The token string
1844
- * @param type - The type of the email token
1845
- * @param session - The session to use for the query
1846
- * @returns The email token document or null if not found
1847
- */
1848
- public async findEmailToken(
1849
- token: string,
1850
- type?: EmailTokenType,
1851
- session?: ClientSession,
1852
- ): Promise<IEmailTokenDocument | null> {
1853
- const EmailTokenModel =
1854
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
1855
- BaseModelName.EmailToken,
1856
- );
1857
- return await EmailTokenModel.findOne({
1858
- token: token.toLowerCase().trim(),
1859
- ...(type ? { type } : {}),
1860
- expiresAt: { $gt: new Date() },
1861
- }).session(session ?? null);
1862
- }
1863
-
1864
- /**
1865
- * Verify email token is valid
1866
- * @param token - The email token
1867
- * @param session - The session to use for the query
1868
- * @returns void
1869
- */
1870
- public async verifyEmailToken(
1871
- token: string,
1872
- type: EmailTokenType,
1873
- session?: ClientSession,
1874
- ): Promise<void> {
1875
- return await this.withTransaction<void>(
1876
- async (sess: ClientSession | undefined) => {
1877
- // Find and validate the token
1878
- const emailToken = await this.findEmailToken(token, type, sess);
1879
-
1880
- if (!emailToken) {
1881
- throw new EmailTokenUsedOrInvalidError();
1882
- }
1883
- },
1884
- session,
1885
- {
1886
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
1887
- },
1888
- );
1889
- }
1890
-
1891
- /**
1892
- * Reset password using email token
1893
- * @param token - The email token
1894
- * @param newPassword - The new password
1895
- * @param session - The session to use for the query
1896
- * @returns void
1897
- */
1898
- public async resetPasswordWithToken(
1899
- token: string,
1900
- newPassword: string,
1901
- credential?: string, // either mnemonic or current password; required
1902
- session?: ClientSession,
1903
- ): Promise<void> {
1904
- if (!this.application.constants.PasswordRegex.test(newPassword)) {
1905
- throw new InvalidNewPasswordError();
1906
- }
1907
- if (!credential) {
1908
- throw new EmailTokenUsedOrInvalidError();
1909
- }
1910
-
1911
- return await this.withTransaction<void>(
1912
- async (sess: ClientSession | undefined) => {
1913
- const EmailTokenModel =
1914
- ModelRegistry.instance.getTypedModel<IEmailTokenDocument>(
1915
- BaseModelName.EmailToken,
1916
- );
1917
- const UserModel = ModelRegistry.instance.getTypedModel<
1918
- IUserDocument<S, I>
1919
- >(BaseModelName.User);
1920
-
1921
- // Find and validate the token
1922
- const emailToken = await this.findEmailToken(
1923
- token,
1924
- EmailTokenType.PasswordReset,
1925
- sess,
1926
- );
1927
-
1928
- if (!emailToken) {
1929
- throw new EmailTokenUsedOrInvalidError();
1930
- }
1931
-
1932
- // Find the user
1933
- const userDoc = await UserModel.findById(emailToken.userId).session(
1934
- sess ?? null,
1935
- );
1936
- if (!userDoc) {
1937
- throw new UserNotFoundError();
1938
- }
1939
- // Update password-wrapped secrets based on credential type (Option B)
1940
- const newPasswordSecure = new SecureString(newPassword);
1941
- try {
1942
- if (this.application.constants.MnemonicRegex.test(credential)) {
1943
- // Credential is mnemonic: verify it belongs to this user via public key
1944
- const providedMnemonic = new SecureString(credential);
1945
- try {
1946
- const { wallet } =
1947
- this.eciesService.walletAndSeedFromMnemonic(providedMnemonic);
1948
- const pub = Buffer.concat([
1949
- Buffer.from([
1950
- this.application.constants.ECIES.PUBLIC_KEY_MAGIC,
1951
- ]),
1952
- wallet.getPublicKey(),
1953
- ]);
1954
- if (pub.toString('hex') !== userDoc.publicKey) {
1955
- throw new InvalidCredentialsError();
1956
- }
1957
-
1958
- // Derive private key from mnemonic and wrap it with new password
1959
- const privateKey = wallet.getPrivateKey();
1960
- const priv = new SecureBuffer(privateKey);
1961
- try {
1962
- const wrappedPriv = this.keyWrappingService.wrapSecret(
1963
- priv,
1964
- newPasswordSecure,
1965
- this.application.constants,
1966
- );
1967
- userDoc.passwordWrappedPrivateKey = wrappedPriv;
1968
- await userDoc.save({ session: sess });
1969
- } finally {
1970
- priv.dispose();
1971
- }
1972
- } finally {
1973
- providedMnemonic.dispose();
1974
- }
1975
- } else {
1976
- // Credential is current password: unwrap existing master key
1977
- if (!userDoc.passwordWrappedPrivateKey) {
1978
- throw new InvalidCredentialsError();
1979
- }
1980
- const privateKeyBuf =
1981
- await this.keyWrappingService.unwrapSecretAsync(
1982
- userDoc.passwordWrappedPrivateKey!,
1983
- credential,
1984
- this.application.constants,
1985
- );
1986
- try {
1987
- // Re-wrap the existing private key under the new password
1988
- const wrappedPriv = this.keyWrappingService.wrapSecret(
1989
- privateKeyBuf,
1990
- newPasswordSecure,
1991
- this.application.constants,
1992
- );
1993
- userDoc.passwordWrappedPrivateKey = wrappedPriv;
1994
- await userDoc.save({ session: sess });
1995
- } finally {
1996
- privateKeyBuf.dispose();
1997
- }
1998
- }
1999
-
2000
- // Delete the used token
2001
- await EmailTokenModel.deleteOne({ _id: emailToken._id }).session(
2002
- sess ?? null,
2003
- );
2004
-
2005
- // Dispose temporary master key
2006
- } finally {
2007
- newPasswordSecure.dispose();
2008
- }
2009
- },
2010
- session,
2011
- {
2012
- timeoutMs: this.application.environment.mongo.transactionTimeout * 5,
2013
- },
2014
- );
2015
- }
2016
-
2017
- /**
2018
- * Generate a login challenge for the client to sign
2019
- * @returns The login challenge in hex
2020
- */
2021
- public generateDirectLoginChallenge(): string {
2022
- const adminMember = SystemUserService.getSystemUser(
2023
- this.application.environment,
2024
- this.application.constants,
2025
- );
2026
- const time = Buffer.alloc(8);
2027
- time.writeBigUInt64BE(BigInt(new Date().getTime()));
2028
- const nonce = randomBytes(32);
2029
- const signature = adminMember.sign(Buffer.concat([time, nonce]));
2030
- return Buffer.concat([time, nonce, signature]).toString('hex');
2031
- }
2032
-
2033
- /**
2034
- * Verifies a direct login challenge response
2035
- * @param serverSignedRequest The login challenge response in hex
2036
- * @param session The mongoose session, if provided
2037
- * @returns A promise with the user document and user member object
2038
- */
2039
- public async verifyDirectLoginChallenge(
2040
- serverSignedRequest: string,
2041
- signature: string,
2042
- username?: string,
2043
- email?: string,
2044
- session?: ClientSession,
2045
- ): Promise<{ userDoc: IUserDocument<S, I>; userMember: BackendMember }> {
2046
- return await this.withTransaction<{
2047
- userDoc: IUserDocument<S, I>;
2048
- userMember: BackendMember;
2049
- }>(
2050
- async (sess: ClientSession | undefined) => {
2051
- // serverSignedRequest is:
2052
- // time (8) +
2053
- // nonce (32) +
2054
- // server signature (64) +
2055
- // signature (64)
2056
- if (
2057
- serverSignedRequest.length <
2058
- (8 + 32 + this.application.constants.ECIES.SIGNATURE_SIZE) * 2
2059
- ) {
2060
- throw new InvalidChallengeResponseError();
2061
- }
2062
- // get signed request into a buffer
2063
- const requestBuffer = Buffer.from(serverSignedRequest, 'hex');
2064
- // start tracking offset
2065
- let offset = 0;
2066
- // get the time
2067
- const time = requestBuffer.subarray(offset, 8);
2068
- offset += 8;
2069
- // get the nonce
2070
- const nonce = requestBuffer.subarray(offset, 40);
2071
- offset += 32;
2072
- // get the server signature
2073
- const serverSignature = requestBuffer.subarray(
2074
- offset,
2075
- this.application.constants.ECIES.SIGNATURE_SIZE + 40,
2076
- );
2077
- offset += this.application.constants.ECIES.SIGNATURE_SIZE;
2078
- const signedDataLength = offset;
2079
- if (offset !== requestBuffer.length) {
2080
- throw new InvalidChallengeResponseError();
2081
- }
2082
- // validate time is within acceptable range
2083
- const timeMs = time.readBigUInt64BE();
2084
- if (
2085
- new Date().getTime() - Number(timeMs) >
2086
- this.application.constants.LoginChallengeExpiration
2087
- ) {
2088
- throw new LoginChallengeExpiredError();
2089
- }
2090
- // validate the server's signature on the time + nonce portion
2091
- const adminMember = SystemUserService.getSystemUser(
2092
- this.application.environment,
2093
- this.application.constants,
2094
- );
2095
- if (
2096
- !adminMember.verify(
2097
- serverSignature as SignatureBuffer,
2098
- Buffer.concat([time, nonce]),
2099
- )
2100
- ) {
2101
- throw new InvalidChallengeResponseError();
2102
- }
2103
- // locate the user by email or username
2104
- const userDoc = await this.findUser(email, username, sess);
2105
- if (!userDoc) {
2106
- throw new InvalidChallengeResponseError();
2107
- }
2108
- // get the user's member object
2109
- const user = await this.makeUserFromUserDoc(
2110
- userDoc,
2111
- undefined,
2112
- undefined,
2113
- undefined,
2114
- undefined,
2115
- sess,
2116
- );
2117
- // get the signed portion of the response
2118
- const signedData = requestBuffer.subarray(0, signedDataLength);
2119
- // verify the user's signature on the signed portion
2120
- if (
2121
- !user.verify(
2122
- Buffer.from(signature, 'hex') as SignatureBuffer,
2123
- signedData,
2124
- )
2125
- ) {
2126
- throw new InvalidChallengeResponseError();
2127
- }
2128
-
2129
- if (userDoc.directChallenge !== true) {
2130
- throw new DirectChallengeNotEnabledError();
2131
- }
2132
-
2133
- // if the user is valid, try to use the token (prevents replay attacks)
2134
- await DirectLoginTokenService.useToken(
2135
- this.application,
2136
- userDoc._id,
2137
- nonce.toString('hex'),
2138
- );
2139
-
2140
- // if successful, update lastLogin
2141
- await this.updateLastLogin(userDoc._id);
2142
-
2143
- // return the user document and member object
2144
- return { userDoc, userMember: user };
2145
- },
2146
- session,
2147
- { timeoutMs: this.application.environment.mongo.transactionTimeout },
2148
- );
2149
- }
2150
-
2151
- /**
2152
- * Request a login link via email
2153
- * @param email Email address
2154
- * @param username Username
2155
- * @param session Existing session, if any
2156
- * @returns void
2157
- */
2158
- public async requestEmailLogin(
2159
- email?: string,
2160
- username?: string,
2161
- session?: ClientSession,
2162
- ): Promise<void> {
2163
- return this.withTransaction<void>(
2164
- async (sess: ClientSession | undefined) => {
2165
- const userDoc = await this.findUser(email, username, sess);
2166
- if (!userDoc) {
2167
- return;
2168
- }
2169
- await this.createAndSendEmailToken(
2170
- userDoc,
2171
- EmailTokenType.LoginRequest,
2172
- sess,
2173
- this.application.environment.debug,
2174
- );
2175
- },
2176
- session,
2177
- {
2178
- timeoutMs: this.application.environment.mongo.transactionTimeout,
2179
- },
2180
- );
2181
- }
2182
-
2183
- /**
2184
- * Validate an email login token challenge
2185
- * @param token The token to challenge
2186
- * @param signature The signature of the token by the user's private key
2187
- * @param session The session to use for the query
2188
- * @returns The user document if the challenge is valid
2189
- */
2190
- public async validateEmailLoginTokenChallenge(
2191
- token: string,
2192
- signature: string,
2193
- session?: ClientSession,
2194
- ): Promise<IUserDocument<S, I>> {
2195
- return this.withTransaction<IUserDocument<S, I>>(
2196
- async (sess: ClientSession | undefined) => {
2197
- const emailToken = await this.findEmailToken(
2198
- token,
2199
- EmailTokenType.LoginRequest,
2200
- sess,
2201
- );
2202
- if (!emailToken) {
2203
- throw new EmailTokenUsedOrInvalidError();
2204
- }
2205
- const userDoc = await this.findUser(emailToken.email, undefined, sess);
2206
- if (!userDoc) {
2207
- throw new UserNotFoundError();
2208
- }
2209
- const user = await this.makeUserFromUserDoc(
2210
- userDoc,
2211
- undefined,
2212
- undefined,
2213
- undefined,
2214
- undefined,
2215
- sess,
2216
- );
2217
- const result = user.verify(
2218
- Buffer.from(signature, 'hex') as SignatureBuffer,
2219
- Buffer.from(token, 'hex'),
2220
- );
2221
- if (!result) {
2222
- throw new InvalidChallengeResponseError();
2223
- }
2224
- await emailToken.deleteOne({ session: sess ?? null });
2225
- await this.updateLastLogin(userDoc._id);
2226
- return userDoc;
2227
- },
2228
- session,
2229
- {
2230
- timeoutMs: this.application.environment.mongo.transactionTimeout,
2231
- },
2232
- );
2233
- }
2234
-
2235
- /**
2236
- * Updates the user's last login time atomically
2237
- * @param userId - The ID of the user
2238
- * @returns void
2239
- */
2240
- public async updateLastLogin(userId: I): Promise<void> {
2241
- const UserModel = ModelRegistry.instance.get('User')?.model;
2242
- try {
2243
- // Check if the database connection is still open
2244
- const connection = this.application.db.connection;
2245
- if (connection.readyState !== 1) {
2246
- // Connection is not open (0 = disconnected, 1 = connected, 2 = connecting, 3 = disconnecting)
2247
- return; // Silently return if connection is not available
2248
- }
2249
-
2250
- // Use atomic update to avoid conflicts and ensure we only update lastLogin
2251
- // Use a separate session to avoid interfering with any ongoing transactions
2252
- await UserModel.updateOne(
2253
- { _id: userId },
2254
- {
2255
- $set: { lastLogin: new Date() },
2256
- $setOnInsert: {}, // Prevent any unintended document creation
2257
- },
2258
- {
2259
- upsert: false, // Never create a new document
2260
- runValidators: false, // Skip validation for performance since we're only updating lastLogin
2261
- // Don't use any session to avoid transaction conflicts
2262
- },
2263
- );
2264
- } catch (error) {
2265
- // Check if the error is due to client being closed
2266
- if (
2267
- error instanceof Error &&
2268
- (error.message.includes('client was closed') ||
2269
- error.message.includes('MongoClientClosedError') ||
2270
- error.name === 'MongoClientClosedError')
2271
- ) {
2272
- // This is expected during shutdown, don't log it as an error
2273
- return;
2274
- }
2275
-
2276
- // If this fails, it's not critical for login functionality. Ignore and move on.
2277
- }
2278
- }
2279
- }