authenik8-core 0.1.0 → 0.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +7 -0
- package/README.md +103 -57
- package/dist/auth/refreshService.d.ts +3 -0
- package/dist/auth/refreshService.d.ts.map +1 -1
- package/dist/auth/refreshService.js +33 -16
- package/dist/auth/refreshService.js.map +1 -1
- package/dist/createAuthenik8.d.ts.map +1 -1
- package/dist/createAuthenik8.js +1 -0
- package/dist/createAuthenik8.js.map +1 -1
- package/dist/storage/RedisTokenStore.d.ts +5 -4
- package/dist/storage/RedisTokenStore.d.ts.map +1 -1
- package/dist/storage/RedisTokenStore.js +17 -9
- package/dist/storage/RedisTokenStore.js.map +1 -1
- package/dist/tests/con.test.d.ts +2 -0
- package/dist/tests/con.test.d.ts.map +1 -0
- package/dist/tests/con.test.js +71 -0
- package/dist/tests/con.test.js.map +1 -0
- package/dist/tests/full.intergration.test.js +5 -5
- package/dist/tests/full.intergration.test.js.map +1 -1
- package/dist/utility/lockHelper.d.ts +7 -0
- package/dist/utility/lockHelper.d.ts.map +1 -0
- package/dist/utility/lockHelper.js +28 -0
- package/dist/utility/lockHelper.js.map +1 -0
- package/dump.rdb +0 -0
- package/package.json +9 -4
- package/src/auth/refreshService.ts +37 -15
- package/src/createAuthenik8.ts +1 -0
- package/src/storage/RedisTokenStore.ts +20 -9
- package/src/tests/con.test.ts +76 -0
- package/src/tests/dump.rdb +0 -0
- package/src/tests/full.intergration.test.ts +5 -5
- package/src/utility/lockHelper.ts +33 -0
- package/.env +0 -2
- package/authenik8-core-0.1.0.tgz +0 -0
- package/dist/creatAuthenik8.d.ts +0 -2
- package/dist/creatAuthenik8.d.ts.map +0 -1
- package/dist/creatAuthenik8.js +0 -3
- package/dist/creatAuthenik8.js.map +0 -1
- package/src/1 +0 -22
- package/src/creatAuthenik8.ts +0 -0
package/CHANGELOG.md
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
# Changelog
|
|
2
|
+
|
|
3
|
+
## [0.1.2] - 2026-03-22
|
|
4
|
+
### Fixed
|
|
5
|
+
- Patched a vulnerability allowing reuse of old refresh tokens.
|
|
6
|
+
- Refresh token rotation now uses Redis locks to prevent concurrent refresh exploits.
|
|
7
|
+
- Concurrent refresh requests are handled safely, ensuring only one succeeds.
|
package/README.md
CHANGED
|
@@ -1,93 +1,139 @@
|
|
|
1
1
|
# Authenik8-core
|
|
2
2
|
|
|
3
|
+
JWT rotation without uniqueness is fake security — Authenik8 fixes that.
|
|
4
|
+
Authenik8 is a modular authentication and security SDK for Node.js.
|
|
5
|
+
It combines:
|
|
3
6
|
|
|
7
|
+
JWT authentication
|
|
8
|
+
Secure refresh token rotation
|
|
9
|
+
Redis-backed session control
|
|
10
|
+
Built-in security middleware
|
|
4
11
|
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
To make it easy for you to get started with GitLab, here's a list of recommended next steps.
|
|
12
|
+
***
|
|
8
13
|
|
|
9
|
-
|
|
14
|
+
## Getting started
|
|
15
|
+
```
|
|
16
|
+
import { createAuthenik8 } from "authenik8";
|
|
10
17
|
|
|
11
|
-
|
|
18
|
+
const auth = await createAuthenik8({
|
|
19
|
+
jwtSecret: "ACCESS_SECRET",
|
|
20
|
+
refreshSecret: "REFRESH_SECRET"
|
|
21
|
+
});
|
|
12
22
|
|
|
13
|
-
|
|
14
|
-
|
|
23
|
+
// generate tokens
|
|
24
|
+
const refreshToken = await auth.generateRefreshToken({
|
|
25
|
+
userId: "user_1",
|
|
26
|
+
email: "test@test.com"
|
|
27
|
+
});
|
|
15
28
|
|
|
29
|
+
// refresh tokens
|
|
30
|
+
const result = await auth.refresh(refreshToken);
|
|
16
31
|
```
|
|
17
|
-
|
|
18
|
-
git remote add origin https://gitlab.com/COD434/authenik8-core.git
|
|
19
|
-
git branch -M main
|
|
20
|
-
git push -uf origin main
|
|
21
|
-
```
|
|
32
|
+
***
|
|
22
33
|
|
|
23
|
-
##
|
|
34
|
+
## Why Authenik8-core?
|
|
24
35
|
|
|
25
|
-
* [Set up project integrations](https://gitlab.com/COD434/authenik8-core/-/settings/integrations)
|
|
26
36
|
|
|
27
|
-
|
|
37
|
+
JWT makes authentication look simple…
|
|
38
|
+
…but introduces hidden problems:
|
|
28
39
|
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
* [Set auto-merge](https://docs.gitlab.com/user/project/merge_requests/auto_merge/)
|
|
40
|
+
Refresh token reuse (replay attacks)
|
|
41
|
+
Stateless logout issues
|
|
42
|
+
Broken token rotation
|
|
43
|
+
Scattered security logic
|
|
34
44
|
|
|
35
|
-
|
|
45
|
+
Authenik8 solves this with:
|
|
36
46
|
|
|
37
|
-
|
|
47
|
+
Refresh token rotation (with uniqueness via jti)
|
|
48
|
+
Stateful session control (Redis)
|
|
49
|
+
Built-in security (rate limit, IP whitelist, helmet)
|
|
50
|
+
Clean, unified API
|
|
38
51
|
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
52
|
+
***
|
|
53
|
+
## Secure Refresh Flow
|
|
54
|
+
```
|
|
55
|
+
// first use → valid
|
|
56
|
+
await auth.refresh(token);
|
|
44
57
|
|
|
58
|
+
// reuse same token → rejected
|
|
59
|
+
await auth.refresh(token); // ❌ throws
|
|
60
|
+
```
|
|
45
61
|
***
|
|
46
62
|
|
|
47
|
-
|
|
63
|
+
## API Overview
|
|
64
|
+
```
|
|
65
|
+
const auth = await createAuthenik8(config);
|
|
66
|
+
|
|
67
|
+
// auth
|
|
68
|
+
auth.signToken(payload);
|
|
69
|
+
auth.verifyToken(token);
|
|
48
70
|
|
|
49
|
-
|
|
71
|
+
// refresh
|
|
72
|
+
auth.refresh(refreshToken);
|
|
73
|
+
auth.generateRefreshToken(payload);
|
|
50
74
|
|
|
51
|
-
|
|
75
|
+
// security
|
|
76
|
+
auth.rateLimit;
|
|
77
|
+
auth.ipWhitelist;
|
|
78
|
+
auth.helmet;
|
|
52
79
|
|
|
53
|
-
|
|
80
|
+
// middleware
|
|
81
|
+
auth.requireAdmin;
|
|
82
|
+
```
|
|
83
|
+
***
|
|
84
|
+
## Architecture
|
|
85
|
+
|
|
86
|
+
|
|
87
|
+
Client
|
|
88
|
+
│
|
|
89
|
+
▼
|
|
90
|
+
Authenik8
|
|
91
|
+
├── JWTService
|
|
92
|
+
├── RefreshService (rotation)
|
|
93
|
+
├── SecurityModule
|
|
94
|
+
▼
|
|
95
|
+
Redis
|
|
54
96
|
|
|
55
|
-
|
|
56
|
-
Choose a self-explaining name for your project.
|
|
97
|
+
***
|
|
57
98
|
|
|
58
|
-
##
|
|
59
|
-
Let people know what your project can do specifically. Provide context and add a link to any reference visitors might be unfamiliar with. A list of Features or a Background subsection can also be added here. If there are alternatives to your project, this is a good place to list differentiating factors.
|
|
99
|
+
## Important
|
|
60
100
|
|
|
61
|
-
|
|
62
|
-
|
|
101
|
+
Authenik8-core uses stateful JWT authentication.
|
|
102
|
+
This means:
|
|
103
|
+
Requires Redis (or compatible store)
|
|
104
|
+
Provides better control over sessions and security
|
|
63
105
|
|
|
64
|
-
##
|
|
65
|
-
Depending on what you are making, it can be a good idea to include screenshots or even a video (you'll frequently see GIFs rather than actual videos). Tools like ttygif can help, but check out Asciinema for a more sophisticated method.
|
|
106
|
+
## Add your files
|
|
66
107
|
|
|
67
|
-
|
|
68
|
-
|
|
108
|
+
```
|
|
109
|
+
cd existing_repo
|
|
110
|
+
git remote add origin https://gitlab.com/COD434/authenik8-core.git
|
|
111
|
+
git branch -M main
|
|
112
|
+
git push -uf origin main
|
|
113
|
+
```
|
|
69
114
|
|
|
70
|
-
|
|
71
|
-
|
|
115
|
+
***
|
|
116
|
+
## Built with Real Testing
|
|
72
117
|
|
|
73
|
-
|
|
74
|
-
Tell people where they can go to for help. It can be any combination of an issue tracker, a chat room, an email address, etc.
|
|
118
|
+
Authenik8-core includes integration-tested flows for:
|
|
75
119
|
|
|
76
|
-
|
|
77
|
-
|
|
120
|
+
Token rotation
|
|
121
|
+
Replay attack prevention
|
|
122
|
+
Secure refresh logic
|
|
78
123
|
|
|
79
|
-
|
|
80
|
-
State if you are open to contributions and what your requirements are for accepting them.
|
|
124
|
+
***
|
|
81
125
|
|
|
82
|
-
|
|
126
|
+
## Use Cases
|
|
83
127
|
|
|
84
|
-
|
|
128
|
+
SaaS backends
|
|
129
|
+
APIs with authentication
|
|
130
|
+
Secure admin systems
|
|
131
|
+
Systems requiring session control
|
|
85
132
|
|
|
86
|
-
|
|
87
|
-
Show your appreciation to those who have contributed to the project.
|
|
133
|
+
***
|
|
88
134
|
|
|
89
|
-
##
|
|
90
|
-
For open source projects, say how it is licensed.
|
|
135
|
+
## Final Thought
|
|
91
136
|
|
|
92
|
-
|
|
93
|
-
|
|
137
|
+
JWT alone is not an authentication system.
|
|
138
|
+
Authenik8 makes it one.
|
|
139
|
+
***
|
|
@@ -13,10 +13,12 @@ export interface TokenStore {
|
|
|
13
13
|
get(key: string): Promise<string | null>;
|
|
14
14
|
set?(key: string, value: string, expiry?: number): Promise<void>;
|
|
15
15
|
del?(key: string): Promise<void>;
|
|
16
|
+
getset?(key: string, value: string, expiry?: number): Promise<string | null>;
|
|
16
17
|
}
|
|
17
18
|
export interface RefreshServiceOptions {
|
|
18
19
|
tokenStore: TokenStore;
|
|
19
20
|
accessTokenSecret: string;
|
|
21
|
+
redisClient: any;
|
|
20
22
|
refreshTokenSecret: string;
|
|
21
23
|
accessTokenExpiry: SignOptions["expiresIn"];
|
|
22
24
|
rotateRefreshTokens?: boolean;
|
|
@@ -33,6 +35,7 @@ export declare class RefreshService {
|
|
|
33
35
|
private accessTokenExpiry;
|
|
34
36
|
private rotateRefreshTokens;
|
|
35
37
|
private refreshTokenExpiry;
|
|
38
|
+
private lock;
|
|
36
39
|
constructor(options: RefreshServiceOptions);
|
|
37
40
|
generateRefreshToken(payload: TokenPayload): Promise<string>;
|
|
38
41
|
refresh(refreshToken?: string): Promise<RefreshResult>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"refreshService.d.ts","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAI3C,qBAAa,iBAAkB,SAAQ,KAAK;gBAChC,OAAO,SAAgB;CAKlC;AAED,qBAAa,iBAAkB,SAC/B,KAAK;gBACO,OAAO,SAA0B;CAI5C;AAGD,UAAU,YAAY;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACb;AAGD,MAAM,WAAW,UAAU;IAC3B,GAAG,CAAC,GAAG,EAAC,MAAM,GAAE,OAAO,CAAC,MAAM,GAAE,IAAI,CAAC,CAAC;IACtC,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/D,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"refreshService.d.ts","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAI3C,qBAAa,iBAAkB,SAAQ,KAAK;gBAChC,OAAO,SAAgB;CAKlC;AAED,qBAAa,iBAAkB,SAC/B,KAAK;gBACO,OAAO,SAA0B;CAI5C;AAGD,UAAU,YAAY;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACb;AAGD,MAAM,WAAW,UAAU;IAC3B,GAAG,CAAC,GAAG,EAAC,MAAM,GAAE,OAAO,CAAC,MAAM,GAAE,IAAI,CAAC,CAAC;IACtC,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/D,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAChC,MAAM,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;CAC5E;AAGD,MAAM,WAAW,qBAAqB;IACrC,UAAU,EAAC,UAAU,CAAC;IACtB,iBAAiB,EAAC,MAAM,CAAC;IACzB,WAAW,EAAC,GAAG,CAAC;IAChB,kBAAkB,EAAC,MAAM,CAAC;IAC1B,iBAAiB,EAAC,WAAW,CAAC,WAAW,CAAC,CAAC;IAC3C,mBAAmB,CAAC,EAAC,OAAO,CAAC;IAC7B,kBAAkB,CAAC,EAAC,MAAM,CAAC;CAC3B;AAED,MAAM,WAAW,aAAa;IAC9B,WAAW,EAAC,MAAM,CAAC;IACnB,YAAY,CAAC,EAAC,MAAM,CAAC;CACpB;AAGD,qBAAa,cAAc;IAC3B,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,kBAAkB,CAAQ;IAClC,OAAO,CAAC,iBAAiB,CAA0B;IACnD,OAAO,CAAC,mBAAmB,CAAS;IACpC,OAAO,CAAC,kBAAkB,CAAQ;IAClC,OAAO,CAAC,IAAI,CAAW;gBAEX,OAAO,EAAC,qBAAqB;IAWlC,oBAAoB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC;IAmB5D,OAAO,CAAC,YAAY,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,aAAa,CAAC;CAgE1D"}
|
|
@@ -6,6 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
6
6
|
exports.RefreshService = exports.InvalidTokenError = exports.MissingTokenError = void 0;
|
|
7
7
|
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
|
8
8
|
const crypto_1 = require("crypto");
|
|
9
|
+
const lockHelper_1 = require("../utility/lockHelper");
|
|
9
10
|
class MissingTokenError extends Error {
|
|
10
11
|
constructor(message = "Missing Token") {
|
|
11
12
|
super(message);
|
|
@@ -29,6 +30,7 @@ class RefreshService {
|
|
|
29
30
|
this.accessTokenExpiry = (_a = options.accessTokenExpiry) !== null && _a !== void 0 ? _a : "15m";
|
|
30
31
|
this.rotateRefreshTokens = (_b = options.rotateRefreshTokens) !== null && _b !== void 0 ? _b : false;
|
|
31
32
|
this.refreshTokenExpiry = (_c = options.refreshTokenExpiry) !== null && _c !== void 0 ? _c : "7d";
|
|
33
|
+
this.lock = new lockHelper_1.RedisLock(options.redisClient);
|
|
32
34
|
}
|
|
33
35
|
async generateRefreshToken(payload) {
|
|
34
36
|
if (!payload.userId)
|
|
@@ -39,7 +41,6 @@ class RefreshService {
|
|
|
39
41
|
if (this.tokenStore.set) {
|
|
40
42
|
await this.tokenStore.set(`refresh:${payload.userId}`, token, 60 * 60 * 24 * 7);
|
|
41
43
|
}
|
|
42
|
-
console.log("Saving token to Redis:", token);
|
|
43
44
|
return token;
|
|
44
45
|
}
|
|
45
46
|
async refresh(refreshToken) {
|
|
@@ -53,24 +54,40 @@ class RefreshService {
|
|
|
53
54
|
catch (err) {
|
|
54
55
|
throw new InvalidTokenError();
|
|
55
56
|
}
|
|
56
|
-
const
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
throw new InvalidTokenError();
|
|
57
|
+
const lockKey = `lock:${decoded.userId}`;
|
|
58
|
+
const lockValue = await this.lock.acquire(lockKey, 5000);
|
|
59
|
+
if (!lockValue) {
|
|
60
|
+
throw new InvalidTokenError("Concurrent refresh detected");
|
|
61
61
|
}
|
|
62
|
-
const
|
|
63
|
-
|
|
64
|
-
if (this.rotateRefreshTokens && this.tokenStore.set) {
|
|
62
|
+
//const storedToken= await this.tokenStore.get(`refresh:${decoded.userId}`)
|
|
63
|
+
try {
|
|
65
64
|
const key = `refresh:${decoded.userId}`;
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
65
|
+
const storedToken = await this.tokenStore.get(key);
|
|
66
|
+
if (!storedToken || storedToken !== refreshToken) {
|
|
67
|
+
throw new InvalidTokenError();
|
|
68
|
+
}
|
|
69
|
+
const newAccessToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email }, this.accessTokenSecret, { expiresIn: this.accessTokenExpiry });
|
|
70
|
+
let newRefreshToken;
|
|
71
|
+
if (this.rotateRefreshTokens && this.tokenStore.set) {
|
|
72
|
+
const key = `refresh:${decoded.userId}`;
|
|
73
|
+
newRefreshToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email, jti: (0, crypto_1.randomUUID)(), }, this.refreshTokenSecret, { expiresIn: this.refreshTokenExpiry });
|
|
74
|
+
if (!this.tokenStore.getset) {
|
|
75
|
+
throw new Error("TokenStore must implement getset for atomic refresh rotation");
|
|
76
|
+
}
|
|
77
|
+
const PreviousToken = await this.tokenStore.getset(key, newRefreshToken, 60 * 60 * 24 * 7);
|
|
78
|
+
if (PreviousToken !== refreshToken) {
|
|
79
|
+
throw new InvalidTokenError("Concurrent refresh detected");
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
return {
|
|
83
|
+
accessToken: newAccessToken,
|
|
84
|
+
refreshToken: newRefreshToken !== null && newRefreshToken !== void 0 ? newRefreshToken : refreshToken
|
|
85
|
+
};
|
|
86
|
+
}
|
|
87
|
+
finally {
|
|
88
|
+
if (lockValue)
|
|
89
|
+
await this.lock.release(lockKey, lockValue);
|
|
69
90
|
}
|
|
70
|
-
return {
|
|
71
|
-
accessToken: newAccessToken,
|
|
72
|
-
refreshToken: newRefreshToken !== null && newRefreshToken !== void 0 ? newRefreshToken : refreshToken
|
|
73
|
-
};
|
|
74
91
|
}
|
|
75
92
|
}
|
|
76
93
|
exports.RefreshService = RefreshService;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"refreshService.js","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":";;;;;;AAAA,gEAA+B;AAE/B,mCAAiC;
|
|
1
|
+
{"version":3,"file":"refreshService.js","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":";;;;;;AAAA,gEAA+B;AAE/B,mCAAiC;AACjC,sDAA+C;AAE/C,MAAa,iBAAkB,SAAQ,KAAK;IAC5C,YAAY,OAAO,GAAC,eAAe;QAEnC,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAE,mBAAmB,CAAC;IAC/B,CAAC;CACA;AAND,8CAMC;AAED,MAAa,iBAAkB,SAC/B,KAAK;IACL,YAAY,OAAO,GAAG,uBAAuB;QAC7C,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,mBAAmB,CAAC;IAChC,CAAC;CACA;AAND,8CAMC;AAiCD,MAAa,cAAc;IAS3B,YAAY,OAA6B;;QACzC,IAAI,CAAC,UAAU,GAAI,OAAO,CAAC,UAAU,CAAC;QACtC,IAAI,CAAC,iBAAiB,GAAG,OAAO,CAAC,iBAAiB,CAAC;QACnD,IAAI,CAAC,kBAAkB,GAAE,OAAO,CAAC,kBAAkB,CAAC;QACpD,IAAI,CAAC,iBAAiB,GAAE,MAAA,OAAO,CAAC,iBAAiB,mCAAI,KAAK,CAAC;QAC3D,IAAI,CAAC,mBAAmB,GAAG,MAAA,OAAO,CAAC,mBAAmB,mCAAI,KAAK,CAAC;QAChE,IAAI,CAAC,kBAAkB,GAAG,MAAA,OAAO,CAAC,kBAAkB,mCAAI,IAAI,CAAA;QAC5D,IAAI,CAAC,IAAI,GAAG,IAAI,sBAAS,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;IAC7C,CAAC;IAGD,KAAK,CAAC,oBAAoB,CAAC,OAAqB;QAE/C,IAAI,CAAC,OAAO,CAAC,MAAM;YAAE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QAExF,MAAM,KAAK,GAAG,sBAAG,CAAC,IAAI,CAAC,EAAC,GAAG,OAAO,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EAAC,IAAI,CAAC,kBAAkB,EAAE;YAC7E,SAAS,EAAE,IAAI,CAAC,kBAA8C;SAC/D,CAAC,CAAC;QAEH,IAAG,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;YACxB,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CACzB,WAAW,OAAO,CAAC,MAAM,EAAE,EAAC,KAAK,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAClD,CAAC;QACF,CAAC;QAGD,OAAO,KAAK,CAAA;IACd,CAAC;IAGA,KAAK,CAAC,OAAO,CAAC,YAAoB;QACjC,IAAG,CAAC,YAAY,EAAC,CAAC;YAClB,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAED,IAAI,OAAoB,CAAC;QAC3B,IAAG,CAAC;YAEJ,OAAO,GAAG,sBAAG,CAAC,MAAM,CAAC,YAAY,EAAC,IAAI,CAAC,kBAAkB,CAAiB,CAAC;QAC3E,CAAC;QAAA,OAAM,GAAG,EAAC,CAAC;YACZ,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAED,MAAM,OAAO,GAAG,QAAQ,OAAO,CAAC,MAAM,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAEzD,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,iBAAiB,CAAC,6BAA6B,CAAC,CAAC;QAC7D,CAAC;QAEH,2EAA2E;QAE3E,IAAG,CAAC;YACJ,MAAM,GAAG,GAAG,WAAW,OAAO,CAAC,MAAM,EAAE,CAAC;YACxC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;YAGnD,IAAI,CAAC,WAAW,IAAI,WAAW,KAAK,YAAY,EAAC,CAAC;gBAClD,MAAM,IAAI,iBAAiB,EAAE,CAAC;YAC9B,CAAC;YAED,MAAM,cAAc,GAAG,sBAAG,CAAC,IAAI,CACvB,EAAE,MAAM,EAAE,OAAO,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,CAAC,KAAK,EAAE,EAChD,IAAI,CAAC,iBAAiB,EACtB,EAAE,SAAS,EAAE,IAAI,CAAC,iBAAiD,EAAE,CACxE,CAAC;YAEN,IAAI,eAAkC,CAAC;YAEvC,IAAG,IAAI,CAAC,mBAAmB,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;gBACpD,MAAM,GAAG,GAAG,WAAW,OAAO,CAAC,MAAM,EAAE,CAEtC;gBACA,eAAe,GAAE,sBAAG,CAAC,IAAI,CAAC,EAAC,MAAM,EAAC,OAAO,CAAC,MAAM,EAAC,KAAK,EAAG,OAAO,CAAC,KAAK,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EACzF,IAAI,CAAC,kBAAkB,EACxB,EAAC,SAAS,EAAC,IAAI,CAAC,kBAAkD,EAAC,CAAC,CAAC;gBAErE,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;oBAC5B,MAAM,IAAI,KAAK,CAAC,8DAA8D,CAAC,CAAC;gBAClF,CAAC;gBACD,MAAM,aAAa,GAAE,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,EAAC,eAAe,EAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAA;gBACvF,IAAG,aAAa,KAAK,YAAY,EAAC,CAAC;oBACnC,MAAM,IAAI,iBAAiB,CAAC,6BAA6B,CAAC,CAAA;gBAAA,CAAC;YAC3D,CAAC;YAEA,OAAM;gBACN,WAAW,EAAC,cAAc;gBAC1B,YAAY,EAAC,eAAe,aAAf,eAAe,cAAf,eAAe,GAAI,YAAY;aAC3C,CAAC;QACH,CAAC;gBAAQ,CAAC;YACN,IAAI,SAAS;gBAAE,MAAM,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;CAEA;AAvGD,wCAuGC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"createAuthenik8.d.ts","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,eAAe,EAAC,MAAM,gBAAgB,CAAC;AAK/C,OAAO,EAAC,iBAAiB,EAAC,MAAM,gBAAgB,CAAA;AAGhD,eAAO,MAAM,eAAe,GAAU,QAAO,eAAe,KAAG,OAAO,CAAC,iBAAiB,
|
|
1
|
+
{"version":3,"file":"createAuthenik8.d.ts","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,eAAe,EAAC,MAAM,gBAAgB,CAAC;AAK/C,OAAO,EAAC,iBAAiB,EAAC,MAAM,gBAAgB,CAAA;AAGhD,eAAO,MAAM,eAAe,GAAU,QAAO,eAAe,KAAG,OAAO,CAAC,iBAAiB,CAwDvF,CAAA"}
|
package/dist/createAuthenik8.js
CHANGED
|
@@ -19,6 +19,7 @@ const createAuthenik8 = async (config) => {
|
|
|
19
19
|
});
|
|
20
20
|
const refreshService = new refreshService_1.RefreshService({
|
|
21
21
|
tokenStore,
|
|
22
|
+
redisClient,
|
|
22
23
|
accessTokenSecret: config.jwtSecret,
|
|
23
24
|
refreshTokenSecret: config.refreshSecret,
|
|
24
25
|
accessTokenExpiry: config.jwtExpiry,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"createAuthenik8.js","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":";;;AAAA,oDAAoD;AACpD,0DAAsD;AAEtD,8DAAkD;AAClD,4DAAuD;AACvD,4CAAyC;AACzC,uDAA4D;AAE5D,+DAAyD;AAElD,MAAM,eAAe,GAAG,KAAK,EAAE,MAAsB,EAA8B,EAAE;;IAE5F,MAAM,WAAW,GAAG,MAAA,MAAM,CAAC,KAAK,mCAAI,MAAM,IAAA,oCAAqB,GAAE,CAAA;IACjE,MAAM,UAAU,GAAG,IAAI,iCAAe,CAAC,WAAW,CAAC,CAAC;IAEnD,MAAM,UAAU,GAAE,IAAI,oBAAU,CAAC;QACjC,SAAS,EAAC,MAAM,CAAC,SAAS;QAC1B,MAAM,EAAC,MAAM,CAAC,SAAS;QACvB,WAAW,EAAC,WAAW;KACtB,CAAC,CAAC;IAEH,MAAM,cAAc,GAAG,IAAI,+BAAc,CAAC;QAC1C,UAAU;QACV,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,kBAAkB,EAAC,MAAM,CAAC,aAAa;QACvC,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,mBAAmB,EAAC,IAAI;KACvB,CAAC,CAAC;IAEH,MAAM,QAAQ,GAAG,IAAI,0BAAc,CAAC;QACpC,WAAW,EAAC,MAAM,CAAC,KAAK;QACxB,kBAAkB,EAAE,IAAI;QACxB,aAAa,EAAC,IAAI;QAClB,gBAAgB,EAAC,IAAI;KACpB,CAAC,CAAC;IACJ,OAAM;QACL,MAAM;QACN,KAAK,EAAC,WAAW;QACjB,SAAS,EAAC,UAAU,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;QAC/C,WAAW,EAAC,UAAU,CAAC,WAAW,CAAC,IAAI,CAAC,UAAU,CAAC;QACnD,UAAU,EAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC;QAEjD,SAAS;QACT,YAAY,EACX,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC;QAC5C,oBAAoB,EAAE,cAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,cAAc,CAAC;QAC/E,UAAU;QACP,SAAS,EAAE,QAAQ,CAAC,qBAAqB,EAAE;QAC1C,WAAW,EAAE,QAAQ,CAAC,mBAAmB,EAAE;QAC3C,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE;QAEnC,sBAAsB;QACtB,KAAK,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC;QACpC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC;QAC1C,OAAO,EAAE,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC;QAG3C,YAAY;QACb,YAAY,EAAE,IAAA,2BAAY,EAAC,EAAE,SAAS,EACrC,MAAM,CAAC,SAAS;YACX,KAAK,EAAC,WAAW;SACtB,CAAC;QACF,SAAS,EAAC,4BAAS;KAElB,CAAA;AACD,CAAC,CAAA;
|
|
1
|
+
{"version":3,"file":"createAuthenik8.js","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":";;;AAAA,oDAAoD;AACpD,0DAAsD;AAEtD,8DAAkD;AAClD,4DAAuD;AACvD,4CAAyC;AACzC,uDAA4D;AAE5D,+DAAyD;AAElD,MAAM,eAAe,GAAG,KAAK,EAAE,MAAsB,EAA8B,EAAE;;IAE5F,MAAM,WAAW,GAAG,MAAA,MAAM,CAAC,KAAK,mCAAI,MAAM,IAAA,oCAAqB,GAAE,CAAA;IACjE,MAAM,UAAU,GAAG,IAAI,iCAAe,CAAC,WAAW,CAAC,CAAC;IAEnD,MAAM,UAAU,GAAE,IAAI,oBAAU,CAAC;QACjC,SAAS,EAAC,MAAM,CAAC,SAAS;QAC1B,MAAM,EAAC,MAAM,CAAC,SAAS;QACvB,WAAW,EAAC,WAAW;KACtB,CAAC,CAAC;IAEH,MAAM,cAAc,GAAG,IAAI,+BAAc,CAAC;QAC1C,UAAU;QACV,WAAW;QACX,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,kBAAkB,EAAC,MAAM,CAAC,aAAa;QACvC,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,mBAAmB,EAAC,IAAI;KACvB,CAAC,CAAC;IAEH,MAAM,QAAQ,GAAG,IAAI,0BAAc,CAAC;QACpC,WAAW,EAAC,MAAM,CAAC,KAAK;QACxB,kBAAkB,EAAE,IAAI;QACxB,aAAa,EAAC,IAAI;QAClB,gBAAgB,EAAC,IAAI;KACpB,CAAC,CAAC;IACJ,OAAM;QACL,MAAM;QACN,KAAK,EAAC,WAAW;QACjB,SAAS,EAAC,UAAU,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;QAC/C,WAAW,EAAC,UAAU,CAAC,WAAW,CAAC,IAAI,CAAC,UAAU,CAAC;QACnD,UAAU,EAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC;QAEjD,SAAS;QACT,YAAY,EACX,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC;QAC5C,oBAAoB,EAAE,cAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,cAAc,CAAC;QAC/E,UAAU;QACP,SAAS,EAAE,QAAQ,CAAC,qBAAqB,EAAE;QAC1C,WAAW,EAAE,QAAQ,CAAC,mBAAmB,EAAE;QAC3C,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE;QAEnC,sBAAsB;QACtB,KAAK,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC;QACpC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC;QAC1C,OAAO,EAAE,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC;QAG3C,YAAY;QACb,YAAY,EAAE,IAAA,2BAAY,EAAC,EAAE,SAAS,EACrC,MAAM,CAAC,SAAS;YACX,KAAK,EAAC,WAAW;SACtB,CAAC;QACF,SAAS,EAAC,4BAAS;KAElB,CAAA;AACD,CAAC,CAAA;AAxDY,QAAA,eAAe,mBAwD3B"}
|
|
@@ -7,10 +7,11 @@ export declare class RedisTokenStore {
|
|
|
7
7
|
private key;
|
|
8
8
|
private log;
|
|
9
9
|
storeRefreshToken(token: string, userId: string, ttl: number): Promise<void>;
|
|
10
|
-
getRefreshToken(
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
10
|
+
getRefreshToken(userId: string): Promise<string | null>;
|
|
11
|
+
getset(key: string, value: string, expiry?: number): Promise<string | null>;
|
|
12
|
+
deleteRefreshToken(userId: string): Promise<void>;
|
|
13
|
+
blacklistToken(userId: string, ttl: number): Promise<void>;
|
|
14
|
+
isBlacklisted(userId: string): Promise<boolean>;
|
|
14
15
|
incrementRateLimit(ip: string, ttl: number): Promise<number>;
|
|
15
16
|
addToWhitelist(ip: string): Promise<void>;
|
|
16
17
|
removeFromWhitelist(ip: string): Promise<void>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"RedisTokenStore.d.ts","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAEhC,qBAAa,eAAe;IAGd,OAAO,CAAC,KAAK;IAAQ,OAAO,CAAC,KAAK;IAF/C,OAAO,CAAC,MAAM,CAAa;gBAEN,KAAK,EAAE,KAAK,EAAS,KAAK,UAAQ;IAGtD,OAAO,CAAC,GAAG;IAIb,OAAO,CAAC,GAAG;IAKJ,iBAAiB,CAAC,KAAK,EAAC,MAAM,EAAC,MAAM,EAAC,MAAM,EAAC,GAAG,EAAC,MAAM;IAOxD,eAAe,CAAC,
|
|
1
|
+
{"version":3,"file":"RedisTokenStore.d.ts","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAEhC,qBAAa,eAAe;IAGd,OAAO,CAAC,KAAK;IAAQ,OAAO,CAAC,KAAK;IAF/C,OAAO,CAAC,MAAM,CAAa;gBAEN,KAAK,EAAE,KAAK,EAAS,KAAK,UAAQ;IAGtD,OAAO,CAAC,GAAG;IAIb,OAAO,CAAC,GAAG;IAKJ,iBAAiB,CAAC,KAAK,EAAC,MAAM,EAAC,MAAM,EAAC,MAAM,EAAC,GAAG,EAAC,MAAM;IAOxD,eAAe,CAAC,MAAM,EAAC,MAAM;IAM7B,MAAM,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAY3E,kBAAkB,CAAC,MAAM,EAAC,MAAM;IAOhC,cAAc,CAAC,MAAM,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAMxC,aAAa,CAAC,MAAM,EAAE,MAAM;IAQ5B,kBAAkB,CAAC,EAAE,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAa1C,cAAc,CAAC,EAAE,EAAE,MAAM;IAMzB,mBAAmB,CAAC,EAAE,EAAE,MAAM;IAM9B,aAAa,CAAC,EAAE,EAAE,MAAM;IAM1B,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAW7D,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;CAG/C"}
|
|
@@ -16,28 +16,36 @@ class RedisTokenStore {
|
|
|
16
16
|
}
|
|
17
17
|
}
|
|
18
18
|
async storeRefreshToken(token, userId, ttl) {
|
|
19
|
-
const key = this.key("refresh",
|
|
19
|
+
const key = this.key("refresh", userId);
|
|
20
20
|
await this.redis.set(key, userId, "EX", ttl);
|
|
21
21
|
this.log("SET", key, userId);
|
|
22
22
|
}
|
|
23
|
-
async getRefreshToken(
|
|
24
|
-
const key = this.key("refresh",
|
|
23
|
+
async getRefreshToken(userId) {
|
|
24
|
+
const key = this.key("refresh", userId);
|
|
25
25
|
const value = await this.redis.get(key);
|
|
26
26
|
this.log("GET", key, value);
|
|
27
27
|
return value;
|
|
28
28
|
}
|
|
29
|
-
async
|
|
30
|
-
const
|
|
29
|
+
async getset(key, value, expiry) {
|
|
30
|
+
const previous = await this.redis.getset(key, value);
|
|
31
|
+
if (expiry) {
|
|
32
|
+
await this.redis.expire(key, expiry);
|
|
33
|
+
}
|
|
34
|
+
this.log("GETSET", key, { previous, new: value });
|
|
35
|
+
return previous;
|
|
36
|
+
}
|
|
37
|
+
async deleteRefreshToken(userId) {
|
|
38
|
+
const key = this.key("refresh", userId);
|
|
31
39
|
await this.redis.del(key);
|
|
32
40
|
this.log("DEL", key);
|
|
33
41
|
}
|
|
34
|
-
async blacklistToken(
|
|
35
|
-
const key = this.key("blacklist",
|
|
42
|
+
async blacklistToken(userId, ttl) {
|
|
43
|
+
const key = this.key("blacklist", userId);
|
|
36
44
|
await this.redis.set(key, "1", "EX", ttl);
|
|
37
45
|
this.log("SET", key, "blacklisted");
|
|
38
46
|
}
|
|
39
|
-
async isBlacklisted(
|
|
40
|
-
const key = this.key("blacklist",
|
|
47
|
+
async isBlacklisted(userId) {
|
|
48
|
+
const key = this.key("blacklist", userId);
|
|
41
49
|
const exists = await this.redis.exists(key);
|
|
42
50
|
this.log("CHECK", key, exists);
|
|
43
51
|
return exists === 1;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"RedisTokenStore.js","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":";;;AAGA,MAAa,eAAe;IAG1B,YAAoB,KAAY,EAAS,QAAQ,KAAK;QAAlC,UAAK,GAAL,KAAK,CAAO;QAAS,UAAK,GAAL,KAAK,CAAQ;QAF/C,WAAM,GAAG,SAAS,CAAC;IAE+B,CAAC;IAGlD,GAAG,CAAC,GAAG,KAAc;QAC7B,OAAO,GAAG,IAAI,CAAC,MAAM,IAAI,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC3C,CAAC;IAEK,GAAG,CAAC,MAAa,EAAC,GAAU,EAAE,KAAU;QAChD,IAAI,IAAI,CAAC,KAAK,EAAC,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,GAAG,EAAC,EAAC,GAAG,EAAE,KAAK,EAAC,CAAC,CAAA;QAC5C,CAAC;IACF,CAAC;IACA,KAAK,CAAC,iBAAiB,CAAC,KAAY,EAAC,MAAa,EAAC,GAAU;QAC7D,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,
|
|
1
|
+
{"version":3,"file":"RedisTokenStore.js","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":";;;AAGA,MAAa,eAAe;IAG1B,YAAoB,KAAY,EAAS,QAAQ,KAAK;QAAlC,UAAK,GAAL,KAAK,CAAO;QAAS,UAAK,GAAL,KAAK,CAAQ;QAF/C,WAAM,GAAG,SAAS,CAAC;IAE+B,CAAC;IAGlD,GAAG,CAAC,GAAG,KAAc;QAC7B,OAAO,GAAG,IAAI,CAAC,MAAM,IAAI,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC3C,CAAC;IAEK,GAAG,CAAC,MAAa,EAAC,GAAU,EAAE,KAAU;QAChD,IAAI,IAAI,CAAC,KAAK,EAAC,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,GAAG,EAAC,EAAC,GAAG,EAAE,KAAK,EAAC,CAAC,CAAA;QAC5C,CAAC;IACF,CAAC;IACA,KAAK,CAAC,iBAAiB,CAAC,KAAY,EAAC,MAAa,EAAC,GAAU;QAC7D,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;QACxC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAC,MAAM,EAAE,IAAI,EAAC,GAAG,CAAC,CAAC;QAC3C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,MAAM,CAAC,CAAA;IAE7B,CAAC;IAED,KAAK,CAAC,eAAe,CAAC,MAAa;QACnC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,MAAM,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,EAAG,KAAK,CAAC,CAAC;QAC5B,OAAO,KAAK,CAAC;IACb,CAAC;IACD,KAAK,CAAC,MAAM,CAAC,GAAW,EAAE,KAAa,EAAE,MAAe;QAEtD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QAErD,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;QACvC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,EAAE,EAAE,QAAQ,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC,CAAC;QAClD,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED,KAAK,CAAC,kBAAkB,CAAC,MAAa;QACtC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,MAAM,CAAC,CAAC;QACvC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,CAAC,CAAC;IAEpB,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,MAAc,EAAE,GAAW;QAC5C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;QAC1C,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,IAAI,EAAE,GAAG,CAAC,CAAC;QAC1C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,MAAc;QAChC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;QAC1C,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IAED,gBAAgB;IAChB,KAAK,CAAC,kBAAkB,CAAC,EAAU,EAAE,GAAW;QAC9C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;QAEjC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACzC,IAAI,KAAK,KAAK,CAAC,EAAE,CAAC;YAChB,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QACpC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAC7B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,eAAe;IACf,KAAK,CAAC,cAAc,CAAC,EAAU;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QAC/B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,mBAAmB,CAAC,EAAU;QAClC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACvB,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,EAAU;QAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IACH,KAAK,CAAC,GAAG,CAAC,GAAW,EAAE,KAAa,EAAE,MAAe;QACnD,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAEtC,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;QACjD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAGC,KAAK,CAAC,GAAG,CAAC,GAAW;QACrB,OAAO,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC3B,CAAC;CACF;AA1GD,0CA0GC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"con.test.d.ts","sourceRoot":"","sources":["../../src/tests/con.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const createAuthenik8_1 = require("../createAuthenik8");
|
|
7
|
+
const supertest_1 = __importDefault(require("supertest"));
|
|
8
|
+
const express_1 = __importDefault(require("express"));
|
|
9
|
+
const ioredis_1 = __importDefault(require("ioredis"));
|
|
10
|
+
describe("Refresh Token Concurrency (Integration)", () => {
|
|
11
|
+
let app;
|
|
12
|
+
let auth; // or just `any` but this is better
|
|
13
|
+
let refreshToken;
|
|
14
|
+
let redisClient;
|
|
15
|
+
beforeAll(async () => {
|
|
16
|
+
// Create and verify a connected Redis client (use a separate DB for tests)
|
|
17
|
+
redisClient = new ioredis_1.default({ host: "localhost", port: 6379, db: 1 });
|
|
18
|
+
await redisClient.ping(); // ensure connection is established
|
|
19
|
+
// Pass the connected client as `redis` (not `redisClient`)
|
|
20
|
+
auth = await (0, createAuthenik8_1.createAuthenik8)({
|
|
21
|
+
jwtSecret: "test-secret",
|
|
22
|
+
refreshSecret: "refresh-secret",
|
|
23
|
+
jwtExpiry: "15m",
|
|
24
|
+
redis: redisClient, // ✅ correct property name
|
|
25
|
+
});
|
|
26
|
+
app = (0, express_1.default)();
|
|
27
|
+
app.use(express_1.default.json());
|
|
28
|
+
// Login route – must be async and await the refresh token generation
|
|
29
|
+
app.post("/login", async (req, res) => {
|
|
30
|
+
const token = auth.signToken({ userId: "user_1", email: "test@test.com" });
|
|
31
|
+
refreshToken = await auth.generateRefreshToken({ userId: "user_1", email: "test@test.com" });
|
|
32
|
+
res.json({ token, refreshToken });
|
|
33
|
+
});
|
|
34
|
+
// Refresh route – unchanged but uses the proper error handling
|
|
35
|
+
app.post("/refresh", async (req, res) => {
|
|
36
|
+
try {
|
|
37
|
+
const result = await auth.refreshToken(req.body.refreshToken);
|
|
38
|
+
res.json(result);
|
|
39
|
+
}
|
|
40
|
+
catch (err) {
|
|
41
|
+
console.error("Refresh error", err);
|
|
42
|
+
if (err.name === "InvalidTokenError") {
|
|
43
|
+
return res.status(401).json({ error: err.message });
|
|
44
|
+
}
|
|
45
|
+
return res.status(500).json({ error: err.message });
|
|
46
|
+
}
|
|
47
|
+
});
|
|
48
|
+
});
|
|
49
|
+
afterAll(async () => {
|
|
50
|
+
// Clean up the test database and close the client
|
|
51
|
+
await redisClient.flushdb();
|
|
52
|
+
await redisClient.quit();
|
|
53
|
+
});
|
|
54
|
+
it("should allow only one of two concurrent refresh requests", async () => {
|
|
55
|
+
// Login to obtain a valid refresh token
|
|
56
|
+
await (0, supertest_1.default)(app).post("/login").send({});
|
|
57
|
+
// Fire two concurrent refresh requests
|
|
58
|
+
const [res1, res2] = await Promise.all([
|
|
59
|
+
(0, supertest_1.default)(app).post("/refresh").send({ refreshToken }),
|
|
60
|
+
(0, supertest_1.default)(app).post("/refresh").send({ refreshToken }),
|
|
61
|
+
]);
|
|
62
|
+
// Exactly one should succeed (200) and one should fail with 401
|
|
63
|
+
const statuses = [res1.status, res2.status].sort();
|
|
64
|
+
expect(statuses).toEqual([200, 401]);
|
|
65
|
+
// The successful response must contain new tokens
|
|
66
|
+
const successRes = res1.status === 200 ? res1 : res2;
|
|
67
|
+
expect(successRes.body).toHaveProperty("accessToken");
|
|
68
|
+
expect(successRes.body).toHaveProperty("refreshToken");
|
|
69
|
+
});
|
|
70
|
+
});
|
|
71
|
+
//# sourceMappingURL=con.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"con.test.js","sourceRoot":"","sources":["../../src/tests/con.test.ts"],"names":[],"mappings":";;;;;AAAA,wDAAqD;AACrD,0DAAgC;AAChC,sDAA8B;AAC9B,sDAA4B;AAE5B,QAAQ,CAAC,yCAAyC,EAAE,GAAG,EAAE;IACvD,IAAI,GAAoB,CAAC;IACzB,IAAI,IAAiD,CAAC,CAAC,mCAAmC;IAC1F,IAAI,YAAoB,CAAC;IACzB,IAAI,WAAkB,CAAC;IAEvB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,2EAA2E;QAC3E,WAAW,GAAG,IAAI,iBAAK,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,CAAC;QAClE,MAAM,WAAW,CAAC,IAAI,EAAE,CAAC,CAAC,mCAAmC;QAE7D,2DAA2D;QAC3D,IAAI,GAAG,MAAM,IAAA,iCAAe,EAAC;YAC3B,SAAS,EAAE,aAAa;YACxB,aAAa,EAAE,gBAAgB;YAC/B,SAAS,EAAE,KAAK;YAChB,KAAK,EAAE,WAAW,EAAE,0BAA0B;SAC/C,CAAC,CAAC;QAEH,GAAG,GAAG,IAAA,iBAAO,GAAE,CAAC;QAChB,GAAG,CAAC,GAAG,CAAC,iBAAO,CAAC,IAAI,EAAE,CAAC,CAAC;QAExB,qEAAqE;QACrE,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACpC,MAAM,KAAK,GAAG,IAAI,CAAC,SAAS,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,eAAe,EAAE,CAAC,CAAC;YAC3E,YAAY,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,eAAe,EAAE,CAAC,CAAC;YAC7F,GAAG,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,YAAY,EAAE,CAAC,CAAC;QACpC,CAAC,CAAC,CAAC;QAEH,+DAA+D;QAC/D,GAAG,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACtC,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAC9D,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACnB,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBACnB,OAAO,CAAC,KAAK,CAAC,eAAe,EAAC,GAAG,CAAC,CAAA;gBAElC,IAAG,GAAG,CAAC,IAAI,KAAK,mBAAmB,EAAC,CAAC;oBACrC,OAAO,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,EAAC,KAAK,EAAC,GAAG,CAAC,OAAO,EAAC,CAAC,CAAA;gBAChD,CAAC;gBACA,OAAO,GAAG,CAAC,MAAM,CAAE,GAAG,CAAC,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvD,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,kDAAkD;QAClD,MAAM,WAAW,CAAC,OAAO,EAAE,CAAC;QAC5B,MAAM,WAAW,CAAC,IAAI,EAAE,CAAC;IAC3B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,wCAAwC;QACxC,MAAM,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAE3C,uCAAuC;QACvC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YACrC,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC;YACpD,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC;SACrD,CAAC,CAAC;QAEH,gEAAgE;QAChE,MAAM,QAAQ,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC;QACnD,MAAM,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;QAErC,kDAAkD;QAClD,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,KAAK,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC;QACrD,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QACtD,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -18,7 +18,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
18
18
|
await auth.redis.quit();
|
|
19
19
|
}
|
|
20
20
|
});
|
|
21
|
-
//
|
|
21
|
+
// LOGIN
|
|
22
22
|
test("should login and receive tokens", async () => {
|
|
23
23
|
const res = await request.post("/login");
|
|
24
24
|
expect(res.status).toBe(200);
|
|
@@ -27,7 +27,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
27
27
|
accessToken = res.body.accessToken;
|
|
28
28
|
refreshToken = res.body.refreshToken;
|
|
29
29
|
});
|
|
30
|
-
//
|
|
30
|
+
// PROTECTED ROUTE
|
|
31
31
|
test("should access protected route with valid token", async () => {
|
|
32
32
|
const res = await request
|
|
33
33
|
.get("/protected")
|
|
@@ -35,12 +35,12 @@ describe("Authenik8 Full Integration", () => {
|
|
|
35
35
|
expect(res.status).toBe(200);
|
|
36
36
|
expect(res.body).toHaveProperty("data", "secure data");
|
|
37
37
|
});
|
|
38
|
-
//
|
|
38
|
+
// NO TOKEN
|
|
39
39
|
test("should reject request without token", async () => {
|
|
40
40
|
const res = await request.get("/protected");
|
|
41
41
|
expect(res.status).toBe(401);
|
|
42
42
|
});
|
|
43
|
-
//
|
|
43
|
+
// REFRESH TOKEN
|
|
44
44
|
test("should refresh access token", async () => {
|
|
45
45
|
const res = await request
|
|
46
46
|
.post("/refresh")
|
|
@@ -55,7 +55,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
55
55
|
refreshToken = res.body.refreshToken;
|
|
56
56
|
}
|
|
57
57
|
});
|
|
58
|
-
//
|
|
58
|
+
// ROTATION (IMPORTANT)
|
|
59
59
|
test("should NOT allow reuse of old refresh token", async () => {
|
|
60
60
|
const originalToken = refreshToken;
|
|
61
61
|
// first use → rotates token
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"full.intergration.test.js","sourceRoot":"","sources":["../../src/tests/full.intergration.test.ts"],"names":[],"mappings":";;AAAA,iCAAiC;AACjC,uCAA0C;AAE1C,QAAQ,CAAC,4BAA4B,EAAE,GAAG,EAAE;IAC1C,IAAI,OAAY,CAAC;IACjB,IAAI,IAAS,CAAC;IAEd,IAAI,WAAmB,CAAC;IACxB,IAAI,YAAoB,CAAC;IAEzB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,MAAM,KAAK,GAAG,MAAM,IAAA,uBAAa,GAAE,CAAC;QACpC,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC;QACxB,IAAI,GAAG,KAAK,CAAC,IAAI,CAAC;IACpB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YAC3B,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,
|
|
1
|
+
{"version":3,"file":"full.intergration.test.js","sourceRoot":"","sources":["../../src/tests/full.intergration.test.ts"],"names":[],"mappings":";;AAAA,iCAAiC;AACjC,uCAA0C;AAE1C,QAAQ,CAAC,4BAA4B,EAAE,GAAG,EAAE;IAC1C,IAAI,OAAY,CAAC;IACjB,IAAI,IAAS,CAAC;IAEd,IAAI,WAAmB,CAAC;IACxB,IAAI,YAAoB,CAAC;IAEzB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,MAAM,KAAK,GAAG,MAAM,IAAA,uBAAa,GAAE,CAAC;QACpC,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC;QACxB,IAAI,GAAG,KAAK,CAAC,IAAI,CAAC;IACpB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YAC3B,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,SAAS;IACT,IAAI,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QACjD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,mBAAmB;IACnB,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAChE,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,GAAG,CAAC,YAAY,CAAC;aACjB,GAAG,CAAC,eAAe,EAAE,UAAU,WAAW,EAAE,CAAC,CAAC;QAEjD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,YAAY;IACZ,IAAI,CAAC,qCAAqC,EAAE,KAAK,IAAI,EAAE;QACrD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAE5C,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,gBAAgB;IAChB,IAAI,CAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;QAC7C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC,CAAC;QAE1B,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,gBAAgB;QAChB,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QAErC,IAAI,GAAG,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YAC9B,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QACvC,CAAC;IAEC,CAAC,CAAC,CAAC;IAEH,wBAAwB;IACxB,IAAI,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;QAC/D,MAAM,aAAa,GAAG,YAAY,CAAC;QAEnC,4BAA4B;QAC5B,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAElC,MAAM,QAAQ,GAAG,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;QAE5C,0CAA0C;QAC1C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAE7B,sCAAsC;QACtC,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,CAAC;QAEpC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACpC,CAAC,CAAC,CAAC;AACD,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"lockHelper.d.ts","sourceRoot":"","sources":["../../src/utility/lockHelper.ts"],"names":[],"mappings":"AAEA,qBAAa,SAAS;IACR,OAAO,CAAC,KAAK;gBAAL,KAAK,EAAE,GAAG;IAExB,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,SAAO,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAgBxD,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAWzD"}
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.RedisLock = void 0;
|
|
4
|
+
const crypto_1 = require("crypto");
|
|
5
|
+
class RedisLock {
|
|
6
|
+
constructor(redis) {
|
|
7
|
+
this.redis = redis;
|
|
8
|
+
}
|
|
9
|
+
async acquire(key, ttl = 5000) {
|
|
10
|
+
const value = (0, crypto_1.randomUUID)();
|
|
11
|
+
const result = await this.redis.set(key, value, "PX", ttl, "NX");
|
|
12
|
+
if (result !== "OK")
|
|
13
|
+
return null;
|
|
14
|
+
return value;
|
|
15
|
+
}
|
|
16
|
+
async release(key, value) {
|
|
17
|
+
const luaScript = `
|
|
18
|
+
if redis.call("GET", KEYS[1]) == ARGV[1] then
|
|
19
|
+
return redis.call("DEL", KEYS[1])
|
|
20
|
+
else
|
|
21
|
+
return 0
|
|
22
|
+
end
|
|
23
|
+
`;
|
|
24
|
+
await this.redis.eval(luaScript, 1, key, value);
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
exports.RedisLock = RedisLock;
|
|
28
|
+
//# sourceMappingURL=lockHelper.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"lockHelper.js","sourceRoot":"","sources":["../../src/utility/lockHelper.ts"],"names":[],"mappings":";;;AAAA,mCAAoC;AAEpC,MAAa,SAAS;IACpB,YAAoB,KAAU;QAAV,UAAK,GAAL,KAAK,CAAK;IAAG,CAAC;IAElC,KAAK,CAAC,OAAO,CAAC,GAAW,EAAE,GAAG,GAAG,IAAI;QACnC,MAAM,KAAK,GAAG,IAAA,mBAAU,GAAE,CAAC;QAE3B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CACjC,GAAG,EACH,KAAK,EACL,IAAI,EACJ,GAAG,EACH,IAAI,CACL,CAAC;QAEF,IAAI,MAAM,KAAK,IAAI;YAAE,OAAO,IAAI,CAAC;QAEjC,OAAO,KAAK,CAAC;IACf,CAAC;IAED,KAAK,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QACtC,MAAM,SAAS,GAAG;;;;;;KAMjB,CAAC;QAEF,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;IAClD,CAAC;CACF;AA9BD,8BA8BC"}
|
package/dump.rdb
CHANGED
|
Binary file
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "authenik8-core",
|
|
3
|
-
"version": "0.1.
|
|
4
|
-
"description": "
|
|
3
|
+
"version": "0.1.2",
|
|
4
|
+
"description": "A modular Node.js authentication SDK with JWT, secure refresh token rotation, and built-in security middleware.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"authentication",
|
|
7
7
|
"jwt",
|
|
@@ -10,7 +10,9 @@
|
|
|
10
10
|
"redis",
|
|
11
11
|
"express",
|
|
12
12
|
"nodejs",
|
|
13
|
-
"auth"
|
|
13
|
+
"auth",
|
|
14
|
+
"backend",
|
|
15
|
+
"helmet"
|
|
14
16
|
],
|
|
15
17
|
"homepage": "https://gitlab.com/COD434/authenik8-core#readme",
|
|
16
18
|
"bugs": {
|
|
@@ -29,7 +31,10 @@
|
|
|
29
31
|
"test": "jest",
|
|
30
32
|
"build": "tsc",
|
|
31
33
|
"files": [
|
|
32
|
-
"dist"
|
|
34
|
+
"dist",
|
|
35
|
+
"README.md",
|
|
36
|
+
"LICENSE",
|
|
37
|
+
"CHANGELOG"
|
|
33
38
|
]
|
|
34
39
|
},
|
|
35
40
|
"devDependencies": {
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import jwt from "jsonwebtoken";
|
|
2
2
|
import { SignOptions } from "jsonwebtoken";
|
|
3
3
|
import {randomUUID} from "crypto"
|
|
4
|
-
|
|
4
|
+
import {RedisLock} from "../utility/lockHelper"
|
|
5
5
|
|
|
6
6
|
export class MissingTokenError extends Error{
|
|
7
7
|
constructor(message="Missing Token")
|
|
@@ -30,11 +30,14 @@ export interface TokenStore{
|
|
|
30
30
|
get(key:string):Promise<string| null>;
|
|
31
31
|
set?(key: string, value: string, expiry?:number):Promise<void>;
|
|
32
32
|
del?(key :string):Promise<void>;
|
|
33
|
-
|
|
33
|
+
getset?(key: string, value: string, expiry?: number): Promise<string | null>;
|
|
34
34
|
}
|
|
35
|
+
|
|
36
|
+
|
|
35
37
|
export interface RefreshServiceOptions {
|
|
36
38
|
tokenStore:TokenStore;
|
|
37
39
|
accessTokenSecret:string;
|
|
40
|
+
redisClient:any;
|
|
38
41
|
refreshTokenSecret:string;
|
|
39
42
|
accessTokenExpiry:SignOptions["expiresIn"];
|
|
40
43
|
rotateRefreshTokens?:boolean;
|
|
@@ -54,7 +57,7 @@ private refreshTokenSecret:string;
|
|
|
54
57
|
private accessTokenExpiry:SignOptions["expiresIn"];
|
|
55
58
|
private rotateRefreshTokens:boolean;
|
|
56
59
|
private refreshTokenExpiry:string;
|
|
57
|
-
|
|
60
|
+
private lock:RedisLock;
|
|
58
61
|
|
|
59
62
|
constructor(options:RefreshServiceOptions){
|
|
60
63
|
this.tokenStore = options.tokenStore;
|
|
@@ -63,8 +66,10 @@ this.refreshTokenSecret =options.refreshTokenSecret;
|
|
|
63
66
|
this.accessTokenExpiry= options.accessTokenExpiry ?? "15m";
|
|
64
67
|
this.rotateRefreshTokens = options.rotateRefreshTokens ?? false;
|
|
65
68
|
this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
|
|
69
|
+
this.lock = new RedisLock(options.redisClient)
|
|
66
70
|
}
|
|
67
71
|
|
|
72
|
+
|
|
68
73
|
async generateRefreshToken(payload: TokenPayload): Promise<string> {
|
|
69
74
|
|
|
70
75
|
if (!payload.userId) throw new Error("generateRefreshToken: payload.userId is missing");
|
|
@@ -79,7 +84,7 @@ this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
|
|
|
79
84
|
);
|
|
80
85
|
}
|
|
81
86
|
|
|
82
|
-
|
|
87
|
+
|
|
83
88
|
return token
|
|
84
89
|
}
|
|
85
90
|
|
|
@@ -88,20 +93,30 @@ this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
|
|
|
88
93
|
if(!refreshToken){
|
|
89
94
|
throw new MissingTokenError()
|
|
90
95
|
}
|
|
91
|
-
|
|
92
|
-
let decoded:TokenPayload;
|
|
93
|
-
try
|
|
96
|
+
|
|
97
|
+
let decoded:TokenPayload;
|
|
98
|
+
try{
|
|
99
|
+
|
|
94
100
|
decoded = jwt.verify(refreshToken,this.refreshTokenSecret) as TokenPayload;
|
|
95
101
|
}catch(err){
|
|
96
102
|
throw new InvalidTokenError()
|
|
97
103
|
}
|
|
98
104
|
|
|
99
|
-
const
|
|
100
|
-
|
|
101
|
-
console.log("Match:", storedToken === refreshToken);
|
|
105
|
+
const lockKey = `lock:${decoded.userId}`;
|
|
106
|
+
const lockValue = await this.lock.acquire(lockKey, 5000);
|
|
102
107
|
|
|
108
|
+
if (!lockValue) {
|
|
109
|
+
throw new InvalidTokenError("Concurrent refresh detected");
|
|
110
|
+
}
|
|
103
111
|
|
|
104
|
-
|
|
112
|
+
//const storedToken= await this.tokenStore.get(`refresh:${decoded.userId}`)
|
|
113
|
+
|
|
114
|
+
try{
|
|
115
|
+
const key = `refresh:${decoded.userId}`;
|
|
116
|
+
const storedToken = await this.tokenStore.get(key);
|
|
117
|
+
|
|
118
|
+
|
|
119
|
+
if (!storedToken || storedToken !== refreshToken){
|
|
105
120
|
throw new InvalidTokenError();
|
|
106
121
|
}
|
|
107
122
|
|
|
@@ -116,19 +131,26 @@ let newRefreshToken:string | undefined;
|
|
|
116
131
|
if(this.rotateRefreshTokens && this.tokenStore.set){
|
|
117
132
|
const key = `refresh:${decoded.userId}`
|
|
118
133
|
|
|
119
|
-
|
|
134
|
+
;
|
|
120
135
|
newRefreshToken =jwt.sign({userId:decoded.userId,email : decoded.email,jti:randomUUID(),},
|
|
121
136
|
this.refreshTokenSecret,
|
|
122
137
|
{expiresIn:this.refreshTokenExpiry as jwt.SignOptions["expiresIn"]});
|
|
123
138
|
|
|
124
|
-
|
|
125
|
-
|
|
139
|
+
if (!this.tokenStore.getset) {
|
|
140
|
+
throw new Error("TokenStore must implement getset for atomic refresh rotation");
|
|
141
|
+
}
|
|
142
|
+
const PreviousToken =await this.tokenStore.getset(key,newRefreshToken,60 * 60 * 24 * 7)
|
|
143
|
+
if(PreviousToken !== refreshToken){
|
|
144
|
+
throw new InvalidTokenError("Concurrent refresh detected")}
|
|
126
145
|
}
|
|
127
146
|
|
|
128
147
|
return{
|
|
129
148
|
accessToken:newAccessToken,
|
|
130
149
|
refreshToken:newRefreshToken ?? refreshToken
|
|
131
150
|
};
|
|
132
|
-
}
|
|
151
|
+
}finally {
|
|
152
|
+
if (lockValue) await this.lock.release(lockKey, lockValue);
|
|
153
|
+
}
|
|
133
154
|
}
|
|
134
155
|
|
|
156
|
+
}
|
package/src/createAuthenik8.ts
CHANGED
|
@@ -17,34 +17,45 @@ console.log(`[Redis ${action}]`,{key, value})
|
|
|
17
17
|
}
|
|
18
18
|
}
|
|
19
19
|
async storeRefreshToken(token:string,userId:string,ttl:number){
|
|
20
|
-
const key = this.key("refresh",
|
|
20
|
+
const key = this.key("refresh", userId);
|
|
21
21
|
await this.redis.set(key,userId, "EX",ttl);
|
|
22
22
|
this.log("SET", key, userId)
|
|
23
23
|
|
|
24
24
|
}
|
|
25
25
|
|
|
26
|
-
async getRefreshToken(
|
|
27
|
-
const key = this.key("refresh",
|
|
26
|
+
async getRefreshToken(userId:string){
|
|
27
|
+
const key = this.key("refresh",userId);
|
|
28
28
|
const value = await this.redis.get(key);
|
|
29
29
|
this.log("GET",key , value);
|
|
30
30
|
return value;
|
|
31
31
|
}
|
|
32
|
+
async getset(key: string, value: string, expiry?: number): Promise<string | null> {
|
|
32
33
|
|
|
33
|
-
|
|
34
|
-
|
|
34
|
+
const previous = await this.redis.getset(key, value);
|
|
35
|
+
|
|
36
|
+
if (expiry) {
|
|
37
|
+
await this.redis.expire(key, expiry);
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
this.log("GETSET", key, { previous, new: value });
|
|
41
|
+
return previous;
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
async deleteRefreshToken(userId:string){
|
|
45
|
+
const key = this.key("refresh",userId);
|
|
35
46
|
await this.redis.del(key);
|
|
36
47
|
this.log("DEL",key);
|
|
37
48
|
|
|
38
49
|
}
|
|
39
50
|
|
|
40
|
-
async blacklistToken(
|
|
41
|
-
const key = this.key("blacklist",
|
|
51
|
+
async blacklistToken(userId: string, ttl: number) {
|
|
52
|
+
const key = this.key("blacklist", userId);
|
|
42
53
|
await this.redis.set(key, "1", "EX", ttl);
|
|
43
54
|
this.log("SET", key, "blacklisted");
|
|
44
55
|
}
|
|
45
56
|
|
|
46
|
-
async isBlacklisted(
|
|
47
|
-
const key = this.key("blacklist",
|
|
57
|
+
async isBlacklisted(userId: string) {
|
|
58
|
+
const key = this.key("blacklist", userId);
|
|
48
59
|
const exists = await this.redis.exists(key);
|
|
49
60
|
this.log("CHECK", key, exists);
|
|
50
61
|
return exists === 1;
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { createAuthenik8 } from "../createAuthenik8";
|
|
2
|
+
import request from "supertest";
|
|
3
|
+
import express from "express";
|
|
4
|
+
import Redis from "ioredis";
|
|
5
|
+
|
|
6
|
+
describe("Refresh Token Concurrency (Integration)", () => {
|
|
7
|
+
let app: express.Express;
|
|
8
|
+
let auth: Awaited<ReturnType<typeof createAuthenik8>>; // or just `any` but this is better
|
|
9
|
+
let refreshToken: string;
|
|
10
|
+
let redisClient: Redis;
|
|
11
|
+
|
|
12
|
+
beforeAll(async () => {
|
|
13
|
+
// Create and verify a connected Redis client (use a separate DB for tests)
|
|
14
|
+
redisClient = new Redis({ host: "localhost", port: 6379, db: 1 });
|
|
15
|
+
await redisClient.ping(); // ensure connection is established
|
|
16
|
+
|
|
17
|
+
// Pass the connected client as `redis` (not `redisClient`)
|
|
18
|
+
auth = await createAuthenik8({
|
|
19
|
+
jwtSecret: "test-secret",
|
|
20
|
+
refreshSecret: "refresh-secret",
|
|
21
|
+
jwtExpiry: "15m",
|
|
22
|
+
redis: redisClient, // ✅ correct property name
|
|
23
|
+
});
|
|
24
|
+
|
|
25
|
+
app = express();
|
|
26
|
+
app.use(express.json());
|
|
27
|
+
|
|
28
|
+
// Login route – must be async and await the refresh token generation
|
|
29
|
+
app.post("/login", async (req, res) => {
|
|
30
|
+
const token = auth.signToken({ userId: "user_1", email: "test@test.com" });
|
|
31
|
+
refreshToken = await auth.generateRefreshToken({ userId: "user_1", email: "test@test.com" });
|
|
32
|
+
res.json({ token, refreshToken });
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
// Refresh route – unchanged but uses the proper error handling
|
|
36
|
+
app.post("/refresh", async (req, res) => {
|
|
37
|
+
try {
|
|
38
|
+
const result = await auth.refreshToken(req.body.refreshToken);
|
|
39
|
+
res.json(result);
|
|
40
|
+
} catch (err: any) {
|
|
41
|
+
console.error("Refresh error",err)
|
|
42
|
+
|
|
43
|
+
if(err.name === "InvalidTokenError"){
|
|
44
|
+
return res.status(401).json({error:err.message})
|
|
45
|
+
}
|
|
46
|
+
return res.status( 500).json({ error: err.message });
|
|
47
|
+
}
|
|
48
|
+
});
|
|
49
|
+
});
|
|
50
|
+
|
|
51
|
+
afterAll(async () => {
|
|
52
|
+
// Clean up the test database and close the client
|
|
53
|
+
await redisClient.flushdb();
|
|
54
|
+
await redisClient.quit();
|
|
55
|
+
});
|
|
56
|
+
|
|
57
|
+
it("should allow only one of two concurrent refresh requests", async () => {
|
|
58
|
+
// Login to obtain a valid refresh token
|
|
59
|
+
await request(app).post("/login").send({});
|
|
60
|
+
|
|
61
|
+
// Fire two concurrent refresh requests
|
|
62
|
+
const [res1, res2] = await Promise.all([
|
|
63
|
+
request(app).post("/refresh").send({ refreshToken }),
|
|
64
|
+
request(app).post("/refresh").send({ refreshToken }),
|
|
65
|
+
]);
|
|
66
|
+
|
|
67
|
+
// Exactly one should succeed (200) and one should fail with 401
|
|
68
|
+
const statuses = [res1.status, res2.status].sort();
|
|
69
|
+
expect(statuses).toEqual([200, 401]);
|
|
70
|
+
|
|
71
|
+
// The successful response must contain new tokens
|
|
72
|
+
const successRes = res1.status === 200 ? res1 : res2;
|
|
73
|
+
expect(successRes.body).toHaveProperty("accessToken");
|
|
74
|
+
expect(successRes.body).toHaveProperty("refreshToken");
|
|
75
|
+
});
|
|
76
|
+
});
|
|
Binary file
|
|
@@ -21,7 +21,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
21
21
|
}
|
|
22
22
|
});
|
|
23
23
|
|
|
24
|
-
//
|
|
24
|
+
// LOGIN
|
|
25
25
|
test("should login and receive tokens", async () => {
|
|
26
26
|
const res = await request.post("/login");
|
|
27
27
|
|
|
@@ -33,7 +33,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
33
33
|
refreshToken = res.body.refreshToken;
|
|
34
34
|
});
|
|
35
35
|
|
|
36
|
-
//
|
|
36
|
+
// PROTECTED ROUTE
|
|
37
37
|
test("should access protected route with valid token", async () => {
|
|
38
38
|
const res = await request
|
|
39
39
|
.get("/protected")
|
|
@@ -43,14 +43,14 @@ describe("Authenik8 Full Integration", () => {
|
|
|
43
43
|
expect(res.body).toHaveProperty("data", "secure data");
|
|
44
44
|
});
|
|
45
45
|
|
|
46
|
-
//
|
|
46
|
+
// NO TOKEN
|
|
47
47
|
test("should reject request without token", async () => {
|
|
48
48
|
const res = await request.get("/protected");
|
|
49
49
|
|
|
50
50
|
expect(res.status).toBe(401);
|
|
51
51
|
});
|
|
52
52
|
|
|
53
|
-
//
|
|
53
|
+
// REFRESH TOKEN
|
|
54
54
|
test("should refresh access token", async () => {
|
|
55
55
|
const res = await request
|
|
56
56
|
.post("/refresh")
|
|
@@ -70,7 +70,7 @@ describe("Authenik8 Full Integration", () => {
|
|
|
70
70
|
|
|
71
71
|
});
|
|
72
72
|
|
|
73
|
-
//
|
|
73
|
+
// ROTATION (IMPORTANT)
|
|
74
74
|
test("should NOT allow reuse of old refresh token", async () => {
|
|
75
75
|
const originalToken = refreshToken;
|
|
76
76
|
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
import { randomUUID } from "crypto";
|
|
2
|
+
|
|
3
|
+
export class RedisLock {
|
|
4
|
+
constructor(private redis: any) {}
|
|
5
|
+
|
|
6
|
+
async acquire(key: string, ttl = 5000): Promise<string | null> {
|
|
7
|
+
const value = randomUUID();
|
|
8
|
+
|
|
9
|
+
const result = await this.redis.set(
|
|
10
|
+
key,
|
|
11
|
+
value,
|
|
12
|
+
"PX",
|
|
13
|
+
ttl,
|
|
14
|
+
"NX"
|
|
15
|
+
);
|
|
16
|
+
|
|
17
|
+
if (result !== "OK") return null;
|
|
18
|
+
|
|
19
|
+
return value;
|
|
20
|
+
}
|
|
21
|
+
|
|
22
|
+
async release(key: string, value: string): Promise<void> {
|
|
23
|
+
const luaScript = `
|
|
24
|
+
if redis.call("GET", KEYS[1]) == ARGV[1] then
|
|
25
|
+
return redis.call("DEL", KEYS[1])
|
|
26
|
+
else
|
|
27
|
+
return 0
|
|
28
|
+
end
|
|
29
|
+
`;
|
|
30
|
+
|
|
31
|
+
await this.redis.eval(luaScript, 1, key, value);
|
|
32
|
+
}
|
|
33
|
+
}
|
package/.env
DELETED
package/authenik8-core-0.1.0.tgz
DELETED
|
Binary file
|
package/dist/creatAuthenik8.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"creatAuthenik8.d.ts","sourceRoot":"","sources":["../src/creatAuthenik8.ts"],"names":[],"mappings":""}
|
package/dist/creatAuthenik8.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"creatAuthenik8.js","sourceRoot":"","sources":["../src/creatAuthenik8.ts"],"names":[],"mappings":""}
|
package/src/1
DELETED
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import {Authenik8Config} from "./types/config";
|
|
2
|
-
import {Incognito} from "./auth/guestModeService"
|
|
3
|
-
import {requireAdmin} from "./middleware/adminService";
|
|
4
|
-
|
|
5
|
-
export const createAuthenik8 =(config:Authenik8Config)=>{
|
|
6
|
-
const jwtService =new JWTService({
|
|
7
|
-
secret:config.jwtSecret,
|
|
8
|
-
expiry:config.jwtExpiry,
|
|
9
|
-
redisClient:config.redis
|
|
10
|
-
});
|
|
11
|
-
return{
|
|
12
|
-
//auth
|
|
13
|
-
signToken:jwtService.signToken.bind(jwtService),
|
|
14
|
-
verifyToken:jwtService.verifyToken.bind(jwtService),
|
|
15
|
-
guestToken:jwtService.guestToken.bind(jwtService)
|
|
16
|
-
|
|
17
|
-
//middleware
|
|
18
|
-
requireAdmin :requireAdmin(config),
|
|
19
|
-
incognito:Incognito
|
|
20
|
-
|
|
21
|
-
}
|
|
22
|
-
}
|
package/src/creatAuthenik8.ts
DELETED
|
File without changes
|