authenik8-core 0.1.0 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/CHANGELOG.md +7 -0
  2. package/README.md +103 -57
  3. package/dist/auth/refreshService.d.ts +3 -0
  4. package/dist/auth/refreshService.d.ts.map +1 -1
  5. package/dist/auth/refreshService.js +33 -16
  6. package/dist/auth/refreshService.js.map +1 -1
  7. package/dist/createAuthenik8.d.ts.map +1 -1
  8. package/dist/createAuthenik8.js +1 -0
  9. package/dist/createAuthenik8.js.map +1 -1
  10. package/dist/storage/RedisTokenStore.d.ts +5 -4
  11. package/dist/storage/RedisTokenStore.d.ts.map +1 -1
  12. package/dist/storage/RedisTokenStore.js +17 -9
  13. package/dist/storage/RedisTokenStore.js.map +1 -1
  14. package/dist/tests/con.test.d.ts +2 -0
  15. package/dist/tests/con.test.d.ts.map +1 -0
  16. package/dist/tests/con.test.js +71 -0
  17. package/dist/tests/con.test.js.map +1 -0
  18. package/dist/tests/full.intergration.test.js +5 -5
  19. package/dist/tests/full.intergration.test.js.map +1 -1
  20. package/dist/utility/lockHelper.d.ts +7 -0
  21. package/dist/utility/lockHelper.d.ts.map +1 -0
  22. package/dist/utility/lockHelper.js +28 -0
  23. package/dist/utility/lockHelper.js.map +1 -0
  24. package/dump.rdb +0 -0
  25. package/package.json +9 -4
  26. package/src/auth/refreshService.ts +37 -15
  27. package/src/createAuthenik8.ts +1 -0
  28. package/src/storage/RedisTokenStore.ts +20 -9
  29. package/src/tests/con.test.ts +76 -0
  30. package/src/tests/dump.rdb +0 -0
  31. package/src/tests/full.intergration.test.ts +5 -5
  32. package/src/utility/lockHelper.ts +33 -0
  33. package/.env +0 -2
  34. package/authenik8-core-0.1.0.tgz +0 -0
  35. package/dist/creatAuthenik8.d.ts +0 -2
  36. package/dist/creatAuthenik8.d.ts.map +0 -1
  37. package/dist/creatAuthenik8.js +0 -3
  38. package/dist/creatAuthenik8.js.map +0 -1
  39. package/src/1 +0 -22
  40. package/src/creatAuthenik8.ts +0 -0
package/CHANGELOG.md ADDED
@@ -0,0 +1,7 @@
1
+ # Changelog
2
+
3
+ ## [0.1.2] - 2026-03-22
4
+ ### Fixed
5
+ - Patched a vulnerability allowing reuse of old refresh tokens.
6
+ - Refresh token rotation now uses Redis locks to prevent concurrent refresh exploits.
7
+ - Concurrent refresh requests are handled safely, ensuring only one succeeds.
package/README.md CHANGED
@@ -1,93 +1,139 @@
1
1
  # Authenik8-core
2
2
 
3
+ JWT rotation without uniqueness is fake security — Authenik8 fixes that.
4
+ Authenik8 is a modular authentication and security SDK for Node.js.
5
+ It combines:
3
6
 
7
+ JWT authentication
8
+ Secure refresh token rotation
9
+ Redis-backed session control
10
+ Built-in security middleware
4
11
 
5
- ## Getting started
6
-
7
- To make it easy for you to get started with GitLab, here's a list of recommended next steps.
12
+ ***
8
13
 
9
- Already a pro? Just edit this README.md and make it your own. Want to make it easy? [Use the template at the bottom](#editing-this-readme)!
14
+ ## Getting started
15
+ ```
16
+ import { createAuthenik8 } from "authenik8";
10
17
 
11
- ## Add your files
18
+ const auth = await createAuthenik8({
19
+ jwtSecret: "ACCESS_SECRET",
20
+ refreshSecret: "REFRESH_SECRET"
21
+ });
12
22
 
13
- * [Create](https://docs.gitlab.com/user/project/repository/web_editor/#create-a-file) or [upload](https://docs.gitlab.com/user/project/repository/web_editor/#upload-a-file) files
14
- * [Add files using the command line](https://docs.gitlab.com/topics/git/add_files/#add-files-to-a-git-repository) or push an existing Git repository with the following command:
23
+ // generate tokens
24
+ const refreshToken = await auth.generateRefreshToken({
25
+ userId: "user_1",
26
+ email: "test@test.com"
27
+ });
15
28
 
29
+ // refresh tokens
30
+ const result = await auth.refresh(refreshToken);
16
31
  ```
17
- cd existing_repo
18
- git remote add origin https://gitlab.com/COD434/authenik8-core.git
19
- git branch -M main
20
- git push -uf origin main
21
- ```
32
+ ***
22
33
 
23
- ## Integrate with your tools
34
+ ## Why Authenik8-core?
24
35
 
25
- * [Set up project integrations](https://gitlab.com/COD434/authenik8-core/-/settings/integrations)
26
36
 
27
- ## Collaborate with your team
37
+ JWT makes authentication look simple…
38
+ …but introduces hidden problems:
28
39
 
29
- * [Invite team members and collaborators](https://docs.gitlab.com/user/project/members/)
30
- * [Create a new merge request](https://docs.gitlab.com/user/project/merge_requests/creating_merge_requests/)
31
- * [Automatically close issues from merge requests](https://docs.gitlab.com/user/project/issues/managing_issues/#closing-issues-automatically)
32
- * [Enable merge request approvals](https://docs.gitlab.com/user/project/merge_requests/approvals/)
33
- * [Set auto-merge](https://docs.gitlab.com/user/project/merge_requests/auto_merge/)
40
+ Refresh token reuse (replay attacks)
41
+ Stateless logout issues
42
+ Broken token rotation
43
+ Scattered security logic
34
44
 
35
- ## Test and Deploy
45
+ Authenik8 solves this with:
36
46
 
37
- Use the built-in continuous integration in GitLab.
47
+ Refresh token rotation (with uniqueness via jti)
48
+ Stateful session control (Redis)
49
+ Built-in security (rate limit, IP whitelist, helmet)
50
+ Clean, unified API
38
51
 
39
- * [Get started with GitLab CI/CD](https://docs.gitlab.com/ci/quick_start/)
40
- * [Analyze your code for known vulnerabilities with Static Application Security Testing (SAST)](https://docs.gitlab.com/user/application_security/sast/)
41
- * [Deploy to Kubernetes, Amazon EC2, or Amazon ECS using Auto Deploy](https://docs.gitlab.com/topics/autodevops/requirements/)
42
- * [Use pull-based deployments for improved Kubernetes management](https://docs.gitlab.com/user/clusters/agent/)
43
- * [Set up protected environments](https://docs.gitlab.com/ci/environments/protected_environments/)
52
+ ***
53
+ ## Secure Refresh Flow
54
+ ```
55
+ // first use valid
56
+ await auth.refresh(token);
44
57
 
58
+ // reuse same token → rejected
59
+ await auth.refresh(token); // ❌ throws
60
+ ```
45
61
  ***
46
62
 
47
- # Editing this README
63
+ ## API Overview
64
+ ```
65
+ const auth = await createAuthenik8(config);
66
+
67
+ // auth
68
+ auth.signToken(payload);
69
+ auth.verifyToken(token);
48
70
 
49
- When you're ready to make this README your own, just edit this file and use the handy template below (or feel free to structure it however you want - this is just a starting point!). Thanks to [makeareadme.com](https://www.makeareadme.com/) for this template.
71
+ // refresh
72
+ auth.refresh(refreshToken);
73
+ auth.generateRefreshToken(payload);
50
74
 
51
- ## Suggestions for a good README
75
+ // security
76
+ auth.rateLimit;
77
+ auth.ipWhitelist;
78
+ auth.helmet;
52
79
 
53
- Every project is different, so consider which of these sections apply to yours. The sections used in the template are suggestions for most open source projects. Also keep in mind that while a README can be too long and detailed, too long is better than too short. If you think your README is too long, consider utilizing another form of documentation rather than cutting out information.
80
+ // middleware
81
+ auth.requireAdmin;
82
+ ```
83
+ ***
84
+ ## Architecture
85
+
86
+
87
+ Client
88
+
89
+
90
+ Authenik8
91
+ ├── JWTService
92
+ ├── RefreshService (rotation)
93
+ ├── SecurityModule
94
+
95
+ Redis
54
96
 
55
- ## Name
56
- Choose a self-explaining name for your project.
97
+ ***
57
98
 
58
- ## Description
59
- Let people know what your project can do specifically. Provide context and add a link to any reference visitors might be unfamiliar with. A list of Features or a Background subsection can also be added here. If there are alternatives to your project, this is a good place to list differentiating factors.
99
+ ## Important
60
100
 
61
- ## Badges
62
- On some READMEs, you may see small images that convey metadata, such as whether or not all the tests are passing for the project. You can use Shields to add some to your README. Many services also have instructions for adding a badge.
101
+ Authenik8-core uses stateful JWT authentication.
102
+ This means:
103
+ Requires Redis (or compatible store)
104
+ Provides better control over sessions and security
63
105
 
64
- ## Visuals
65
- Depending on what you are making, it can be a good idea to include screenshots or even a video (you'll frequently see GIFs rather than actual videos). Tools like ttygif can help, but check out Asciinema for a more sophisticated method.
106
+ ## Add your files
66
107
 
67
- ## Installation
68
- Within a particular ecosystem, there may be a common way of installing things, such as using Yarn, NuGet, or Homebrew. However, consider the possibility that whoever is reading your README is a novice and would like more guidance. Listing specific steps helps remove ambiguity and gets people to using your project as quickly as possible. If it only runs in a specific context like a particular programming language version or operating system or has dependencies that have to be installed manually, also add a Requirements subsection.
108
+ ```
109
+ cd existing_repo
110
+ git remote add origin https://gitlab.com/COD434/authenik8-core.git
111
+ git branch -M main
112
+ git push -uf origin main
113
+ ```
69
114
 
70
- ## Usage
71
- Use examples liberally, and show the expected output if you can. It's helpful to have inline the smallest example of usage that you can demonstrate, while providing links to more sophisticated examples if they are too long to reasonably include in the README.
115
+ ***
116
+ ## Built with Real Testing
72
117
 
73
- ## Support
74
- Tell people where they can go to for help. It can be any combination of an issue tracker, a chat room, an email address, etc.
118
+ Authenik8-core includes integration-tested flows for:
75
119
 
76
- ## Roadmap
77
- If you have ideas for releases in the future, it is a good idea to list them in the README.
120
+ Token rotation
121
+ Replay attack prevention
122
+ Secure refresh logic
78
123
 
79
- ## Contributing
80
- State if you are open to contributions and what your requirements are for accepting them.
124
+ ***
81
125
 
82
- For people who want to make changes to your project, it's helpful to have some documentation on how to get started. Perhaps there is a script that they should run or some environment variables that they need to set. Make these steps explicit. These instructions could also be useful to your future self.
126
+ ## Use Cases
83
127
 
84
- You can also document commands to lint the code or run tests. These steps help to ensure high code quality and reduce the likelihood that the changes inadvertently break something. Having instructions for running tests is especially helpful if it requires external setup, such as starting a Selenium server for testing in a browser.
128
+ SaaS backends
129
+ APIs with authentication
130
+ Secure admin systems
131
+ Systems requiring session control
85
132
 
86
- ## Authors and acknowledgment
87
- Show your appreciation to those who have contributed to the project.
133
+ ***
88
134
 
89
- ## License
90
- For open source projects, say how it is licensed.
135
+ ## Final Thought
91
136
 
92
- ## Project status
93
- If you have run out of energy or time for your project, put a note at the top of the README saying that development has slowed down or stopped completely. Someone may choose to fork your project or volunteer to step in as a maintainer or owner, allowing your project to keep going. You can also make an explicit request for maintainers.
137
+ JWT alone is not an authentication system.
138
+ Authenik8 makes it one.
139
+ ***
@@ -13,10 +13,12 @@ export interface TokenStore {
13
13
  get(key: string): Promise<string | null>;
14
14
  set?(key: string, value: string, expiry?: number): Promise<void>;
15
15
  del?(key: string): Promise<void>;
16
+ getset?(key: string, value: string, expiry?: number): Promise<string | null>;
16
17
  }
17
18
  export interface RefreshServiceOptions {
18
19
  tokenStore: TokenStore;
19
20
  accessTokenSecret: string;
21
+ redisClient: any;
20
22
  refreshTokenSecret: string;
21
23
  accessTokenExpiry: SignOptions["expiresIn"];
22
24
  rotateRefreshTokens?: boolean;
@@ -33,6 +35,7 @@ export declare class RefreshService {
33
35
  private accessTokenExpiry;
34
36
  private rotateRefreshTokens;
35
37
  private refreshTokenExpiry;
38
+ private lock;
36
39
  constructor(options: RefreshServiceOptions);
37
40
  generateRefreshToken(payload: TokenPayload): Promise<string>;
38
41
  refresh(refreshToken?: string): Promise<RefreshResult>;
@@ -1 +1 @@
1
- {"version":3,"file":"refreshService.d.ts","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAI3C,qBAAa,iBAAkB,SAAQ,KAAK;gBAChC,OAAO,SAAgB;CAKlC;AAED,qBAAa,iBAAkB,SAC/B,KAAK;gBACO,OAAO,SAA0B;CAI5C;AAGD,UAAU,YAAY;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACb;AAGD,MAAM,WAAW,UAAU;IAC3B,GAAG,CAAC,GAAG,EAAC,MAAM,GAAE,OAAO,CAAC,MAAM,GAAE,IAAI,CAAC,CAAC;IACtC,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/D,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;CAE/B;AACD,MAAM,WAAW,qBAAqB;IACrC,UAAU,EAAC,UAAU,CAAC;IACtB,iBAAiB,EAAC,MAAM,CAAC;IACzB,kBAAkB,EAAC,MAAM,CAAC;IAC1B,iBAAiB,EAAC,WAAW,CAAC,WAAW,CAAC,CAAC;IAC3C,mBAAmB,CAAC,EAAC,OAAO,CAAC;IAC7B,kBAAkB,CAAC,EAAC,MAAM,CAAC;CAC3B;AAED,MAAM,WAAW,aAAa;IAC9B,WAAW,EAAC,MAAM,CAAC;IACnB,YAAY,CAAC,EAAC,MAAM,CAAC;CACpB;AAGD,qBAAa,cAAc;IAC3B,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,kBAAkB,CAAQ;IAClC,OAAO,CAAC,iBAAiB,CAA0B;IACnD,OAAO,CAAC,mBAAmB,CAAS;IACpC,OAAO,CAAC,kBAAkB,CAAQ;gBAGtB,OAAO,EAAC,qBAAqB;IASlC,oBAAoB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC;IAmB5D,OAAO,CAAC,YAAY,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,aAAa,CAAC;CA8C1D"}
1
+ {"version":3,"file":"refreshService.d.ts","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAI3C,qBAAa,iBAAkB,SAAQ,KAAK;gBAChC,OAAO,SAAgB;CAKlC;AAED,qBAAa,iBAAkB,SAC/B,KAAK;gBACO,OAAO,SAA0B;CAI5C;AAGD,UAAU,YAAY;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACb;AAGD,MAAM,WAAW,UAAU;IAC3B,GAAG,CAAC,GAAG,EAAC,MAAM,GAAE,OAAO,CAAC,MAAM,GAAE,IAAI,CAAC,CAAC;IACtC,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/D,GAAG,CAAC,CAAC,GAAG,EAAE,MAAM,GAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAChC,MAAM,CAAC,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;CAC5E;AAGD,MAAM,WAAW,qBAAqB;IACrC,UAAU,EAAC,UAAU,CAAC;IACtB,iBAAiB,EAAC,MAAM,CAAC;IACzB,WAAW,EAAC,GAAG,CAAC;IAChB,kBAAkB,EAAC,MAAM,CAAC;IAC1B,iBAAiB,EAAC,WAAW,CAAC,WAAW,CAAC,CAAC;IAC3C,mBAAmB,CAAC,EAAC,OAAO,CAAC;IAC7B,kBAAkB,CAAC,EAAC,MAAM,CAAC;CAC3B;AAED,MAAM,WAAW,aAAa;IAC9B,WAAW,EAAC,MAAM,CAAC;IACnB,YAAY,CAAC,EAAC,MAAM,CAAC;CACpB;AAGD,qBAAa,cAAc;IAC3B,OAAO,CAAC,UAAU,CAAY;IAC9B,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,kBAAkB,CAAQ;IAClC,OAAO,CAAC,iBAAiB,CAA0B;IACnD,OAAO,CAAC,mBAAmB,CAAS;IACpC,OAAO,CAAC,kBAAkB,CAAQ;IAClC,OAAO,CAAC,IAAI,CAAW;gBAEX,OAAO,EAAC,qBAAqB;IAWlC,oBAAoB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,MAAM,CAAC;IAmB5D,OAAO,CAAC,YAAY,CAAC,EAAC,MAAM,GAAE,OAAO,CAAC,aAAa,CAAC;CAgE1D"}
@@ -6,6 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
6
6
  exports.RefreshService = exports.InvalidTokenError = exports.MissingTokenError = void 0;
7
7
  const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
8
8
  const crypto_1 = require("crypto");
9
+ const lockHelper_1 = require("../utility/lockHelper");
9
10
  class MissingTokenError extends Error {
10
11
  constructor(message = "Missing Token") {
11
12
  super(message);
@@ -29,6 +30,7 @@ class RefreshService {
29
30
  this.accessTokenExpiry = (_a = options.accessTokenExpiry) !== null && _a !== void 0 ? _a : "15m";
30
31
  this.rotateRefreshTokens = (_b = options.rotateRefreshTokens) !== null && _b !== void 0 ? _b : false;
31
32
  this.refreshTokenExpiry = (_c = options.refreshTokenExpiry) !== null && _c !== void 0 ? _c : "7d";
33
+ this.lock = new lockHelper_1.RedisLock(options.redisClient);
32
34
  }
33
35
  async generateRefreshToken(payload) {
34
36
  if (!payload.userId)
@@ -39,7 +41,6 @@ class RefreshService {
39
41
  if (this.tokenStore.set) {
40
42
  await this.tokenStore.set(`refresh:${payload.userId}`, token, 60 * 60 * 24 * 7);
41
43
  }
42
- console.log("Saving token to Redis:", token);
43
44
  return token;
44
45
  }
45
46
  async refresh(refreshToken) {
@@ -53,24 +54,40 @@ class RefreshService {
53
54
  catch (err) {
54
55
  throw new InvalidTokenError();
55
56
  }
56
- const storedToken = await this.tokenStore.get(`refresh:${decoded.userId}`);
57
- console.log("Stored token:", storedToken);
58
- console.log("Match:", storedToken === refreshToken);
59
- if (storedToken !== refreshToken) {
60
- throw new InvalidTokenError();
57
+ const lockKey = `lock:${decoded.userId}`;
58
+ const lockValue = await this.lock.acquire(lockKey, 5000);
59
+ if (!lockValue) {
60
+ throw new InvalidTokenError("Concurrent refresh detected");
61
61
  }
62
- const newAccessToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email }, this.accessTokenSecret, { expiresIn: this.accessTokenExpiry });
63
- let newRefreshToken;
64
- if (this.rotateRefreshTokens && this.tokenStore.set) {
62
+ //const storedToken= await this.tokenStore.get(`refresh:${decoded.userId}`)
63
+ try {
65
64
  const key = `refresh:${decoded.userId}`;
66
- newRefreshToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email, jti: (0, crypto_1.randomUUID)(), }, this.refreshTokenSecret, { expiresIn: this.refreshTokenExpiry });
67
- await this.tokenStore.set(key, newRefreshToken, 60 * 60 * 24 * 7);
68
- console.log("Stored new refresh token:", newRefreshToken);
65
+ const storedToken = await this.tokenStore.get(key);
66
+ if (!storedToken || storedToken !== refreshToken) {
67
+ throw new InvalidTokenError();
68
+ }
69
+ const newAccessToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email }, this.accessTokenSecret, { expiresIn: this.accessTokenExpiry });
70
+ let newRefreshToken;
71
+ if (this.rotateRefreshTokens && this.tokenStore.set) {
72
+ const key = `refresh:${decoded.userId}`;
73
+ newRefreshToken = jsonwebtoken_1.default.sign({ userId: decoded.userId, email: decoded.email, jti: (0, crypto_1.randomUUID)(), }, this.refreshTokenSecret, { expiresIn: this.refreshTokenExpiry });
74
+ if (!this.tokenStore.getset) {
75
+ throw new Error("TokenStore must implement getset for atomic refresh rotation");
76
+ }
77
+ const PreviousToken = await this.tokenStore.getset(key, newRefreshToken, 60 * 60 * 24 * 7);
78
+ if (PreviousToken !== refreshToken) {
79
+ throw new InvalidTokenError("Concurrent refresh detected");
80
+ }
81
+ }
82
+ return {
83
+ accessToken: newAccessToken,
84
+ refreshToken: newRefreshToken !== null && newRefreshToken !== void 0 ? newRefreshToken : refreshToken
85
+ };
86
+ }
87
+ finally {
88
+ if (lockValue)
89
+ await this.lock.release(lockKey, lockValue);
69
90
  }
70
- return {
71
- accessToken: newAccessToken,
72
- refreshToken: newRefreshToken !== null && newRefreshToken !== void 0 ? newRefreshToken : refreshToken
73
- };
74
91
  }
75
92
  }
76
93
  exports.RefreshService = RefreshService;
@@ -1 +1 @@
1
- {"version":3,"file":"refreshService.js","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":";;;;;;AAAA,gEAA+B;AAE/B,mCAAiC;AAGjC,MAAa,iBAAkB,SAAQ,KAAK;IAC5C,YAAY,OAAO,GAAC,eAAe;QAEnC,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAE,mBAAmB,CAAC;IAC/B,CAAC;CACA;AAND,8CAMC;AAED,MAAa,iBAAkB,SAC/B,KAAK;IACL,YAAY,OAAO,GAAG,uBAAuB;QAC7C,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,mBAAmB,CAAC;IAChC,CAAC;CACA;AAND,8CAMC;AA8BD,MAAa,cAAc;IAS3B,YAAY,OAA6B;;QACzC,IAAI,CAAC,UAAU,GAAI,OAAO,CAAC,UAAU,CAAC;QACtC,IAAI,CAAC,iBAAiB,GAAG,OAAO,CAAC,iBAAiB,CAAC;QACnD,IAAI,CAAC,kBAAkB,GAAE,OAAO,CAAC,kBAAkB,CAAC;QACpD,IAAI,CAAC,iBAAiB,GAAE,MAAA,OAAO,CAAC,iBAAiB,mCAAI,KAAK,CAAC;QAC3D,IAAI,CAAC,mBAAmB,GAAG,MAAA,OAAO,CAAC,mBAAmB,mCAAI,KAAK,CAAC;QAChE,IAAI,CAAC,kBAAkB,GAAG,MAAA,OAAO,CAAC,kBAAkB,mCAAI,IAAI,CAAA;IAC3D,CAAC;IAED,KAAK,CAAC,oBAAoB,CAAC,OAAqB;QAE/C,IAAI,CAAC,OAAO,CAAC,MAAM;YAAE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QAExF,MAAM,KAAK,GAAG,sBAAG,CAAC,IAAI,CAAC,EAAC,GAAG,OAAO,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EAAC,IAAI,CAAC,kBAAkB,EAAE;YAC7E,SAAS,EAAE,IAAI,CAAC,kBAA8C;SAC/D,CAAC,CAAC;QAEH,IAAG,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;YACxB,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CACzB,WAAW,OAAO,CAAC,MAAM,EAAE,EAAC,KAAK,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAClD,CAAC;QACF,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,wBAAwB,EAAE,KAAK,CAAC,CAAC;QAC7C,OAAO,KAAK,CAAA;IACd,CAAC;IAGA,KAAK,CAAC,OAAO,CAAC,YAAoB;QACjC,IAAG,CAAC,YAAY,EAAC,CAAC;YAClB,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAEH,IAAI,OAAoB,CAAC;QACzB,IAAI,CAAC;YACL,OAAO,GAAG,sBAAG,CAAC,MAAM,CAAC,YAAY,EAAC,IAAI,CAAC,kBAAkB,CAAiB,CAAC;QAC3E,CAAC;QAAA,OAAM,GAAG,EAAC,CAAC;YACZ,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAED,MAAM,WAAW,GAAE,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,OAAO,CAAC,MAAM,EAAE,CAAC,CAAA;QACzE,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,WAAW,CAAC,CAAC;QAC1C,OAAO,CAAC,GAAG,CAAC,QAAQ,EAAE,WAAW,KAAK,YAAY,CAAC,CAAC;QAGpD,IAAI,WAAW,KAAK,YAAY,EAAC,CAAC;YAClC,MAAM,IAAI,iBAAiB,EAAE,CAAC;QAC9B,CAAC;QAED,MAAM,cAAc,GAAG,sBAAG,CAAC,IAAI,CACvB,EAAE,MAAM,EAAE,OAAO,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,CAAC,KAAK,EAAE,EAChD,IAAI,CAAC,iBAAiB,EACtB,EAAE,SAAS,EAAE,IAAI,CAAC,iBAAiD,EAAE,CACxE,CAAC;QAEN,IAAI,eAAkC,CAAC;QAEvC,IAAG,IAAI,CAAC,mBAAmB,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;YACpD,MAAM,GAAG,GAAG,WAAW,OAAO,CAAC,MAAM,EAAE,CAAA;YAGtC,eAAe,GAAE,sBAAG,CAAC,IAAI,CAAC,EAAC,MAAM,EAAC,OAAO,CAAC,MAAM,EAAC,KAAK,EAAG,OAAO,CAAC,KAAK,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EACzF,IAAI,CAAC,kBAAkB,EACxB,EAAC,SAAS,EAAC,IAAI,CAAC,kBAAkD,EAAC,CAAC,CAAC;YAErE,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,GAAG,EAAC,eAAe,EAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAA;YAC7D,OAAO,CAAC,GAAG,CAAC,2BAA2B,EAAE,eAAe,CAAC,CAAA;QAC3D,CAAC;QAEA,OAAM;YACN,WAAW,EAAC,cAAc;YAC1B,YAAY,EAAC,eAAe,aAAf,eAAe,cAAf,eAAe,GAAI,YAAY;SAC3C,CAAC;IACH,CAAC;CACA;AAnFD,wCAmFC"}
1
+ {"version":3,"file":"refreshService.js","sourceRoot":"","sources":["../../src/auth/refreshService.ts"],"names":[],"mappings":";;;;;;AAAA,gEAA+B;AAE/B,mCAAiC;AACjC,sDAA+C;AAE/C,MAAa,iBAAkB,SAAQ,KAAK;IAC5C,YAAY,OAAO,GAAC,eAAe;QAEnC,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAE,mBAAmB,CAAC;IAC/B,CAAC;CACA;AAND,8CAMC;AAED,MAAa,iBAAkB,SAC/B,KAAK;IACL,YAAY,OAAO,GAAG,uBAAuB;QAC7C,KAAK,CAAC,OAAO,CAAC,CAAC;QACf,IAAI,CAAC,IAAI,GAAG,mBAAmB,CAAC;IAChC,CAAC;CACA;AAND,8CAMC;AAiCD,MAAa,cAAc;IAS3B,YAAY,OAA6B;;QACzC,IAAI,CAAC,UAAU,GAAI,OAAO,CAAC,UAAU,CAAC;QACtC,IAAI,CAAC,iBAAiB,GAAG,OAAO,CAAC,iBAAiB,CAAC;QACnD,IAAI,CAAC,kBAAkB,GAAE,OAAO,CAAC,kBAAkB,CAAC;QACpD,IAAI,CAAC,iBAAiB,GAAE,MAAA,OAAO,CAAC,iBAAiB,mCAAI,KAAK,CAAC;QAC3D,IAAI,CAAC,mBAAmB,GAAG,MAAA,OAAO,CAAC,mBAAmB,mCAAI,KAAK,CAAC;QAChE,IAAI,CAAC,kBAAkB,GAAG,MAAA,OAAO,CAAC,kBAAkB,mCAAI,IAAI,CAAA;QAC5D,IAAI,CAAC,IAAI,GAAG,IAAI,sBAAS,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;IAC7C,CAAC;IAGD,KAAK,CAAC,oBAAoB,CAAC,OAAqB;QAE/C,IAAI,CAAC,OAAO,CAAC,MAAM;YAAE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QAExF,MAAM,KAAK,GAAG,sBAAG,CAAC,IAAI,CAAC,EAAC,GAAG,OAAO,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EAAC,IAAI,CAAC,kBAAkB,EAAE;YAC7E,SAAS,EAAE,IAAI,CAAC,kBAA8C;SAC/D,CAAC,CAAC;QAEH,IAAG,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;YACxB,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CACzB,WAAW,OAAO,CAAC,MAAM,EAAE,EAAC,KAAK,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAClD,CAAC;QACF,CAAC;QAGD,OAAO,KAAK,CAAA;IACd,CAAC;IAGA,KAAK,CAAC,OAAO,CAAC,YAAoB;QACjC,IAAG,CAAC,YAAY,EAAC,CAAC;YAClB,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAED,IAAI,OAAoB,CAAC;QAC3B,IAAG,CAAC;YAEJ,OAAO,GAAG,sBAAG,CAAC,MAAM,CAAC,YAAY,EAAC,IAAI,CAAC,kBAAkB,CAAiB,CAAC;QAC3E,CAAC;QAAA,OAAM,GAAG,EAAC,CAAC;YACZ,MAAM,IAAI,iBAAiB,EAAE,CAAA;QAC7B,CAAC;QAED,MAAM,OAAO,GAAG,QAAQ,OAAO,CAAC,MAAM,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAEzD,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,IAAI,iBAAiB,CAAC,6BAA6B,CAAC,CAAC;QAC7D,CAAC;QAEH,2EAA2E;QAE3E,IAAG,CAAC;YACJ,MAAM,GAAG,GAAG,WAAW,OAAO,CAAC,MAAM,EAAE,CAAC;YACxC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;YAGnD,IAAI,CAAC,WAAW,IAAI,WAAW,KAAK,YAAY,EAAC,CAAC;gBAClD,MAAM,IAAI,iBAAiB,EAAE,CAAC;YAC9B,CAAC;YAED,MAAM,cAAc,GAAG,sBAAG,CAAC,IAAI,CACvB,EAAE,MAAM,EAAE,OAAO,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,CAAC,KAAK,EAAE,EAChD,IAAI,CAAC,iBAAiB,EACtB,EAAE,SAAS,EAAE,IAAI,CAAC,iBAAiD,EAAE,CACxE,CAAC;YAEN,IAAI,eAAkC,CAAC;YAEvC,IAAG,IAAI,CAAC,mBAAmB,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,EAAC,CAAC;gBACpD,MAAM,GAAG,GAAG,WAAW,OAAO,CAAC,MAAM,EAAE,CAEtC;gBACA,eAAe,GAAE,sBAAG,CAAC,IAAI,CAAC,EAAC,MAAM,EAAC,OAAO,CAAC,MAAM,EAAC,KAAK,EAAG,OAAO,CAAC,KAAK,EAAC,GAAG,EAAC,IAAA,mBAAU,GAAE,GAAE,EACzF,IAAI,CAAC,kBAAkB,EACxB,EAAC,SAAS,EAAC,IAAI,CAAC,kBAAkD,EAAC,CAAC,CAAC;gBAErE,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC;oBAC5B,MAAM,IAAI,KAAK,CAAC,8DAA8D,CAAC,CAAC;gBAClF,CAAC;gBACD,MAAM,aAAa,GAAE,MAAM,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,GAAG,EAAC,eAAe,EAAC,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,CAAA;gBACvF,IAAG,aAAa,KAAK,YAAY,EAAC,CAAC;oBACnC,MAAM,IAAI,iBAAiB,CAAC,6BAA6B,CAAC,CAAA;gBAAA,CAAC;YAC3D,CAAC;YAEA,OAAM;gBACN,WAAW,EAAC,cAAc;gBAC1B,YAAY,EAAC,eAAe,aAAf,eAAe,cAAf,eAAe,GAAI,YAAY;aAC3C,CAAC;QACH,CAAC;gBAAQ,CAAC;YACN,IAAI,SAAS;gBAAE,MAAM,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;QAC7D,CAAC;IACH,CAAC;CAEA;AAvGD,wCAuGC"}
@@ -1 +1 @@
1
- {"version":3,"file":"createAuthenik8.d.ts","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,eAAe,EAAC,MAAM,gBAAgB,CAAC;AAK/C,OAAO,EAAC,iBAAiB,EAAC,MAAM,gBAAgB,CAAA;AAGhD,eAAO,MAAM,eAAe,GAAU,QAAO,eAAe,KAAG,OAAO,CAAC,iBAAiB,CAuDvF,CAAA"}
1
+ {"version":3,"file":"createAuthenik8.d.ts","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":"AAEA,OAAO,EAAC,eAAe,EAAC,MAAM,gBAAgB,CAAC;AAK/C,OAAO,EAAC,iBAAiB,EAAC,MAAM,gBAAgB,CAAA;AAGhD,eAAO,MAAM,eAAe,GAAU,QAAO,eAAe,KAAG,OAAO,CAAC,iBAAiB,CAwDvF,CAAA"}
@@ -19,6 +19,7 @@ const createAuthenik8 = async (config) => {
19
19
  });
20
20
  const refreshService = new refreshService_1.RefreshService({
21
21
  tokenStore,
22
+ redisClient,
22
23
  accessTokenSecret: config.jwtSecret,
23
24
  refreshTokenSecret: config.refreshSecret,
24
25
  accessTokenExpiry: config.jwtExpiry,
@@ -1 +1 @@
1
- {"version":3,"file":"createAuthenik8.js","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":";;;AAAA,oDAAoD;AACpD,0DAAsD;AAEtD,8DAAkD;AAClD,4DAAuD;AACvD,4CAAyC;AACzC,uDAA4D;AAE5D,+DAAyD;AAElD,MAAM,eAAe,GAAG,KAAK,EAAE,MAAsB,EAA8B,EAAE;;IAE5F,MAAM,WAAW,GAAG,MAAA,MAAM,CAAC,KAAK,mCAAI,MAAM,IAAA,oCAAqB,GAAE,CAAA;IACjE,MAAM,UAAU,GAAG,IAAI,iCAAe,CAAC,WAAW,CAAC,CAAC;IAEnD,MAAM,UAAU,GAAE,IAAI,oBAAU,CAAC;QACjC,SAAS,EAAC,MAAM,CAAC,SAAS;QAC1B,MAAM,EAAC,MAAM,CAAC,SAAS;QACvB,WAAW,EAAC,WAAW;KACtB,CAAC,CAAC;IAEH,MAAM,cAAc,GAAG,IAAI,+BAAc,CAAC;QAC1C,UAAU;QACV,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,kBAAkB,EAAC,MAAM,CAAC,aAAa;QACvC,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,mBAAmB,EAAC,IAAI;KACvB,CAAC,CAAC;IAEH,MAAM,QAAQ,GAAG,IAAI,0BAAc,CAAC;QACpC,WAAW,EAAC,MAAM,CAAC,KAAK;QACxB,kBAAkB,EAAE,IAAI;QACxB,aAAa,EAAC,IAAI;QAClB,gBAAgB,EAAC,IAAI;KACpB,CAAC,CAAC;IACJ,OAAM;QACL,MAAM;QACN,KAAK,EAAC,WAAW;QACjB,SAAS,EAAC,UAAU,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;QAC/C,WAAW,EAAC,UAAU,CAAC,WAAW,CAAC,IAAI,CAAC,UAAU,CAAC;QACnD,UAAU,EAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC;QAEjD,SAAS;QACT,YAAY,EACX,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC;QAC5C,oBAAoB,EAAE,cAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,cAAc,CAAC;QAC/E,UAAU;QACP,SAAS,EAAE,QAAQ,CAAC,qBAAqB,EAAE;QAC1C,WAAW,EAAE,QAAQ,CAAC,mBAAmB,EAAE;QAC3C,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE;QAEnC,sBAAsB;QACtB,KAAK,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC;QACpC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC;QAC1C,OAAO,EAAE,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC;QAG3C,YAAY;QACb,YAAY,EAAE,IAAA,2BAAY,EAAC,EAAE,SAAS,EACrC,MAAM,CAAC,SAAS;YACX,KAAK,EAAC,WAAW;SACtB,CAAC;QACF,SAAS,EAAC,4BAAS;KAElB,CAAA;AACD,CAAC,CAAA;AAvDY,QAAA,eAAe,mBAuD3B"}
1
+ {"version":3,"file":"createAuthenik8.js","sourceRoot":"","sources":["../src/createAuthenik8.ts"],"names":[],"mappings":";;;AAAA,oDAAoD;AACpD,0DAAsD;AAEtD,8DAAkD;AAClD,4DAAuD;AACvD,4CAAyC;AACzC,uDAA4D;AAE5D,+DAAyD;AAElD,MAAM,eAAe,GAAG,KAAK,EAAE,MAAsB,EAA8B,EAAE;;IAE5F,MAAM,WAAW,GAAG,MAAA,MAAM,CAAC,KAAK,mCAAI,MAAM,IAAA,oCAAqB,GAAE,CAAA;IACjE,MAAM,UAAU,GAAG,IAAI,iCAAe,CAAC,WAAW,CAAC,CAAC;IAEnD,MAAM,UAAU,GAAE,IAAI,oBAAU,CAAC;QACjC,SAAS,EAAC,MAAM,CAAC,SAAS;QAC1B,MAAM,EAAC,MAAM,CAAC,SAAS;QACvB,WAAW,EAAC,WAAW;KACtB,CAAC,CAAC;IAEH,MAAM,cAAc,GAAG,IAAI,+BAAc,CAAC;QAC1C,UAAU;QACV,WAAW;QACX,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,kBAAkB,EAAC,MAAM,CAAC,aAAa;QACvC,iBAAiB,EAAC,MAAM,CAAC,SAAS;QAClC,mBAAmB,EAAC,IAAI;KACvB,CAAC,CAAC;IAEH,MAAM,QAAQ,GAAG,IAAI,0BAAc,CAAC;QACpC,WAAW,EAAC,MAAM,CAAC,KAAK;QACxB,kBAAkB,EAAE,IAAI;QACxB,aAAa,EAAC,IAAI;QAClB,gBAAgB,EAAC,IAAI;KACpB,CAAC,CAAC;IACJ,OAAM;QACL,MAAM;QACN,KAAK,EAAC,WAAW;QACjB,SAAS,EAAC,UAAU,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;QAC/C,WAAW,EAAC,UAAU,CAAC,WAAW,CAAC,IAAI,CAAC,UAAU,CAAC;QACnD,UAAU,EAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC;QAEjD,SAAS;QACT,YAAY,EACX,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC;QAC5C,oBAAoB,EAAE,cAAc,CAAC,oBAAoB,CAAC,IAAI,CAAC,cAAc,CAAC;QAC/E,UAAU;QACP,SAAS,EAAE,QAAQ,CAAC,qBAAqB,EAAE;QAC1C,WAAW,EAAE,QAAQ,CAAC,mBAAmB,EAAE;QAC3C,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE;QAEnC,sBAAsB;QACtB,KAAK,EAAE,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC;QACpC,QAAQ,EAAE,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC,QAAQ,CAAC;QAC1C,OAAO,EAAE,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC;QAG3C,YAAY;QACb,YAAY,EAAE,IAAA,2BAAY,EAAC,EAAE,SAAS,EACrC,MAAM,CAAC,SAAS;YACX,KAAK,EAAC,WAAW;SACtB,CAAC;QACF,SAAS,EAAC,4BAAS;KAElB,CAAA;AACD,CAAC,CAAA;AAxDY,QAAA,eAAe,mBAwD3B"}
@@ -7,10 +7,11 @@ export declare class RedisTokenStore {
7
7
  private key;
8
8
  private log;
9
9
  storeRefreshToken(token: string, userId: string, ttl: number): Promise<void>;
10
- getRefreshToken(token: string): Promise<string | null>;
11
- deleteRefreshToken(token: string): Promise<void>;
12
- blacklistToken(token: string, ttl: number): Promise<void>;
13
- isBlacklisted(token: string): Promise<boolean>;
10
+ getRefreshToken(userId: string): Promise<string | null>;
11
+ getset(key: string, value: string, expiry?: number): Promise<string | null>;
12
+ deleteRefreshToken(userId: string): Promise<void>;
13
+ blacklistToken(userId: string, ttl: number): Promise<void>;
14
+ isBlacklisted(userId: string): Promise<boolean>;
14
15
  incrementRateLimit(ip: string, ttl: number): Promise<number>;
15
16
  addToWhitelist(ip: string): Promise<void>;
16
17
  removeFromWhitelist(ip: string): Promise<void>;
@@ -1 +1 @@
1
- {"version":3,"file":"RedisTokenStore.d.ts","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAEhC,qBAAa,eAAe;IAGd,OAAO,CAAC,KAAK;IAAQ,OAAO,CAAC,KAAK;IAF/C,OAAO,CAAC,MAAM,CAAa;gBAEN,KAAK,EAAE,KAAK,EAAS,KAAK,UAAQ;IAGtD,OAAO,CAAC,GAAG;IAIb,OAAO,CAAC,GAAG;IAKJ,iBAAiB,CAAC,KAAK,EAAC,MAAM,EAAC,MAAM,EAAC,MAAM,EAAC,GAAG,EAAC,MAAM;IAOxD,eAAe,CAAC,KAAK,EAAC,MAAM;IAO5B,kBAAkB,CAAC,KAAK,EAAC,MAAM;IAO/B,cAAc,CAAC,KAAK,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAMvC,aAAa,CAAC,KAAK,EAAE,MAAM;IAQ3B,kBAAkB,CAAC,EAAE,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAa1C,cAAc,CAAC,EAAE,EAAE,MAAM;IAMzB,mBAAmB,CAAC,EAAE,EAAE,MAAM;IAM9B,aAAa,CAAC,EAAE,EAAE,MAAM;IAM1B,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAW7D,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;CAG/C"}
1
+ {"version":3,"file":"RedisTokenStore.d.ts","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAC;AAEhC,qBAAa,eAAe;IAGd,OAAO,CAAC,KAAK;IAAQ,OAAO,CAAC,KAAK;IAF/C,OAAO,CAAC,MAAM,CAAa;gBAEN,KAAK,EAAE,KAAK,EAAS,KAAK,UAAQ;IAGtD,OAAO,CAAC,GAAG;IAIb,OAAO,CAAC,GAAG;IAKJ,iBAAiB,CAAC,KAAK,EAAC,MAAM,EAAC,MAAM,EAAC,MAAM,EAAC,GAAG,EAAC,MAAM;IAOxD,eAAe,CAAC,MAAM,EAAC,MAAM;IAM7B,MAAM,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAY3E,kBAAkB,CAAC,MAAM,EAAC,MAAM;IAOhC,cAAc,CAAC,MAAM,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAMxC,aAAa,CAAC,MAAM,EAAE,MAAM;IAQ5B,kBAAkB,CAAC,EAAE,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM;IAa1C,cAAc,CAAC,EAAE,EAAE,MAAM;IAMzB,mBAAmB,CAAC,EAAE,EAAE,MAAM;IAM9B,aAAa,CAAC,EAAE,EAAE,MAAM;IAM1B,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;IAW7D,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;CAG/C"}
@@ -16,28 +16,36 @@ class RedisTokenStore {
16
16
  }
17
17
  }
18
18
  async storeRefreshToken(token, userId, ttl) {
19
- const key = this.key("refresh", token);
19
+ const key = this.key("refresh", userId);
20
20
  await this.redis.set(key, userId, "EX", ttl);
21
21
  this.log("SET", key, userId);
22
22
  }
23
- async getRefreshToken(token) {
24
- const key = this.key("refresh", token);
23
+ async getRefreshToken(userId) {
24
+ const key = this.key("refresh", userId);
25
25
  const value = await this.redis.get(key);
26
26
  this.log("GET", key, value);
27
27
  return value;
28
28
  }
29
- async deleteRefreshToken(token) {
30
- const key = this.key("refresh", token);
29
+ async getset(key, value, expiry) {
30
+ const previous = await this.redis.getset(key, value);
31
+ if (expiry) {
32
+ await this.redis.expire(key, expiry);
33
+ }
34
+ this.log("GETSET", key, { previous, new: value });
35
+ return previous;
36
+ }
37
+ async deleteRefreshToken(userId) {
38
+ const key = this.key("refresh", userId);
31
39
  await this.redis.del(key);
32
40
  this.log("DEL", key);
33
41
  }
34
- async blacklistToken(token, ttl) {
35
- const key = this.key("blacklist", token);
42
+ async blacklistToken(userId, ttl) {
43
+ const key = this.key("blacklist", userId);
36
44
  await this.redis.set(key, "1", "EX", ttl);
37
45
  this.log("SET", key, "blacklisted");
38
46
  }
39
- async isBlacklisted(token) {
40
- const key = this.key("blacklist", token);
47
+ async isBlacklisted(userId) {
48
+ const key = this.key("blacklist", userId);
41
49
  const exists = await this.redis.exists(key);
42
50
  this.log("CHECK", key, exists);
43
51
  return exists === 1;
@@ -1 +1 @@
1
- {"version":3,"file":"RedisTokenStore.js","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":";;;AAGA,MAAa,eAAe;IAG1B,YAAoB,KAAY,EAAS,QAAQ,KAAK;QAAlC,UAAK,GAAL,KAAK,CAAO;QAAS,UAAK,GAAL,KAAK,CAAQ;QAF/C,WAAM,GAAG,SAAS,CAAC;IAE+B,CAAC;IAGlD,GAAG,CAAC,GAAG,KAAc;QAC7B,OAAO,GAAG,IAAI,CAAC,MAAM,IAAI,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC3C,CAAC;IAEK,GAAG,CAAC,MAAa,EAAC,GAAU,EAAE,KAAU;QAChD,IAAI,IAAI,CAAC,KAAK,EAAC,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,GAAG,EAAC,EAAC,GAAG,EAAE,KAAK,EAAC,CAAC,CAAA;QAC5C,CAAC;IACF,CAAC;IACA,KAAK,CAAC,iBAAiB,CAAC,KAAY,EAAC,MAAa,EAAC,GAAU;QAC7D,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;QACvC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAC,MAAM,EAAE,IAAI,EAAC,GAAG,CAAC,CAAC;QAC3C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,MAAM,CAAC,CAAA;IAE7B,CAAC;IAED,KAAK,CAAC,eAAe,CAAC,KAAY;QAClC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,KAAK,CAAC,CAAC;QACtC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,EAAG,KAAK,CAAC,CAAC;QAC5B,OAAO,KAAK,CAAC;IACb,CAAC;IAED,KAAK,CAAC,kBAAkB,CAAC,KAAY;QACrC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,KAAK,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,CAAC,CAAC;IAEpB,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,KAAa,EAAE,GAAW;QAC3C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;QACzC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,IAAI,EAAE,GAAG,CAAC,CAAC;QAC1C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,KAAa;QAC/B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;QACzC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IAED,gBAAgB;IAChB,KAAK,CAAC,kBAAkB,CAAC,EAAU,EAAE,GAAW;QAC9C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;QAEjC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACzC,IAAI,KAAK,KAAK,CAAC,EAAE,CAAC;YAChB,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QACpC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAC7B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,eAAe;IACf,KAAK,CAAC,cAAc,CAAC,EAAU;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QAC/B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,mBAAmB,CAAC,EAAU;QAClC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACvB,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,EAAU;QAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IACH,KAAK,CAAC,GAAG,CAAC,GAAW,EAAE,KAAa,EAAE,MAAe;QACnD,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAEtC,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;QACjD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAGC,KAAK,CAAC,GAAG,CAAC,GAAW;QACrB,OAAO,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC3B,CAAC;CACF;AA/FD,0CA+FC"}
1
+ {"version":3,"file":"RedisTokenStore.js","sourceRoot":"","sources":["../../src/storage/RedisTokenStore.ts"],"names":[],"mappings":";;;AAGA,MAAa,eAAe;IAG1B,YAAoB,KAAY,EAAS,QAAQ,KAAK;QAAlC,UAAK,GAAL,KAAK,CAAO;QAAS,UAAK,GAAL,KAAK,CAAQ;QAF/C,WAAM,GAAG,SAAS,CAAC;IAE+B,CAAC;IAGlD,GAAG,CAAC,GAAG,KAAc;QAC7B,OAAO,GAAG,IAAI,CAAC,MAAM,IAAI,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC3C,CAAC;IAEK,GAAG,CAAC,MAAa,EAAC,GAAU,EAAE,KAAU;QAChD,IAAI,IAAI,CAAC,KAAK,EAAC,CAAC;YAChB,OAAO,CAAC,GAAG,CAAC,UAAU,MAAM,GAAG,EAAC,EAAC,GAAG,EAAE,KAAK,EAAC,CAAC,CAAA;QAC5C,CAAC;IACF,CAAC;IACA,KAAK,CAAC,iBAAiB,CAAC,KAAY,EAAC,MAAa,EAAC,GAAU;QAC7D,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;QACxC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAC,MAAM,EAAE,IAAI,EAAC,GAAG,CAAC,CAAC;QAC3C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,MAAM,CAAC,CAAA;IAE7B,CAAC;IAED,KAAK,CAAC,eAAe,CAAC,MAAa;QACnC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,MAAM,CAAC,CAAC;QACvC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QACxC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,EAAG,KAAK,CAAC,CAAC;QAC5B,OAAO,KAAK,CAAC;IACb,CAAC;IACD,KAAK,CAAC,MAAM,CAAC,GAAW,EAAE,KAAa,EAAE,MAAe;QAEtD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QAErD,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;QACvC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,EAAE,EAAE,QAAQ,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC,CAAC;QAClD,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED,KAAK,CAAC,kBAAkB,CAAC,MAAa;QACtC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,SAAS,EAAC,MAAM,CAAC,CAAC;QACvC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAC,GAAG,CAAC,CAAC;IAEpB,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,MAAc,EAAE,GAAW;QAC5C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;QAC1C,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,IAAI,EAAE,GAAG,CAAC,CAAC;QAC1C,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,MAAc;QAChC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;QAC1C,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IAED,gBAAgB;IAChB,KAAK,CAAC,kBAAkB,CAAC,EAAU,EAAE,GAAW;QAC9C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;QAEjC,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QACzC,IAAI,KAAK,KAAK,CAAC,EAAE,CAAC;YAChB,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QACpC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAC7B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,eAAe;IACf,KAAK,CAAC,cAAc,CAAC,EAAU;QAC7B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QAC/B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,aAAa,CAAC,CAAC;IACtC,CAAC;IAED,KAAK,CAAC,mBAAmB,CAAC,EAAU;QAClC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC1B,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACvB,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,EAAU;QAC5B,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,CAAC,CAAC;QACtC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QAC5C,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,EAAE,MAAM,CAAC,CAAC;QAC/B,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IACH,KAAK,CAAC,GAAG,CAAC,GAAW,EAAE,KAAa,EAAE,MAAe;QACnD,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;QAEtC,IAAI,MAAM,EAAE,CAAC;YACX,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;QACjD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QACnC,CAAC;IACH,CAAC;IAGC,KAAK,CAAC,GAAG,CAAC,GAAW;QACrB,OAAO,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;IAC3B,CAAC;CACF;AA1GD,0CA0GC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=con.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"con.test.d.ts","sourceRoot":"","sources":["../../src/tests/con.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,71 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ const createAuthenik8_1 = require("../createAuthenik8");
7
+ const supertest_1 = __importDefault(require("supertest"));
8
+ const express_1 = __importDefault(require("express"));
9
+ const ioredis_1 = __importDefault(require("ioredis"));
10
+ describe("Refresh Token Concurrency (Integration)", () => {
11
+ let app;
12
+ let auth; // or just `any` but this is better
13
+ let refreshToken;
14
+ let redisClient;
15
+ beforeAll(async () => {
16
+ // Create and verify a connected Redis client (use a separate DB for tests)
17
+ redisClient = new ioredis_1.default({ host: "localhost", port: 6379, db: 1 });
18
+ await redisClient.ping(); // ensure connection is established
19
+ // Pass the connected client as `redis` (not `redisClient`)
20
+ auth = await (0, createAuthenik8_1.createAuthenik8)({
21
+ jwtSecret: "test-secret",
22
+ refreshSecret: "refresh-secret",
23
+ jwtExpiry: "15m",
24
+ redis: redisClient, // ✅ correct property name
25
+ });
26
+ app = (0, express_1.default)();
27
+ app.use(express_1.default.json());
28
+ // Login route – must be async and await the refresh token generation
29
+ app.post("/login", async (req, res) => {
30
+ const token = auth.signToken({ userId: "user_1", email: "test@test.com" });
31
+ refreshToken = await auth.generateRefreshToken({ userId: "user_1", email: "test@test.com" });
32
+ res.json({ token, refreshToken });
33
+ });
34
+ // Refresh route – unchanged but uses the proper error handling
35
+ app.post("/refresh", async (req, res) => {
36
+ try {
37
+ const result = await auth.refreshToken(req.body.refreshToken);
38
+ res.json(result);
39
+ }
40
+ catch (err) {
41
+ console.error("Refresh error", err);
42
+ if (err.name === "InvalidTokenError") {
43
+ return res.status(401).json({ error: err.message });
44
+ }
45
+ return res.status(500).json({ error: err.message });
46
+ }
47
+ });
48
+ });
49
+ afterAll(async () => {
50
+ // Clean up the test database and close the client
51
+ await redisClient.flushdb();
52
+ await redisClient.quit();
53
+ });
54
+ it("should allow only one of two concurrent refresh requests", async () => {
55
+ // Login to obtain a valid refresh token
56
+ await (0, supertest_1.default)(app).post("/login").send({});
57
+ // Fire two concurrent refresh requests
58
+ const [res1, res2] = await Promise.all([
59
+ (0, supertest_1.default)(app).post("/refresh").send({ refreshToken }),
60
+ (0, supertest_1.default)(app).post("/refresh").send({ refreshToken }),
61
+ ]);
62
+ // Exactly one should succeed (200) and one should fail with 401
63
+ const statuses = [res1.status, res2.status].sort();
64
+ expect(statuses).toEqual([200, 401]);
65
+ // The successful response must contain new tokens
66
+ const successRes = res1.status === 200 ? res1 : res2;
67
+ expect(successRes.body).toHaveProperty("accessToken");
68
+ expect(successRes.body).toHaveProperty("refreshToken");
69
+ });
70
+ });
71
+ //# sourceMappingURL=con.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"con.test.js","sourceRoot":"","sources":["../../src/tests/con.test.ts"],"names":[],"mappings":";;;;;AAAA,wDAAqD;AACrD,0DAAgC;AAChC,sDAA8B;AAC9B,sDAA4B;AAE5B,QAAQ,CAAC,yCAAyC,EAAE,GAAG,EAAE;IACvD,IAAI,GAAoB,CAAC;IACzB,IAAI,IAAiD,CAAC,CAAC,mCAAmC;IAC1F,IAAI,YAAoB,CAAC;IACzB,IAAI,WAAkB,CAAC;IAEvB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,2EAA2E;QAC3E,WAAW,GAAG,IAAI,iBAAK,CAAC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,CAAC;QAClE,MAAM,WAAW,CAAC,IAAI,EAAE,CAAC,CAAC,mCAAmC;QAE7D,2DAA2D;QAC3D,IAAI,GAAG,MAAM,IAAA,iCAAe,EAAC;YAC3B,SAAS,EAAE,aAAa;YACxB,aAAa,EAAE,gBAAgB;YAC/B,SAAS,EAAE,KAAK;YAChB,KAAK,EAAE,WAAW,EAAE,0BAA0B;SAC/C,CAAC,CAAC;QAEH,GAAG,GAAG,IAAA,iBAAO,GAAE,CAAC;QAChB,GAAG,CAAC,GAAG,CAAC,iBAAO,CAAC,IAAI,EAAE,CAAC,CAAC;QAExB,qEAAqE;QACrE,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACpC,MAAM,KAAK,GAAG,IAAI,CAAC,SAAS,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,eAAe,EAAE,CAAC,CAAC;YAC3E,YAAY,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,eAAe,EAAE,CAAC,CAAC;YAC7F,GAAG,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,YAAY,EAAE,CAAC,CAAC;QACpC,CAAC,CAAC,CAAC;QAEH,+DAA+D;QAC/D,GAAG,CAAC,IAAI,CAAC,UAAU,EAAE,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACtC,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;gBAC9D,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YACnB,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBACnB,OAAO,CAAC,KAAK,CAAC,eAAe,EAAC,GAAG,CAAC,CAAA;gBAElC,IAAG,GAAG,CAAC,IAAI,KAAK,mBAAmB,EAAC,CAAC;oBACrC,OAAO,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,EAAC,KAAK,EAAC,GAAG,CAAC,OAAO,EAAC,CAAC,CAAA;gBAChD,CAAC;gBACA,OAAO,GAAG,CAAC,MAAM,CAAE,GAAG,CAAC,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvD,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,kDAAkD;QAClD,MAAM,WAAW,CAAC,OAAO,EAAE,CAAC;QAC5B,MAAM,WAAW,CAAC,IAAI,EAAE,CAAC;IAC3B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,wCAAwC;QACxC,MAAM,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QAE3C,uCAAuC;QACvC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YACrC,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC;YACpD,IAAA,mBAAO,EAAC,GAAG,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC;SACrD,CAAC,CAAC;QAEH,gEAAgE;QAChE,MAAM,QAAQ,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC;QACnD,MAAM,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,CAAC;QAErC,kDAAkD;QAClD,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,KAAK,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC;QACrD,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QACtD,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -18,7 +18,7 @@ describe("Authenik8 Full Integration", () => {
18
18
  await auth.redis.quit();
19
19
  }
20
20
  });
21
- // 🔐 LOGIN
21
+ // LOGIN
22
22
  test("should login and receive tokens", async () => {
23
23
  const res = await request.post("/login");
24
24
  expect(res.status).toBe(200);
@@ -27,7 +27,7 @@ describe("Authenik8 Full Integration", () => {
27
27
  accessToken = res.body.accessToken;
28
28
  refreshToken = res.body.refreshToken;
29
29
  });
30
- // 🔒 PROTECTED ROUTE
30
+ // PROTECTED ROUTE
31
31
  test("should access protected route with valid token", async () => {
32
32
  const res = await request
33
33
  .get("/protected")
@@ -35,12 +35,12 @@ describe("Authenik8 Full Integration", () => {
35
35
  expect(res.status).toBe(200);
36
36
  expect(res.body).toHaveProperty("data", "secure data");
37
37
  });
38
- // 🚫 NO TOKEN
38
+ // NO TOKEN
39
39
  test("should reject request without token", async () => {
40
40
  const res = await request.get("/protected");
41
41
  expect(res.status).toBe(401);
42
42
  });
43
- // 🔄 REFRESH TOKEN
43
+ // REFRESH TOKEN
44
44
  test("should refresh access token", async () => {
45
45
  const res = await request
46
46
  .post("/refresh")
@@ -55,7 +55,7 @@ describe("Authenik8 Full Integration", () => {
55
55
  refreshToken = res.body.refreshToken;
56
56
  }
57
57
  });
58
- // 🔥 ROTATION (IMPORTANT)
58
+ // ROTATION (IMPORTANT)
59
59
  test("should NOT allow reuse of old refresh token", async () => {
60
60
  const originalToken = refreshToken;
61
61
  // first use → rotates token
@@ -1 +1 @@
1
- {"version":3,"file":"full.intergration.test.js","sourceRoot":"","sources":["../../src/tests/full.intergration.test.ts"],"names":[],"mappings":";;AAAA,iCAAiC;AACjC,uCAA0C;AAE1C,QAAQ,CAAC,4BAA4B,EAAE,GAAG,EAAE;IAC1C,IAAI,OAAY,CAAC;IACjB,IAAI,IAAS,CAAC;IAEd,IAAI,WAAmB,CAAC;IACxB,IAAI,YAAoB,CAAC;IAEzB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,MAAM,KAAK,GAAG,MAAM,IAAA,uBAAa,GAAE,CAAC;QACpC,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC;QACxB,IAAI,GAAG,KAAK,CAAC,IAAI,CAAC;IACpB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YAC3B,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,WAAW;IACX,IAAI,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QACjD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,qBAAqB;IACrB,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAChE,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,GAAG,CAAC,YAAY,CAAC;aACjB,GAAG,CAAC,eAAe,EAAE,UAAU,WAAW,EAAE,CAAC,CAAC;QAEjD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,cAAc;IACd,IAAI,CAAC,qCAAqC,EAAE,KAAK,IAAI,EAAE;QACrD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAE5C,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,mBAAmB;IACnB,IAAI,CAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;QAC7C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC,CAAC;QAE1B,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,gBAAgB;QAChB,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QAErC,IAAI,GAAG,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YAC9B,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QACvC,CAAC;IAEC,CAAC,CAAC,CAAC;IAEH,0BAA0B;IAC1B,IAAI,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;QAC/D,MAAM,aAAa,GAAG,YAAY,CAAC;QAEnC,4BAA4B;QAC5B,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAElC,MAAM,QAAQ,GAAG,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;QAE5C,0CAA0C;QAC1C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAE7B,sCAAsC;QACtC,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,CAAC;QAEpC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACpC,CAAC,CAAC,CAAC;AACD,CAAC,CAAC,CAAC"}
1
+ {"version":3,"file":"full.intergration.test.js","sourceRoot":"","sources":["../../src/tests/full.intergration.test.ts"],"names":[],"mappings":";;AAAA,iCAAiC;AACjC,uCAA0C;AAE1C,QAAQ,CAAC,4BAA4B,EAAE,GAAG,EAAE;IAC1C,IAAI,OAAY,CAAC;IACjB,IAAI,IAAS,CAAC;IAEd,IAAI,WAAmB,CAAC;IACxB,IAAI,YAAoB,CAAC;IAEzB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,MAAM,KAAK,GAAG,MAAM,IAAA,uBAAa,GAAE,CAAC;QACpC,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC;QACxB,IAAI,GAAG,KAAK,CAAC,IAAI,CAAC;IACpB,CAAC,CAAC,CAAC;IAEH,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,IAAI,IAAI,CAAC,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC;YAC3B,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;QAC1B,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,SAAS;IACT,IAAI,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QACjD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,mBAAmB;IACnB,IAAI,CAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAChE,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,GAAG,CAAC,YAAY,CAAC;aACjB,GAAG,CAAC,eAAe,EAAE,UAAU,WAAW,EAAE,CAAC,CAAC;QAEjD,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,YAAY;IACZ,IAAI,CAAC,qCAAqC,EAAE,KAAK,IAAI,EAAE;QACrD,MAAM,GAAG,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAE5C,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,gBAAgB;IAChB,IAAI,CAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;QAC7C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,CAAC,CAAC;QAE1B,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAC7B,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QAC/C,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,CAAC;QAEhD,gBAAgB;QAChB,WAAW,GAAG,GAAG,CAAC,IAAI,CAAC,WAAW,CAAC;QACnC,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QAErC,IAAI,GAAG,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;YAC9B,YAAY,GAAG,GAAG,CAAC,IAAI,CAAC,YAAY,CAAC;QACvC,CAAC;IAEC,CAAC,CAAC,CAAC;IAEH,wBAAwB;IACxB,IAAI,CAAC,6CAA6C,EAAE,KAAK,IAAI,EAAE;QAC/D,MAAM,aAAa,GAAG,YAAY,CAAC;QAEnC,4BAA4B;QAC5B,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAElC,MAAM,QAAQ,GAAG,QAAQ,CAAC,IAAI,CAAC,YAAY,CAAC;QAE5C,0CAA0C;QAC1C,MAAM,GAAG,GAAG,MAAM,OAAO;aACtB,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,CAAC;QAEzC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAE7B,sCAAsC;QACtC,MAAM,QAAQ,GAAG,MAAM,OAAO;aAC3B,IAAI,CAAC,UAAU,CAAC;aAChB,IAAI,CAAC,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,CAAC;QAEpC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IACpC,CAAC,CAAC,CAAC;AACD,CAAC,CAAC,CAAC"}
@@ -0,0 +1,7 @@
1
+ export declare class RedisLock {
2
+ private redis;
3
+ constructor(redis: any);
4
+ acquire(key: string, ttl?: number): Promise<string | null>;
5
+ release(key: string, value: string): Promise<void>;
6
+ }
7
+ //# sourceMappingURL=lockHelper.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"lockHelper.d.ts","sourceRoot":"","sources":["../../src/utility/lockHelper.ts"],"names":[],"mappings":"AAEA,qBAAa,SAAS;IACR,OAAO,CAAC,KAAK;gBAAL,KAAK,EAAE,GAAG;IAExB,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,SAAO,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAgBxD,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAWzD"}
@@ -0,0 +1,28 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.RedisLock = void 0;
4
+ const crypto_1 = require("crypto");
5
+ class RedisLock {
6
+ constructor(redis) {
7
+ this.redis = redis;
8
+ }
9
+ async acquire(key, ttl = 5000) {
10
+ const value = (0, crypto_1.randomUUID)();
11
+ const result = await this.redis.set(key, value, "PX", ttl, "NX");
12
+ if (result !== "OK")
13
+ return null;
14
+ return value;
15
+ }
16
+ async release(key, value) {
17
+ const luaScript = `
18
+ if redis.call("GET", KEYS[1]) == ARGV[1] then
19
+ return redis.call("DEL", KEYS[1])
20
+ else
21
+ return 0
22
+ end
23
+ `;
24
+ await this.redis.eval(luaScript, 1, key, value);
25
+ }
26
+ }
27
+ exports.RedisLock = RedisLock;
28
+ //# sourceMappingURL=lockHelper.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"lockHelper.js","sourceRoot":"","sources":["../../src/utility/lockHelper.ts"],"names":[],"mappings":";;;AAAA,mCAAoC;AAEpC,MAAa,SAAS;IACpB,YAAoB,KAAU;QAAV,UAAK,GAAL,KAAK,CAAK;IAAG,CAAC;IAElC,KAAK,CAAC,OAAO,CAAC,GAAW,EAAE,GAAG,GAAG,IAAI;QACnC,MAAM,KAAK,GAAG,IAAA,mBAAU,GAAE,CAAC;QAE3B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,KAAK,CAAC,GAAG,CACjC,GAAG,EACH,KAAK,EACL,IAAI,EACJ,GAAG,EACH,IAAI,CACL,CAAC;QAEF,IAAI,MAAM,KAAK,IAAI;YAAE,OAAO,IAAI,CAAC;QAEjC,OAAO,KAAK,CAAC;IACf,CAAC;IAED,KAAK,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QACtC,MAAM,SAAS,GAAG;;;;;;KAMjB,CAAC;QAEF,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC;IAClD,CAAC;CACF;AA9BD,8BA8BC"}
package/dump.rdb CHANGED
Binary file
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "authenik8-core",
3
- "version": "0.1.0",
4
- "description": "Security-First authentication toolkit for nodejs APIs",
3
+ "version": "0.1.2",
4
+ "description": "A modular Node.js authentication SDK with JWT, secure refresh token rotation, and built-in security middleware.",
5
5
  "keywords": [
6
6
  "authentication",
7
7
  "jwt",
@@ -10,7 +10,9 @@
10
10
  "redis",
11
11
  "express",
12
12
  "nodejs",
13
- "auth"
13
+ "auth",
14
+ "backend",
15
+ "helmet"
14
16
  ],
15
17
  "homepage": "https://gitlab.com/COD434/authenik8-core#readme",
16
18
  "bugs": {
@@ -29,7 +31,10 @@
29
31
  "test": "jest",
30
32
  "build": "tsc",
31
33
  "files": [
32
- "dist"
34
+ "dist",
35
+ "README.md",
36
+ "LICENSE",
37
+ "CHANGELOG"
33
38
  ]
34
39
  },
35
40
  "devDependencies": {
@@ -1,7 +1,7 @@
1
1
  import jwt from "jsonwebtoken";
2
2
  import { SignOptions } from "jsonwebtoken";
3
3
  import {randomUUID} from "crypto"
4
-
4
+ import {RedisLock} from "../utility/lockHelper"
5
5
 
6
6
  export class MissingTokenError extends Error{
7
7
  constructor(message="Missing Token")
@@ -30,11 +30,14 @@ export interface TokenStore{
30
30
  get(key:string):Promise<string| null>;
31
31
  set?(key: string, value: string, expiry?:number):Promise<void>;
32
32
  del?(key :string):Promise<void>;
33
-
33
+ getset?(key: string, value: string, expiry?: number): Promise<string | null>;
34
34
  }
35
+
36
+
35
37
  export interface RefreshServiceOptions {
36
38
  tokenStore:TokenStore;
37
39
  accessTokenSecret:string;
40
+ redisClient:any;
38
41
  refreshTokenSecret:string;
39
42
  accessTokenExpiry:SignOptions["expiresIn"];
40
43
  rotateRefreshTokens?:boolean;
@@ -54,7 +57,7 @@ private refreshTokenSecret:string;
54
57
  private accessTokenExpiry:SignOptions["expiresIn"];
55
58
  private rotateRefreshTokens:boolean;
56
59
  private refreshTokenExpiry:string;
57
-
60
+ private lock:RedisLock;
58
61
 
59
62
  constructor(options:RefreshServiceOptions){
60
63
  this.tokenStore = options.tokenStore;
@@ -63,8 +66,10 @@ this.refreshTokenSecret =options.refreshTokenSecret;
63
66
  this.accessTokenExpiry= options.accessTokenExpiry ?? "15m";
64
67
  this.rotateRefreshTokens = options.rotateRefreshTokens ?? false;
65
68
  this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
69
+ this.lock = new RedisLock(options.redisClient)
66
70
  }
67
71
 
72
+
68
73
  async generateRefreshToken(payload: TokenPayload): Promise<string> {
69
74
 
70
75
  if (!payload.userId) throw new Error("generateRefreshToken: payload.userId is missing");
@@ -79,7 +84,7 @@ this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
79
84
  );
80
85
  }
81
86
 
82
- console.log("Saving token to Redis:", token);
87
+
83
88
  return token
84
89
  }
85
90
 
@@ -88,20 +93,30 @@ this.refreshTokenExpiry = options.refreshTokenExpiry ?? "7d"
88
93
  if(!refreshToken){
89
94
  throw new MissingTokenError()
90
95
  }
91
-
92
- let decoded:TokenPayload;
93
- try {
96
+
97
+ let decoded:TokenPayload;
98
+ try{
99
+
94
100
  decoded = jwt.verify(refreshToken,this.refreshTokenSecret) as TokenPayload;
95
101
  }catch(err){
96
102
  throw new InvalidTokenError()
97
103
  }
98
104
 
99
- const storedToken= await this.tokenStore.get(`refresh:${decoded.userId}`)
100
- console.log("Stored token:", storedToken);
101
- console.log("Match:", storedToken === refreshToken);
105
+ const lockKey = `lock:${decoded.userId}`;
106
+ const lockValue = await this.lock.acquire(lockKey, 5000);
102
107
 
108
+ if (!lockValue) {
109
+ throw new InvalidTokenError("Concurrent refresh detected");
110
+ }
103
111
 
104
- if (storedToken !== refreshToken){
112
+ //const storedToken= await this.tokenStore.get(`refresh:${decoded.userId}`)
113
+
114
+ try{
115
+ const key = `refresh:${decoded.userId}`;
116
+ const storedToken = await this.tokenStore.get(key);
117
+
118
+
119
+ if (!storedToken || storedToken !== refreshToken){
105
120
  throw new InvalidTokenError();
106
121
  }
107
122
 
@@ -116,19 +131,26 @@ let newRefreshToken:string | undefined;
116
131
  if(this.rotateRefreshTokens && this.tokenStore.set){
117
132
  const key = `refresh:${decoded.userId}`
118
133
 
119
-
134
+ ;
120
135
  newRefreshToken =jwt.sign({userId:decoded.userId,email : decoded.email,jti:randomUUID(),},
121
136
  this.refreshTokenSecret,
122
137
  {expiresIn:this.refreshTokenExpiry as jwt.SignOptions["expiresIn"]});
123
138
 
124
- await this.tokenStore.set(key,newRefreshToken,60 * 60 * 24 * 7)
125
- console.log("Stored new refresh token:", newRefreshToken)
139
+ if (!this.tokenStore.getset) {
140
+ throw new Error("TokenStore must implement getset for atomic refresh rotation");
141
+ }
142
+ const PreviousToken =await this.tokenStore.getset(key,newRefreshToken,60 * 60 * 24 * 7)
143
+ if(PreviousToken !== refreshToken){
144
+ throw new InvalidTokenError("Concurrent refresh detected")}
126
145
  }
127
146
 
128
147
  return{
129
148
  accessToken:newAccessToken,
130
149
  refreshToken:newRefreshToken ?? refreshToken
131
150
  };
132
- }
151
+ }finally {
152
+ if (lockValue) await this.lock.release(lockKey, lockValue);
153
+ }
133
154
  }
134
155
 
156
+ }
@@ -21,6 +21,7 @@ const tokenStore = new RedisTokenStore(redisClient);
21
21
 
22
22
  const refreshService = new RefreshService({
23
23
  tokenStore,
24
+ redisClient,
24
25
  accessTokenSecret:config.jwtSecret,
25
26
  refreshTokenSecret:config.refreshSecret,
26
27
  accessTokenExpiry:config.jwtExpiry,
@@ -17,34 +17,45 @@ console.log(`[Redis ${action}]`,{key, value})
17
17
  }
18
18
  }
19
19
  async storeRefreshToken(token:string,userId:string,ttl:number){
20
- const key = this.key("refresh", token);
20
+ const key = this.key("refresh", userId);
21
21
  await this.redis.set(key,userId, "EX",ttl);
22
22
  this.log("SET", key, userId)
23
23
 
24
24
  }
25
25
 
26
- async getRefreshToken(token:string){
27
- const key = this.key("refresh",token);
26
+ async getRefreshToken(userId:string){
27
+ const key = this.key("refresh",userId);
28
28
  const value = await this.redis.get(key);
29
29
  this.log("GET",key , value);
30
30
  return value;
31
31
  }
32
+ async getset(key: string, value: string, expiry?: number): Promise<string | null> {
32
33
 
33
- async deleteRefreshToken(token:string){
34
- const key = this.key("refresh",token);
34
+ const previous = await this.redis.getset(key, value);
35
+
36
+ if (expiry) {
37
+ await this.redis.expire(key, expiry);
38
+ }
39
+
40
+ this.log("GETSET", key, { previous, new: value });
41
+ return previous;
42
+ }
43
+
44
+ async deleteRefreshToken(userId:string){
45
+ const key = this.key("refresh",userId);
35
46
  await this.redis.del(key);
36
47
  this.log("DEL",key);
37
48
 
38
49
  }
39
50
 
40
- async blacklistToken(token: string, ttl: number) {
41
- const key = this.key("blacklist", token);
51
+ async blacklistToken(userId: string, ttl: number) {
52
+ const key = this.key("blacklist", userId);
42
53
  await this.redis.set(key, "1", "EX", ttl);
43
54
  this.log("SET", key, "blacklisted");
44
55
  }
45
56
 
46
- async isBlacklisted(token: string) {
47
- const key = this.key("blacklist", token);
57
+ async isBlacklisted(userId: string) {
58
+ const key = this.key("blacklist", userId);
48
59
  const exists = await this.redis.exists(key);
49
60
  this.log("CHECK", key, exists);
50
61
  return exists === 1;
@@ -0,0 +1,76 @@
1
+ import { createAuthenik8 } from "../createAuthenik8";
2
+ import request from "supertest";
3
+ import express from "express";
4
+ import Redis from "ioredis";
5
+
6
+ describe("Refresh Token Concurrency (Integration)", () => {
7
+ let app: express.Express;
8
+ let auth: Awaited<ReturnType<typeof createAuthenik8>>; // or just `any` but this is better
9
+ let refreshToken: string;
10
+ let redisClient: Redis;
11
+
12
+ beforeAll(async () => {
13
+ // Create and verify a connected Redis client (use a separate DB for tests)
14
+ redisClient = new Redis({ host: "localhost", port: 6379, db: 1 });
15
+ await redisClient.ping(); // ensure connection is established
16
+
17
+ // Pass the connected client as `redis` (not `redisClient`)
18
+ auth = await createAuthenik8({
19
+ jwtSecret: "test-secret",
20
+ refreshSecret: "refresh-secret",
21
+ jwtExpiry: "15m",
22
+ redis: redisClient, // ✅ correct property name
23
+ });
24
+
25
+ app = express();
26
+ app.use(express.json());
27
+
28
+ // Login route – must be async and await the refresh token generation
29
+ app.post("/login", async (req, res) => {
30
+ const token = auth.signToken({ userId: "user_1", email: "test@test.com" });
31
+ refreshToken = await auth.generateRefreshToken({ userId: "user_1", email: "test@test.com" });
32
+ res.json({ token, refreshToken });
33
+ });
34
+
35
+ // Refresh route – unchanged but uses the proper error handling
36
+ app.post("/refresh", async (req, res) => {
37
+ try {
38
+ const result = await auth.refreshToken(req.body.refreshToken);
39
+ res.json(result);
40
+ } catch (err: any) {
41
+ console.error("Refresh error",err)
42
+
43
+ if(err.name === "InvalidTokenError"){
44
+ return res.status(401).json({error:err.message})
45
+ }
46
+ return res.status( 500).json({ error: err.message });
47
+ }
48
+ });
49
+ });
50
+
51
+ afterAll(async () => {
52
+ // Clean up the test database and close the client
53
+ await redisClient.flushdb();
54
+ await redisClient.quit();
55
+ });
56
+
57
+ it("should allow only one of two concurrent refresh requests", async () => {
58
+ // Login to obtain a valid refresh token
59
+ await request(app).post("/login").send({});
60
+
61
+ // Fire two concurrent refresh requests
62
+ const [res1, res2] = await Promise.all([
63
+ request(app).post("/refresh").send({ refreshToken }),
64
+ request(app).post("/refresh").send({ refreshToken }),
65
+ ]);
66
+
67
+ // Exactly one should succeed (200) and one should fail with 401
68
+ const statuses = [res1.status, res2.status].sort();
69
+ expect(statuses).toEqual([200, 401]);
70
+
71
+ // The successful response must contain new tokens
72
+ const successRes = res1.status === 200 ? res1 : res2;
73
+ expect(successRes.body).toHaveProperty("accessToken");
74
+ expect(successRes.body).toHaveProperty("refreshToken");
75
+ });
76
+ });
Binary file
@@ -21,7 +21,7 @@ describe("Authenik8 Full Integration", () => {
21
21
  }
22
22
  });
23
23
 
24
- // 🔐 LOGIN
24
+ // LOGIN
25
25
  test("should login and receive tokens", async () => {
26
26
  const res = await request.post("/login");
27
27
 
@@ -33,7 +33,7 @@ describe("Authenik8 Full Integration", () => {
33
33
  refreshToken = res.body.refreshToken;
34
34
  });
35
35
 
36
- // 🔒 PROTECTED ROUTE
36
+ // PROTECTED ROUTE
37
37
  test("should access protected route with valid token", async () => {
38
38
  const res = await request
39
39
  .get("/protected")
@@ -43,14 +43,14 @@ describe("Authenik8 Full Integration", () => {
43
43
  expect(res.body).toHaveProperty("data", "secure data");
44
44
  });
45
45
 
46
- // 🚫 NO TOKEN
46
+ // NO TOKEN
47
47
  test("should reject request without token", async () => {
48
48
  const res = await request.get("/protected");
49
49
 
50
50
  expect(res.status).toBe(401);
51
51
  });
52
52
 
53
- // 🔄 REFRESH TOKEN
53
+ // REFRESH TOKEN
54
54
  test("should refresh access token", async () => {
55
55
  const res = await request
56
56
  .post("/refresh")
@@ -70,7 +70,7 @@ describe("Authenik8 Full Integration", () => {
70
70
 
71
71
  });
72
72
 
73
- // 🔥 ROTATION (IMPORTANT)
73
+ // ROTATION (IMPORTANT)
74
74
  test("should NOT allow reuse of old refresh token", async () => {
75
75
  const originalToken = refreshToken;
76
76
 
@@ -0,0 +1,33 @@
1
+ import { randomUUID } from "crypto";
2
+
3
+ export class RedisLock {
4
+ constructor(private redis: any) {}
5
+
6
+ async acquire(key: string, ttl = 5000): Promise<string | null> {
7
+ const value = randomUUID();
8
+
9
+ const result = await this.redis.set(
10
+ key,
11
+ value,
12
+ "PX",
13
+ ttl,
14
+ "NX"
15
+ );
16
+
17
+ if (result !== "OK") return null;
18
+
19
+ return value;
20
+ }
21
+
22
+ async release(key: string, value: string): Promise<void> {
23
+ const luaScript = `
24
+ if redis.call("GET", KEYS[1]) == ARGV[1] then
25
+ return redis.call("DEL", KEYS[1])
26
+ else
27
+ return 0
28
+ end
29
+ `;
30
+
31
+ await this.redis.eval(luaScript, 1, key, value);
32
+ }
33
+ }
package/.env DELETED
@@ -1,2 +0,0 @@
1
- REDIS_HOST="127.0.0.1"
2
-
Binary file
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=creatAuthenik8.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"creatAuthenik8.d.ts","sourceRoot":"","sources":["../src/creatAuthenik8.ts"],"names":[],"mappings":""}
@@ -1,3 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- //# sourceMappingURL=creatAuthenik8.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"creatAuthenik8.js","sourceRoot":"","sources":["../src/creatAuthenik8.ts"],"names":[],"mappings":""}
package/src/1 DELETED
@@ -1,22 +0,0 @@
1
- import {Authenik8Config} from "./types/config";
2
- import {Incognito} from "./auth/guestModeService"
3
- import {requireAdmin} from "./middleware/adminService";
4
-
5
- export const createAuthenik8 =(config:Authenik8Config)=>{
6
- const jwtService =new JWTService({
7
- secret:config.jwtSecret,
8
- expiry:config.jwtExpiry,
9
- redisClient:config.redis
10
- });
11
- return{
12
- //auth
13
- signToken:jwtService.signToken.bind(jwtService),
14
- verifyToken:jwtService.verifyToken.bind(jwtService),
15
- guestToken:jwtService.guestToken.bind(jwtService)
16
-
17
- //middleware
18
- requireAdmin :requireAdmin(config),
19
- incognito:Incognito
20
-
21
- }
22
- }
File without changes