dauth-md-node 3.0.2 → 4.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +161 -134
- package/dist/chunk-RKH7YKIR.mjs +82 -0
- package/dist/chunk-RKH7YKIR.mjs.map +1 -0
- package/dist/index.d.mts +44 -2
- package/dist/index.d.ts +44 -2
- package/dist/index.js +151 -6
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +104 -20
- package/dist/index.mjs.map +1 -1
- package/dist/router.d.mts +16 -0
- package/dist/router.d.ts +16 -0
- package/dist/router.js +428 -0
- package/dist/router.js.map +1 -0
- package/dist/router.mjs +325 -0
- package/dist/router.mjs.map +1 -0
- package/package.json +36 -2
- package/src/api/dauth.api.ts +80 -0
- package/src/csrf.ts +17 -0
- package/src/index.ts +74 -7
- package/src/router.ts +428 -0
- package/src/session.ts +78 -0
package/dist/router.mjs
ADDED
|
@@ -0,0 +1,325 @@
|
|
|
1
|
+
import {
|
|
2
|
+
decryptSessionWithKeys,
|
|
3
|
+
deriveEncryptionKey,
|
|
4
|
+
encryptSession,
|
|
5
|
+
getServerBasePath
|
|
6
|
+
} from "./chunk-RKH7YKIR.mjs";
|
|
7
|
+
|
|
8
|
+
// src/router.ts
|
|
9
|
+
import { Router } from "express";
|
|
10
|
+
import jwt from "jsonwebtoken";
|
|
11
|
+
|
|
12
|
+
// src/csrf.ts
|
|
13
|
+
import crypto from "crypto";
|
|
14
|
+
function generateCsrfToken() {
|
|
15
|
+
return crypto.randomBytes(32).toString("hex");
|
|
16
|
+
}
|
|
17
|
+
function verifyCsrf(req, csrfCookieName) {
|
|
18
|
+
const headerToken = req.headers["x-csrf-token"];
|
|
19
|
+
const cookieToken = req.cookies?.[csrfCookieName];
|
|
20
|
+
if (!headerToken || !cookieToken) return false;
|
|
21
|
+
if (headerToken.length !== cookieToken.length) return false;
|
|
22
|
+
return crypto.timingSafeEqual(
|
|
23
|
+
Buffer.from(headerToken),
|
|
24
|
+
Buffer.from(cookieToken)
|
|
25
|
+
);
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
// src/router.ts
|
|
29
|
+
var refreshLocks = /* @__PURE__ */ new Map();
|
|
30
|
+
function lockKey(refreshToken) {
|
|
31
|
+
return refreshToken.substring(0, 16);
|
|
32
|
+
}
|
|
33
|
+
function clearStaleLocks() {
|
|
34
|
+
if (refreshLocks.size > 100) refreshLocks.clear();
|
|
35
|
+
}
|
|
36
|
+
async function resolveConfig(opts) {
|
|
37
|
+
const secure = opts.secure ?? process.env.NODE_ENV !== "development";
|
|
38
|
+
const cookieName = opts.cookieName ?? (secure ? "__Host-dauth-session" : "dauth-session");
|
|
39
|
+
const csrfCookieName = opts.csrfCookieName ?? (secure ? "__Host-csrf" : "csrf-token");
|
|
40
|
+
const maxAgeMs = (opts.maxAge ?? 30 * 24 * 3600) * 1e3;
|
|
41
|
+
const keys = [];
|
|
42
|
+
keys.push(await deriveEncryptionKey(opts.tsk, opts.sessionSalt));
|
|
43
|
+
if (opts.previousTsk) {
|
|
44
|
+
keys.push(await deriveEncryptionKey(opts.previousTsk, opts.sessionSalt));
|
|
45
|
+
}
|
|
46
|
+
let dauthBasePath;
|
|
47
|
+
if (opts.dauthUrl) {
|
|
48
|
+
dauthBasePath = `${opts.dauthUrl.replace(/\/+$/, "")}/api/v1`;
|
|
49
|
+
} else {
|
|
50
|
+
dauthBasePath = getServerBasePath();
|
|
51
|
+
}
|
|
52
|
+
return {
|
|
53
|
+
domainName: opts.domainName,
|
|
54
|
+
dauthBasePath,
|
|
55
|
+
cookieName,
|
|
56
|
+
csrfCookieName,
|
|
57
|
+
maxAgeMs,
|
|
58
|
+
secure,
|
|
59
|
+
encKeys: keys
|
|
60
|
+
};
|
|
61
|
+
}
|
|
62
|
+
function setSessionCookie(res, payload, config) {
|
|
63
|
+
const encrypted = encryptSession(payload, config.encKeys[0]);
|
|
64
|
+
const cookieOpts = {
|
|
65
|
+
httpOnly: true,
|
|
66
|
+
secure: config.secure,
|
|
67
|
+
sameSite: "lax",
|
|
68
|
+
maxAge: config.maxAgeMs,
|
|
69
|
+
path: "/"
|
|
70
|
+
};
|
|
71
|
+
if (!config.secure) {
|
|
72
|
+
}
|
|
73
|
+
res.cookie(config.cookieName, encrypted, cookieOpts);
|
|
74
|
+
}
|
|
75
|
+
function setCsrfCookie(res, config) {
|
|
76
|
+
const csrfToken = generateCsrfToken();
|
|
77
|
+
res.cookie(config.csrfCookieName, csrfToken, {
|
|
78
|
+
httpOnly: false,
|
|
79
|
+
secure: config.secure,
|
|
80
|
+
sameSite: "lax",
|
|
81
|
+
maxAge: config.maxAgeMs,
|
|
82
|
+
path: "/"
|
|
83
|
+
});
|
|
84
|
+
}
|
|
85
|
+
function clearCookies(res, config) {
|
|
86
|
+
const baseOpts = { path: "/", secure: config.secure };
|
|
87
|
+
res.clearCookie(config.cookieName, baseOpts);
|
|
88
|
+
res.clearCookie(config.csrfCookieName, baseOpts);
|
|
89
|
+
}
|
|
90
|
+
function readSession(req, config) {
|
|
91
|
+
const cookie = req.cookies?.[config.cookieName];
|
|
92
|
+
if (!cookie) return null;
|
|
93
|
+
return decryptSessionWithKeys(cookie, config.encKeys);
|
|
94
|
+
}
|
|
95
|
+
function isTokenExpiringSoon(token, thresholdMs = 3e5) {
|
|
96
|
+
try {
|
|
97
|
+
const decoded = jwt.decode(token);
|
|
98
|
+
if (!decoded?.exp) return true;
|
|
99
|
+
return decoded.exp * 1e3 - Date.now() < thresholdMs;
|
|
100
|
+
} catch {
|
|
101
|
+
return true;
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
async function maybeRefreshTokens(session, config, res) {
|
|
105
|
+
if (!isTokenExpiringSoon(session.accessToken)) return session;
|
|
106
|
+
const key = lockKey(session.refreshToken);
|
|
107
|
+
clearStaleLocks();
|
|
108
|
+
const existingLock = refreshLocks.get(key);
|
|
109
|
+
if (existingLock) {
|
|
110
|
+
const result2 = await existingLock;
|
|
111
|
+
return result2 ?? session;
|
|
112
|
+
}
|
|
113
|
+
const refreshPromise = (async () => {
|
|
114
|
+
try {
|
|
115
|
+
const response = await fetch(
|
|
116
|
+
`${config.dauthBasePath}/app/${config.domainName}/refresh-token`,
|
|
117
|
+
{
|
|
118
|
+
method: "POST",
|
|
119
|
+
headers: { "Content-Type": "application/json" },
|
|
120
|
+
body: JSON.stringify({
|
|
121
|
+
refreshToken: session.refreshToken
|
|
122
|
+
})
|
|
123
|
+
}
|
|
124
|
+
);
|
|
125
|
+
if (!response.ok) return null;
|
|
126
|
+
const data = await response.json();
|
|
127
|
+
if (!data.accessToken || !data.refreshToken) return null;
|
|
128
|
+
const newSession = {
|
|
129
|
+
accessToken: data.accessToken,
|
|
130
|
+
refreshToken: data.refreshToken
|
|
131
|
+
};
|
|
132
|
+
setSessionCookie(res, newSession, config);
|
|
133
|
+
return newSession;
|
|
134
|
+
} catch {
|
|
135
|
+
return null;
|
|
136
|
+
}
|
|
137
|
+
})();
|
|
138
|
+
refreshLocks.set(key, refreshPromise);
|
|
139
|
+
const timeout = setTimeout(() => refreshLocks.delete(key), 1e4);
|
|
140
|
+
refreshPromise.finally(() => {
|
|
141
|
+
clearTimeout(timeout);
|
|
142
|
+
refreshLocks.delete(key);
|
|
143
|
+
});
|
|
144
|
+
const result = await refreshPromise;
|
|
145
|
+
return result ?? session;
|
|
146
|
+
}
|
|
147
|
+
function dauthRouter(opts) {
|
|
148
|
+
const router = Router();
|
|
149
|
+
let configPromise = null;
|
|
150
|
+
async function getConfig() {
|
|
151
|
+
if (!configPromise) configPromise = resolveConfig(opts);
|
|
152
|
+
return configPromise;
|
|
153
|
+
}
|
|
154
|
+
router.post("/exchange-code", async (req, res) => {
|
|
155
|
+
const config = await getConfig();
|
|
156
|
+
const { code } = req.body;
|
|
157
|
+
if (!code) {
|
|
158
|
+
return res.status(400).send({ status: "code-required", message: "Code required" });
|
|
159
|
+
}
|
|
160
|
+
const response = await fetch(
|
|
161
|
+
`${config.dauthBasePath}/app/${config.domainName}/exchange-code`,
|
|
162
|
+
{
|
|
163
|
+
method: "POST",
|
|
164
|
+
headers: { "Content-Type": "application/json" },
|
|
165
|
+
body: JSON.stringify({ code })
|
|
166
|
+
}
|
|
167
|
+
);
|
|
168
|
+
if (!response.ok) {
|
|
169
|
+
return res.status(response.status).send({ status: "code-invalid", message: "Code invalid" });
|
|
170
|
+
}
|
|
171
|
+
const data = await response.json();
|
|
172
|
+
setSessionCookie(
|
|
173
|
+
res,
|
|
174
|
+
{
|
|
175
|
+
accessToken: data.accessToken,
|
|
176
|
+
refreshToken: data.refreshToken
|
|
177
|
+
},
|
|
178
|
+
config
|
|
179
|
+
);
|
|
180
|
+
setCsrfCookie(res, config);
|
|
181
|
+
const userResponse = await fetch(
|
|
182
|
+
`${config.dauthBasePath}/app/${config.domainName}/user`,
|
|
183
|
+
{
|
|
184
|
+
method: "GET",
|
|
185
|
+
headers: { Authorization: data.accessToken }
|
|
186
|
+
}
|
|
187
|
+
);
|
|
188
|
+
const userData = await userResponse.json();
|
|
189
|
+
return res.status(200).send({
|
|
190
|
+
user: userData.user,
|
|
191
|
+
domain: userData.domain,
|
|
192
|
+
isNewUser: data.isNewUser
|
|
193
|
+
});
|
|
194
|
+
});
|
|
195
|
+
router.get("/session", async (req, res) => {
|
|
196
|
+
const config = await getConfig();
|
|
197
|
+
const session = readSession(req, config);
|
|
198
|
+
if (!session) {
|
|
199
|
+
return res.status(401).send({ status: "no-session", message: "Not authenticated" });
|
|
200
|
+
}
|
|
201
|
+
const refreshed = await maybeRefreshTokens(session, config, res);
|
|
202
|
+
const userResponse = await fetch(
|
|
203
|
+
`${config.dauthBasePath}/app/${config.domainName}/user`,
|
|
204
|
+
{
|
|
205
|
+
method: "GET",
|
|
206
|
+
headers: { Authorization: refreshed.accessToken }
|
|
207
|
+
}
|
|
208
|
+
);
|
|
209
|
+
if (!userResponse.ok) {
|
|
210
|
+
clearCookies(res, config);
|
|
211
|
+
return res.status(401).send({ status: "session-invalid", message: "Session expired" });
|
|
212
|
+
}
|
|
213
|
+
const userData = await userResponse.json();
|
|
214
|
+
return res.status(200).send({
|
|
215
|
+
user: userData.user,
|
|
216
|
+
domain: userData.domain
|
|
217
|
+
});
|
|
218
|
+
});
|
|
219
|
+
router.post("/logout", async (req, res) => {
|
|
220
|
+
const config = await getConfig();
|
|
221
|
+
if (!verifyCsrf(req, config.csrfCookieName)) {
|
|
222
|
+
return res.status(403).send({ status: "csrf-invalid", message: "CSRF token invalid" });
|
|
223
|
+
}
|
|
224
|
+
const session = readSession(req, config);
|
|
225
|
+
if (session) {
|
|
226
|
+
fetch(`${config.dauthBasePath}/app/${config.domainName}/logout`, {
|
|
227
|
+
method: "POST",
|
|
228
|
+
headers: { "Content-Type": "application/json" },
|
|
229
|
+
body: JSON.stringify({
|
|
230
|
+
refreshToken: session.refreshToken
|
|
231
|
+
})
|
|
232
|
+
}).catch(() => {
|
|
233
|
+
});
|
|
234
|
+
}
|
|
235
|
+
clearCookies(res, config);
|
|
236
|
+
return res.status(200).send({ status: "success", message: "Logged out" });
|
|
237
|
+
});
|
|
238
|
+
router.patch("/user", async (req, res) => {
|
|
239
|
+
const config = await getConfig();
|
|
240
|
+
if (!verifyCsrf(req, config.csrfCookieName)) {
|
|
241
|
+
return res.status(403).send({ status: "csrf-invalid", message: "CSRF token invalid" });
|
|
242
|
+
}
|
|
243
|
+
const session = readSession(req, config);
|
|
244
|
+
if (!session) {
|
|
245
|
+
return res.status(401).send({ status: "no-session", message: "Not authenticated" });
|
|
246
|
+
}
|
|
247
|
+
const refreshed = await maybeRefreshTokens(session, config, res);
|
|
248
|
+
const response = await fetch(
|
|
249
|
+
`${config.dauthBasePath}/app/${config.domainName}/user`,
|
|
250
|
+
{
|
|
251
|
+
method: "PATCH",
|
|
252
|
+
headers: {
|
|
253
|
+
"Content-Type": "application/json",
|
|
254
|
+
Authorization: refreshed.accessToken
|
|
255
|
+
},
|
|
256
|
+
body: JSON.stringify(req.body)
|
|
257
|
+
}
|
|
258
|
+
);
|
|
259
|
+
const data = await response.json();
|
|
260
|
+
return res.status(response.status).send(data);
|
|
261
|
+
});
|
|
262
|
+
router.delete("/user", async (req, res) => {
|
|
263
|
+
const config = await getConfig();
|
|
264
|
+
if (!verifyCsrf(req, config.csrfCookieName)) {
|
|
265
|
+
return res.status(403).send({ status: "csrf-invalid", message: "CSRF token invalid" });
|
|
266
|
+
}
|
|
267
|
+
const session = readSession(req, config);
|
|
268
|
+
if (!session) {
|
|
269
|
+
return res.status(401).send({ status: "no-session", message: "Not authenticated" });
|
|
270
|
+
}
|
|
271
|
+
const response = await fetch(
|
|
272
|
+
`${config.dauthBasePath}/app/${config.domainName}/user`,
|
|
273
|
+
{
|
|
274
|
+
method: "DELETE",
|
|
275
|
+
headers: { Authorization: session.accessToken }
|
|
276
|
+
}
|
|
277
|
+
);
|
|
278
|
+
const data = await response.json();
|
|
279
|
+
clearCookies(res, config);
|
|
280
|
+
return res.status(response.status).send(data);
|
|
281
|
+
});
|
|
282
|
+
router.get("/profile-redirect", async (req, res) => {
|
|
283
|
+
const config = await getConfig();
|
|
284
|
+
if (!verifyCsrf(req, config.csrfCookieName)) {
|
|
285
|
+
return res.status(403).send({
|
|
286
|
+
status: "csrf-invalid",
|
|
287
|
+
message: "CSRF token invalid"
|
|
288
|
+
});
|
|
289
|
+
}
|
|
290
|
+
const session = readSession(req, config);
|
|
291
|
+
if (!session) {
|
|
292
|
+
return res.status(401).send({
|
|
293
|
+
status: "no-session",
|
|
294
|
+
message: "Not authenticated"
|
|
295
|
+
});
|
|
296
|
+
}
|
|
297
|
+
const refreshed = await maybeRefreshTokens(session, config, res);
|
|
298
|
+
const response = await fetch(
|
|
299
|
+
`${config.dauthBasePath}/app/${config.domainName}/profile-code`,
|
|
300
|
+
{
|
|
301
|
+
method: "POST",
|
|
302
|
+
headers: {
|
|
303
|
+
"Content-Type": "application/json",
|
|
304
|
+
Authorization: refreshed.accessToken
|
|
305
|
+
}
|
|
306
|
+
}
|
|
307
|
+
);
|
|
308
|
+
if (!response.ok) {
|
|
309
|
+
return res.status(response.status).send({
|
|
310
|
+
status: "profile-code-error",
|
|
311
|
+
message: "Could not generate profile code"
|
|
312
|
+
});
|
|
313
|
+
}
|
|
314
|
+
const data = await response.json();
|
|
315
|
+
const dauthFrontendUrl = opts.dauthUrl ? opts.dauthUrl.replace(/\/+$/, "") : process.env.DAUTH_URL ? process.env.DAUTH_URL.replace(/\/+$/, "") : process.env.NODE_ENV === "development" ? "http://localhost:5185" : "https://dauth.ovh";
|
|
316
|
+
return res.status(200).send({
|
|
317
|
+
redirectUrl: `${dauthFrontendUrl}/${config.domainName}/update-user?code=${data.code}`
|
|
318
|
+
});
|
|
319
|
+
});
|
|
320
|
+
return router;
|
|
321
|
+
}
|
|
322
|
+
export {
|
|
323
|
+
dauthRouter
|
|
324
|
+
};
|
|
325
|
+
//# sourceMappingURL=router.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/router.ts","../src/csrf.ts"],"sourcesContent":["import { Router, Request, Response } from 'express';\nimport jwt from 'jsonwebtoken';\nimport { getServerBasePath } from './api/utils/config';\nimport {\n deriveEncryptionKey,\n encryptSession,\n decryptSessionWithKeys,\n SessionPayload,\n} from './session';\nimport { generateCsrfToken, verifyCsrf } from './csrf';\n\nexport interface DauthRouterOptions {\n domainName: string;\n tsk: string;\n dauthUrl?: string;\n cookieName?: string;\n csrfCookieName?: string;\n maxAge?: number;\n secure?: boolean;\n previousTsk?: string;\n sessionSalt?: string;\n}\n\ninterface ResolvedConfig {\n domainName: string;\n dauthBasePath: string;\n cookieName: string;\n csrfCookieName: string;\n maxAgeMs: number;\n secure: boolean;\n encKeys: Buffer[];\n}\n\n// Refresh lock to prevent race conditions on concurrent token rotation\nconst refreshLocks = new Map<string, Promise<SessionPayload | null>>();\n\nfunction lockKey(refreshToken: string): string {\n return refreshToken.substring(0, 16);\n}\n\nfunction clearStaleLocks(): void {\n if (refreshLocks.size > 100) refreshLocks.clear();\n}\n\nasync function resolveConfig(\n opts: DauthRouterOptions\n): Promise<ResolvedConfig> {\n const secure = opts.secure ?? process.env.NODE_ENV !== 'development';\n const cookieName =\n opts.cookieName ?? (secure ? '__Host-dauth-session' : 'dauth-session');\n const csrfCookieName =\n opts.csrfCookieName ?? (secure ? '__Host-csrf' : 'csrf-token');\n const maxAgeMs = (opts.maxAge ?? 30 * 24 * 3600) * 1000;\n\n const keys: Buffer[] = [];\n keys.push(await deriveEncryptionKey(opts.tsk, opts.sessionSalt));\n if (opts.previousTsk) {\n keys.push(await deriveEncryptionKey(opts.previousTsk, opts.sessionSalt));\n }\n\n let dauthBasePath: string;\n if (opts.dauthUrl) {\n dauthBasePath = `${opts.dauthUrl.replace(/\\/+$/, '')}/api/v1`;\n } else {\n dauthBasePath = getServerBasePath();\n }\n\n return {\n domainName: opts.domainName,\n dauthBasePath,\n cookieName,\n csrfCookieName,\n maxAgeMs,\n secure,\n encKeys: keys,\n };\n}\n\nfunction setSessionCookie(\n res: Response,\n payload: SessionPayload,\n config: ResolvedConfig\n): void {\n const encrypted = encryptSession(payload, config.encKeys[0]);\n const cookieOpts: Record<string, unknown> = {\n httpOnly: true,\n secure: config.secure,\n sameSite: 'lax',\n maxAge: config.maxAgeMs,\n path: '/',\n };\n // __Host- prefix requires no domain attribute\n if (!config.secure) {\n // Dev mode: no __Host- prefix, no domain restriction needed\n }\n res.cookie(config.cookieName, encrypted, cookieOpts);\n}\n\nfunction setCsrfCookie(res: Response, config: ResolvedConfig): void {\n const csrfToken = generateCsrfToken();\n res.cookie(config.csrfCookieName, csrfToken, {\n httpOnly: false,\n secure: config.secure,\n sameSite: 'lax',\n maxAge: config.maxAgeMs,\n path: '/',\n });\n}\n\nfunction clearCookies(res: Response, config: ResolvedConfig): void {\n const baseOpts = { path: '/', secure: config.secure };\n res.clearCookie(config.cookieName, baseOpts);\n res.clearCookie(config.csrfCookieName, baseOpts);\n}\n\nfunction readSession(\n req: Request,\n config: ResolvedConfig\n): SessionPayload | null {\n const cookie = req.cookies?.[config.cookieName];\n if (!cookie) return null;\n return decryptSessionWithKeys(cookie, config.encKeys);\n}\n\nfunction isTokenExpiringSoon(token: string, thresholdMs = 300_000): boolean {\n try {\n const decoded = jwt.decode(token) as { exp?: number } | null;\n if (!decoded?.exp) return true;\n return decoded.exp * 1000 - Date.now() < thresholdMs;\n } catch {\n return true;\n }\n}\n\nasync function maybeRefreshTokens(\n session: SessionPayload,\n config: ResolvedConfig,\n res: Response\n): Promise<SessionPayload> {\n if (!isTokenExpiringSoon(session.accessToken)) return session;\n\n const key = lockKey(session.refreshToken);\n clearStaleLocks();\n\n const existingLock = refreshLocks.get(key);\n if (existingLock) {\n const result = await existingLock;\n return result ?? session;\n }\n\n const refreshPromise = (async (): Promise<SessionPayload | null> => {\n try {\n const response = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/refresh-token`,\n {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n refreshToken: session.refreshToken,\n }),\n }\n );\n if (!response.ok) return null;\n const data = (await response.json()) as {\n accessToken?: string;\n refreshToken?: string;\n };\n if (!data.accessToken || !data.refreshToken) return null;\n const newSession: SessionPayload = {\n accessToken: data.accessToken,\n refreshToken: data.refreshToken,\n };\n setSessionCookie(res, newSession, config);\n return newSession;\n } catch {\n return null;\n }\n })();\n\n refreshLocks.set(key, refreshPromise);\n\n // Timeout safety net: clean lock after 10s\n const timeout = setTimeout(() => refreshLocks.delete(key), 10_000);\n refreshPromise.finally(() => {\n clearTimeout(timeout);\n refreshLocks.delete(key);\n });\n\n const result = await refreshPromise;\n return result ?? session;\n}\n\nexport function dauthRouter(opts: DauthRouterOptions): Router {\n const router = Router();\n let configPromise: Promise<ResolvedConfig> | null = null;\n\n async function getConfig(): Promise<ResolvedConfig> {\n if (!configPromise) configPromise = resolveConfig(opts);\n return configPromise;\n }\n\n // POST /exchange-code — no CSRF (no prior session)\n router.post('/exchange-code', async (req: Request, res: Response) => {\n const config = await getConfig();\n const { code } = req.body;\n if (!code) {\n return res\n .status(400)\n .send({ status: 'code-required', message: 'Code required' });\n }\n\n const response = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/exchange-code`,\n {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({ code }),\n }\n );\n if (!response.ok) {\n return res\n .status(response.status)\n .send({ status: 'code-invalid', message: 'Code invalid' });\n }\n const data = (await response.json()) as {\n accessToken: string;\n refreshToken: string;\n isNewUser: boolean;\n };\n\n setSessionCookie(\n res,\n {\n accessToken: data.accessToken,\n refreshToken: data.refreshToken,\n },\n config\n );\n setCsrfCookie(res, config);\n\n // Fetch user data to return\n const userResponse = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/user`,\n {\n method: 'GET',\n headers: { Authorization: data.accessToken },\n }\n );\n const userData = (await userResponse.json()) as {\n user?: unknown;\n domain?: unknown;\n };\n\n return res.status(200).send({\n user: userData.user,\n domain: userData.domain,\n isNewUser: data.isNewUser,\n });\n });\n\n // GET /session — no CSRF (read-only)\n router.get('/session', async (req: Request, res: Response) => {\n const config = await getConfig();\n const session = readSession(req, config);\n if (!session) {\n return res\n .status(401)\n .send({ status: 'no-session', message: 'Not authenticated' });\n }\n\n const refreshed = await maybeRefreshTokens(session, config, res);\n\n const userResponse = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/user`,\n {\n method: 'GET',\n headers: { Authorization: refreshed.accessToken },\n }\n );\n if (!userResponse.ok) {\n clearCookies(res, config);\n return res\n .status(401)\n .send({ status: 'session-invalid', message: 'Session expired' });\n }\n const userData = (await userResponse.json()) as {\n user?: unknown;\n domain?: unknown;\n };\n return res.status(200).send({\n user: userData.user,\n domain: userData.domain,\n });\n });\n\n // POST /logout — CSRF required\n router.post('/logout', async (req: Request, res: Response) => {\n const config = await getConfig();\n if (!verifyCsrf(req, config.csrfCookieName)) {\n return res\n .status(403)\n .send({ status: 'csrf-invalid', message: 'CSRF token invalid' });\n }\n const session = readSession(req, config);\n if (session) {\n // Revoke refresh token server-to-server (fire-and-forget)\n fetch(`${config.dauthBasePath}/app/${config.domainName}/logout`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n refreshToken: session.refreshToken,\n }),\n }).catch(() => {});\n }\n clearCookies(res, config);\n return res.status(200).send({ status: 'success', message: 'Logged out' });\n });\n\n // PATCH /user — CSRF required\n router.patch('/user', async (req: Request, res: Response) => {\n const config = await getConfig();\n if (!verifyCsrf(req, config.csrfCookieName)) {\n return res\n .status(403)\n .send({ status: 'csrf-invalid', message: 'CSRF token invalid' });\n }\n const session = readSession(req, config);\n if (!session) {\n return res\n .status(401)\n .send({ status: 'no-session', message: 'Not authenticated' });\n }\n const refreshed = await maybeRefreshTokens(session, config, res);\n\n const response = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/user`,\n {\n method: 'PATCH',\n headers: {\n 'Content-Type': 'application/json',\n Authorization: refreshed.accessToken,\n },\n body: JSON.stringify(req.body),\n }\n );\n const data = await response.json();\n return res.status(response.status).send(data);\n });\n\n // DELETE /user — CSRF required\n router.delete('/user', async (req: Request, res: Response) => {\n const config = await getConfig();\n if (!verifyCsrf(req, config.csrfCookieName)) {\n return res\n .status(403)\n .send({ status: 'csrf-invalid', message: 'CSRF token invalid' });\n }\n const session = readSession(req, config);\n if (!session) {\n return res\n .status(401)\n .send({ status: 'no-session', message: 'Not authenticated' });\n }\n\n const response = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/user`,\n {\n method: 'DELETE',\n headers: { Authorization: session.accessToken },\n }\n );\n const data = await response.json();\n clearCookies(res, config);\n return res.status(response.status).send(data);\n });\n\n // GET /profile-redirect — CSRF required (generates profile code)\n router.get('/profile-redirect', async (req: Request, res: Response) => {\n const config = await getConfig();\n if (!verifyCsrf(req, config.csrfCookieName)) {\n return res.status(403).send({\n status: 'csrf-invalid',\n message: 'CSRF token invalid',\n });\n }\n const session = readSession(req, config);\n if (!session) {\n return res.status(401).send({\n status: 'no-session',\n message: 'Not authenticated',\n });\n }\n const refreshed = await maybeRefreshTokens(session, config, res);\n\n const response = await fetch(\n `${config.dauthBasePath}/app/${config.domainName}/profile-code`,\n {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n Authorization: refreshed.accessToken,\n },\n }\n );\n if (!response.ok) {\n return res.status(response.status).send({\n status: 'profile-code-error',\n message: 'Could not generate profile code',\n });\n }\n const data = (await response.json()) as { code: string };\n\n // Build redirect URL to dauth frontend\n const dauthFrontendUrl = opts.dauthUrl\n ? opts.dauthUrl.replace(/\\/+$/, '')\n : process.env.DAUTH_URL\n ? process.env.DAUTH_URL.replace(/\\/+$/, '')\n : process.env.NODE_ENV === 'development'\n ? 'http://localhost:5185'\n : 'https://dauth.ovh';\n\n return res.status(200).send({\n redirectUrl: `${dauthFrontendUrl}/${config.domainName}/update-user?code=${data.code}`,\n });\n });\n\n return router;\n}\n","import crypto from 'crypto';\nimport type { Request } from 'express';\n\nexport function generateCsrfToken(): string {\n return crypto.randomBytes(32).toString('hex');\n}\n\nexport function verifyCsrf(req: Request, csrfCookieName: string): boolean {\n const headerToken = req.headers['x-csrf-token'] as string | undefined;\n const cookieToken = req.cookies?.[csrfCookieName] as string | undefined;\n if (!headerToken || !cookieToken) return false;\n if (headerToken.length !== cookieToken.length) return false;\n return crypto.timingSafeEqual(\n Buffer.from(headerToken),\n Buffer.from(cookieToken)\n );\n}\n"],"mappings":";;;;;;;;AAAA,SAAS,cAAiC;AAC1C,OAAO,SAAS;;;ACDhB,OAAO,YAAY;AAGZ,SAAS,oBAA4B;AAC1C,SAAO,OAAO,YAAY,EAAE,EAAE,SAAS,KAAK;AAC9C;AAEO,SAAS,WAAW,KAAc,gBAAiC;AACxE,QAAM,cAAc,IAAI,QAAQ,cAAc;AAC9C,QAAM,cAAc,IAAI,UAAU,cAAc;AAChD,MAAI,CAAC,eAAe,CAAC,YAAa,QAAO;AACzC,MAAI,YAAY,WAAW,YAAY,OAAQ,QAAO;AACtD,SAAO,OAAO;AAAA,IACZ,OAAO,KAAK,WAAW;AAAA,IACvB,OAAO,KAAK,WAAW;AAAA,EACzB;AACF;;;ADkBA,IAAM,eAAe,oBAAI,IAA4C;AAErE,SAAS,QAAQ,cAA8B;AAC7C,SAAO,aAAa,UAAU,GAAG,EAAE;AACrC;AAEA,SAAS,kBAAwB;AAC/B,MAAI,aAAa,OAAO,IAAK,cAAa,MAAM;AAClD;AAEA,eAAe,cACb,MACyB;AACzB,QAAM,SAAS,KAAK,UAAU,QAAQ,IAAI,aAAa;AACvD,QAAM,aACJ,KAAK,eAAe,SAAS,yBAAyB;AACxD,QAAM,iBACJ,KAAK,mBAAmB,SAAS,gBAAgB;AACnD,QAAM,YAAY,KAAK,UAAU,KAAK,KAAK,QAAQ;AAEnD,QAAM,OAAiB,CAAC;AACxB,OAAK,KAAK,MAAM,oBAAoB,KAAK,KAAK,KAAK,WAAW,CAAC;AAC/D,MAAI,KAAK,aAAa;AACpB,SAAK,KAAK,MAAM,oBAAoB,KAAK,aAAa,KAAK,WAAW,CAAC;AAAA,EACzE;AAEA,MAAI;AACJ,MAAI,KAAK,UAAU;AACjB,oBAAgB,GAAG,KAAK,SAAS,QAAQ,QAAQ,EAAE,CAAC;AAAA,EACtD,OAAO;AACL,oBAAgB,kBAAkB;AAAA,EACpC;AAEA,SAAO;AAAA,IACL,YAAY,KAAK;AAAA,IACjB;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,SAAS;AAAA,EACX;AACF;AAEA,SAAS,iBACP,KACA,SACA,QACM;AACN,QAAM,YAAY,eAAe,SAAS,OAAO,QAAQ,CAAC,CAAC;AAC3D,QAAM,aAAsC;AAAA,IAC1C,UAAU;AAAA,IACV,QAAQ,OAAO;AAAA,IACf,UAAU;AAAA,IACV,QAAQ,OAAO;AAAA,IACf,MAAM;AAAA,EACR;AAEA,MAAI,CAAC,OAAO,QAAQ;AAAA,EAEpB;AACA,MAAI,OAAO,OAAO,YAAY,WAAW,UAAU;AACrD;AAEA,SAAS,cAAc,KAAe,QAA8B;AAClE,QAAM,YAAY,kBAAkB;AACpC,MAAI,OAAO,OAAO,gBAAgB,WAAW;AAAA,IAC3C,UAAU;AAAA,IACV,QAAQ,OAAO;AAAA,IACf,UAAU;AAAA,IACV,QAAQ,OAAO;AAAA,IACf,MAAM;AAAA,EACR,CAAC;AACH;AAEA,SAAS,aAAa,KAAe,QAA8B;AACjE,QAAM,WAAW,EAAE,MAAM,KAAK,QAAQ,OAAO,OAAO;AACpD,MAAI,YAAY,OAAO,YAAY,QAAQ;AAC3C,MAAI,YAAY,OAAO,gBAAgB,QAAQ;AACjD;AAEA,SAAS,YACP,KACA,QACuB;AACvB,QAAM,SAAS,IAAI,UAAU,OAAO,UAAU;AAC9C,MAAI,CAAC,OAAQ,QAAO;AACpB,SAAO,uBAAuB,QAAQ,OAAO,OAAO;AACtD;AAEA,SAAS,oBAAoB,OAAe,cAAc,KAAkB;AAC1E,MAAI;AACF,UAAM,UAAU,IAAI,OAAO,KAAK;AAChC,QAAI,CAAC,SAAS,IAAK,QAAO;AAC1B,WAAO,QAAQ,MAAM,MAAO,KAAK,IAAI,IAAI;AAAA,EAC3C,QAAQ;AACN,WAAO;AAAA,EACT;AACF;AAEA,eAAe,mBACb,SACA,QACA,KACyB;AACzB,MAAI,CAAC,oBAAoB,QAAQ,WAAW,EAAG,QAAO;AAEtD,QAAM,MAAM,QAAQ,QAAQ,YAAY;AACxC,kBAAgB;AAEhB,QAAM,eAAe,aAAa,IAAI,GAAG;AACzC,MAAI,cAAc;AAChB,UAAMA,UAAS,MAAM;AACrB,WAAOA,WAAU;AAAA,EACnB;AAEA,QAAM,kBAAkB,YAA4C;AAClE,QAAI;AACF,YAAM,WAAW,MAAM;AAAA,QACrB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,QAChD;AAAA,UACE,QAAQ;AAAA,UACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU;AAAA,YACnB,cAAc,QAAQ;AAAA,UACxB,CAAC;AAAA,QACH;AAAA,MACF;AACA,UAAI,CAAC,SAAS,GAAI,QAAO;AACzB,YAAM,OAAQ,MAAM,SAAS,KAAK;AAIlC,UAAI,CAAC,KAAK,eAAe,CAAC,KAAK,aAAc,QAAO;AACpD,YAAM,aAA6B;AAAA,QACjC,aAAa,KAAK;AAAA,QAClB,cAAc,KAAK;AAAA,MACrB;AACA,uBAAiB,KAAK,YAAY,MAAM;AACxC,aAAO;AAAA,IACT,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF,GAAG;AAEH,eAAa,IAAI,KAAK,cAAc;AAGpC,QAAM,UAAU,WAAW,MAAM,aAAa,OAAO,GAAG,GAAG,GAAM;AACjE,iBAAe,QAAQ,MAAM;AAC3B,iBAAa,OAAO;AACpB,iBAAa,OAAO,GAAG;AAAA,EACzB,CAAC;AAED,QAAM,SAAS,MAAM;AACrB,SAAO,UAAU;AACnB;AAEO,SAAS,YAAY,MAAkC;AAC5D,QAAM,SAAS,OAAO;AACtB,MAAI,gBAAgD;AAEpD,iBAAe,YAAqC;AAClD,QAAI,CAAC,cAAe,iBAAgB,cAAc,IAAI;AACtD,WAAO;AAAA,EACT;AAGA,SAAO,KAAK,kBAAkB,OAAO,KAAc,QAAkB;AACnE,UAAM,SAAS,MAAM,UAAU;AAC/B,UAAM,EAAE,KAAK,IAAI,IAAI;AACrB,QAAI,CAAC,MAAM;AACT,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,iBAAiB,SAAS,gBAAgB,CAAC;AAAA,IAC/D;AAEA,UAAM,WAAW,MAAM;AAAA,MACrB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,KAAK,UAAU,EAAE,KAAK,CAAC;AAAA,MAC/B;AAAA,IACF;AACA,QAAI,CAAC,SAAS,IAAI;AAChB,aAAO,IACJ,OAAO,SAAS,MAAM,EACtB,KAAK,EAAE,QAAQ,gBAAgB,SAAS,eAAe,CAAC;AAAA,IAC7D;AACA,UAAM,OAAQ,MAAM,SAAS,KAAK;AAMlC;AAAA,MACE;AAAA,MACA;AAAA,QACE,aAAa,KAAK;AAAA,QAClB,cAAc,KAAK;AAAA,MACrB;AAAA,MACA;AAAA,IACF;AACA,kBAAc,KAAK,MAAM;AAGzB,UAAM,eAAe,MAAM;AAAA,MACzB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS,EAAE,eAAe,KAAK,YAAY;AAAA,MAC7C;AAAA,IACF;AACA,UAAM,WAAY,MAAM,aAAa,KAAK;AAK1C,WAAO,IAAI,OAAO,GAAG,EAAE,KAAK;AAAA,MAC1B,MAAM,SAAS;AAAA,MACf,QAAQ,SAAS;AAAA,MACjB,WAAW,KAAK;AAAA,IAClB,CAAC;AAAA,EACH,CAAC;AAGD,SAAO,IAAI,YAAY,OAAO,KAAc,QAAkB;AAC5D,UAAM,SAAS,MAAM,UAAU;AAC/B,UAAM,UAAU,YAAY,KAAK,MAAM;AACvC,QAAI,CAAC,SAAS;AACZ,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,cAAc,SAAS,oBAAoB,CAAC;AAAA,IAChE;AAEA,UAAM,YAAY,MAAM,mBAAmB,SAAS,QAAQ,GAAG;AAE/D,UAAM,eAAe,MAAM;AAAA,MACzB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS,EAAE,eAAe,UAAU,YAAY;AAAA,MAClD;AAAA,IACF;AACA,QAAI,CAAC,aAAa,IAAI;AACpB,mBAAa,KAAK,MAAM;AACxB,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,mBAAmB,SAAS,kBAAkB,CAAC;AAAA,IACnE;AACA,UAAM,WAAY,MAAM,aAAa,KAAK;AAI1C,WAAO,IAAI,OAAO,GAAG,EAAE,KAAK;AAAA,MAC1B,MAAM,SAAS;AAAA,MACf,QAAQ,SAAS;AAAA,IACnB,CAAC;AAAA,EACH,CAAC;AAGD,SAAO,KAAK,WAAW,OAAO,KAAc,QAAkB;AAC5D,UAAM,SAAS,MAAM,UAAU;AAC/B,QAAI,CAAC,WAAW,KAAK,OAAO,cAAc,GAAG;AAC3C,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,gBAAgB,SAAS,qBAAqB,CAAC;AAAA,IACnE;AACA,UAAM,UAAU,YAAY,KAAK,MAAM;AACvC,QAAI,SAAS;AAEX,YAAM,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU,WAAW;AAAA,QAC/D,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,KAAK,UAAU;AAAA,UACnB,cAAc,QAAQ;AAAA,QACxB,CAAC;AAAA,MACH,CAAC,EAAE,MAAM,MAAM;AAAA,MAAC,CAAC;AAAA,IACnB;AACA,iBAAa,KAAK,MAAM;AACxB,WAAO,IAAI,OAAO,GAAG,EAAE,KAAK,EAAE,QAAQ,WAAW,SAAS,aAAa,CAAC;AAAA,EAC1E,CAAC;AAGD,SAAO,MAAM,SAAS,OAAO,KAAc,QAAkB;AAC3D,UAAM,SAAS,MAAM,UAAU;AAC/B,QAAI,CAAC,WAAW,KAAK,OAAO,cAAc,GAAG;AAC3C,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,gBAAgB,SAAS,qBAAqB,CAAC;AAAA,IACnE;AACA,UAAM,UAAU,YAAY,KAAK,MAAM;AACvC,QAAI,CAAC,SAAS;AACZ,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,cAAc,SAAS,oBAAoB,CAAC;AAAA,IAChE;AACA,UAAM,YAAY,MAAM,mBAAmB,SAAS,QAAQ,GAAG;AAE/D,UAAM,WAAW,MAAM;AAAA,MACrB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,eAAe,UAAU;AAAA,QAC3B;AAAA,QACA,MAAM,KAAK,UAAU,IAAI,IAAI;AAAA,MAC/B;AAAA,IACF;AACA,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,WAAO,IAAI,OAAO,SAAS,MAAM,EAAE,KAAK,IAAI;AAAA,EAC9C,CAAC;AAGD,SAAO,OAAO,SAAS,OAAO,KAAc,QAAkB;AAC5D,UAAM,SAAS,MAAM,UAAU;AAC/B,QAAI,CAAC,WAAW,KAAK,OAAO,cAAc,GAAG;AAC3C,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,gBAAgB,SAAS,qBAAqB,CAAC;AAAA,IACnE;AACA,UAAM,UAAU,YAAY,KAAK,MAAM;AACvC,QAAI,CAAC,SAAS;AACZ,aAAO,IACJ,OAAO,GAAG,EACV,KAAK,EAAE,QAAQ,cAAc,SAAS,oBAAoB,CAAC;AAAA,IAChE;AAEA,UAAM,WAAW,MAAM;AAAA,MACrB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS,EAAE,eAAe,QAAQ,YAAY;AAAA,MAChD;AAAA,IACF;AACA,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,iBAAa,KAAK,MAAM;AACxB,WAAO,IAAI,OAAO,SAAS,MAAM,EAAE,KAAK,IAAI;AAAA,EAC9C,CAAC;AAGD,SAAO,IAAI,qBAAqB,OAAO,KAAc,QAAkB;AACrE,UAAM,SAAS,MAAM,UAAU;AAC/B,QAAI,CAAC,WAAW,KAAK,OAAO,cAAc,GAAG;AAC3C,aAAO,IAAI,OAAO,GAAG,EAAE,KAAK;AAAA,QAC1B,QAAQ;AAAA,QACR,SAAS;AAAA,MACX,CAAC;AAAA,IACH;AACA,UAAM,UAAU,YAAY,KAAK,MAAM;AACvC,QAAI,CAAC,SAAS;AACZ,aAAO,IAAI,OAAO,GAAG,EAAE,KAAK;AAAA,QAC1B,QAAQ;AAAA,QACR,SAAS;AAAA,MACX,CAAC;AAAA,IACH;AACA,UAAM,YAAY,MAAM,mBAAmB,SAAS,QAAQ,GAAG;AAE/D,UAAM,WAAW,MAAM;AAAA,MACrB,GAAG,OAAO,aAAa,QAAQ,OAAO,UAAU;AAAA,MAChD;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,eAAe,UAAU;AAAA,QAC3B;AAAA,MACF;AAAA,IACF;AACA,QAAI,CAAC,SAAS,IAAI;AAChB,aAAO,IAAI,OAAO,SAAS,MAAM,EAAE,KAAK;AAAA,QACtC,QAAQ;AAAA,QACR,SAAS;AAAA,MACX,CAAC;AAAA,IACH;AACA,UAAM,OAAQ,MAAM,SAAS,KAAK;AAGlC,UAAM,mBAAmB,KAAK,WAC1B,KAAK,SAAS,QAAQ,QAAQ,EAAE,IAChC,QAAQ,IAAI,YACV,QAAQ,IAAI,UAAU,QAAQ,QAAQ,EAAE,IACxC,QAAQ,IAAI,aAAa,gBACvB,0BACA;AAER,WAAO,IAAI,OAAO,GAAG,EAAE,KAAK;AAAA,MAC1B,aAAa,GAAG,gBAAgB,IAAI,OAAO,UAAU,qBAAqB,KAAK,IAAI;AAAA,IACrF,CAAC;AAAA,EACH,CAAC;AAED,SAAO;AACT;","names":["result"]}
|
package/package.json
CHANGED
|
@@ -1,8 +1,21 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "dauth-md-node",
|
|
3
|
-
"version": "
|
|
3
|
+
"version": "4.1.0",
|
|
4
|
+
"description": "Express middleware for JWT verification and session management against the Dauth authentication service",
|
|
4
5
|
"license": "MIT",
|
|
5
6
|
"author": "David T. Pizarro Frick",
|
|
7
|
+
"keywords": [
|
|
8
|
+
"authentication",
|
|
9
|
+
"passwordless",
|
|
10
|
+
"magic-link",
|
|
11
|
+
"passkey",
|
|
12
|
+
"webauthn",
|
|
13
|
+
"multi-tenant",
|
|
14
|
+
"jwt",
|
|
15
|
+
"express",
|
|
16
|
+
"middleware",
|
|
17
|
+
"dauth"
|
|
18
|
+
],
|
|
6
19
|
"main": "dist/index.js",
|
|
7
20
|
"module": "dist/index.mjs",
|
|
8
21
|
"typings": "dist/index.d.ts",
|
|
@@ -11,6 +24,11 @@
|
|
|
11
24
|
"types": "./dist/index.d.ts",
|
|
12
25
|
"import": "./dist/index.mjs",
|
|
13
26
|
"require": "./dist/index.js"
|
|
27
|
+
},
|
|
28
|
+
"./router": {
|
|
29
|
+
"types": "./dist/router.d.ts",
|
|
30
|
+
"import": "./dist/router.mjs",
|
|
31
|
+
"require": "./dist/router.js"
|
|
14
32
|
}
|
|
15
33
|
},
|
|
16
34
|
"files": [
|
|
@@ -24,6 +42,7 @@
|
|
|
24
42
|
"start": "tsup --watch",
|
|
25
43
|
"build": "tsup",
|
|
26
44
|
"test": "vitest run",
|
|
45
|
+
"test:coverage": "vitest run --coverage",
|
|
27
46
|
"typecheck": "tsc --noEmit",
|
|
28
47
|
"format": "prettier --write \"src/**/*.{ts,tsx,js,jsx,json,md}\"",
|
|
29
48
|
"prepare": "tsup",
|
|
@@ -45,10 +64,24 @@
|
|
|
45
64
|
{
|
|
46
65
|
"path": "dist/index.mjs",
|
|
47
66
|
"limit": "10 KB"
|
|
67
|
+
},
|
|
68
|
+
{
|
|
69
|
+
"path": "dist/router.js",
|
|
70
|
+
"limit": "10 KB"
|
|
71
|
+
},
|
|
72
|
+
{
|
|
73
|
+
"path": "dist/router.mjs",
|
|
74
|
+
"limit": "10 KB"
|
|
48
75
|
}
|
|
49
76
|
],
|
|
50
77
|
"peerDependencies": {
|
|
51
|
-
"express": "^4.18.0 || ^5.0.0"
|
|
78
|
+
"express": "^4.18.0 || ^5.0.0",
|
|
79
|
+
"cookie-parser": "^1.4.0"
|
|
80
|
+
},
|
|
81
|
+
"peerDependenciesMeta": {
|
|
82
|
+
"cookie-parser": {
|
|
83
|
+
"optional": true
|
|
84
|
+
}
|
|
52
85
|
},
|
|
53
86
|
"dependencies": {
|
|
54
87
|
"jsonwebtoken": "^9.0.3"
|
|
@@ -63,6 +96,7 @@
|
|
|
63
96
|
"@types/express": "^5.0.0",
|
|
64
97
|
"@types/jsonwebtoken": "^9.0.10",
|
|
65
98
|
"@types/node": "~22.19.0",
|
|
99
|
+
"@vitest/coverage-v8": "^4.0.18",
|
|
66
100
|
"express": "^5.0.0",
|
|
67
101
|
"husky": "^9.1.7",
|
|
68
102
|
"prettier": "^3.8.1",
|
package/src/api/dauth.api.ts
CHANGED
|
@@ -5,6 +5,24 @@ interface GetUserResponse {
|
|
|
5
5
|
data: { user?: any; message?: string };
|
|
6
6
|
}
|
|
7
7
|
|
|
8
|
+
export interface TenantUser {
|
|
9
|
+
_id: string;
|
|
10
|
+
name: string;
|
|
11
|
+
lastname: string;
|
|
12
|
+
email: string;
|
|
13
|
+
avatar: { id: string; url: string };
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
interface TenantUserResponse {
|
|
17
|
+
response: { status: number };
|
|
18
|
+
data: { status?: string; data?: TenantUser | null; message?: string };
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
interface BatchUsersResponse {
|
|
22
|
+
response: { status: number };
|
|
23
|
+
data: { status?: string; data?: TenantUser[]; message?: string };
|
|
24
|
+
}
|
|
25
|
+
|
|
8
26
|
export async function getUser(
|
|
9
27
|
token: string,
|
|
10
28
|
domainName: string
|
|
@@ -22,3 +40,65 @@ export async function getUser(
|
|
|
22
40
|
const data = (await response.json()) as GetUserResponse['data'];
|
|
23
41
|
return { response: { status: response.status }, data };
|
|
24
42
|
}
|
|
43
|
+
|
|
44
|
+
export async function searchUserByEmail(
|
|
45
|
+
token: string,
|
|
46
|
+
domainName: string,
|
|
47
|
+
email: string
|
|
48
|
+
): Promise<TenantUserResponse> {
|
|
49
|
+
const params = new URLSearchParams({ email });
|
|
50
|
+
const response = await fetch(
|
|
51
|
+
`${getServerBasePath()}/app/${domainName}/users/search?${params}`,
|
|
52
|
+
{
|
|
53
|
+
method: 'GET',
|
|
54
|
+
headers: {
|
|
55
|
+
Authorization: token,
|
|
56
|
+
'Content-Type': 'application/json',
|
|
57
|
+
},
|
|
58
|
+
}
|
|
59
|
+
);
|
|
60
|
+
const data =
|
|
61
|
+
(await response.json()) as TenantUserResponse['data'];
|
|
62
|
+
return { response: { status: response.status }, data };
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
export async function getUserById(
|
|
66
|
+
token: string,
|
|
67
|
+
domainName: string,
|
|
68
|
+
userId: string
|
|
69
|
+
): Promise<TenantUserResponse> {
|
|
70
|
+
const response = await fetch(
|
|
71
|
+
`${getServerBasePath()}/app/${domainName}/users/${userId}`,
|
|
72
|
+
{
|
|
73
|
+
method: 'GET',
|
|
74
|
+
headers: {
|
|
75
|
+
Authorization: token,
|
|
76
|
+
'Content-Type': 'application/json',
|
|
77
|
+
},
|
|
78
|
+
}
|
|
79
|
+
);
|
|
80
|
+
const data =
|
|
81
|
+
(await response.json()) as TenantUserResponse['data'];
|
|
82
|
+
return { response: { status: response.status }, data };
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
export async function batchGetUsers(
|
|
86
|
+
token: string,
|
|
87
|
+
domainName: string,
|
|
88
|
+
userIds: string[]
|
|
89
|
+
): Promise<BatchUsersResponse> {
|
|
90
|
+
const response = await fetch(
|
|
91
|
+
`${getServerBasePath()}/app/${domainName}/users/batch`,
|
|
92
|
+
{
|
|
93
|
+
method: 'POST',
|
|
94
|
+
headers: {
|
|
95
|
+
Authorization: token,
|
|
96
|
+
'Content-Type': 'application/json',
|
|
97
|
+
},
|
|
98
|
+
body: JSON.stringify({ userIds }),
|
|
99
|
+
}
|
|
100
|
+
);
|
|
101
|
+
const data =
|
|
102
|
+
(await response.json()) as BatchUsersResponse['data'];
|
|
103
|
+
return { response: { status: response.status }, data };
|
|
104
|
+
}
|
package/src/csrf.ts
ADDED
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import crypto from 'crypto';
|
|
2
|
+
import type { Request } from 'express';
|
|
3
|
+
|
|
4
|
+
export function generateCsrfToken(): string {
|
|
5
|
+
return crypto.randomBytes(32).toString('hex');
|
|
6
|
+
}
|
|
7
|
+
|
|
8
|
+
export function verifyCsrf(req: Request, csrfCookieName: string): boolean {
|
|
9
|
+
const headerToken = req.headers['x-csrf-token'] as string | undefined;
|
|
10
|
+
const cookieToken = req.cookies?.[csrfCookieName] as string | undefined;
|
|
11
|
+
if (!headerToken || !cookieToken) return false;
|
|
12
|
+
if (headerToken.length !== cookieToken.length) return false;
|
|
13
|
+
return crypto.timingSafeEqual(
|
|
14
|
+
Buffer.from(headerToken),
|
|
15
|
+
Buffer.from(cookieToken)
|
|
16
|
+
);
|
|
17
|
+
}
|
package/src/index.ts
CHANGED
|
@@ -1,8 +1,15 @@
|
|
|
1
1
|
import { Request, NextFunction, Response as ExpressResponse } from 'express';
|
|
2
2
|
import jwt from 'jsonwebtoken';
|
|
3
3
|
import { getUser } from './api/dauth.api';
|
|
4
|
+
export {
|
|
5
|
+
searchUserByEmail,
|
|
6
|
+
getUserById,
|
|
7
|
+
batchGetUsers,
|
|
8
|
+
} from './api/dauth.api';
|
|
9
|
+
export type { TenantUser } from './api/dauth.api';
|
|
4
10
|
import { UserCache } from './cache';
|
|
5
11
|
import type { CacheOptions } from './cache';
|
|
12
|
+
import { deriveEncryptionKey, decryptSessionWithKeys } from './session';
|
|
6
13
|
|
|
7
14
|
export type AuthMethodType = 'magic-link' | 'passkey';
|
|
8
15
|
|
|
@@ -32,6 +39,7 @@ export interface IDauthUser {
|
|
|
32
39
|
|
|
33
40
|
export interface IRequestDauth extends Request {
|
|
34
41
|
user: IDauthUser;
|
|
42
|
+
dauthToken: string;
|
|
35
43
|
files: {
|
|
36
44
|
image: { path: string };
|
|
37
45
|
avatar: { path: string };
|
|
@@ -41,10 +49,18 @@ export interface IRequestDauth extends Request {
|
|
|
41
49
|
};
|
|
42
50
|
}
|
|
43
51
|
|
|
52
|
+
export interface SessionOptions {
|
|
53
|
+
cookieName?: string;
|
|
54
|
+
secure?: boolean;
|
|
55
|
+
previousTsk?: string;
|
|
56
|
+
sessionSalt?: string;
|
|
57
|
+
}
|
|
58
|
+
|
|
44
59
|
export interface DauthOptions {
|
|
45
60
|
domainName: string;
|
|
46
61
|
tsk: string;
|
|
47
62
|
cache?: CacheOptions;
|
|
63
|
+
session?: SessionOptions;
|
|
48
64
|
}
|
|
49
65
|
|
|
50
66
|
interface TCustomResponse extends ExpressResponse {
|
|
@@ -55,21 +71,69 @@ interface TCustomResponse extends ExpressResponse {
|
|
|
55
71
|
export { UserCache };
|
|
56
72
|
export type { CacheOptions };
|
|
57
73
|
|
|
58
|
-
export const dauth = ({ domainName, tsk, cache }: DauthOptions) => {
|
|
74
|
+
export const dauth = ({ domainName, tsk, cache, session }: DauthOptions) => {
|
|
59
75
|
const userCache = cache ? new UserCache(cache) : null;
|
|
60
76
|
|
|
77
|
+
// Lazy-init encryption keys for session cookie mode
|
|
78
|
+
let keysPromise: Promise<Buffer[]> | null = null;
|
|
79
|
+
async function getEncKeys(): Promise<Buffer[]> {
|
|
80
|
+
if (!keysPromise) {
|
|
81
|
+
keysPromise = (async () => {
|
|
82
|
+
const keys: Buffer[] = [];
|
|
83
|
+
keys.push(await deriveEncryptionKey(tsk, session?.sessionSalt));
|
|
84
|
+
if (session?.previousTsk) {
|
|
85
|
+
keys.push(
|
|
86
|
+
await deriveEncryptionKey(session.previousTsk, session.sessionSalt)
|
|
87
|
+
);
|
|
88
|
+
}
|
|
89
|
+
return keys;
|
|
90
|
+
})();
|
|
91
|
+
}
|
|
92
|
+
return keysPromise;
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
function getSessionCookieName(): string {
|
|
96
|
+
if (session?.cookieName) return session.cookieName;
|
|
97
|
+
const secure = session?.secure ?? process.env.NODE_ENV !== 'development';
|
|
98
|
+
return secure ? '__Host-dauth-session' : 'dauth-session';
|
|
99
|
+
}
|
|
100
|
+
|
|
61
101
|
return async (
|
|
62
102
|
req: IRequestDauth,
|
|
63
103
|
res: TCustomResponse,
|
|
64
104
|
next: NextFunction
|
|
65
105
|
) => {
|
|
66
|
-
|
|
67
|
-
return res
|
|
68
|
-
.status(403)
|
|
69
|
-
.send({ status: 'token-not-found', message: 'Token not found' });
|
|
70
|
-
}
|
|
106
|
+
let token: string;
|
|
71
107
|
|
|
72
|
-
|
|
108
|
+
if (session) {
|
|
109
|
+
// Session cookie mode: read encrypted cookie
|
|
110
|
+
const cookieName = getSessionCookieName();
|
|
111
|
+
const cookie = req.cookies?.[cookieName];
|
|
112
|
+
if (!cookie) {
|
|
113
|
+
return res.status(401).send({
|
|
114
|
+
status: 'no-session',
|
|
115
|
+
message: 'Not authenticated',
|
|
116
|
+
});
|
|
117
|
+
}
|
|
118
|
+
const keys = await getEncKeys();
|
|
119
|
+
const payload = decryptSessionWithKeys(cookie, keys);
|
|
120
|
+
if (!payload) {
|
|
121
|
+
return res.status(401).send({
|
|
122
|
+
status: 'session-invalid',
|
|
123
|
+
message: 'Invalid session',
|
|
124
|
+
});
|
|
125
|
+
}
|
|
126
|
+
token = payload.accessToken;
|
|
127
|
+
} else {
|
|
128
|
+
// Authorization header mode
|
|
129
|
+
if (!req.headers.authorization) {
|
|
130
|
+
return res.status(403).send({
|
|
131
|
+
status: 'token-not-found',
|
|
132
|
+
message: 'Token not found',
|
|
133
|
+
});
|
|
134
|
+
}
|
|
135
|
+
token = req.headers.authorization.replace(/['"]+/g, '');
|
|
136
|
+
}
|
|
73
137
|
|
|
74
138
|
try {
|
|
75
139
|
jwt.verify(token, tsk);
|
|
@@ -90,6 +154,9 @@ export const dauth = ({ domainName, tsk, cache }: DauthOptions) => {
|
|
|
90
154
|
return res.status(401).send({ status: 'token-invalid', message });
|
|
91
155
|
}
|
|
92
156
|
|
|
157
|
+
// Expose the verified access token for downstream API calls
|
|
158
|
+
req.dauthToken = token;
|
|
159
|
+
|
|
93
160
|
if (userCache) {
|
|
94
161
|
const cachedUser = userCache.get(token);
|
|
95
162
|
if (cachedUser) {
|