hazo_auth 4.2.0 → 4.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/bin/hazo_auth.mjs +35 -0
  2. package/cli-src/assets/images/forgot_password_default.jpg +0 -0
  3. package/cli-src/assets/images/login_default.jpg +0 -0
  4. package/cli-src/assets/images/register_default.jpg +0 -0
  5. package/cli-src/assets/images/reset_password_default.jpg +0 -0
  6. package/cli-src/assets/images/verify_email_default.jpg +0 -0
  7. package/cli-src/cli/generate.ts +276 -0
  8. package/cli-src/cli/index.ts +207 -0
  9. package/cli-src/cli/init.ts +254 -0
  10. package/cli-src/cli/init_users.ts +376 -0
  11. package/cli-src/cli/validate.ts +581 -0
  12. package/cli-src/lib/already_logged_in_config.server.ts +46 -0
  13. package/cli-src/lib/app_logger.ts +24 -0
  14. package/cli-src/lib/auth/auth_cache.ts +220 -0
  15. package/cli-src/lib/auth/auth_rate_limiter.ts +121 -0
  16. package/cli-src/lib/auth/auth_types.ts +117 -0
  17. package/cli-src/lib/auth/auth_utils.server.ts +196 -0
  18. package/cli-src/lib/auth/dev_lock_validator.edge.ts +171 -0
  19. package/cli-src/lib/auth/hazo_get_auth.server.ts +583 -0
  20. package/cli-src/lib/auth/index.ts +23 -0
  21. package/cli-src/lib/auth/nextauth_config.ts +227 -0
  22. package/cli-src/lib/auth/org_cache.ts +148 -0
  23. package/cli-src/lib/auth/scope_cache.ts +233 -0
  24. package/cli-src/lib/auth/server_auth.ts +88 -0
  25. package/cli-src/lib/auth/session_token_validator.edge.ts +92 -0
  26. package/cli-src/lib/auth_utility_config.server.ts +136 -0
  27. package/cli-src/lib/config/config_loader.server.ts +164 -0
  28. package/cli-src/lib/config/default_config.ts +243 -0
  29. package/cli-src/lib/dev_lock_config.server.ts +148 -0
  30. package/cli-src/lib/email_verification_config.server.ts +63 -0
  31. package/cli-src/lib/file_types_config.server.ts +25 -0
  32. package/cli-src/lib/forgot_password_config.server.ts +63 -0
  33. package/cli-src/lib/hazo_connect_instance.server.ts +101 -0
  34. package/cli-src/lib/hazo_connect_setup.server.ts +194 -0
  35. package/cli-src/lib/hazo_connect_setup.ts +54 -0
  36. package/cli-src/lib/index.ts +46 -0
  37. package/cli-src/lib/login_config.server.ts +106 -0
  38. package/cli-src/lib/messages_config.server.ts +45 -0
  39. package/cli-src/lib/migrations/apply_migration.ts +105 -0
  40. package/cli-src/lib/multi_tenancy_config.server.ts +94 -0
  41. package/cli-src/lib/my_settings_config.server.ts +135 -0
  42. package/cli-src/lib/oauth_config.server.ts +87 -0
  43. package/cli-src/lib/password_requirements_config.server.ts +40 -0
  44. package/cli-src/lib/profile_pic_menu_config.server.ts +138 -0
  45. package/cli-src/lib/profile_picture_config.server.ts +56 -0
  46. package/cli-src/lib/register_config.server.ts +101 -0
  47. package/cli-src/lib/reset_password_config.server.ts +103 -0
  48. package/cli-src/lib/scope_hierarchy_config.server.ts +151 -0
  49. package/cli-src/lib/services/email_service.ts +587 -0
  50. package/cli-src/lib/services/email_verification_service.ts +270 -0
  51. package/cli-src/lib/services/index.ts +16 -0
  52. package/cli-src/lib/services/login_service.ts +150 -0
  53. package/cli-src/lib/services/oauth_service.ts +494 -0
  54. package/cli-src/lib/services/org_service.ts +965 -0
  55. package/cli-src/lib/services/password_change_service.ts +154 -0
  56. package/cli-src/lib/services/password_reset_service.ts +418 -0
  57. package/cli-src/lib/services/profile_picture_remove_service.ts +120 -0
  58. package/cli-src/lib/services/profile_picture_service.ts +451 -0
  59. package/cli-src/lib/services/profile_picture_source_mapper.ts +62 -0
  60. package/cli-src/lib/services/registration_service.ts +185 -0
  61. package/cli-src/lib/services/scope_labels_service.ts +348 -0
  62. package/cli-src/lib/services/scope_service.ts +778 -0
  63. package/cli-src/lib/services/session_token_service.ts +178 -0
  64. package/cli-src/lib/services/token_service.ts +240 -0
  65. package/cli-src/lib/services/user_profiles_cache.ts +189 -0
  66. package/cli-src/lib/services/user_profiles_service.ts +264 -0
  67. package/cli-src/lib/services/user_scope_service.ts +554 -0
  68. package/cli-src/lib/services/user_update_service.ts +141 -0
  69. package/cli-src/lib/ui_shell_config.server.ts +73 -0
  70. package/cli-src/lib/ui_sizes_config.server.ts +37 -0
  71. package/cli-src/lib/user_fields_config.server.ts +31 -0
  72. package/cli-src/lib/user_management_config.server.ts +39 -0
  73. package/cli-src/lib/user_profiles_config.server.ts +55 -0
  74. package/cli-src/lib/utils/api_route_helpers.ts +60 -0
  75. package/cli-src/lib/utils/error_sanitizer.ts +75 -0
  76. package/cli-src/lib/utils/password_validator.ts +65 -0
  77. package/cli-src/lib/utils.ts +11 -0
  78. package/cli-src/server/logging/logger_service.ts +56 -0
  79. package/cli-src/server/types/app_types.ts +74 -0
  80. package/cli-src/server/types/express.d.ts +16 -0
  81. package/dist/cli/index.js +18 -0
  82. package/dist/cli/init_users.d.ts +17 -0
  83. package/dist/cli/init_users.d.ts.map +1 -0
  84. package/dist/cli/init_users.js +307 -0
  85. package/dist/components/layouts/dev_lock/index.d.ts +29 -0
  86. package/dist/components/layouts/dev_lock/index.d.ts.map +1 -0
  87. package/dist/components/layouts/dev_lock/index.js +60 -0
  88. package/dist/components/layouts/index.d.ts +2 -0
  89. package/dist/components/layouts/index.d.ts.map +1 -1
  90. package/dist/components/layouts/index.js +1 -0
  91. package/dist/components/layouts/org_management/index.d.ts +26 -0
  92. package/dist/components/layouts/org_management/index.d.ts.map +1 -0
  93. package/dist/components/layouts/org_management/index.js +75 -0
  94. package/dist/components/layouts/shared/config/layout_customization.d.ts +2 -7
  95. package/dist/components/layouts/shared/config/layout_customization.d.ts.map +1 -1
  96. package/dist/components/layouts/user_management/components/org_hierarchy_tab.d.ts +13 -0
  97. package/dist/components/layouts/user_management/components/org_hierarchy_tab.d.ts.map +1 -0
  98. package/dist/components/layouts/user_management/components/org_hierarchy_tab.js +276 -0
  99. package/dist/components/layouts/user_management/index.d.ts +3 -1
  100. package/dist/components/layouts/user_management/index.d.ts.map +1 -1
  101. package/dist/components/layouts/user_management/index.js +10 -4
  102. package/dist/lib/auth/auth_types.d.ts +6 -0
  103. package/dist/lib/auth/auth_types.d.ts.map +1 -1
  104. package/dist/lib/auth/dev_lock_validator.edge.d.ts +38 -0
  105. package/dist/lib/auth/dev_lock_validator.edge.d.ts.map +1 -0
  106. package/dist/lib/auth/dev_lock_validator.edge.js +122 -0
  107. package/dist/lib/auth/hazo_get_auth.server.d.ts.map +1 -1
  108. package/dist/lib/auth/hazo_get_auth.server.js +61 -1
  109. package/dist/lib/auth/org_cache.d.ts +65 -0
  110. package/dist/lib/auth/org_cache.d.ts.map +1 -0
  111. package/dist/lib/auth/org_cache.js +103 -0
  112. package/dist/lib/config/default_config.d.ts +76 -0
  113. package/dist/lib/config/default_config.d.ts.map +1 -1
  114. package/dist/lib/config/default_config.js +42 -0
  115. package/dist/lib/dev_lock_config.server.d.ts +41 -0
  116. package/dist/lib/dev_lock_config.server.d.ts.map +1 -0
  117. package/dist/lib/dev_lock_config.server.js +50 -0
  118. package/dist/lib/multi_tenancy_config.server.d.ts +30 -0
  119. package/dist/lib/multi_tenancy_config.server.d.ts.map +1 -0
  120. package/dist/lib/multi_tenancy_config.server.js +41 -0
  121. package/dist/lib/services/org_service.d.ts +191 -0
  122. package/dist/lib/services/org_service.d.ts.map +1 -0
  123. package/dist/lib/services/org_service.js +746 -0
  124. package/dist/lib/utils/password_validator.d.ts +7 -1
  125. package/dist/lib/utils/password_validator.d.ts.map +1 -1
  126. package/dist/page_components/dev_lock.d.ts +11 -0
  127. package/dist/page_components/dev_lock.d.ts.map +1 -0
  128. package/dist/page_components/dev_lock.js +17 -0
  129. package/dist/page_components/index.d.ts +1 -0
  130. package/dist/page_components/index.d.ts.map +1 -1
  131. package/dist/page_components/index.js +1 -0
  132. package/dist/page_components/org_management.d.ts +27 -0
  133. package/dist/page_components/org_management.d.ts.map +1 -0
  134. package/dist/page_components/org_management.js +18 -0
  135. package/hazo_auth_config.example.ini +30 -0
  136. package/package.json +27 -3
@@ -0,0 +1,270 @@
1
+ // file_description: service for email verification operations using hazo_connect
2
+ // section: imports
3
+ import type { HazoConnectAdapter } from "hazo_connect";
4
+ import { createCrudService } from "hazo_connect/server";
5
+ import argon2 from "argon2";
6
+ import { create_token } from "./token_service.js";
7
+ import { send_template_email } from "./email_service.js";
8
+ import { create_app_logger } from "../app_logger.js";
9
+
10
+ // section: types
11
+ export type EmailVerificationTokenData = {
12
+ token: string;
13
+ };
14
+
15
+ export type EmailVerificationResult = {
16
+ success: boolean;
17
+ user_id?: string;
18
+ email?: string;
19
+ error?: string;
20
+ };
21
+
22
+ export type ResendVerificationData = {
23
+ email: string;
24
+ };
25
+
26
+ export type ResendVerificationResult = {
27
+ success: boolean;
28
+ error?: string;
29
+ };
30
+
31
+ // section: helpers
32
+ /**
33
+ * Verifies an email verification token
34
+ * Updates email_verified to true in hazo_users and deletes the token
35
+ * @param adapter - The hazo_connect adapter instance
36
+ * @param data - Email verification token data (token)
37
+ * @returns Email verification result with success status, user_id, email, or error
38
+ */
39
+ export async function verify_email_token(
40
+ adapter: HazoConnectAdapter,
41
+ data: EmailVerificationTokenData,
42
+ ): Promise<EmailVerificationResult> {
43
+ try {
44
+ const { token } = data;
45
+
46
+ // Create CRUD service for hazo_refresh_tokens table
47
+ const tokens_service = createCrudService(adapter, "hazo_refresh_tokens");
48
+
49
+ // Find all email verification tokens
50
+ // If token_type column doesn't exist, query all tokens and filter manually
51
+ let all_tokens: unknown[] = [];
52
+ try {
53
+ all_tokens = (await tokens_service.findBy({
54
+ token_type: "email_verification",
55
+ })) as unknown[];
56
+ } catch (error) {
57
+ // If token_type column doesn't exist, get all tokens and we'll verify each one
58
+ const logger = create_app_logger();
59
+ const error_message = error instanceof Error ? error.message : "Unknown error";
60
+ logger.warn("email_verification_service_token_type_column_missing", {
61
+ filename: "email_verification_service.ts",
62
+ line_number: 0,
63
+ error: error_message,
64
+ note: "token_type column may not exist, querying all tokens",
65
+ });
66
+ try {
67
+ // Query all tokens (will need to verify each one)
68
+ all_tokens = (await tokens_service.findBy({})) as unknown[];
69
+ } catch (fallbackError) {
70
+ const fallback_error_message = fallbackError instanceof Error ? fallbackError.message : "Unknown error";
71
+ logger.error("email_verification_service_query_tokens_failed", {
72
+ filename: "email_verification_service.ts",
73
+ line_number: 0,
74
+ error: fallback_error_message,
75
+ });
76
+ return {
77
+ success: false,
78
+ error: "Invalid or expired verification token",
79
+ };
80
+ }
81
+ }
82
+
83
+ if (!Array.isArray(all_tokens) || all_tokens.length === 0) {
84
+ return {
85
+ success: false,
86
+ error: "Invalid or expired verification token",
87
+ };
88
+ }
89
+
90
+ // Find the matching token by verifying the hash
91
+ let matching_token = null;
92
+ let user_id: string | null = null;
93
+
94
+ for (const stored_token of all_tokens) {
95
+ try {
96
+ const token_hash = (stored_token as { token_hash: string }).token_hash;
97
+ const is_valid = await argon2.verify(token_hash, token);
98
+
99
+ if (is_valid) {
100
+ matching_token = stored_token;
101
+ user_id = (stored_token as { user_id: string }).user_id;
102
+ break;
103
+ }
104
+ } catch {
105
+ // Continue to next token if verification fails
106
+ continue;
107
+ }
108
+ }
109
+
110
+ if (!matching_token || !user_id) {
111
+ return {
112
+ success: false,
113
+ error: "Invalid or expired verification token",
114
+ };
115
+ }
116
+
117
+ // Check if token has expired
118
+ const expires_at = new Date((matching_token as { expires_at: string }).expires_at);
119
+ const now = new Date();
120
+
121
+ if (expires_at < now) {
122
+ // Delete expired token
123
+ await tokens_service.deleteById((matching_token as { id: string }).id);
124
+
125
+ return {
126
+ success: false,
127
+ error: "Verification token has expired",
128
+ };
129
+ }
130
+
131
+ // Get user email before updating
132
+ const users_service = createCrudService(adapter, "hazo_users");
133
+ const users = await users_service.findBy({
134
+ id: user_id,
135
+ });
136
+
137
+ if (!Array.isArray(users) || users.length === 0) {
138
+ return {
139
+ success: false,
140
+ error: "User not found",
141
+ };
142
+ }
143
+
144
+ const user = users[0];
145
+ const email = user.email_address as string;
146
+
147
+ // Update user's email_verified status
148
+ const now_iso = new Date().toISOString();
149
+ await users_service.updateById(
150
+ user_id,
151
+ {
152
+ email_verified: true,
153
+ changed_at: now_iso,
154
+ },
155
+ );
156
+
157
+ // Delete the used token
158
+ await tokens_service.deleteById((matching_token as { id: string }).id);
159
+
160
+ return {
161
+ success: true,
162
+ user_id,
163
+ email,
164
+ };
165
+ } catch (error) {
166
+ const error_message =
167
+ error instanceof Error ? error.message : "Unknown error";
168
+
169
+ return {
170
+ success: false,
171
+ error: error_message,
172
+ };
173
+ }
174
+ }
175
+
176
+ /**
177
+ * Resends an email verification token for a user
178
+ * Creates a new email verification token and stores it in hazo_refresh_tokens
179
+ * Invalidates any existing email verification tokens for the user before creating a new one
180
+ * @param adapter - The hazo_connect adapter instance
181
+ * @param data - Resend verification data (email)
182
+ * @returns Resend verification result with success status or error
183
+ */
184
+ export async function resend_verification_email(
185
+ adapter: HazoConnectAdapter,
186
+ data: ResendVerificationData,
187
+ ): Promise<ResendVerificationResult> {
188
+ try {
189
+ const { email } = data;
190
+
191
+ // Create CRUD service for hazo_users table
192
+ const users_service = createCrudService(adapter, "hazo_users");
193
+
194
+ // Find user by email
195
+ const users = await users_service.findBy({
196
+ email_address: email,
197
+ });
198
+
199
+ // If user not found, return success anyway (to prevent email enumeration)
200
+ if (!Array.isArray(users) || users.length === 0) {
201
+ return {
202
+ success: true,
203
+ };
204
+ }
205
+
206
+ const user = users[0];
207
+ const user_id = user.id as string;
208
+
209
+ // Check if email is already verified
210
+ if (user.email_verified === true) {
211
+ return {
212
+ success: true,
213
+ };
214
+ }
215
+
216
+ // Create email verification token using shared token service
217
+ const token_result = await create_token({
218
+ adapter,
219
+ user_id,
220
+ token_type: "email_verification",
221
+ });
222
+
223
+ if (!token_result.success) {
224
+ return {
225
+ success: false,
226
+ error: token_result.error || "Failed to create email verification token",
227
+ };
228
+ }
229
+
230
+ // Send verification email if token was created successfully
231
+ if (token_result.raw_token) {
232
+ const email_result = await send_template_email("email_verification", email, {
233
+ token: token_result.raw_token,
234
+ user_email: email,
235
+ user_name: user.name as string | undefined,
236
+ });
237
+
238
+ if (!email_result.success) {
239
+ const logger = create_app_logger();
240
+ logger.error("email_verification_service_email_send_failed", {
241
+ filename: "email_verification_service.ts",
242
+ line_number: 0,
243
+ user_id,
244
+ email,
245
+ error: email_result.error,
246
+ note: "Verification token created but email failed to send",
247
+ });
248
+
249
+ // Return error if email sending failed (this is a technical error, not a security issue)
250
+ return {
251
+ success: false,
252
+ error: email_result.error || "Failed to send verification email",
253
+ };
254
+ }
255
+ }
256
+
257
+ return {
258
+ success: true,
259
+ };
260
+ } catch (error) {
261
+ const error_message =
262
+ error instanceof Error ? error.message : "Unknown error";
263
+
264
+ return {
265
+ success: false,
266
+ error: error_message,
267
+ };
268
+ }
269
+ }
270
+
@@ -0,0 +1,16 @@
1
+ // file_description: barrel export for all services
2
+ // section: service_exports
3
+ export * from "./email_service";
4
+ export * from "./email_verification_service";
5
+ export * from "./login_service";
6
+ export * from "./password_change_service";
7
+ export * from "./password_reset_service";
8
+ export * from "./profile_picture_remove_service";
9
+ export * from "./profile_picture_service";
10
+ export * from "./profile_picture_source_mapper";
11
+ export * from "./registration_service";
12
+ export * from "./token_service";
13
+ export * from "./user_profiles_service";
14
+ export * from "./user_update_service";
15
+
16
+
@@ -0,0 +1,150 @@
1
+ // file_description: service for user login operations using hazo_connect
2
+ // section: imports
3
+ import type { HazoConnectAdapter } from "hazo_connect";
4
+ import { createCrudService } from "hazo_connect/server";
5
+ import argon2 from "argon2";
6
+ import { create_app_logger } from "../app_logger.js";
7
+ import { sanitize_error_for_user } from "../utils/error_sanitizer.js";
8
+ import { get_filename, get_line_number } from "../utils/api_route_helpers.js";
9
+
10
+ // section: types
11
+ export type LoginData = {
12
+ email: string;
13
+ password: string;
14
+ };
15
+
16
+ export type LoginResult = {
17
+ success: boolean;
18
+ user_id?: string;
19
+ error?: string;
20
+ email_not_verified?: boolean;
21
+ stored_url_on_logon?: string | null;
22
+ };
23
+
24
+ // section: helpers
25
+ /**
26
+ * Authenticates a user by verifying email and password against hazo_users table
27
+ * @param adapter - The hazo_connect adapter instance
28
+ * @param data - Login data (email, password)
29
+ * @returns Login result with success status and user_id or error
30
+ */
31
+ export async function authenticate_user(
32
+ adapter: HazoConnectAdapter,
33
+ data: LoginData,
34
+ ): Promise<LoginResult> {
35
+ try {
36
+ const { email, password } = data;
37
+
38
+ // Create CRUD service for hazo_users table
39
+ const users_service = createCrudService(adapter, "hazo_users");
40
+
41
+ // Find user by email
42
+ const users = await users_service.findBy({
43
+ email_address: email,
44
+ });
45
+
46
+ // Check if user exists
47
+ if (!Array.isArray(users) || users.length === 0) {
48
+ return {
49
+ success: false,
50
+ error: "Invalid email or password",
51
+ };
52
+ }
53
+
54
+ const user = users[0];
55
+
56
+ // Check if user is active
57
+ if (user.is_active === false) {
58
+ return {
59
+ success: false,
60
+ error: "Account is inactive. Please contact support.",
61
+ };
62
+ }
63
+
64
+ // Check if user has a password set (Google-only users have empty password_hash)
65
+ const password_hash = user.password_hash as string;
66
+ if (!password_hash || password_hash === "") {
67
+ // Check if user has Google linked
68
+ const auth_providers = (user.auth_providers as string) || "";
69
+ if (auth_providers.includes("google")) {
70
+ return {
71
+ success: false,
72
+ error: "This account uses Google Sign-In. Please log in with Google instead.",
73
+ };
74
+ }
75
+ return {
76
+ success: false,
77
+ error: "Invalid email or password",
78
+ };
79
+ }
80
+
81
+ // Verify password using argon2
82
+ const is_password_valid = await argon2.verify(password_hash, password);
83
+
84
+ if (!is_password_valid) {
85
+ // Increment login attempts on failed password
86
+ const current_attempts = (user.login_attempts as number) || 0;
87
+ const now = new Date().toISOString();
88
+
89
+ await users_service.updateById(
90
+ user.id,
91
+ {
92
+ login_attempts: current_attempts + 1,
93
+ changed_at: now,
94
+ }
95
+ );
96
+
97
+ return {
98
+ success: false,
99
+ error: "Invalid email or password",
100
+ };
101
+ }
102
+
103
+ // Check if email is verified
104
+ const email_verified = user.email_verified as boolean;
105
+ if (!email_verified) {
106
+ return {
107
+ success: false,
108
+ error: "Email address not verified. Please verify your email before logging in.",
109
+ email_not_verified: true,
110
+ };
111
+ }
112
+
113
+ // Password is valid and email is verified - update last_logon and reset login_attempts
114
+ const now = new Date().toISOString();
115
+ await users_service.updateById(
116
+ user.id,
117
+ {
118
+ last_logon: now,
119
+ login_attempts: 0,
120
+ changed_at: now,
121
+ url_on_logon: null, // Clear the stored redirect URL after successful login
122
+ }
123
+ );
124
+
125
+ return {
126
+ success: true,
127
+ user_id: user.id as string,
128
+ stored_url_on_logon: user.url_on_logon as string | null | undefined,
129
+ };
130
+ } catch (error) {
131
+ const logger = create_app_logger();
132
+ const user_friendly_error = sanitize_error_for_user(error, {
133
+ logToConsole: true,
134
+ logToLogger: true,
135
+ logger,
136
+ context: {
137
+ filename: "login_service.ts",
138
+ line_number: get_line_number(),
139
+ email: data.email,
140
+ operation: "authenticate_user",
141
+ },
142
+ });
143
+
144
+ return {
145
+ success: false,
146
+ error: user_friendly_error,
147
+ };
148
+ }
149
+ }
150
+