naystack
Version:
A stack built with tight Next + Drizzle + GraphQL
200 lines (191 loc) • 5.76 kB
JavaScript
// src/auth/email/utils.ts
import { verify as verify2 } from "jsonwebtoken";
// src/auth/email/token.ts
import { compare } from "bcryptjs";
import { JsonWebTokenError, sign, verify } from "jsonwebtoken";
import { NextResponse } from "next/server";
function generateAccessToken(id, signingKey) {
return sign({ id }, signingKey, {
expiresIn: "2h"
});
}
function generateRefreshToken(id, refreshKey) {
return sign({ id }, refreshKey);
}
function getTokenizedResponse(accessToken, refreshToken) {
const body = { accessToken, refreshToken };
const response = NextResponse.json(body, {
status: 200
});
if (!accessToken) {
response.cookies.set("refresh", "", {
secure: false,
httpOnly: true,
expires: 0
});
}
if (refreshToken !== void 0) {
response.cookies.set("refresh", refreshToken, {
secure: false,
httpOnly: true,
expires: refreshToken === "" ? 0 : new Date(Date.now() + 60 * 60 * 24 * 365 * 1e3)
});
}
return response;
}
function getUserIdFromRefreshToken(refreshKey, refreshToken) {
if (refreshToken)
try {
const decoded = verify(refreshToken, refreshKey);
if (typeof decoded !== "string" && typeof decoded.id === "number")
return decoded.id;
} catch (e) {
if (!(e instanceof JsonWebTokenError)) console.error(e, "errors");
return null;
}
return null;
}
function verifyUser(user, password) {
if (!user.password) return false;
return compare(password, user.password);
}
// src/auth/utils/errors.ts
import { NextResponse as NextResponse2 } from "next/server";
function handleError(status, message, onError) {
const res = onError?.({ status, message });
if (res) return res;
return new NextResponse2(message, { status });
}
// src/auth/email/utils.ts
async function massageRequest(req, options) {
const data = await req.json();
if (!data.email || !data.password)
return {
error: handleError(400, "Missing email or password", options.onError)
};
if (options.turnstileKey) {
if (!data.captchaToken)
return { error: handleError(400, "Missing captcha", options.onError) };
if (!await verifyCaptcha(data.captchaToken, options.turnstileKey))
return {
error: handleError(400, "Invalid captcha", options.onError)
};
}
return {
data: {
email: data.email,
password: data.password,
...data
}
};
}
async function verifyCaptcha(token, secret) {
const res = await fetch(
"https://challenges.cloudflare.com/turnstile/v0/siteverify",
{
method: "POST",
headers: {
"Content-Type": "application/json"
},
body: JSON.stringify({
secret,
response: token
})
}
);
if (res.ok) {
const data = await res.json();
return data.success;
}
return false;
}
var getUserContext = (refreshKey, signingKey, req) => {
const bearer = req.headers.get("authorization");
if (!bearer) {
const refresh = req.cookies.get("refresh")?.value;
const userId = getUserIdFromRefreshToken(refreshKey, refresh);
if (userId) return { refreshUserID: userId };
return null;
}
const token = bearer.slice(7);
try {
const res = verify2(token, signingKey);
if (typeof res === "string") {
return null;
}
return {
accessUserId: res.id
};
} catch {
}
return null;
};
// src/auth/email/routes/delete.ts
var getDeleteRoute = () => () => getTokenizedResponse(void 0, "");
// src/auth/email/routes/get.ts
var getGetRoute = (options) => (req) => {
const refresh = req.cookies.get("refresh")?.value;
const userID = getUserIdFromRefreshToken(options.refreshKey, refresh);
if (userID)
return getTokenizedResponse(
generateAccessToken(userID, options.signingKey)
);
return getTokenizedResponse();
};
// src/auth/email/routes/post.ts
import { hash } from "bcryptjs";
var getPostRoute = (options) => async (req) => {
const { data, error } = await massageRequest(req, options);
if (error || !data) return error;
const existingUser = await options.getUser(data.email);
if (existingUser) {
if (await verifyUser(existingUser, data.password)) {
return getTokenizedResponse(
generateAccessToken(existingUser.id, options.signingKey),
generateRefreshToken(existingUser.id, options.refreshKey)
);
}
return handleError(400, "A user already exists", options.onError);
}
const encryptedPassword = await hash(data.password, 10);
const newUser = await options.createUser({
...data,
password: encryptedPassword
});
if (newUser) {
options.onSignUp?.(newUser);
return getTokenizedResponse(
generateAccessToken(newUser.id, options.signingKey),
generateRefreshToken(newUser.id, options.refreshKey)
);
}
return getTokenizedResponse();
};
// src/auth/email/routes/put.ts
var getPutRoute = (options) => async (req) => {
const { data, error } = await massageRequest(req, options);
if (error || !data) return error;
const user = await options.getUser(data.email);
if (!user)
return handleError(400, "A user does not exist", options.onError);
if (await verifyUser(user, data.password)) {
return getTokenizedResponse(
generateAccessToken(user.id, options.signingKey),
generateRefreshToken(user.id, options.refreshKey)
);
}
return handleError(403, "Invalid password", options.onError);
};
// src/auth/email/index.ts
function getEmailAuthRoutes(options) {
return {
GET: getGetRoute(options),
POST: getPostRoute(options),
PUT: getPutRoute(options),
DELETE: getDeleteRoute(),
getUserIdFromRequest: (req) => getUserContext(options.refreshKey, options.signingKey, req)
};
}
export {
getEmailAuthRoutes
};