UNPKG

simple-auth-cli

Version:

An implementation of authentication system supporting multiple providers ready to be used with a single command.

169 lines (168 loc) 6.24 kB
"use strict"; var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; var __generator = (this && this.__generator) || function (thisArg, body) { var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g = Object.create((typeof Iterator === "function" ? Iterator : Object).prototype); return g.next = verb(0), g["throw"] = verb(1), g["return"] = verb(2), typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g; function verb(n) { return function (v) { return step([n, v]); }; } function step(op) { if (f) throw new TypeError("Generator is already executing."); while (g && (g = 0, op[0] && (_ = 0)), _) try { if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t; if (y = 0, t) op = [op[0] & 2, t.value]; switch (op[0]) { case 0: case 1: t = op; break; case 4: _.label++; return { value: op[1], done: false }; case 5: _.label++; y = op[1]; op = [0]; continue; case 7: op = _.ops.pop(); _.trys.pop(); continue; default: if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; } if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; } if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; } if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; } if (t[2]) _.ops.pop(); _.trys.pop(); continue; } op = body.call(thisArg, _); } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; } if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true }; } }; Object.defineProperty(exports, "__esModule", { value: true }); exports.User = void 0; var mongoose_1 = require("mongoose"); var bcrypt_1 = require("bcrypt"); var jsonwebtoken_1 = require("jsonwebtoken"); var dotenv_1 = require("dotenv"); dotenv_1.default.config(); var userSchema = new mongoose_1.Schema({ username: { type: String, required: true, unique: true, trim: true, lowercase: true, index: true, minlength: 3, }, email: { type: String, required: true, unique: true, trim: true, lowercase: true, }, avatar: { type: String, }, oauth: { providers: [ { providerName: { type: String, unique: true, default: null, enum: ["google", "github", "spotify", "microsoft", "facebook"], }, sub: { type: String, default: null, unique: true, }, }, ], }, password: { type: String, required: true, }, refreshToken: { type: String, }, verificationToken: { type: String, default: null, }, isVerified: { type: Boolean, default: false, }, verificationTokenExpiryDate: { type: Date, default: null, }, TwoFAchallenge: { type: String, default: null, }, TwoFAEnabled: { type: Boolean, default: false, }, TwoFAverified: { type: Boolean, default: false, }, PassKey: { type: mongoose_1.Schema.Types.Mixed, default: null, // Use a function to set required dynamically; note the explicit type for 'this' required: function () { return this.TwoFAEnabled && this.TwoFAverified; }, }, }, { timestamps: true, }); userSchema.pre("save", function (next) { return __awaiter(this, void 0, void 0, function () { var _a; return __generator(this, function (_b) { switch (_b.label) { case 0: if (!this.isModified("password")) return [2 /*return*/, next()]; _a = this; return [4 /*yield*/, bcrypt_1.default.hash(this.password, 20)]; case 1: _a.password = _b.sent(); next(); return [2 /*return*/]; } }); }); }); userSchema.methods.isPasswordCorrect = function (password) { return __awaiter(this, void 0, void 0, function () { return __generator(this, function (_a) { switch (_a.label) { case 0: return [4 /*yield*/, bcrypt_1.default.compare(password, this.password)]; case 1: return [2 /*return*/, _a.sent()]; } }); }); }; userSchema.methods.generateAccessToken = function () { return jsonwebtoken_1.default.sign({ _id: this._id.toString(), email: this.email, username: this.username, }, process.env.ACCESS_TOKEN_SECRET || "", { expiresIn: process.env.ACCESS_TOKEN_EXPIRY || "15m", }); }; userSchema.methods.generateRefreshToken = function () { return jsonwebtoken_1.default.sign({ _id: this._id.toString(), }, process.env.REFRESH_TOKEN_SECRET, { expiresIn: process.env.REFRESH_TOKEN_EXPIRY, }); }; exports.User = mongoose_1.default.model("User", userSchema);