simple-auth-cli
Version:
An implementation of authentication system supporting multiple providers ready to be used with a single command.
169 lines (168 loc) • 6.24 kB
JavaScript
"use strict";
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
return new (P || (P = Promise))(function (resolve, reject) {
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
step((generator = generator.apply(thisArg, _arguments || [])).next());
});
};
var __generator = (this && this.__generator) || function (thisArg, body) {
var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g = Object.create((typeof Iterator === "function" ? Iterator : Object).prototype);
return g.next = verb(0), g["throw"] = verb(1), g["return"] = verb(2), typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g;
function verb(n) { return function (v) { return step([n, v]); }; }
function step(op) {
if (f) throw new TypeError("Generator is already executing.");
while (g && (g = 0, op[0] && (_ = 0)), _) try {
if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;
if (y = 0, t) op = [op[0] & 2, t.value];
switch (op[0]) {
case 0: case 1: t = op; break;
case 4: _.label++; return { value: op[1], done: false };
case 5: _.label++; y = op[1]; op = [0]; continue;
case 7: op = _.ops.pop(); _.trys.pop(); continue;
default:
if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }
if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }
if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }
if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }
if (t[2]) _.ops.pop();
_.trys.pop(); continue;
}
op = body.call(thisArg, _);
} catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }
if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };
}
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.User = void 0;
var mongoose_1 = require("mongoose");
var bcrypt_1 = require("bcrypt");
var jsonwebtoken_1 = require("jsonwebtoken");
var dotenv_1 = require("dotenv");
dotenv_1.default.config();
var userSchema = new mongoose_1.Schema({
username: {
type: String,
required: true,
unique: true,
trim: true,
lowercase: true,
index: true,
minlength: 3,
},
email: {
type: String,
required: true,
unique: true,
trim: true,
lowercase: true,
},
avatar: {
type: String,
},
oauth: {
providers: [
{
providerName: {
type: String,
unique: true,
default: null,
enum: ["google", "github", "spotify", "microsoft", "facebook"],
},
sub: {
type: String,
default: null,
unique: true,
},
},
],
},
password: {
type: String,
required: true,
},
refreshToken: {
type: String,
},
verificationToken: {
type: String,
default: null,
},
isVerified: {
type: Boolean,
default: false,
},
verificationTokenExpiryDate: {
type: Date,
default: null,
},
TwoFAchallenge: {
type: String,
default: null,
},
TwoFAEnabled: {
type: Boolean,
default: false,
},
TwoFAverified: {
type: Boolean,
default: false,
},
PassKey: {
type: mongoose_1.Schema.Types.Mixed,
default: null,
// Use a function to set required dynamically; note the explicit type for 'this'
required: function () {
return this.TwoFAEnabled && this.TwoFAverified;
},
},
}, {
timestamps: true,
});
userSchema.pre("save", function (next) {
return __awaiter(this, void 0, void 0, function () {
var _a;
return __generator(this, function (_b) {
switch (_b.label) {
case 0:
if (!this.isModified("password"))
return [2 /*return*/, next()];
_a = this;
return [4 /*yield*/, bcrypt_1.default.hash(this.password, 20)];
case 1:
_a.password = _b.sent();
next();
return [2 /*return*/];
}
});
});
});
userSchema.methods.isPasswordCorrect = function (password) {
return __awaiter(this, void 0, void 0, function () {
return __generator(this, function (_a) {
switch (_a.label) {
case 0: return [4 /*yield*/, bcrypt_1.default.compare(password, this.password)];
case 1: return [2 /*return*/, _a.sent()];
}
});
});
};
userSchema.methods.generateAccessToken = function () {
return jsonwebtoken_1.default.sign({
_id: this._id.toString(),
email: this.email,
username: this.username,
}, process.env.ACCESS_TOKEN_SECRET || "", {
expiresIn: process.env.ACCESS_TOKEN_EXPIRY || "15m",
});
};
userSchema.methods.generateRefreshToken = function () {
return jsonwebtoken_1.default.sign({
_id: this._id.toString(),
}, process.env.REFRESH_TOKEN_SECRET, {
expiresIn: process.env.REFRESH_TOKEN_EXPIRY,
});
};
exports.User = mongoose_1.default.model("User", userSchema);