Merge pull request 'feature/25-refresh-token-cookie' (#29) from feature/25-refresh-token-cookie into dev
Reviewed-on: #29 closed #25
This commit is contained in:
commit
df3c231fd2
@ -28,6 +28,7 @@
|
|||||||
"class-validator": "^0.12.2",
|
"class-validator": "^0.12.2",
|
||||||
"class-validator-jsonschema": "^2.0.3",
|
"class-validator-jsonschema": "^2.0.3",
|
||||||
"consola": "^2.15.0",
|
"consola": "^2.15.0",
|
||||||
|
"cookie-parser": "^1.4.5",
|
||||||
"cors": "^2.8.5",
|
"cors": "^2.8.5",
|
||||||
"dotenv": "^8.2.0",
|
"dotenv": "^8.2.0",
|
||||||
"express": "^4.17.1",
|
"express": "^4.17.1",
|
||||||
@ -82,4 +83,4 @@
|
|||||||
],
|
],
|
||||||
"delay": "2500"
|
"delay": "2500"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { Body, JsonController, Post } from 'routing-controllers';
|
import { Body, CookieParam, JsonController, Post, Res } from 'routing-controllers';
|
||||||
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
import { OpenAPI, ResponseSchema } from 'routing-controllers-openapi';
|
||||||
import { IllegalJWTError, InvalidCredentialsError, JwtNotProvidedError, PasswordNeededError, RefreshTokenCountInvalidError, UsernameOrEmailNeededError } from '../errors/AuthError';
|
import { IllegalJWTError, InvalidCredentialsError, JwtNotProvidedError, PasswordNeededError, RefreshTokenCountInvalidError, UsernameOrEmailNeededError } from '../errors/AuthError';
|
||||||
import { UserNotFoundError } from '../errors/UserErrors';
|
import { UserNotFoundError } from '../errors/UserErrors';
|
||||||
@ -21,14 +21,16 @@ export class AuthController {
|
|||||||
@ResponseSchema(PasswordNeededError)
|
@ResponseSchema(PasswordNeededError)
|
||||||
@ResponseSchema(InvalidCredentialsError)
|
@ResponseSchema(InvalidCredentialsError)
|
||||||
@OpenAPI({ description: 'Create a new access token object' })
|
@OpenAPI({ description: 'Create a new access token object' })
|
||||||
async login(@Body({ validate: true }) createAuth: CreateAuth) {
|
async login(@Body({ validate: true }) createAuth: CreateAuth, @Res() response: any) {
|
||||||
let auth;
|
let auth;
|
||||||
try {
|
try {
|
||||||
auth = await createAuth.toAuth();
|
auth = await createAuth.toAuth();
|
||||||
|
response.cookie('lfk_backend__refresh_token', auth.refresh_token, { expires: new Date(auth.refresh_token_expires_at * 1000), httpOnly: true });
|
||||||
|
response.cookie('lfk_backend__refresh_token_expires_at', auth.refresh_token_expires_at, { expires: new Date(auth.refresh_token_expires_at * 1000), httpOnly: true });
|
||||||
|
return response.send(auth)
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
throw error;
|
throw error;
|
||||||
}
|
}
|
||||||
return auth
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post("/logout")
|
@Post("/logout")
|
||||||
@ -39,14 +41,20 @@ export class AuthController {
|
|||||||
@ResponseSchema(PasswordNeededError)
|
@ResponseSchema(PasswordNeededError)
|
||||||
@ResponseSchema(InvalidCredentialsError)
|
@ResponseSchema(InvalidCredentialsError)
|
||||||
@OpenAPI({ description: 'Create a new access token object' })
|
@OpenAPI({ description: 'Create a new access token object' })
|
||||||
async logout(@Body({ validate: true }) handleLogout: HandleLogout) {
|
async logout(@Body({ validate: true }) handleLogout: HandleLogout, @CookieParam("lfk_backend__refresh_token") refresh_token: string, @Res() response: any) {
|
||||||
|
if (refresh_token && refresh_token.length != 0 && handleLogout.token == undefined) {
|
||||||
|
handleLogout.token = refresh_token;
|
||||||
|
}
|
||||||
|
|
||||||
let logout;
|
let logout;
|
||||||
try {
|
try {
|
||||||
logout = await handleLogout.logout()
|
logout = await handleLogout.logout()
|
||||||
|
await response.cookie('lfk_backend__refresh_token', "expired", { expires: new Date(Date.now()), httpOnly: true });
|
||||||
|
response.cookie('lfk_backend__refresh_token_expires_at', "expired", { expires: new Date(Date.now()), httpOnly: true });
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
return error;
|
throw error;
|
||||||
}
|
}
|
||||||
return logout
|
return response.send(logout)
|
||||||
}
|
}
|
||||||
|
|
||||||
@Post("/refresh")
|
@Post("/refresh")
|
||||||
@ -56,13 +64,18 @@ export class AuthController {
|
|||||||
@ResponseSchema(UserNotFoundError)
|
@ResponseSchema(UserNotFoundError)
|
||||||
@ResponseSchema(RefreshTokenCountInvalidError)
|
@ResponseSchema(RefreshTokenCountInvalidError)
|
||||||
@OpenAPI({ description: 'refresh a access token' })
|
@OpenAPI({ description: 'refresh a access token' })
|
||||||
async refresh(@Body({ validate: true }) refreshAuth: RefreshAuth) {
|
async refresh(@Body({ validate: true }) refreshAuth: RefreshAuth, @CookieParam("lfk_backend__refresh_token") refresh_token: string, @Res() response: any) {
|
||||||
|
if (refresh_token && refresh_token.length != 0 && refreshAuth.token == undefined) {
|
||||||
|
refreshAuth.token = refresh_token;
|
||||||
|
}
|
||||||
let auth;
|
let auth;
|
||||||
try {
|
try {
|
||||||
auth = await refreshAuth.toAuth();
|
auth = await refreshAuth.toAuth();
|
||||||
|
response.cookie('lfk_backend__refresh_token', auth.refresh_token, { expires: new Date(auth.refresh_token_expires_at * 1000), httpOnly: true });
|
||||||
|
response.cookie('lfk_backend__refresh_token_expires_at', auth.refresh_token_expires_at, { expires: new Date(auth.refresh_token_expires_at * 1000), httpOnly: true });
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
return error;
|
throw error;
|
||||||
}
|
}
|
||||||
return auth
|
return response.send(auth)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,10 +1,11 @@
|
|||||||
|
import cookieParser from "cookie-parser";
|
||||||
import { Application } from "express";
|
import { Application } from "express";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Loader for express related configurations.
|
* Loader for express related configurations.
|
||||||
* Currently only enables the proxy trust.
|
* Currently only enables the proxy trust.
|
||||||
*/
|
*/
|
||||||
export default async (app: Application) => {
|
export default async (app: Application) => {
|
||||||
app.enable('trust proxy');
|
app.enable('trust proxy');
|
||||||
|
app.use(cookieParser());
|
||||||
return app;
|
return app;
|
||||||
};
|
};
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { IsString } from 'class-validator';
|
import { IsOptional, IsString } from 'class-validator';
|
||||||
import * as jsonwebtoken from 'jsonwebtoken';
|
import * as jsonwebtoken from 'jsonwebtoken';
|
||||||
import { getConnectionManager } from 'typeorm';
|
import { getConnectionManager } from 'typeorm';
|
||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
@ -8,7 +8,8 @@ import { Logout } from '../responses/ResponseLogout';
|
|||||||
|
|
||||||
export class HandleLogout {
|
export class HandleLogout {
|
||||||
@IsString()
|
@IsString()
|
||||||
token: string;
|
@IsOptional()
|
||||||
|
token?: string;
|
||||||
|
|
||||||
public async logout(): Promise<Logout> {
|
public async logout(): Promise<Logout> {
|
||||||
let logout: Logout = new Logout();
|
let logout: Logout = new Logout();
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
import { IsString } from 'class-validator';
|
import { IsOptional, IsString } from 'class-validator';
|
||||||
import * as jsonwebtoken from 'jsonwebtoken';
|
import * as jsonwebtoken from 'jsonwebtoken';
|
||||||
import { getConnectionManager } from 'typeorm';
|
import { getConnectionManager } from 'typeorm';
|
||||||
import { config } from '../../config';
|
import { config } from '../../config';
|
||||||
@ -8,7 +8,8 @@ import { Auth } from '../responses/ResponseAuth';
|
|||||||
|
|
||||||
export class RefreshAuth {
|
export class RefreshAuth {
|
||||||
@IsString()
|
@IsString()
|
||||||
token: string;
|
@IsOptional()
|
||||||
|
token?: string;
|
||||||
|
|
||||||
public async toAuth(): Promise<Auth> {
|
public async toAuth(): Promise<Auth> {
|
||||||
let newAuth: Auth = new Auth();
|
let newAuth: Auth = new Auth();
|
||||||
|
Loading…
x
Reference in New Issue
Block a user