]>
Commit | Line | Data |
---|---|---|
141b177d | 1 | import { AccessDeniedError } from 'oauth2-server' |
da854ddd | 2 | import { logger } from '../helpers/logger' |
3fd3ab2d C |
3 | import { UserModel } from '../models/account/user' |
4 | import { OAuthClientModel } from '../models/oauth/oauth-client' | |
5 | import { OAuthTokenModel } from '../models/oauth/oauth-token' | |
d9eaee39 | 6 | import { CONFIG } from '../initializers/constants' |
f201a749 | 7 | import { Transaction } from 'sequelize' |
69b0a27c | 8 | |
69818c93 | 9 | type TokenInfo = { accessToken: string, refreshToken: string, accessTokenExpiresAt: Date, refreshTokenExpiresAt: Date } |
f201a749 C |
10 | const accessTokenCache: { [ accessToken: string ]: OAuthTokenModel } = {} |
11 | const userHavingToken: { [ userId: number ]: string } = {} | |
69818c93 | 12 | |
69b0a27c C |
13 | // --------------------------------------------------------------------------- |
14 | ||
f201a749 C |
15 | function deleteUserToken (userId: number, t?: Transaction) { |
16 | clearCacheByUserId(userId) | |
17 | ||
18 | return OAuthTokenModel.deleteUserToken(userId, t) | |
19 | } | |
20 | ||
21 | function clearCacheByUserId (userId: number) { | |
22 | const token = userHavingToken[userId] | |
23 | if (token !== undefined) { | |
24 | accessTokenCache[ token ] = undefined | |
25 | userHavingToken[ userId ] = undefined | |
26 | } | |
27 | } | |
28 | ||
29 | function clearCacheByToken (token: string) { | |
30 | const tokenModel = accessTokenCache[ token ] | |
31 | if (tokenModel !== undefined) { | |
32 | userHavingToken[tokenModel.userId] = undefined | |
33 | accessTokenCache[ token ] = undefined | |
34 | } | |
35 | } | |
36 | ||
69818c93 | 37 | function getAccessToken (bearerToken: string) { |
69b0a27c C |
38 | logger.debug('Getting access token (bearerToken: ' + bearerToken + ').') |
39 | ||
f201a749 C |
40 | if (accessTokenCache[bearerToken] !== undefined) return accessTokenCache[bearerToken] |
41 | ||
3fd3ab2d | 42 | return OAuthTokenModel.getByTokenAndPopulateUser(bearerToken) |
f201a749 C |
43 | .then(tokenModel => { |
44 | if (tokenModel) { | |
45 | accessTokenCache[ bearerToken ] = tokenModel | |
46 | userHavingToken[ tokenModel.userId ] = tokenModel.accessToken | |
47 | } | |
48 | ||
49 | return tokenModel | |
50 | }) | |
69b0a27c C |
51 | } |
52 | ||
69818c93 | 53 | function getClient (clientId: string, clientSecret: string) { |
69b0a27c C |
54 | logger.debug('Getting Client (clientId: ' + clientId + ', clientSecret: ' + clientSecret + ').') |
55 | ||
3fd3ab2d | 56 | return OAuthClientModel.getByIdAndSecret(clientId, clientSecret) |
69b0a27c C |
57 | } |
58 | ||
69818c93 | 59 | function getRefreshToken (refreshToken: string) { |
69b0a27c C |
60 | logger.debug('Getting RefreshToken (refreshToken: ' + refreshToken + ').') |
61 | ||
3fd3ab2d | 62 | return OAuthTokenModel.getByRefreshTokenAndPopulateClient(refreshToken) |
69b0a27c C |
63 | } |
64 | ||
ba12e8b3 C |
65 | async function getUser (usernameOrEmail: string, password: string) { |
66 | logger.debug('Getting User (username/email: ' + usernameOrEmail + ', password: ******).') | |
69b0a27c | 67 | |
ba12e8b3 | 68 | const user = await UserModel.loadByUsernameOrEmail(usernameOrEmail) |
f5028693 | 69 | if (!user) return null |
26d7d31b | 70 | |
f5028693 C |
71 | const passwordMatch = await user.isPasswordMatch(password) |
72 | if (passwordMatch === false) return null | |
26d7d31b | 73 | |
e6921918 C |
74 | if (user.blocked) throw new AccessDeniedError('User is blocked.') |
75 | ||
d9eaee39 JM |
76 | if (CONFIG.SIGNUP.REQUIRES_EMAIL_VERIFICATION && user.emailVerified === false) { |
77 | throw new AccessDeniedError('User email is not verified.') | |
78 | } | |
79 | ||
f5028693 | 80 | return user |
2f372a86 C |
81 | } |
82 | ||
f5028693 | 83 | async function revokeToken (tokenInfo: TokenInfo) { |
3fd3ab2d | 84 | const token = await OAuthTokenModel.getByRefreshTokenAndPopulateUser(tokenInfo.refreshToken) |
bfcef50d | 85 | if (token) { |
f201a749 C |
86 | clearCacheByToken(token.accessToken) |
87 | ||
bfcef50d C |
88 | token.destroy() |
89 | .catch(err => logger.error('Cannot destroy token when revoking token.', { err })) | |
90 | } | |
f5028693 C |
91 | |
92 | /* | |
93 | * Thanks to https://github.com/manjeshpv/node-oauth2-server-implementation/blob/master/components/oauth/mongo-models.js | |
94 | * "As per the discussion we need set older date | |
95 | * revokeToken will expected return a boolean in future version | |
96 | * https://github.com/oauthjs/node-oauth2-server/pull/274 | |
97 | * https://github.com/oauthjs/node-oauth2-server/issues/290" | |
98 | */ | |
99 | const expiredToken = token | |
100 | expiredToken.refreshTokenExpiresAt = new Date('2015-05-28T06:59:53.000Z') | |
101 | ||
102 | return expiredToken | |
69b0a27c C |
103 | } |
104 | ||
3fd3ab2d | 105 | async function saveToken (token: TokenInfo, client: OAuthClientModel, user: UserModel) { |
32bb4156 | 106 | logger.debug('Saving token ' + token.accessToken + ' for client ' + client.id + ' and user ' + user.id + '.') |
69b0a27c | 107 | |
feb4bdfd | 108 | const tokenToCreate = { |
69b0a27c | 109 | accessToken: token.accessToken, |
2f372a86 | 110 | accessTokenExpiresAt: token.accessTokenExpiresAt, |
69b0a27c | 111 | refreshToken: token.refreshToken, |
2f372a86 | 112 | refreshTokenExpiresAt: token.refreshTokenExpiresAt, |
feb4bdfd C |
113 | oAuthClientId: client.id, |
114 | userId: user.id | |
115 | } | |
69b0a27c | 116 | |
3fd3ab2d | 117 | const tokenCreated = await OAuthTokenModel.create(tokenToCreate) |
e6921918 | 118 | return Object.assign(tokenCreated, { client, user }) |
69b0a27c C |
119 | } |
120 | ||
121 | // --------------------------------------------------------------------------- | |
122 | ||
65fcc311 C |
123 | // See https://github.com/oauthjs/node-oauth2-server/wiki/Model-specification for the model specifications |
124 | export { | |
f201a749 C |
125 | deleteUserToken, |
126 | clearCacheByUserId, | |
127 | clearCacheByToken, | |
65fcc311 C |
128 | getAccessToken, |
129 | getClient, | |
130 | getRefreshToken, | |
131 | getUser, | |
132 | revokeToken, | |
133 | saveToken | |
134 | } |