datasquirel/users/reauth-user.js

241 lines
8.1 KiB
JavaScript
Raw Normal View History

2023-09-21 14:00:04 +00:00
// @ts-check
/**
* ==============================================================================
* Imports
* ==============================================================================
*/
const http = require("http");
const https = require("https");
const fs = require("fs");
const path = require("path");
2024-12-06 10:31:24 +00:00
const encrypt = require("../package-shared/functions/dsql/encrypt");
2023-09-21 14:00:04 +00:00
const userAuth = require("./user-auth");
2024-11-13 13:13:10 +00:00
const grabHostNames = require("../package-shared/utils/grab-host-names");
2024-12-06 10:31:24 +00:00
const apiReauthUser = require("../package-shared/functions/api/users/api-reauth-user");
2024-12-08 08:58:57 +00:00
const {
writeAuthFile,
deleteAuthFile,
} = require("../package-shared/functions/backend/auth/write-auth-files");
const getAuthCookieNames = require("../package-shared/functions/backend/cookies/get-auth-cookie-names");
2023-09-21 14:00:04 +00:00
/** ****************************************************************************** */
/** ****************************************************************************** */
/** ****************************************************************************** */
/** ****************************************************************************** */
/** ****************************************************************************** */
/** ****************************************************************************** */
/**
* ==============================================================================
* Main Function
* ==============================================================================
* @async
*
* @param {object} params - Single Param object containing params
2024-12-08 08:58:57 +00:00
* @param {String} [params.key] - API Key
2024-12-09 11:45:39 +00:00
* @param {String} [params.database]- Target Database slug
2024-12-08 08:58:57 +00:00
* @param {http.ServerResponse} [params.response] - Http response object
* @param {http.IncomingMessage} [params.request] - Http request object
2023-09-21 14:00:04 +00:00
* @param {("deep" | "normal")} [params.level] - Authentication level
2024-12-08 08:58:57 +00:00
* @param {String} [params.encryptionKey] - Encryption Key
* @param {String} [params.encryptionSalt] - Encryption Salt
2023-09-21 14:00:04 +00:00
* @param {string[]} [params.additionalFields] - Additional Fields to be added to the user object
2024-12-08 08:58:57 +00:00
* @param {string} [params.encryptedUserString] - encrypted user string to use instead of getting from cookie header
2024-12-09 11:45:39 +00:00
* @param {string | number} [params.user_id] - User ID
2024-12-06 11:55:03 +00:00
* @param {boolean} [params.useLocal]
2023-09-21 14:00:04 +00:00
*
2024-12-08 08:58:57 +00:00
* @returns { Promise<import("../package-shared/types").APILoginFunctionReturn> }
2023-09-21 14:00:04 +00:00
*/
2023-09-21 16:51:08 +00:00
async function reauthUser({
key,
database,
response,
request,
level,
encryptionKey,
encryptionSalt,
additionalFields,
2024-12-08 08:58:57 +00:00
encryptedUserString,
user_id,
2024-12-06 11:55:03 +00:00
useLocal,
2023-09-21 16:51:08 +00:00
}) {
2023-09-21 14:00:04 +00:00
/**
* Check Encryption Keys
*
* @description Check Encryption Keys
*/
const grabedHostNames = grabHostNames();
const { host, port, scheme } = grabedHostNames;
2023-09-21 16:51:08 +00:00
2024-12-08 08:58:57 +00:00
const finalEncryptionKey =
encryptionKey || process.env.DSQL_ENCRYPTION_PASSWORD;
const finalEncryptionSalt =
encryptionSalt || process.env.DSQL_ENCRYPTION_SALT;
2023-09-21 14:00:04 +00:00
const existingUser = userAuth({
database,
2024-12-08 08:58:57 +00:00
encryptionKey: finalEncryptionKey,
encryptionSalt: finalEncryptionSalt,
2023-09-21 14:00:04 +00:00
level,
request,
2024-12-08 08:58:57 +00:00
encryptedUserString,
2023-09-21 14:00:04 +00:00
});
if (!existingUser?.payload?.id) {
return {
success: false,
payload: null,
msg: "Cookie Credentials Invalid",
};
}
/**
* Initialize HTTP response variable
*/
let httpResponse;
/**
* Check for local DB settings
*
* @description Look for local db settings in `.env` file and by pass the http request if available
*/
2024-12-09 11:45:39 +00:00
const { DSQL_DB_HOST, DSQL_DB_USERNAME, DSQL_DB_PASSWORD, DSQL_DB_NAME } =
process.env;
2023-09-21 16:51:08 +00:00
if (
2024-12-09 11:45:39 +00:00
DSQL_DB_HOST?.match(/./) &&
DSQL_DB_USERNAME?.match(/./) &&
DSQL_DB_PASSWORD?.match(/./) &&
2024-12-06 11:55:03 +00:00
DSQL_DB_NAME?.match(/./) &&
useLocal
2023-09-21 16:51:08 +00:00
) {
2024-10-19 16:45:42 +00:00
/** @type {import("../package-shared/types").DSQL_DatabaseSchemaType | undefined} */
2023-09-21 14:00:04 +00:00
let dbSchema;
try {
2023-09-21 16:51:08 +00:00
const localDbSchemaPath = path.resolve(
process.cwd(),
"dsql.schema.json"
);
2023-09-21 14:00:04 +00:00
dbSchema = JSON.parse(fs.readFileSync(localDbSchemaPath, "utf8"));
} catch (error) {}
2024-12-09 11:45:39 +00:00
httpResponse = await apiReauthUser({
existingUser: existingUser.payload,
additionalFields,
useLocal,
});
2023-09-21 14:00:04 +00:00
} else {
/**
* Make https request
*
* @description make a request to datasquirel.com
*/
httpResponse = await new Promise((resolve, reject) => {
const reqPayload = JSON.stringify({
existingUser: existingUser.payload,
database,
additionalFields,
});
2024-11-13 13:13:10 +00:00
const httpsRequest = scheme.request(
2023-09-21 14:00:04 +00:00
{
method: "POST",
headers: {
"Content-Type": "application/json",
"Content-Length": Buffer.from(reqPayload).length,
2024-11-15 14:37:53 +00:00
Authorization:
key ||
process.env.DSQL_FULL_ACCESS_API_KEY ||
process.env.DSQL_API_KEY,
2023-09-21 14:00:04 +00:00
},
2024-11-13 13:13:10 +00:00
port,
hostname: host,
path: `/api/user/${
user_id || grabedHostNames.user_id
}/reauth-user`,
2023-09-21 14:00:04 +00:00
},
/**
* Callback Function
*
* @description https request callback
*/
(response) => {
var str = "";
response.on("data", function (chunk) {
str += chunk;
});
response.on("end", function () {
resolve(JSON.parse(str));
});
response.on("error", (err) => {
reject(err);
});
}
);
httpsRequest.write(reqPayload);
httpsRequest.end();
});
}
/** ********************************************** */
/** ********************************************** */
/** ********************************************** */
/**
* Make https request
*
* @description make a request to datasquirel.com
*/
if (httpResponse?.success) {
let encryptedPayload = encrypt({
data: JSON.stringify(httpResponse.payload),
2024-12-08 08:58:57 +00:00
encryptionKey: finalEncryptionKey,
encryptionSalt: finalEncryptionSalt,
2023-09-21 14:00:04 +00:00
});
2024-12-09 11:45:39 +00:00
const cookieNames = getAuthCookieNames({
database,
userId: user_id || grabedHostNames.user_id,
});
2024-12-08 08:58:57 +00:00
httpResponse["cookieNames"] = cookieNames;
httpResponse["key"] = String(encryptedPayload);
2023-09-21 14:00:04 +00:00
2024-12-08 08:58:57 +00:00
const authKeyName = cookieNames.keyCookieName;
const csrfName = cookieNames.csrfCookieName;
2023-09-21 14:00:04 +00:00
2024-12-08 08:58:57 +00:00
response?.setHeader("Set-Cookie", [
2023-09-21 16:51:08 +00:00
`${authKeyName}=${encryptedPayload};samesite=strict;path=/;HttpOnly=true;Secure=true`,
2024-12-08 08:58:57 +00:00
`${csrfName}=${httpResponse.payload?.csrf_k};samesite=strict;path=/;HttpOnly=true`,
2023-09-21 16:51:08 +00:00
]);
2024-08-16 06:55:07 +00:00
2024-12-08 08:58:57 +00:00
if (httpResponse.csrf) {
deleteAuthFile(String(existingUser.payload.csrf_k));
writeAuthFile(
httpResponse.csrf,
JSON.stringify(httpResponse.payload)
);
2024-08-16 06:55:07 +00:00
}
2023-09-21 14:00:04 +00:00
}
/** ********************************************** */
/** ********************************************** */
/** ********************************************** */
return httpResponse;
}
/** ********************************************** */
/** ********************************************** */
/** ********************************************** */
module.exports = reauthUser;