Token authentication on signup /user/ POST route working, started login and auth

This commit is contained in:
Ben
2018-09-04 16:34:58 +01:00
parent 9ecfa5204f
commit 29292603a5
19 changed files with 298 additions and 52 deletions

114
package-lock.json generated
View File

@@ -1607,6 +1607,11 @@
"tweetnacl": "^0.14.3"
}
},
"bcryptjs": {
"version": "2.4.3",
"resolved": "https://registry.npmjs.org/bcryptjs/-/bcryptjs-2.4.3.tgz",
"integrity": "sha1-mrVie5PmBiH/fNrF2pczAn3x0Ms="
},
"big.js": {
"version": "3.2.0",
"resolved": "https://registry.npmjs.org/big.js/-/big.js-3.2.0.tgz",
@@ -1798,6 +1803,11 @@
"isarray": "^1.0.0"
}
},
"buffer-equal-constant-time": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/buffer-equal-constant-time/-/buffer-equal-constant-time-1.0.1.tgz",
"integrity": "sha1-+OcRMvf/5uAaXJaXpMbz5I1cyBk="
},
"buffer-from": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/buffer-from/-/buffer-from-1.1.1.tgz",
@@ -2421,6 +2431,14 @@
"safer-buffer": "^2.1.0"
}
},
"ecdsa-sig-formatter": {
"version": "1.0.10",
"resolved": "https://registry.npmjs.org/ecdsa-sig-formatter/-/ecdsa-sig-formatter-1.0.10.tgz",
"integrity": "sha1-HFlQAPBKiJffuFAAiSoPTDOvhsM=",
"requires": {
"safe-buffer": "^5.0.1"
}
},
"ee-first": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/ee-first/-/ee-first-1.1.1.tgz",
@@ -3018,16 +3036,14 @@
"balanced-match": {
"version": "1.0.0",
"bundled": true,
"dev": true,
"optional": true
"dev": true
},
"brace-expansion": {
"version": "1.1.11",
"bundled": true,
"dev": true,
"optional": true,
"requires": {
"balanced-match": "1.0.0",
"balanced-match": "^1.0.0",
"concat-map": "0.0.1"
}
},
@@ -3045,8 +3061,7 @@
"concat-map": {
"version": "0.0.1",
"bundled": true,
"dev": true,
"optional": true
"dev": true
},
"console-control-strings": {
"version": "1.1.0",
@@ -3152,7 +3167,7 @@
"dev": true,
"optional": true,
"requires": {
"minimatch": "3.0.4"
"minimatch": "^3.0.4"
}
},
"inflight": {
@@ -3194,9 +3209,8 @@
"version": "3.0.4",
"bundled": true,
"dev": true,
"optional": true,
"requires": {
"brace-expansion": "1.1.11"
"brace-expansion": "^1.1.7"
}
},
"minimist": {
@@ -4140,6 +4154,11 @@
"resolved": "https://registry.npmjs.org/isstream/-/isstream-0.1.2.tgz",
"integrity": "sha1-R+Y/evVa+m+S4VAOaQ64uFKcCZo="
},
"js-sha256": {
"version": "0.9.0",
"resolved": "https://registry.npmjs.org/js-sha256/-/js-sha256-0.9.0.tgz",
"integrity": "sha512-sga3MHh9sgQN2+pJ9VYZ+1LPwXOxuBJBA5nrR5/ofPfuiJBE2hnjsaN8se8JznOmGLN2p49Pe5U/ttafcs/apA=="
},
"js-tokens": {
"version": "3.0.2",
"resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-3.0.2.tgz",
@@ -4186,6 +4205,29 @@
"integrity": "sha1-Hq3nrMASA0rYTiOWdn6tn6VJWCE=",
"dev": true
},
"jsonwebtoken": {
"version": "8.3.0",
"resolved": "https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.3.0.tgz",
"integrity": "sha512-oge/hvlmeJCH+iIz1DwcO7vKPkNGJHhgkspk8OH3VKlw+mbi42WtD4ig1+VXRln765vxptAv+xT26Fd3cteqag==",
"requires": {
"jws": "^3.1.5",
"lodash.includes": "^4.3.0",
"lodash.isboolean": "^3.0.3",
"lodash.isinteger": "^4.0.4",
"lodash.isnumber": "^3.0.3",
"lodash.isplainobject": "^4.0.6",
"lodash.isstring": "^4.0.1",
"lodash.once": "^4.0.0",
"ms": "^2.1.1"
},
"dependencies": {
"ms": {
"version": "2.1.1",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.1.tgz",
"integrity": "sha512-tgp+dl5cGk28utYktBsrFqA7HKgrhgPsg6Z/EfhWI4gl1Hwq8B/GmY/0oXZ6nF8hDVesS/FpnYaD/kOWhYQvyg=="
}
}
},
"jsprim": {
"version": "1.4.1",
"resolved": "https://registry.npmjs.org/jsprim/-/jsprim-1.4.1.tgz",
@@ -4197,6 +4239,25 @@
"verror": "1.10.0"
}
},
"jwa": {
"version": "1.1.6",
"resolved": "https://registry.npmjs.org/jwa/-/jwa-1.1.6.tgz",
"integrity": "sha512-tBO/cf++BUsJkYql/kBbJroKOgHWEigTKBAjjBEmrMGYd1QMBC74Hr4Wo2zCZw6ZrVhlJPvoMrkcOnlWR/DJfw==",
"requires": {
"buffer-equal-constant-time": "1.0.1",
"ecdsa-sig-formatter": "1.0.10",
"safe-buffer": "^5.0.1"
}
},
"jws": {
"version": "3.1.5",
"resolved": "https://registry.npmjs.org/jws/-/jws-3.1.5.tgz",
"integrity": "sha512-GsCSexFADNQUr8T5HPJvayTjvPIfoyJPtLQBwn5a4WZQchcrPMPMAWcC1AzJVRDKyD6ZPROPAxgv6rfHViO4uQ==",
"requires": {
"jwa": "^1.1.5",
"safe-buffer": "^5.0.1"
}
},
"kind-of": {
"version": "6.0.2",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
@@ -4250,6 +4311,41 @@
"integrity": "sha1-gteb/zCmfEAF/9XiUVMArZyk168=",
"dev": true
},
"lodash.includes": {
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/lodash.includes/-/lodash.includes-4.3.0.tgz",
"integrity": "sha1-YLuYqHy5I8aMoeUTJUgzFISfVT8="
},
"lodash.isboolean": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isboolean/-/lodash.isboolean-3.0.3.tgz",
"integrity": "sha1-bC4XHbKiV82WgC/UOwGyDV9YcPY="
},
"lodash.isinteger": {
"version": "4.0.4",
"resolved": "https://registry.npmjs.org/lodash.isinteger/-/lodash.isinteger-4.0.4.tgz",
"integrity": "sha1-YZwK89A/iwTDH1iChAt3sRzWg0M="
},
"lodash.isnumber": {
"version": "3.0.3",
"resolved": "https://registry.npmjs.org/lodash.isnumber/-/lodash.isnumber-3.0.3.tgz",
"integrity": "sha1-POdoEMWSjQM1IwGsKHMX8RwLH/w="
},
"lodash.isplainobject": {
"version": "4.0.6",
"resolved": "https://registry.npmjs.org/lodash.isplainobject/-/lodash.isplainobject-4.0.6.tgz",
"integrity": "sha1-fFJqUtibRcRcxpC4gWO+BJf1UMs="
},
"lodash.isstring": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/lodash.isstring/-/lodash.isstring-4.0.1.tgz",
"integrity": "sha1-1SfftUVuynzJu5XV2ur4i6VKVFE="
},
"lodash.once": {
"version": "4.1.1",
"resolved": "https://registry.npmjs.org/lodash.once/-/lodash.once-4.1.1.tgz",
"integrity": "sha1-DdOXEhPHxW34gJd9UEyI+0cal6w="
},
"long": {
"version": "3.2.0",
"resolved": "https://registry.npmjs.org/long/-/long-3.2.0.tgz",

View File

@@ -5,10 +5,13 @@
"main": "index.js",
"dependencies": {
"bcrypt": "^3.0.0",
"bcryptjs": "^2.4.3",
"body-parser": "^1.18.3",
"colors": "^1.3.1",
"express": "^4.16.3",
"js-sha256": "^0.9.0",
"json-stringify-safe": "^5.0.1",
"jsonwebtoken": "^8.3.0",
"regenerator-runtime": "^0.12.1",
"sequelize": "^4.38.0",
"sqlite3": "^4.0.2"

View File

@@ -1,3 +1,4 @@
export let Controllers = {};
Controllers.UserController = require('./user').UserController;
Controllers.UserController = require('./userController').UserController;
Controllers.LoginController = require('./loginController').LoginController;

View File

@@ -0,0 +1,55 @@
import {ControllerHandler} from './controllerHandler';
import {API} from '../models/api/api';
import {Database} from '../models/database/database'
import {User} from '../models/user/user';
export class LoginController extends ControllerHandler {
static async authenticate(req, res, next) {
let errors = new API.errors(res);
let ip = req.connection.remoteAddress;
if (ip.startsWith('::ffff:')) ip = ip.substring(7);
let username = req.body.username || undefined;
let email = req.body.email || undefined;
let password = req.body.password || undefined;
if (!password) errors.addError(400, 'Bad request', 'A password is required');
if (!username && !email) errors.addError(400, 'Bad request', 'A username or email is required');
if (errors.count() > 0) {
errors.endpoint();
next();
return;
}
let id;
if (!username /*If they're loging in with email*/) {
if (await Database.users.getID('email', email) == -1) errors.addError(422, 'Unprocessable entity', 'There is no user with that email');
id = await Database.users.getID('email', email);
} else {
if (await Database.users.getID('username', username) == -1) errors.addError(422, 'Unprocessable entity', 'There is no user with that username');
id = await Database.users.getID('username', username);
}
if (errors.count() > 0) {
errors.endpoint();
next();
return;
}
let user = await Database.users.getUserByID(id);
let match = await User.Password.compare(password, user.password);
if (!match) errors.addError(401, 'Unauthorized', 'Incorrect password for user');
if (errors.count() > 0) {
errors.endpoint();
next();
return;
}
res.end('Welcome')
next();
}
}

View File

@@ -12,7 +12,8 @@ export class RateLimits extends MiddleWare{
if (!buckets[ip]) {
Logger.debug(`New rate limiting bucket`);
RateLimits.newBucket(ip);
next();
MiddleWare.analytics(req, res, next);
return;
}
@@ -25,7 +26,7 @@ export class RateLimits extends MiddleWare{
}
buckets[ip].tokens.pop();
next();
MiddleWare.analytics(req, res, next);
}
static newBucket(ip) {

View File

@@ -12,12 +12,14 @@ export class Router {
app = Server.App;
app.get('/', [MiddleWare.RateLimits.request, MiddleWare.analytics, Router.frontPage]);
app.get('/', [MiddleWare.RateLimits.request, Router.frontPage]);
app.get('/user/:id', [MiddleWare.RateLimits.request, MiddleWare.analytics,]);
app.delete('/user/:id', [MiddleWare.RateLimits.request, MiddleWare.analytics,]);
app.post('/user', [MiddleWare.RateLimits.request, MiddleWare.analytics, Controllers.UserController.newUser]);
app.get('/user/:id', [MiddleWare.RateLimits.request]);
app.delete('/user/:id', [MiddleWare.RateLimits.request]);
app.post('/user', [MiddleWare.RateLimits.request, Controllers.UserController.newUser]);
app.post('/login', [MiddleWare.RateLimits.request, Controllers.LoginController.authenticate])
app.get('*', [MiddleWare.RateLimits.request, StatusCodes.pageNotFound]);
Logger.info('HTTP endpoints settup');
}

View File

@@ -3,7 +3,7 @@ import bcrypt from 'bcrypt';
import {Logger} from '../models/logger';
import {ControllerHandler} from './controllerHandler';
import {API} from '../models/api/api';
import {Database} from '../models/database/database';
import {Database} from '../models/database/database'
import {User} from '../models/user/user';
export class UserController extends ControllerHandler {
@@ -27,16 +27,27 @@ export class UserController extends ControllerHandler {
if (await Database.users.getID('username', username) != -1) errors.addError(422, 'Unprocessable entity', 'A user with that username allready exists');
if (await Database.users.getID('email', email) != -1) errors.addError(422, 'Unprocessable entity', 'A user with that email allready exists');
let id = new Date().getTime();
let token = "1234";
if (errors.count() > 0) {
errors.endpoint();
next();
return;
}
let response = new API.user(res, id, username, email, new Date().toLocaleString());
let user = new User(id, username, password, email, ip, 1234)
let encryptedPass = await User.Password.gen(password);
password = null; // Cleaning password from memory
console.log(encryptedPass);
let status = response.getStatus;
let id = new Date().getTime();
let token = await User.Token.gen(status, id, encryptedPass);
response.Token = token;
let user = new User(id, username, encryptedPass, email, ip, 1234);
let success = await user.insert();
if (success == -1) {
errors.addError(500, 'Internal server error').endpoint();
@@ -44,7 +55,7 @@ export class UserController extends ControllerHandler {
return;
}
new API.user(res, id, username, email, new Date().toLocaleString(), token).endpoint();
response.endpoint();
next();
}

View File

@@ -7,4 +7,4 @@ export class API extends BaseAPI {
}
API.errors = require('./APIErrors').APIErrors;
API.user = require('./userResponses').User;
API.user = require('./userResponses').UserAPI;

View File

@@ -31,5 +31,4 @@ export class APIErrors extends API {
this.res
.status(this.errors.status.code)
.end(JSON.stringify(this.errors, false, 4));
}
}
}}

View File

@@ -1,8 +1,15 @@
import {API} from './API';
import {User} from '../../models/user/user';
export class User extends API {
constructor(res, id, username, email, updated, token) {
export class UserAPI extends API {
get getStatus() {return this.response.status}
set Token(t) {this.response.data[0].token = t}
set Pass(p) {this.password = p}
constructor(res, id, username, email, updated) {
super();
this.res = res;
this.response = {
status: {
error: false,
@@ -19,12 +26,22 @@ export class User extends API {
email: email,
updated: updated
},
token: token
token: null
}
]
}
}
sign(password) {
if (password) {
return this.response.data[0].token = User.Token.gen(this.response.status, this.id, password);
} else if (this.password) {
return this.response.data[0].token = User.Token.gen(this.response.status, this.id, this.password);
} else {
return -1;
}
}
endpoint() {
this.res.status(200).end(JSON.stringify(this.response, false, 4));
}

View File

@@ -50,10 +50,8 @@ export class BaseDatabase {
primaryKey: true,
unique: true
},
selector: Sequelize.TEXT,
validator: Sequelize.TEXT,
uid: Sequelize.BIGINT,
expires: Sequelize.TEXT
token: Sequelize.TEXT,
passhash: Sequelize.TEXT
}, {
tableName: `auth`
});

View File

@@ -28,3 +28,4 @@ export class Database extends BaseDatabase {
}
Database.users = require('./users').UserTools;
Database.auth = require('./tokens').TokenTools;

View File

@@ -0,0 +1,29 @@
import {BaseDatabase} from './baseDatabase';
import {Logger} from '../logger';
export class TokenTools extends BaseDatabase {
static async listAll() {
let Auth = BaseDatabase.Auth;
return Auth.findAll();
}
static async newToken(id, token, passHash) {
}
static async getTokenByID(id) {
}
static async getIDByToken(token) {
}
static async getTokenByPassHash(hash) {
}
static async updateToken(id, newToken) {
}
}

View File

@@ -60,31 +60,29 @@ export class UserTools extends BaseDatabase {
let User = BaseDatabase.User;
try {
let user;
if (column == 'id') {
return search;
} else if (column == 'username') {
let user = await User.findOne({where: {username: search}});
user = await User.findOne({where: {username: search}});
if (user == null) return -1;
return user;
} else if (column == 'email') {
let user = await User.findOne({where: {email: search}});
user = await User.findOne({where: {email: search}});
if (user == null) return -1;
return user;
} else if (column == 'password') {
let user = await User.findOne({where: {password: search}});
user = await User.findOne({where: {password: search}});
if (user == null) return -1;
return user;
} else if (column == 'ip') {
let user = await User.findOne({where: {ip: search}});
user = await User.findOne({where: {ip: search}});
if (user == null) return -1;
return user;
} else if (column == 'authcode') {
let user = await User.findOne({where: {authcode: search}});
user = await User.findOne({where: {authcode: search}});
if (user == null) return -1;
return user;
} else {
return -1
}
return user.id;
} catch (e) {
Logger.error(`An error occured while querying the id of a user where ${column} is ${search}: ${e}`);
return -1;

View File

@@ -0,0 +1,25 @@
import sha256 from 'js-sha256';
import bcrypt from 'bcrypt';
import {User} from './user';
import {Logger} from '../logger';
export class Password extends User {
static async gen(passwordSecret) {
let salt = await bcrypt.genSaltSync(10);
let prehash = await sha256(passwordSecret)
let hash = await bcrypt.hashSync(prehash, salt);
return hash;
}
static async compare(password, hashToCompare) {
try {
let prehash = await sha256(password);
let res = await bcrypt.compareSync(prehash, hashToCompare);
return res;
} catch (e) {
Logger.error(`Somthing went wrong with comparing password hashes: ${e}`);
}
}
}

16
src/models/user/token.js Normal file
View File

@@ -0,0 +1,16 @@
import jwt from 'jsonwebtoken';
import {User} from './user';
export class Token extends User {
static async gen(status, clientID, clientSecret) {
let preGen = clientID + ':' + clientSecret;
let token = await jwt.sign(status, preGen);
return token;
}
static async check() {
}
}

View File

@@ -1,10 +0,0 @@
import {User} from './user';
class tokenGen extends User {
static async gen() {
let success = false;
}
}

View File

@@ -1,6 +1,7 @@
import {Logger} from '../logger';
import {BaseUser} from './baseUser';
import {Database} from '../database/database';
import { UserTools } from '../database/users';
export class User extends BaseUser {
constructor(id, username, password, email, ip, authcode) {
@@ -17,3 +18,6 @@ export class User extends BaseUser {
return this._instance.delete();
}
}
User.Token = require('./token').Token;
User.Password = require('./passwords').Password;