/[sudobot]/branches/5.x/src/api/controllers/AuthController.ts
ViewVC logotype

Contents of /branches/5.x/src/api/controllers/AuthController.ts

Parent Directory Parent Directory | Revision Log Revision Log


Revision 577 - (show annotations)
Mon Jul 29 18:52:37 2024 UTC (8 months ago) by rakinar2
File MIME type: application/typescript
File size: 7091 byte(s)
chore: add old version archive branches (2.x to 9.x-dev)
1 /**
2 * This file is part of SudoBot.
3 *
4 * Copyright (C) 2021-2023 OSN Developers.
5 *
6 * SudoBot is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU Affero General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
10 *
11 * SudoBot is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU Affero General Public License for more details.
15 *
16 * You should have received a copy of the GNU Affero General Public License
17 * along with SudoBot. If not, see <https://www.gnu.org/licenses/>.
18 */
19
20 import { User } from "@prisma/client";
21 import bcrypt from "bcrypt";
22 import jwt from "jsonwebtoken";
23 import { request as undiciRequest } from "undici";
24 import { z } from "zod";
25 import { Action } from "../../decorators/Action";
26 import { Validate } from "../../decorators/Validate";
27 import { safeUserFetch } from "../../utils/fetch";
28 import Controller from "../Controller";
29 import Request from "../Request";
30 import Response from "../Response";
31
32 export default class AuthController extends Controller {
33 private async genToken(user: User) {
34 if (!user.token || (user.token && user.tokenExpiresAt && user.tokenExpiresAt.getTime() <= Date.now())) {
35 user.token = jwt.sign(
36 {
37 userId: user.id,
38 random: Math.round(Math.random() * 2000)
39 },
40 process.env.JWT_SECRET!,
41 {
42 expiresIn: "2 days",
43 issuer: process.env.JWT_ISSUER ?? "SudoBot",
44 subject: "Temporary API token for authenticated user"
45 }
46 );
47
48 user.tokenExpiresAt = new Date(Date.now() + 1000 * 60 * 60 * 24 * 2);
49
50 await this.client.prisma.user.updateMany({
51 where: {
52 id: user.id
53 },
54 data: {
55 token: user.token,
56 tokenExpiresAt: user.tokenExpiresAt
57 }
58 });
59 }
60 }
61
62 @Action("POST", "/auth/login")
63 @Validate(
64 z.object({
65 username: z.string(),
66 password: z.string()
67 })
68 )
69 public async login(request: Request) {
70 const { username, password } = request.parsedBody ?? {};
71
72 const user = await this.client.prisma.user.findFirst({
73 where: {
74 username: username.trim()
75 }
76 });
77
78 if (!user || !bcrypt.compareSync(password.trim(), user.password)) {
79 return new Response({
80 status: 403,
81 body: {
82 error: "Invalid login credentials"
83 }
84 });
85 }
86
87 await this.genToken(user);
88
89 const guilds = [];
90 const discordUser = await safeUserFetch(this.client, user.discordId);
91
92 for (const id of user.guilds) {
93 const guild = this.client.guilds.cache.get(id);
94
95 if (guild) {
96 guilds.push({
97 id: guild.id,
98 name: guild.name,
99 iconURL: guild.iconURL() ?? undefined
100 });
101 }
102 }
103
104 return {
105 message: "Login successful",
106 user: {
107 id: user.id,
108 avatarURL: discordUser?.displayAvatarURL(),
109 username: user.username,
110 name: user.name,
111 discordId: user.discordId,
112 guilds,
113 token: user.token,
114 tokenExpiresAt: user.tokenExpiresAt,
115 createdAt: user.createdAt
116 }
117 };
118 }
119
120 @Action("POST", "/auth/discord")
121 @Validate(
122 z.object({
123 code: z.string()
124 })
125 )
126 async discord(request: Request) {
127 const { parsedBody } = request;
128
129 try {
130 const tokenResponseData = await undiciRequest("https://discord.com/api/oauth2/token", {
131 method: "POST",
132 body: new URLSearchParams({
133 client_id: process.env.CLIENT_ID!,
134 client_secret: process.env.CLIENT_SECRET!,
135 code: parsedBody.code,
136 grant_type: "authorization_code",
137 redirect_uri: `${process.env.DISCORD_OAUTH2_REDIRECT_URI}`,
138 scope: "identify"
139 }).toString(),
140 headers: {
141 "Content-Type": "application/x-www-form-urlencoded"
142 }
143 });
144
145 const oauthData = <any>await tokenResponseData.body.json();
146 console.log(oauthData);
147
148 if (oauthData?.error) {
149 throw new Error(`${oauthData?.error}: ${oauthData?.error_description}`);
150 }
151
152 const userResponse = await undiciRequest("https://discord.com/api/users/@me", {
153 headers: {
154 authorization: `${oauthData.token_type} ${oauthData.access_token}`
155 }
156 });
157
158 const userData = <any>await userResponse.body.json();
159
160 if (userData?.error) {
161 throw new Error(`${userData?.error}: ${userData?.error_description}`);
162 }
163
164 console.log(userData);
165
166 const avatarURL = `https://cdn.discordapp.com/avatars/${encodeURIComponent(userData.id)}/${encodeURIComponent(
167 userData.avatar
168 )}.${userData.avatar.startsWith("a_") ? "gif" : "webp"}?size=512`;
169
170 const user = await this.client.prisma.user.findFirst({
171 where: {
172 discordId: userData.id
173 }
174 });
175
176 if (!user) {
177 return new Response({ status: 400, body: "Access denied, no such user found" });
178 }
179
180 await this.genToken(user);
181
182 const guilds = [];
183
184 for (const id of user.guilds) {
185 const guild = this.client.guilds.cache.get(id);
186
187 if (guild) {
188 guilds.push({
189 id: guild.id,
190 name: guild.name,
191 iconURL: guild.iconURL() ?? undefined
192 });
193 }
194 }
195
196 return {
197 message: "Login successful",
198 user: {
199 id: user.id,
200 avatarURL,
201 username: user.username,
202 name: user.name,
203 discordId: user.discordId,
204 guilds,
205 token: user.token,
206 tokenExpiresAt: user.tokenExpiresAt,
207 createdAt: user.createdAt
208 }
209 };
210 } catch (error) {
211 console.error(error);
212 return new Response({ status: 400, body: "Invalid oauth2 grant code" });
213 }
214 }
215 }

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26