fix: email verification
This commit is contained in:
parent
54dbc7190b
commit
1aba7d591c
@ -17,11 +17,21 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
import { route, verifyCaptcha } from "@fosscord/api";
|
import { route, verifyCaptcha } from "@fosscord/api";
|
||||||
import { checkToken, Config, FieldErrors, User } from "@fosscord/util";
|
import { checkToken, Config, generateToken, User } from "@fosscord/util";
|
||||||
import { Request, Response, Router } from "express";
|
import { Request, Response, Router } from "express";
|
||||||
import { HTTPError } from "lambert-server";
|
import { HTTPError } from "lambert-server";
|
||||||
const router = Router();
|
const router = Router();
|
||||||
|
|
||||||
|
async function getToken(user: User) {
|
||||||
|
const token = await generateToken(user.id);
|
||||||
|
|
||||||
|
// Notice this will have a different token structure, than discord
|
||||||
|
// Discord header is just the user id as string, which is not possible with npm-jsonwebtoken package
|
||||||
|
// https://user-images.githubusercontent.com/6506416/81051916-dd8c9900-8ec2-11ea-8794-daf12d6f31f0.png
|
||||||
|
|
||||||
|
return { token };
|
||||||
|
}
|
||||||
|
|
||||||
router.post(
|
router.post(
|
||||||
"/",
|
"/",
|
||||||
route({ body: "VerifyEmailSchema" }),
|
route({ body: "VerifyEmailSchema" }),
|
||||||
@ -43,23 +53,13 @@ router.post(
|
|||||||
try {
|
try {
|
||||||
const { jwtSecret } = Config.get().security;
|
const { jwtSecret } = Config.get().security;
|
||||||
|
|
||||||
const { decoded, user } = await checkToken(token, jwtSecret);
|
const { user } = await checkToken(token, jwtSecret, true);
|
||||||
|
|
||||||
// toksn should last for 24 hours from the time they were issued
|
if (user.verified) return res.json(await getToken(user));
|
||||||
if (new Date().getTime() > decoded.iat * 1000 + 86400 * 1000) {
|
|
||||||
throw FieldErrors({
|
|
||||||
token: {
|
|
||||||
code: "TOKEN_INVALID",
|
|
||||||
message: "Invalid token", // TODO: add translation
|
|
||||||
},
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
if (user.verified) return res.send(user);
|
|
||||||
|
|
||||||
await User.update({ id: user.id }, { verified: true });
|
await User.update({ id: user.id }, { verified: true });
|
||||||
|
|
||||||
return res.send(user);
|
return res.json(await getToken(user));
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
throw new HTTPError((error as Error).toString(), 400);
|
throw new HTTPError((error as Error).toString(), 400);
|
||||||
}
|
}
|
||||||
|
@ -25,7 +25,7 @@ const router = Router();
|
|||||||
router.post("/", route({}), async (req: Request, res: Response) => {
|
router.post("/", route({}), async (req: Request, res: Response) => {
|
||||||
const user = await User.findOneOrFail({
|
const user = await User.findOneOrFail({
|
||||||
where: { id: req.user_id },
|
where: { id: req.user_id },
|
||||||
select: ["email"],
|
select: ["username", "email"],
|
||||||
});
|
});
|
||||||
|
|
||||||
if (!user.email) {
|
if (!user.email) {
|
||||||
|
@ -27,9 +27,34 @@ export type UserTokenData = {
|
|||||||
decoded: { id: string; iat: number };
|
decoded: { id: string; iat: number };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
async function checkEmailToken(
|
||||||
|
decoded: jwt.JwtPayload,
|
||||||
|
): Promise<UserTokenData> {
|
||||||
|
// eslint-disable-next-line no-async-promise-executor
|
||||||
|
return new Promise(async (res, rej) => {
|
||||||
|
if (!decoded.iat) return rej("Invalid Token"); // will never happen, just for typings.
|
||||||
|
|
||||||
|
const user = await User.findOne({
|
||||||
|
where: {
|
||||||
|
email: decoded.email,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (!user) return rej("Invalid Token");
|
||||||
|
|
||||||
|
if (new Date().getTime() > decoded.iat * 1000 + 86400 * 1000)
|
||||||
|
return rej("Invalid Token");
|
||||||
|
|
||||||
|
// Using as here because we assert `id` and `iat` are in decoded.
|
||||||
|
// TS just doesn't want to assume its there, though.
|
||||||
|
return res({ decoded, user } as UserTokenData);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
export function checkToken(
|
export function checkToken(
|
||||||
token: string,
|
token: string,
|
||||||
jwtSecret: string,
|
jwtSecret: string,
|
||||||
|
isEmailVerification = false,
|
||||||
): Promise<UserTokenData> {
|
): Promise<UserTokenData> {
|
||||||
return new Promise((res, rej) => {
|
return new Promise((res, rej) => {
|
||||||
token = token.replace("Bot ", "");
|
token = token.replace("Bot ", "");
|
||||||
@ -48,6 +73,8 @@ export function checkToken(
|
|||||||
)
|
)
|
||||||
return rej("Invalid Token"); // will never happen, just for typings.
|
return rej("Invalid Token"); // will never happen, just for typings.
|
||||||
|
|
||||||
|
if (isEmailVerification) return res(checkEmailToken(decoded));
|
||||||
|
|
||||||
const user = await User.findOne({
|
const user = await User.findOne({
|
||||||
where: { id: decoded.id },
|
where: { id: decoded.id },
|
||||||
select: ["data", "bot", "disabled", "deleted", "rights"],
|
select: ["data", "bot", "disabled", "deleted", "rights"],
|
||||||
|
Loading…
x
Reference in New Issue
Block a user