LocChat/server/controllers/sessions.controller.ts
Joseph Ditton 84b45cd6b1 adds roles
2021-12-01 20:18:26 -07:00

61 lines
2.3 KiB
TypeScript

import { Body, Controller, Delete, HttpException, HttpStatus, Post, Res } from '@nestjs/common';
import { Response } from 'express';
import { UsersService } from 'server/providers/services/users.service';
import { SignInDto } from 'server/dto/sign_in.dto';
import { JwtService } from 'server/providers/services/jwt.service';
import { RefreshTokensService } from 'server/providers/services/refresh_tokens.service';
import { RefreshToken } from 'server/entities/refresh_token.entity';
import { Skip } from 'server/decorators/skip.decorator';
import { AuthGuard } from 'server/providers/guards/auth.guard';
import { RolesService } from 'server/providers/services/roles.service';
// this is kind of a misnomer because we are doing token based auth
// instead of session based auth
@Controller()
export class SessionsController {
constructor(
private usersService: UsersService,
private jwtService: JwtService,
private rolesService: RolesService,
private refreshTokenService: RefreshTokensService,
) {}
@Post('/sessions')
@Skip(AuthGuard)
async create(@Body() body: SignInDto, @Res({ passthrough: true }) res: Response) {
const { verified, user } = await this.usersService.verify(body.email, body.password);
if (!verified) {
throw new HttpException('Invalid email or password.', HttpStatus.BAD_REQUEST);
}
let refreshToken = user.refreshTokens[0];
if (!refreshToken) {
const newRefreshToken = new RefreshToken();
newRefreshToken.user = user;
refreshToken = await this.refreshTokenService.create(newRefreshToken);
// generate new refresh token
}
const userRoles = await this.rolesService.findByIds(user.userRoles.map((ur) => ur.roleId));
// JWT gets sent with response
const token = this.jwtService.issueToken({ userId: user.id, roles: userRoles.map((r) => r.key) });
const refreshJwtToken = this.jwtService.issueRefreshToken({ id: refreshToken.id, userId: user.id });
// only refresh token should go in the cookie
res.cookie('_refresh_token', refreshJwtToken, {
httpOnly: true, // prevents javascript code from accessing cookie (helps protect against XSS attacks)
});
return { token };
}
@Delete('/sessions')
async destroy(@Res({ passthrough: true }) res: Response) {
res.clearCookie('_refresh_token');
return { success: true };
}
}