mirror of
https://github.com/Drop-OSS/drop.git
synced 2026-01-31 15:37:09 +01:00
* feat: nginx + torrential basics & services system * fix: lint + i18n * fix: update torrential to remove openssl * feat: add torrential to Docker build * feat: move to self hosted runner * fix: move off self-hosted runner * fix: update nginx.conf * feat: torrential cache invalidation * fix: update torrential for cache invalidation * feat: integrity check task * fix: lint * feat: move to version ids * fix: client fixes and client-side checks * feat: new depot apis and version id fixes * feat: update torrential * feat: droplet bump and remove unsafe update functions * fix: lint * feat: v4 featureset: emulators, multi-launch commands * fix: lint * fix: mobile ui for game editor * feat: launch options * fix: lint * fix: remove axios, use $fetch * feat: metadata and task api improvements * feat: task actions * fix: slight styling issue * feat: fix style and lints * feat: totp backend routes * feat: oidc groups * fix: update drop-base * feat: creation of passkeys & totp * feat: totp signin * feat: webauthn mfa/signin * feat: launch selecting ui * fix: manually running tasks * feat: update add company game modal to use new SelectorGame * feat: executor selector * fix(docker): update rust to rust nightly for torrential build (#305) * feat: new version ui * feat: move package lookup to build time to allow for deno dev * fix: lint * feat: localisation cleanup * feat: apply localisation cleanup * feat: potential i18n refactor logic * feat: remove args from commands * fix: lint * fix: lockfile --------- Co-authored-by: Aden Lindsay <140392385+AdenMGB@users.noreply.github.com>
213 lines
6.3 KiB
TypeScript
213 lines
6.3 KiB
TypeScript
import type { H3Event } from "h3";
|
|
import type { Session, SessionProvider } from "./types";
|
|
import { randomUUID } from "node:crypto";
|
|
import { parse as parseCookies } from "cookie-es";
|
|
import type { MinimumRequestObject } from "~/server/h3";
|
|
import type { DurationLike } from "luxon";
|
|
import { DateTime } from "luxon";
|
|
import createDBSessionHandler from "./db";
|
|
import prisma from "../db/database";
|
|
|
|
/*
|
|
This implementation may need work.
|
|
|
|
It exposes an API that should stay static, but there are plenty of opportunities for optimisation/organisation under the hood
|
|
*/
|
|
|
|
// 10 minutes
|
|
const SUPERLEVEL_LENGTH = 10 * 60 * 1000;
|
|
|
|
const dropTokenCookieName = "drop-token";
|
|
const normalSessionLength: DurationLike = {
|
|
days: 31,
|
|
};
|
|
const extendedSessionLength: DurationLike = {
|
|
year: 1,
|
|
};
|
|
|
|
type SigninResult = ["signin", "2fa", "fail"][number];
|
|
|
|
export class SessionHandler {
|
|
private sessionProvider: SessionProvider;
|
|
|
|
constructor() {
|
|
// Create a new provider
|
|
// this.sessionProvider = createCacheSessionProvider();
|
|
this.sessionProvider = createDBSessionHandler();
|
|
// this.sessionProvider = createMemorySessionProvider();
|
|
}
|
|
|
|
async signin(
|
|
h3: H3Event,
|
|
userId: string,
|
|
rememberMe: boolean = false,
|
|
): Promise<SigninResult> {
|
|
const mfaCount = await prisma.linkedMFAMec.count({
|
|
where: { userId, enabled: true },
|
|
});
|
|
|
|
const expiresAt = this.createExipreAt(rememberMe);
|
|
|
|
const token =
|
|
this.getSessionToken(h3) ?? this.createSessionCookie(h3, expiresAt);
|
|
const session = (await this.sessionProvider.getSession(token)) ?? {
|
|
expiresAt,
|
|
data: {},
|
|
};
|
|
const wasAuthenticated = !!session.authenticated;
|
|
session.authenticated = {
|
|
userId,
|
|
level: session.authenticated?.level ?? 10,
|
|
requiredLevel: mfaCount > 0 ? 20 : 10,
|
|
superleveledExpiry: undefined,
|
|
};
|
|
if (
|
|
!wasAuthenticated &&
|
|
session.authenticated.level >= session.authenticated.requiredLevel
|
|
)
|
|
session.authenticated.superleveledExpiry = Date.now() + SUPERLEVEL_LENGTH;
|
|
const success = await this.sessionProvider.setSession(token, session);
|
|
if (!success) return "fail";
|
|
|
|
if (session.authenticated.level < session.authenticated.requiredLevel)
|
|
return "2fa";
|
|
return "signin";
|
|
}
|
|
|
|
async mfa(h3: H3Event, amount: number) {
|
|
const token = this.getSessionToken(h3);
|
|
if (!token)
|
|
throw createError({ statusCode: 403, message: "User not signed in" });
|
|
const session = await this.sessionProvider.getSession(token);
|
|
if (!session || !session.authenticated)
|
|
throw createError({ statusCode: 403, message: "User not signed in" });
|
|
|
|
session.authenticated.level += amount;
|
|
await this.sessionProvider.setSession(token, session);
|
|
}
|
|
|
|
/**
|
|
* Get a session associated with a request
|
|
* @returns session
|
|
*/
|
|
async getSession<T extends Session>(request: MinimumRequestObject) {
|
|
const token = this.getSessionToken(request);
|
|
if (!token) return undefined;
|
|
|
|
const data = await this.sessionProvider.getSession<T>(token);
|
|
if (!data) return undefined;
|
|
if (new Date(data.expiresAt).getTime() < Date.now()) return undefined; // Expired
|
|
return data;
|
|
}
|
|
|
|
async getSessionDataKey<T>(
|
|
request: MinimumRequestObject,
|
|
key: string,
|
|
): Promise<T | undefined> {
|
|
const token = this.getSessionToken(request);
|
|
if (!token) return undefined;
|
|
|
|
const session = await this.sessionProvider.getSession(token);
|
|
if (!session) return undefined;
|
|
return session.data[key] as T;
|
|
}
|
|
|
|
async setSessionDataKey<T>(request: H3Event, key: string, value: T) {
|
|
const expiresAt = this.createExipreAt(true);
|
|
|
|
const token =
|
|
this.getSessionToken(request) ??
|
|
this.createSessionCookie(request, expiresAt);
|
|
|
|
const session = (await this.sessionProvider.getSession(token)) ?? {
|
|
expiresAt,
|
|
data: {},
|
|
};
|
|
console.log(session);
|
|
session.data[key] = value;
|
|
await this.sessionProvider.setSession(token, session);
|
|
return true;
|
|
}
|
|
|
|
async deleteSessionDataKey(request: MinimumRequestObject, key: string) {
|
|
const token = this.getSessionToken(request);
|
|
if (!token) return false;
|
|
|
|
const session = await this.sessionProvider.getSession(token);
|
|
if (!session) return false;
|
|
// eslint-disable-next-line @typescript-eslint/no-dynamic-delete
|
|
delete session.data[key];
|
|
await this.sessionProvider.setSession(token, session);
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Signout session associated with request and deauthenticates it
|
|
* @param request
|
|
* @returns
|
|
*/
|
|
async signout(h3: H3Event) {
|
|
const token = this.getSessionToken(h3);
|
|
if (!token) return false;
|
|
const res = await this.sessionProvider.removeSession(token);
|
|
if (!res) return false;
|
|
deleteCookie(h3, dropTokenCookieName);
|
|
return true;
|
|
}
|
|
|
|
async cleanupSessions() {
|
|
await this.sessionProvider.cleanupSessions();
|
|
}
|
|
|
|
/**
|
|
* Update session info
|
|
* @param token session token
|
|
* @param data new session data
|
|
* @returns success or not
|
|
*/
|
|
private async updateSession(token: string, data: Session) {
|
|
return await this.sessionProvider.updateSession(token, data);
|
|
}
|
|
|
|
// ---------------------- Private API Below ------------------------
|
|
|
|
/**
|
|
* Get session token on a request
|
|
* @param request
|
|
* @returns session token
|
|
*/
|
|
private getSessionToken(
|
|
request: MinimumRequestObject | undefined,
|
|
): string | undefined {
|
|
if (!request) throw new Error("Native web request not available");
|
|
const cookieHeader = request.headers.get("Cookie");
|
|
if (!cookieHeader) return undefined;
|
|
const cookies = parseCookies(cookieHeader);
|
|
const cookie = cookies[dropTokenCookieName];
|
|
return cookie;
|
|
}
|
|
|
|
private createExipreAt(rememberMe: boolean) {
|
|
return DateTime.now()
|
|
.plus(rememberMe ? extendedSessionLength : normalSessionLength)
|
|
.toJSDate();
|
|
}
|
|
|
|
/**
|
|
* Creates cookie that represents user session
|
|
* @param h3
|
|
* @param extend
|
|
* @returns
|
|
*/
|
|
private createSessionCookie(h3: H3Event, expiresAt: Date) {
|
|
const token = randomUUID();
|
|
// TODO: we should probably switch to jwts to minimize possibility of someone
|
|
// trying to guess a session id (jwts let us sign + encrypt stuff in a std way)
|
|
setCookie(h3, dropTokenCookieName, token, { expires: expiresAt });
|
|
return token;
|
|
}
|
|
}
|
|
|
|
export const sessionHandler = new SessionHandler();
|
|
export default sessionHandler;
|