1
0
mirror of https://github.com/spacebarchat/server.git synced 2024-11-05 18:32:33 +01:00

fix: email verification

This commit is contained in:
Puyodead1 2023-01-31 09:15:18 -05:00 committed by Puyodead1
parent 54dbc7190b
commit 1aba7d591c
3 changed files with 42 additions and 15 deletions

View File

@ -17,11 +17,21 @@
*/
import { route, verifyCaptcha } from "@fosscord/api";
import { checkToken, Config, FieldErrors, User } from "@fosscord/util";
import { checkToken, Config, generateToken, User } from "@fosscord/util";
import { Request, Response, Router } from "express";
import { HTTPError } from "lambert-server";
const router = Router();
async function getToken(user: User) {
const token = await generateToken(user.id);
// Notice this will have a different token structure, than discord
// Discord header is just the user id as string, which is not possible with npm-jsonwebtoken package
// https://user-images.githubusercontent.com/6506416/81051916-dd8c9900-8ec2-11ea-8794-daf12d6f31f0.png
return { token };
}
router.post(
"/",
route({ body: "VerifyEmailSchema" }),
@ -43,23 +53,13 @@ router.post(
try {
const { jwtSecret } = Config.get().security;
const { decoded, user } = await checkToken(token, jwtSecret);
const { user } = await checkToken(token, jwtSecret, true);
// toksn should last for 24 hours from the time they were issued
if (new Date().getTime() > decoded.iat * 1000 + 86400 * 1000) {
throw FieldErrors({
token: {
code: "TOKEN_INVALID",
message: "Invalid token", // TODO: add translation
},
});
}
if (user.verified) return res.send(user);
if (user.verified) return res.json(await getToken(user));
await User.update({ id: user.id }, { verified: true });
return res.send(user);
return res.json(await getToken(user));
} catch (error) {
throw new HTTPError((error as Error).toString(), 400);
}

View File

@ -25,7 +25,7 @@ const router = Router();
router.post("/", route({}), async (req: Request, res: Response) => {
const user = await User.findOneOrFail({
where: { id: req.user_id },
select: ["email"],
select: ["username", "email"],
});
if (!user.email) {

View File

@ -27,9 +27,34 @@ export type UserTokenData = {
decoded: { id: string; iat: number };
};
async function checkEmailToken(
decoded: jwt.JwtPayload,
): Promise<UserTokenData> {
// eslint-disable-next-line no-async-promise-executor
return new Promise(async (res, rej) => {
if (!decoded.iat) return rej("Invalid Token"); // will never happen, just for typings.
const user = await User.findOne({
where: {
email: decoded.email,
},
});
if (!user) return rej("Invalid Token");
if (new Date().getTime() > decoded.iat * 1000 + 86400 * 1000)
return rej("Invalid Token");
// Using as here because we assert `id` and `iat` are in decoded.
// TS just doesn't want to assume its there, though.
return res({ decoded, user } as UserTokenData);
});
}
export function checkToken(
token: string,
jwtSecret: string,
isEmailVerification = false,
): Promise<UserTokenData> {
return new Promise((res, rej) => {
token = token.replace("Bot ", "");
@ -48,6 +73,8 @@ export function checkToken(
)
return rej("Invalid Token"); // will never happen, just for typings.
if (isEmailVerification) return res(checkEmailToken(decoded));
const user = await User.findOne({
where: { id: decoded.id },
select: ["data", "bot", "disabled", "deleted", "rights"],