mirror of https://github.com/ghostfolio/ghostfolio
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
118 lines
3.1 KiB
118 lines
3.1 KiB
import { UserService } from '@ghostfolio/api/app/user/user.service';
|
|
import { ConfigurationService } from '@ghostfolio/api/services/configuration.service';
|
|
import { PropertyService } from '@ghostfolio/api/services/property/property.service';
|
|
import { Injectable, InternalServerErrorException } from '@nestjs/common';
|
|
import { JwtService } from '@nestjs/jwt';
|
|
import { Provider } from '@prisma/client';
|
|
|
|
import { ValidateOAuthLoginParams } from './interfaces/interfaces';
|
|
|
|
@Injectable()
|
|
export class AuthService {
|
|
public constructor(
|
|
private readonly configurationService: ConfigurationService,
|
|
private readonly jwtService: JwtService,
|
|
private readonly propertyService: PropertyService,
|
|
private readonly userService: UserService
|
|
) {}
|
|
|
|
public async validateAnonymousLogin(accessToken: string): Promise<string> {
|
|
return new Promise(async (resolve, reject) => {
|
|
try {
|
|
const hashedAccessToken = this.userService.createAccessToken(
|
|
accessToken,
|
|
this.configurationService.get('ACCESS_TOKEN_SALT')
|
|
);
|
|
|
|
const [user] = await this.userService.users({
|
|
where: { accessToken: hashedAccessToken }
|
|
});
|
|
|
|
if (user) {
|
|
const jwt = this.jwtService.sign({
|
|
id: user.id
|
|
});
|
|
|
|
resolve(jwt);
|
|
} else {
|
|
throw new Error();
|
|
}
|
|
} catch {
|
|
reject();
|
|
}
|
|
});
|
|
}
|
|
|
|
public async validateInternetIdentityLogin(principalId: string) {
|
|
try {
|
|
const provider: Provider = 'INTERNET_IDENTITY';
|
|
|
|
let [user] = await this.userService.users({
|
|
where: { provider, thirdPartyId: principalId }
|
|
});
|
|
|
|
if (!user) {
|
|
const isUserSignupEnabled =
|
|
await this.propertyService.isUserSignupEnabled();
|
|
|
|
if (!isUserSignupEnabled) {
|
|
throw new Error('Sign up forbidden');
|
|
}
|
|
|
|
// Create new user if not found
|
|
user = await this.userService.createUser({
|
|
data: {
|
|
provider,
|
|
thirdPartyId: principalId
|
|
}
|
|
});
|
|
}
|
|
|
|
return this.jwtService.sign({
|
|
id: user.id
|
|
});
|
|
} catch (error) {
|
|
throw new InternalServerErrorException(
|
|
'validateInternetIdentityLogin',
|
|
error.message
|
|
);
|
|
}
|
|
}
|
|
|
|
public async validateOAuthLogin({
|
|
provider,
|
|
thirdPartyId
|
|
}: ValidateOAuthLoginParams): Promise<string> {
|
|
try {
|
|
let [user] = await this.userService.users({
|
|
where: { provider, thirdPartyId }
|
|
});
|
|
|
|
if (!user) {
|
|
const isUserSignupEnabled =
|
|
await this.propertyService.isUserSignupEnabled();
|
|
|
|
if (!isUserSignupEnabled) {
|
|
throw new Error('Sign up forbidden');
|
|
}
|
|
|
|
// Create new user if not found
|
|
user = await this.userService.createUser({
|
|
data: {
|
|
provider,
|
|
thirdPartyId
|
|
}
|
|
});
|
|
}
|
|
|
|
return this.jwtService.sign({
|
|
id: user.id
|
|
});
|
|
} catch (error) {
|
|
throw new InternalServerErrorException(
|
|
'validateOAuthLogin',
|
|
error.message
|
|
);
|
|
}
|
|
}
|
|
}
|
|
|