This repository has been archived by the owner on Sep 3, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 43
/
Copy pathoauth-db.js
150 lines (121 loc) · 3.51 KB
/
oauth-db.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
var Boom = require('boom');
var crypto = require('crypto');
var Hoek = require('hoek');
var pg = require('pg');
var queries = require('./queries');
var connString = process.env.POSTGRE_CONNECTION_STRING;
var salt = process.env.TOKEN_SALT;
var OAuthDB = function OAuthDB() {
Hoek.assert(connString, 'You must provide a connection string to a PostgreSQL database');
Hoek.assert(salt, 'You must define a TOKEN_SALT for salting auth codes and access tokens');
};
function executeQuery(query, params, callback) {
pg.connect(connString, function(err, client, release) {
if ( err ) {
release();
return callback(err);
}
client.query({
text: query,
values: params
}, function(err, result) {
release();
if ( err ) {
return callback(err);
}
callback(null, result.rows[0]);
});
});
}
OAuthDB.prototype.getClient = function(clientId, callback) {
executeQuery(queries.get.client, [clientId], function(err, client) {
if ( err ) {
return callback(err);
}
if (!client) {
return callback(Boom.badRequest('invalid client_id'));
}
callback(null, client);
});
};
OAuthDB.prototype.generateAuthCode = function(clientId, userId, scopes, expiresAt, callback) {
crypto.randomBytes(32, function(err, random) {
Hoek.assert(!err, err);
var authCode = random.toString('hex');
var saltedCode = crypto.createHmac('sha256', salt)
.update(authCode)
.digest('hex');
executeQuery(queries.create.authCode, [
saltedCode,
clientId,
userId,
JSON.stringify(scopes),
expiresAt
], function(err) {
if ( err ) {
return callback(err);
}
callback(null, authCode);
});
}.bind(this));
};
OAuthDB.prototype.verifyAuthCode = function(authCode, clientId, callback) {
var saltedCode = crypto.createHmac('sha256', salt)
.update(authCode)
.digest('hex');
executeQuery(queries.get.authCode, [saltedCode], function(err, code) {
if ( err ) {
return callback(err);
}
if ( !code ) {
return callback(Boom.forbidden('invalid auth code'));
}
if ( code.client_id !== clientId ) {
return callback(Boom.forbidden('invalid client id'));
}
if ( code.expires_at <= Date.now() ) {
return callback(Boom.forbidden('auth code expired'));
}
executeQuery(queries.remove.authCode, [saltedCode], function(err) {
if ( err ) {
return callback(err);
}
callback(null, code);
});
});
};
OAuthDB.prototype.generateAccessToken = function(clientId, userId, scopes, callback) {
crypto.randomBytes(32, function(err, random) {
Hoek.assert(!err, err);
var accessToken = random.toString('hex');
var saltedToken = crypto.createHmac('sha256', salt)
.update(accessToken)
.digest('hex');
executeQuery(queries.create.accessToken, [
saltedToken,
clientId,
userId,
JSON.stringify(scopes)
], function(err) {
if ( err ) {
return callback(err);
}
callback(null, accessToken);
});
}.bind(this));
};
OAuthDB.prototype.lookupAccessToken = function(accessToken, callback) {
var saltedToken = crypto.createHmac('sha256', salt)
.update(accessToken)
.digest('hex');
executeQuery(queries.get.accessToken, [saltedToken], function(err, token) {
if ( err ) {
return callback(err);
}
if ( !token ) {
return callback(Boom.unauthorized('Invalid Access Token'));
}
callback(null, token);
});
};
module.exports = OAuthDB;