send email verification
This commit is contained in:
parent
ed6c1cbd15
commit
256c7ed8fe
Binary file not shown.
45
src/api/routes/auth/verify/index.ts
Normal file
45
src/api/routes/auth/verify/index.ts
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
import { route, verifyCaptcha } from "@fosscord/api";
|
||||||
|
import { Config, FieldErrors, verifyToken } from "@fosscord/util";
|
||||||
|
import { Request, Response, Router } from "express";
|
||||||
|
import { HTTPError } from "lambert-server";
|
||||||
|
const router = Router();
|
||||||
|
|
||||||
|
router.post(
|
||||||
|
"/",
|
||||||
|
route({ body: "VerifyEmailSchema" }),
|
||||||
|
async (req: Request, res: Response) => {
|
||||||
|
const { captcha_key, token } = req.body;
|
||||||
|
|
||||||
|
if (captcha_key) {
|
||||||
|
const { sitekey, service } = Config.get().security.captcha;
|
||||||
|
const verify = await verifyCaptcha(captcha_key);
|
||||||
|
if (!verify.success) {
|
||||||
|
return res.status(400).json({
|
||||||
|
captcha_key: verify["error-codes"],
|
||||||
|
captcha_sitekey: sitekey,
|
||||||
|
captcha_service: service,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { jwtSecret } = Config.get().security;
|
||||||
|
|
||||||
|
const { decoded, user } = await verifyToken(token, jwtSecret);
|
||||||
|
// toksn should last for 24 hours from the time they were issued
|
||||||
|
if (decoded.exp < Date.now() / 1000) {
|
||||||
|
throw FieldErrors({
|
||||||
|
token: {
|
||||||
|
code: "TOKEN_INVALID",
|
||||||
|
message: "Invalid token", // TODO: add translation
|
||||||
|
},
|
||||||
|
});
|
||||||
|
}
|
||||||
|
user.verified = true;
|
||||||
|
} catch (error: any) {
|
||||||
|
throw new HTTPError(error?.toString(), 400);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
);
|
||||||
|
|
||||||
|
export default router;
|
||||||
@ -31,7 +31,7 @@ import { ConnectedAccount } from "./ConnectedAccount";
|
|||||||
import { Member } from "./Member";
|
import { Member } from "./Member";
|
||||||
import { UserSettings } from "./UserSettings";
|
import { UserSettings } from "./UserSettings";
|
||||||
import { Session } from "./Session";
|
import { Session } from "./Session";
|
||||||
import { Config, FieldErrors, Snowflake, trimSpecial, adjustEmail } from "..";
|
import { Config, FieldErrors, Snowflake, trimSpecial, adjustEmail, Email, generateToken } from "..";
|
||||||
import { Request } from "express";
|
import { Request } from "express";
|
||||||
import { SecurityKey } from "./SecurityKey";
|
import { SecurityKey } from "./SecurityKey";
|
||||||
|
|
||||||
@ -383,6 +383,30 @@ export class User extends BaseClass {
|
|||||||
|
|
||||||
user.validate();
|
user.validate();
|
||||||
await Promise.all([user.save(), settings.save()]);
|
await Promise.all([user.save(), settings.save()]);
|
||||||
|
// send verification email
|
||||||
|
if (Email.transporter && email) {
|
||||||
|
const token = (await generateToken(user.id, email)) as string;
|
||||||
|
const link = `http://localhost:3001/verify#token=${token}`;
|
||||||
|
const message = {
|
||||||
|
from:
|
||||||
|
Config.get().general.correspondenceEmail ||
|
||||||
|
"noreply@localhost",
|
||||||
|
to: email,
|
||||||
|
subject: `Verify Email Address for ${
|
||||||
|
Config.get().general.instanceName
|
||||||
|
}`,
|
||||||
|
html: `Please verify your email address by clicking the following link: <a href="${link}">Verify Email</a>`,
|
||||||
|
};
|
||||||
|
|
||||||
|
await Email.transporter
|
||||||
|
.sendMail(message)
|
||||||
|
.then((info) => {
|
||||||
|
console.log("Message sent: %s", info.messageId);
|
||||||
|
})
|
||||||
|
.catch((e) => {
|
||||||
|
console.error(`Failed to send email to ${email}: ${e}`);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
setImmediate(async () => {
|
setImmediate(async () => {
|
||||||
if (Config.get().guild.autoJoin.enabled) {
|
if (Config.get().guild.autoJoin.enabled) {
|
||||||
|
|||||||
4
src/util/schemas/VerifyEmailSchema.ts
Normal file
4
src/util/schemas/VerifyEmailSchema.ts
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
export interface VerifyEmailSchema {
|
||||||
|
captcha_key: string | null;
|
||||||
|
token: string;
|
||||||
|
}
|
||||||
@ -72,13 +72,34 @@ export function checkToken(
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function generateToken(id: string) {
|
export function verifyToken(
|
||||||
|
token: string,
|
||||||
|
jwtSecret: string,
|
||||||
|
): Promise<{ decoded: any; user: User }> {
|
||||||
|
return new Promise((res, rej) => {
|
||||||
|
jwt.verify(token, jwtSecret, JWTOptions, async (err, decoded: any) => {
|
||||||
|
if (err || !decoded) return rej("Invalid Token");
|
||||||
|
|
||||||
|
const user = await User.findOne({
|
||||||
|
where: { id: decoded.id },
|
||||||
|
select: ["data", "bot", "disabled", "deleted", "rights"],
|
||||||
|
});
|
||||||
|
if (!user) return rej("Invalid Token");
|
||||||
|
if (user.disabled) return rej("User disabled");
|
||||||
|
if (user.deleted) return rej("User not found");
|
||||||
|
|
||||||
|
return res({ decoded, user });
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function generateToken(id: string, email?: string) {
|
||||||
const iat = Math.floor(Date.now() / 1000);
|
const iat = Math.floor(Date.now() / 1000);
|
||||||
const algorithm = "HS256";
|
const algorithm = "HS256";
|
||||||
|
|
||||||
return new Promise((res, rej) => {
|
return new Promise((res, rej) => {
|
||||||
jwt.sign(
|
jwt.sign(
|
||||||
{ id: id, iat },
|
{ id: id, email: email, iat },
|
||||||
Config.get().security.jwtSecret,
|
Config.get().security.jwtSecret,
|
||||||
{
|
{
|
||||||
algorithm,
|
algorithm,
|
||||||
|
|||||||
Reference in New Issue
Block a user