fosrl.pangolin/server/routers/auth/requestPasswordReset.ts

114 lines
3.3 KiB
TypeScript
Raw Normal View History

2024-10-05 17:01:49 -04:00
import { Request, Response, NextFunction } from "express";
import createHttpError from "http-errors";
import { z } from "zod";
import { fromError } from "zod-validation-error";
import HttpCode from "@server/types/HttpCode";
import { response } from "@server/utils";
import { db } from "@server/db";
import { passwordResetTokens, users } from "@server/db/schema";
import { eq } from "drizzle-orm";
2024-12-22 16:59:30 -05:00
import { alphabet, generateRandomString, sha256 } from "oslo/crypto";
2024-10-05 17:01:49 -04:00
import { encodeHex } from "oslo/encoding";
import { createDate } from "oslo";
import logger from "@server/logger";
2024-10-13 17:13:47 -04:00
import { generateIdFromEntropySize } from "@server/auth";
import { TimeSpan } from "oslo";
2024-12-22 16:59:30 -05:00
import config from "@server/config";
import { sendEmail } from "@server/emails";
import ResetPasswordCode from "@server/emails/templates/ResetPasswordCode";
import { hashPassword } from "@server/auth/password";
2024-10-05 17:01:49 -04:00
2024-12-22 16:59:30 -05:00
export const requestPasswordResetBody = z
.object({
email: z.string().email()
})
.strict();
2024-10-05 17:01:49 -04:00
export type RequestPasswordResetBody = z.infer<typeof requestPasswordResetBody>;
export type RequestPasswordResetResponse = {
sentEmail: boolean;
};
export async function requestPasswordReset(
req: Request,
res: Response,
2024-12-22 16:59:30 -05:00
next: NextFunction
2024-10-05 17:01:49 -04:00
): Promise<any> {
const parsedBody = requestPasswordResetBody.safeParse(req.body);
if (!parsedBody.success) {
return next(
createHttpError(
HttpCode.BAD_REQUEST,
2024-12-22 16:59:30 -05:00
fromError(parsedBody.error).toString()
)
2024-10-05 17:01:49 -04:00
);
}
const { email } = parsedBody.data;
try {
const existingUser = await db
.select()
.from(users)
.where(eq(users.email, email));
if (!existingUser || !existingUser.length) {
return next(
createHttpError(
HttpCode.BAD_REQUEST,
2024-12-22 16:59:30 -05:00
"A user with that email does not exist"
)
2024-10-05 17:01:49 -04:00
);
}
await db
.delete(passwordResetTokens)
2024-10-13 17:13:47 -04:00
.where(eq(passwordResetTokens.userId, existingUser[0].userId));
2024-10-05 17:01:49 -04:00
2024-12-22 16:59:30 -05:00
const token = generateRandomString(8, alphabet("0-9", "A-Z", "a-z"));
const tokenHash = await hashPassword(token);
2024-10-05 17:01:49 -04:00
await db.insert(passwordResetTokens).values({
2024-10-13 17:13:47 -04:00
userId: existingUser[0].userId,
2024-12-22 16:59:30 -05:00
email: existingUser[0].email,
2024-10-05 17:01:49 -04:00
tokenHash,
2024-12-22 16:59:30 -05:00
expiresAt: createDate(new TimeSpan(2, "h")).getTime()
2024-10-05 17:01:49 -04:00
});
2024-12-22 16:59:30 -05:00
const url = `${config.app.base_url}/auth/reset-password?email=${email}&token=${token}`;
await sendEmail(
ResetPasswordCode({
email,
code: token,
link: url
}),
{
from: config.email?.no_reply,
to: email,
subject: "Reset your password"
}
);
2024-10-05 17:01:49 -04:00
return response<RequestPasswordResetResponse>(res, {
data: {
2024-12-22 16:59:30 -05:00
sentEmail: true
2024-10-05 17:01:49 -04:00
},
success: true,
error: false,
2024-12-22 16:59:30 -05:00
message: "Password reset requested",
status: HttpCode.OK
2024-10-05 17:01:49 -04:00
});
} catch (e) {
2024-12-21 21:01:12 -05:00
logger.error(e);
2024-10-05 17:01:49 -04:00
return next(
createHttpError(
HttpCode.INTERNAL_SERVER_ERROR,
2024-12-22 16:59:30 -05:00
"Failed to process password reset request"
)
2024-10-05 17:01:49 -04:00
);
}
}