BillTracker/routes/auth.js

213 lines
8.2 KiB
JavaScript
Raw Normal View History

2026-05-03 19:51:57 -05:00
const express = require('express');
const router = express.Router();
const { getDb, getSetting, setSetting } = require('../db/database');
const { login, logout, hashPassword, cookieOpts, COOKIE_NAME, rotateSessionId, invalidateOtherSessions } = require('../services/authService');
2026-05-03 19:51:57 -05:00
const { requireAuth, requireAdmin } = require('../middleware/requireAuth');
const { getPublicOidcInfo } = require('../services/oidcService');
2026-05-09 13:03:36 -05:00
const { ValidationError, formatError } = require('../utils/apiError');
const { standardizeError } = require('../middleware/errorFormatter');
const { passwordLimiter } = require('../middleware/rateLimiter');
const { logAudit } = require('../services/auditService');
2026-05-03 19:51:57 -05:00
// ─────────────────────────────────────────
// PUBLIC AUTH ROUTES
// ─────────────────────────────────────────
// POST /api/auth/login
2026-05-09 13:03:36 -05:00
router.post('/login', (req, res, next) => {
// Exempt login from CSRF - no session exists yet to hijack
// CSRF validation happens on all other authenticated routes
req.csrfSkip = true;
next();
}, async (req, res) => {
2026-05-03 19:51:57 -05:00
// Respect admin-configured login method toggle
if (getSetting('local_login_enabled') === 'false') {
2026-05-09 13:03:36 -05:00
return res.status(403).json(standardizeError('Local username/password login is not enabled on this server.', 'FORBIDDEN'));
2026-05-03 19:51:57 -05:00
}
const { username, password } = req.body;
if (!username || !password) {
2026-05-09 13:03:36 -05:00
return res.status(400).json(standardizeError('Username and password are required', 'VALIDATION_ERROR', !username ? 'username' : 'password'));
2026-05-03 19:51:57 -05:00
}
try {
const result = await login(username, password);
if (!result) {
logAudit({ user_id: null, action: 'login.failure', details: { username }, ip_address: req.ip, user_agent: req.get('user-agent') });
return res.status(401).json(standardizeError('Invalid username or password', 'AUTH_ERROR'));
}
2026-05-03 19:51:57 -05:00
logAudit({ user_id: result.user.id, action: 'login.success', ip_address: req.ip, user_agent: req.get('user-agent') });
res.cookie(COOKIE_NAME, result.sessionId, cookieOpts(req));
res.json({ user: result.user });
} catch (err) {
console.error('Login error:', err);
res.status(500).json(standardizeError('Login failed', 'SERVER_ERROR'));
}
2026-05-03 19:51:57 -05:00
});
// POST /api/auth/logout
router.post('/logout', requireAuth, (req, res) => {
logout(req.cookies?.[COOKIE_NAME]);
logAudit({ user_id: req.user.id, action: 'logout', ip_address: req.ip, user_agent: req.get('user-agent') });
2026-05-03 19:51:57 -05:00
res.clearCookie(COOKIE_NAME, { path: '/', ...cookieOpts(req), maxAge: undefined });
res.json({ success: true });
});
// POST /api/auth/logout-all
router.post('/logout-all', requireAuth, (req, res) => {
// Delete ALL sessions for this user
invalidateOtherSessions(req.user.id, null); // null means delete all sessions
// Also clear the current session
logout(req.cookies?.[COOKIE_NAME]);
logAudit({ user_id: req.user.id, action: 'logout.all', ip_address: req.ip, user_agent: req.get('user-agent') });
res.clearCookie(COOKIE_NAME, { path: '/', ...cookieOpts(req), maxAge: undefined });
res.json({ success: true });
});
2026-05-03 19:51:57 -05:00
// GET /api/auth/me
router.get('/me', requireAuth, (req, res) => {
res.json({
user: req.user,
single_user_mode: !!req.singleUserMode,
});
});
// GET /api/auth/mode
// Public — tells the login page which options are available.
// Never returns secrets. local_enabled/oidc_enabled reflect admin settings.
router.get('/mode', (req, res) => {
const oidcInfo = getPublicOidcInfo();
const localEnabled = getSetting('local_login_enabled') !== 'false';
res.json({
auth_mode: getSetting('auth_mode') || 'multi',
local_enabled: localEnabled,
...oidcInfo,
});
});
// POST /api/auth/restore-multi-user-mode
// Recovery path for single-user mode. In single-user mode requireAuth attaches
// the configured default user, so this lets that Settings page restore normal
// login without needing access to Admin routes.
router.post('/restore-multi-user-mode', requireAuth, (req, res) => {
if (!req.singleUserMode && getSetting('auth_mode') !== 'single') {
2026-05-09 13:03:36 -05:00
return res.status(400).json(standardizeError('Single-user mode is not enabled.', 'VALIDATION_ERROR', 'auth_mode'));
2026-05-03 19:51:57 -05:00
}
setSetting('auth_mode', 'multi');
setSetting('default_user_id', '');
res.json({ success: true, auth_mode: 'multi' });
});
// POST /api/auth/acknowledge-privacy
router.post('/acknowledge-privacy', requireAuth, (req, res) => {
getDb().prepare(
"UPDATE users SET first_login = 0, updated_at = datetime('now') WHERE id = ?"
).run(req.user.id);
res.json({ success: true });
});
// POST /api/auth/change-password
2026-05-09 13:03:36 -05:00
// Password change endpoint with dedicated rate limiter
// CSRF protected via csrfMiddleware on /api/auth mount
2026-05-09 13:03:36 -05:00
router.post('/change-password', passwordLimiter, requireAuth, async (req, res) => {
2026-05-03 19:51:57 -05:00
const { current_password, new_password } = req.body;
if (!new_password || new_password.length < 8) {
2026-05-09 13:03:36 -05:00
return res.status(400).json(standardizeError('New password must be at least 8 characters', 'VALIDATION_ERROR', 'new_password'));
2026-05-03 19:51:57 -05:00
}
const db = getDb();
const user = db.prepare('SELECT * FROM users WHERE id = ?').get(req.user.id);
if (!user.must_change_password) {
const bcrypt = require('bcryptjs');
const valid = await bcrypt.compare(current_password || '', user.password_hash);
2026-05-09 13:03:36 -05:00
if (!valid) return res.status(401).json(standardizeError('Current password is incorrect', 'AUTH_ERROR', 'current_password'));
2026-05-03 19:51:57 -05:00
}
const hash = await hashPassword(new_password);
db.prepare(
"UPDATE users SET password_hash = ?, must_change_password = 0, last_password_change_at = datetime('now'), updated_at = datetime('now') WHERE id = ?"
2026-05-03 19:51:57 -05:00
).run(hash, req.user.id);
// Invalidate all other sessions for this user
const currentSessionId = req.cookies?.[COOKIE_NAME];
if (currentSessionId) {
invalidateOtherSessions(req.user.id, currentSessionId);
// Rotate the current session ID for security
const newSessionId = rotateSessionId(currentSessionId, req.user.id);
if (newSessionId) {
res.cookie(COOKIE_NAME, newSessionId, cookieOpts(req));
}
}
logAudit({ user_id: req.user.id, action: 'password.change', ip_address: req.ip, user_agent: req.get('user-agent') });
2026-05-03 19:51:57 -05:00
res.json({ success: true });
});
// ─────────────────────────────────────────
// ADMIN ROUTES (MOUNTED AT /api/admin)
// ─────────────────────────────────────────
// GET /api/admin/has-users
router.get('/has-users', (req, res) => {
const count = getDb()
.prepare("SELECT COUNT(*) AS n FROM users WHERE role = 'user'")
.get().n;
res.json({ has_users: count > 0 });
});
// GET /api/admin/users
router.get('/users', requireAuth, requireAdmin, (req, res) => {
const users = getDb().prepare(
"SELECT id, username, role, must_change_password, first_login, created_at FROM users ORDER BY role DESC, username ASC"
).all();
res.json(users);
});
// POST /api/admin/users
router.post('/users', requireAuth, requireAdmin, async (req, res) => {
const { username, password } = req.body;
if (!username || username.length < 3) {
2026-05-09 13:03:36 -05:00
return res.status(400).json(standardizeError('Username must be at least 3 characters', 'VALIDATION_ERROR', 'username'));
2026-05-03 19:51:57 -05:00
}
if (!password || password.length < 8) {
2026-05-09 13:03:36 -05:00
return res.status(400).json(standardizeError('Password must be at least 8 characters', 'VALIDATION_ERROR', 'password'));
2026-05-03 19:51:57 -05:00
}
const db = getDb();
const existing = db.prepare('SELECT id FROM users WHERE username = ?').get(username);
2026-05-09 13:03:36 -05:00
if (existing) return res.status(409).json(standardizeError('Username already taken', 'CONFLICT', 'username'));
2026-05-03 19:51:57 -05:00
const hash = await hashPassword(password);
const result = db.prepare(
"INSERT INTO users (username, password_hash, role, first_login) VALUES (?, ?, 'user', 1)"
).run(username, hash);
const created = db.prepare(
'SELECT id, username, role, must_change_password, first_login, created_at FROM users WHERE id = ?'
).get(result.lastInsertRowid);
res.status(201).json(created);
});
module.exports = router;