Refactor sessions to frequently rotate
In order to minimise the window of opportunity to steal a session, automatically rotate it onto a new session on a frequent basis. This makes a session cookie older than the automatic rollover time less likely to grant access and more likely to be detected. Should a stolen session cookie get rotated while the attacker is using it, the user will be notificed that their session has been taken the next time they open the app if the user re-visits the website before the session is discarded.
This commit is contained in:
parent
d9b78bff69
commit
1775fac5fd
18 changed files with 168 additions and 73 deletions
17
docs/admin/config.md
Normal file
17
docs/admin/config.md
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
||||||
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
-->
|
||||||
|
# Configuration
|
||||||
|
|
||||||
|
## Environment Variables
|
||||||
|
|
||||||
|
### NUXT_SESSION_EXPIRES_TIMEOUT
|
||||||
|
|
||||||
|
Time in seconds before a session is considered expired and need to be rotated over into a new session. When an endpoint using a session is hit after the session expires but before the session is discarded a new session is created as the successor with a new expiry and discard timeout. The old session then considered to have been superceeded and any requests using the old session will result in a 403 Forbidden with the message the session has been taken.
|
||||||
|
|
||||||
|
### NUXT_SESSION_DISCARD_TIMEOUT
|
||||||
|
|
||||||
|
Time in seconds before a session is deleted from the client and server, resulting in the user having to authenticate again if the session wasn't rotated over into a new session before this timeout.
|
||||||
|
|
||||||
|
This should be several times greater that `NUXT_SESSION_EXPIRES_TIMEOUT`.
|
13
docs/dev/sessions.md
Normal file
13
docs/dev/sessions.md
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
||||||
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
-->
|
||||||
|
# Sessions
|
||||||
|
|
||||||
|
When a user creates a new account or logs in to an existing account a session is created on the server and linked to the user's browser via a session cookie. This cookie contains a unique identifier along with a HMAC signature created using the server's cookie secret key. Since this unique identifier stored on the user's device is a technical requirement to securely do what the user is requesting the user's consent to its storage can be assumed.
|
||||||
|
|
||||||
|
Sessions have two future times associated with them: The expiration time is the point in time after the session will be recreated and the cookie reassigned, and the discard time is when the session is deleted from both the client and the server. The expiriation time is short, by default 1 hour, while the discard time is long, by default 2 weeks.
|
||||||
|
|
||||||
|
When a request is made to a session that's past the expiration time a new session is created to replace the existing one, and the session cookie is updated with the new session. The purpose of this is to reduce the time window a stolen session can be used in without being detected. If a request is made using a session that has already been replaced the server responds with a message saying the "session has been taken".
|
||||||
|
|
||||||
|
Sessions are created for a limited timespan, purpose and access level, and expires after the timespan is over, the purpose is fulfilled or the access level changes. For example if the user's account is promoted from regular to crew the session will no longer be valid and will be recreated as a new session with the new access level on the next request.
|
|
@ -4,6 +4,8 @@
|
||||||
*/
|
*/
|
||||||
// https://nuxt.com/docs/api/configuration/nuxt-config
|
// https://nuxt.com/docs/api/configuration/nuxt-config
|
||||||
const enableDevtools = !process.env.DISABLE_DEV_TOOLS
|
const enableDevtools = !process.env.DISABLE_DEV_TOOLS
|
||||||
|
const oneHourSeconds = 60 * 60;
|
||||||
|
const oneDaySeconds = 24 * oneHourSeconds;
|
||||||
export default defineNuxtConfig({
|
export default defineNuxtConfig({
|
||||||
experimental: { renderJsonPayloads: true },
|
experimental: { renderJsonPayloads: true },
|
||||||
compatibilityDate: '2024-11-01',
|
compatibilityDate: '2024-11-01',
|
||||||
|
@ -21,6 +23,8 @@ export default defineNuxtConfig({
|
||||||
},
|
},
|
||||||
runtimeConfig: {
|
runtimeConfig: {
|
||||||
cookieSecretKeyFile: "",
|
cookieSecretKeyFile: "",
|
||||||
|
sessionExpiresTimeout: 1 * oneHourSeconds,
|
||||||
|
sessionDiscardTimeout: 14 * oneDaySeconds,
|
||||||
vapidSubject: "",
|
vapidSubject: "",
|
||||||
vapidPrivateKeyFile: "",
|
vapidPrivateKeyFile: "",
|
||||||
public: {
|
public: {
|
||||||
|
|
|
@ -40,7 +40,7 @@ export default defineEventHandler(async (event) => {
|
||||||
// Only keep sessions that match the account id in both sets to avoid
|
// Only keep sessions that match the account id in both sets to avoid
|
||||||
// resurrecting deleted sessions. This will still cause session cross
|
// resurrecting deleted sessions. This will still cause session cross
|
||||||
// pollution if a snapshot from another instance is loaded here.
|
// pollution if a snapshot from another instance is loaded here.
|
||||||
return current && current.account.id === session.account.id;
|
return current?.accountId !== undefined && current.accountId === session.accountId;
|
||||||
}));
|
}));
|
||||||
await writeSubscriptions(snapshot.subscriptions);
|
await writeSubscriptions(snapshot.subscriptions);
|
||||||
await writeSchedule(snapshot.schedule);
|
await writeSchedule(snapshot.schedule);
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
||||||
SPDX-License-Identifier: AGPL-3.0-or-later
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
*/
|
*/
|
||||||
import { readUsers, writeUsers } from "~/server/database";
|
import { readSessions, readUsers, writeSessions, writeUsers } from "~/server/database";
|
||||||
import { apiUserPatchSchema } from "~/shared/types/api";
|
import { apiUserPatchSchema } from "~/shared/types/api";
|
||||||
import { z } from "zod/v4-mini";
|
import { z } from "zod/v4-mini";
|
||||||
import { broadcastEvent } from "~/server/streams";
|
import { broadcastEvent } from "~/server/streams";
|
||||||
|
@ -29,7 +29,8 @@ export default defineEventHandler(async (event) => {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (patch.type) {
|
let accessChanged = false;
|
||||||
|
if (patch.type && patch.type !== user.type) {
|
||||||
if (patch.type === "anonymous" || user.type === "anonymous") {
|
if (patch.type === "anonymous" || user.type === "anonymous") {
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 409,
|
status: 409,
|
||||||
|
@ -38,6 +39,7 @@ export default defineEventHandler(async (event) => {
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
user.type = patch.type;
|
user.type = patch.type;
|
||||||
|
accessChanged = true;
|
||||||
}
|
}
|
||||||
if (patch.name) {
|
if (patch.name) {
|
||||||
if (user.type === "anonymous") {
|
if (user.type === "anonymous") {
|
||||||
|
@ -54,7 +56,18 @@ export default defineEventHandler(async (event) => {
|
||||||
broadcastEvent({
|
broadcastEvent({
|
||||||
type: "user-update",
|
type: "user-update",
|
||||||
data: serverUserToApi(user),
|
data: serverUserToApi(user),
|
||||||
})
|
});
|
||||||
|
|
||||||
|
// Expire sessions with the user in it if the access changed
|
||||||
|
if (accessChanged) {
|
||||||
|
const sessions = await readSessions();
|
||||||
|
for (const session of sessions) {
|
||||||
|
if (session.accountId === user.id) {
|
||||||
|
session.expiresAtMs = 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
await writeSessions(sessions);
|
||||||
|
}
|
||||||
|
|
||||||
// Update Schedule counts.
|
// Update Schedule counts.
|
||||||
await updateScheduleInterestedCounts(users);
|
await updateScheduleInterestedCounts(users);
|
||||||
|
|
|
@ -9,20 +9,20 @@ import {
|
||||||
import { broadcastEvent, cancelAccountStreams } from "~/server/streams";
|
import { broadcastEvent, cancelAccountStreams } from "~/server/streams";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const serverSession = await requireServerSession(event);
|
const serverSession = await requireServerSessionWithUser(event);
|
||||||
let users = await readUsers();
|
let users = await readUsers();
|
||||||
|
|
||||||
// Remove sessions for this user
|
// Remove sessions for this user
|
||||||
const removedSessionIds = new Set<number>();
|
const removedSessionIds = new Set<number>();
|
||||||
let sessions = await readSessions();
|
let sessions = await readSessions();
|
||||||
sessions = sessions.filter(session => {
|
sessions = sessions.filter(session => {
|
||||||
if (session.account.id === serverSession.account.id) {
|
if (session.accountId === serverSession.accountId) {
|
||||||
removedSessionIds.add(session.id);
|
removedSessionIds.add(session.id);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
return true;
|
return true;
|
||||||
});
|
});
|
||||||
cancelAccountStreams(serverSession.account.id);
|
cancelAccountStreams(serverSession.accountId);
|
||||||
await writeSessions(sessions);
|
await writeSessions(sessions);
|
||||||
await deleteCookie(event, "session");
|
await deleteCookie(event, "session");
|
||||||
|
|
||||||
|
@ -34,7 +34,7 @@ export default defineEventHandler(async (event) => {
|
||||||
await writeSubscriptions(subscriptions);
|
await writeSubscriptions(subscriptions);
|
||||||
|
|
||||||
// Remove the user
|
// Remove the user
|
||||||
const account = users.find(user => user.id === serverSession.account.id)!;
|
const account = users.find(user => user.id === serverSession.accountId)!;
|
||||||
const now = new Date().toISOString();
|
const now = new Date().toISOString();
|
||||||
account.deleted = true;
|
account.deleted = true;
|
||||||
account.updatedAt = now;
|
account.updatedAt = now;
|
||||||
|
|
|
@ -9,7 +9,7 @@ import { z } from "zod/v4-mini";
|
||||||
|
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await requireServerSession(event);
|
const session = await requireServerSessionWithUser(event);
|
||||||
const { success, error, data: patch } = apiAccountPatchSchema.safeParse(await readBody(event));
|
const { success, error, data: patch } = apiAccountPatchSchema.safeParse(await readBody(event));
|
||||||
if (!success) {
|
if (!success) {
|
||||||
throw createError({
|
throw createError({
|
||||||
|
@ -39,7 +39,7 @@ export default defineEventHandler(async (event) => {
|
||||||
}
|
}
|
||||||
|
|
||||||
const users = await readUsers();
|
const users = await readUsers();
|
||||||
const account = users.find(user => user.id === session.account.id);
|
const account = users.find(user => user.id === session.accountId);
|
||||||
if (!account) {
|
if (!account) {
|
||||||
throw Error("Account does not exist");
|
throw Error("Account does not exist");
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,7 +6,7 @@ import { readUsers, writeUsers, nextUserId, type ServerUser } from "~/server/dat
|
||||||
import { broadcastEvent } from "~/server/streams";
|
import { broadcastEvent } from "~/server/streams";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
let session = await getServerSession(event);
|
let session = await getServerSession(event, false);
|
||||||
if (session) {
|
if (session) {
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 409,
|
status: 409,
|
||||||
|
|
|
@ -2,12 +2,15 @@
|
||||||
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
||||||
SPDX-License-Identifier: AGPL-3.0-or-later
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
*/
|
*/
|
||||||
|
import { readUsers } from "~/server/database";
|
||||||
import { cancelSessionStreams } from "~/server/streams";
|
import { cancelSessionStreams } from "~/server/streams";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await getServerSession(event);
|
const session = await getServerSession(event, true);
|
||||||
if (session) {
|
if (session) {
|
||||||
if (session.account.type === "anonymous") {
|
const users = await readUsers();
|
||||||
|
const account = users.find(user => user.id === session.accountId);
|
||||||
|
if (account?.type === "anonymous") {
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 409,
|
status: 409,
|
||||||
message: "Cannot log out of an anonymous account",
|
message: "Cannot log out of an anonymous account",
|
||||||
|
|
|
@ -2,23 +2,23 @@
|
||||||
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
SPDX-FileCopyrightText: © 2025 Hornwitser <code@hornwitser.no>
|
||||||
SPDX-License-Identifier: AGPL-3.0-or-later
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
*/
|
*/
|
||||||
import { readSubscriptions } from "~/server/database";
|
import { readSubscriptions, readUsers } from "~/server/database";
|
||||||
import type { ApiSession } from "~/shared/types/api";
|
import type { ApiSession } from "~/shared/types/api";
|
||||||
|
|
||||||
export default defineEventHandler(async (event): Promise<ApiSession | undefined> => {
|
export default defineEventHandler(async (event): Promise<ApiSession | undefined> => {
|
||||||
const session = await getServerSession(event);
|
const session = await getServerSession(event, false);
|
||||||
if (!session)
|
if (!session)
|
||||||
return;
|
return;
|
||||||
|
const users = await readUsers();
|
||||||
|
const account = users.find(user => user.id === session.accountId);
|
||||||
const subscriptions = await readSubscriptions();
|
const subscriptions = await readSubscriptions();
|
||||||
const push = Boolean(
|
const push = Boolean(
|
||||||
subscriptions.find(sub => sub.type === "push" && sub.sessionId === session.id)
|
subscriptions.find(sub => sub.type === "push" && sub.sessionId === session.id)
|
||||||
);
|
);
|
||||||
|
|
||||||
await refreshServerSession(event, session);
|
|
||||||
|
|
||||||
return {
|
return {
|
||||||
id: session.id,
|
id: session.id,
|
||||||
account: session.account,
|
account,
|
||||||
push,
|
push,
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
|
|
|
@ -6,8 +6,7 @@ import { pipeline } from "node:stream";
|
||||||
import { addStream, deleteStream } from "~/server/streams";
|
import { addStream, deleteStream } from "~/server/streams";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await getServerSession(event);
|
const session = await getServerSession(event, false);
|
||||||
const accountId = session?.account.id;
|
|
||||||
|
|
||||||
const encoder = new TextEncoder();
|
const encoder = new TextEncoder();
|
||||||
const source = event.headers.get("x-forwarded-for");
|
const source = event.headers.get("x-forwarded-for");
|
||||||
|
@ -26,7 +25,7 @@ export default defineEventHandler(async (event) => {
|
||||||
deleteStream(stream.writable);
|
deleteStream(stream.writable);
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
addStream(stream.writable, session?.id, accountId);
|
addStream(stream.writable, session?.id, session?.accountId);
|
||||||
|
|
||||||
// Workaround to properly handle stream errors. See https://github.com/unjs/h3/issues/986
|
// Workaround to properly handle stream errors. See https://github.com/unjs/h3/issues/986
|
||||||
setHeader(event, "Access-Control-Allow-Origin", "*");
|
setHeader(event, "Access-Control-Allow-Origin", "*");
|
||||||
|
|
|
@ -9,9 +9,9 @@ import { apiScheduleSchema } from "~/shared/types/api";
|
||||||
import { applyUpdatesToArray } from "~/shared/utils/update";
|
import { applyUpdatesToArray } from "~/shared/utils/update";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await requireServerSession(event);
|
const session = await requireServerSessionWithUser(event);
|
||||||
|
|
||||||
if (session.account.type !== "admin" && session.account.type !== "crew") {
|
if (session.access !== "admin" && session.access !== "crew") {
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 403,
|
status: 403,
|
||||||
statusMessage: "Forbidden",
|
statusMessage: "Forbidden",
|
||||||
|
@ -45,7 +45,7 @@ export default defineEventHandler(async (event) => {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate edit restrictions for crew
|
// Validate edit restrictions for crew
|
||||||
if (session.account.type === "crew") {
|
if (session.access === "crew") {
|
||||||
if (update.locations?.length) {
|
if (update.locations?.length) {
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 403,
|
status: 403,
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
import { readSchedule } from "~/server/database";
|
import { readSchedule } from "~/server/database";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await getServerSession(event);
|
const session = await getServerSession(event, false);
|
||||||
const schedule = await readSchedule();
|
const schedule = await readSchedule();
|
||||||
return canSeeCrew(session?.account.type) ? schedule : filterSchedule(schedule);
|
return canSeeCrew(session?.access) ? schedule : filterSchedule(schedule);
|
||||||
});
|
});
|
||||||
|
|
|
@ -11,7 +11,7 @@ const subscriptionSchema = z.strictObject({
|
||||||
});
|
});
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await requireServerSession(event);
|
const session = await requireServerSessionWithUser(event);
|
||||||
const { success, error, data: body } = subscriptionSchema.safeParse(await readBody(event));
|
const { success, error, data: body } = subscriptionSchema.safeParse(await readBody(event));
|
||||||
if (!success) {
|
if (!success) {
|
||||||
throw createError({
|
throw createError({
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
import { readSubscriptions, writeSubscriptions } from "~/server/database";
|
import { readSubscriptions, writeSubscriptions } from "~/server/database";
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await requireServerSession(event);
|
const session = await requireServerSessionWithUser(event);
|
||||||
const subscriptions = await readSubscriptions();
|
const subscriptions = await readSubscriptions();
|
||||||
const existingIndex = subscriptions.findIndex(
|
const existingIndex = subscriptions.findIndex(
|
||||||
sub => sub.type === "push" && sub.sessionId === session.id
|
sub => sub.type === "push" && sub.sessionId === session.id
|
||||||
|
|
|
@ -5,13 +5,13 @@
|
||||||
import { readUsers } from "~/server/database"
|
import { readUsers } from "~/server/database"
|
||||||
|
|
||||||
export default defineEventHandler(async (event) => {
|
export default defineEventHandler(async (event) => {
|
||||||
const session = await requireServerSession(event);
|
const session = await requireServerSessionWithUser(event);
|
||||||
const users = await readUsers();
|
const users = await readUsers();
|
||||||
|
|
||||||
if (session.account.type === "admin") {
|
if (session.access === "admin") {
|
||||||
return users.map(serverUserToApi);
|
return users.map(serverUserToApi);
|
||||||
}
|
}
|
||||||
if (session.account.type === "crew") {
|
if (session.access === "crew") {
|
||||||
return users.filter(u => u.type === "crew" || u.type === "admin").map(serverUserToApi);
|
return users.filter(u => u.type === "crew" || u.type === "admin").map(serverUserToApi);
|
||||||
}
|
}
|
||||||
throw createError({
|
throw createError({
|
||||||
|
|
|
@ -7,15 +7,14 @@ import type { ApiSchedule, ApiSubscription, ApiUserType } from "~/shared/types/a
|
||||||
import type { Id } from "~/shared/types/common";
|
import type { Id } from "~/shared/types/common";
|
||||||
|
|
||||||
export interface ServerSession {
|
export interface ServerSession {
|
||||||
id: number,
|
id: Id,
|
||||||
account: ServerUser,
|
access: ApiUserType,
|
||||||
|
accountId?: number,
|
||||||
|
expiresAtMs: number,
|
||||||
|
discardAtMs: number,
|
||||||
|
successor?: Id,
|
||||||
};
|
};
|
||||||
|
|
||||||
interface StoredSession {
|
|
||||||
id: number,
|
|
||||||
accountId: number,
|
|
||||||
}
|
|
||||||
|
|
||||||
export interface ServerUser {
|
export interface ServerUser {
|
||||||
id: Id,
|
id: Id,
|
||||||
updatedAt: string,
|
updatedAt: string,
|
||||||
|
@ -131,26 +130,9 @@ export async function nextSessionId() {
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function readSessions() {
|
export async function readSessions() {
|
||||||
const users = await readUsers();
|
return readJson<ServerSession[]>(sessionsPath, [])
|
||||||
const sessions: ServerSession[] = [];
|
|
||||||
for (const stored of await readJson<StoredSession[]>(sessionsPath, [])) {
|
|
||||||
const user = users.find(user => user.id === stored.accountId);
|
|
||||||
if (user) {
|
|
||||||
sessions.push({
|
|
||||||
id: stored.id,
|
|
||||||
account: user,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return sessions;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function writeSessions(sessions: ServerSession[]) {
|
export async function writeSessions(sessions: ServerSession[]) {
|
||||||
const stored: StoredSession[] = sessions.map(
|
await writeFile(sessionsPath, JSON.stringify(sessions, undefined, "\t") + "\n", "utf-8");
|
||||||
session => ({
|
|
||||||
id: session.id,
|
|
||||||
accountId: session.account.id,
|
|
||||||
}),
|
|
||||||
);
|
|
||||||
await writeFile(sessionsPath, JSON.stringify(stored, undefined, "\t") + "\n", "utf-8");
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,9 +3,16 @@
|
||||||
SPDX-License-Identifier: AGPL-3.0-or-later
|
SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
*/
|
*/
|
||||||
import type { H3Event } from "h3";
|
import type { H3Event } from "h3";
|
||||||
import { nextSessionId, readSessions, readSubscriptions, type ServerSession, type ServerUser, writeSessions, writeSubscriptions } from "~/server/database";
|
import {
|
||||||
|
nextSessionId,
|
||||||
const oneYearSeconds = 365 * 24 * 60 * 60;
|
readSessions,
|
||||||
|
readSubscriptions,
|
||||||
|
readUsers,
|
||||||
|
type ServerSession,
|
||||||
|
type ServerUser,
|
||||||
|
writeSessions,
|
||||||
|
writeSubscriptions
|
||||||
|
} from "~/server/database";
|
||||||
|
|
||||||
async function removeSessionSubscription(sessionId: number) {
|
async function removeSessionSubscription(sessionId: number) {
|
||||||
const subscriptions = await readSubscriptions();
|
const subscriptions = await readSubscriptions();
|
||||||
|
@ -40,48 +47,105 @@ export async function clearServerSession(event: H3Event) {
|
||||||
|
|
||||||
export async function setServerSession(event: H3Event, account: ServerUser) {
|
export async function setServerSession(event: H3Event, account: ServerUser) {
|
||||||
const sessions = await readSessions();
|
const sessions = await readSessions();
|
||||||
|
const runtimeConfig = useRuntimeConfig(event);
|
||||||
await clearServerSessionInternal(event, sessions);
|
await clearServerSessionInternal(event, sessions);
|
||||||
|
|
||||||
|
const now = Date.now();
|
||||||
const newSession: ServerSession = {
|
const newSession: ServerSession = {
|
||||||
account,
|
accountId: account.id,
|
||||||
|
access: account.type,
|
||||||
|
expiresAtMs: now + runtimeConfig.sessionExpiresTimeout * 1000,
|
||||||
|
discardAtMs: now + runtimeConfig.sessionDiscardTimeout * 1000,
|
||||||
id: await nextSessionId(),
|
id: await nextSessionId(),
|
||||||
};
|
};
|
||||||
|
|
||||||
sessions.push(newSession);
|
sessions.push(newSession);
|
||||||
await writeSessions(sessions);
|
await writeSessions(sessions);
|
||||||
await setSignedCookie(event, "session", String(newSession.id), oneYearSeconds)
|
await setSignedCookie(event, "session", String(newSession.id), runtimeConfig.sessionDiscardTimeout)
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function refreshServerSession(event: H3Event, session: ServerSession) {
|
async function rotateSession(event: H3Event, sessions: ServerSession[], session: ServerSession) {
|
||||||
await setSignedCookie(event, "session", String(session.id), oneYearSeconds)
|
const runtimeConfig = useRuntimeConfig(event);
|
||||||
|
const users = await readUsers();
|
||||||
|
const account = users.find(user => user.id === session.accountId);
|
||||||
|
const now = Date.now();
|
||||||
|
const newSession: ServerSession = {
|
||||||
|
accountId: account?.id,
|
||||||
|
access: account?.type ?? "anonymous",
|
||||||
|
expiresAtMs: now + runtimeConfig.sessionExpiresTimeout * 1000,
|
||||||
|
discardAtMs: now + runtimeConfig.sessionDiscardTimeout * 1000,
|
||||||
|
id: await nextSessionId(),
|
||||||
|
};
|
||||||
|
session.successor = newSession.id;
|
||||||
|
sessions.push(newSession);
|
||||||
|
await writeSessions(sessions);
|
||||||
|
await setSignedCookie(event, "session", String(newSession.id), runtimeConfig.sessionDiscardTimeout)
|
||||||
|
return newSession;
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function getServerSession(event: H3Event) {
|
export async function getServerSession(event: H3Event, ignoreExpired: boolean) {
|
||||||
const sessionCookie = await getSignedCookie(event, "session");
|
const sessionCookie = await getSignedCookie(event, "session");
|
||||||
if (sessionCookie) {
|
if (sessionCookie) {
|
||||||
const sessionId = parseInt(sessionCookie, 10);
|
const sessionId = parseInt(sessionCookie, 10);
|
||||||
const sessions = await readSessions();
|
const sessions = await readSessions();
|
||||||
return sessions.find(session => session.id === sessionId);
|
const session = sessions.find(session => session.id === sessionId);
|
||||||
|
if (session) {
|
||||||
|
if (!ignoreExpired && session.successor !== undefined) {
|
||||||
|
throw createError({
|
||||||
|
statusCode: 403,
|
||||||
|
statusMessage: "Forbidden",
|
||||||
|
message: "Session has been taken by another agent.",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
const now = Date.now();
|
||||||
|
if (now >= session?.discardAtMs) {
|
||||||
|
return undefined;
|
||||||
|
}
|
||||||
|
if (!ignoreExpired && now >= session?.expiresAtMs) {
|
||||||
|
return await rotateSession(event, sessions, session);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return session;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function requireServerSession(event: H3Event) {
|
export async function requireServerSession(event: H3Event, message: string) {
|
||||||
const session = await getServerSession(event);
|
const session = await getServerSession(event, false);
|
||||||
if (!session)
|
if (!session)
|
||||||
throw createError({
|
throw createError({
|
||||||
status: 401,
|
statusCode: 401,
|
||||||
message: "Account session required",
|
statusMessage: "Unauthorized",
|
||||||
|
message,
|
||||||
});
|
});
|
||||||
return session;
|
return session;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export async function requireServerSessionWithUser(event: H3Event) {
|
||||||
|
const message = "User session required";
|
||||||
|
const session = await requireServerSession(event, message);
|
||||||
|
const users = await readUsers();
|
||||||
|
const account = users.find(user => user.id === session.accountId);
|
||||||
|
if (session.accountId === undefined || !account)
|
||||||
|
throw createError({
|
||||||
|
statusCode: 401,
|
||||||
|
statusMessage: "Uauthorized",
|
||||||
|
message,
|
||||||
|
});
|
||||||
|
return { ...session, accountId: session.accountId };
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
export async function requireServerSessionWithAdmin(event: H3Event) {
|
export async function requireServerSessionWithAdmin(event: H3Event) {
|
||||||
const session = await requireServerSession(event);
|
const message = "Admin session required";
|
||||||
if (session.account.type !== "admin") {
|
const session = await requireServerSession(event, message);
|
||||||
|
const users = await readUsers();
|
||||||
|
const account = users.find(user => user.id === session.accountId);
|
||||||
|
if (session.access !== "admin" || account?.type !== "admin") {
|
||||||
throw createError({
|
throw createError({
|
||||||
statusCode: 403,
|
statusCode: 403,
|
||||||
statusMessage: "Forbidden",
|
statusMessage: "Forbidden",
|
||||||
|
message,
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
return session;
|
return { ...session, accountId: session.accountId };
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue