Skip to content

Commit 6aecdf7

Browse files
author
Patrick Baker
committed
feat(auth): make crypto async
- Update tests and add new test for changed password - User.authenticate() User.makeSalt() and User.encryptPassword() public API remains same - User.authenticate() User.makeSalt() and User.encryptPassword() callbacks are optional - Change User schema from hashedPassword to password - Remove unnecessary virtual attribute User.password, getters and setters are not async
1 parent c018ae8 commit 6aecdf7

File tree

5 files changed

+141
-53
lines changed

5 files changed

+141
-53
lines changed

app/templates/server/.jshintrc

+1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
{
2+
"expr": true,
23
"node": true,
34
"esnext": true,
45
"bitwise": true,

app/templates/server/api/user(auth)/user.controller.js

+15-11
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ var validationError = function(res, err) {
1414
* restriction: 'admin'
1515
*/
1616
exports.index = function(req, res) {
17-
User.find({}, '-salt -hashedPassword', function (err, users) {
17+
User.find({}, '-salt -password', function (err, users) {
1818
if(err) return res.send(500, err);
1919
res.json(200, users);
2020
});
@@ -67,15 +67,19 @@ exports.changePassword = function(req, res, next) {
6767
var newPass = String(req.body.newPassword);
6868

6969
User.findById(userId, function (err, user) {
70-
if(user.authenticate(oldPass)) {
71-
user.password = newPass;
72-
user.save(function(err) {
73-
if (err) return validationError(res, err);
74-
res.send(200);
75-
});
76-
} else {
77-
res.send(403);
78-
}
70+
user.authenticate(oldPass, function(authErr, authenticated) {
71+
if (authErr) res.send(403);
72+
73+
if (authenticated) {
74+
user.password = newPass;
75+
user.save(function(err) {
76+
if (err) return validationError(res, err);
77+
res.send(200);
78+
});
79+
} else {
80+
res.send(403);
81+
}
82+
});
7983
});
8084
};
8185

@@ -86,7 +90,7 @@ exports.me = function(req, res, next) {
8690
var userId = req.user._id;
8791
User.findOne({
8892
_id: userId
89-
}, '-salt -hashedPassword', function(err, user) { // don't ever give out the password or salt
93+
}, '-salt -password', function(err, user) { // don't ever give out the password or salt
9094
if (err) return next(err);
9195
if (!user) return res.json(401);
9296
res.json(user);

app/templates/server/api/user(auth)/user.model.js

+78-26
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ var UserSchema = new Schema({
1212
type: String,
1313
default: 'user'
1414
},
15-
hashedPassword: String,
15+
password: String,
1616
provider: String,
1717
salt: String<% if (filters.oauth) { %>,<% if (filters.facebookAuth) { %>
1818
facebook: {},<% } %><% if (filters.twitterAuth) { %>
@@ -24,16 +24,6 @@ var UserSchema = new Schema({
2424
/**
2525
* Virtuals
2626
*/
27-
UserSchema
28-
.virtual('password')
29-
.set(function(password) {
30-
this._password = password;
31-
this.salt = this.makeSalt();
32-
this.hashedPassword = this.encryptPassword(password);
33-
})
34-
.get(function() {
35-
return this._password;
36-
});
3727

3828
// Public profile information
3929
UserSchema
@@ -69,10 +59,10 @@ UserSchema
6959

7060
// Validate empty password
7161
UserSchema
72-
.path('hashedPassword')
73-
.validate(function(hashedPassword) {<% if (filters.oauth) { %>
62+
.path('password')
63+
.validate(function(password) {<% if (filters.oauth) { %>
7464
if (authTypes.indexOf(this.provider) !== -1) return true;<% } %>
75-
return hashedPassword.length;
65+
return password.length;
7666
}, 'Password cannot be blank');
7767

7868
// Validate email is not taken
@@ -99,12 +89,26 @@ var validatePresenceOf = function(value) {
9989
*/
10090
UserSchema
10191
.pre('save', function(next) {
102-
if (!this.isNew) return next();
103-
104-
if (!validatePresenceOf(this.hashedPassword)<% if (filters.oauth) { %> && authTypes.indexOf(this.provider) === -1<% } %>)
105-
next(new Error('Invalid password'));
106-
else
92+
// Handle new/update passwords
93+
if (this.password) {
94+
if (!validatePresenceOf(this.password)<% if (filters.oauth) { %> && authTypes.indexOf(this.provider) === -1<% } %>)
95+
next(new Error('Invalid password'));
96+
97+
// Make salt with a callback
98+
var _this = this;
99+
this.makeSalt(function(saltErr, salt) {
100+
if (saltErr) next(saltErr);
101+
_this.salt = salt;
102+
// Async hash
103+
_this.encryptPassword(_this.password, function(encryptErr, hashedPassword) {
104+
if (encryptErr) next(encryptErr);
105+
_this.password = hashedPassword;
106+
next();
107+
});
108+
});
109+
} else {
107110
next();
111+
}
108112
});
109113

110114
/**
@@ -115,34 +119,82 @@ UserSchema.methods = {
115119
* Authenticate - check if the passwords are the same
116120
*
117121
* @param {String} plainText
122+
* @callback {callback} Optional callback
118123
* @return {Boolean}
119124
* @api public
120125
*/
121-
authenticate: function(plainText) {
122-
return this.encryptPassword(plainText) === this.hashedPassword;
126+
authenticate: function(password, callback) {
127+
if (!callback)
128+
return this.password === this.encryptPassword(password);
129+
130+
var _this = this;
131+
this.encryptPassword(password, function(err, pwdGen) {
132+
if (err) callback(err);
133+
134+
if (_this.password === pwdGen) {
135+
callback(null, true);
136+
} else {
137+
callback(null, false);
138+
}
139+
});
123140
},
124141

125142
/**
126143
* Make salt
127144
*
145+
* @param {Number} byteSize Optional salt byte size, default to 16
146+
* @callback {callback} Optional callback
128147
* @return {String}
129148
* @api public
130149
*/
131-
makeSalt: function() {
132-
return crypto.randomBytes(16).toString('base64');
150+
makeSalt: function(byteSize, callback) {
151+
var defaultByteSize = 16;
152+
153+
if (typeof arguments[0] === 'function') {
154+
callback = arguments[0];
155+
byteSize = defaultByteSize;
156+
} else if (typeof arguments[1] === 'function') {
157+
callback = arguments[1];
158+
}
159+
160+
if (!byteSize) {
161+
byteSize = defaultByteSize;
162+
}
163+
164+
if (!callback) {
165+
return crypto.randomBytes(byteSize).toString('base64');
166+
}
167+
168+
return crypto.randomBytes(byteSize, function(err, salt) {
169+
if (err) callback(err);
170+
return callback(null, salt.toString('base64'));
171+
});
133172
},
134173

135174
/**
136175
* Encrypt password
137176
*
138177
* @param {String} password
178+
* @callback {callback} Optional callback
139179
* @return {String}
140180
* @api public
141181
*/
142-
encryptPassword: function(password) {
143-
if (!password || !this.salt) return '';
182+
encryptPassword: function(password, callback) {
183+
if (!password || !this.salt) {
184+
return null;
185+
}
186+
187+
var defaultIterations = 10000;
188+
var defaultKeyLength = 64;
144189
var salt = new Buffer(this.salt, 'base64');
145-
return crypto.pbkdf2Sync(password, salt, 10000, 64).toString('base64');
190+
191+
if (!callback)
192+
return crypto.pbkdf2Sync(password, salt, defaultIterations, defaultKeyLength).toString('base64');
193+
194+
return crypto.pbkdf2(password, salt, defaultIterations, defaultKeyLength, function(err, key) {
195+
if (err) callback(err);
196+
return callback(null, key.toString('base64'));
197+
});
146198
}
147199
};
148200

app/templates/server/api/user(auth)/user.model.spec.js

+38-11
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,9 @@ var should = require('should');
44
var app = require('../../app');
55
var User = require('./user.model');
66

7-
var user = new User({
8-
provider: 'local',
9-
name: 'Fake User',
10-
email: 'test@test.com',
11-
password: 'password'
12-
});
13-
147
describe('User Model', function() {
8+
var user;
9+
1510
before(function(done) {
1611
// Clear users before testing
1712
User.remove().exec().then(function() {
@@ -20,6 +15,15 @@ describe('User Model', function() {
2015
});
2116

2217
afterEach(function(done) {
18+
// Start from scratch
19+
user = new User({
20+
provider: 'local',
21+
name: 'Fake User',
22+
email: 'test@test.com',
23+
password: 'password'
24+
});
25+
26+
// Clear all users
2327
User.remove().exec().then(function() {
2428
done();
2529
});
@@ -50,11 +54,34 @@ describe('User Model', function() {
5054
});
5155
});
5256

53-
it("should authenticate user if password is valid", function() {
54-
return user.authenticate('password').should.be.true;
57+
it("should authenticate user if password is valid", function(done) {
58+
user.save(function(err, newUser) {
59+
newUser.authenticate('password', function(authErr, authenticated) {
60+
authenticated.should.be.true;
61+
done();
62+
});
63+
});
64+
});
65+
66+
it("should not authenticate user if password is invalid", function(done) {
67+
user.save(function(err, newUser) {
68+
newUser.authenticate('invalidPassword', function(authErr, authenticated) {
69+
authenticated.should.not.be.true;
70+
done();
71+
});
72+
});
5573
});
5674

57-
it("should not authenticate user if password is invalid", function() {
58-
return user.authenticate('blah').should.not.be.true;
75+
it("should authenticate after updating password", function(done) {
76+
user.save(function(err, newUser) {
77+
newUser.password = 'newPassword';
78+
newUser.save(function() {
79+
newUser.authenticate('newPassword', function(authErr, authenticated) {
80+
authenticated.should.be.true;
81+
done();
82+
});
83+
});
84+
});
5985
});
86+
6087
});

app/templates/server/auth(auth)/local/passport.js

+9-5
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,15 @@ exports.setup = function (User, config) {
1515
if (!user) {
1616
return done(null, false, { message: 'This email is not registered.' });
1717
}
18-
if (!user.authenticate(password)) {
19-
return done(null, false, { message: 'This password is not correct.' });
20-
}
21-
return done(null, user);
18+
user.authenticate(password, function(authError, authenticated) {
19+
if (authError) return done(authError);
20+
if (!authenticated) {
21+
return done(null, false, { message: 'This password is not correct.' });
22+
} else {
23+
return done(null, user);
24+
}
25+
});
2226
});
2327
}
2428
));
25-
};
29+
};

0 commit comments

Comments
 (0)