security improvements

This commit is contained in:
2025-10-07 13:39:53 -04:00
parent a4aca9c99d
commit 329becfb08
11 changed files with 287 additions and 35 deletions

View File

@@ -1,8 +1,26 @@
import { getUserByUsername } from '~/server/utils/database'
import { setAuthCookie } from '~/server/utils/auth'
import { getUserByUsername, checkRateLimit, resetRateLimit, createSession } from '~/server/utils/database'
import { setAuthCookie, generateSessionToken } from '~/server/utils/auth'
import bcrypt from 'bcrypt'
export default defineEventHandler(async (event) => {
// Get client IP for rate limiting
const clientIp = getRequestIP(event) || 'unknown'
// Log IP for verification (helps ensure correct public IP is captured)
console.log(`[LOGIN ATTEMPT] IP: ${clientIp}, Headers:`, {
'x-forwarded-for': getHeader(event, 'x-forwarded-for'),
'x-real-ip': getHeader(event, 'x-real-ip'),
'cf-connecting-ip': getHeader(event, 'cf-connecting-ip')
})
// Check rate limit: 5 attempts per 15 minutes
if (!checkRateLimit(clientIp, 'login', 5, 15)) {
throw createError({
statusCode: 429,
message: 'Too many login attempts. Please try again in 15 minutes.'
})
}
const body = await readBody(event)
const { username, password } = body
@@ -16,6 +34,7 @@ export default defineEventHandler(async (event) => {
const user = getUserByUsername(username.toLowerCase())
if (!user) {
console.log(`[LOGIN FAILED] Username not found: ${username.toLowerCase()}, IP: ${clientIp}`)
throw createError({
statusCode: 401,
message: 'Invalid credentials'
@@ -26,13 +45,26 @@ export default defineEventHandler(async (event) => {
const passwordMatch = await bcrypt.compare(password, user.password)
if (!passwordMatch) {
console.log(`[LOGIN FAILED] Invalid password for user: ${username.toLowerCase()}, IP: ${clientIp}`)
throw createError({
statusCode: 401,
message: 'Invalid credentials'
})
}
setAuthCookie(event, user.username)
// Generate session token and create session
const sessionToken = generateSessionToken()
const expiresAt = new Date(Date.now() + 24 * 60 * 60 * 1000).toISOString() // 24 hours
createSession(sessionToken, user.username, expiresAt)
// Set session cookie
setAuthCookie(event, sessionToken)
// Reset rate limit on successful login
resetRateLimit(clientIp, 'login')
// Log successful login
console.log(`[LOGIN SUCCESS] User: ${user.username}, IP: ${clientIp}`)
return {
success: true,

View File

@@ -1,6 +1,16 @@
import { clearAuthCookie } from '~/server/utils/auth'
import { clearAuthCookie, getAuthCookie } from '~/server/utils/auth'
import { deleteSession } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
// Get session token from cookie
const sessionToken = getAuthCookie(event)
// Delete session from database if it exists
if (sessionToken) {
deleteSession(sessionToken)
}
// Clear the cookie
clearAuthCookie(event)
return {

View File

@@ -1,7 +1,25 @@
import { createUser, getUserByUsername, getUserByEmail } from '~/server/utils/database'
import { setAuthCookie } from '~/server/utils/auth'
import { createUser, getUserByUsername, getUserByEmail, checkRateLimit, createSession } from '~/server/utils/database'
import { setAuthCookie, generateSessionToken } from '~/server/utils/auth'
export default defineEventHandler(async (event) => {
// Get client IP for rate limiting
const clientIp = getRequestIP(event) || 'unknown'
// Log IP for verification
console.log(`[REGISTER ATTEMPT] IP: ${clientIp}, Headers:`, {
'x-forwarded-for': getHeader(event, 'x-forwarded-for'),
'x-real-ip': getHeader(event, 'x-real-ip'),
'cf-connecting-ip': getHeader(event, 'cf-connecting-ip')
})
// Check rate limit: 3 attempts per hour
if (!checkRateLimit(clientIp, 'register', 3, 60)) {
throw createError({
statusCode: 429,
message: 'Too many registration attempts. Please try again in 1 hour.'
})
}
const body = await readBody(event)
const { username, password, email, firstName, lastName } = body
@@ -80,8 +98,16 @@ export default defineEventHandler(async (event) => {
// Create the new user with all fields
createUser(username.toLowerCase(), password, email.toLowerCase(), firstName, lastName)
// Log them in automatically
setAuthCookie(event, username.toLowerCase())
// Generate session token and create session for auto-login
const sessionToken = generateSessionToken()
const expiresAt = new Date(Date.now() + 24 * 60 * 60 * 1000).toISOString() // 24 hours
createSession(sessionToken, username.toLowerCase(), expiresAt)
// Set session cookie
setAuthCookie(event, sessionToken)
// Log successful registration
console.log(`[REGISTER SUCCESS] User: ${username.toLowerCase()}, IP: ${clientIp}`)
return {
success: true,

View File

@@ -1,8 +1,8 @@
import { getAuthCookie, clearAuthCookie } from '~/server/utils/auth'
import { getSessionUsername, clearAuthCookie } from '~/server/utils/auth'
import { getUserByUsername } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
const username = getAuthCookie(event)
const username = await getSessionUsername(event)
if (!username) {
return {

View File

@@ -1,15 +1,27 @@
import { isAuthenticated } from '~/server/utils/auth'
import { archiveSermon } from '~/server/utils/database'
import { getAuthCookie } from '~/server/utils/auth'
import { archiveSermon, getUserByUsername } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
// Check authentication
if (!isAuthenticated(event)) {
const username = getAuthCookie(event)
if (!username) {
throw createError({
statusCode: 401,
message: 'Unauthorized'
})
}
// Check admin role
const user = getUserByUsername(username)
if (!user || user.is_admin !== 1) {
throw createError({
statusCode: 403,
message: 'Forbidden - Admin access required'
})
}
const id = getRouterParam(event, 'id')
if (!id) {

View File

@@ -1,15 +1,27 @@
import { isAuthenticated } from '~/server/utils/auth'
import { getDatabase } from '~/server/utils/database'
import { getAuthCookie } from '~/server/utils/auth'
import { getDatabase, getUserByUsername } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
// Check authentication
if (!isAuthenticated(event)) {
const username = getAuthCookie(event)
if (!username) {
throw createError({
statusCode: 401,
message: 'Unauthorized'
})
}
// Check admin role
const user = getUserByUsername(username)
if (!user || user.is_admin !== 1) {
throw createError({
statusCode: 403,
message: 'Forbidden - Admin access required'
})
}
const id = getRouterParam(event, 'id')
if (!id) {

View File

@@ -1,15 +1,27 @@
import { createSermon } from '~/server/utils/database'
import { isAuthenticated } from '~/server/utils/auth'
import { createSermon, getUserByUsername } from '~/server/utils/database'
import { getAuthCookie } from '~/server/utils/auth'
export default defineEventHandler(async (event) => {
// Check authentication
if (!isAuthenticated(event)) {
const username = getAuthCookie(event)
if (!username) {
throw createError({
statusCode: 401,
message: 'Unauthorized'
})
}
// Check admin role
const user = getUserByUsername(username)
if (!user || user.is_admin !== 1) {
throw createError({
statusCode: 403,
message: 'Forbidden - Admin access required'
})
}
const body = await readBody(event)
const { slug, title, date, dates, bible_references, personal_appliance, pastors_challenge, worship_songs } = body

View File

@@ -1,15 +1,27 @@
import { isAuthenticated } from '~/server/utils/auth'
import { getDatabase } from '~/server/utils/database'
import { getAuthCookie } from '~/server/utils/auth'
import { getDatabase, getUserByUsername } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
// Check authentication
if (!isAuthenticated(event)) {
const username = getAuthCookie(event)
if (!username) {
throw createError({
statusCode: 401,
message: 'Unauthorized'
})
}
// Check admin role
const user = getUserByUsername(username)
if (!user || user.is_admin !== 1) {
throw createError({
statusCode: 403,
message: 'Forbidden - Admin access required'
})
}
const id = getRouterParam(event, 'id')
if (!id) {

View File

@@ -1,15 +1,27 @@
import { isAuthenticated } from '~/server/utils/auth'
import { getDatabase } from '~/server/utils/database'
import { getAuthCookie } from '~/server/utils/auth'
import { getDatabase, getUserByUsername } from '~/server/utils/database'
export default defineEventHandler(async (event) => {
// Check authentication
if (!isAuthenticated(event)) {
const username = getAuthCookie(event)
if (!username) {
throw createError({
statusCode: 401,
message: 'Unauthorized'
})
}
// Check admin role
const user = getUserByUsername(username)
if (!user || user.is_admin !== 1) {
throw createError({
statusCode: 403,
message: 'Forbidden - Admin access required'
})
}
const id = getRouterParam(event, 'id')
if (!id) {

View File

@@ -1,29 +1,58 @@
import { H3Event } from 'h3'
import crypto from 'crypto'
export function setAuthCookie(event: H3Event, username: string) {
setCookie(event, 'auth', username, {
// Generate a secure random session token
export function generateSessionToken(): string {
return crypto.randomBytes(32).toString('hex')
}
export function setAuthCookie(event: H3Event, sessionToken: string) {
setCookie(event, 'session_token', sessionToken, {
httpOnly: true,
secure: process.env.NODE_ENV === 'production',
maxAge: 60 * 60 * 24 * 7, // 7 days
path: '/'
maxAge: 60 * 60 * 24, // 24 hours (shorter than before for better security)
path: '/',
sameSite: 'lax'
})
}
export function getAuthCookie(event: H3Event) {
return getCookie(event, 'auth')
export function getAuthCookie(event: H3Event): string | undefined {
return getCookie(event, 'session_token')
}
// Async version that validates session and returns username
export async function getAuthUsername(event: H3Event): Promise<string | null> {
return await getSessionUsername(event)
}
export function clearAuthCookie(event: H3Event) {
deleteCookie(event, 'auth')
deleteCookie(event, 'session_token')
}
export async function getSessionUsername(event: H3Event): Promise<string | null> {
const token = getAuthCookie(event)
if (!token) {
return null
}
const { getSessionByToken, deleteSession } = await import('./database')
const session = getSessionByToken(token)
if (!session) {
clearAuthCookie(event)
return null
}
return session.username
}
export function isAuthenticated(event: H3Event): boolean {
const auth = getAuthCookie(event)
return !!auth
const token = getAuthCookie(event)
return !!token
}
export async function getAuthUser(event: H3Event) {
const username = getAuthCookie(event)
const username = await getSessionUsername(event)
if (!username) {
return null
}

View File

@@ -44,6 +44,22 @@ export interface SermonNote {
updated_at?: string
}
export interface Session {
id?: number
token: string
username: string
expires_at: string
created_at?: string
}
export interface RateLimit {
id?: number
identifier: string
endpoint: string
attempts: number
reset_at: string
}
export function getDatabase() {
if (!db) {
const dbPath = join(process.cwd(), 'data', 'sermons.db')
@@ -102,6 +118,27 @@ export function getDatabase() {
)
`)
db.exec(`
CREATE TABLE IF NOT EXISTS sessions (
id INTEGER PRIMARY KEY AUTOINCREMENT,
token TEXT UNIQUE NOT NULL,
username TEXT NOT NULL,
expires_at DATETIME NOT NULL,
created_at DATETIME DEFAULT CURRENT_TIMESTAMP
)
`)
db.exec(`
CREATE TABLE IF NOT EXISTS rate_limits (
id INTEGER PRIMARY KEY AUTOINCREMENT,
identifier TEXT NOT NULL,
endpoint TEXT NOT NULL,
attempts INTEGER DEFAULT 1,
reset_at DATETIME NOT NULL,
UNIQUE(identifier, endpoint)
)
`)
// Insert default admin user from environment variables with hashed password
const config = useRuntimeConfig()
const adminUsername = config.adminUsername
@@ -249,3 +286,61 @@ export function deleteSermonNote(userId: number, sermonId: number) {
const db = getDatabase()
return db.prepare('DELETE FROM sermon_notes WHERE user_id = ? AND sermon_id = ?').run(userId, sermonId)
}
// Session management functions
export function createSession(token: string, username: string, expiresAt: string) {
const db = getDatabase()
return db.prepare('INSERT INTO sessions (token, username, expires_at) VALUES (?, ?, ?)')
.run(token, username, expiresAt)
}
export function getSessionByToken(token: string) {
const db = getDatabase()
return db.prepare("SELECT * FROM sessions WHERE token = ? AND expires_at > datetime('now')")
.get(token) as Session | undefined
}
export function deleteSession(token: string) {
const db = getDatabase()
return db.prepare('DELETE FROM sessions WHERE token = ?').run(token)
}
export function deleteExpiredSessions() {
const db = getDatabase()
return db.prepare("DELETE FROM sessions WHERE expires_at <= datetime('now')").run()
}
// Rate limiting functions
export function checkRateLimit(identifier: string, endpoint: string, maxAttempts: number, windowMinutes: number): boolean {
const db = getDatabase()
// Clean up expired rate limit records
db.prepare("DELETE FROM rate_limits WHERE reset_at <= datetime('now')").run()
const existing = db.prepare('SELECT * FROM rate_limits WHERE identifier = ? AND endpoint = ?')
.get(identifier, endpoint) as RateLimit | undefined
if (!existing) {
// First attempt - create new record
const resetAt = new Date(Date.now() + windowMinutes * 60 * 1000).toISOString()
db.prepare('INSERT INTO rate_limits (identifier, endpoint, attempts, reset_at) VALUES (?, ?, 1, ?)')
.run(identifier, endpoint, resetAt)
return true
}
if (existing.attempts >= maxAttempts) {
// Rate limit exceeded
return false
}
// Increment attempts
db.prepare('UPDATE rate_limits SET attempts = attempts + 1 WHERE identifier = ? AND endpoint = ?')
.run(identifier, endpoint)
return true
}
export function resetRateLimit(identifier: string, endpoint: string) {
const db = getDatabase()
return db.prepare('DELETE FROM rate_limits WHERE identifier = ? AND endpoint = ?')
.run(identifier, endpoint)
}