Files
GRH/water-api/src/services/auth.service.ts
Exteban08 613fb2d787 Add 3-level role permissions, organismos operadores, and Histórico de Tomas page
Implements the full ADMIN → ORGANISMO_OPERADOR → OPERATOR permission hierarchy
with scope-filtered data access across all backend services. Adds organismos
operadores management (ADMIN only) and a new Histórico page for viewing
per-meter reading history with chart, consumption stats, and CSV export.

Key changes:
- Backend: 3-level scope filtering on all services (meters, readings, projects, users)
- Backend: Protect GET /meters routes with authenticateToken for role-based filtering
- Backend: Pass requestingUser to reading service for scoped meter readings
- Frontend: New HistoricoPage with meter selector, AreaChart, paginated table
- Frontend: Consumption cards (Actual, Pasado, Diferencial) above date filters
- Frontend: Meter search by name, serial, location, CESPT account, cadastral key
- Frontend: OrganismosPage, updated Sidebar with 3-level visibility
- SQL migrations for organismos_operadores table and FK columns

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-09 10:21:33 +00:00

273 lines
6.6 KiB
TypeScript

import { query } from '../config/database';
import {
generateAccessToken,
generateRefreshToken,
verifyRefreshToken,
} from '../utils/jwt';
import { comparePassword } from '../utils/password';
import crypto from 'crypto';
/**
* Hash a token for storage
*/
function hashToken(token: string): string {
return crypto.createHash('sha256').update(token).digest('hex');
}
/**
* Authentication service response types
*/
export interface AuthTokens {
accessToken: string;
refreshToken: string;
}
export interface UserProfile {
id: string;
email: string;
name: string;
role: string;
avatarUrl?: string | null;
projectId?: string | null;
organismoOperadorId?: string | null;
organismoName?: string | null;
createdAt: Date;
}
export interface LoginResult extends AuthTokens {
user: UserProfile;
}
/**
* Authenticate user with email and password
* Generates access and refresh tokens on successful login
* Stores hashed refresh token in database
* @param email - User email
* @param password - User password
* @returns Access and refresh tokens with user info
*/
export async function login(
email: string,
password: string
): Promise<LoginResult> {
// Find user by email with role name and organismo
const userResult = await query<{
id: string;
email: string;
name: string;
password_hash: string;
avatar_url: string | null;
role_name: string;
project_id: string | null;
organismo_operador_id: string | null;
created_at: Date;
}>(
`SELECT u.id, u.email, u.name, u.password_hash, u.avatar_url, r.name as role_name, u.project_id, u.organismo_operador_id, u.created_at
FROM users u
JOIN roles r ON u.role_id = r.id
WHERE LOWER(u.email) = LOWER($1) AND u.is_active = true
LIMIT 1`,
[email]
);
const user = userResult.rows[0];
if (!user) {
throw new Error('Invalid email or password');
}
// Verify password
const isValidPassword = await comparePassword(password, user.password_hash);
if (!isValidPassword) {
throw new Error('Invalid email or password');
}
const accessToken = generateAccessToken({
userId: user.id,
email: user.email,
roleId: user.id,
roleName: user.role_name,
projectId: user.project_id,
organismoOperadorId: user.organismo_operador_id,
});
const refreshToken = generateRefreshToken({
userId: user.id,
});
// Hash and store refresh token
const hashedRefreshToken = hashToken(refreshToken);
const expiresAt = new Date(Date.now() + 7 * 24 * 60 * 60 * 1000); // 7 days
await query(
`INSERT INTO refresh_tokens (user_id, token_hash, expires_at)
VALUES ($1, $2, $3)`,
[user.id, hashedRefreshToken, expiresAt]
);
// Update last login
await query(
`UPDATE users SET last_login = NOW() WHERE id = $1`,
[user.id]
);
return {
accessToken,
refreshToken,
user: {
id: user.id,
email: user.email,
name: user.name,
role: user.role_name,
avatarUrl: user.avatar_url,
createdAt: user.created_at,
},
};
}
/**
* Refresh access token using a valid refresh token
* Verifies the refresh token exists in database and is not expired
* @param refreshToken - The refresh token
* @returns New access token
*/
export async function refresh(refreshToken: string): Promise<{ accessToken: string }> {
// Verify JWT signature
const decoded = verifyRefreshToken(refreshToken);
if (!decoded) {
throw new Error('Invalid refresh token');
}
// Hash token to check against database
const hashedToken = hashToken(refreshToken);
const userId = (decoded as any).userId || (decoded as any).id;
const tokenResult = await query<{
id: string;
expires_at: Date;
}>(
`SELECT id, expires_at FROM refresh_tokens
WHERE token_hash = $1 AND user_id = $2 AND revoked_at IS NULL
LIMIT 1`,
[hashedToken, userId]
);
const storedToken = tokenResult.rows[0];
if (!storedToken) {
throw new Error('Refresh token not found or revoked');
}
// Check if token is expired
if (new Date() > storedToken.expires_at) {
// Clean up expired token
await query(
`DELETE FROM refresh_tokens WHERE id = $1`,
[storedToken.id]
);
throw new Error('Refresh token expired');
}
// Get user data for new access token
const userResult = await query<{
id: string;
email: string;
role_name: string;
project_id: string | null;
organismo_operador_id: string | null;
}>(
`SELECT u.id, u.email, r.name as role_name, u.project_id, u.organismo_operador_id
FROM users u
JOIN roles r ON u.role_id = r.id
WHERE u.id = $1 AND u.is_active = true
LIMIT 1`,
[userId]
);
const user = userResult.rows[0];
if (!user) {
throw new Error('User not found');
}
const accessToken = generateAccessToken({
userId: user.id,
email: user.email,
roleId: user.id,
roleName: user.role_name,
projectId: user.project_id,
organismoOperadorId: user.organismo_operador_id,
});
return { accessToken };
}
/**
* Logout user by revoking the specified refresh token
* @param userId - The user ID
* @param refreshToken - The refresh token to revoke
*/
export async function logout(
userId: string,
refreshToken: string
): Promise<void> {
const hashedToken = hashToken(refreshToken);
// Revoke the specific refresh token
await query(
`UPDATE refresh_tokens SET revoked_at = NOW()
WHERE token_hash = $1 AND user_id = $2`,
[hashedToken, userId]
);
}
/**
* Get authenticated user's profile
* @param userId - The user ID
* @returns User profile data
*/
export async function getMe(userId: string): Promise<UserProfile> {
const userResult = await query<{
id: string;
email: string;
name: string;
avatar_url: string | null;
role_name: string;
project_id: string | null;
organismo_operador_id: string | null;
organismo_name: string | null;
created_at: Date;
}>(
`SELECT u.id, u.email, u.name, u.avatar_url, r.name as role_name, u.project_id,
u.organismo_operador_id, oo.name as organismo_name, u.created_at
FROM users u
JOIN roles r ON u.role_id = r.id
LEFT JOIN organismos_operadores oo ON u.organismo_operador_id = oo.id
WHERE u.id = $1 AND u.is_active = true
LIMIT 1`,
[userId]
);
const user = userResult.rows[0];
if (!user) {
throw new Error('User not found');
}
return {
id: user.id,
email: user.email,
name: user.name,
role: user.role_name,
avatarUrl: user.avatar_url,
projectId: user.project_id,
organismoOperadorId: user.organismo_operador_id,
organismoName: user.organismo_name,
createdAt: user.created_at,
};
}