Files
retail-nest/docs/AUTH_SYSTEM.md
2025-10-10 16:04:10 +07:00

591 lines
12 KiB
Markdown

# JWT Authentication System - Retail POS API
## Overview
A complete JWT-based authentication system for the NestJS Retail POS backend, implementing secure user authentication, role-based access control (RBAC), and comprehensive user management.
## Features
- JWT authentication with Passport.js
- Role-based access control (Admin, Manager, Cashier, User)
- Secure password hashing with bcrypt (10 rounds)
- Global authentication guards with public route support
- Token validation and refresh mechanism
- User management with CRUD operations
- Swagger API documentation
- TypeORM database integration
---
## Architecture
### Modules
1. **AuthModule** (`src/modules/auth/`)
- Authentication logic
- JWT token generation and validation
- Login and registration endpoints
- Password validation
2. **UsersModule** (`src/modules/users/`)
- User CRUD operations
- User repository pattern
- Role management
3. **Common Guards** (`src/common/guards/`)
- Global JWT authentication guard
- Role-based authorization guard
4. **Common Decorators** (`src/common/decorators/`)
- @CurrentUser() - Extract user from request
- @Public() - Mark routes as public
- @Roles() - Specify required roles
---
## User Roles
```typescript
enum UserRole {
ADMIN = 'admin', // Full access to all endpoints
MANAGER = 'manager', // Product and category management
CASHIER = 'cashier', // Transaction processing only
USER = 'user', // Read-only access
}
```
---
## API Endpoints
### Authentication Endpoints
#### 1. Register User
```http
POST /api/auth/register
Content-Type: application/json
{
"name": "John Doe",
"email": "john@example.com",
"password": "Password123!",
"roles": ["user"] // Optional, defaults to ["user"]
}
```
**Response:**
```json
{
"access_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
"user": {
"id": "uuid",
"name": "John Doe",
"email": "john@example.com",
"roles": ["user"],
"isActive": true,
"createdAt": "2025-01-15T10:00:00.000Z"
}
}
```
**Validation Rules:**
- Name: Required, max 255 characters
- Email: Valid email format, unique
- Password: Min 8 characters, must contain uppercase, lowercase, and number
- Roles: Optional array of valid UserRole values
---
#### 2. Login User
```http
POST /api/auth/login
Content-Type: application/json
{
"email": "admin@retailpos.com",
"password": "Admin123!"
}
```
**Response:**
```json
{
"access_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
"user": {
"id": "uuid",
"name": "Admin User",
"email": "admin@retailpos.com",
"roles": ["admin"],
"isActive": true,
"createdAt": "2025-01-15T10:00:00.000Z"
}
}
```
---
#### 3. Get Current User Profile
```http
GET /api/auth/profile
Authorization: Bearer <access_token>
```
**Response:**
```json
{
"success": true,
"data": {
"id": "uuid",
"email": "admin@retailpos.com",
"name": "Admin User",
"roles": ["admin"],
"isActive": true
}
}
```
---
#### 4. Refresh Access Token
```http
POST /api/auth/refresh
Authorization: Bearer <access_token>
```
**Response:**
```json
{
"access_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
"user": {
"id": "uuid",
"name": "Admin User",
"email": "admin@retailpos.com",
"roles": ["admin"],
"isActive": true,
"createdAt": "2025-01-15T10:00:00.000Z"
}
}
```
---
### User Management Endpoints (Protected)
#### 1. Get All Users (Admin/Manager)
```http
GET /api/users
Authorization: Bearer <access_token>
```
**Required Roles:** Admin, Manager
---
#### 2. Get User by ID (Admin/Manager)
```http
GET /api/users/:id
Authorization: Bearer <access_token>
```
**Required Roles:** Admin, Manager
---
#### 3. Create User (Admin Only)
```http
POST /api/users
Authorization: Bearer <access_token>
Content-Type: application/json
{
"name": "New User",
"email": "newuser@example.com",
"password": "Password123!",
"roles": ["cashier"],
"isActive": true
}
```
**Required Roles:** Admin
---
#### 4. Update User (Admin Only)
```http
PATCH /api/users/:id
Authorization: Bearer <access_token>
Content-Type: application/json
{
"name": "Updated Name",
"roles": ["manager"],
"isActive": false
}
```
**Required Roles:** Admin
**Note:** Password cannot be updated via this endpoint
---
#### 5. Delete User (Admin Only)
```http
DELETE /api/users/:id
Authorization: Bearer <access_token>
```
**Required Roles:** Admin
**Response:** 204 No Content
---
## Usage Examples
### 1. Using @Public() Decorator
Mark routes as public (skip JWT authentication):
```typescript
@Controller('products')
export class ProductsController {
@Get()
@Public() // This route is accessible without authentication
async findAll() {
return this.productsService.findAll();
}
@Post()
// This route requires authentication (global guard)
async create(@Body() dto: CreateProductDto) {
return this.productsService.create(dto);
}
}
```
---
### 2. Using @Roles() Decorator
Restrict routes to specific roles:
```typescript
@Controller('products')
export class ProductsController {
@Post()
@Roles(UserRole.ADMIN, UserRole.MANAGER) // Only admin and manager can create
async create(@Body() dto: CreateProductDto) {
return this.productsService.create(dto);
}
@Delete(':id')
@Roles(UserRole.ADMIN) // Only admin can delete
async remove(@Param('id') id: string) {
return this.productsService.remove(id);
}
}
```
---
### 3. Using @CurrentUser() Decorator
Extract current user from request:
```typescript
@Controller('profile')
export class ProfileController {
@Get()
@UseGuards(JwtAuthGuard)
async getProfile(@CurrentUser() user: User) {
// user object is automatically extracted from request
return {
id: user.id,
email: user.email,
name: user.name,
};
}
}
```
---
## Security Features
### Password Security
- **Hashing Algorithm:** bcrypt with 10 salt rounds
- **Validation Rules:**
- Minimum 8 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one number
- **Password Exclusion:** Password field is never returned in API responses (@Exclude decorator)
### JWT Configuration
- **Secret:** Configured via JWT_SECRET environment variable
- **Expiration:** 1 day (configurable via JWT_EXPIRES_IN)
- **Token Storage:** Client-side (localStorage or secure storage)
- **Token Format:** Bearer token in Authorization header
### Global Guards
- **JWT Authentication:** Applied globally to all routes
- **Public Routes:** Use @Public() decorator to bypass authentication
- **Role-Based Access:** Use @Roles() decorator for authorization
---
## Database Schema
### Users Table
```sql
CREATE TABLE users (
id UUID PRIMARY KEY DEFAULT uuid_generate_v4(),
name VARCHAR(255) NOT NULL,
email VARCHAR(255) UNIQUE NOT NULL,
password VARCHAR(255) NOT NULL,
roles TEXT NOT NULL DEFAULT 'user',
isActive BOOLEAN DEFAULT true,
createdAt TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
updatedAt TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
INDEX idx_users_email (email)
);
```
---
## Environment Variables
```bash
# JWT Configuration
JWT_SECRET=retail-pos-super-secret-key-change-in-production-2025
JWT_EXPIRES_IN=1d
# Database
DB_HOST=localhost
DB_PORT=5432
DB_USERNAME=postgres
DB_PASSWORD=postgres
DB_DATABASE=retail_pos
# Bcrypt
BCRYPT_ROUNDS=10
```
---
## Setup Instructions
### 1. Install Dependencies
All required dependencies are already installed:
- @nestjs/jwt
- @nestjs/passport
- passport
- passport-jwt
- bcrypt
### 2. Run Database Migration
```bash
npm run migration:run
```
### 3. Seed Default Users
```bash
npm run seed:run
```
This creates three default users:
- **Admin:** admin@retailpos.com / Admin123!
- **Manager:** manager@retailpos.com / Manager123!
- **Cashier:** cashier@retailpos.com / Cashier123!
### 4. Start Development Server
```bash
npm run start:dev
```
### 5. Access Swagger Documentation
Open browser: http://localhost:3000/api/docs
---
## Testing the Authentication System
### 1. Test Login
```bash
curl -X POST http://localhost:3000/api/auth/login \
-H "Content-Type: application/json" \
-d '{
"email": "admin@retailpos.com",
"password": "Admin123!"
}'
```
### 2. Test Protected Endpoint
```bash
# Get the access_token from login response
curl -X GET http://localhost:3000/api/auth/profile \
-H "Authorization: Bearer YOUR_ACCESS_TOKEN"
```
### 3. Test Role-Based Access
```bash
# Admin only endpoint (get all users)
curl -X GET http://localhost:3000/api/users \
-H "Authorization: Bearer YOUR_ADMIN_TOKEN"
```
---
## File Structure
```
src/
├── modules/
│ ├── auth/
│ │ ├── dto/
│ │ │ ├── login.dto.ts
│ │ │ ├── register.dto.ts
│ │ │ ├── auth-response.dto.ts
│ │ │ └── index.ts
│ │ ├── guards/
│ │ │ ├── jwt-auth.guard.ts
│ │ │ └── local-auth.guard.ts
│ │ ├── interfaces/
│ │ │ └── jwt-payload.interface.ts
│ │ ├── strategies/
│ │ │ ├── jwt.strategy.ts
│ │ │ └── local.strategy.ts
│ │ ├── auth.controller.ts
│ │ ├── auth.service.ts
│ │ └── auth.module.ts
│ └── users/
│ ├── dto/
│ │ ├── create-user.dto.ts
│ │ ├── update-user.dto.ts
│ │ ├── user-response.dto.ts
│ │ └── index.ts
│ ├── entities/
│ │ └── user.entity.ts
│ ├── users.controller.ts
│ ├── users.service.ts
│ ├── users.repository.ts
│ └── users.module.ts
├── common/
│ ├── decorators/
│ │ ├── current-user.decorator.ts
│ │ ├── public.decorator.ts
│ │ ├── roles.decorator.ts
│ │ └── index.ts
│ └── guards/
│ ├── jwt-auth.guard.ts
│ ├── roles.guard.ts
│ └── index.ts
└── database/
├── migrations/
│ └── 1704470000000-CreateUsersTable.ts
└── seeds/
├── users.seed.ts
└── run-seeds.ts
```
---
## Best Practices
1. **Never log passwords** - Always hash before storing
2. **Use HTTPS in production** - Never send tokens over HTTP
3. **Rotate JWT secrets regularly** - Update JWT_SECRET periodically
4. **Implement refresh tokens** - For long-lived sessions
5. **Log authentication events** - Track login attempts and failures
6. **Rate limit auth endpoints** - Prevent brute force attacks
7. **Validate all inputs** - Use DTOs with class-validator
8. **Handle token expiration** - Provide clear error messages
9. **Use strong passwords** - Enforce password complexity
10. **Implement account lockout** - After multiple failed attempts
---
## Error Responses
### 400 Bad Request
```json
{
"success": false,
"error": {
"statusCode": 400,
"message": "Validation failed",
"details": [
"password must be at least 8 characters long",
"email must be a valid email address"
]
},
"timestamp": "2025-01-15T10:00:00.000Z",
"path": "/api/auth/register"
}
```
### 401 Unauthorized
```json
{
"success": false,
"error": {
"statusCode": 401,
"message": "Invalid credentials"
},
"timestamp": "2025-01-15T10:00:00.000Z",
"path": "/api/auth/login"
}
```
### 403 Forbidden
```json
{
"success": false,
"error": {
"statusCode": 403,
"message": "Insufficient permissions"
},
"timestamp": "2025-01-15T10:00:00.000Z",
"path": "/api/users"
}
```
### 409 Conflict
```json
{
"success": false,
"error": {
"statusCode": 409,
"message": "Email already registered"
},
"timestamp": "2025-01-15T10:00:00.000Z",
"path": "/api/auth/register"
}
```
---
## Next Steps
1. **Implement Refresh Tokens:** Add refresh token table and rotation logic
2. **Add Email Verification:** Send verification emails on registration
3. **Implement Password Reset:** Forgot password functionality
4. **Add Two-Factor Authentication:** Enhanced security with 2FA
5. **Implement Session Management:** Track active sessions
6. **Add Rate Limiting:** Protect against brute force attacks
7. **Implement Account Lockout:** Lock accounts after failed attempts
8. **Add Audit Logging:** Track all authentication events
9. **Implement Social Login:** Google, Facebook, etc.
10. **Add API Key Authentication:** For service-to-service communication
---
## Support
For issues or questions:
- GitHub Issues: [Create an issue](https://github.com/yourusername/retail-pos)
- Email: support@retailpos.com
- Documentation: http://localhost:3000/api/docs