- Introduced optional JWT issuer and audience configurations in the JoseJwtService for improved token validation. - Updated CSRF middleware to streamline token validation and enhance security measures. - Added new environment variables for JWT issuer and audience, allowing for more flexible authentication setups. - Refactored CSRF controller and middleware to improve token handling and security checks. - Cleaned up and standardized cookie paths for access and refresh tokens in the AuthController. - Enhanced error handling in the TokenBlacklistService to manage Redis availability more effectively.
5.3 KiB
5.3 KiB
🔐 Authentication Module Architecture (2025)
Overview
The authentication feature in apps/bff now follows a layered structure that separates HTTP concerns, orchestration logic, and infrastructure details. This document explains the layout, responsibilities, and integration points so new contributors can quickly locate code and understand the data flow.
modules/auth/
├── application/
│ └── auth.facade.ts
├── presentation/
│ ├── http/
│ │ ├── auth.controller.ts
│ │ ├── guards/
│ │ └── interceptors/
│ └── strategies/
├── infra/
│ ├── token/
│ ├── rate-limiting/
│ └── workflows/
├── decorators/
├── domain/ (reserved for future policies/types)
└── utils/
Layer Responsibilities
| Layer | Purpose |
|---|---|
presentation |
HTTP surface area (controllers, guards, interceptors, Passport strategies). |
application |
Use-case orchestration (AuthFacade), coordinating infra + audit logging. |
infra |
Technical services: token issuance, rate limiting, WHMCS/SF workflows. |
decorators |
Shared Nest decorators (e.g., @Public). |
domain |
(Future) domain policies, constants, pure type definitions. |
Presentation Layer
Controllers (presentation/http/auth.controller.ts)
- Routes mirror previous
auth-zod.controller.tsfunctionality. - All validation still uses Zod schemas from
@customer-portal/domainapplied viaZodValidationPipe. - Cookies are managed with
setSecureCookiehelper registered inbootstrap.ts.
Guards
GlobalAuthGuard: wraps Passport JWT, checks blacklist viaTokenBlacklistService.AuthThrottleGuard: Nest Throttler-based guard for general rate limits.FailedLoginThrottleGuard: usesAuthRateLimitServicefor login attempt limiting.
Interceptors
LoginResultInterceptor: ties intoFailedLoginThrottleGuardto clear counters on success/failure.
Strategies (presentation/strategies)
LocalStrategy: delegates credential validation toAuthFacade.validateUser.JwtStrategy: loads user viaUsersServiceand maps to public profile.
Application Layer
AuthFacade
- Aggregates all auth flows: login/logout, signup, password flows, WHMCS link, token refresh, session logout.
- Injects infrastructure services (token, workflows, rate limiting), audit logging, config, and Prisma.
- Acts as single DI target for controllers, strategies, and guards.
Infrastructure Layer
Token (infra/token)
token.service.ts: issues/rotates access + refresh tokens, enforces Redis-backed refresh token families.token-blacklist.service.ts: stores revoked access tokens.
Rate Limiting (infra/rate-limiting/auth-rate-limit.service.ts)
- Built on
rate-limiter-flexiblewith Redis storage. - Exposes methods for login, signup, password reset, refresh token throttling.
- Handles CAPTCHA escalation via headers (config-driven, see env variables).
Workflows (infra/workflows)
signup-workflow.service.ts: orchestrates Salesforce + WHMCS checks and user creation.password-workflow.service.ts: request reset, change password, set password flows.whmcs-link-workflow.service.ts: links existing WHMCS accounts with portal users.
Configuration & Env
Relevant env keys validated in core/config/env.validation.ts:
# Auth rate limits
LOGIN_RATE_LIMIT_LIMIT=5
LOGIN_RATE_LIMIT_TTL=900000
AUTH_REFRESH_RATE_LIMIT_LIMIT=10
AUTH_REFRESH_RATE_LIMIT_TTL=300000
# CAPTCHA options (future integration)
AUTH_CAPTCHA_PROVIDER=none # none|turnstile|hcaptcha
AUTH_CAPTCHA_SECRET=
AUTH_CAPTCHA_THRESHOLD=0
AUTH_CAPTCHA_ALWAYS_ON=false
# CSRF
CSRF_TOKEN_EXPIRY=3600000
CSRF_SECRET_KEY=... # recommended in prod
CSRF_COOKIE_NAME=csrf-secret
CSRF_HEADER_NAME=X-CSRF-Token
Refer to DEVELOPMENT-AUTH-SETUP.md for dev-only overrides (DISABLE_CSRF, etc.).
CSRF Summary
core/security/controllers/csrf.controller.tsissues stateless HMAC tokens atGET /api/security/csrf/token.- Portal fetches the token once and sends it as
X-CSRF-Tokenfor unsafe methods. core/security/middleware/csrf.middleware.tsvalidatesX-CSRF-Tokenfor unsafe methods and skips safe methods/exempt routes.
Rate Limiting Summary
AuthRateLimitServiceprovides atomic Redis counters viarate-limiter-flexible.- Guards/workflows invoke
consume*methods and respond with rate-limit errors/headers.
Integration Notes
- Use absolute imports (e.g.,
@bff/modules/auth/application/auth.facade) to avoid fragile relative paths. AuthModuleexportsAuthFacadeand token services so other modules (e.g., admin tasks) can reuse them.- Frontend API calls remain unchanged; payloads validated with existing Zod schemas.
Future Work (Optional Enhancements)
- Populate
domain/with password policy objects, role constants, etc. - Add
application/commands/for discrete use-case handlers if flows expand. - Introduce MFA/session management when business requirements demand it.
Last Updated: 2025-10-02