2022-08-11 14:50:05 +02:00
|
|
|
const { DocumentType, SEPARATOR, ViewName, getAllApps } = require("./db/utils")
|
2021-04-11 12:35:55 +02:00
|
|
|
const jwt = require("jsonwebtoken")
|
|
|
|
const { options } = require("./middleware/passport/jwt")
|
2022-02-11 23:24:48 +01:00
|
|
|
const { queryGlobalView } = require("./db/views")
|
2022-04-08 02:28:22 +02:00
|
|
|
const { Headers, Cookies, MAX_VALID_DATE } = require("./constants")
|
2021-10-06 16:15:46 +02:00
|
|
|
const env = require("./environment")
|
2022-04-08 02:28:22 +02:00
|
|
|
const userCache = require("./cache/user")
|
2022-08-05 18:13:03 +02:00
|
|
|
const {
|
|
|
|
getSessionsForUser,
|
|
|
|
invalidateSessions,
|
|
|
|
} = require("./security/sessions")
|
2022-04-05 17:56:28 +02:00
|
|
|
const events = require("./events")
|
2022-03-23 17:45:06 +01:00
|
|
|
const tenancy = require("./tenancy")
|
2021-04-08 12:20:37 +02:00
|
|
|
|
2022-08-11 14:50:05 +02:00
|
|
|
const APP_PREFIX = DocumentType.APP + SEPARATOR
|
2022-03-23 17:45:06 +01:00
|
|
|
const PROD_APP_PREFIX = "/app/"
|
2021-04-08 12:20:37 +02:00
|
|
|
|
|
|
|
function confirmAppId(possibleAppId) {
|
|
|
|
return possibleAppId && possibleAppId.startsWith(APP_PREFIX)
|
|
|
|
? possibleAppId
|
|
|
|
: undefined
|
|
|
|
}
|
|
|
|
|
2022-03-23 17:45:06 +01:00
|
|
|
async function resolveAppUrl(ctx) {
|
|
|
|
const appUrl = ctx.path.split("/")[2]
|
|
|
|
let possibleAppUrl = `/${appUrl.toLowerCase()}`
|
|
|
|
|
|
|
|
let tenantId = tenancy.getTenantId()
|
|
|
|
if (!env.SELF_HOSTED && ctx.subdomains.length) {
|
|
|
|
// always use the tenant id from the url in cloud
|
|
|
|
tenantId = ctx.subdomains[0]
|
|
|
|
}
|
|
|
|
|
|
|
|
// search prod apps for a url that matches
|
|
|
|
const apps = await tenancy.doInTenant(tenantId, () =>
|
|
|
|
getAllApps({ dev: false })
|
|
|
|
)
|
|
|
|
const app = apps.filter(
|
|
|
|
a => a.url && a.url.toLowerCase() === possibleAppUrl
|
|
|
|
)[0]
|
|
|
|
|
|
|
|
return app && app.appId ? app.appId : undefined
|
|
|
|
}
|
2022-09-06 13:25:57 +02:00
|
|
|
|
|
|
|
exports.isServingApp = ctx => {
|
|
|
|
// dev app
|
|
|
|
if (ctx.path.startsWith(`/${APP_PREFIX}`)) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
// prod app
|
|
|
|
if (ctx.path.startsWith(PROD_APP_PREFIX)) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
2022-03-23 17:45:06 +01:00
|
|
|
|
2021-04-08 12:20:37 +02:00
|
|
|
/**
|
|
|
|
* Given a request tries to find the appId, which can be located in various places
|
|
|
|
* @param {object} ctx The main request body to look through.
|
|
|
|
* @returns {string|undefined} If an appId was found it will be returned.
|
|
|
|
*/
|
2022-03-23 17:45:06 +01:00
|
|
|
exports.getAppIdFromCtx = async ctx => {
|
|
|
|
// look in headers
|
|
|
|
const options = [ctx.headers[Headers.APP_ID]]
|
2021-04-08 12:20:37 +02:00
|
|
|
let appId
|
|
|
|
for (let option of options) {
|
|
|
|
appId = confirmAppId(option)
|
|
|
|
if (appId) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-23 17:45:06 +01:00
|
|
|
// look in body
|
2021-04-08 12:20:37 +02:00
|
|
|
if (!appId && ctx.request.body && ctx.request.body.appId) {
|
|
|
|
appId = confirmAppId(ctx.request.body.appId)
|
|
|
|
}
|
2022-03-23 17:45:06 +01:00
|
|
|
|
|
|
|
// look in the url - dev app
|
2021-04-08 12:20:37 +02:00
|
|
|
let appPath =
|
|
|
|
ctx.request.headers.referrer ||
|
|
|
|
ctx.path.split("/").filter(subPath => subPath.startsWith(APP_PREFIX))
|
2022-03-23 17:45:06 +01:00
|
|
|
if (!appId && appPath.length) {
|
2021-04-08 12:20:37 +02:00
|
|
|
appId = confirmAppId(appPath[0])
|
|
|
|
}
|
2022-03-23 17:45:06 +01:00
|
|
|
|
|
|
|
// look in the url - prod app
|
|
|
|
if (!appId && ctx.path.startsWith(PROD_APP_PREFIX)) {
|
|
|
|
appId = confirmAppId(await resolveAppUrl(ctx))
|
|
|
|
}
|
|
|
|
|
2021-04-08 12:20:37 +02:00
|
|
|
return appId
|
|
|
|
}
|
|
|
|
|
2021-12-17 15:08:48 +01:00
|
|
|
/**
|
|
|
|
* opens the contents of the specified encrypted JWT.
|
|
|
|
* @return {object} the contents of the token.
|
|
|
|
*/
|
|
|
|
exports.openJwt = token => {
|
|
|
|
if (!token) {
|
|
|
|
return token
|
|
|
|
}
|
|
|
|
return jwt.verify(token, options.secretOrKey)
|
|
|
|
}
|
|
|
|
|
2021-04-11 12:35:55 +02:00
|
|
|
/**
|
|
|
|
* Get a cookie from context, and decrypt if necessary.
|
|
|
|
* @param {object} ctx The request which is to be manipulated.
|
|
|
|
* @param {string} name The name of the cookie to get.
|
|
|
|
*/
|
2021-04-12 19:31:58 +02:00
|
|
|
exports.getCookie = (ctx, name) => {
|
|
|
|
const cookie = ctx.cookies.get(name)
|
2021-04-11 12:35:55 +02:00
|
|
|
|
2021-04-12 19:31:58 +02:00
|
|
|
if (!cookie) {
|
|
|
|
return cookie
|
|
|
|
}
|
2021-04-11 12:35:55 +02:00
|
|
|
|
2021-12-17 15:08:48 +01:00
|
|
|
return exports.openJwt(cookie)
|
2021-04-11 12:35:55 +02:00
|
|
|
}
|
|
|
|
|
2021-04-08 12:20:37 +02:00
|
|
|
/**
|
2021-07-06 19:10:04 +02:00
|
|
|
* Store a cookie for the request - it will not expire.
|
2021-04-08 12:20:37 +02:00
|
|
|
* @param {object} ctx The request which is to be manipulated.
|
|
|
|
* @param {string} name The name of the cookie to set.
|
|
|
|
* @param {string|object} value The value of cookie which will be set.
|
2021-12-03 13:39:20 +01:00
|
|
|
* @param {object} opts options like whether to sign.
|
2021-04-08 12:20:37 +02:00
|
|
|
*/
|
2022-01-26 10:33:14 +01:00
|
|
|
exports.setCookie = (ctx, value, name = "builder", opts = { sign: true }) => {
|
2021-12-03 13:39:20 +01:00
|
|
|
if (value && opts && opts.sign) {
|
2021-07-06 19:10:04 +02:00
|
|
|
value = jwt.sign(value, options.secretOrKey)
|
2021-09-29 14:51:33 +02:00
|
|
|
}
|
2021-09-28 17:35:31 +02:00
|
|
|
|
2021-09-29 14:51:33 +02:00
|
|
|
const config = {
|
2021-12-03 13:39:20 +01:00
|
|
|
expires: MAX_VALID_DATE,
|
2021-09-29 14:51:33 +02:00
|
|
|
path: "/",
|
|
|
|
httpOnly: false,
|
|
|
|
overwrite: true,
|
|
|
|
}
|
2021-09-28 17:35:31 +02:00
|
|
|
|
2022-04-08 02:28:22 +02:00
|
|
|
if (env.COOKIE_DOMAIN) {
|
|
|
|
config.domain = env.COOKIE_DOMAIN
|
2021-04-08 12:20:37 +02:00
|
|
|
}
|
2021-09-29 14:51:33 +02:00
|
|
|
|
|
|
|
ctx.cookies.set(name, value, config)
|
2021-04-08 12:20:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Utility function, simply calls setCookie with an empty string for value
|
|
|
|
*/
|
|
|
|
exports.clearCookie = (ctx, name) => {
|
2021-04-23 19:07:39 +02:00
|
|
|
exports.setCookie(ctx, null, name)
|
2021-04-08 12:20:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Checks if the API call being made (based on the provided ctx object) is from the client. If
|
|
|
|
* the call is not from a client app then it is from the builder.
|
|
|
|
* @param {object} ctx The koa context object to be tested.
|
|
|
|
* @return {boolean} returns true if the call is from the client lib (a built app rather than the builder).
|
|
|
|
*/
|
|
|
|
exports.isClient = ctx => {
|
2021-07-23 16:29:14 +02:00
|
|
|
return ctx.headers[Headers.TYPE] === "client"
|
2021-04-08 12:20:37 +02:00
|
|
|
}
|
2021-04-19 18:31:47 +02:00
|
|
|
|
2022-04-25 16:38:37 +02:00
|
|
|
const getBuilders = async () => {
|
2022-08-11 14:50:05 +02:00
|
|
|
const builders = await queryGlobalView(ViewName.USER_BY_BUILDERS, {
|
2022-03-22 01:23:22 +01:00
|
|
|
include_docs: false,
|
|
|
|
})
|
2022-04-25 16:38:37 +02:00
|
|
|
|
|
|
|
if (!builders) {
|
|
|
|
return []
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Array.isArray(builders)) {
|
|
|
|
return builders
|
|
|
|
} else {
|
|
|
|
return [builders]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
exports.getBuildersCount = async () => {
|
|
|
|
const builders = await getBuilders()
|
2022-03-25 17:08:12 +01:00
|
|
|
return builders.length
|
2022-03-04 14:42:50 +01:00
|
|
|
}
|
|
|
|
|
2021-10-12 17:13:54 +02:00
|
|
|
/**
|
|
|
|
* Logs a user out from budibase. Re-used across account portal and builder.
|
|
|
|
*/
|
2021-10-13 13:26:26 +02:00
|
|
|
exports.platformLogout = async ({ ctx, userId, keepActiveSession }) => {
|
|
|
|
if (!ctx) throw new Error("Koa context must be supplied to logout.")
|
|
|
|
|
2022-02-04 18:35:45 +01:00
|
|
|
const currentSession = exports.getCookie(ctx, Cookies.Auth)
|
2022-08-05 18:13:03 +02:00
|
|
|
let sessions = await getSessionsForUser(userId)
|
2021-10-12 17:13:54 +02:00
|
|
|
|
|
|
|
if (keepActiveSession) {
|
2021-10-13 13:26:26 +02:00
|
|
|
sessions = sessions.filter(
|
|
|
|
session => session.sessionId !== currentSession.sessionId
|
|
|
|
)
|
2021-10-12 20:49:34 +02:00
|
|
|
} else {
|
2021-10-13 13:26:26 +02:00
|
|
|
// clear cookies
|
2022-02-04 18:35:45 +01:00
|
|
|
exports.clearCookie(ctx, Cookies.Auth)
|
|
|
|
exports.clearCookie(ctx, Cookies.CurrentApp)
|
2021-10-12 17:13:54 +02:00
|
|
|
}
|
|
|
|
|
2022-08-05 18:13:03 +02:00
|
|
|
const sessionIds = sessions.map(({ sessionId }) => sessionId)
|
|
|
|
await invalidateSessions(userId, { sessionIds, reason: "logout" })
|
2022-05-23 23:14:44 +02:00
|
|
|
await events.auth.logout()
|
2022-03-03 08:20:30 +01:00
|
|
|
await userCache.invalidateUser(userId)
|
2021-10-12 17:13:54 +02:00
|
|
|
}
|
2022-06-23 21:22:51 +02:00
|
|
|
|
|
|
|
exports.timeout = timeMs => {
|
|
|
|
return new Promise(resolve => setTimeout(resolve, timeMs))
|
|
|
|
}
|