2022-08-25 20:41:47 +02:00
|
|
|
import Router from "@koa/router"
|
2020-12-16 20:50:02 +01:00
|
|
|
const compress = require("koa-compress")
|
|
|
|
const zlib = require("zlib")
|
2022-08-25 20:41:47 +02:00
|
|
|
import { routes } from "./routes"
|
|
|
|
import {
|
2022-01-12 12:32:14 +01:00
|
|
|
buildAuthMiddleware,
|
|
|
|
auditLog,
|
|
|
|
buildTenancyMiddleware,
|
2022-01-25 23:54:50 +01:00
|
|
|
buildCsrfMiddleware,
|
2022-08-25 20:41:47 +02:00
|
|
|
} from "@budibase/backend-core/auth"
|
|
|
|
import { middleware as pro } from "@budibase/pro"
|
|
|
|
import { errors } from "@budibase/backend-core"
|
|
|
|
import { APIError } from "@budibase/types"
|
2021-08-02 19:34:43 +02:00
|
|
|
|
2021-05-05 16:10:28 +02:00
|
|
|
const PUBLIC_ENDPOINTS = [
|
2021-08-05 13:00:33 +02:00
|
|
|
// old deprecated endpoints kept for backwards compat
|
|
|
|
{
|
|
|
|
route: "/api/admin/auth/google/callback",
|
|
|
|
method: "GET",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
route: "/api/admin/auth/oidc/callback",
|
|
|
|
method: "GET",
|
|
|
|
},
|
2021-04-28 19:13:21 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
// this covers all of the POST auth routes
|
|
|
|
route: "/api/global/auth/:tenantId",
|
2021-04-28 19:13:21 +02:00
|
|
|
method: "POST",
|
|
|
|
},
|
2021-05-05 16:10:28 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
// this covers all of the GET auth routes
|
|
|
|
route: "/api/global/auth/:tenantId",
|
2021-06-27 16:46:04 +02:00
|
|
|
method: "GET",
|
2021-04-28 19:13:21 +02:00
|
|
|
},
|
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
// this covers all of the public config routes
|
|
|
|
route: "/api/global/configs/public",
|
2021-04-28 19:13:21 +02:00
|
|
|
method: "GET",
|
|
|
|
},
|
2021-05-05 16:10:28 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
route: "/api/global/configs/checklist",
|
2021-08-04 11:02:24 +02:00
|
|
|
method: "GET",
|
2021-05-05 16:10:28 +02:00
|
|
|
},
|
2021-05-06 12:56:53 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
route: "/api/global/users/init",
|
2021-07-16 16:08:58 +02:00
|
|
|
method: "POST",
|
2021-05-06 12:56:53 +02:00
|
|
|
},
|
2021-08-03 16:32:25 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
route: "/api/global/users/invite/accept",
|
|
|
|
method: "POST",
|
2021-08-03 16:32:25 +02:00
|
|
|
},
|
|
|
|
{
|
2021-09-14 15:18:13 +02:00
|
|
|
route: "api/system/environment",
|
2021-08-04 11:02:24 +02:00
|
|
|
method: "GET",
|
|
|
|
},
|
2022-02-24 15:41:24 +01:00
|
|
|
{
|
|
|
|
route: "api/system/status",
|
|
|
|
method: "GET",
|
|
|
|
},
|
2021-09-07 12:22:11 +02:00
|
|
|
{
|
|
|
|
route: "/api/global/users/tenant/:id",
|
|
|
|
method: "GET",
|
|
|
|
},
|
2021-08-05 10:59:08 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
const NO_TENANCY_ENDPOINTS = [
|
|
|
|
...PUBLIC_ENDPOINTS,
|
2021-08-04 11:02:24 +02:00
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
route: "/api/system",
|
|
|
|
method: "ALL",
|
2021-08-03 16:32:25 +02:00
|
|
|
},
|
|
|
|
{
|
2021-08-05 10:59:08 +02:00
|
|
|
route: "/api/global/users/self",
|
2021-08-03 16:32:25 +02:00
|
|
|
method: "GET",
|
|
|
|
},
|
2022-02-14 19:11:35 +01:00
|
|
|
{
|
|
|
|
route: "/api/global/self",
|
|
|
|
method: "GET",
|
|
|
|
},
|
2021-04-26 16:44:28 +02:00
|
|
|
]
|
2020-12-16 20:50:02 +01:00
|
|
|
|
2022-01-25 23:54:50 +01:00
|
|
|
// most public endpoints are gets, but some are posts
|
|
|
|
// add them all to be safe
|
|
|
|
const NO_CSRF_ENDPOINTS = [...PUBLIC_ENDPOINTS]
|
|
|
|
|
2020-12-16 20:50:02 +01:00
|
|
|
const router = new Router()
|
|
|
|
router
|
|
|
|
.use(
|
|
|
|
compress({
|
|
|
|
threshold: 2048,
|
|
|
|
gzip: {
|
2021-03-29 16:06:00 +02:00
|
|
|
flush: zlib.constants.Z_SYNC_FLUSH,
|
2020-12-16 20:50:02 +01:00
|
|
|
},
|
|
|
|
deflate: {
|
2021-03-29 16:06:00 +02:00
|
|
|
flush: zlib.constants.Z_SYNC_FLUSH,
|
2020-12-16 20:50:02 +01:00
|
|
|
},
|
|
|
|
br: false,
|
|
|
|
})
|
|
|
|
)
|
2021-05-04 12:32:22 +02:00
|
|
|
.use("/health", ctx => (ctx.status = 200))
|
2021-05-05 16:10:28 +02:00
|
|
|
.use(buildAuthMiddleware(PUBLIC_ENDPOINTS))
|
2021-08-05 10:59:08 +02:00
|
|
|
.use(buildTenancyMiddleware(PUBLIC_ENDPOINTS, NO_TENANCY_ENDPOINTS))
|
2022-01-25 23:54:50 +01:00
|
|
|
.use(buildCsrfMiddleware({ noCsrfPatterns: NO_CSRF_ENDPOINTS }))
|
2022-03-18 09:01:31 +01:00
|
|
|
.use(pro.licensing())
|
2021-04-23 19:07:39 +02:00
|
|
|
// for now no public access is allowed to worker (bar health check)
|
|
|
|
.use((ctx, next) => {
|
2021-09-15 16:45:43 +02:00
|
|
|
if (ctx.publicEndpoint) {
|
|
|
|
return next()
|
|
|
|
}
|
2022-08-04 15:49:56 +02:00
|
|
|
if (
|
|
|
|
(!ctx.isAuthenticated || (ctx.user && !ctx.user.budibaseAccess)) &&
|
|
|
|
!ctx.internal
|
|
|
|
) {
|
2021-05-12 13:38:49 +02:00
|
|
|
ctx.throw(403, "Unauthorized - no public worker access")
|
|
|
|
}
|
2021-04-23 19:07:39 +02:00
|
|
|
return next()
|
|
|
|
})
|
2021-05-28 11:09:32 +02:00
|
|
|
.use(auditLog)
|
2020-12-16 20:50:02 +01:00
|
|
|
|
2022-03-04 14:42:50 +01:00
|
|
|
// error handling middleware - TODO: This could be moved to backend-core
|
2020-12-16 20:50:02 +01:00
|
|
|
router.use(async (ctx, next) => {
|
|
|
|
try {
|
|
|
|
await next()
|
2022-08-25 20:41:47 +02:00
|
|
|
} catch (err: any) {
|
2020-12-16 20:50:02 +01:00
|
|
|
ctx.log.error(err)
|
|
|
|
ctx.status = err.status || err.statusCode || 500
|
2022-03-16 18:29:47 +01:00
|
|
|
const error = errors.getPublicError(err)
|
2022-08-25 20:41:47 +02:00
|
|
|
const body: APIError = {
|
2020-12-16 20:50:02 +01:00
|
|
|
message: err.message,
|
|
|
|
status: ctx.status,
|
2022-03-04 14:42:50 +01:00
|
|
|
error,
|
2020-12-16 20:50:02 +01:00
|
|
|
}
|
2022-08-25 20:41:47 +02:00
|
|
|
ctx.body = body
|
2020-12-16 20:50:02 +01:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2021-05-04 12:32:22 +02:00
|
|
|
router.get("/health", ctx => (ctx.status = 200))
|
2020-12-16 20:50:02 +01:00
|
|
|
|
|
|
|
// authenticated routes
|
|
|
|
for (let route of routes) {
|
|
|
|
router.use(route.routes())
|
|
|
|
router.use(route.allowedMethods())
|
|
|
|
}
|
|
|
|
|
|
|
|
module.exports = router
|