budibase/packages/server/src/middleware/authenticated.js

101 lines
2.5 KiB
JavaScript
Raw Normal View History

2020-05-07 11:53:34 +02:00
const jwt = require("jsonwebtoken")
2020-05-14 16:12:30 +02:00
const STATUS_CODES = require("../utilities/statusCodes")
2020-05-27 18:23:01 +02:00
const accessLevelController = require("../api/controllers/accesslevel")
const {
ADMIN_LEVEL_ID,
POWERUSER_LEVEL_ID,
2020-06-18 17:59:31 +02:00
BUILDER_LEVEL_ID,
ANON_LEVEL_ID,
2020-05-27 18:23:01 +02:00
} = require("../utilities/accessLevels")
const environment = require("../environment")
const { AuthTypes } = require("../constants")
module.exports = async (ctx, next) => {
2020-05-18 12:53:04 +02:00
if (ctx.path === "/_builder") {
2020-05-14 16:12:30 +02:00
await next()
2020-05-07 15:04:32 +02:00
return
}
const appToken = ctx.cookies.get("budibase:token")
const builderToken = ctx.cookies.get("builder:token")
let token
// if running locally in the builder itself
if (!environment.CLOUD && !appToken) {
token = builderToken
ctx.auth.authenticated = AuthTypes.BUILDER
} else {
token = appToken
ctx.auth.authenticated = AuthTypes.APP
}
if (!token) {
ctx.auth.authenticated = false
2020-10-14 18:30:00 +02:00
let appId = process.env.CLOUD ? ctx.subdomains[1] : ctx.params.appId
2020-10-15 15:26:33 +02:00
// if appId can't be determined from path param or subdomain
if (!appId && ctx.request.headers.referer) {
const url = new URL(ctx.request.headers.referer)
// remove leading and trailing slashes from appId
appId = url.pathname.replace(/\//g, "")
2020-10-14 18:30:00 +02:00
}
ctx.user = {
appId,
}
2020-05-07 11:53:34 +02:00
await next()
return
}
try {
const jwtPayload = jwt.verify(token, ctx.config.jwtSecret)
ctx.auth.apiKey = jwtPayload.apiKey
2020-05-27 18:23:01 +02:00
ctx.user = {
...jwtPayload,
instanceId: jwtPayload.instanceId,
2020-05-27 18:23:01 +02:00
accessLevel: await getAccessLevel(
jwtPayload.instanceId,
jwtPayload.accessLevelId
),
}
} catch (err) {
2020-05-07 15:04:32 +02:00
ctx.throw(err.status || STATUS_CODES.FORBIDDEN, err.text)
}
2020-05-07 11:53:34 +02:00
await next()
}
2020-05-27 18:23:01 +02:00
2020-06-29 19:57:17 +02:00
/**
2020-07-07 22:29:20 +02:00
* Return the full access level object either from constants
2020-06-29 19:57:17 +02:00
* or the database based on the access level ID passed.
2020-07-07 22:29:20 +02:00
*
2020-06-29 19:57:17 +02:00
* @param {*} instanceId - instanceId of the user
2020-07-07 22:29:20 +02:00
* @param {*} accessLevelId - the id of the users access level
2020-06-29 19:57:17 +02:00
*/
2020-05-27 18:23:01 +02:00
const getAccessLevel = async (instanceId, accessLevelId) => {
if (
accessLevelId === POWERUSER_LEVEL_ID ||
2020-06-18 17:59:31 +02:00
accessLevelId === ADMIN_LEVEL_ID ||
accessLevelId === BUILDER_LEVEL_ID ||
accessLevelId === ANON_LEVEL_ID
2020-05-27 18:23:01 +02:00
) {
return {
_id: accessLevelId,
name: accessLevelId,
permissions: [],
}
}
const findAccessContext = {
params: {
levelId: accessLevelId,
2020-06-18 21:41:37 +02:00
},
user: {
2020-05-27 18:23:01 +02:00
instanceId,
},
}
await accessLevelController.find(findAccessContext)
return findAccessContext.body
}