encapsulate more auth functionality into shared module and use in worker
This commit is contained in:
parent
2d7823f314
commit
73dfad3001
|
@ -8,6 +8,8 @@ const DocumentTypes = {
|
||||||
USER: "us",
|
USER: "us",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
exports.DocumentTypes = DocumentTypes
|
||||||
|
|
||||||
const UNICODE_MAX = "\ufff0"
|
const UNICODE_MAX = "\ufff0"
|
||||||
const SEPARATOR = "_"
|
const SEPARATOR = "_"
|
||||||
|
|
||||||
|
|
|
@ -5,6 +5,9 @@ const JwtStrategy = require("passport-jwt").Strategy
|
||||||
const CouchDB = require("./db")
|
const CouchDB = require("./db")
|
||||||
const { StaticDatabases } = require("./db/utils")
|
const { StaticDatabases } = require("./db/utils")
|
||||||
const { jwt, local, google } = require("./middleware")
|
const { jwt, local, google } = require("./middleware")
|
||||||
|
const { Cookies, UserStatus } = require("./constants")
|
||||||
|
const { hash, compare } = require("./hashing")
|
||||||
|
const { getAppId, setCookie } = require("./utils")
|
||||||
|
|
||||||
// Strategies
|
// Strategies
|
||||||
passport.use(new LocalStrategy(local.options, local.authenticate))
|
passport.use(new LocalStrategy(local.options, local.authenticate))
|
||||||
|
@ -25,6 +28,12 @@ passport.deserializeUser(async (user, done) => {
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
// exports.Cookies = Cookies
|
module.exports = {
|
||||||
|
passport,
|
||||||
module.exports = passport
|
Cookies,
|
||||||
|
UserStatus,
|
||||||
|
hash,
|
||||||
|
compare,
|
||||||
|
getAppId,
|
||||||
|
setCookie,
|
||||||
|
}
|
||||||
|
|
|
@ -1,73 +0,0 @@
|
||||||
const jwt = require("jsonwebtoken")
|
|
||||||
const STATUS_CODES = require("../utilities/statusCodes")
|
|
||||||
const { getRole, getBuiltinRoles } = require("../utilities/security/roles")
|
|
||||||
const { AuthTypes, Cookies } = require("../constants")
|
|
||||||
const {
|
|
||||||
getAppId,
|
|
||||||
getCookieName,
|
|
||||||
clearCookie,
|
|
||||||
setCookie,
|
|
||||||
isClient,
|
|
||||||
} = require("../utilities")
|
|
||||||
|
|
||||||
module.exports = async (ctx, next) => {
|
|
||||||
// if (ctx.path === "/_builder") {
|
|
||||||
// await next()
|
|
||||||
// return
|
|
||||||
// }
|
|
||||||
|
|
||||||
// do everything we can to make sure the appId is held correctly
|
|
||||||
// we hold it in state as a
|
|
||||||
let appId = getAppId(ctx)
|
|
||||||
const cookieAppId = ctx.cookies.get(Cookies.CurrentApp)
|
|
||||||
// const builtinRoles = getBuiltinRoles()
|
|
||||||
if (appId && cookieAppId !== appId) {
|
|
||||||
setCookie(ctx, appId, Cookies.CurrentApp)
|
|
||||||
} else if (cookieAppId) {
|
|
||||||
appId = cookieAppId
|
|
||||||
}
|
|
||||||
let token, authType
|
|
||||||
// if (!isClient(ctx)) {
|
|
||||||
// token = ctx.cookies.get(getCookieName())
|
|
||||||
// authType = AuthTypes.BUILDER
|
|
||||||
// }
|
|
||||||
|
|
||||||
if (!token && appId) {
|
|
||||||
token = ctx.cookies.get(getCookieName(appId))
|
|
||||||
// authType = AuthTypes.APP
|
|
||||||
}
|
|
||||||
|
|
||||||
// if (!token) {
|
|
||||||
// ctx.auth.authenticated = false
|
|
||||||
// ctx.appId = appId
|
|
||||||
// ctx.user = {
|
|
||||||
// role: builtinRoles.PUBLIC,
|
|
||||||
// }
|
|
||||||
// await next()
|
|
||||||
// return
|
|
||||||
// }
|
|
||||||
|
|
||||||
try {
|
|
||||||
// ctx.auth.authenticated = authType
|
|
||||||
const jwtPayload = jwt.verify(token, ctx.config.jwtSecret)
|
|
||||||
ctx.appId = appId
|
|
||||||
// ctx.auth.apiKey = jwtPayload.apiKey
|
|
||||||
ctx.user = {
|
|
||||||
...jwtPayload,
|
|
||||||
role: await getRole(appId, jwtPayload.roleId),
|
|
||||||
}
|
|
||||||
// appId no longer carried in user, make sure
|
|
||||||
delete ctx.user.appId
|
|
||||||
} catch (err) {
|
|
||||||
console.log(err)
|
|
||||||
// if (authType === AuthTypes.BUILDER) {
|
|
||||||
// clearCookie(ctx)
|
|
||||||
// ctx.status = 200
|
|
||||||
// return
|
|
||||||
// } else {
|
|
||||||
ctx.throw(err.status || STATUS_CODES.FORBIDDEN, err.text)
|
|
||||||
// }
|
|
||||||
}
|
|
||||||
|
|
||||||
await next()
|
|
||||||
}
|
|
|
@ -0,0 +1,79 @@
|
||||||
|
const { DocumentTypes, SEPARATOR } = require("./db/utils")
|
||||||
|
|
||||||
|
const APP_PREFIX = DocumentTypes.APP + SEPARATOR
|
||||||
|
|
||||||
|
function confirmAppId(possibleAppId) {
|
||||||
|
return possibleAppId && possibleAppId.startsWith(APP_PREFIX)
|
||||||
|
? possibleAppId
|
||||||
|
: undefined
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Given a request tries to find the appId, which can be located in various places
|
||||||
|
* @param {object} ctx The main request body to look through.
|
||||||
|
* @returns {string|undefined} If an appId was found it will be returned.
|
||||||
|
*/
|
||||||
|
exports.getAppId = ctx => {
|
||||||
|
const options = [ctx.headers["x-budibase-app-id"], ctx.params.appId]
|
||||||
|
if (ctx.subdomains) {
|
||||||
|
options.push(ctx.subdomains[1])
|
||||||
|
}
|
||||||
|
let appId
|
||||||
|
for (let option of options) {
|
||||||
|
appId = confirmAppId(option)
|
||||||
|
if (appId) {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// look in body if can't find it in subdomain
|
||||||
|
if (!appId && ctx.request.body && ctx.request.body.appId) {
|
||||||
|
appId = confirmAppId(ctx.request.body.appId)
|
||||||
|
}
|
||||||
|
let appPath =
|
||||||
|
ctx.request.headers.referrer ||
|
||||||
|
ctx.path.split("/").filter(subPath => subPath.startsWith(APP_PREFIX))
|
||||||
|
if (!appId && appPath.length !== 0) {
|
||||||
|
appId = confirmAppId(appPath[0])
|
||||||
|
}
|
||||||
|
return appId
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Store a cookie for the request, has a hardcoded expiry.
|
||||||
|
* @param {object} ctx The request which is to be manipulated.
|
||||||
|
* @param {string} name The name of the cookie to set.
|
||||||
|
* @param {string|object} value The value of cookie which will be set.
|
||||||
|
*/
|
||||||
|
exports.setCookie = (ctx, value, name = "builder") => {
|
||||||
|
const expires = new Date()
|
||||||
|
expires.setDate(expires.getDate() + 1)
|
||||||
|
|
||||||
|
if (!value) {
|
||||||
|
ctx.cookies.set(name)
|
||||||
|
} else {
|
||||||
|
ctx.cookies.set(name, value, {
|
||||||
|
expires,
|
||||||
|
path: "/",
|
||||||
|
httpOnly: false,
|
||||||
|
overwrite: true,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Utility function, simply calls setCookie with an empty string for value
|
||||||
|
*/
|
||||||
|
exports.clearCookie = (ctx, name) => {
|
||||||
|
exports.setCookie(ctx, "", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if the API call being made (based on the provided ctx object) is from the client. If
|
||||||
|
* the call is not from a client app then it is from the builder.
|
||||||
|
* @param {object} ctx The koa context object to be tested.
|
||||||
|
* @return {boolean} returns true if the call is from the client lib (a built app rather than the builder).
|
||||||
|
*/
|
||||||
|
exports.isClient = ctx => {
|
||||||
|
return ctx.headers["x-budibase-type"] === "client"
|
||||||
|
}
|
|
@ -1,7 +1,7 @@
|
||||||
const { QueryBuilder, buildSearchUrl, search } = require("./utils")
|
const { QueryBuilder, buildSearchUrl, search } = require("./utils")
|
||||||
|
|
||||||
exports.rowSearch = async ctx => {
|
exports.rowSearch = async ctx => {
|
||||||
const appId = ctx.user.appId
|
const appId = ctx.appId
|
||||||
const { tableId } = ctx.params
|
const { tableId } = ctx.params
|
||||||
const { bookmark, query, raw } = ctx.request.body
|
const { bookmark, query, raw } = ctx.request.body
|
||||||
let url
|
let url
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
const passport = require("@budibase/auth")
|
const { passport } = require("@budibase/auth")
|
||||||
|
|
||||||
exports.authenticate = async (ctx, next) => {
|
exports.authenticate = async (ctx, next) => {
|
||||||
return passport.authenticate("local", async (err, user) => {
|
return passport.authenticate("local", async (err, user) => {
|
||||||
|
|
|
@ -2,22 +2,15 @@ const Router = require("@koa/router")
|
||||||
const passport = require("@budibase/auth")
|
const passport = require("@budibase/auth")
|
||||||
const controller = require("../../controllers/admin")
|
const controller = require("../../controllers/admin")
|
||||||
const authController = require("../../controllers/admin/auth")
|
const authController = require("../../controllers/admin/auth")
|
||||||
|
const authenticated = require("../../../middleware/authenticated")
|
||||||
|
|
||||||
const router = Router()
|
const router = Router()
|
||||||
|
|
||||||
router
|
router
|
||||||
.post("/api/admin/users", passport.authenticate("jwt"), controller.userSave)
|
.post("/api/admin/users", authenticated, controller.userSave)
|
||||||
.post("/api/admin/authenticate", authController.authenticate)
|
.post("/api/admin/authenticate", authController.authenticate)
|
||||||
.delete(
|
.delete("/api/admin/users/:email", authenticated, controller.userDelete)
|
||||||
"/api/admin/users/:email",
|
.get("/api/admin/users", authenticated, controller.userFetch)
|
||||||
passport.authenticate("jwt"),
|
.get("/api/admin/users/:email", authenticated, controller.userFind)
|
||||||
controller.userDelete
|
|
||||||
)
|
|
||||||
.get("/api/admin/users", passport.authenticate("jwt"), controller.userFetch)
|
|
||||||
.get(
|
|
||||||
"/api/admin/users/:email",
|
|
||||||
passport.authenticate("jwt"),
|
|
||||||
controller.userFind
|
|
||||||
)
|
|
||||||
|
|
||||||
module.exports = router
|
module.exports = router
|
||||||
|
|
|
@ -6,8 +6,11 @@ exports.StaticDatabases = {
|
||||||
|
|
||||||
const DocumentTypes = {
|
const DocumentTypes = {
|
||||||
USER: "us",
|
USER: "us",
|
||||||
|
APP: "app",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
exports.DocumentTypes = DocumentTypes
|
||||||
|
|
||||||
const UNICODE_MAX = "\ufff0"
|
const UNICODE_MAX = "\ufff0"
|
||||||
const SEPARATOR = "_"
|
const SEPARATOR = "_"
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
const Koa = require("koa")
|
const Koa = require("koa")
|
||||||
const destroyable = require("server-destroy")
|
const destroyable = require("server-destroy")
|
||||||
const koaBody = require("koa-body")
|
const koaBody = require("koa-body")
|
||||||
const passport = require("@budibase/auth")
|
const { passport } = require("@budibase/auth")
|
||||||
const logger = require("koa-pino-logger")
|
const logger = require("koa-pino-logger")
|
||||||
const http = require("http")
|
const http = require("http")
|
||||||
const api = require("./api")
|
const api = require("./api")
|
||||||
|
|
|
@ -0,0 +1,44 @@
|
||||||
|
const { passport, getAppId, setCookie, Cookies } = require("@budibase/auth")
|
||||||
|
|
||||||
|
module.exports = async (ctx, next) => {
|
||||||
|
// do everything we can to make sure the appId is held correctly
|
||||||
|
let appId = getAppId(ctx)
|
||||||
|
const cookieAppId = ctx.cookies.get(Cookies.CurrentApp)
|
||||||
|
// const builtinRoles = getBuiltinRoles()
|
||||||
|
if (appId && cookieAppId !== appId) {
|
||||||
|
setCookie(ctx, appId, Cookies.CurrentApp)
|
||||||
|
} else if (cookieAppId) {
|
||||||
|
appId = cookieAppId
|
||||||
|
}
|
||||||
|
|
||||||
|
let token
|
||||||
|
if (appId) {
|
||||||
|
token = ctx.cookies.get(Cookies.Auth)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!token) {
|
||||||
|
ctx.auth = {
|
||||||
|
authenticated: true,
|
||||||
|
}
|
||||||
|
ctx.appId = appId
|
||||||
|
// ctx.user = {
|
||||||
|
// // TODO: introduce roles again
|
||||||
|
// // role: builtinRoles.PUBLIC,
|
||||||
|
// }
|
||||||
|
return await next()
|
||||||
|
}
|
||||||
|
|
||||||
|
return passport.authenticate("jwt", async (err, user) => {
|
||||||
|
if (err) {
|
||||||
|
return ctx.throw(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
ctx.user = user
|
||||||
|
await next()
|
||||||
|
} catch (err) {
|
||||||
|
console.log(err)
|
||||||
|
ctx.throw(err.status || 403, err.text)
|
||||||
|
}
|
||||||
|
})(ctx, next)
|
||||||
|
}
|
|
@ -1,13 +1,80 @@
|
||||||
const bcrypt = require("bcryptjs")
|
|
||||||
const env = require("./environment")
|
const env = require("./environment")
|
||||||
|
const { DocumentTypes, SEPARATOR } = require("./db/utils")
|
||||||
|
|
||||||
const SALT_ROUNDS = env.SALT_ROUNDS || 10
|
const APP_PREFIX = DocumentTypes.APP + SEPARATOR
|
||||||
|
|
||||||
exports.hash = async data => {
|
function confirmAppId(possibleAppId) {
|
||||||
const salt = await bcrypt.genSalt(SALT_ROUNDS)
|
return possibleAppId && possibleAppId.startsWith(APP_PREFIX)
|
||||||
return bcrypt.hash(data, salt)
|
? possibleAppId
|
||||||
|
: undefined
|
||||||
}
|
}
|
||||||
|
|
||||||
exports.compare = async (data, encrypted) => {
|
/**
|
||||||
return bcrypt.compare(data, encrypted)
|
* Given a request tries to find the appId, which can be located in various places
|
||||||
|
* @param {object} ctx The main request body to look through.
|
||||||
|
* @returns {string|undefined} If an appId was found it will be returned.
|
||||||
|
*/
|
||||||
|
exports.getAppId = ctx => {
|
||||||
|
const options = [ctx.headers["x-budibase-app-id"], ctx.params.appId]
|
||||||
|
if (ctx.subdomains) {
|
||||||
|
options.push(ctx.subdomains[1])
|
||||||
|
}
|
||||||
|
let appId
|
||||||
|
for (let option of options) {
|
||||||
|
appId = confirmAppId(option)
|
||||||
|
if (appId) {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// look in body if can't find it in subdomain
|
||||||
|
if (!appId && ctx.request.body && ctx.request.body.appId) {
|
||||||
|
appId = confirmAppId(ctx.request.body.appId)
|
||||||
|
}
|
||||||
|
let appPath =
|
||||||
|
ctx.request.headers.referrer ||
|
||||||
|
ctx.path.split("/").filter(subPath => subPath.startsWith(APP_PREFIX))
|
||||||
|
if (!appId && appPath.length !== 0) {
|
||||||
|
appId = confirmAppId(appPath[0])
|
||||||
|
}
|
||||||
|
return appId
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Store a cookie for the request, has a hardcoded expiry.
|
||||||
|
* @param {object} ctx The request which is to be manipulated.
|
||||||
|
* @param {string} name The name of the cookie to set.
|
||||||
|
* @param {string|object} value The value of cookie which will be set.
|
||||||
|
*/
|
||||||
|
exports.setCookie = (ctx, value, name = "builder") => {
|
||||||
|
const expires = new Date()
|
||||||
|
expires.setDate(expires.getDate() + 1)
|
||||||
|
|
||||||
|
if (!value) {
|
||||||
|
ctx.cookies.set(name)
|
||||||
|
} else {
|
||||||
|
ctx.cookies.set(name, value, {
|
||||||
|
expires,
|
||||||
|
path: "/",
|
||||||
|
httpOnly: false,
|
||||||
|
overwrite: true,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Utility function, simply calls setCookie with an empty string for value
|
||||||
|
*/
|
||||||
|
exports.clearCookie = (ctx, name) => {
|
||||||
|
exports.setCookie(ctx, "", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if the API call being made (based on the provided ctx object) is from the client. If
|
||||||
|
* the call is not from a client app then it is from the builder.
|
||||||
|
* @param {object} ctx The koa context object to be tested.
|
||||||
|
* @return {boolean} returns true if the call is from the client lib (a built app rather than the builder).
|
||||||
|
*/
|
||||||
|
exports.isClient = ctx => {
|
||||||
|
return ctx.headers["x-budibase-type"] === "client"
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue