encapsulate more auth functionality into shared module and use in worker
This commit is contained in:
parent
57b3a28708
commit
c7f4070ff5
|
@ -8,6 +8,8 @@ const DocumentTypes = {
|
|||
USER: "us",
|
||||
}
|
||||
|
||||
exports.DocumentTypes = DocumentTypes
|
||||
|
||||
const UNICODE_MAX = "\ufff0"
|
||||
const SEPARATOR = "_"
|
||||
|
||||
|
|
|
@ -5,6 +5,9 @@ const JwtStrategy = require("passport-jwt").Strategy
|
|||
const CouchDB = require("./db")
|
||||
const { StaticDatabases } = require("./db/utils")
|
||||
const { jwt, local, google } = require("./middleware")
|
||||
const { Cookies, UserStatus } = require("./constants")
|
||||
const { hash, compare } = require("./hashing")
|
||||
const { getAppId, setCookie } = require("./utils")
|
||||
|
||||
// Strategies
|
||||
passport.use(new LocalStrategy(local.options, local.authenticate))
|
||||
|
@ -25,6 +28,12 @@ passport.deserializeUser(async (user, done) => {
|
|||
}
|
||||
})
|
||||
|
||||
// exports.Cookies = Cookies
|
||||
|
||||
module.exports = passport
|
||||
module.exports = {
|
||||
passport,
|
||||
Cookies,
|
||||
UserStatus,
|
||||
hash,
|
||||
compare,
|
||||
getAppId,
|
||||
setCookie,
|
||||
}
|
||||
|
|
|
@ -1,73 +0,0 @@
|
|||
const jwt = require("jsonwebtoken")
|
||||
const STATUS_CODES = require("../utilities/statusCodes")
|
||||
const { getRole, getBuiltinRoles } = require("../utilities/security/roles")
|
||||
const { AuthTypes, Cookies } = require("../constants")
|
||||
const {
|
||||
getAppId,
|
||||
getCookieName,
|
||||
clearCookie,
|
||||
setCookie,
|
||||
isClient,
|
||||
} = require("../utilities")
|
||||
|
||||
module.exports = async (ctx, next) => {
|
||||
// if (ctx.path === "/_builder") {
|
||||
// await next()
|
||||
// return
|
||||
// }
|
||||
|
||||
// do everything we can to make sure the appId is held correctly
|
||||
// we hold it in state as a
|
||||
let appId = getAppId(ctx)
|
||||
const cookieAppId = ctx.cookies.get(Cookies.CurrentApp)
|
||||
// const builtinRoles = getBuiltinRoles()
|
||||
if (appId && cookieAppId !== appId) {
|
||||
setCookie(ctx, appId, Cookies.CurrentApp)
|
||||
} else if (cookieAppId) {
|
||||
appId = cookieAppId
|
||||
}
|
||||
let token, authType
|
||||
// if (!isClient(ctx)) {
|
||||
// token = ctx.cookies.get(getCookieName())
|
||||
// authType = AuthTypes.BUILDER
|
||||
// }
|
||||
|
||||
if (!token && appId) {
|
||||
token = ctx.cookies.get(getCookieName(appId))
|
||||
// authType = AuthTypes.APP
|
||||
}
|
||||
|
||||
// if (!token) {
|
||||
// ctx.auth.authenticated = false
|
||||
// ctx.appId = appId
|
||||
// ctx.user = {
|
||||
// role: builtinRoles.PUBLIC,
|
||||
// }
|
||||
// await next()
|
||||
// return
|
||||
// }
|
||||
|
||||
try {
|
||||
// ctx.auth.authenticated = authType
|
||||
const jwtPayload = jwt.verify(token, ctx.config.jwtSecret)
|
||||
ctx.appId = appId
|
||||
// ctx.auth.apiKey = jwtPayload.apiKey
|
||||
ctx.user = {
|
||||
...jwtPayload,
|
||||
role: await getRole(appId, jwtPayload.roleId),
|
||||
}
|
||||
// appId no longer carried in user, make sure
|
||||
delete ctx.user.appId
|
||||
} catch (err) {
|
||||
console.log(err)
|
||||
// if (authType === AuthTypes.BUILDER) {
|
||||
// clearCookie(ctx)
|
||||
// ctx.status = 200
|
||||
// return
|
||||
// } else {
|
||||
ctx.throw(err.status || STATUS_CODES.FORBIDDEN, err.text)
|
||||
// }
|
||||
}
|
||||
|
||||
await next()
|
||||
}
|
|
@ -0,0 +1,79 @@
|
|||
const { DocumentTypes, SEPARATOR } = require("./db/utils")
|
||||
|
||||
const APP_PREFIX = DocumentTypes.APP + SEPARATOR
|
||||
|
||||
function confirmAppId(possibleAppId) {
|
||||
return possibleAppId && possibleAppId.startsWith(APP_PREFIX)
|
||||
? possibleAppId
|
||||
: undefined
|
||||
}
|
||||
|
||||
/**
|
||||
* Given a request tries to find the appId, which can be located in various places
|
||||
* @param {object} ctx The main request body to look through.
|
||||
* @returns {string|undefined} If an appId was found it will be returned.
|
||||
*/
|
||||
exports.getAppId = ctx => {
|
||||
const options = [ctx.headers["x-budibase-app-id"], ctx.params.appId]
|
||||
if (ctx.subdomains) {
|
||||
options.push(ctx.subdomains[1])
|
||||
}
|
||||
let appId
|
||||
for (let option of options) {
|
||||
appId = confirmAppId(option)
|
||||
if (appId) {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
// look in body if can't find it in subdomain
|
||||
if (!appId && ctx.request.body && ctx.request.body.appId) {
|
||||
appId = confirmAppId(ctx.request.body.appId)
|
||||
}
|
||||
let appPath =
|
||||
ctx.request.headers.referrer ||
|
||||
ctx.path.split("/").filter(subPath => subPath.startsWith(APP_PREFIX))
|
||||
if (!appId && appPath.length !== 0) {
|
||||
appId = confirmAppId(appPath[0])
|
||||
}
|
||||
return appId
|
||||
}
|
||||
|
||||
/**
|
||||
* Store a cookie for the request, has a hardcoded expiry.
|
||||
* @param {object} ctx The request which is to be manipulated.
|
||||
* @param {string} name The name of the cookie to set.
|
||||
* @param {string|object} value The value of cookie which will be set.
|
||||
*/
|
||||
exports.setCookie = (ctx, value, name = "builder") => {
|
||||
const expires = new Date()
|
||||
expires.setDate(expires.getDate() + 1)
|
||||
|
||||
if (!value) {
|
||||
ctx.cookies.set(name)
|
||||
} else {
|
||||
ctx.cookies.set(name, value, {
|
||||
expires,
|
||||
path: "/",
|
||||
httpOnly: false,
|
||||
overwrite: true,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Utility function, simply calls setCookie with an empty string for value
|
||||
*/
|
||||
exports.clearCookie = (ctx, name) => {
|
||||
exports.setCookie(ctx, "", name)
|
||||
}
|
||||
|
||||
/**
|
||||
* Checks if the API call being made (based on the provided ctx object) is from the client. If
|
||||
* the call is not from a client app then it is from the builder.
|
||||
* @param {object} ctx The koa context object to be tested.
|
||||
* @return {boolean} returns true if the call is from the client lib (a built app rather than the builder).
|
||||
*/
|
||||
exports.isClient = ctx => {
|
||||
return ctx.headers["x-budibase-type"] === "client"
|
||||
}
|
|
@ -1,7 +1,7 @@
|
|||
const { QueryBuilder, buildSearchUrl, search } = require("./utils")
|
||||
|
||||
exports.rowSearch = async ctx => {
|
||||
const appId = ctx.user.appId
|
||||
const appId = ctx.appId
|
||||
const { tableId } = ctx.params
|
||||
const { bookmark, query, raw } = ctx.request.body
|
||||
let url
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
const passport = require("@budibase/auth")
|
||||
const { passport } = require("@budibase/auth")
|
||||
|
||||
exports.authenticate = async (ctx, next) => {
|
||||
return passport.authenticate("local", async (err, user) => {
|
||||
|
|
|
@ -2,22 +2,15 @@ const Router = require("@koa/router")
|
|||
const passport = require("@budibase/auth")
|
||||
const controller = require("../../controllers/admin")
|
||||
const authController = require("../../controllers/admin/auth")
|
||||
const authenticated = require("../../../middleware/authenticated")
|
||||
|
||||
const router = Router()
|
||||
|
||||
router
|
||||
.post("/api/admin/users", passport.authenticate("jwt"), controller.userSave)
|
||||
.post("/api/admin/users", authenticated, controller.userSave)
|
||||
.post("/api/admin/authenticate", authController.authenticate)
|
||||
.delete(
|
||||
"/api/admin/users/:email",
|
||||
passport.authenticate("jwt"),
|
||||
controller.userDelete
|
||||
)
|
||||
.get("/api/admin/users", passport.authenticate("jwt"), controller.userFetch)
|
||||
.get(
|
||||
"/api/admin/users/:email",
|
||||
passport.authenticate("jwt"),
|
||||
controller.userFind
|
||||
)
|
||||
.delete("/api/admin/users/:email", authenticated, controller.userDelete)
|
||||
.get("/api/admin/users", authenticated, controller.userFetch)
|
||||
.get("/api/admin/users/:email", authenticated, controller.userFind)
|
||||
|
||||
module.exports = router
|
||||
|
|
|
@ -6,8 +6,11 @@ exports.StaticDatabases = {
|
|||
|
||||
const DocumentTypes = {
|
||||
USER: "us",
|
||||
APP: "app",
|
||||
}
|
||||
|
||||
exports.DocumentTypes = DocumentTypes
|
||||
|
||||
const UNICODE_MAX = "\ufff0"
|
||||
const SEPARATOR = "_"
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
const Koa = require("koa")
|
||||
const destroyable = require("server-destroy")
|
||||
const koaBody = require("koa-body")
|
||||
const passport = require("@budibase/auth")
|
||||
const { passport } = require("@budibase/auth")
|
||||
const logger = require("koa-pino-logger")
|
||||
const http = require("http")
|
||||
const api = require("./api")
|
||||
|
|
|
@ -0,0 +1,44 @@
|
|||
const { passport, getAppId, setCookie, Cookies } = require("@budibase/auth")
|
||||
|
||||
module.exports = async (ctx, next) => {
|
||||
// do everything we can to make sure the appId is held correctly
|
||||
let appId = getAppId(ctx)
|
||||
const cookieAppId = ctx.cookies.get(Cookies.CurrentApp)
|
||||
// const builtinRoles = getBuiltinRoles()
|
||||
if (appId && cookieAppId !== appId) {
|
||||
setCookie(ctx, appId, Cookies.CurrentApp)
|
||||
} else if (cookieAppId) {
|
||||
appId = cookieAppId
|
||||
}
|
||||
|
||||
let token
|
||||
if (appId) {
|
||||
token = ctx.cookies.get(Cookies.Auth)
|
||||
}
|
||||
|
||||
if (!token) {
|
||||
ctx.auth = {
|
||||
authenticated: true,
|
||||
}
|
||||
ctx.appId = appId
|
||||
// ctx.user = {
|
||||
// // TODO: introduce roles again
|
||||
// // role: builtinRoles.PUBLIC,
|
||||
// }
|
||||
return await next()
|
||||
}
|
||||
|
||||
return passport.authenticate("jwt", async (err, user) => {
|
||||
if (err) {
|
||||
return ctx.throw(err)
|
||||
}
|
||||
|
||||
try {
|
||||
ctx.user = user
|
||||
await next()
|
||||
} catch (err) {
|
||||
console.log(err)
|
||||
ctx.throw(err.status || 403, err.text)
|
||||
}
|
||||
})(ctx, next)
|
||||
}
|
|
@ -1,13 +1,80 @@
|
|||
const bcrypt = require("bcryptjs")
|
||||
const env = require("./environment")
|
||||
const { DocumentTypes, SEPARATOR } = require("./db/utils")
|
||||
|
||||
const SALT_ROUNDS = env.SALT_ROUNDS || 10
|
||||
const APP_PREFIX = DocumentTypes.APP + SEPARATOR
|
||||
|
||||
exports.hash = async data => {
|
||||
const salt = await bcrypt.genSalt(SALT_ROUNDS)
|
||||
return bcrypt.hash(data, salt)
|
||||
function confirmAppId(possibleAppId) {
|
||||
return possibleAppId && possibleAppId.startsWith(APP_PREFIX)
|
||||
? possibleAppId
|
||||
: undefined
|
||||
}
|
||||
|
||||
exports.compare = async (data, encrypted) => {
|
||||
return bcrypt.compare(data, encrypted)
|
||||
/**
|
||||
* Given a request tries to find the appId, which can be located in various places
|
||||
* @param {object} ctx The main request body to look through.
|
||||
* @returns {string|undefined} If an appId was found it will be returned.
|
||||
*/
|
||||
exports.getAppId = ctx => {
|
||||
const options = [ctx.headers["x-budibase-app-id"], ctx.params.appId]
|
||||
if (ctx.subdomains) {
|
||||
options.push(ctx.subdomains[1])
|
||||
}
|
||||
let appId
|
||||
for (let option of options) {
|
||||
appId = confirmAppId(option)
|
||||
if (appId) {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
// look in body if can't find it in subdomain
|
||||
if (!appId && ctx.request.body && ctx.request.body.appId) {
|
||||
appId = confirmAppId(ctx.request.body.appId)
|
||||
}
|
||||
let appPath =
|
||||
ctx.request.headers.referrer ||
|
||||
ctx.path.split("/").filter(subPath => subPath.startsWith(APP_PREFIX))
|
||||
if (!appId && appPath.length !== 0) {
|
||||
appId = confirmAppId(appPath[0])
|
||||
}
|
||||
return appId
|
||||
}
|
||||
|
||||
/**
|
||||
* Store a cookie for the request, has a hardcoded expiry.
|
||||
* @param {object} ctx The request which is to be manipulated.
|
||||
* @param {string} name The name of the cookie to set.
|
||||
* @param {string|object} value The value of cookie which will be set.
|
||||
*/
|
||||
exports.setCookie = (ctx, value, name = "builder") => {
|
||||
const expires = new Date()
|
||||
expires.setDate(expires.getDate() + 1)
|
||||
|
||||
if (!value) {
|
||||
ctx.cookies.set(name)
|
||||
} else {
|
||||
ctx.cookies.set(name, value, {
|
||||
expires,
|
||||
path: "/",
|
||||
httpOnly: false,
|
||||
overwrite: true,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Utility function, simply calls setCookie with an empty string for value
|
||||
*/
|
||||
exports.clearCookie = (ctx, name) => {
|
||||
exports.setCookie(ctx, "", name)
|
||||
}
|
||||
|
||||
/**
|
||||
* Checks if the API call being made (based on the provided ctx object) is from the client. If
|
||||
* the call is not from a client app then it is from the builder.
|
||||
* @param {object} ctx The koa context object to be tested.
|
||||
* @return {boolean} returns true if the call is from the client lib (a built app rather than the builder).
|
||||
*/
|
||||
exports.isClient = ctx => {
|
||||
return ctx.headers["x-budibase-type"] === "client"
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue