2020-04-28 14:49:03 +02:00
|
|
|
import { isUserDisplayNameValid, isUserRoleValid, isUserUsernameValid } from '@server/helpers/custom-validators/users'
|
2020-04-22 16:07:04 +02:00
|
|
|
import { logger } from '@server/helpers/logger'
|
2020-04-28 14:49:03 +02:00
|
|
|
import { generateRandomString } from '@server/helpers/utils'
|
2020-04-29 09:04:42 +02:00
|
|
|
import { OAUTH_LIFETIME, PLUGIN_EXTERNAL_AUTH_TOKEN_LIFETIME } from '@server/initializers/constants'
|
2020-04-23 11:36:50 +02:00
|
|
|
import { revokeToken } from '@server/lib/oauth-model'
|
2020-04-28 14:49:03 +02:00
|
|
|
import { PluginManager } from '@server/lib/plugins/plugin-manager'
|
2020-04-24 11:33:01 +02:00
|
|
|
import { OAuthTokenModel } from '@server/models/oauth/oauth-token'
|
2020-04-28 14:49:03 +02:00
|
|
|
import { UserRole } from '@shared/models'
|
|
|
|
import {
|
|
|
|
RegisterServerAuthenticatedResult,
|
|
|
|
RegisterServerAuthPassOptions,
|
|
|
|
RegisterServerExternalAuthenticatedResult
|
|
|
|
} from '@shared/models/plugins/register-server-auth.model'
|
|
|
|
import * as express from 'express'
|
|
|
|
import * as OAuthServer from 'express-oauth-server'
|
2020-04-22 16:07:04 +02:00
|
|
|
|
|
|
|
const oAuthServer = new OAuthServer({
|
|
|
|
useErrorHandler: true,
|
|
|
|
accessTokenLifetime: OAUTH_LIFETIME.ACCESS_TOKEN,
|
|
|
|
refreshTokenLifetime: OAUTH_LIFETIME.REFRESH_TOKEN,
|
|
|
|
continueMiddleware: true,
|
|
|
|
model: require('./oauth-model')
|
|
|
|
})
|
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
// Token is the key, expiration date is the value
|
|
|
|
const authBypassTokens = new Map<string, {
|
|
|
|
expires: Date
|
|
|
|
user: {
|
|
|
|
username: string
|
|
|
|
email: string
|
|
|
|
displayName: string
|
|
|
|
role: UserRole
|
|
|
|
}
|
|
|
|
authName: string
|
|
|
|
npmName: string
|
|
|
|
}>()
|
2020-04-22 16:07:04 +02:00
|
|
|
|
2020-04-29 09:04:42 +02:00
|
|
|
async function handleLogin (req: express.Request, res: express.Response, next: express.NextFunction) {
|
2020-04-24 11:33:01 +02:00
|
|
|
const grantType = req.body.grant_type
|
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
if (grantType === 'password') {
|
|
|
|
if (req.body.externalAuthToken) proxifyExternalAuthBypass(req, res)
|
|
|
|
else await proxifyPasswordGrant(req, res)
|
|
|
|
} else if (grantType === 'refresh_token') {
|
|
|
|
await proxifyRefreshGrant(req, res)
|
|
|
|
}
|
2020-04-24 11:33:01 +02:00
|
|
|
|
|
|
|
return forwardTokenReq(req, res, next)
|
|
|
|
}
|
|
|
|
|
|
|
|
async function handleTokenRevocation (req: express.Request, res: express.Response) {
|
|
|
|
const token = res.locals.oauth.token
|
|
|
|
|
|
|
|
res.locals.explicitLogout = true
|
|
|
|
await revokeToken(token)
|
|
|
|
|
|
|
|
// FIXME: uncomment when https://github.com/oauthjs/node-oauth2-server/pull/289 is released
|
|
|
|
// oAuthServer.revoke(req, res, err => {
|
|
|
|
// if (err) {
|
|
|
|
// logger.warn('Error in revoke token handler.', { err })
|
|
|
|
//
|
|
|
|
// return res.status(err.status)
|
|
|
|
// .json({
|
|
|
|
// error: err.message,
|
|
|
|
// code: err.name
|
|
|
|
// })
|
|
|
|
// .end()
|
|
|
|
// }
|
|
|
|
// })
|
|
|
|
|
2020-04-30 08:47:25 +02:00
|
|
|
return res.json()
|
2020-04-24 11:33:01 +02:00
|
|
|
}
|
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
async function onExternalUserAuthenticated (options: {
|
|
|
|
npmName: string
|
|
|
|
authName: string
|
|
|
|
authResult: RegisterServerExternalAuthenticatedResult
|
|
|
|
}) {
|
|
|
|
const { npmName, authName, authResult } = options
|
2020-04-24 11:33:01 +02:00
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
if (!authResult.req || !authResult.res) {
|
|
|
|
logger.error('Cannot authenticate external user for auth %s of plugin %s: no req or res are provided.', authName, npmName)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
const { res } = authResult
|
|
|
|
|
2020-04-30 15:03:09 +02:00
|
|
|
if (!isAuthResultValid(npmName, authName, authResult)) {
|
|
|
|
res.redirect('/login?externalAuthError=true')
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
logger.info('Generating auth bypass token for %s in auth %s of plugin %s.', authResult.username, authName, npmName)
|
|
|
|
|
|
|
|
const bypassToken = await generateRandomString(32)
|
|
|
|
|
|
|
|
const expires = new Date()
|
2020-04-29 09:04:42 +02:00
|
|
|
expires.setTime(expires.getTime() + PLUGIN_EXTERNAL_AUTH_TOKEN_LIFETIME)
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
const user = buildUserResult(authResult)
|
|
|
|
authBypassTokens.set(bypassToken, {
|
|
|
|
expires,
|
|
|
|
user,
|
|
|
|
npmName,
|
|
|
|
authName
|
|
|
|
})
|
2020-05-11 08:40:38 +02:00
|
|
|
|
|
|
|
// Cleanup
|
|
|
|
const now = new Date()
|
|
|
|
for (const [ key, value ] of authBypassTokens) {
|
|
|
|
if (value.expires.getTime() < now.getTime()) {
|
|
|
|
authBypassTokens.delete(key)
|
|
|
|
}
|
|
|
|
}
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
res.redirect(`/login?externalAuthToken=${bypassToken}&username=${user.username}`)
|
2020-04-24 11:33:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
2020-04-29 09:04:42 +02:00
|
|
|
export { oAuthServer, handleLogin, onExternalUserAuthenticated, handleTokenRevocation }
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
function forwardTokenReq (req: express.Request, res: express.Response, next?: express.NextFunction) {
|
2020-04-24 11:33:01 +02:00
|
|
|
return oAuthServer.token()(req, res, err => {
|
|
|
|
if (err) {
|
|
|
|
logger.warn('Login error.', { err })
|
|
|
|
|
|
|
|
return res.status(err.status)
|
2020-04-28 14:49:03 +02:00
|
|
|
.json({
|
|
|
|
error: err.message,
|
|
|
|
code: err.name
|
|
|
|
})
|
2020-04-24 11:33:01 +02:00
|
|
|
}
|
|
|
|
|
2020-04-28 14:49:03 +02:00
|
|
|
if (next) return next()
|
2020-04-24 11:33:01 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
async function proxifyRefreshGrant (req: express.Request, res: express.Response) {
|
|
|
|
const refreshToken = req.body.refresh_token
|
|
|
|
if (!refreshToken) return
|
|
|
|
|
|
|
|
const tokenModel = await OAuthTokenModel.loadByRefreshToken(refreshToken)
|
|
|
|
if (tokenModel?.authName) res.locals.refreshTokenAuthName = tokenModel.authName
|
|
|
|
}
|
|
|
|
|
|
|
|
async function proxifyPasswordGrant (req: express.Request, res: express.Response) {
|
2020-04-22 16:07:04 +02:00
|
|
|
const plugins = PluginManager.Instance.getIdAndPassAuths()
|
|
|
|
const pluginAuths: { npmName?: string, registerAuthOptions: RegisterServerAuthPassOptions }[] = []
|
|
|
|
|
|
|
|
for (const plugin of plugins) {
|
|
|
|
const auths = plugin.idAndPassAuths
|
|
|
|
|
|
|
|
for (const auth of auths) {
|
|
|
|
pluginAuths.push({
|
|
|
|
npmName: plugin.npmName,
|
|
|
|
registerAuthOptions: auth
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pluginAuths.sort((a, b) => {
|
|
|
|
const aWeight = a.registerAuthOptions.getWeight()
|
|
|
|
const bWeight = b.registerAuthOptions.getWeight()
|
|
|
|
|
2020-04-23 11:36:50 +02:00
|
|
|
// DESC weight order
|
2020-04-22 16:07:04 +02:00
|
|
|
if (aWeight === bWeight) return 0
|
2020-04-23 11:36:50 +02:00
|
|
|
if (aWeight < bWeight) return 1
|
2020-04-22 16:07:04 +02:00
|
|
|
return -1
|
|
|
|
})
|
|
|
|
|
|
|
|
const loginOptions = {
|
|
|
|
id: req.body.username,
|
|
|
|
password: req.body.password
|
|
|
|
}
|
|
|
|
|
|
|
|
for (const pluginAuth of pluginAuths) {
|
2020-04-23 11:36:50 +02:00
|
|
|
const authOptions = pluginAuth.registerAuthOptions
|
2020-04-27 11:42:01 +02:00
|
|
|
const authName = authOptions.authName
|
|
|
|
const npmName = pluginAuth.npmName
|
2020-04-23 11:36:50 +02:00
|
|
|
|
2020-04-22 16:07:04 +02:00
|
|
|
logger.debug(
|
2020-04-23 11:36:50 +02:00
|
|
|
'Using auth method %s of plugin %s to login %s with weight %d.',
|
2020-04-27 11:42:01 +02:00
|
|
|
authName, npmName, loginOptions.id, authOptions.getWeight()
|
2020-04-22 16:07:04 +02:00
|
|
|
)
|
|
|
|
|
2020-04-27 10:19:14 +02:00
|
|
|
try {
|
|
|
|
const loginResult = await authOptions.login(loginOptions)
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
if (!loginResult) continue
|
|
|
|
if (!isAuthResultValid(pluginAuth.npmName, authOptions.authName, loginResult)) continue
|
|
|
|
|
|
|
|
logger.info(
|
|
|
|
'Login success with auth method %s of plugin %s for %s.',
|
|
|
|
authName, npmName, loginOptions.id
|
|
|
|
)
|
|
|
|
|
|
|
|
res.locals.bypassLogin = {
|
|
|
|
bypass: true,
|
|
|
|
pluginName: pluginAuth.npmName,
|
|
|
|
authName: authOptions.authName,
|
|
|
|
user: buildUserResult(loginResult)
|
2020-04-27 10:19:14 +02:00
|
|
|
}
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
return
|
2020-04-27 10:19:14 +02:00
|
|
|
} catch (err) {
|
|
|
|
logger.error('Error in auth method %s of plugin %s', authOptions.authName, pluginAuth.npmName, { err })
|
2020-04-22 16:07:04 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-04-28 14:49:03 +02:00
|
|
|
|
|
|
|
function proxifyExternalAuthBypass (req: express.Request, res: express.Response) {
|
|
|
|
const obj = authBypassTokens.get(req.body.externalAuthToken)
|
|
|
|
if (!obj) {
|
|
|
|
logger.error('Cannot authenticate user with unknown bypass token')
|
|
|
|
return res.sendStatus(400)
|
|
|
|
}
|
|
|
|
|
|
|
|
const { expires, user, authName, npmName } = obj
|
|
|
|
|
|
|
|
const now = new Date()
|
|
|
|
if (now.getTime() > expires.getTime()) {
|
2020-04-29 09:04:42 +02:00
|
|
|
logger.error('Cannot authenticate user with an expired external auth token')
|
2020-04-28 14:49:03 +02:00
|
|
|
return res.sendStatus(400)
|
|
|
|
}
|
|
|
|
|
|
|
|
if (user.username !== req.body.username) {
|
|
|
|
logger.error('Cannot authenticate user %s with invalid username %s.', req.body.username)
|
|
|
|
return res.sendStatus(400)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Bypass oauth library validation
|
|
|
|
req.body.password = 'fake'
|
|
|
|
|
|
|
|
logger.info(
|
|
|
|
'Auth success with external auth method %s of plugin %s for %s.',
|
|
|
|
authName, npmName, user.email
|
|
|
|
)
|
|
|
|
|
|
|
|
res.locals.bypassLogin = {
|
|
|
|
bypass: true,
|
|
|
|
pluginName: npmName,
|
|
|
|
authName: authName,
|
|
|
|
user
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function isAuthResultValid (npmName: string, authName: string, result: RegisterServerAuthenticatedResult) {
|
|
|
|
if (!isUserUsernameValid(result.username)) {
|
2020-04-30 15:03:09 +02:00
|
|
|
logger.error('Auth method %s of plugin %s did not provide a valid username.', authName, npmName, { username: result.username })
|
2020-04-28 14:49:03 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!result.email) {
|
2020-04-30 15:03:09 +02:00
|
|
|
logger.error('Auth method %s of plugin %s did not provide a valid email.', authName, npmName, { email: result.email })
|
2020-04-28 14:49:03 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// role is optional
|
|
|
|
if (result.role && !isUserRoleValid(result.role)) {
|
2020-04-30 15:03:09 +02:00
|
|
|
logger.error('Auth method %s of plugin %s did not provide a valid role.', authName, npmName, { role: result.role })
|
2020-04-28 14:49:03 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// display name is optional
|
|
|
|
if (result.displayName && !isUserDisplayNameValid(result.displayName)) {
|
2020-04-30 15:03:09 +02:00
|
|
|
logger.error(
|
|
|
|
'Auth method %s of plugin %s did not provide a valid display name.',
|
|
|
|
authName, npmName, { displayName: result.displayName }
|
|
|
|
)
|
2020-04-28 14:49:03 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
function buildUserResult (pluginResult: RegisterServerAuthenticatedResult) {
|
|
|
|
return {
|
|
|
|
username: pluginResult.username,
|
|
|
|
email: pluginResult.email,
|
2020-04-29 09:04:42 +02:00
|
|
|
role: pluginResult.role ?? UserRole.USER,
|
2020-04-28 14:49:03 +02:00
|
|
|
displayName: pluginResult.displayName || pluginResult.username
|
|
|
|
}
|
|
|
|
}
|