PeerTube/server/lib/auth/external-auth.ts

220 lines
6.3 KiB
TypeScript
Raw Normal View History

2020-04-28 14:49:03 +02:00
import { isUserDisplayNameValid, isUserRoleValid, isUserUsernameValid } from '@server/helpers/custom-validators/users'
2020-04-22 16:07:04 +02:00
import { logger } from '@server/helpers/logger'
2020-04-28 14:49:03 +02:00
import { generateRandomString } from '@server/helpers/utils'
import { PLUGIN_EXTERNAL_AUTH_TOKEN_LIFETIME } from '@server/initializers/constants'
2020-04-28 14:49:03 +02:00
import { PluginManager } from '@server/lib/plugins/plugin-manager'
import { OAuthTokenModel } from '@server/models/oauth/oauth-token'
2020-04-28 14:49:03 +02:00
import {
RegisterServerAuthenticatedResult,
RegisterServerAuthPassOptions,
RegisterServerExternalAuthenticatedResult
2020-06-23 14:10:17 +02:00
} from '@server/types/plugins/register-server-auth.model'
import { UserRole } from '@shared/models'
2020-04-22 16:07:04 +02:00
2020-04-28 14:49:03 +02:00
// Token is the key, expiration date is the value
const authBypassTokens = new Map<string, {
expires: Date
user: {
username: string
email: string
displayName: string
role: UserRole
}
authName: string
npmName: string
}>()
2020-04-22 16:07:04 +02:00
2020-04-28 14:49:03 +02:00
async function onExternalUserAuthenticated (options: {
npmName: string
authName: string
authResult: RegisterServerExternalAuthenticatedResult
}) {
const { npmName, authName, authResult } = options
2020-04-28 14:49:03 +02:00
if (!authResult.req || !authResult.res) {
logger.error('Cannot authenticate external user for auth %s of plugin %s: no req or res are provided.', authName, npmName)
return
}
const { res } = authResult
2020-04-30 15:03:09 +02:00
if (!isAuthResultValid(npmName, authName, authResult)) {
res.redirect('/login?externalAuthError=true')
return
}
2020-04-28 14:49:03 +02:00
logger.info('Generating auth bypass token for %s in auth %s of plugin %s.', authResult.username, authName, npmName)
const bypassToken = await generateRandomString(32)
const expires = new Date()
2020-04-29 09:04:42 +02:00
expires.setTime(expires.getTime() + PLUGIN_EXTERNAL_AUTH_TOKEN_LIFETIME)
2020-04-28 14:49:03 +02:00
const user = buildUserResult(authResult)
authBypassTokens.set(bypassToken, {
expires,
user,
npmName,
authName
})
2020-05-11 08:40:38 +02:00
// Cleanup expired tokens
2020-05-11 08:40:38 +02:00
const now = new Date()
for (const [ key, value ] of authBypassTokens) {
if (value.expires.getTime() < now.getTime()) {
authBypassTokens.delete(key)
}
}
2020-04-28 14:49:03 +02:00
res.redirect(`/login?externalAuthToken=${bypassToken}&username=${user.username}`)
}
async function getAuthNameFromRefreshGrant (refreshToken?: string) {
if (!refreshToken) return undefined
const tokenModel = await OAuthTokenModel.loadByRefreshToken(refreshToken)
return tokenModel?.authName
}
async function getBypassFromPasswordGrant (username: string, password: string) {
2020-04-22 16:07:04 +02:00
const plugins = PluginManager.Instance.getIdAndPassAuths()
const pluginAuths: { npmName?: string, registerAuthOptions: RegisterServerAuthPassOptions }[] = []
for (const plugin of plugins) {
const auths = plugin.idAndPassAuths
for (const auth of auths) {
pluginAuths.push({
npmName: plugin.npmName,
registerAuthOptions: auth
})
}
}
pluginAuths.sort((a, b) => {
const aWeight = a.registerAuthOptions.getWeight()
const bWeight = b.registerAuthOptions.getWeight()
// DESC weight order
2020-04-22 16:07:04 +02:00
if (aWeight === bWeight) return 0
if (aWeight < bWeight) return 1
2020-04-22 16:07:04 +02:00
return -1
})
const loginOptions = {
id: username,
password
2020-04-22 16:07:04 +02:00
}
for (const pluginAuth of pluginAuths) {
const authOptions = pluginAuth.registerAuthOptions
2020-04-27 11:42:01 +02:00
const authName = authOptions.authName
const npmName = pluginAuth.npmName
2020-04-22 16:07:04 +02:00
logger.debug(
'Using auth method %s of plugin %s to login %s with weight %d.',
2020-04-27 11:42:01 +02:00
authName, npmName, loginOptions.id, authOptions.getWeight()
2020-04-22 16:07:04 +02:00
)
2020-04-27 10:19:14 +02:00
try {
const loginResult = await authOptions.login(loginOptions)
2020-04-28 14:49:03 +02:00
if (!loginResult) continue
if (!isAuthResultValid(pluginAuth.npmName, authOptions.authName, loginResult)) continue
logger.info(
'Login success with auth method %s of plugin %s for %s.',
authName, npmName, loginOptions.id
)
return {
2020-04-28 14:49:03 +02:00
bypass: true,
pluginName: pluginAuth.npmName,
authName: authOptions.authName,
user: buildUserResult(loginResult)
2020-04-27 10:19:14 +02:00
}
} catch (err) {
logger.error('Error in auth method %s of plugin %s', authOptions.authName, pluginAuth.npmName, { err })
2020-04-22 16:07:04 +02:00
}
}
return undefined
2020-04-22 16:07:04 +02:00
}
2020-04-28 14:49:03 +02:00
function getBypassFromExternalAuth (username: string, externalAuthToken: string) {
const obj = authBypassTokens.get(externalAuthToken)
if (!obj) throw new Error('Cannot authenticate user with unknown bypass token')
2020-04-28 14:49:03 +02:00
const { expires, user, authName, npmName } = obj
const now = new Date()
if (now.getTime() > expires.getTime()) {
throw new Error('Cannot authenticate user with an expired external auth token')
2020-04-28 14:49:03 +02:00
}
if (user.username !== username) {
throw new Error(`Cannot authenticate user ${user.username} with invalid username ${username}`)
2020-04-28 14:49:03 +02:00
}
logger.info(
'Auth success with external auth method %s of plugin %s for %s.',
authName, npmName, user.email
)
return {
2020-04-28 14:49:03 +02:00
bypass: true,
pluginName: npmName,
authName: authName,
user
}
}
function isAuthResultValid (npmName: string, authName: string, result: RegisterServerAuthenticatedResult) {
if (!isUserUsernameValid(result.username)) {
2020-04-30 15:03:09 +02:00
logger.error('Auth method %s of plugin %s did not provide a valid username.', authName, npmName, { username: result.username })
2020-04-28 14:49:03 +02:00
return false
}
if (!result.email) {
2020-04-30 15:03:09 +02:00
logger.error('Auth method %s of plugin %s did not provide a valid email.', authName, npmName, { email: result.email })
2020-04-28 14:49:03 +02:00
return false
}
// role is optional
if (result.role && !isUserRoleValid(result.role)) {
2020-04-30 15:03:09 +02:00
logger.error('Auth method %s of plugin %s did not provide a valid role.', authName, npmName, { role: result.role })
2020-04-28 14:49:03 +02:00
return false
}
// display name is optional
if (result.displayName && !isUserDisplayNameValid(result.displayName)) {
2020-04-30 15:03:09 +02:00
logger.error(
'Auth method %s of plugin %s did not provide a valid display name.',
authName, npmName, { displayName: result.displayName }
)
2020-04-28 14:49:03 +02:00
return false
}
return true
}
function buildUserResult (pluginResult: RegisterServerAuthenticatedResult) {
return {
username: pluginResult.username,
email: pluginResult.email,
2020-04-29 09:04:42 +02:00
role: pluginResult.role ?? UserRole.USER,
2020-04-28 14:49:03 +02:00
displayName: pluginResult.displayName || pluginResult.username
}
}
// ---------------------------------------------------------------------------
export {
onExternalUserAuthenticated,
getBypassFromExternalAuth,
getAuthNameFromRefreshGrant,
getBypassFromPasswordGrant
}