]>
Commit | Line | Data |
---|---|---|
41fb13c3 | 1 | import express from 'express' |
031bbcd2 | 2 | import { AccessDeniedError } from '@node-oauth/oauth2-server' |
a77c7327 | 3 | import { PluginManager } from '@server/lib/plugins/plugin-manager' |
60b880ac C |
4 | import { AccountModel } from '@server/models/account/account' |
5 | import { AuthenticatedResultUpdaterFieldName, RegisterServerAuthenticatedResult } from '@server/types' | |
f43db2f4 | 6 | import { MOAuthClient } from '@server/types/models' |
26d6bf65 | 7 | import { MOAuthTokenUser } from '@server/types/models/oauth/oauth-token' |
60b880ac | 8 | import { MUser, MUserDefault } from '@server/types/models/user/user' |
d3d3deaa | 9 | import { pick } from '@shared/core-utils' |
60b880ac | 10 | import { AttributesOnly } from '@shared/typescript-utils' |
f43db2f4 C |
11 | import { logger } from '../../helpers/logger' |
12 | import { CONFIG } from '../../initializers/config' | |
f43db2f4 C |
13 | import { OAuthClientModel } from '../../models/oauth/oauth-client' |
14 | import { OAuthTokenModel } from '../../models/oauth/oauth-token' | |
9d8ef212 | 15 | import { UserModel } from '../../models/user/user' |
0b6f5316 | 16 | import { findAvailableLocalActorName } from '../local-actor' |
d3d3deaa | 17 | import { buildUser, createUserAccountAndChannelAndPlaylist } from '../user' |
7e0c2606 | 18 | import { ExternalUser } from './external-auth' |
f43db2f4 C |
19 | import { TokensCache } from './tokens-cache' |
20 | ||
21 | type TokenInfo = { | |
22 | accessToken: string | |
23 | refreshToken: string | |
24 | accessTokenExpiresAt: Date | |
25 | refreshTokenExpiresAt: Date | |
f201a749 C |
26 | } |
27 | ||
f43db2f4 C |
28 | export type BypassLogin = { |
29 | bypass: boolean | |
30 | pluginName: string | |
31 | authName?: string | |
7e0c2606 | 32 | user: ExternalUser |
60b880ac | 33 | userUpdater: RegisterServerAuthenticatedResult['userUpdater'] |
f201a749 C |
34 | } |
35 | ||
e307e4fc | 36 | async function getAccessToken (bearerToken: string) { |
69b0a27c C |
37 | logger.debug('Getting access token (bearerToken: ' + bearerToken + ').') |
38 | ||
e307e4fc | 39 | if (!bearerToken) return undefined |
3acc5084 | 40 | |
e307e4fc | 41 | let tokenModel: MOAuthTokenUser |
f201a749 | 42 | |
f43db2f4 C |
43 | if (TokensCache.Instance.hasToken(bearerToken)) { |
44 | tokenModel = TokensCache.Instance.getByToken(bearerToken) | |
e307e4fc C |
45 | } else { |
46 | tokenModel = await OAuthTokenModel.getByTokenAndPopulateUser(bearerToken) | |
7fed6375 | 47 | |
f43db2f4 | 48 | if (tokenModel) TokensCache.Instance.setToken(tokenModel) |
e307e4fc C |
49 | } |
50 | ||
51 | if (!tokenModel) return undefined | |
52 | ||
53 | if (tokenModel.User.pluginAuth) { | |
54 | const valid = await PluginManager.Instance.isTokenValid(tokenModel, 'access') | |
55 | ||
56 | if (valid !== true) return undefined | |
57 | } | |
58 | ||
59 | return tokenModel | |
69b0a27c C |
60 | } |
61 | ||
69818c93 | 62 | function getClient (clientId: string, clientSecret: string) { |
69b0a27c C |
63 | logger.debug('Getting Client (clientId: ' + clientId + ', clientSecret: ' + clientSecret + ').') |
64 | ||
3fd3ab2d | 65 | return OAuthClientModel.getByIdAndSecret(clientId, clientSecret) |
69b0a27c C |
66 | } |
67 | ||
e307e4fc | 68 | async function getRefreshToken (refreshToken: string) { |
69b0a27c C |
69 | logger.debug('Getting RefreshToken (refreshToken: ' + refreshToken + ').') |
70 | ||
e307e4fc C |
71 | const tokenInfo = await OAuthTokenModel.getByRefreshTokenAndPopulateClient(refreshToken) |
72 | if (!tokenInfo) return undefined | |
73 | ||
74 | const tokenModel = tokenInfo.token | |
75 | ||
76 | if (tokenModel.User.pluginAuth) { | |
77 | const valid = await PluginManager.Instance.isTokenValid(tokenModel, 'refresh') | |
78 | ||
79 | if (valid !== true) return undefined | |
80 | } | |
81 | ||
82 | return tokenInfo | |
69b0a27c C |
83 | } |
84 | ||
f43db2f4 | 85 | async function getUser (usernameOrEmail?: string, password?: string, bypassLogin?: BypassLogin) { |
e307e4fc | 86 | // Special treatment coming from a plugin |
f43db2f4 C |
87 | if (bypassLogin && bypassLogin.bypass === true) { |
88 | logger.info('Bypassing oauth login by plugin %s.', bypassLogin.pluginName) | |
7fed6375 | 89 | |
f43db2f4 | 90 | let user = await UserModel.loadByEmail(bypassLogin.user.email) |
60b880ac | 91 | |
f43db2f4 | 92 | if (!user) user = await createUserFromExternal(bypassLogin.pluginName, bypassLogin.user) |
60b880ac | 93 | else user = await updateUserFromExternal(user, bypassLogin.user, bypassLogin.userUpdater) |
7fed6375 | 94 | |
9a7fd960 C |
95 | // Cannot create a user |
96 | if (!user) throw new AccessDeniedError('Cannot create such user: an actor with that name already exists.') | |
97 | ||
e9b0fa5c C |
98 | // If the user does not belongs to a plugin, it was created before its installation |
99 | // Then we just go through a regular login process | |
100 | if (user.pluginAuth !== null) { | |
101 | // This user does not belong to this plugin, skip it | |
400ed2ab C |
102 | if (user.pluginAuth !== bypassLogin.pluginName) { |
103 | logger.info( | |
104 | 'Cannot bypass oauth login by plugin %s because %s has another plugin auth method (%s).', | |
105 | bypassLogin.pluginName, bypassLogin.user.email, user.pluginAuth | |
106 | ) | |
107 | ||
108 | return null | |
109 | } | |
7fed6375 | 110 | |
33c7131b C |
111 | checkUserValidityOrThrow(user) |
112 | ||
e9b0fa5c C |
113 | return user |
114 | } | |
7fed6375 C |
115 | } |
116 | ||
ba12e8b3 | 117 | logger.debug('Getting User (username/email: ' + usernameOrEmail + ', password: ******).') |
69b0a27c | 118 | |
ba12e8b3 | 119 | const user = await UserModel.loadByUsernameOrEmail(usernameOrEmail) |
9d8ef212 | 120 | |
e1c55031 | 121 | // If we don't find the user, or if the user belongs to a plugin |
d253bfaa | 122 | if (!user || user.pluginAuth !== null || !password) return null |
26d7d31b | 123 | |
f5028693 | 124 | const passwordMatch = await user.isPasswordMatch(password) |
e9b0fa5c | 125 | if (passwordMatch !== true) return null |
26d7d31b | 126 | |
33c7131b | 127 | checkUserValidityOrThrow(user) |
e6921918 | 128 | |
d9eaee39 JM |
129 | if (CONFIG.SIGNUP.REQUIRES_EMAIL_VERIFICATION && user.emailVerified === false) { |
130 | throw new AccessDeniedError('User email is not verified.') | |
131 | } | |
132 | ||
f5028693 | 133 | return user |
2f372a86 C |
134 | } |
135 | ||
f43db2f4 C |
136 | async function revokeToken ( |
137 | tokenInfo: { refreshToken: string }, | |
97aeb3cc C |
138 | options: { |
139 | req?: express.Request | |
140 | explicitLogout?: boolean | |
141 | } = {} | |
f43db2f4 | 142 | ): Promise<{ success: boolean, redirectUrl?: string }> { |
97aeb3cc C |
143 | const { req, explicitLogout } = options |
144 | ||
3fd3ab2d | 145 | const token = await OAuthTokenModel.getByRefreshTokenAndPopulateUser(tokenInfo.refreshToken) |
e1c55031 | 146 | |
bfcef50d | 147 | if (token) { |
74fd2643 C |
148 | let redirectUrl: string |
149 | ||
f43db2f4 | 150 | if (explicitLogout === true && token.User.pluginAuth && token.authName) { |
97aeb3cc | 151 | redirectUrl = await PluginManager.Instance.onLogout(token.User.pluginAuth, token.authName, token.User, req) |
e1c55031 C |
152 | } |
153 | ||
f43db2f4 | 154 | TokensCache.Instance.clearCacheByToken(token.accessToken) |
f201a749 | 155 | |
bfcef50d C |
156 | token.destroy() |
157 | .catch(err => logger.error('Cannot destroy token when revoking token.', { err })) | |
7fed6375 | 158 | |
74fd2643 | 159 | return { success: true, redirectUrl } |
bfcef50d | 160 | } |
f5028693 | 161 | |
74fd2643 | 162 | return { success: false } |
69b0a27c C |
163 | } |
164 | ||
f43db2f4 C |
165 | async function saveToken ( |
166 | token: TokenInfo, | |
167 | client: MOAuthClient, | |
168 | user: MUser, | |
169 | options: { | |
170 | refreshTokenAuthName?: string | |
171 | bypassLogin?: BypassLogin | |
172 | } = {} | |
173 | ) { | |
174 | const { refreshTokenAuthName, bypassLogin } = options | |
e307e4fc | 175 | let authName: string = null |
f43db2f4 C |
176 | |
177 | if (bypassLogin?.bypass === true) { | |
178 | authName = bypassLogin.authName | |
179 | } else if (refreshTokenAuthName) { | |
180 | authName = refreshTokenAuthName | |
e307e4fc | 181 | } |
e1c55031 | 182 | |
32bb4156 | 183 | logger.debug('Saving token ' + token.accessToken + ' for client ' + client.id + ' and user ' + user.id + '.') |
69b0a27c | 184 | |
feb4bdfd | 185 | const tokenToCreate = { |
69b0a27c | 186 | accessToken: token.accessToken, |
2f372a86 | 187 | accessTokenExpiresAt: token.accessTokenExpiresAt, |
69b0a27c | 188 | refreshToken: token.refreshToken, |
2f372a86 | 189 | refreshTokenExpiresAt: token.refreshTokenExpiresAt, |
e1c55031 | 190 | authName, |
feb4bdfd C |
191 | oAuthClientId: client.id, |
192 | userId: user.id | |
193 | } | |
69b0a27c | 194 | |
3fd3ab2d | 195 | const tokenCreated = await OAuthTokenModel.create(tokenToCreate) |
3cc665f4 C |
196 | |
197 | user.lastLoginDate = new Date() | |
198 | await user.save() | |
199 | ||
e7812bf0 C |
200 | return { |
201 | accessToken: tokenCreated.accessToken, | |
202 | accessTokenExpiresAt: tokenCreated.accessTokenExpiresAt, | |
203 | refreshToken: tokenCreated.refreshToken, | |
204 | refreshTokenExpiresAt: tokenCreated.refreshTokenExpiresAt, | |
205 | client, | |
206 | user, | |
f43db2f4 C |
207 | accessTokenExpiresIn: buildExpiresIn(tokenCreated.accessTokenExpiresAt), |
208 | refreshTokenExpiresIn: buildExpiresIn(tokenCreated.refreshTokenExpiresAt) | |
e7812bf0 | 209 | } |
69b0a27c C |
210 | } |
211 | ||
65fcc311 C |
212 | export { |
213 | getAccessToken, | |
214 | getClient, | |
215 | getRefreshToken, | |
216 | getUser, | |
217 | revokeToken, | |
218 | saveToken | |
219 | } | |
7fed6375 | 220 | |
f43db2f4 C |
221 | // --------------------------------------------------------------------------- |
222 | ||
7e0c2606 C |
223 | async function createUserFromExternal (pluginAuth: string, userOptions: ExternalUser) { |
224 | const username = await findAvailableLocalActorName(userOptions.username) | |
9a7fd960 | 225 | |
d3d3deaa | 226 | const userToCreate = buildUser({ |
7e0c2606 | 227 | ...pick(userOptions, [ 'email', 'role', 'adminFlags', 'videoQuota', 'videoQuotaDaily' ]), |
d3d3deaa | 228 | |
0b6f5316 | 229 | username, |
d3d3deaa | 230 | emailVerified: null, |
7fed6375 | 231 | password: null, |
7fed6375 | 232 | pluginAuth |
d3d3deaa | 233 | }) |
7fed6375 C |
234 | |
235 | const { user } = await createUserAccountAndChannelAndPlaylist({ | |
236 | userToCreate, | |
7e0c2606 | 237 | userDisplayName: userOptions.displayName |
7fed6375 C |
238 | }) |
239 | ||
240 | return user | |
241 | } | |
33c7131b | 242 | |
60b880ac C |
243 | async function updateUserFromExternal ( |
244 | user: MUserDefault, | |
245 | userOptions: ExternalUser, | |
246 | userUpdater: RegisterServerAuthenticatedResult['userUpdater'] | |
247 | ) { | |
248 | if (!userUpdater) return user | |
249 | ||
250 | { | |
251 | type UserAttributeKeys = keyof AttributesOnly<UserModel> | |
252 | const mappingKeys: { [ id in UserAttributeKeys ]?: AuthenticatedResultUpdaterFieldName } = { | |
253 | role: 'role', | |
254 | adminFlags: 'adminFlags', | |
255 | videoQuota: 'videoQuota', | |
256 | videoQuotaDaily: 'videoQuotaDaily' | |
257 | } | |
258 | ||
259 | for (const modelKey of Object.keys(mappingKeys)) { | |
260 | const pluginOptionKey = mappingKeys[modelKey] | |
261 | ||
262 | const newValue = userUpdater({ fieldName: pluginOptionKey, currentValue: user[modelKey], newValue: userOptions[pluginOptionKey] }) | |
263 | user.set(modelKey, newValue) | |
264 | } | |
265 | } | |
266 | ||
267 | { | |
268 | type AccountAttributeKeys = keyof Partial<AttributesOnly<AccountModel>> | |
269 | const mappingKeys: { [ id in AccountAttributeKeys ]?: AuthenticatedResultUpdaterFieldName } = { | |
270 | name: 'displayName' | |
271 | } | |
272 | ||
273 | for (const modelKey of Object.keys(mappingKeys)) { | |
274 | const optionKey = mappingKeys[modelKey] | |
275 | ||
276 | const newValue = userUpdater({ fieldName: optionKey, currentValue: user.Account[modelKey], newValue: userOptions[optionKey] }) | |
277 | user.Account.set(modelKey, newValue) | |
278 | } | |
279 | } | |
280 | ||
281 | logger.debug('Updated user %s with plugin userUpdated function.', user.email, { user, userOptions }) | |
282 | ||
283 | user.Account = await user.Account.save() | |
284 | ||
285 | return user.save() | |
286 | } | |
287 | ||
33c7131b C |
288 | function checkUserValidityOrThrow (user: MUser) { |
289 | if (user.blocked) throw new AccessDeniedError('User is blocked.') | |
290 | } | |
f43db2f4 C |
291 | |
292 | function buildExpiresIn (expiresAt: Date) { | |
293 | return Math.floor((expiresAt.getTime() - new Date().getTime()) / 1000) | |
294 | } |