loopback/server/middleware/token.js

151 lines
5.4 KiB
JavaScript
Raw Normal View History

// Copyright IBM Corp. 2014,2018. All Rights Reserved.
2016-05-03 22:50:21 +00:00
// Node module: loopback
// This file is licensed under the MIT License.
// License text available at https://opensource.org/licenses/MIT
2014-01-06 23:52:08 +00:00
/*!
2013-11-13 19:49:08 +00:00
* Module dependencies.
*/
'use strict';
var g = require('../../lib/globalize');
var loopback = require('../../lib/loopback');
2013-12-03 00:37:42 +00:00
var assert = require('assert');
var debug = require('debug')('loopback:middleware:token');
2013-11-13 19:49:08 +00:00
2014-01-06 23:52:08 +00:00
/*!
2013-11-13 19:49:08 +00:00
* Export the middleware.
*/
module.exports = token;
/*
* Rewrite the url to replace current user literal with the logged in user id
*/
function rewriteUserLiteral(req, currentUserLiteral, next) {
if (!currentUserLiteral) return next();
const literalRegExp = new RegExp('/' + currentUserLiteral + '(/|$|\\?)', 'g');
if (req.accessToken && req.accessToken.userId) {
// Replace /me/ with /current-user-id/
var urlBeforeRewrite = req.url;
req.url = req.url.replace(literalRegExp,
'/' + req.accessToken.userId + '$1');
if (req.url !== urlBeforeRewrite) {
debug('req.url has been rewritten from %s to %s', urlBeforeRewrite,
req.url);
}
} else if (!req.accessToken && literalRegExp.test(req.url)) {
debug(
'URL %s matches current-user literal %s,' +
' but no (valid) access token was provided.',
req.url, currentUserLiteral);
var e = new Error(g.f('Authorization Required'));
e.status = e.statusCode = 401;
e.code = 'AUTHORIZATION_REQUIRED';
return next(e);
}
next();
}
function escapeRegExp(str) {
return str.replace(/[.*+?^${}()|[\]\\]/g, '\\$&');
}
2014-10-16 22:54:40 +00:00
/**
2014-06-05 00:42:18 +00:00
* Check for an access token in cookies, headers, and query string parameters.
* This function always checks for the following:
2014-10-16 22:54:40 +00:00
*
* - `access_token` (params only)
* - `X-Access-Token` (headers only)
* - `authorization` (headers and cookies)
2014-06-05 00:42:18 +00:00
*
* It checks for these values in cookies, headers, and query string parameters _in addition_ to the items
* specified in the options parameter.
2014-10-16 22:54:40 +00:00
*
2014-06-05 00:42:18 +00:00
* **NOTE:** This function only checks for [signed cookies](http://expressjs.com/api.html#req.signedCookies).
2014-10-16 22:54:40 +00:00
*
2014-01-06 23:52:08 +00:00
* The following example illustrates how to check for an `accessToken` in a custom cookie, query string parameter
* and header called `foo-auth`.
2014-10-16 22:54:40 +00:00
*
2014-01-06 23:52:08 +00:00
* ```js
* app.use(loopback.token({
* cookies: ['foo-auth'],
* headers: ['foo-auth', 'X-Foo-Auth'],
2014-06-05 00:42:18 +00:00
* params: ['foo-auth', 'foo_auth']
2014-01-06 23:52:08 +00:00
* }));
* ```
*
2014-06-05 00:42:18 +00:00
* @options {Object} [options] Each option array is used to add additional keys to find an `accessToken` for a `request`.
* @property {Array} [cookies] Array of cookie names.
* @property {Array} [headers] Array of header names.
* @property {Array} [params] Array of param names.
* @property {Boolean} [searchDefaultTokenKeys] Use the default search locations for Token in request
* @property {Boolean} [enableDoublecheck] Execute middleware although an instance mounted earlier in the chain didn't find a token
* @property {Boolean} [overwriteExistingToken] only has effect in combination with `enableDoublecheck`. If truthy, will allow to overwrite an existing accessToken.
* @property {Function|String} [model] AccessToken model name or class to use.
* @property {String} [currentUserLiteral] String literal for the current user.
* @property {Boolean} [bearerTokenBase64Encoded] Defaults to `true`. For `Bearer` token based `Authorization` headers,
* decode the value from `Base64`. If set to `false`, the decoding will be skipped and the token id will be the raw value
* parsed from the header.
2014-06-05 00:42:18 +00:00
* @header loopback.token([options])
2014-01-06 23:52:08 +00:00
*/
2013-11-14 23:27:36 +00:00
function token(options) {
2013-11-13 19:49:08 +00:00
options = options || {};
var TokenModel;
var currentUserLiteral = options.currentUserLiteral;
if (currentUserLiteral && (typeof currentUserLiteral !== 'string')) {
debug('Set currentUserLiteral to \'me\' as the value is not a string.');
currentUserLiteral = 'me';
}
if (typeof currentUserLiteral === 'string') {
currentUserLiteral = escapeRegExp(currentUserLiteral);
}
2014-10-16 22:54:40 +00:00
if (options.bearerTokenBase64Encoded === undefined) {
options.bearerTokenBase64Encoded = true;
}
var enableDoublecheck = !!options.enableDoublecheck;
var overwriteExistingToken = !!options.overwriteExistingToken;
return function(req, res, next) {
var app = req.app;
var registry = app.registry;
if (!TokenModel) {
TokenModel = registry.getModel(options.model || 'AccessToken');
}
assert(typeof TokenModel === 'function',
'loopback.token() middleware requires a AccessToken model');
if (req.accessToken !== undefined) {
if (!enableDoublecheck) {
// req.accessToken is defined already (might also be "null" or "false") and enableDoublecheck
// has not been set --> skip searching for credentials
return rewriteUserLiteral(req, currentUserLiteral, next);
}
if (req.accessToken && req.accessToken.id && !overwriteExistingToken) {
// req.accessToken.id is defined, which means that some other middleware has identified a valid user.
// when overwriteExistingToken is not set to a truthy value, skip searching for credentials.
return rewriteUserLiteral(req, currentUserLiteral, next);
}
// continue normal operation (as if req.accessToken was undefined)
}
2013-11-14 21:01:47 +00:00
TokenModel.findForRequest(req, options, function(err, token) {
req.accessToken = token || null;
var ctx = req.loopbackContext;
if (ctx && ctx.active) ctx.set('accessToken', token);
if (err) return next(err);
rewriteUserLiteral(req, currentUserLiteral, next);
2013-11-14 21:01:47 +00:00
});
2014-10-16 22:54:40 +00:00
};
2013-11-13 19:49:08 +00:00
}