audiobookshelf/server/Auth.js

568 lines
20 KiB
JavaScript
Raw Normal View History

const axios = require('axios')
2023-03-24 18:21:25 +01:00
const passport = require('passport')
2022-07-07 02:01:27 +02:00
const bcrypt = require('./libs/bcryptjs')
2022-07-07 01:45:43 +02:00
const jwt = require('./libs/jsonwebtoken')
const LocalStrategy = require('./libs/passportLocal')
const JwtStrategy = require('passport-jwt').Strategy
const ExtractJwt = require('passport-jwt').ExtractJwt
const OpenIDClient = require('openid-client')
2023-09-13 18:35:39 +02:00
const Database = require('./Database')
const Logger = require('./Logger')
2023-03-24 18:21:25 +01:00
/**
* @class Class for handling all the authentication related functionality.
*/
2021-08-18 00:01:11 +02:00
class Auth {
2023-03-24 18:21:25 +01:00
2023-09-13 18:35:39 +02:00
constructor() {
2021-08-18 00:01:11 +02:00
}
2023-03-24 18:21:25 +01:00
/**
2023-09-20 19:37:55 +02:00
* Inializes all passportjs strategies and other passportjs ralated initialization.
2023-03-24 18:21:25 +01:00
*/
2023-09-16 20:42:48 +02:00
async initPassportJs() {
2023-09-20 19:37:55 +02:00
// Check if we should load the local strategy (username + password login)
2023-03-24 18:21:25 +01:00
if (global.ServerSettings.authActiveAuthMethods.includes("local")) {
this.initAuthStrategyPassword()
}
// Check if we should load the openid strategy
if (global.ServerSettings.authActiveAuthMethods.includes("openid")) {
this.initAuthStrategyOpenID()
2023-03-24 18:21:25 +01:00
}
2023-03-24 18:21:25 +01:00
// Load the JwtStrategy (always) -> for bearer token auth
passport.use(new JwtStrategy({
jwtFromRequest: ExtractJwt.fromExtractors([ExtractJwt.fromAuthHeaderAsBearerToken(), ExtractJwt.fromUrlQueryParameter('token')]),
secretOrKey: Database.serverSettings.tokenSecret
2023-03-24 18:21:25 +01:00
}, this.jwtAuthCheck.bind(this)))
// define how to seralize a user (to be put into the session)
passport.serializeUser(function (user, cb) {
process.nextTick(function () {
2023-09-20 19:37:55 +02:00
// only store id to session
return cb(null, JSON.stringify({
id: user.id,
}))
})
})
2023-03-24 18:21:25 +01:00
2023-09-20 19:37:55 +02:00
// define how to deseralize a user (use the ID to get it from the database)
passport.deserializeUser((function (user, cb) {
2023-09-13 18:35:39 +02:00
process.nextTick((async function () {
const parsedUserInfo = JSON.parse(user)
2023-09-20 19:37:55 +02:00
// load the user by ID that is stored in the session
const dbUser = await Database.userModel.getUserById(parsedUserInfo.id)
return cb(null, dbUser)
}).bind(this))
}).bind(this))
2021-08-18 00:01:11 +02:00
}
/**
* Passport use LocalStrategy
*/
initAuthStrategyPassword() {
passport.use(new LocalStrategy(this.localAuthCheckUserPw.bind(this)))
}
/**
* Passport use OpenIDClient.Strategy
*/
initAuthStrategyOpenID() {
2023-11-19 19:57:17 +01:00
if (!Database.serverSettings.isOpenIDAuthSettingsValid) {
Logger.error(`[Auth] Cannot init openid auth strategy - invalid settings`)
return
}
const openIdIssuerClient = new OpenIDClient.Issuer({
issuer: global.ServerSettings.authOpenIDIssuerURL,
authorization_endpoint: global.ServerSettings.authOpenIDAuthorizationURL,
token_endpoint: global.ServerSettings.authOpenIDTokenURL,
userinfo_endpoint: global.ServerSettings.authOpenIDUserInfoURL,
jwks_uri: global.ServerSettings.authOpenIDJwksURL
}).Client
const openIdClient = new openIdIssuerClient({
client_id: global.ServerSettings.authOpenIDClientID,
client_secret: global.ServerSettings.authOpenIDClientSecret
})
passport.use('openid-client', new OpenIDClient.Strategy({
client: openIdClient,
params: {
redirect_uri: '/auth/openid/callback',
scope: 'openid profile email'
}
}, async (tokenset, userinfo, done) => {
Logger.debug(`[Auth] openid callback userinfo=`, userinfo)
let failureMessage = 'Unauthorized'
if (!userinfo.sub) {
Logger.error(`[Auth] openid callback invalid userinfo, no sub`)
return done(null, null, failureMessage)
}
// First check for matching user by sub
let user = await Database.userModel.getUserByOpenIDSub(userinfo.sub)
if (!user) {
// Optionally match existing by email or username based on server setting "authOpenIDMatchExistingBy"
if (Database.serverSettings.authOpenIDMatchExistingBy === 'email' && userinfo.email && userinfo.email_verified) {
Logger.info(`[Auth] openid: User not found, checking existing with email "${userinfo.email}"`)
user = await Database.userModel.getUserByEmail(userinfo.email)
// Check that user is not already matched
if (user?.authOpenIDSub) {
Logger.warn(`[Auth] openid: User found with email "${userinfo.email}" but is already matched with sub "${user.authOpenIDSub}"`)
// TODO: Message isn't actually returned to the user yet. Need to override the passport authenticated callback
failureMessage = 'A matching user was found but is already matched with another user from your auth provider'
user = null
}
} else if (Database.serverSettings.authOpenIDMatchExistingBy === 'username' && userinfo.preferred_username) {
Logger.info(`[Auth] openid: User not found, checking existing with username "${userinfo.preferred_username}"`)
user = await Database.userModel.getUserByUsername(userinfo.preferred_username)
// Check that user is not already matched
if (user?.authOpenIDSub) {
Logger.warn(`[Auth] openid: User found with username "${userinfo.preferred_username}" but is already matched with sub "${user.authOpenIDSub}"`)
// TODO: Message isn't actually returned to the user yet. Need to override the passport authenticated callback
failureMessage = 'A matching user was found but is already matched with another user from your auth provider'
user = null
}
}
// If existing user was matched and isActive then save sub to user
if (user?.isActive) {
Logger.info(`[Auth] openid: New user found matching existing user "${user.username}"`)
user.authOpenIDSub = userinfo.sub
await Database.userModel.updateFromOld(user)
} else if (user && !user.isActive) {
Logger.warn(`[Auth] openid: New user found matching existing user "${user.username}" but that user is deactivated`)
}
// Optionally auto register the user
if (!user && Database.serverSettings.authOpenIDAutoRegister) {
Logger.info(`[Auth] openid: Auto-registering user with sub "${userinfo.sub}"`, userinfo)
user = await Database.userModel.createUserFromOpenIdUserInfo(userinfo, this)
}
}
if (!user?.isActive) {
if (user && !user.isActive) {
failureMessage = 'Unauthorized'
}
// deny login
done(null, null, failureMessage)
return
}
// permit login
return done(null, user)
}))
}
/**
* Unuse strategy
*
* @param {string} name
*/
unuseAuthStrategy(name) {
passport.unuse(name)
}
/**
* Use strategy
*
* @param {string} name
*/
useAuthStrategy(name) {
if (name === 'openid') {
this.initAuthStrategyOpenID()
} else if (name === 'local') {
this.initAuthStrategyPassword()
} else {
Logger.error('[Auth] Invalid auth strategy ' + name)
}
}
2023-09-17 19:42:42 +02:00
/**
* Stores the client's choice how the login callback should happen in temp cookies
*
* @param {import('express').Request} req
* @param {import('express').Response} res
2023-09-17 19:42:42 +02:00
*/
paramsToCookies(req, res) {
if (req.query.isRest?.toLowerCase() == "true") {
2023-09-20 19:37:55 +02:00
// store the isRest flag to the is_rest cookie
2023-09-17 19:42:42 +02:00
res.cookie('is_rest', req.query.isRest.toLowerCase(), {
2023-09-20 19:48:57 +02:00
maxAge: 120000, // 2 min
2023-09-17 19:42:42 +02:00
httpOnly: true
})
} else {
2023-09-20 19:37:55 +02:00
// no isRest-flag set -> set is_rest cookie to false
2023-09-17 19:42:42 +02:00
res.cookie('is_rest', "false", {
2023-09-20 19:48:57 +02:00
maxAge: 120000, // 2 min
2023-09-17 19:42:42 +02:00
httpOnly: true
})
2023-09-20 19:37:55 +02:00
// persist state if passed in
if (req.query.state) {
res.cookie('auth_state', req.query.state, {
maxAge: 120000, // 2 min
httpOnly: true
})
}
const callback = req.query.redirect_uri || req.query.callback
2023-09-20 19:37:55 +02:00
// check if we are missing a callback parameter - we need one if isRest=false
if (!callback) {
2023-09-17 19:42:42 +02:00
res.status(400).send({
message: 'No callback parameter'
})
return
}
2023-09-20 19:37:55 +02:00
// store the callback url to the auth_cb cookie
res.cookie('auth_cb', callback, {
2023-09-20 19:48:57 +02:00
maxAge: 120000, // 2 min
2023-09-17 19:42:42 +02:00
httpOnly: true
})
}
}
/**
* Informs the client in the right mode about a successfull login and the token
* (clients choise is restored from cookies).
*
* @param {import('express').Request} req
* @param {import('express').Response} res
2023-09-17 19:42:42 +02:00
*/
async handleLoginSuccessBasedOnCookie(req, res) {
2023-09-20 19:37:55 +02:00
// get userLogin json (information about the user, server and the session)
2023-09-17 19:42:42 +02:00
const data_json = await this.getUserLoginResponsePayload(req.user)
if (req.cookies.is_rest === 'true') {
2023-09-17 19:42:42 +02:00
// REST request - send data
res.json(data_json)
} else {
2023-09-17 19:42:42 +02:00
// UI request -> check if we have a callback url
// TODO: do we want to somehow limit the values for auth_cb?
if (req.cookies.auth_cb) {
let stateQuery = req.cookies.auth_state ? `&state=${req.cookies.auth_state}` : ''
2023-09-20 19:37:55 +02:00
// UI request -> redirect to auth_cb url and send the jwt token as parameter
res.redirect(302, `${req.cookies.auth_cb}?setToken=${data_json.user.token}${stateQuery}`)
} else {
res.status(400).send('No callback or already expired')
2023-09-17 19:42:42 +02:00
}
}
}
2023-03-24 18:21:25 +01:00
/**
* Creates all (express) routes required for authentication.
*
* @param {import('express').Router} router
2023-03-24 18:21:25 +01:00
*/
2023-09-20 19:37:55 +02:00
async initAuthRoutes(router) {
2023-03-24 18:21:25 +01:00
// Local strategy login route (takes username and password)
router.post('/login', passport.authenticate('local'), async (req, res) => {
// return the user login response json if the login was successfull
res.json(await this.getUserLoginResponsePayload(req.user))
})
2023-03-24 18:21:25 +01:00
// openid strategy login route (this redirects to the configured openid login provider)
router.get('/auth/openid', (req, res, next) => {
try {
// helper function from openid-client
function pick(object, ...paths) {
const obj = {}
for (const path of paths) {
if (object[path] !== undefined) {
obj[path] = object[path]
}
}
return obj
}
// Get the OIDC client from the strategy
// We need to call the client manually, because the strategy does not support forwarding the code challenge
// for API or mobile clients
const oidcStrategy = passport._strategy('openid-client')
oidcStrategy._params.redirect_uri = new URL(`${req.protocol}://${req.get('host')}/auth/openid/callback`).toString()
const client = oidcStrategy._client
const sessionKey = oidcStrategy._key
let code_challenge
let code_challenge_method
// If code_challenge is provided, expect that code_verifier will be handled by the client (mobile app)
// The web frontend of ABS does not need to do a PKCE itself, because it never handles the "code" of the oauth flow
// and as such will not send a code challenge, we will generate then one
if (req.query.code_challenge) {
code_challenge = req.query.code_challenge
code_challenge_method = req.query.code_challenge_method || 'S256'
if (!['S256', 'plain'].includes(code_challenge_method)) {
return res.status(400).send('Invalid code_challenge_method')
}
} else {
// If no code_challenge is provided, assume a web application flow and generate one
const code_verifier = OpenIDClient.generators.codeVerifier()
code_challenge = OpenIDClient.generators.codeChallenge(code_verifier)
code_challenge_method = 'S256'
// Store the code_verifier in the session for later use in the token exchange
req.session[sessionKey] = { ...req.session[sessionKey], code_verifier }
}
const params = {
state: OpenIDClient.generators.random(),
// Other params by the passport strategy
...oidcStrategy._params
}
if (!params.nonce && params.response_type.includes('id_token')) {
params.nonce = OpenIDClient.generators.random()
}
req.session[sessionKey] = {
...req.session[sessionKey],
...pick(params, 'nonce', 'state', 'max_age', 'response_type')
}
// Now get the URL to direct to
const authorizationUrl = client.authorizationUrl({
...params,
scope: 'openid profile email',
response_type: 'code',
code_challenge,
code_challenge_method,
})
// params (isRest, callback) to a cookie that will be send to the client
this.paramsToCookies(req, res)
// Redirect the user agent (browser) to the authorization URL
res.redirect(authorizationUrl)
} catch (error) {
Logger.error(`[Auth] Error in /auth/openid route: ${error}`)
res.status(500).send('Internal Server Error')
}
})
// openid strategy callback route (this receives the token from the configured openid login provider)
router.get('/auth/openid/callback', (req, res, next) => {
const oidcStrategy = passport._strategy('openid-client')
const sessionKey = oidcStrategy._key
if (!req.session[sessionKey]) {
return res.status(400).send('No session')
}
// If the client sends us a code_verifier, we will tell passport to use this to send this in the token request
// The code_verifier will be validated by the oauth2 provider by comparing it to the code_challenge in the first request
// Crucial for API/Mobile clients
if (req.query.code_verifier) {
req.session[sessionKey].code_verifier = req.query.code_verifier
}
// While not required by the standard, the passport plugin re-sends the original redirect_uri in the token request
// We need to set it correctly, as some SSO providers (e.g. keycloak) check that parameter when it is provided
if (req.session[sessionKey].mobile) {
return passport.authenticate('openid-client', { redirect_uri: 'audiobookshelf://oauth' })(req, res, next)
} else {
return passport.authenticate('openid-client', { failureRedirect: '/login?error=Unauthorized&autoLaunch=0' })(req, res, next)
}
},
2023-09-20 19:37:55 +02:00
// on a successfull login: read the cookies and react like the client requested (callback or json)
this.handleLoginSuccessBasedOnCookie.bind(this))
/**
* Used to auto-populate the openid URLs in config/authentication
*/
router.get('/auth/openid/config', async (req, res) => {
if (!req.query.issuer) {
return res.status(400).send('Invalid request. Query param \'issuer\' is required')
}
let issuerUrl = req.query.issuer
if (issuerUrl.endsWith('/')) issuerUrl = issuerUrl.slice(0, -1)
const configUrl = `${issuerUrl}/.well-known/openid-configuration`
axios.get(configUrl).then(({ data }) => {
res.json({
issuer: data.issuer,
authorization_endpoint: data.authorization_endpoint,
token_endpoint: data.token_endpoint,
userinfo_endpoint: data.userinfo_endpoint,
end_session_endpoint: data.end_session_endpoint,
jwks_uri: data.jwks_uri
})
}).catch((error) => {
Logger.error(`[Auth] Failed to get openid configuration at "${configUrl}"`, error)
res.status(error.statusCode || 400).send(`${error.code || 'UNKNOWN'}: Failed to get openid configuration`)
})
})
2023-03-24 18:21:25 +01:00
// Logout route
router.post('/logout', (req, res) => {
2023-03-24 18:21:25 +01:00
// TODO: invalidate possible JWTs
req.logout((err) => {
if (err) {
res.sendStatus(500)
} else {
res.sendStatus(200)
}
})
2023-03-24 18:21:25 +01:00
})
2021-08-18 00:01:11 +02:00
}
2023-03-24 18:21:25 +01:00
/**
* middleware to use in express to only allow authenticated users.
* @param {import('express').Request} req
* @param {import('express').Response} res
* @param {import('express').NextFunction} next
2023-03-24 18:21:25 +01:00
*/
isAuthenticated(req, res, next) {
// check if session cookie says that we are authenticated
if (req.isAuthenticated()) {
2021-08-18 00:01:11 +02:00
next()
2023-03-24 18:21:25 +01:00
} else {
// try JWT to authenticate
passport.authenticate("jwt")(req, res, next)
2021-08-18 00:01:11 +02:00
}
}
2023-03-24 18:21:25 +01:00
/**
* Function to generate a jwt token for a given user
*
* @param {{ id:string, username:string }} user
* @returns {string} token
2023-03-24 18:21:25 +01:00
*/
generateAccessToken(user) {
return jwt.sign({ userId: user.id, username: user.username }, global.ServerSettings.tokenSecret)
2023-03-24 18:21:25 +01:00
}
2023-09-13 18:35:39 +02:00
/**
* Function to validate a jwt token for a given user
*
2023-09-13 18:35:39 +02:00
* @param {string} token
* @returns {Object} tokens data
2023-09-13 18:35:39 +02:00
*/
static validateAccessToken(token) {
try {
return jwt.verify(token, global.ServerSettings.tokenSecret)
}
catch (err) {
return null
}
}
2023-03-24 18:21:25 +01:00
/**
2023-09-20 19:37:55 +02:00
* Generate a token which is used to encrpt/protect the jwts.
2023-03-24 18:21:25 +01:00
*/
2022-07-19 00:19:16 +02:00
async initTokenSecret() {
if (process.env.TOKEN_SECRET) { // User can supply their own token secret
2023-09-23 20:42:28 +02:00
Database.serverSettings.tokenSecret = process.env.TOKEN_SECRET
2022-07-19 00:19:16 +02:00
} else {
2023-09-23 20:42:28 +02:00
Database.serverSettings.tokenSecret = require('crypto').randomBytes(256).toString('base64')
2022-07-19 00:19:16 +02:00
}
2023-07-05 01:14:44 +02:00
await Database.updateServerSettings()
2022-07-19 00:19:16 +02:00
// New token secret creation added in v2.1.0 so generate new API tokens for each user
2023-08-20 20:34:03 +02:00
const users = await Database.userModel.getOldUsers()
2023-07-22 22:32:20 +02:00
if (users.length) {
for (const user of users) {
user.token = await this.generateAccessToken(user)
2022-07-19 00:19:16 +02:00
}
2023-07-22 22:32:20 +02:00
await Database.updateBulkUsers(users)
2022-07-19 00:19:16 +02:00
}
}
2023-03-24 18:21:25 +01:00
/**
* Checks if the user in the validated jwt_payload really exists and is active.
* @param {Object} jwt_payload
* @param {function} done
*/
2023-09-20 20:06:16 +02:00
async jwtAuthCheck(jwt_payload, done) {
2023-09-20 19:37:55 +02:00
// load user by id from the jwt token
const user = await Database.userModel.getUserByIdOrOldId(jwt_payload.userId)
if (!user?.isActive) {
2023-09-20 19:37:55 +02:00
// deny login
2023-03-24 18:21:25 +01:00
done(null, null)
return
}
2023-09-20 19:37:55 +02:00
// approve login
2023-03-24 18:21:25 +01:00
done(null, user)
return
}
/**
* Checks if a username and password tuple is valid and the user active.
2023-03-24 18:21:25 +01:00
* @param {string} username
* @param {string} password
* @param {function} done
*/
async localAuthCheckUserPw(username, password, done) {
2023-09-20 19:37:55 +02:00
// Load the user given it's username
2023-09-16 21:45:04 +02:00
const user = await Database.userModel.getUserByUsername(username.toLowerCase())
2023-03-24 18:21:25 +01:00
if (!user || !user.isActive) {
done(null, null)
return
2021-08-18 00:01:11 +02:00
}
2023-03-24 18:21:25 +01:00
// Check passwordless root user
if (user.type === 'root' && (!user.pash || user.pash === '')) {
2023-03-24 18:21:25 +01:00
if (password) {
2023-09-20 19:37:55 +02:00
// deny login
2023-03-24 18:21:25 +01:00
done(null, null)
return
}
2023-09-20 19:37:55 +02:00
// approve login
2023-03-24 18:21:25 +01:00
done(null, user)
return
}
2023-03-24 18:21:25 +01:00
// Check password match
const compare = await bcrypt.compare(password, user.pash)
2023-03-24 18:21:25 +01:00
if (compare) {
2023-09-20 19:37:55 +02:00
// approve login
2023-03-24 18:21:25 +01:00
done(null, user)
return
2021-08-18 00:01:11 +02:00
}
2023-09-20 19:37:55 +02:00
// deny login
2023-03-24 18:21:25 +01:00
done(null, null)
return
2021-08-18 00:01:11 +02:00
}
2023-03-24 18:21:25 +01:00
/**
* Hashes a password with bcrypt.
* @param {string} password
* @returns {string} hash
*/
2021-08-18 00:01:11 +02:00
hashPass(password) {
return new Promise((resolve) => {
bcrypt.hash(password, 8, (err, hash) => {
if (err) {
resolve(null)
} else {
resolve(hash)
}
})
})
}
2023-03-24 18:21:25 +01:00
/**
* Return the login info payload for a user
*
* @param {Object} user
* @returns {Promise<Object>} jsonPayload
2023-03-24 18:21:25 +01:00
*/
2023-09-13 18:35:39 +02:00
async getUserLoginResponsePayload(user) {
const libraryIds = await Database.libraryModel.getAllLibraryIds()
return {
user: user.toJSONForBrowser(),
userDefaultLibraryId: user.getDefaultLibraryId(libraryIds),
2023-07-05 01:14:44 +02:00
serverSettings: Database.serverSettings.toJSONForBrowser(),
ereaderDevices: Database.emailSettings.getEReaderDevices(user),
Source: global.Source
}
}
2021-08-18 00:01:11 +02:00
}
2023-03-24 18:21:25 +01:00
2021-08-18 00:01:11 +02:00
module.exports = Auth