1
0
mirror of https://github.com/Unleash/unleash.git synced 2025-01-25 00:07:47 +01:00

API tokens scoped to deleted projects shouldn't give wildcard access (#7499)

If you have SDK tokens scoped to projects that are deleted, you should
not get access to any flags with those.

---------

Co-authored-by: David Leek <david@getunleash.io>
This commit is contained in:
Tymoteusz Czech 2024-07-08 09:52:10 +02:00 committed by GitHub
parent e7d07486a1
commit 225d8a91f1
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
10 changed files with 276 additions and 64 deletions

View File

@ -76,6 +76,7 @@ exports[`should create default config 1`] = `
"flagResolver": FlagResolver {
"experiments": {
"adminTokenKillSwitch": false,
"allowOrphanedWildcardTokens": false,
"anonymiseEventLog": false,
"anonymizeProjectOwners": false,
"automatedActions": false,

View File

@ -5,7 +5,7 @@ import type { Logger, LogProvider } from '../logger';
import NotFoundError from '../error/notfound-error';
import type { IApiTokenStore } from '../types/stores/api-token-store';
import {
type ApiTokenType,
ApiTokenType,
type IApiToken,
type IApiTokenCreate,
isAllProjects,
@ -13,6 +13,7 @@ import {
import { ALL_PROJECTS } from '../util/constants';
import type { Db } from './db';
import { inTransaction } from './transaction';
import type { IFlagResolver } from '../types';
const TABLE = 'api_tokens';
const API_LINK_TABLE = 'api_token_project';
@ -35,33 +36,44 @@ interface ITokenRow extends ITokenInsert {
project: string;
}
const tokenRowReducer = (acc, tokenRow) => {
const { project, ...token } = tokenRow;
if (!acc[tokenRow.secret]) {
acc[tokenRow.secret] = {
secret: token.secret,
tokenName: token.token_name ? token.token_name : token.username,
type: token.type.toLowerCase(),
project: ALL,
projects: [ALL],
environment: token.environment ? token.environment : ALL,
expiresAt: token.expires_at,
createdAt: token.created_at,
alias: token.alias,
seenAt: token.seen_at,
username: token.token_name ? token.token_name : token.username,
};
}
const currentToken = acc[tokenRow.secret];
if (tokenRow.project) {
if (isAllProjects(currentToken.projects)) {
currentToken.projects = [];
const createTokenRowReducer =
(allowOrphanedWildcardTokens: boolean) => (acc, tokenRow) => {
const { project, ...token } = tokenRow;
if (!acc[tokenRow.secret]) {
if (
!allowOrphanedWildcardTokens &&
!tokenRow.project &&
!tokenRow.secret.startsWith('*:') &&
(tokenRow.type === ApiTokenType.CLIENT ||
tokenRow.type === ApiTokenType.FRONTEND)
) {
return acc;
}
acc[tokenRow.secret] = {
secret: token.secret,
tokenName: token.token_name ? token.token_name : token.username,
type: token.type.toLowerCase(),
project: ALL,
projects: [ALL],
environment: token.environment ? token.environment : ALL,
expiresAt: token.expires_at,
createdAt: token.created_at,
alias: token.alias,
seenAt: token.seen_at,
username: token.token_name ? token.token_name : token.username,
};
}
currentToken.projects.push(tokenRow.project);
currentToken.project = currentToken.projects.join(',');
}
return acc;
};
const currentToken = acc[tokenRow.secret];
if (tokenRow.project) {
if (isAllProjects(currentToken.projects)) {
currentToken.projects = [];
}
currentToken.projects.push(tokenRow.project);
currentToken.project = currentToken.projects.join(',');
}
return acc;
};
const toRow = (newToken: IApiTokenCreate) => ({
username: newToken.tokenName ?? newToken.username,
@ -74,8 +86,14 @@ const toRow = (newToken: IApiTokenCreate) => ({
alias: newToken.alias || null,
});
const toTokens = (rows: any[]): IApiToken[] => {
const tokens = rows.reduce(tokenRowReducer, {});
const toTokens = (
rows: any[],
allowOrphanedWildcardTokens: boolean,
): IApiToken[] => {
const tokens = rows.reduce(
createTokenRowReducer(allowOrphanedWildcardTokens),
{},
);
return Object.values(tokens);
};
@ -86,7 +104,14 @@ export class ApiTokenStore implements IApiTokenStore {
private db: Db;
constructor(db: Db, eventBus: EventEmitter, getLogger: LogProvider) {
private readonly flagResolver: IFlagResolver;
constructor(
db: Db,
eventBus: EventEmitter,
getLogger: LogProvider,
flagResolver: IFlagResolver,
) {
this.db = db;
this.logger = getLogger('api-tokens.js');
this.timer = (action: string) =>
@ -94,6 +119,7 @@ export class ApiTokenStore implements IApiTokenStore {
store: 'api-tokens',
action,
});
this.flagResolver = flagResolver;
}
async count(): Promise<number> {
@ -120,7 +146,10 @@ export class ApiTokenStore implements IApiTokenStore {
const stopTimer = this.timer('getAll');
const rows = await this.makeTokenProjectQuery();
stopTimer();
return toTokens(rows);
const allowOrphanedWildcardTokens = this.flagResolver.isEnabled(
'allowOrphanedWildcardTokens',
);
return toTokens(rows, allowOrphanedWildcardTokens);
}
async getAllActive(): Promise<IApiToken[]> {
@ -129,7 +158,10 @@ export class ApiTokenStore implements IApiTokenStore {
.where('expires_at', 'IS', null)
.orWhere('expires_at', '>', 'now()');
stopTimer();
return toTokens(rows);
const allowOrphanedWildcardTokens = this.flagResolver.isEnabled(
'allowOrphanedWildcardTokens',
);
return toTokens(rows, allowOrphanedWildcardTokens);
}
private makeTokenProjectQuery() {
@ -200,7 +232,10 @@ export class ApiTokenStore implements IApiTokenStore {
key,
);
stopTimer();
return toTokens(row)[0];
const allowOrphanedWildcardTokens = this.flagResolver.isEnabled(
'allowOrphanedWildcardTokens',
);
return toTokens(row, allowOrphanedWildcardTokens)[0];
}
async delete(secret: string): Promise<void> {
@ -217,7 +252,10 @@ export class ApiTokenStore implements IApiTokenStore {
.where({ secret })
.returning('*');
if (rows.length > 0) {
return toTokens(rows)[0];
const allowOrphanedWildcardTokens = this.flagResolver.isEnabled(
'allowOrphanedWildcardTokens',
);
return toTokens(rows, allowOrphanedWildcardTokens)[0];
}
throw new NotFoundError('Could not find api-token.');
}

View File

@ -97,7 +97,12 @@ export const createStores = (
tagTypeStore: new TagTypeStore(db, eventBus, getLogger),
addonStore: new AddonStore(db, eventBus, getLogger),
accessStore: new AccessStore(db, eventBus, getLogger),
apiTokenStore: new ApiTokenStore(db, eventBus, getLogger),
apiTokenStore: new ApiTokenStore(
db,
eventBus,
getLogger,
config.flagResolver,
),
resetTokenStore: new ResetTokenStore(db, eventBus, getLogger),
sessionStore: new SessionStore(db, eventBus, getLogger),
userFeedbackStore: new UserFeedbackStore(db, eventBus, getLogger),

View File

@ -15,7 +15,12 @@ export const createApiTokenService = (
config: IUnleashConfig,
): ApiTokenService => {
const { eventBus, getLogger } = config;
const apiTokenStore = new ApiTokenStore(db, eventBus, getLogger);
const apiTokenStore = new ApiTokenStore(
db,
eventBus,
getLogger,
config.flagResolver,
);
const environmentStore = new EnvironmentStore(db, eventBus, getLogger);
const eventService = createEventsService(db, config);

View File

@ -78,7 +78,12 @@ export const createInstanceStatsService = (db: Db, config: IUnleashConfig) => {
getLogger,
);
const eventStore = new EventStore(db, getLogger);
const apiTokenStore = new ApiTokenStore(db, eventBus, getLogger);
const apiTokenStore = new ApiTokenStore(
db,
eventBus,
getLogger,
flagResolver,
);
const clientMetricsStoreV2 = new ClientMetricsStoreV2(
db,
getLogger,

View File

@ -63,6 +63,7 @@ export type IFlagKey =
| 'flagCreator'
| 'anonymizeProjectOwners'
| 'resourceLimits'
| 'allowOrphanedWildcardTokens'
| 'extendedMetrics';
export type IFlags = Partial<{ [key in IFlagKey]: boolean | Variant }>;
@ -300,6 +301,10 @@ const flags: IFlags = {
process.env.UNLEASH_EXPERIMENTAL_RESOURCE_LIMITS,
false,
),
allowOrphanedWildcardTokens: parseEnvVarBoolean(
process.env.UNLEASH_ORPHANED_TOKENS_KILL_SWITCH,
false,
),
extendedMetrics: parseEnvVarBoolean(
process.env.UNLEASH_EXPERIMENTAL_EXTENDED_METRICS,
false,

View File

@ -79,7 +79,7 @@ test('editor users should only get client or frontend tokens', async () => {
projects: [],
tokenName: '',
username: 'test',
secret: '1234',
secret: '*:environment.1234',
type: ApiTokenType.CLIENT,
});
@ -88,7 +88,7 @@ test('editor users should only get client or frontend tokens', async () => {
projects: [],
tokenName: '',
username: 'frontend',
secret: '12345',
secret: '*:environment.12345',
type: ApiTokenType.FRONTEND,
});
@ -97,7 +97,7 @@ test('editor users should only get client or frontend tokens', async () => {
projects: [],
tokenName: '',
username: 'test',
secret: 'sdfsdf2d',
secret: '*:*.sdfsdf2d',
type: ApiTokenType.ADMIN,
});
@ -141,7 +141,7 @@ test('viewer users should not be allowed to fetch tokens', async () => {
projects: [],
tokenName: '',
username: 'test',
secret: '1234',
secret: '*:environment.1234',
type: ApiTokenType.CLIENT,
});
@ -150,7 +150,7 @@ test('viewer users should not be allowed to fetch tokens', async () => {
projects: [],
tokenName: '',
username: 'test',
secret: 'sdfsdf2d',
secret: '*:*.sdfsdf2d',
type: ApiTokenType.ADMIN,
});
@ -553,7 +553,7 @@ describe('Fine grained API token permissions', () => {
tokenName: '',
username: 'client',
secret: 'client_secret',
secret: '*:environment.client_secret',
type: ApiTokenType.CLIENT,
});
@ -562,7 +562,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'admin',
secret: 'sdfsdf2admin_secret',
secret: '*:*.sdfsdf2admin_secret',
type: ApiTokenType.ADMIN,
});
await stores.apiTokenStore.insert({
@ -570,7 +570,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontender',
secret: 'sdfsdf2dfrontend_Secret',
secret: '*:environment:sdfsdf2dfrontend_Secret',
type: ApiTokenType.FRONTEND,
});
await request
@ -637,7 +637,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'client',
secret: 'client_secret_1234',
secret: '*:environment.client_secret_1234',
type: ApiTokenType.CLIENT,
});
@ -646,7 +646,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'admin',
secret: 'admin_secret_1234',
secret: '*:*.admin_secret_1234',
type: ApiTokenType.ADMIN,
});
await stores.apiTokenStore.insert({
@ -654,7 +654,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontender',
secret: 'frontend_secret_1234',
secret: '*:environment.frontend_secret_1234',
type: ApiTokenType.FRONTEND,
});
await request
@ -699,7 +699,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'client',
secret: 'client_secret_4321',
secret: '*:environment.client_secret_4321',
type: ApiTokenType.CLIENT,
});
@ -708,7 +708,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'admin',
secret: 'admin_secret_4321',
secret: '*:*.admin_secret_4321',
type: ApiTokenType.ADMIN,
});
await stores.apiTokenStore.insert({
@ -716,7 +716,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontender',
secret: 'frontend_secret_4321',
secret: '*:environment.frontend_secret_4321',
type: ApiTokenType.FRONTEND,
});
await request
@ -760,7 +760,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'client',
secret: 'client_secret_4321',
secret: '*:environment.client_secret_4321',
type: ApiTokenType.CLIENT,
});
await stores.apiTokenStore.insert({
@ -768,7 +768,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'admin',
secret: 'admin_secret_4321',
secret: '*:*.admin_secret_4321',
type: ApiTokenType.ADMIN,
});
await stores.apiTokenStore.insert({
@ -776,7 +776,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontender',
secret: 'frontend_secret_4321',
secret: '*:environment.frontend_secret_4321',
type: ApiTokenType.FRONTEND,
});
await request
@ -848,7 +848,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'cilent',
secret: 'update_client_token',
secret: '*:environment.update_client_token',
type: ApiTokenType.CLIENT,
});
await request
@ -910,7 +910,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontend',
secret: 'update_frontend_token',
secret: '*:environment.update_frontend_token',
type: ApiTokenType.FRONTEND,
});
await request
@ -973,7 +973,7 @@ describe('Fine grained API token permissions', () => {
tokenName: '',
username: 'admin',
secret: 'update_admin_token',
secret: '*:*.update_admin_token',
type: ApiTokenType.ADMIN,
});
await request
@ -1038,7 +1038,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'cilent',
secret: 'delete_client_token',
secret: '*:environment.delete_client_token',
type: ApiTokenType.CLIENT,
});
await request
@ -1100,7 +1100,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'frontend',
secret: 'delete_frontend_token',
secret: '*:environment.delete_frontend_token',
type: ApiTokenType.FRONTEND,
});
await request
@ -1161,7 +1161,7 @@ describe('Fine grained API token permissions', () => {
projects: [],
tokenName: '',
username: 'admin',
secret: 'delete_admin_token',
secret: '*:*:delete_admin_token',
type: ApiTokenType.ADMIN,
});
await request

View File

@ -122,7 +122,7 @@ test('creates new admin token with expiry', async () => {
});
test('update client token with expiry', async () => {
const tokenSecret = 'random-secret-update';
const tokenSecret = '*:environment.random-secret-update';
await db.stores.apiTokenStore.insert({
username: 'test',
@ -187,7 +187,7 @@ test('creates a lot of client tokens', async () => {
});
test('removes api token', async () => {
const tokenSecret = 'random-secret';
const tokenSecret = '*:environment.random-secret';
await db.stores.apiTokenStore.insert({
environment: 'development',

View File

@ -0,0 +1,153 @@
import { type IUnleashTest, setupAppWithAuth } from '../../helpers/test-helper';
import dbInit, { type ITestDb } from '../../helpers/database-init';
import getLogger from '../../../fixtures/no-logger';
import type { ApiTokenService } from '../../../../lib/services/api-token-service';
import { ApiTokenType } from '../../../../lib/types/models/api-token';
import { DEFAULT_ENV } from '../../../../lib/util/constants';
import { TEST_AUDIT_USER } from '../../../../lib/types';
import { User } from '../../../../lib/server-impl';
let app: IUnleashTest;
let db: ITestDb;
let apiTokenService: ApiTokenService;
const environment = 'testing';
const project = 'default';
const project2 = 'some';
const deletionProject = 'deletion';
const deletionTokenName = 'delete';
const feature1 = 'f1.token.access';
const feature2 = 'f2.token.access';
const feature3 = 'f3.p2.token.access';
beforeAll(async () => {
db = await dbInit('feature_api_api_access_client_deletion', getLogger);
app = await setupAppWithAuth(db.stores, {}, db.rawDatabase);
apiTokenService = app.services.apiTokenService;
const { featureToggleServiceV2, environmentService } = app.services;
const { environmentStore, projectStore } = db.stores;
await environmentStore.create({
name: environment,
type: 'test',
});
await projectStore.create({
id: project2,
name: 'Test Project 2',
description: '',
mode: 'open' as const,
});
await projectStore.create({
id: deletionProject,
name: 'Deletion Project',
description: '',
mode: 'open' as const,
});
await environmentService.addEnvironmentToProject(
environment,
project,
TEST_AUDIT_USER,
);
await environmentService.addEnvironmentToProject(
environment,
project2,
TEST_AUDIT_USER,
);
await featureToggleServiceV2.createFeatureToggle(
project,
{
name: feature1,
description: 'the #1 feature',
},
TEST_AUDIT_USER,
);
await featureToggleServiceV2.createStrategy(
{
name: 'default',
constraints: [],
parameters: {},
},
{ projectId: project, featureName: feature1, environment: DEFAULT_ENV },
TEST_AUDIT_USER,
);
await featureToggleServiceV2.createStrategy(
{
name: 'default',
constraints: [],
parameters: {},
},
{ projectId: project, featureName: feature1, environment },
TEST_AUDIT_USER,
);
// create feature 2
await featureToggleServiceV2.createFeatureToggle(
project,
{
name: feature2,
},
TEST_AUDIT_USER,
);
await featureToggleServiceV2.createStrategy(
{
name: 'default',
constraints: [],
parameters: {},
},
{ projectId: project, featureName: feature2, environment },
TEST_AUDIT_USER,
);
// create feature 3
await featureToggleServiceV2.createFeatureToggle(
project2,
{
name: feature3,
},
TEST_AUDIT_USER,
);
await featureToggleServiceV2.createStrategy(
{
name: 'default',
constraints: [],
parameters: {},
},
{ projectId: project2, featureName: feature3, environment },
TEST_AUDIT_USER,
);
});
afterAll(async () => {
await app.destroy();
await db.destroy();
});
test('doesnt return feature flags if project deleted', async () => {
const token = await apiTokenService.createApiToken({
type: ApiTokenType.CLIENT,
tokenName: deletionTokenName,
environment,
project: deletionProject,
});
await app.services.projectService.deleteProject(
deletionProject,
new User(TEST_AUDIT_USER),
TEST_AUDIT_USER,
);
await app.services.apiTokenService.fetchActiveTokens();
await app.request
.get('/api/client/features')
.set('Authorization', token.secret)
.expect('Content-Type', /json/)
.expect(401);
});

View File

@ -69,7 +69,7 @@ test('should only return valid tokens', async () => {
const expiredToken = await stores.apiTokenStore.insert({
tokenName: 'expired',
secret: 'expired-secret',
secret: '*:environment.expired-secret',
type: ApiTokenType.CLIENT,
expiresAt: yesterday,
projects: ['*'],
@ -78,7 +78,7 @@ test('should only return valid tokens', async () => {
const activeToken = await stores.apiTokenStore.insert({
tokenName: 'default-valid',
secret: 'valid-secret',
secret: '*:environment.valid-secret',
type: ApiTokenType.CLIENT,
expiresAt: tomorrow,
projects: ['*'],