mirror of
https://github.com/Unleash/unleash.git
synced 2024-11-01 19:07:38 +01:00
2765ae2c70
This PR implements the first version of a suggested unification (and documentation) of the errors that we return from the API today. The goal is for this to be the first step towards the error type defined in this internal [linear task](https://linear.app/unleash/issue/1-629/define-the-error-type 'Define the new API error type'). ## The state of things today As things stand, we currently have no (or **very** little) documentation of the errors that are returned from the API. We mention error codes, but never what the errors may contain. Second, there is no specified format for errors, so what they return is arbitrary, and based on ... Who knows? As a result, we have multiple different errors returned by the API depending on what operation you're trying to do. What's more, with OpenAPI validation in the mix, it's absolutely possible for you to get two completely different error objects for operations to the same endpoint. Third, the errors we do return are usually pretty vague and don't really provide any real help to the user. "You don't have the right permissions". Great. Well what permissions do I need? And how would I know? "BadDataError". Sick. Why is it bad? ... You get it. ## What we want to achieve The ultimate goal is for error messages to serve both humans and machines. When the user provides bad data, we should tell them what parts of the data are bad and what they can do to fix it. When they don't have the right permissions, we should tell them what permissions they need. Additionally, it would be nice if we could provide an ID for each error instance, so that you (or an admin) can look through the logs and locate he incident. ## What's included in **this** PR? This PR does not aim to implement everything above. It's not intended to magically fix everything. Its goal is to implement the necessary **breaking** changes, so that they can be included in v5. Changing error messages is a slightly grayer area than changing APIs directly, but changing the format is definitely something I'd consider breaking. So this PR: - defines a minimal version of the error type defined in the [API error definition linear task](https://linear.app/unleash/issue/1-629/define-the-error-type). - aims to catch all errors we return today and wrap them in the error type - updates tests to match the new expectations. An important point: because we are cutting v5 very soon and because work for this wasn't started until last week, the code here isn't necessarily very polished. But it doesn't need to be. The internals can be as messy as we want, as long as the API surface is stable. That said, I'm very open to feedback about design and code completeness, etc, but this has intentionally been done quickly. Please also see my inline comments on the changes for more specific details. ### Proposed follow-ups As mentioned, this is the first step to implementing the error type. The public API error type only exposes `id`, `name`, and `message`. This is barely any more than most of the previous messages, but they are now all using the same format. Any additional properties, such as `suggestion`, `help`, `documentationLink` etc can be added as features without breaking the current format. This is an intentional limitation of this PR. Regarding additional properties: there are some error responses that must contain extra properties. Some of these are documented in the types of the new error constructor, but not all. This includes `path` and `type` properties on 401 errors, `details` on validation errors, and more. Also, because it was put together quickly, I don't yet know exactly how we (as developers) would **prefer** to use these new error messages within the code, so the internal API (the new type, name, etc), is just a suggestion. This can evolve naturally over time if (based on feedback and experience) without changing the public API. ## Returning multiple errors Most of the time when we return errors today, we only return a single error (even if many things are wrong). AJV, the OpenAPI integration we use does have a setting that allows it to return all errors in a request instead of a single one. I suggest we turn that on, but that we do it in a separate PR (because it updates a number of other snapshots). When returning errors that point to `details`, the objects in the `details` now contain a new `description` property. This "deprecates" the `message` property. Due to our general deprecation policy, this should be kept around for another full major and can be removed in v6. ```json { "name": "BadDataError", "message": "Something went wrong. Check the `details` property for more information." "details": [{ "message": "The .params property must be an object. You provided an array.", "description": "The .params property must be an object. You provided an array.", }] } ```
438 lines
14 KiB
TypeScript
438 lines
14 KiB
TypeScript
import bcrypt from 'bcryptjs';
|
|
import owasp from 'owasp-password-strength-test';
|
|
import Joi from 'joi';
|
|
|
|
import { URL } from 'url';
|
|
import { Logger } from '../logger';
|
|
import User, { IUser } from '../types/user';
|
|
import isEmail from '../util/is-email';
|
|
import { AccessService } from './access-service';
|
|
import ResetTokenService from './reset-token-service';
|
|
import InvalidTokenError from '../error/invalid-token-error';
|
|
import NotFoundError from '../error/notfound-error';
|
|
import OwaspValidationError from '../error/owasp-validation-error';
|
|
import { EmailService } from './email-service';
|
|
import { IUnleashConfig } from '../types/option';
|
|
import SessionService from './session-service';
|
|
import { IUnleashStores } from '../types/stores';
|
|
import PasswordUndefinedError from '../error/password-undefined';
|
|
import { USER_UPDATED, USER_CREATED, USER_DELETED } from '../types/events';
|
|
import { IEventStore } from '../types/stores/event-store';
|
|
import { IUserStore } from '../types/stores/user-store';
|
|
import { RoleName } from '../types/model';
|
|
import SettingService from './setting-service';
|
|
import { SimpleAuthSettings } from '../server-impl';
|
|
import { simpleAuthSettingsKey } from '../types/settings/simple-auth-settings';
|
|
import DisabledError from '../error/disabled-error';
|
|
import BadDataError from '../error/bad-data-error';
|
|
import { isDefined } from '../util/isDefined';
|
|
import { TokenUserSchema } from '../openapi/spec/token-user-schema';
|
|
import { UnleashError } from '../error/api-error';
|
|
|
|
const systemUser = new User({ id: -1, username: 'system' });
|
|
|
|
export interface ICreateUser {
|
|
name?: string;
|
|
email?: string;
|
|
username?: string;
|
|
password?: string;
|
|
rootRole: number | RoleName;
|
|
}
|
|
|
|
export interface IUpdateUser {
|
|
id: number;
|
|
name?: string;
|
|
email?: string;
|
|
rootRole?: number | RoleName;
|
|
}
|
|
|
|
export interface ILoginUserRequest {
|
|
email: string;
|
|
name?: string;
|
|
rootRole?: number | RoleName;
|
|
autoCreate?: boolean;
|
|
}
|
|
|
|
interface IUserWithRole extends IUser {
|
|
rootRole: number;
|
|
}
|
|
|
|
const saltRounds = 10;
|
|
|
|
class UserService {
|
|
private logger: Logger;
|
|
|
|
private store: IUserStore;
|
|
|
|
private eventStore: IEventStore;
|
|
|
|
private accessService: AccessService;
|
|
|
|
private resetTokenService: ResetTokenService;
|
|
|
|
private sessionService: SessionService;
|
|
|
|
private emailService: EmailService;
|
|
|
|
private settingService: SettingService;
|
|
|
|
private passwordResetTimeouts: { [key: string]: NodeJS.Timeout } = {};
|
|
|
|
private baseUriPath: string;
|
|
|
|
constructor(
|
|
stores: Pick<IUnleashStores, 'userStore' | 'eventStore'>,
|
|
{
|
|
server,
|
|
getLogger,
|
|
authentication,
|
|
}: Pick<IUnleashConfig, 'getLogger' | 'authentication' | 'server'>,
|
|
services: {
|
|
accessService: AccessService;
|
|
resetTokenService: ResetTokenService;
|
|
emailService: EmailService;
|
|
sessionService: SessionService;
|
|
settingService: SettingService;
|
|
},
|
|
) {
|
|
this.logger = getLogger('service/user-service.js');
|
|
this.store = stores.userStore;
|
|
this.eventStore = stores.eventStore;
|
|
this.accessService = services.accessService;
|
|
this.resetTokenService = services.resetTokenService;
|
|
this.emailService = services.emailService;
|
|
this.sessionService = services.sessionService;
|
|
this.settingService = services.settingService;
|
|
if (authentication && authentication.createAdminUser) {
|
|
process.nextTick(() => this.initAdminUser());
|
|
}
|
|
|
|
this.baseUriPath = server.baseUriPath || '';
|
|
}
|
|
|
|
validatePassword(password: string): boolean {
|
|
if (password) {
|
|
const result = owasp.test(password);
|
|
if (!result.strong) {
|
|
throw new OwaspValidationError(result);
|
|
} else return true;
|
|
} else {
|
|
throw new PasswordUndefinedError();
|
|
}
|
|
}
|
|
|
|
async initAdminUser(): Promise<void> {
|
|
const userCount = await this.store.count();
|
|
|
|
if (userCount === 0) {
|
|
// create default admin user
|
|
try {
|
|
const pwd = 'unleash4all';
|
|
this.logger.info(
|
|
`Creating default user "admin" with password "${pwd}"`,
|
|
);
|
|
const user = await this.store.insert({
|
|
username: 'admin',
|
|
});
|
|
const passwordHash = await bcrypt.hash(pwd, saltRounds);
|
|
await this.store.setPasswordHash(user.id, passwordHash);
|
|
await this.accessService.setUserRootRole(
|
|
user.id,
|
|
RoleName.ADMIN,
|
|
);
|
|
} catch (e) {
|
|
this.logger.error('Unable to create default user "admin"');
|
|
}
|
|
}
|
|
}
|
|
|
|
async getAll(): Promise<IUserWithRole[]> {
|
|
const users = await this.store.getAll();
|
|
const defaultRole = await this.accessService.getRootRole(
|
|
RoleName.VIEWER,
|
|
);
|
|
const userRoles = await this.accessService.getRootRoleForAllUsers();
|
|
const usersWithRootRole = users.map((u) => {
|
|
const rootRole = userRoles.find((r) => r.userId === u.id);
|
|
const roleId = rootRole ? rootRole.roleId : defaultRole.id;
|
|
return { ...u, rootRole: roleId };
|
|
});
|
|
return usersWithRootRole;
|
|
}
|
|
|
|
async getUser(id: number): Promise<IUserWithRole> {
|
|
const roles = await this.accessService.getUserRootRoles(id);
|
|
const defaultRole = await this.accessService.getRootRole(
|
|
RoleName.VIEWER,
|
|
);
|
|
const roleId = roles.length > 0 ? roles[0].id : defaultRole.id;
|
|
const user = await this.store.get(id);
|
|
return { ...user, rootRole: roleId };
|
|
}
|
|
|
|
async search(query: string): Promise<IUser[]> {
|
|
return this.store.search(query);
|
|
}
|
|
|
|
async getByEmail(email: string): Promise<IUser> {
|
|
return this.store.getByQuery({ email });
|
|
}
|
|
|
|
async createUser(
|
|
{ username, email, name, password, rootRole }: ICreateUser,
|
|
updatedBy?: User,
|
|
): Promise<IUser> {
|
|
if (!username && !email) {
|
|
throw new BadDataError('You must specify username or email');
|
|
}
|
|
|
|
if (email) {
|
|
Joi.assert(email, Joi.string().email(), 'Email');
|
|
}
|
|
|
|
const exists = await this.store.hasUser({ username, email });
|
|
if (exists) {
|
|
throw new Error('User already exists');
|
|
}
|
|
|
|
const user = await this.store.insert({
|
|
username,
|
|
email,
|
|
name,
|
|
});
|
|
|
|
await this.accessService.setUserRootRole(user.id, rootRole);
|
|
|
|
if (password) {
|
|
const passwordHash = await bcrypt.hash(password, saltRounds);
|
|
await this.store.setPasswordHash(user.id, passwordHash);
|
|
}
|
|
|
|
await this.eventStore.store({
|
|
type: USER_CREATED,
|
|
createdBy: this.getCreatedBy(updatedBy),
|
|
data: this.mapUserToData(user),
|
|
});
|
|
|
|
return user;
|
|
}
|
|
|
|
private getCreatedBy(updatedBy: User = systemUser) {
|
|
return updatedBy.username || updatedBy.email;
|
|
}
|
|
|
|
private mapUserToData(user?: IUser): any {
|
|
if (!user) {
|
|
return undefined;
|
|
}
|
|
return {
|
|
id: user.id,
|
|
name: user.name,
|
|
username: user.username,
|
|
email: user.email,
|
|
};
|
|
}
|
|
|
|
async updateUser(
|
|
{ id, name, email, rootRole }: IUpdateUser,
|
|
updatedBy?: User,
|
|
): Promise<IUser> {
|
|
const preUser = await this.store.get(id);
|
|
|
|
if (email) {
|
|
Joi.assert(email, Joi.string().email(), 'Email');
|
|
}
|
|
|
|
if (rootRole) {
|
|
await this.accessService.setUserRootRole(id, rootRole);
|
|
}
|
|
|
|
const payload: Partial<IUser> = {
|
|
name: name || preUser.name,
|
|
email: email || preUser.email,
|
|
};
|
|
|
|
// Empty updates will throw, so make sure we have something to update.
|
|
const user = Object.values(payload).some(isDefined)
|
|
? await this.store.update(id, payload)
|
|
: preUser;
|
|
|
|
await this.eventStore.store({
|
|
type: USER_UPDATED,
|
|
createdBy: this.getCreatedBy(updatedBy),
|
|
data: this.mapUserToData(user),
|
|
preData: this.mapUserToData(preUser),
|
|
});
|
|
|
|
return user;
|
|
}
|
|
|
|
async deleteUser(userId: number, updatedBy?: User): Promise<void> {
|
|
const user = await this.store.get(userId);
|
|
await this.accessService.wipeUserPermissions(userId);
|
|
await this.sessionService.deleteSessionsForUser(userId);
|
|
|
|
await this.store.delete(userId);
|
|
|
|
await this.eventStore.store({
|
|
type: USER_DELETED,
|
|
createdBy: this.getCreatedBy(updatedBy),
|
|
preData: this.mapUserToData(user),
|
|
});
|
|
}
|
|
|
|
async loginUser(usernameOrEmail: string, password: string): Promise<IUser> {
|
|
const settings = await this.settingService.get<SimpleAuthSettings>(
|
|
simpleAuthSettingsKey,
|
|
);
|
|
|
|
if (settings?.disabled) {
|
|
throw new DisabledError(
|
|
'Logging in with username/password has been disabled.',
|
|
);
|
|
}
|
|
|
|
const idQuery = isEmail(usernameOrEmail)
|
|
? { email: usernameOrEmail }
|
|
: { username: usernameOrEmail };
|
|
const user = await this.store.getByQuery(idQuery);
|
|
const passwordHash = await this.store.getPasswordHash(user.id);
|
|
|
|
const match = await bcrypt.compare(password, passwordHash);
|
|
if (match) {
|
|
await this.store.successfullyLogin(user);
|
|
return user;
|
|
}
|
|
|
|
throw new UnleashError({
|
|
name: 'PasswordMismatchError',
|
|
message: `The combination of password and username you provided is invalid. If you have forgotten your password, visit ${this.baseUriPath}/forgotten-password or get in touch with your instance administrator.`,
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Used to login users without specifying password. Used when integrating
|
|
* with external identity providers.
|
|
*
|
|
* @param usernameOrEmail
|
|
* @param autoCreateUser
|
|
* @returns
|
|
*/
|
|
async loginUserWithoutPassword(
|
|
email: string,
|
|
autoCreateUser: boolean = false,
|
|
): Promise<IUser> {
|
|
return this.loginUserSSO({ email, autoCreate: autoCreateUser });
|
|
}
|
|
|
|
async loginUserSSO({
|
|
email,
|
|
name,
|
|
rootRole,
|
|
autoCreate = false,
|
|
}: ILoginUserRequest): Promise<IUser> {
|
|
let user: IUser;
|
|
|
|
try {
|
|
user = await this.store.getByQuery({ email });
|
|
// Update user if autCreate is enabled.
|
|
if (name && user.name !== name) {
|
|
user = await this.store.update(user.id, { name, email });
|
|
}
|
|
} catch (e) {
|
|
// User does not exists. Create if "autoCreate" is enabled
|
|
if (autoCreate) {
|
|
user = await this.createUser({
|
|
email,
|
|
name,
|
|
rootRole: rootRole || RoleName.EDITOR,
|
|
});
|
|
} else {
|
|
throw e;
|
|
}
|
|
}
|
|
await this.store.successfullyLogin(user);
|
|
return user;
|
|
}
|
|
|
|
async changePassword(userId: number, password: string): Promise<void> {
|
|
this.validatePassword(password);
|
|
const passwordHash = await bcrypt.hash(password, saltRounds);
|
|
await this.store.setPasswordHash(userId, passwordHash);
|
|
await this.sessionService.deleteSessionsForUser(userId);
|
|
await this.resetTokenService.expireExistingTokensForUser(userId);
|
|
}
|
|
|
|
async getUserForToken(token: string): Promise<TokenUserSchema> {
|
|
const { createdBy, userId } = await this.resetTokenService.isValid(
|
|
token,
|
|
);
|
|
const user = await this.getUser(userId);
|
|
const role = await this.accessService.getRoleData(user.rootRole);
|
|
return {
|
|
token,
|
|
createdBy,
|
|
email: user.email,
|
|
name: user.name,
|
|
id: user.id,
|
|
role: {
|
|
id: user.rootRole,
|
|
description: role.role.description,
|
|
type: role.role.type,
|
|
name: role.role.name,
|
|
},
|
|
};
|
|
}
|
|
|
|
/**
|
|
* If the password is a strong password will update password and delete all sessions for the user we're changing the password for
|
|
* @param token - the token authenticating this request
|
|
* @param password - new password
|
|
*/
|
|
async resetPassword(token: string, password: string): Promise<void> {
|
|
this.validatePassword(password);
|
|
const user = await this.getUserForToken(token);
|
|
const allowed = await this.resetTokenService.useAccessToken({
|
|
userId: user.id,
|
|
token,
|
|
});
|
|
if (allowed) {
|
|
await this.changePassword(user.id, password);
|
|
} else {
|
|
throw new InvalidTokenError();
|
|
}
|
|
}
|
|
|
|
async createResetPasswordEmail(
|
|
receiverEmail: string,
|
|
user: User = systemUser,
|
|
): Promise<URL> {
|
|
const receiver = await this.getByEmail(receiverEmail);
|
|
if (!receiver) {
|
|
throw new NotFoundError(`Could not find ${receiverEmail}`);
|
|
}
|
|
if (this.passwordResetTimeouts[receiver.id]) {
|
|
return;
|
|
}
|
|
|
|
const resetLink = await this.resetTokenService.createResetPasswordUrl(
|
|
receiver.id,
|
|
user.username || user.email,
|
|
);
|
|
|
|
this.passwordResetTimeouts[receiver.id] = setTimeout(() => {
|
|
delete this.passwordResetTimeouts[receiver.id];
|
|
}, 1000 * 60); // 1 minute
|
|
|
|
await this.emailService.sendResetMail(
|
|
receiver.name,
|
|
receiver.email,
|
|
resetLink.toString(),
|
|
);
|
|
return resetLink;
|
|
}
|
|
}
|
|
|
|
module.exports = UserService;
|
|
export default UserService;
|