1
0
mirror of https://github.com/Unleash/unleash.git synced 2025-06-18 01:18:23 +02:00
unleash.unleash/src/lib/routes/admin-api/api-token.ts
Christopher Kolstad 5a3bb1ffc3
Biome1.5.1 (#5867)
Lots of work here, mostly because I didn't want to turn off the
`noImplicitAnyLet` lint. This PR tries its best to type all the untyped
lets biome complained about (Don't ask me how many hours that took or
how many lints that was >200...), which in the future will force test
authors to actually type their global variables setup in `beforeAll`.

---------

Co-authored-by: Gastón Fournier <gaston@getunleash.io>
2024-01-12 09:25:59 +00:00

440 lines
14 KiB
TypeScript

import { Response } from 'express';
import Controller from '../controller';
import {
ADMIN,
CREATE_CLIENT_API_TOKEN,
CREATE_FRONTEND_API_TOKEN,
DELETE_CLIENT_API_TOKEN,
DELETE_FRONTEND_API_TOKEN,
READ_CLIENT_API_TOKEN,
READ_FRONTEND_API_TOKEN,
UPDATE_CLIENT_API_TOKEN,
UPDATE_FRONTEND_API_TOKEN,
} from '../../types/permissions';
import { ApiTokenService } from '../../services/api-token-service';
import { Logger } from '../../logger';
import { AccessService } from '../../services/access-service';
import { IAuthRequest } from '../unleash-types';
import { IUser } from '../../types/user';
import { IUnleashConfig } from '../../types/option';
import { ApiTokenType, IApiToken } from '../../types/models/api-token';
import { createApiToken } from '../../schema/api-token-schema';
import { OpenApiService } from '../../services/openapi-service';
import { IUnleashServices } from '../../types';
import { createRequestSchema } from '../../openapi/util/create-request-schema';
import {
createResponseSchema,
resourceCreatedResponseSchema,
} from '../../openapi/util/create-response-schema';
import {
apiTokensSchema,
ApiTokensSchema,
} from '../../openapi/spec/api-tokens-schema';
import { serializeDates } from '../../types/serialize-dates';
import {
apiTokenSchema,
ApiTokenSchema,
} from '../../openapi/spec/api-token-schema';
import { UpdateApiTokenSchema } from '../../openapi/spec/update-api-token-schema';
import {
emptyResponse,
getStandardResponses,
} from '../../openapi/util/standard-responses';
import { ProxyService } from '../../services/proxy-service';
import { extractUsername } from '../../util';
import { OperationDeniedError } from '../../error';
interface TokenParam {
token: string;
}
interface TokenNameParam {
name: string;
}
export const tokenTypeToCreatePermission: (tokenType: ApiTokenType) => string =
(tokenType) => {
switch (tokenType) {
case ApiTokenType.ADMIN:
return ADMIN;
case ApiTokenType.CLIENT:
return CREATE_CLIENT_API_TOKEN;
case ApiTokenType.FRONTEND:
return CREATE_FRONTEND_API_TOKEN;
}
};
const permissionToTokenType: (permission: string) => ApiTokenType | undefined =
(permission) => {
if (
[
CREATE_FRONTEND_API_TOKEN,
READ_FRONTEND_API_TOKEN,
DELETE_FRONTEND_API_TOKEN,
UPDATE_FRONTEND_API_TOKEN,
].includes(permission)
) {
return ApiTokenType.FRONTEND;
} else if (
[
CREATE_CLIENT_API_TOKEN,
READ_CLIENT_API_TOKEN,
DELETE_CLIENT_API_TOKEN,
UPDATE_CLIENT_API_TOKEN,
].includes(permission)
) {
return ApiTokenType.CLIENT;
} else if (ADMIN === permission) {
return ApiTokenType.ADMIN;
} else {
return undefined;
}
};
const tokenTypeToUpdatePermission: (tokenType: ApiTokenType) => string = (
tokenType,
) => {
switch (tokenType) {
case ApiTokenType.ADMIN:
return ADMIN;
case ApiTokenType.CLIENT:
return UPDATE_CLIENT_API_TOKEN;
case ApiTokenType.FRONTEND:
return UPDATE_FRONTEND_API_TOKEN;
}
};
const tokenTypeToDeletePermission: (tokenType: ApiTokenType) => string = (
tokenType,
) => {
switch (tokenType) {
case ApiTokenType.ADMIN:
return ADMIN;
case ApiTokenType.CLIENT:
return DELETE_CLIENT_API_TOKEN;
case ApiTokenType.FRONTEND:
return DELETE_FRONTEND_API_TOKEN;
}
};
export class ApiTokenController extends Controller {
private apiTokenService: ApiTokenService;
private accessService: AccessService;
private proxyService: ProxyService;
private openApiService: OpenApiService;
private logger: Logger;
constructor(
config: IUnleashConfig,
{
apiTokenService,
accessService,
proxyService,
openApiService,
}: Pick<
IUnleashServices,
| 'apiTokenService'
| 'accessService'
| 'proxyService'
| 'openApiService'
>,
) {
super(config);
this.apiTokenService = apiTokenService;
this.accessService = accessService;
this.proxyService = proxyService;
this.openApiService = openApiService;
this.logger = config.getLogger('api-token-controller.js');
this.route({
method: 'get',
path: '',
handler: this.getAllApiTokens,
permission: [ADMIN, READ_CLIENT_API_TOKEN, READ_FRONTEND_API_TOKEN],
middleware: [
openApiService.validPath({
tags: ['API tokens'],
operationId: 'getAllApiTokens',
summary: 'Get API tokens',
description:
'Retrieves all API tokens that exist in the Unleash instance.',
responses: {
200: createResponseSchema('apiTokensSchema'),
...getStandardResponses(401, 403),
},
}),
],
});
this.route({
method: 'get',
path: '/:name',
handler: this.getApiTokensByName,
permission: [ADMIN, READ_CLIENT_API_TOKEN, READ_FRONTEND_API_TOKEN],
middleware: [
openApiService.validPath({
tags: ['API tokens'],
operationId: 'getApiTokensByName',
summary: 'Get API tokens by name',
description:
'Retrieves all API tokens that match a given token name. Because token names are not unique, this endpoint will always return a list. If no tokens with the provided name exist, the list will be empty. Otherwise, it will contain all the tokens with the given name.',
responses: {
200: createResponseSchema('apiTokensSchema'),
...getStandardResponses(401, 403),
},
}),
],
});
this.route({
method: 'post',
path: '',
handler: this.createApiToken,
permission: [
ADMIN,
CREATE_CLIENT_API_TOKEN,
CREATE_FRONTEND_API_TOKEN,
],
middleware: [
openApiService.validPath({
tags: ['API tokens'],
operationId: 'createApiToken',
requestBody: createRequestSchema('createApiTokenSchema'),
summary: 'Create API token',
description: `Create an API token of a specific type: one of ${Object.values(
ApiTokenType,
).join(', ')}.`,
responses: {
201: resourceCreatedResponseSchema('apiTokenSchema'),
...getStandardResponses(401, 403, 415),
},
}),
],
});
this.route({
method: 'put',
path: '/:token',
handler: this.updateApiToken,
permission: [
ADMIN,
UPDATE_CLIENT_API_TOKEN,
UPDATE_FRONTEND_API_TOKEN,
],
middleware: [
openApiService.validPath({
tags: ['API tokens'],
operationId: 'updateApiToken',
summary: 'Update API token',
description:
"Updates an existing API token with a new expiry date. The `token` path parameter is the token's `secret`. If the token does not exist, this endpoint returns a 200 OK, but does nothing.",
requestBody: createRequestSchema('updateApiTokenSchema'),
responses: {
200: emptyResponse,
...getStandardResponses(401, 403, 415),
},
}),
],
});
this.route({
method: 'delete',
path: '/:token',
handler: this.deleteApiToken,
acceptAnyContentType: true,
permission: [
ADMIN,
DELETE_CLIENT_API_TOKEN,
DELETE_FRONTEND_API_TOKEN,
],
middleware: [
openApiService.validPath({
tags: ['API tokens'],
summary: 'Delete API token',
description:
"Deletes an existing API token. The `token` path parameter is the token's `secret`. If the token does not exist, this endpoint returns a 200 OK, but does nothing.",
operationId: 'deleteApiToken',
responses: {
200: emptyResponse,
...getStandardResponses(401, 403),
},
}),
],
});
}
async getAllApiTokens(
req: IAuthRequest,
res: Response<ApiTokensSchema>,
): Promise<void> {
const { user } = req;
const tokens = await this.accessibleTokens(user);
this.openApiService.respondWithValidation(
200,
res,
apiTokensSchema.$id,
{ tokens: serializeDates(tokens) },
);
}
async getApiTokensByName(
req: IAuthRequest<TokenNameParam>,
res: Response<ApiTokensSchema>,
): Promise<void> {
const { user } = req;
const { name } = req.params;
const tokens = await this.accessibleTokensByName(name, user);
this.openApiService.respondWithValidation(
200,
res,
apiTokensSchema.$id,
{ tokens: serializeDates(tokens) },
);
}
async createApiToken(
req: IAuthRequest,
res: Response<ApiTokenSchema>,
): Promise<any> {
const createToken = await createApiToken.validateAsync(req.body);
const permissionRequired = tokenTypeToCreatePermission(
createToken.type,
);
const hasPermission = await this.accessService.hasPermission(
req.user,
permissionRequired,
);
if (hasPermission) {
const token = await this.apiTokenService.createApiToken(
createToken,
extractUsername(req),
);
this.openApiService.respondWithValidation(
201,
res,
apiTokenSchema.$id,
serializeDates(token),
{ location: `api-tokens` },
);
} else {
throw new OperationDeniedError(
`You don't have the necessary access [${permissionRequired}] to perform this operation`,
);
}
}
async updateApiToken(
req: IAuthRequest<TokenParam, void, UpdateApiTokenSchema>,
res: Response,
): Promise<any> {
const { token } = req.params;
const { expiresAt } = req.body;
if (!expiresAt) {
this.logger.error(req.body);
return res.status(400).send();
}
let tokenToUpdate: IApiToken | undefined;
try {
tokenToUpdate = await this.apiTokenService.getToken(token);
} catch (error) {}
if (!tokenToUpdate) {
res.status(200).end();
return;
}
const permissionRequired = tokenTypeToUpdatePermission(
tokenToUpdate.type,
);
const hasPermission = await this.accessService.hasPermission(
req.user,
permissionRequired,
);
if (!hasPermission) {
throw new OperationDeniedError(
`You do not have the required access [${permissionRequired}] to perform this operation`,
);
}
await this.apiTokenService.updateExpiry(
token,
new Date(expiresAt),
extractUsername(req),
req.user.id,
);
return res.status(200).end();
}
async deleteApiToken(
req: IAuthRequest<TokenParam>,
res: Response,
): Promise<void> {
const { token } = req.params;
let tokenToUpdate: IApiToken | undefined;
try {
tokenToUpdate = await this.apiTokenService.getToken(token);
} catch (error) {}
if (!tokenToUpdate) {
res.status(200).end();
return;
}
const permissionRequired = tokenTypeToDeletePermission(
tokenToUpdate.type,
);
const hasPermission = await this.accessService.hasPermission(
req.user,
permissionRequired,
);
if (!hasPermission) {
throw new OperationDeniedError(
`You do not have the required access [${permissionRequired}] to perform this operation`,
);
}
await this.apiTokenService.delete(
token,
extractUsername(req),
req.user.id,
);
await this.proxyService.deleteClientForProxyToken(token);
res.status(200).end();
}
private async accessibleTokensByName(
tokenName: string,
user: IUser,
): Promise<IApiToken[]> {
const allTokens = await this.accessibleTokens(user);
return allTokens.filter((token) => token.tokenName === tokenName);
}
private async accessibleTokens(user: IUser): Promise<IApiToken[]> {
const allTokens = await this.apiTokenService.getAllTokens();
if (user.isAPI && user.permissions.includes(ADMIN)) {
return allTokens;
}
const userPermissions =
await this.accessService.getPermissionsForUser(user);
const allowedTokenTypes = [
ADMIN,
READ_CLIENT_API_TOKEN,
READ_FRONTEND_API_TOKEN,
]
.filter((readPerm) =>
userPermissions.some(
(p) => p.permission === readPerm || p.permission === ADMIN,
),
)
.map(permissionToTokenType)
.filter((t) => t);
return allTokens.filter((token) =>
allowedTokenTypes.includes(token.type),
);
}
}