mirror of
https://github.com/Unleash/unleash.git
synced 2025-01-31 00:16:47 +01:00
1ecbc32e14
## About the changes We need a way to have an audit log for operations made on Api Tokens. These changes adds three new event types, API_TOKEN_CREATED, API_TOKEN_UPDATED, API_TOKEN_DELETED and extends api-token-service to store these to our event store to reflect the action being taken.
221 lines
6.6 KiB
TypeScript
221 lines
6.6 KiB
TypeScript
import { Response } from 'express';
|
|
|
|
import Controller from '../controller';
|
|
import {
|
|
ADMIN,
|
|
CREATE_API_TOKEN,
|
|
DELETE_API_TOKEN,
|
|
READ_API_TOKEN,
|
|
UPDATE_API_TOKEN,
|
|
} from '../../types/permissions';
|
|
import { ApiTokenService } from '../../services/api-token-service';
|
|
import { Logger } from '../../logger';
|
|
import { AccessService } from '../../services/access-service';
|
|
import { IAuthRequest } from '../unleash-types';
|
|
import User from '../../types/user';
|
|
import { IUnleashConfig } from '../../types/option';
|
|
import { ApiTokenType, IApiToken } from '../../types/models/api-token';
|
|
import { createApiToken } from '../../schema/api-token-schema';
|
|
import { OpenApiService } from '../../services/openapi-service';
|
|
import { IUnleashServices } from '../../types';
|
|
import { createRequestSchema } from '../../openapi/util/create-request-schema';
|
|
import {
|
|
createResponseSchema,
|
|
resourceCreatedResponseSchema,
|
|
} from '../../openapi/util/create-response-schema';
|
|
import {
|
|
apiTokensSchema,
|
|
ApiTokensSchema,
|
|
} from '../../openapi/spec/api-tokens-schema';
|
|
import { serializeDates } from '../../types/serialize-dates';
|
|
import {
|
|
apiTokenSchema,
|
|
ApiTokenSchema,
|
|
} from '../../openapi/spec/api-token-schema';
|
|
import { UpdateApiTokenSchema } from '../../openapi/spec/update-api-token-schema';
|
|
import { emptyResponse } from '../../openapi/util/standard-responses';
|
|
import { ProxyService } from '../../services/proxy-service';
|
|
import { extractUsername } from '../../util';
|
|
|
|
interface TokenParam {
|
|
token: string;
|
|
}
|
|
export class ApiTokenController extends Controller {
|
|
private apiTokenService: ApiTokenService;
|
|
|
|
private accessService: AccessService;
|
|
|
|
private proxyService: ProxyService;
|
|
|
|
private openApiService: OpenApiService;
|
|
|
|
private logger: Logger;
|
|
|
|
constructor(
|
|
config: IUnleashConfig,
|
|
{
|
|
apiTokenService,
|
|
accessService,
|
|
proxyService,
|
|
openApiService,
|
|
}: Pick<
|
|
IUnleashServices,
|
|
| 'apiTokenService'
|
|
| 'accessService'
|
|
| 'proxyService'
|
|
| 'openApiService'
|
|
>,
|
|
) {
|
|
super(config);
|
|
this.apiTokenService = apiTokenService;
|
|
this.accessService = accessService;
|
|
this.proxyService = proxyService;
|
|
this.openApiService = openApiService;
|
|
this.logger = config.getLogger('api-token-controller.js');
|
|
|
|
this.route({
|
|
method: 'get',
|
|
path: '',
|
|
handler: this.getAllApiTokens,
|
|
permission: READ_API_TOKEN,
|
|
middleware: [
|
|
openApiService.validPath({
|
|
tags: ['API tokens'],
|
|
operationId: 'getAllApiTokens',
|
|
responses: {
|
|
200: createResponseSchema('apiTokensSchema'),
|
|
},
|
|
}),
|
|
],
|
|
});
|
|
|
|
this.route({
|
|
method: 'post',
|
|
path: '',
|
|
handler: this.createApiToken,
|
|
permission: CREATE_API_TOKEN,
|
|
middleware: [
|
|
openApiService.validPath({
|
|
tags: ['API tokens'],
|
|
operationId: 'createApiToken',
|
|
requestBody: createRequestSchema('createApiTokenSchema'),
|
|
responses: {
|
|
201: resourceCreatedResponseSchema('apiTokenSchema'),
|
|
},
|
|
}),
|
|
],
|
|
});
|
|
|
|
this.route({
|
|
method: 'put',
|
|
path: '/:token',
|
|
handler: this.updateApiToken,
|
|
permission: UPDATE_API_TOKEN,
|
|
middleware: [
|
|
openApiService.validPath({
|
|
tags: ['API tokens'],
|
|
operationId: 'updateApiToken',
|
|
requestBody: createRequestSchema('updateApiTokenSchema'),
|
|
responses: {
|
|
200: emptyResponse,
|
|
},
|
|
}),
|
|
],
|
|
});
|
|
|
|
this.route({
|
|
method: 'delete',
|
|
path: '/:token',
|
|
handler: this.deleteApiToken,
|
|
acceptAnyContentType: true,
|
|
permission: DELETE_API_TOKEN,
|
|
middleware: [
|
|
openApiService.validPath({
|
|
tags: ['API tokens'],
|
|
operationId: 'deleteApiToken',
|
|
responses: {
|
|
200: emptyResponse,
|
|
},
|
|
}),
|
|
],
|
|
});
|
|
}
|
|
|
|
async getAllApiTokens(
|
|
req: IAuthRequest,
|
|
res: Response<ApiTokensSchema>,
|
|
): Promise<void> {
|
|
const { user } = req;
|
|
const tokens = await this.accessibleTokens(user);
|
|
this.openApiService.respondWithValidation(
|
|
200,
|
|
res,
|
|
apiTokensSchema.$id,
|
|
{ tokens: serializeDates(tokens) },
|
|
);
|
|
}
|
|
|
|
async createApiToken(
|
|
req: IAuthRequest,
|
|
res: Response<ApiTokenSchema>,
|
|
): Promise<any> {
|
|
const createToken = await createApiToken.validateAsync(req.body);
|
|
const token = await this.apiTokenService.createApiToken(
|
|
createToken,
|
|
extractUsername(req),
|
|
);
|
|
this.openApiService.respondWithValidation(
|
|
201,
|
|
res,
|
|
apiTokenSchema.$id,
|
|
serializeDates(token),
|
|
{ location: `api-tokens` },
|
|
);
|
|
}
|
|
|
|
async updateApiToken(
|
|
req: IAuthRequest<TokenParam, void, UpdateApiTokenSchema>,
|
|
res: Response,
|
|
): Promise<any> {
|
|
const { token } = req.params;
|
|
const { expiresAt } = req.body;
|
|
|
|
if (!expiresAt) {
|
|
this.logger.error(req.body);
|
|
return res.status(400).send();
|
|
}
|
|
|
|
await this.apiTokenService.updateExpiry(
|
|
token,
|
|
new Date(expiresAt),
|
|
extractUsername(req),
|
|
);
|
|
return res.status(200).end();
|
|
}
|
|
|
|
async deleteApiToken(
|
|
req: IAuthRequest<TokenParam>,
|
|
res: Response,
|
|
): Promise<void> {
|
|
const { token } = req.params;
|
|
|
|
await this.apiTokenService.delete(token, extractUsername(req));
|
|
this.proxyService.deleteClientForProxyToken(token);
|
|
res.status(200).end();
|
|
}
|
|
|
|
private async accessibleTokens(user: User): Promise<IApiToken[]> {
|
|
const allTokens = await this.apiTokenService.getAllTokens();
|
|
|
|
if (user.isAPI && user.permissions.includes(ADMIN)) {
|
|
return allTokens;
|
|
}
|
|
|
|
if (await this.accessService.hasPermission(user, UPDATE_API_TOKEN)) {
|
|
return allTokens;
|
|
}
|
|
|
|
return allTokens.filter((token) => token.type !== ApiTokenType.ADMIN);
|
|
}
|
|
}
|