CartoDB-SQL-API/app/services/user_database_service.js

106 lines
3.7 KiB
JavaScript
Raw Normal View History

function isApiKeyFound(apikey) {
return apikey.type !== null &&
apikey.user !== null &&
apikey.databasePassword !== null &&
apikey.databaseRole !== null;
}
function UserDatabaseService(metadataBackend) {
this.metadataBackend = metadataBackend;
}
2018-02-23 00:49:02 +08:00
function errorUserNotFoundMessageTemplate (user) {
return `Sorry, we can't find CARTO user '${user}'. Please check that you have entered the correct domain.`;
}
function isOauthAuthorization({ apikeyToken, authorizationLevel }) {
return (authorizationLevel === 'master') && !apikeyToken;
}
/**
* Callback is invoked with `dbParams` and `authDbParams`.
* `dbParams` depends on AuthApi verification so it might return a public user with just SELECT permission, where
* `authDbParams` will always return connection params as AuthApi had authorized the connection.
* That might be useful when you have to run a query with and without permissions.
*
* @param {AuthApi} authApi
* @param {String} cdbUsername
* @param {Function} callback (err, dbParams, authDbParams)
*/
UserDatabaseService.prototype.getConnectionParams = function (username, apikeyToken, authorizationLevel, callback) {
2018-02-23 00:49:02 +08:00
this.metadataBackend.getAllUserDBParams(username, (err, dbParams) => {
2018-02-22 22:58:52 +08:00
if (err) {
err.http_status = 404;
2018-02-23 00:49:02 +08:00
err.message = errorUserNotFoundMessageTemplate(username);
2018-02-22 22:58:52 +08:00
return callback(err);
}
const commonDBConfiguration = {
2018-02-22 22:58:52 +08:00
port: global.settings.db_port,
host: dbParams.dbhost,
dbname: dbParams.dbname,
2018-02-22 22:58:52 +08:00
};
this.metadataBackend.getMasterApikey(username, (err, masterApikey) => {
if (err) {
2018-02-22 22:58:52 +08:00
err.http_status = 404;
2018-02-23 00:49:02 +08:00
err.message = errorUserNotFoundMessageTemplate(username);
return callback(err);
}
if (!isApiKeyFound(masterApikey)) {
const apiKeyNotFoundError = new Error('Unauthorized');
apiKeyNotFoundError.type = 'auth';
apiKeyNotFoundError.subtype = 'api-key-not-found';
apiKeyNotFoundError.http_status = 401;
return callback(apiKeyNotFoundError);
2018-02-22 22:58:52 +08:00
}
const masterDBConfiguration = Object.assign({
user: masterApikey.databaseRole,
pass: masterApikey.databasePassword
},
commonDBConfiguration);
if (isOauthAuthorization({ apikeyToken, authorizationLevel})) {
2018-06-13 19:17:01 +08:00
return callback(null, masterDBConfiguration, masterDBConfiguration);
}
// Default Api key fallback
apikeyToken = apikeyToken || 'default_public';
this.metadataBackend.getApikey(username, apikeyToken, (err, apikey) => {
if (err) {
err.http_status = 404;
err.message = errorUserNotFoundMessageTemplate(username);
return callback(err);
}
if (!isApiKeyFound(apikey)) {
const apiKeyNotFoundError = new Error('Unauthorized');
apiKeyNotFoundError.type = 'auth';
apiKeyNotFoundError.subtype = 'api-key-not-found';
apiKeyNotFoundError.http_status = 401;
return callback(apiKeyNotFoundError);
}
const DBConfiguration = Object.assign({
user: apikey.databaseRole,
pass: apikey.databasePassword
},
commonDBConfiguration);
callback(null, DBConfiguration, masterDBConfiguration);
});
2018-02-22 22:58:52 +08:00
});
});
};
2015-12-10 22:06:25 +08:00
module.exports = UserDatabaseService;