Windshaft-cartodb/lib/cartodb/api/auth_api.js

156 lines
4.5 KiB
JavaScript
Raw Normal View History

/**
*
* @param {PgConnection} pgConnection
* @param metadataBackend
* @param {MapStore} mapStore
* @param {TemplateMaps} templateMaps
* @constructor
* @type {AuthApi}
*/
function AuthApi(pgConnection, metadataBackend, mapStore, templateMaps) {
this.pgConnection = pgConnection;
this.metadataBackend = metadataBackend;
this.mapStore = mapStore;
this.templateMaps = templateMaps;
}
module.exports = AuthApi;
2017-10-04 18:50:27 +08:00
// Check if the user is authorized by a signer
//
2017-10-04 18:50:27 +08:00
// @param res express response object
// @param callback function(err, signed_by) signed_by will be
// null if the request is not signed by anyone
// or will be a string cartodb username otherwise.
//
AuthApi.prototype.authorizedBySigner = function(res, callback) {
if ( ! res.locals.token || ! res.locals.signer ) {
return callback(null, false); // no signer requested
}
var self = this;
var layergroup_id = res.locals.token;
var auth_token = res.locals.auth_token;
this.mapStore.load(layergroup_id, function(err, mapConfig) {
if (err) {
return callback(err);
}
var authorized = self.templateMaps.isAuthorized(mapConfig.obj().template, auth_token);
return callback(null, authorized);
});
};
function isValidApiKey(apikey) {
return apikey.type !== null &&
apikey.user !== null &&
apikey.databasePassword !== null &&
apikey.databaseRole !== null;
}
// Check if a request is authorized by api_key
//
// @param user
2018-02-15 19:50:42 +08:00
// @param res express response object
// @param callback function(err, authorized)
// NOTE: authorized is expected to be 0 or 1 (integer)
//
2018-02-15 19:50:42 +08:00
AuthApi.prototype.authorizedByAPIKey = function(user, res, callback) {
const apikeyToken = res.locals.api_key;
2018-02-15 19:50:42 +08:00
if ( ! apikeyToken ) {
return callback(null, false); // no api key, no authorization...
}
2018-02-15 19:50:42 +08:00
this.metadataBackend.getApikey(user, apikeyToken, (err, apikey) => {
if (err) {
return callback(err);
}
if ( !isValidApiKey(apikey)) {
const error = new Error('Unauthorized');
error.type = 'auth';
error.subtype = 'api-key-not-found';
error.http_status = 401;
2018-02-08 20:07:25 +08:00
return callback(error);
}
if (!apikey.grantsMaps) {
const error = new Error('Forbidden');
error.type = 'auth';
error.subtype = 'api-key-does-not-grant-access';
error.http_status = 403;
return callback(error);
}
return callback(null, true);
});
};
/**
* Check access authorization
*
* @param req - standard req object. Importantly contains table and host information
2017-10-05 18:44:03 +08:00
* @param res - standard res object. Contains the auth parameters in locals
* @param callback function(err, allowed) is access allowed not?
*/
AuthApi.prototype.authorize = function(req, res, callback) {
var user = res.locals.user;
2018-02-15 19:50:42 +08:00
this.authorizedByAPIKey(user, res, (err, isAuthorizedByApikey) => {
2018-02-08 01:48:59 +08:00
if (err) {
return callback(err);
}
2018-02-08 01:48:59 +08:00
if (isAuthorizedByApikey) {
return this.pgConnection.setDBAuth(user, res.locals, 'regular', function (err) {
2018-02-08 01:48:59 +08:00
req.profiler.done('setDBAuth');
if (err) {
return callback(err);
}
callback(null, true);
});
2018-02-08 01:48:59 +08:00
}
this.authorizedBySigner(res, (err, isAuthorizedBySigner) => {
if (err) {
return callback(err);
}
2018-02-08 01:48:59 +08:00
if (isAuthorizedBySigner) {
return this.pgConnection.setDBAuth(user, res.locals, 'master', function (err) {
2018-02-08 01:48:59 +08:00
req.profiler.done('setDBAuth');
if (err) {
return callback(err);
}
callback(null, true);
});
}
// if no signer name was given, use default api key
2018-02-08 01:48:59 +08:00
if (!res.locals.signer) {
return this.pgConnection.setDBAuth(user, res.locals, 'default', function (err) {
req.profiler.done('setDBAuth');
if (err) {
return callback(err);
}
callback(null, true);
});
}
2018-02-08 01:48:59 +08:00
// if signer name was given, return no authorization
return callback(null, false);
});
});
};