mirror of
https://github.com/TryGhost/Ghost.git
synced 2024-11-29 07:09:48 +03:00
0a744c2781
* 🎨 use updateClient function to update redirectUri refs #7654 * 🎨 name instead of clientName * 🎨 config.get('theme:title') for client name - initial read can happen from config * ✨ register public client: client name and description - no update yet - for initial client creation - we forward title/description to Ghost Auth - TODO: use settings-cache when merged * ✨ store blog_uri in db * 🎨 passport logic changes - use updateClient instead of changeCallbackURL - be able to update: blog title, blog description, redirectUri and blogUri - remove retries, they get implemented in passport-ghost soon - reorder logic a bit * 🛠 passport-ghost 1.2.0 * 🎨 tests: extend DataGenerator createClient - set some defaults * 🎨 tests - extend tests - 👻 * ✨ run auth.init in background - no need to block the bootstrap process - if client can't be registered, you will see an error - ensure Ghost-Admin renders correctly * 🛠 passport-ghost 1.3.0 - retries * 🎨 use client_uri in Client Schema - adapt changes - use blog_uri only when calling the passport-ghost instance - Ghost uses the client_uri notation to improve readability * ✨ read blog title/description from settings cache * 🚨 Ghost Auth returns email instead of email_address - adapt Ghost
150 lines
5.5 KiB
JavaScript
150 lines
5.5 KiB
JavaScript
var models = require('../models'),
|
|
utils = require('../utils'),
|
|
i18n = require('../i18n'),
|
|
errors = require('../errors'),
|
|
_ = require('lodash'),
|
|
strategies;
|
|
|
|
strategies = {
|
|
|
|
/**
|
|
* ClientPasswordStrategy
|
|
*
|
|
* This strategy is used to authenticate registered OAuth clients. It is
|
|
* employed to protect the `token` endpoint, which consumers use to obtain
|
|
* access tokens. The OAuth 2.0 specification suggests that clients use the
|
|
* HTTP Basic scheme to authenticate (not implemented yet).
|
|
* Use of the client password strategy is implemented to support ember-simple-auth.
|
|
*/
|
|
clientPasswordStrategy: function clientPasswordStrategy(clientId, clientSecret, done) {
|
|
return models.Client.findOne({slug: clientId}, {withRelated: ['trustedDomains']})
|
|
.then(function then(model) {
|
|
if (model) {
|
|
var client = model.toJSON({include: ['trustedDomains']});
|
|
if (client.status === 'enabled' && client.secret === clientSecret) {
|
|
return done(null, client);
|
|
}
|
|
}
|
|
return done(null, false);
|
|
});
|
|
},
|
|
|
|
/**
|
|
* BearerStrategy
|
|
*
|
|
* This strategy is used to authenticate users based on an access token (aka a
|
|
* bearer token). The user must have previously authorized a client
|
|
* application, which is issued an access token to make requests on behalf of
|
|
* the authorizing user.
|
|
*/
|
|
bearerStrategy: function bearerStrategy(accessToken, done) {
|
|
return models.Accesstoken.findOne({token: accessToken})
|
|
.then(function then(model) {
|
|
if (model) {
|
|
var token = model.toJSON();
|
|
if (token.expires > Date.now()) {
|
|
return models.User.findOne({id: token.user_id})
|
|
.then(function then(model) {
|
|
if (model) {
|
|
var user = model.toJSON(),
|
|
info = {scope: '*'};
|
|
return done(null, {id: user.id}, info);
|
|
}
|
|
return done(null, false);
|
|
});
|
|
} else {
|
|
return done(null, false);
|
|
}
|
|
} else {
|
|
return done(null, false);
|
|
}
|
|
});
|
|
},
|
|
|
|
/**
|
|
* Ghost Strategy
|
|
* ghostAuthRefreshToken: will be null for now, because we don't need it right now
|
|
*
|
|
* CASES:
|
|
* - via invite token
|
|
* - via normal auth
|
|
* - via setup
|
|
*
|
|
* @TODO: validate GhostAuth profile?
|
|
*/
|
|
ghostStrategy: function ghostStrategy(req, ghostAuthAccessToken, ghostAuthRefreshToken, profile, done) {
|
|
var inviteToken = req.body.inviteToken,
|
|
options = {context: {internal: true}},
|
|
handleInviteToken, handleSetup;
|
|
|
|
handleInviteToken = function handleInviteToken() {
|
|
var user, invite;
|
|
inviteToken = utils.decodeBase64URLsafe(inviteToken);
|
|
|
|
return models.Invite.findOne({token: inviteToken}, options)
|
|
.then(function addInviteUser(_invite) {
|
|
invite = _invite;
|
|
|
|
if (!invite) {
|
|
throw new errors.NotFoundError({message: i18n.t('errors.api.invites.inviteNotFound')});
|
|
}
|
|
|
|
if (invite.get('expires') < Date.now()) {
|
|
throw new errors.NotFoundError({message: i18n.t('errors.api.invites.inviteExpired')});
|
|
}
|
|
|
|
return models.User.add({
|
|
email: profile.email,
|
|
name: profile.email,
|
|
password: utils.uid(50),
|
|
roles: invite.toJSON().roles
|
|
}, options);
|
|
})
|
|
.then(function destroyInvite(_user) {
|
|
user = _user;
|
|
return invite.destroy(options);
|
|
})
|
|
.then(function () {
|
|
return user;
|
|
});
|
|
};
|
|
|
|
handleSetup = function handleSetup() {
|
|
return models.User.findOne({slug: 'ghost-owner', status: 'all'}, options)
|
|
.then(function fetchedOwner(owner) {
|
|
if (!owner) {
|
|
throw new errors.NotFoundError({message: i18n.t('errors.models.user.userNotFound')});
|
|
}
|
|
|
|
return models.User.edit({
|
|
email: profile.email,
|
|
status: 'active'
|
|
}, _.merge({id: owner.id}, options));
|
|
});
|
|
};
|
|
|
|
models.User.getByEmail(profile.email, options)
|
|
.then(function fetchedUser(user) {
|
|
if (user) {
|
|
return user;
|
|
}
|
|
|
|
if (inviteToken) {
|
|
return handleInviteToken();
|
|
}
|
|
|
|
return handleSetup();
|
|
})
|
|
.then(function updateGhostAuthToken(user) {
|
|
options.id = user.id;
|
|
return models.User.edit({ghost_auth_access_token: ghostAuthAccessToken}, options);
|
|
})
|
|
.then(function returnResponse(user) {
|
|
done(null, user, profile);
|
|
})
|
|
.catch(done);
|
|
}
|
|
};
|
|
|
|
module.exports = strategies;
|