@opengis/fastify-table 1.1.150 → 1.1.152

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/config.js CHANGED
@@ -5,6 +5,7 @@ const config = fileName ? JSON.parse(fs.readFileSync(fileName)) : {};
5
5
 
6
6
  Object.assign(config, {
7
7
  allTemplates: config?.allTemplates || {},
8
+ skipCheckPolicyRoutes: [],
8
9
  });
9
10
 
10
11
  export default config;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@opengis/fastify-table",
3
- "version": "1.1.150",
3
+ "version": "1.1.152",
4
4
  "type": "module",
5
5
  "description": "core-plugins",
6
6
  "keywords": [
@@ -27,16 +27,16 @@
27
27
  },
28
28
  "dependencies": {
29
29
  "@fastify/sensible": "^5.0.0",
30
- "@fastify/url-data": "^5.4.0",
31
- "@opengis/fastify-hb": "^1.4.8",
30
+ "@fastify/url-data": "5.4.0",
31
+ "@opengis/fastify-hb": "1.4.8",
32
32
  "fastify": "^4.26.1",
33
33
  "fastify-plugin": "^4.0.0",
34
- "ioredis": "^5.3.2",
35
- "js-yaml": "^4.1.0",
36
- "pg": "^8.11.3",
37
- "pino": "^9.5.0",
38
- "pino-abstract-transport": "^2.0.0",
39
- "uglify-js": "^3.19.3"
34
+ "ioredis": "5.3.2",
35
+ "js-yaml": "4.1.0",
36
+ "pg": "8.11.3",
37
+ "pino": "9.5.0",
38
+ "pino-abstract-transport": "2.0.0",
39
+ "uglify-js": "3.19.3"
40
40
  },
41
41
  "devDependencies": {
42
42
  "@panzoom/panzoom": "^4.5.1",
@@ -1,6 +1,7 @@
1
1
  import { config, logger } from '../../../../utils.js';
2
2
  import block from '../sqlInjection.js';
3
3
 
4
+ const { skipCheckPolicyRoutes = [] } = config;
4
5
  /**
5
6
  * Middleware func
6
7
  *
@@ -11,7 +12,7 @@ import block from '../sqlInjection.js';
11
12
  * @returns {object|null} Returns object
12
13
  */
13
14
 
14
- export default function checkPolicy(req) {
15
+ export default function checkPolicy(req, reply) {
15
16
  const {
16
17
  originalUrl: path, hostname, query, params, headers, method, session, routeOptions, unittest,
17
18
  } = req;
@@ -27,10 +28,10 @@ export default function checkPolicy(req) {
27
28
 
28
29
  /*= == 0.Check superadmin access === */
29
30
  if (policy.includes('superadmin') && user?.user_type !== 'superadmin') {
30
- logger.file('access', {
31
+ logger.file('policy/access', {
31
32
  path, method, params, query, body, message: 'access restricted: not superadmin', uid: user?.uid,
32
33
  });
33
- return { message: 'access restricted: 0', status: 403 };
34
+ return reply.status(403).send('access restricted: 0');
34
35
  }
35
36
 
36
37
  /*= == 1.File injection === */
@@ -38,7 +39,7 @@ export default function checkPolicy(req) {
38
39
  logger.file('injection/file', {
39
40
  path, method, params, query, body, message: 'access restricted: 1', uid: user?.uid,
40
41
  });
41
- return { message: 'access restricted: 1', status: 403 };
42
+ return reply.status(403).send('access restricted: 1');
42
43
  }
43
44
 
44
45
  /* === 1.1 File === */
@@ -54,11 +55,11 @@ export default function checkPolicy(req) {
54
55
  logger.file('injection/sql', {
55
56
  path, method, params, query, body, stopWords, message: 'access restricted: 2', uid: user?.uid,
56
57
  });
57
- return { message: 'access restricted: 2', status: 403 };
58
+ return reply.status(403).send('access restricted: 2');
58
59
  }
59
60
  }
60
61
  /* policy: skip if not API */
61
- const isApi = ['/files/', '/api/format/', '/api', '/api-user/', '/logger', '/file/'].filter((el) => path.includes(el)).length;
62
+ const isApi = ['/files/', '/api/', '/api-user/', '/logger', '/file/'].filter((el) => path.includes(el)).length;
62
63
  if (!isApi) {
63
64
  return null;
64
65
  }
@@ -68,12 +69,20 @@ export default function checkPolicy(req) {
68
69
  return null;
69
70
  }
70
71
 
72
+ /* === 0. policy: unauthorized access from admin URL === */
73
+ if (!user?.uid && !config.auth?.disable && isAdmin && !policy.includes('public') && !skipCheckPolicyRoutes.filter((el) => el).find(el => req.url.includes(el))) {
74
+ logger.file('policy/unauthorized', {
75
+ path, method, params, query, body, message: 'unauthorized',
76
+ });
77
+ return reply.status(401).send('unauthorized');
78
+ }
79
+
71
80
  /* === 3. policy: user === */
72
- if (!user && policy.includes('user') && false) {
81
+ if (!user && policy.includes('user')) {
73
82
  logger.file('policy/user', {
74
83
  path, method, params, query, body, message: 'access restricted: 3',
75
84
  });
76
- return { message: 'access restricted: 3', status: 403 };
85
+ return reply.status(403).send('access restricted: 3');
77
86
  }
78
87
 
79
88
  /* === 4. policy: referer === */
@@ -81,7 +90,7 @@ export default function checkPolicy(req) {
81
90
  logger.file('policy/referer', {
82
91
  path, method, params, query, body, message: 'access restricted: 4', uid: user?.uid,
83
92
  });
84
- return { message: 'access restricted: 4', status: 403 };
93
+ return reply.status(403).send('access restricted: 4');
85
94
  }
86
95
 
87
96
  /* === 5. policy: site auth === */
@@ -90,7 +99,7 @@ export default function checkPolicy(req) {
90
99
  logger.file('policy/site', {
91
100
  path, method, params, query, body, message: 'access restricted: 5', uid: user?.uid,
92
101
  });
93
- return { message: 'access restricted: 5', status: 403 };
102
+ return reply.status(403).send('access restricted: 5');
94
103
  }
95
104
 
96
105
  /* === 6. base policy: block api, except login === */
@@ -99,7 +108,7 @@ export default function checkPolicy(req) {
99
108
  logger.file('policy/api', {
100
109
  path, method, params, query, body, message: 'access restricted: 6', uid: user?.uid,
101
110
  });
102
- return { message: 'access restricted: 6', status: 403 };
111
+ return reply.status(403).send('access restricted: 6');
103
112
  }
104
113
 
105
114
  return null;
@@ -2,9 +2,9 @@ import checkPolicy from './funcs/checkPolicy.js';
2
2
 
3
3
  async function plugin(fastify) {
4
4
  fastify.addHook('preParsing', async (request, reply) => {
5
- const hookData = checkPolicy(request);
6
- if (hookData?.status && hookData?.message) {
7
- return reply.status(hookData?.status).send(hookData.message);
5
+ const resp = checkPolicy(request, reply);
6
+ if (resp) {
7
+ return resp;
8
8
  }
9
9
  });
10
10
  }