@saltcorn/server 0.6.3-beta.1 → 0.6.4-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/app.js CHANGED
@@ -38,7 +38,7 @@ const { h1 } = require("@saltcorn/markup/tags");
38
38
  const is = require("contractis/is");
39
39
  const Trigger = require("@saltcorn/data/models/trigger");
40
40
  const s3storage = require("./s3storage");
41
-
41
+ const TotpStrategy = require("passport-totp").Strategy;
42
42
  const locales = Object.keys(available_languages);
43
43
  // i18n configuration
44
44
  const i18n = new I18n({
@@ -148,7 +148,9 @@ const getApp = async (opts = {}) => {
148
148
  req.flash("danger", req.__("Incorrect user or password"))
149
149
  );
150
150
  const mu = await User.authenticate(userobj);
151
- if (mu) return done(null, mu.session_object);
151
+ if (mu && mu._attributes.totp_enabled)
152
+ return done(null, { pending_user: mu.session_object });
153
+ else if (mu) return done(null, mu.session_object);
152
154
  else {
153
155
  const { password, ...nopw } = userobj;
154
156
  Trigger.emitEvent("LoginFailed", null, null, nopw);
@@ -188,6 +190,14 @@ const getApp = async (opts = {}) => {
188
190
  }
189
191
  })
190
192
  );
193
+ passport.use(
194
+ new TotpStrategy(function (user, done) {
195
+ // setup function, supply key and period to done callback
196
+ User.findOne({ id: user.pending_user.id }).then((u) => {
197
+ return done(null, u._attributes.totp_key, 30);
198
+ });
199
+ })
200
+ );
191
201
  passport.serializeUser(function (user, done) {
192
202
  done(null, user);
193
203
  });
package/auth/roleadmin.js CHANGED
@@ -85,6 +85,28 @@ const editRoleLayoutForm = (role, layouts, layout_by_role, req) =>
85
85
  )
86
86
  );
87
87
 
88
+ /**
89
+ * @param {Role} role
90
+ * @param {Layout[]} layouts
91
+ * @param {*} layout_by_role
92
+ * @param {object} req
93
+ * @returns {Form}
94
+ */
95
+ const editRole2FAPolicyForm = (role, twofa_policy_by_role, req) =>
96
+ form(
97
+ {
98
+ action: `/roleadmin/setrole2fapolicy/${role.id}`,
99
+ method: "post",
100
+ },
101
+ csrfField(req),
102
+ select(
103
+ { name: "policy", onchange: "form.submit()" },
104
+ ["Optional", "Disabled", "Mandatory"].map((p) =>
105
+ option({ selected: twofa_policy_by_role[role.id] === p }, p)
106
+ )
107
+ )
108
+ );
109
+
88
110
  /**
89
111
  * @param {object} req
90
112
  * @returns {Form}
@@ -125,6 +147,7 @@ router.get(
125
147
  (l) => l !== "emergency"
126
148
  );
127
149
  const layout_by_role = getState().getConfig("layout_by_role");
150
+ const twofa_policy_by_role = getState().getConfig("twofa_policy_by_role");
128
151
  send_users_page({
129
152
  res,
130
153
  req,
@@ -142,6 +165,13 @@ router.get(
142
165
  key: (role) =>
143
166
  editRoleLayoutForm(role, layouts, layout_by_role, req),
144
167
  },
168
+ {
169
+ label: req.__("2FA policy"),
170
+ key: (role) =>
171
+ role.id === 10
172
+ ? ""
173
+ : editRole2FAPolicyForm(role, twofa_policy_by_role, req),
174
+ },
145
175
  {
146
176
  label: req.__("Delete"),
147
177
  key: (r) =>
@@ -240,6 +270,26 @@ router.post(
240
270
  })
241
271
  );
242
272
 
273
+ /**
274
+ * @name post/setrolelayout/:id
275
+ * @function
276
+ * @memberof module:auth/roleadmin~roleadminRouter
277
+ */
278
+ router.post(
279
+ "/setrole2fapolicy/:id",
280
+ isAdmin,
281
+ error_catcher(async (req, res) => {
282
+ const { id } = req.params;
283
+ const twofa_policy_by_role = getState().getConfigCopy(
284
+ "twofa_policy_by_role"
285
+ );
286
+ twofa_policy_by_role[+id] = req.body.policy;
287
+ await getState().setConfig("twofa_policy_by_role", twofa_policy_by_role);
288
+ req.flash("success", req.__(`Saved 2FA policy for role`));
289
+
290
+ res.redirect(`/roleadmin`);
291
+ })
292
+ );
243
293
  const unDeletableRoles = [1, 8, 10];
244
294
  /**
245
295
  * @name post/delete/:id
package/auth/routes.js CHANGED
@@ -24,12 +24,14 @@ const { renderForm, post_btn } = require("@saltcorn/markup");
24
24
  const passport = require("passport");
25
25
  const {
26
26
  a,
27
+ img,
27
28
  text,
28
29
  table,
29
30
  tbody,
30
31
  th,
31
32
  td,
32
33
  tr,
34
+ h4,
33
35
  form,
34
36
  select,
35
37
  option,
@@ -37,6 +39,8 @@ const {
37
39
  i,
38
40
  div,
39
41
  code,
42
+ pre,
43
+ p,
40
44
  } = require("@saltcorn/markup/tags");
41
45
  const {
42
46
  available_languages,
@@ -52,7 +56,9 @@ const { restore_backup } = require("../markup/admin.js");
52
56
  const { restore } = require("@saltcorn/data/models/backup");
53
57
  const load_plugins = require("../load_plugins");
54
58
  const fs = require("fs");
55
-
59
+ const base32 = require("thirty-two");
60
+ const qrcode = require("qrcode");
61
+ const totp = require("notp").totp;
56
62
  /**
57
63
  * @type {object}
58
64
  * @const
@@ -599,6 +605,8 @@ const signup_login_with_user = (u, req, res) =>
599
605
  if (!err) {
600
606
  Trigger.emitEvent("Login", null, u);
601
607
  if (getState().verifier) res.redirect("/auth/verification-flow");
608
+ else if (getState().get2FApolicy(u) === "Mandatory")
609
+ res.redirect("/auth/twofa/setup/totp");
602
610
  else res.redirect("/");
603
611
  } else {
604
612
  req.flash("danger", err);
@@ -920,6 +928,11 @@ router.post(
920
928
  error_catcher(async (req, res) => {
921
929
  ipLimiter.resetKey(req.ip);
922
930
  userLimiter.resetKey(userIdKey(req.body));
931
+ if (req.user.pending_user) {
932
+ res.redirect("/auth/twofa/login/totp");
933
+ return;
934
+ }
935
+
923
936
  if (req.session.cookie)
924
937
  if (req.body.remember) {
925
938
  const setDur = +getState().getConfig("cookie_duration_remember", 0);
@@ -932,7 +945,9 @@ router.post(
932
945
  }
933
946
  Trigger.emitEvent("Login", null, req.user);
934
947
  req.flash("success", req.__("Welcome, %s!", req.user.email));
935
- res.redirect("/");
948
+ if (getState().get2FApolicy(req.user) === "Mandatory") {
949
+ res.redirect("/auth/twofa/setup/totp");
950
+ } else res.redirect("/");
936
951
  })
937
952
  );
938
953
 
@@ -1095,6 +1110,9 @@ const userSettings = async ({ req, res, pwform, user }) => {
1095
1110
  }
1096
1111
  let apikeycard;
1097
1112
  const min_role_apikeygen = +getState().getConfig("min_role_apikeygen", 1);
1113
+ const twoFaPolicy = getState().get2FApolicy(user);
1114
+ const show2FAPolicy =
1115
+ twoFaPolicy !== "Disabled" || user._attributes.totp_enabled;
1098
1116
  if (user.role_id <= min_role_apikeygen)
1099
1117
  apikeycard = {
1100
1118
  type: "card",
@@ -1163,6 +1181,40 @@ const userSettings = async ({ req, res, pwform, user }) => {
1163
1181
  title: req.__("Change password"),
1164
1182
  contents: renderForm(pwform, req.csrfToken()),
1165
1183
  },
1184
+ ...(show2FAPolicy
1185
+ ? [
1186
+ {
1187
+ type: "card",
1188
+ title: req.__("Two-factor authentication"),
1189
+ contents: [
1190
+ div(
1191
+ user._attributes.totp_enabled
1192
+ ? req.__("Two-factor authentication is enabled")
1193
+ : req.__("Two-factor authentication is disabled")
1194
+ ),
1195
+ div(
1196
+ user._attributes.totp_enabled
1197
+ ? post_btn(
1198
+ "/auth/twofa/disable/totp",
1199
+ "Disable",
1200
+ req.csrfToken(),
1201
+ {
1202
+ btnClass: "btn-danger mt-2",
1203
+ req,
1204
+ }
1205
+ )
1206
+ : a(
1207
+ {
1208
+ href: "/auth/twofa/setup/totp",
1209
+ class: "btn btn-primary mt-2",
1210
+ },
1211
+ "Enable"
1212
+ )
1213
+ ),
1214
+ ],
1215
+ },
1216
+ ]
1217
+ : []),
1166
1218
  ...(apikeycard ? [apikeycard] : []),
1167
1219
  ],
1168
1220
  };
@@ -1253,6 +1305,12 @@ router.get(
1253
1305
  loggedIn,
1254
1306
  error_catcher(async (req, res) => {
1255
1307
  const user = await User.findOne({ id: req.user.id });
1308
+ if (!user) {
1309
+ req.logout();
1310
+ req.flash("danger", req.__("Must be logged in first"));
1311
+ res.redirect("/auth/login");
1312
+ return;
1313
+ }
1256
1314
  res.sendWrap(
1257
1315
  req.__("User settings"),
1258
1316
  await userSettings({ req, res, pwform: changPwForm(req), user })
@@ -1436,3 +1494,171 @@ router.all(
1436
1494
  res.redirect(wfres.redirect || "/");
1437
1495
  })
1438
1496
  );
1497
+
1498
+ /**
1499
+ * @name get/settings
1500
+ * @function
1501
+ * @memberof module:auth/routes~routesRouter
1502
+ */
1503
+ router.get(
1504
+ "/twofa/setup/totp",
1505
+ loggedIn,
1506
+ error_catcher(async (req, res) => {
1507
+ const user = await User.findOne({ id: req.user.id });
1508
+ let key;
1509
+ if (user._attributes.totp_key) key = user._attributes.totp_key;
1510
+ else {
1511
+ key = randomKey(10);
1512
+ user._attributes.totp_key = key;
1513
+ await user.update({ _attributes: user._attributes });
1514
+ }
1515
+
1516
+ const encodedKey = base32.encode(key);
1517
+
1518
+ // generate QR code for scanning into Google Authenticator
1519
+ // reference: https://code.google.com/p/google-authenticator/wiki/KeyUriFormat
1520
+ const site_name = getState().getConfig("site_name");
1521
+ const otpUrl = `otpauth://totp/${
1522
+ user.email
1523
+ }?secret=${encodedKey}&period=30&issuer=${encodeURIComponent(site_name)}`;
1524
+ const image = await qrcode.toDataURL(otpUrl);
1525
+ res.sendWrap(req.__("Setup two-factor authentication"), {
1526
+ type: "card",
1527
+ title: req.__(
1528
+ "Setup two-factor authentication with Time-based One-Time Password (TOTP)"
1529
+ ),
1530
+ contents: [
1531
+ h4(req.__("1. Scan this QR code in your Authenticator app")),
1532
+ img({ src: image }),
1533
+ p("Or enter this code:"),
1534
+ code(pre(encodedKey.toString())),
1535
+ h4(
1536
+ req.__(
1537
+ "2. Enter the six-digit code generated in your Authenticator app"
1538
+ )
1539
+ ),
1540
+ renderForm(totpForm(req), req.csrfToken()),
1541
+ ],
1542
+ });
1543
+ })
1544
+ );
1545
+
1546
+ router.post(
1547
+ "/twofa/setup/totp",
1548
+ loggedIn,
1549
+ error_catcher(async (req, res) => {
1550
+ const user = await User.findOne({ id: req.user.id });
1551
+
1552
+ if (!user._attributes.totp_key) {
1553
+ //key not set
1554
+ req.flash("danger", req.__("2FA TOTP Key not set"));
1555
+ res.redirect("/auth/twofa/setup/totp");
1556
+ return;
1557
+ }
1558
+
1559
+ const form = totpForm(req);
1560
+ form.validate(req.body);
1561
+ if (form.hasErrors) {
1562
+ req.flash("danger", req.__("Error processing form"));
1563
+ res.redirect("/auth/twofa/setup/totp");
1564
+ return;
1565
+ }
1566
+ const code = `${form.values.totpCode}`;
1567
+ const rv = totp.verify(code, user._attributes.totp_key, {
1568
+ time: 30,
1569
+ });
1570
+ if (!rv) {
1571
+ req.flash("danger", req.__("Could not verify code"));
1572
+ res.redirect("/auth/twofa/setup/totp");
1573
+ return;
1574
+ }
1575
+ user._attributes.totp_enabled = true;
1576
+ await user.update({ _attributes: user._attributes });
1577
+ req.flash(
1578
+ "success",
1579
+ req.__(
1580
+ "Two-factor authentication with Time-based One-Time Password enabled"
1581
+ )
1582
+ );
1583
+
1584
+ res.redirect("/auth/settings");
1585
+ })
1586
+ );
1587
+
1588
+ router.post(
1589
+ "/twofa/disable/totp",
1590
+ loggedIn,
1591
+ error_catcher(async (req, res) => {
1592
+ const user = await User.findOne({ id: req.user.id });
1593
+ user._attributes.totp_enabled = false;
1594
+ delete user._attributes.totp_key;
1595
+ await user.update({ _attributes: user._attributes });
1596
+ req.flash(
1597
+ "success",
1598
+ req.__(
1599
+ "Two-factor authentication with Time-based One-Time Password disabled"
1600
+ )
1601
+ );
1602
+ res.redirect("/auth/settings");
1603
+ })
1604
+ );
1605
+ const totpForm = (req) =>
1606
+ new Form({
1607
+ action: "/auth/twofa/setup/totp",
1608
+ fields: [
1609
+ {
1610
+ name: "totpCode",
1611
+ label: req.__("Code"),
1612
+ type: "Integer",
1613
+ required: true,
1614
+ },
1615
+ ],
1616
+ });
1617
+
1618
+ const randomKey = function (len) {
1619
+ function getRandomInt(min, max) {
1620
+ return Math.floor(Math.random() * (max - min + 1)) + min;
1621
+ }
1622
+ var buf = [],
1623
+ chars = "abcdefghijklmnopqrstuvwxyz0123456789",
1624
+ charlen = chars.length;
1625
+
1626
+ for (var i = 0; i < len; ++i) {
1627
+ buf.push(chars[getRandomInt(0, charlen - 1)]);
1628
+ }
1629
+
1630
+ return buf.join("");
1631
+ };
1632
+
1633
+ router.get(
1634
+ "/twofa/login/totp",
1635
+ error_catcher(async (req, res) => {
1636
+ const form = new Form({
1637
+ action: "/auth/twofa/login/totp",
1638
+ submitLabel: "Verify",
1639
+ fields: [
1640
+ {
1641
+ name: "code",
1642
+ label: req.__("Code"),
1643
+ type: "Integer",
1644
+ required: true,
1645
+ },
1646
+ ],
1647
+ });
1648
+ res.sendAuthWrap(req.__(`Two-factor authentication`), form, {});
1649
+ })
1650
+ );
1651
+
1652
+ router.post(
1653
+ "/twofa/login/totp",
1654
+ passport.authenticate("totp", {
1655
+ failureRedirect: "/auth/twofa/login/totp",
1656
+ failureFlash: true,
1657
+ }),
1658
+ error_catcher(async (req, res) => {
1659
+ const user = await User.findOne({ id: req.user.pending_user.id });
1660
+ user.relogin(req);
1661
+ Trigger.emitEvent("Login", null, user);
1662
+ res.redirect("/");
1663
+ })
1664
+ );
package/locales/en.json CHANGED
@@ -847,5 +847,19 @@
847
847
  "Row inclusion formula": "Row inclusion formula",
848
848
  "Only include rows where this formula is true": "Only include rows where this formula is true",
849
849
  "Slug": "Slug",
850
- "Field that can be used for a prettier URL structure": "Field that can be used for a prettier URL structure"
850
+ "Field that can be used for a prettier URL structure": "Field that can be used for a prettier URL structure",
851
+ "Setup two-factor authentication": "Setup two-factor authentication",
852
+ "Setup two-factor authentication with Time-based One-Time Password (TOTP)": "Setup two-factor authentication with Time-based One-Time Password (TOTP)",
853
+ "1. Scan this QR code in your Authenticator app": "1. Scan this QR code in your Authenticator app",
854
+ "2. Enter the six-digit code generated in your Authenticator app": "2. Enter the six-digit code generated in your Authenticator app",
855
+ "Code": "Code",
856
+ "Two-factor authentication with Time-based One-Time Password enabled": "Two-factor authentication with Time-based One-Time Password enabled",
857
+ "Two-factor authentication": "Two-factor authentication",
858
+ "Two-factor authentication is enabled": "Two-factor authentication is enabled",
859
+ "Two-factor authentication with Time-based One-Time Password disabled": "Two-factor authentication with Time-based One-Time Password disabled",
860
+ "Two-factor authentication is disabled": "Two-factor authentication is disabled",
861
+ "Auto save": "Auto save",
862
+ "Save any changes immediately": "Save any changes immediately",
863
+ "Transpose": "Transpose",
864
+ "Display one column per line": "Display one column per line"
851
865
  }
package/package.json CHANGED
@@ -1,17 +1,17 @@
1
1
  {
2
2
  "name": "@saltcorn/server",
3
- "version": "0.6.3-beta.1",
3
+ "version": "0.6.4-beta.1",
4
4
  "description": "Server app for Saltcorn, open-source no-code platform",
5
5
  "homepage": "https://saltcorn.com",
6
6
  "main": "index.js",
7
7
  "license": "MIT",
8
8
  "dependencies": {
9
- "@saltcorn/base-plugin": "0.6.3-beta.1",
10
- "@saltcorn/builder": "0.6.3-beta.1",
11
- "@saltcorn/data": "0.6.3-beta.1",
9
+ "@saltcorn/base-plugin": "0.6.4-beta.1",
10
+ "@saltcorn/builder": "0.6.4-beta.1",
11
+ "@saltcorn/data": "0.6.4-beta.1",
12
12
  "greenlock-express": "^4.0.3",
13
- "@saltcorn/markup": "0.6.3-beta.1",
14
- "@saltcorn/sbadmin2": "0.6.3-beta.1",
13
+ "@saltcorn/markup": "0.6.4-beta.1",
14
+ "@saltcorn/sbadmin2": "0.6.4-beta.1",
15
15
  "@socket.io/cluster-adapter": "^0.1.0",
16
16
  "@socket.io/sticky": "^1.0.1",
17
17
  "connect-flash": "^0.1.1",
@@ -34,13 +34,17 @@
34
34
  "moment": "^2.27.0",
35
35
  "node-fetch": "2.6.2",
36
36
  "node-watch": "^0.7.2",
37
+ "notp": "2.0.3",
37
38
  "passport": "^0.4.1",
38
39
  "passport-custom": "^1.1.1",
39
40
  "passport-http-bearer": "^1.0.1",
41
+ "passport-totp": "0.0.2",
40
42
  "pg": "^8.2.1",
41
43
  "pluralize": "^8.0.0",
44
+ "qrcode": "1.5.0",
42
45
  "socket.io": "4.2.0",
43
46
  "tmp-promise": "^3.0.2",
47
+ "thirty-two": "1.0.2",
44
48
  "multer-s3": "^2.10.0",
45
49
  "multer": "^1.4.3",
46
50
  "aws-sdk": "^2.1037.0",
@@ -179,7 +179,9 @@ DateField.prototype = new jsGrid.Field({
179
179
  setTimeout(function () {
180
180
  flatpickr(insertPicker, {
181
181
  enableTime: true,
182
- dateFormat: "Y-m-d H:i",
182
+ dateFormat: "Z",
183
+ altInput: true,
184
+ altFormat: "Y-m-d h:i K",
183
185
  });
184
186
  });
185
187
  return insertPicker;
@@ -192,7 +194,9 @@ DateField.prototype = new jsGrid.Field({
192
194
  setTimeout(function () {
193
195
  flatpickr(editPicker, {
194
196
  enableTime: true,
195
- dateFormat: "Y-m-d H:i",
197
+ dateFormat: "Z",
198
+ altInput: true,
199
+ altFormat: "Y-m-d h:i K",
196
200
  });
197
201
  });
198
202
  return editPicker;
@@ -30,7 +30,10 @@ function add_repeater(nm) {
30
30
  function apply_showif() {
31
31
  $("[data-show-if]").each(function (ix, element) {
32
32
  var e = $(element);
33
- var to_show = new Function("e", "return " + e.attr("data-show-if"));
33
+ var to_show = new Function(
34
+ "e",
35
+ "return " + decodeURIComponent(e.attr("data-show-if"))
36
+ );
34
37
  if (to_show(e))
35
38
  e.show()
36
39
  .find("input, textarea, button, select")
@@ -503,6 +506,7 @@ function ajax_modal(url, opts = {}) {
503
506
  if (title) $("#scmodal .modal-title").html(decodeURIComponent(title));
504
507
  $("#scmodal .modal-body").html(res);
505
508
  $("#scmodal").modal();
509
+ initialize_page();
506
510
  (opts.onOpen || function () {})(res);
507
511
  $("#scmodal").on("hidden.bs.modal", function (e) {
508
512
  (opts.onClose || function () {})(res);
@@ -510,6 +514,33 @@ function ajax_modal(url, opts = {}) {
510
514
  },
511
515
  });
512
516
  }
517
+
518
+ function saveAndContinue(e) {
519
+ var form = $(e).closest("form");
520
+ var url = form.attr("action");
521
+ var form_data = form.serialize();
522
+ $.ajax(url, {
523
+ type: "POST",
524
+ headers: {
525
+ "CSRF-Token": _sc_globalCsrf,
526
+ },
527
+ data: form_data,
528
+ success: function (res) {
529
+ if (res.id && form.find("input[name=id")) {
530
+ form.append(
531
+ `<input type="hidden" class="form-control " name="id" value="${res.id}">`
532
+ );
533
+ }
534
+ },
535
+ error: function (request) {
536
+ $("#page-inner-content").html(request.responseText);
537
+ initialize_page();
538
+ },
539
+ });
540
+
541
+ return false;
542
+ }
543
+
513
544
  function ajaxSubmitForm(e) {
514
545
  var form = $(e).closest("form");
515
546
  var url = form.attr("action");
@@ -574,7 +605,33 @@ function ajax_post_btn(e, reload_on_done, reload_delay) {
574
605
 
575
606
  return false;
576
607
  }
577
-
608
+ function make_unique_field(id, table_id, field_name, value) {
609
+ if (!value) return;
610
+ $.ajax(
611
+ `/api/${table_id}?approximate=true&${encodeURIComponent(
612
+ field_name
613
+ )}=${encodeURIComponent(value)}&fields=${encodeURIComponent(field_name)}`,
614
+ {
615
+ type: "GET",
616
+ success: function (res) {
617
+ if (res.success) {
618
+ const vals = res.success
619
+ .map((o) => o[field_name])
620
+ .filter((s) => s.startsWith(value));
621
+ if (vals.includes(value)) {
622
+ for (let i = 1; i < vals.length + 1; i++) {
623
+ const newname = `${value} ${i}`;
624
+ if (!vals.includes(newname)) {
625
+ $("#" + id).val(newname);
626
+ return;
627
+ }
628
+ }
629
+ }
630
+ }
631
+ },
632
+ }
633
+ );
634
+ }
578
635
  function test_formula(tablename, stored) {
579
636
  var formula = $("input[name=expression]").val();
580
637
  ajax_post(`/field/test-formula`, {
@@ -120,6 +120,9 @@ const listenForChanges = (projectDirs, pluginDirs) => {
120
120
  (event, file) => {
121
121
  console.log("'%s' changed \n re-starting now", file);
122
122
  closeWatchers();
123
+ spawnSync("npm", ["run", "tsc"], {
124
+ stdio: "inherit",
125
+ });
123
126
  process.exit();
124
127
  }
125
128
  )
package/routes/admin.js CHANGED
@@ -5,7 +5,12 @@
5
5
  */
6
6
  const Router = require("express-promise-router");
7
7
 
8
- const { isAdmin, error_catcher, getGitRevision } = require("./utils.js");
8
+ const {
9
+ isAdmin,
10
+ error_catcher,
11
+ getGitRevision,
12
+ setTenant,
13
+ } = require("./utils.js");
9
14
  const Table = require("@saltcorn/data/models/table");
10
15
  const Plugin = require("@saltcorn/data/models/plugin");
11
16
  const File = require("@saltcorn/data/models/file");
@@ -518,6 +523,7 @@ router.post(
518
523
  */
519
524
  router.post(
520
525
  "/restore",
526
+ setTenant, // TODO why is this needed?????
521
527
  isAdmin,
522
528
  error_catcher(async (req, res) => {
523
529
  const newPath = File.get_new_path();
@@ -769,6 +775,7 @@ router.post(
769
775
  for (const file of files) {
770
776
  await file.delete();
771
777
  }
778
+ if (db.reset_sequence) await db.reset_sequence("_sc_files");
772
779
  }
773
780
  if (form.values.plugins) {
774
781
  const ps = await Plugin.find();
package/routes/api.js CHANGED
@@ -28,6 +28,7 @@ const passport = require("passport");
28
28
  const {
29
29
  stateFieldsToWhere,
30
30
  readState,
31
+ strictParseInt,
31
32
  } = require("@saltcorn/data/plugin-helper");
32
33
 
33
34
  /**
@@ -65,11 +66,12 @@ const limitFields = (fields) => (r) => {
65
66
  * @returns {boolean}
66
67
  */
67
68
  function accessAllowedRead(req, user, table) {
68
- const role = req.isAuthenticated()
69
- ? req.user.role_id
70
- : user && user.role_id
71
- ? user.role_id
72
- : 10;
69
+ const role =
70
+ req.user && req.user.id
71
+ ? req.user.role_id
72
+ : user && user.role_id
73
+ ? user.role_id
74
+ : 10;
73
75
 
74
76
  return role <= table.min_role_read;
75
77
  }
@@ -82,11 +84,12 @@ function accessAllowedRead(req, user, table) {
82
84
  * @returns {boolean}
83
85
  */
84
86
  function accessAllowedWrite(req, user, table) {
85
- const role = req.isAuthenticated()
86
- ? req.user.role_id
87
- : user && user.role_id
88
- ? user.role_id
89
- : 10;
87
+ const role =
88
+ req.user && req.user.id
89
+ ? req.user.role_id
90
+ : user && user.role_id
91
+ ? user.role_id
92
+ : 10;
90
93
 
91
94
  return role <= table.min_role_write;
92
95
  }
@@ -98,11 +101,12 @@ function accessAllowedWrite(req, user, table) {
98
101
  * @returns {boolean}
99
102
  */
100
103
  function accessAllowed(req, user, trigger) {
101
- const role = req.isAuthenticated()
102
- ? req.user.role_id
103
- : user && user.role_id
104
- ? user.role_id
105
- : 10;
104
+ const role =
105
+ req.user && req.user.id
106
+ ? req.user.role_id
107
+ : user && user.role_id
108
+ ? user.role_id
109
+ : 10;
106
110
 
107
111
  return role <= trigger.min_role;
108
112
  }
@@ -118,9 +122,13 @@ router.get(
118
122
  "/:tableName/",
119
123
  //passport.authenticate("api-bearer", { session: false }),
120
124
  error_catcher(async (req, res, next) => {
121
- const { tableName } = req.params;
122
- const { fields, versioncount, ...req_query } = req.query;
123
- const table = await Table.findOne({ name: tableName });
125
+ let { tableName } = req.params;
126
+ const { fields, versioncount, approximate, ...req_query } = req.query;
127
+ const table = await Table.findOne(
128
+ strictParseInt(tableName)
129
+ ? { id: strictParseInt(tableName) }
130
+ : { name: tableName }
131
+ );
124
132
  if (!table) {
125
133
  res.status(404).json({ error: req.__("Not found") });
126
134
  return;
@@ -149,8 +157,8 @@ router.get(
149
157
  const tbl_fields = await table.getFields();
150
158
  const qstate = await stateFieldsToWhere({
151
159
  fields: tbl_fields,
152
- approximate: false,
153
- state: req.query,
160
+ approximate: !!approximate,
161
+ state: req_query,
154
162
  });
155
163
  rows = await table.getRows(qstate);
156
164
  } else {
package/routes/delete.js CHANGED
@@ -33,7 +33,7 @@ router.post(
33
33
  const { name, id } = req.params;
34
34
  const { redirect } = req.query;
35
35
  const table = await Table.findOne({ name });
36
- const role = req.isAuthenticated() ? req.user.role_id : 10;
36
+ const role = req.user && req.user.id ? req.user.role_id : 10;
37
37
  try {
38
38
  if (role <= table.min_role_write) await table.deleteRows({ id });
39
39
  else if (table.ownership_field_id && req.user) {
package/routes/edit.js CHANGED
@@ -37,7 +37,7 @@ router.post(
37
37
  const { name, id, field_name } = req.params;
38
38
  const { redirect } = req.query;
39
39
  const table = await Table.findOne({ name });
40
- const role = req.isAuthenticated() ? req.user.role_id : 10;
40
+ const role = req.user && req.user.id ? req.user.role_id : 10;
41
41
  if (role <= table.min_role_write) await table.toggleBool(+id, field_name);
42
42
  else
43
43
  req.flash(
package/routes/fields.js CHANGED
@@ -26,6 +26,7 @@ const { isAdmin, error_catcher } = require("./utils.js");
26
26
  const expressionBlurb = require("../markup/expression_blurb");
27
27
  const { readState } = require("@saltcorn/data/plugin-helper");
28
28
  const { wizardCardTitle } = require("../markup/forms.js");
29
+ const FieldRepeat = require("@saltcorn/data/models/fieldrepeat");
29
30
 
30
31
  /**
31
32
  * @type {object}
@@ -161,8 +162,9 @@ const translateAttributes = (attrs, req) =>
161
162
  * @returns {object}
162
163
  */
163
164
  const translateAttribute = (attr, req) => {
164
- const res = { ...attr };
165
+ let res = { ...attr };
165
166
  if (res.sublabel) res.sublabel = req.__(res.sublabel);
167
+ if (res.isRepeat) res = new FieldRepeat(res);
166
168
  return res;
167
169
  };
168
170
 
@@ -660,7 +662,15 @@ router.post(
660
662
  if (fieldName.includes(".")) {
661
663
  const [refNm, targetNm] = fieldName.split(".");
662
664
  const ref = fields.find((f) => f.name === refNm);
665
+ if (!ref) {
666
+ res.send("");
667
+ return;
668
+ }
663
669
  const reftable = await Table.findOne({ name: ref.reftable_name });
670
+ if (!reftable) {
671
+ res.send("");
672
+ return;
673
+ }
664
674
  const reffields = await reftable.getFields();
665
675
  field = reffields.find((f) => f.name === targetNm);
666
676
  row = await reftable.getRow({});
package/routes/files.js CHANGED
@@ -17,7 +17,7 @@ const {
17
17
  post_btn,
18
18
  post_delete_btn,
19
19
  } = require("@saltcorn/markup");
20
- const { isAdmin, error_catcher } = require("./utils.js");
20
+ const { isAdmin, error_catcher, setTenant } = require("./utils.js");
21
21
  const {
22
22
  span,
23
23
  h5,
@@ -136,7 +136,7 @@ router.get(
136
136
  router.get(
137
137
  "/download/:id",
138
138
  error_catcher(async (req, res) => {
139
- const role = req.isAuthenticated() ? req.user.role_id : 10;
139
+ const role = req.user && req.user.id ? req.user.role_id : 10;
140
140
  const user_id = req.user && req.user.id;
141
141
  const { id } = req.params;
142
142
  const file = await File.findOne({ id });
@@ -160,7 +160,7 @@ router.get(
160
160
  router.get(
161
161
  "/serve/:id",
162
162
  error_catcher(async (req, res) => {
163
- const role = req.isAuthenticated() ? req.user.role_id : 10;
163
+ const role = req.user && req.user.id ? req.user.role_id : 10;
164
164
  const user_id = req.user && req.user.id;
165
165
  const { id } = req.params;
166
166
  let file;
@@ -240,10 +240,11 @@ router.post(
240
240
  */
241
241
  router.post(
242
242
  "/upload",
243
+ setTenant, // TODO why is this needed?????
243
244
  error_catcher(async (req, res) => {
244
245
  let jsonResp = {};
245
246
  const min_role_upload = getState().getConfig("min_role_upload", 1);
246
- const role = req.isAuthenticated() ? req.user.role_id : 10;
247
+ const role = req.user && req.user.id ? req.user.role_id : 10;
247
248
  if (role > +min_role_upload) {
248
249
  if (!req.xhr) req.flash("warning", req.__("Not authorized"));
249
250
  else jsonResp = { error: "Not authorized" };
@@ -398,7 +398,7 @@ const welcome_page = async (req) => {
398
398
  * @returns {Promise<void>}
399
399
  */
400
400
  const no_views_logged_in = async (req, res) => {
401
- const role = req.isAuthenticated() ? req.user.role_id : 10;
401
+ const role = req.user && req.user.id ? req.user.role_id : 10;
402
402
  if (role > 1 || req.user.tenant !== db.getTenantSchema())
403
403
  res.sendWrap(req.__("Hello"), req.__("Welcome to Saltcorn!"));
404
404
  else {
@@ -463,7 +463,7 @@ module.exports =
463
463
  * @returns {Promise<void>}
464
464
  */
465
465
  async (req, res) => {
466
- const isAuth = req.isAuthenticated();
466
+ const isAuth = req.user && req.user.id;
467
467
  const role_id = req.user ? req.user.role_id : 10;
468
468
  const cfgResp = await get_config_response(role_id, res, req);
469
469
  if (cfgResp) return;
package/routes/list.js CHANGED
@@ -155,6 +155,10 @@ const typeToJsGridType = (t, field) => {
155
155
  jsgField.editing = false;
156
156
  jsgField.inserting = false;
157
157
  }
158
+ if (field.primary_key) {
159
+ jsgField.inserting = false;
160
+ jsgField.editing = false;
161
+ }
158
162
  return jsgField;
159
163
  };
160
164
 
package/routes/page.js CHANGED
@@ -37,7 +37,7 @@ router.get(
37
37
  error_catcher(async (req, res) => {
38
38
  const { pagename } = req.params;
39
39
 
40
- const role = req.isAuthenticated() ? req.user.role_id : 10;
40
+ const role = req.user && req.user.id ? req.user.role_id : 10;
41
41
  const db_page = await Page.findOne({ name: pagename });
42
42
  if (db_page && role <= db_page.min_role) {
43
43
  const contents = await db_page.run(req.query, { res, req });
@@ -73,7 +73,7 @@ router.post(
73
73
  "/:pagename/action/:rndid",
74
74
  error_catcher(async (req, res) => {
75
75
  const { pagename, rndid } = req.params;
76
- const role = req.isAuthenticated() ? req.user.role_id : 10;
76
+ const role = req.user && req.user.id ? req.user.role_id : 10;
77
77
  const db_page = await Page.findOne({ name: pagename });
78
78
  if (db_page && role <= db_page.min_role) {
79
79
  let col;
@@ -157,9 +157,12 @@ const pageBuilderData = async (req, context) => {
157
157
  const images = await File.find({ mime_super: "image" });
158
158
  const roles = await User.get_roles();
159
159
  const stateActions = getState().actions;
160
- const actions = Object.entries(stateActions)
161
- .filter(([k, v]) => !v.requireRow && !v.disableInBuilder)
162
- .map(([k, v]) => k);
160
+ const actions = [
161
+ "GoBack",
162
+ ...Object.entries(stateActions)
163
+ .filter(([k, v]) => !v.requireRow && !v.disableInBuilder)
164
+ .map(([k, v]) => k),
165
+ ];
163
166
  const triggers = await Trigger.find({
164
167
  when_trigger: { or: ["API call", "Never"] },
165
168
  });
package/routes/scapi.js CHANGED
@@ -44,11 +44,12 @@ module.exports = router;
44
44
  * @returns {boolean}
45
45
  */
46
46
  function accessAllowedRead(req, user) {
47
- const role = req.isAuthenticated()
48
- ? req.user.role_id
49
- : user && user.role_id
50
- ? user.role_id
51
- : 10;
47
+ const role =
48
+ req.user && req.user.id
49
+ ? req.user.role_id
50
+ : user && user.role_id
51
+ ? user.role_id
52
+ : 10;
52
53
 
53
54
  if (role === 1) return true;
54
55
  return false;
package/routes/tables.js CHANGED
@@ -22,7 +22,7 @@ const {
22
22
  post_dropdown_item,
23
23
  } = require("@saltcorn/markup");
24
24
  const { recalculate_for_stored } = require("@saltcorn/data/models/expression");
25
- const { isAdmin, error_catcher } = require("./utils.js");
25
+ const { isAdmin, error_catcher, setTenant } = require("./utils.js");
26
26
  const Form = require("@saltcorn/data/models/form");
27
27
  const {
28
28
  span,
@@ -352,6 +352,7 @@ router.get(
352
352
  */
353
353
  router.post(
354
354
  "/create-from-csv",
355
+ setTenant, // TODO why is this needed?????
355
356
  isAdmin,
356
357
  error_catcher(async (req, res) => {
357
358
  if (req.body.name && req.files && req.files.file) {
@@ -1367,6 +1368,7 @@ router.post(
1367
1368
  */
1368
1369
  router.post(
1369
1370
  "/upload_to_table/:name",
1371
+ setTenant, // TODO why is this needed?????
1370
1372
  isAdmin,
1371
1373
  error_catcher(async (req, res) => {
1372
1374
  const { name } = req.params;
package/routes/utils.js CHANGED
@@ -49,7 +49,13 @@ function isAdmin(req, res, next) {
49
49
  next();
50
50
  } else {
51
51
  req.flash("danger", req.__("Must be admin"));
52
- res.redirect(req.user ? "/" : "/auth/login");
52
+ res.redirect(
53
+ req.user && req.user.pending_user
54
+ ? "/auth/twofa/login/totp"
55
+ : req.user
56
+ ? "/"
57
+ : "/auth/login"
58
+ );
53
59
  }
54
60
  }
55
61
 
package/routes/view.js CHANGED
@@ -16,6 +16,7 @@ const {
16
16
  isAdmin,
17
17
  error_catcher,
18
18
  scan_for_page_title,
19
+ setTenant,
19
20
  } = require("../routes/utils.js");
20
21
  const { add_edit_bar } = require("../markup/admin.js");
21
22
  const { InvalidConfiguration } = require("@saltcorn/data/utils");
@@ -42,8 +43,7 @@ router.get(
42
43
  const { viewname } = req.params;
43
44
  const query = { ...req.query };
44
45
  const view = await View.findOne({ name: viewname });
45
- const role = req.isAuthenticated() ? req.user.role_id : 10;
46
-
46
+ const role = req.user && req.user.id ? req.user.role_id : 10;
47
47
  if (!view) {
48
48
  req.flash("danger", req.__(`No such view: %s`, text(viewname)));
49
49
  res.redirect("/");
@@ -122,7 +122,7 @@ router.post(
122
122
  "/:viewname/:route",
123
123
  error_catcher(async (req, res) => {
124
124
  const { viewname, route } = req.params;
125
- const role = req.isAuthenticated() ? req.user.role_id : 10;
125
+ const role = req.user && req.user.id ? req.user.role_id : 10;
126
126
 
127
127
  const view = await View.findOne({ name: viewname });
128
128
  if (!view) {
@@ -145,9 +145,10 @@ router.post(
145
145
  */
146
146
  router.post(
147
147
  ["/:viewname", "/:viewname/*"],
148
+ setTenant,
148
149
  error_catcher(async (req, res) => {
149
150
  const { viewname } = req.params;
150
- const role = req.isAuthenticated() ? req.user.role_id : 10;
151
+ const role = req.user && req.user.id ? req.user.role_id : 10;
151
152
  const query = { ...req.query };
152
153
 
153
154
  const view = await View.findOne({ name: viewname });
package/serve.js CHANGED
@@ -163,9 +163,6 @@ module.exports =
163
163
  ...appargs
164
164
  } = {}) => {
165
165
  if (dev && cluster.isMaster) {
166
- spawnSync("npm", ["run", "tsc"], {
167
- stdio: "inherit",
168
- });
169
166
  listenForChanges(getRelevantPackages(), await getPluginDirectories());
170
167
  }
171
168
  const useNCpus = process.env.SALTCORN_NWORKERS
package/wrapper.js CHANGED
@@ -45,7 +45,7 @@ const get_extra_menu = (role, state, req) => {
45
45
  };
46
46
 
47
47
  const get_menu = (req) => {
48
- const isAuth = req.isAuthenticated();
48
+ const isAuth = req.user && req.user.id;
49
49
  const state = getState();
50
50
  const role = (req.user || {}).role_id || 10;
51
51