@strapi/plugin-users-permissions 0.0.0-4fc90398602f
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +22 -0
- package/README.md +1 -0
- package/admin/src/components/BoundRoute/getMethodColor.js +41 -0
- package/admin/src/components/BoundRoute/index.js +72 -0
- package/admin/src/components/FormModal/Input/index.js +121 -0
- package/admin/src/components/FormModal/index.js +121 -0
- package/admin/src/components/Permissions/PermissionRow/CheckboxWrapper.js +30 -0
- package/admin/src/components/Permissions/PermissionRow/SubCategory.js +114 -0
- package/admin/src/components/Permissions/PermissionRow/index.js +53 -0
- package/admin/src/components/Permissions/index.js +56 -0
- package/admin/src/components/Permissions/init.js +9 -0
- package/admin/src/components/Permissions/reducer.js +27 -0
- package/admin/src/components/Policies/index.js +60 -0
- package/admin/src/components/UsersPermissions/index.js +94 -0
- package/admin/src/components/UsersPermissions/init.js +10 -0
- package/admin/src/components/UsersPermissions/reducer.js +60 -0
- package/admin/src/contexts/UsersPermissionsContext/index.js +17 -0
- package/admin/src/hooks/index.js +5 -0
- package/admin/src/hooks/useFetchRole/index.js +64 -0
- package/admin/src/hooks/useFetchRole/reducer.js +31 -0
- package/admin/src/hooks/useForm/index.js +70 -0
- package/admin/src/hooks/useForm/reducer.js +40 -0
- package/admin/src/hooks/usePlugins/index.js +65 -0
- package/admin/src/hooks/usePlugins/init.js +5 -0
- package/admin/src/hooks/usePlugins/reducer.js +34 -0
- package/admin/src/hooks/useRolesList/index.js +63 -0
- package/admin/src/hooks/useRolesList/init.js +5 -0
- package/admin/src/hooks/useRolesList/reducer.js +31 -0
- package/admin/src/index.js +123 -0
- package/admin/src/pages/AdvancedSettings/index.js +238 -0
- package/admin/src/pages/AdvancedSettings/utils/api.js +13 -0
- package/admin/src/pages/AdvancedSettings/utils/layout.js +96 -0
- package/admin/src/pages/AdvancedSettings/utils/schema.js +19 -0
- package/admin/src/pages/EmailTemplates/components/EmailForm.js +173 -0
- package/admin/src/pages/EmailTemplates/components/EmailTable.js +121 -0
- package/admin/src/pages/EmailTemplates/index.js +162 -0
- package/admin/src/pages/EmailTemplates/utils/api.js +13 -0
- package/admin/src/pages/EmailTemplates/utils/schema.js +22 -0
- package/admin/src/pages/Providers/index.js +274 -0
- package/admin/src/pages/Providers/reducer.js +54 -0
- package/admin/src/pages/Providers/utils/api.js +21 -0
- package/admin/src/pages/Providers/utils/createProvidersArray.js +21 -0
- package/admin/src/pages/Providers/utils/forms.js +244 -0
- package/admin/src/pages/Roles/CreatePage/index.js +177 -0
- package/admin/src/pages/Roles/CreatePage/utils/schema.js +9 -0
- package/admin/src/pages/Roles/EditPage/index.js +190 -0
- package/admin/src/pages/Roles/EditPage/utils/schema.js +9 -0
- package/admin/src/pages/Roles/ListPage/components/TableBody.js +96 -0
- package/admin/src/pages/Roles/ListPage/index.js +216 -0
- package/admin/src/pages/Roles/ListPage/utils/api.js +28 -0
- package/admin/src/pages/Roles/ProtectedCreatePage/index.js +12 -0
- package/admin/src/pages/Roles/ProtectedEditPage/index.js +12 -0
- package/admin/src/pages/Roles/ProtectedListPage/index.js +15 -0
- package/admin/src/pages/Roles/index.js +27 -0
- package/admin/src/permissions.js +31 -0
- package/admin/src/pluginId.js +5 -0
- package/admin/src/translations/ar.json +40 -0
- package/admin/src/translations/cs.json +46 -0
- package/admin/src/translations/de.json +58 -0
- package/admin/src/translations/dk.json +83 -0
- package/admin/src/translations/en.json +83 -0
- package/admin/src/translations/es.json +83 -0
- package/admin/src/translations/fr.json +46 -0
- package/admin/src/translations/id.json +58 -0
- package/admin/src/translations/it.json +58 -0
- package/admin/src/translations/ja.json +44 -0
- package/admin/src/translations/ko.json +83 -0
- package/admin/src/translations/ms.json +45 -0
- package/admin/src/translations/nl.json +44 -0
- package/admin/src/translations/pl.json +83 -0
- package/admin/src/translations/pt-BR.json +40 -0
- package/admin/src/translations/pt.json +44 -0
- package/admin/src/translations/ru.json +58 -0
- package/admin/src/translations/sk.json +46 -0
- package/admin/src/translations/sv.json +58 -0
- package/admin/src/translations/th.json +56 -0
- package/admin/src/translations/tr.json +44 -0
- package/admin/src/translations/uk.json +45 -0
- package/admin/src/translations/vi.json +46 -0
- package/admin/src/translations/zh-Hans.json +62 -0
- package/admin/src/translations/zh.json +44 -0
- package/admin/src/utils/axiosInstance.js +36 -0
- package/admin/src/utils/cleanPermissions.js +25 -0
- package/admin/src/utils/formatPluginName.js +26 -0
- package/admin/src/utils/formatPolicies.js +8 -0
- package/admin/src/utils/getRequestURL.js +5 -0
- package/admin/src/utils/getTrad.js +5 -0
- package/admin/src/utils/index.js +5 -0
- package/documentation/content-api.yaml +848 -0
- package/jest.config.front.js +10 -0
- package/package.json +60 -0
- package/server/bootstrap/grant-config.js +123 -0
- package/server/bootstrap/index.js +133 -0
- package/server/bootstrap/users-permissions-actions.js +80 -0
- package/server/config.js +23 -0
- package/server/content-types/index.js +11 -0
- package/server/content-types/permission/index.js +34 -0
- package/server/content-types/role/index.js +51 -0
- package/server/content-types/user/index.js +72 -0
- package/server/content-types/user/schema-config.js +15 -0
- package/server/controllers/auth.js +398 -0
- package/server/controllers/content-manager-user.js +175 -0
- package/server/controllers/index.js +17 -0
- package/server/controllers/permissions.js +26 -0
- package/server/controllers/role.js +77 -0
- package/server/controllers/settings.js +85 -0
- package/server/controllers/user.js +198 -0
- package/server/controllers/validation/auth.js +57 -0
- package/server/controllers/validation/email-template.js +50 -0
- package/server/controllers/validation/user.js +26 -0
- package/server/graphql/index.js +44 -0
- package/server/graphql/mutations/auth/change-password.js +38 -0
- package/server/graphql/mutations/auth/email-confirmation.js +39 -0
- package/server/graphql/mutations/auth/forgot-password.js +35 -0
- package/server/graphql/mutations/auth/login.js +35 -0
- package/server/graphql/mutations/auth/register.js +36 -0
- package/server/graphql/mutations/auth/reset-password.js +38 -0
- package/server/graphql/mutations/crud/role/create-role.js +34 -0
- package/server/graphql/mutations/crud/role/delete-role.js +25 -0
- package/server/graphql/mutations/crud/role/update-role.js +35 -0
- package/server/graphql/mutations/crud/user/create-user.js +45 -0
- package/server/graphql/mutations/crud/user/delete-user.js +39 -0
- package/server/graphql/mutations/crud/user/update-user.js +46 -0
- package/server/graphql/mutations/index.js +43 -0
- package/server/graphql/queries/index.js +13 -0
- package/server/graphql/queries/me.js +17 -0
- package/server/graphql/resolvers-configs.js +42 -0
- package/server/graphql/types/create-role-payload.js +11 -0
- package/server/graphql/types/delete-role-payload.js +11 -0
- package/server/graphql/types/index.js +21 -0
- package/server/graphql/types/login-input.js +13 -0
- package/server/graphql/types/login-payload.js +12 -0
- package/server/graphql/types/me-role.js +14 -0
- package/server/graphql/types/me.js +16 -0
- package/server/graphql/types/password-payload.js +11 -0
- package/server/graphql/types/register-input.js +13 -0
- package/server/graphql/types/update-role-payload.js +11 -0
- package/server/graphql/utils.js +27 -0
- package/server/index.js +21 -0
- package/server/middlewares/index.js +7 -0
- package/server/middlewares/rateLimit.js +27 -0
- package/server/register.js +23 -0
- package/server/routes/admin/index.js +10 -0
- package/server/routes/admin/permissions.js +20 -0
- package/server/routes/admin/role.js +79 -0
- package/server/routes/admin/settings.js +95 -0
- package/server/routes/content-api/auth.js +82 -0
- package/server/routes/content-api/index.js +11 -0
- package/server/routes/content-api/permissions.js +9 -0
- package/server/routes/content-api/role.js +29 -0
- package/server/routes/content-api/user.js +60 -0
- package/server/routes/index.js +6 -0
- package/server/services/index.js +17 -0
- package/server/services/jwt.js +55 -0
- package/server/services/providers-registry.js +292 -0
- package/server/services/providers.js +115 -0
- package/server/services/role.js +177 -0
- package/server/services/user.js +140 -0
- package/server/services/users-permissions.js +236 -0
- package/server/strategies/users-permissions.js +102 -0
- package/server/utils/index.d.ts +16 -0
- package/server/utils/index.js +12 -0
- package/server/utils/sanitize/index.js +9 -0
- package/server/utils/sanitize/sanitizers.js +19 -0
- package/server/utils/sanitize/visitors/index.js +5 -0
- package/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js +11 -0
- package/strapi-admin.js +3 -0
- package/strapi-server.js +3 -0
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const { toPlainObject } = require('lodash/fp');
|
|
4
|
+
|
|
5
|
+
const usersPermissionsRoleUID = 'plugin::users-permissions.role';
|
|
6
|
+
|
|
7
|
+
module.exports = ({ nexus, strapi }) => {
|
|
8
|
+
const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;
|
|
9
|
+
const { nonNull } = nexus;
|
|
10
|
+
|
|
11
|
+
const roleContentType = strapi.getModel(usersPermissionsRoleUID);
|
|
12
|
+
|
|
13
|
+
const roleInputName = getContentTypeInputName(roleContentType);
|
|
14
|
+
|
|
15
|
+
return {
|
|
16
|
+
type: 'UsersPermissionsCreateRolePayload',
|
|
17
|
+
|
|
18
|
+
args: {
|
|
19
|
+
data: nonNull(roleInputName),
|
|
20
|
+
},
|
|
21
|
+
|
|
22
|
+
description: 'Create a new role',
|
|
23
|
+
|
|
24
|
+
async resolve(parent, args, context) {
|
|
25
|
+
const { koaContext } = context;
|
|
26
|
+
|
|
27
|
+
koaContext.request.body = toPlainObject(args.data);
|
|
28
|
+
|
|
29
|
+
await strapi.plugin('users-permissions').controller('role').createRole(koaContext);
|
|
30
|
+
|
|
31
|
+
return { ok: true };
|
|
32
|
+
},
|
|
33
|
+
};
|
|
34
|
+
};
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = ({ nexus, strapi }) => {
|
|
4
|
+
const { nonNull } = nexus;
|
|
5
|
+
|
|
6
|
+
return {
|
|
7
|
+
type: 'UsersPermissionsDeleteRolePayload',
|
|
8
|
+
|
|
9
|
+
args: {
|
|
10
|
+
id: nonNull('ID'),
|
|
11
|
+
},
|
|
12
|
+
|
|
13
|
+
description: 'Delete an existing role',
|
|
14
|
+
|
|
15
|
+
async resolve(parent, args, context) {
|
|
16
|
+
const { koaContext } = context;
|
|
17
|
+
|
|
18
|
+
koaContext.params = { role: args.id };
|
|
19
|
+
|
|
20
|
+
await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);
|
|
21
|
+
|
|
22
|
+
return { ok: true };
|
|
23
|
+
},
|
|
24
|
+
};
|
|
25
|
+
};
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const usersPermissionsRoleUID = 'plugin::users-permissions.role';
|
|
4
|
+
|
|
5
|
+
module.exports = ({ nexus, strapi }) => {
|
|
6
|
+
const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;
|
|
7
|
+
const { nonNull } = nexus;
|
|
8
|
+
|
|
9
|
+
const roleContentType = strapi.getModel(usersPermissionsRoleUID);
|
|
10
|
+
|
|
11
|
+
const roleInputName = getContentTypeInputName(roleContentType);
|
|
12
|
+
|
|
13
|
+
return {
|
|
14
|
+
type: 'UsersPermissionsUpdateRolePayload',
|
|
15
|
+
|
|
16
|
+
args: {
|
|
17
|
+
id: nonNull('ID'),
|
|
18
|
+
data: nonNull(roleInputName),
|
|
19
|
+
},
|
|
20
|
+
|
|
21
|
+
description: 'Update an existing role',
|
|
22
|
+
|
|
23
|
+
async resolve(parent, args, context) {
|
|
24
|
+
const { koaContext } = context;
|
|
25
|
+
|
|
26
|
+
koaContext.params = { role: args.id };
|
|
27
|
+
koaContext.request.body = args.data;
|
|
28
|
+
koaContext.request.body.role = args.id;
|
|
29
|
+
|
|
30
|
+
await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);
|
|
31
|
+
|
|
32
|
+
return { ok: true };
|
|
33
|
+
},
|
|
34
|
+
};
|
|
35
|
+
};
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const { toPlainObject } = require('lodash/fp');
|
|
4
|
+
|
|
5
|
+
const { checkBadRequest } = require('../../../utils');
|
|
6
|
+
|
|
7
|
+
const usersPermissionsUserUID = 'plugin::users-permissions.user';
|
|
8
|
+
|
|
9
|
+
module.exports = ({ nexus, strapi }) => {
|
|
10
|
+
const { nonNull } = nexus;
|
|
11
|
+
const { getContentTypeInputName, getEntityResponseName } = strapi
|
|
12
|
+
.plugin('graphql')
|
|
13
|
+
.service('utils').naming;
|
|
14
|
+
|
|
15
|
+
const userContentType = strapi.getModel(usersPermissionsUserUID);
|
|
16
|
+
|
|
17
|
+
const userInputName = getContentTypeInputName(userContentType);
|
|
18
|
+
const responseName = getEntityResponseName(userContentType);
|
|
19
|
+
|
|
20
|
+
return {
|
|
21
|
+
type: nonNull(responseName),
|
|
22
|
+
|
|
23
|
+
args: {
|
|
24
|
+
data: nonNull(userInputName),
|
|
25
|
+
},
|
|
26
|
+
|
|
27
|
+
description: 'Create a new user',
|
|
28
|
+
|
|
29
|
+
async resolve(parent, args, context) {
|
|
30
|
+
const { koaContext } = context;
|
|
31
|
+
|
|
32
|
+
koaContext.params = {};
|
|
33
|
+
koaContext.request.body = toPlainObject(args.data);
|
|
34
|
+
|
|
35
|
+
await strapi.plugin('users-permissions').controller('user').create(koaContext);
|
|
36
|
+
|
|
37
|
+
checkBadRequest(koaContext.body);
|
|
38
|
+
|
|
39
|
+
return {
|
|
40
|
+
value: koaContext.body,
|
|
41
|
+
info: { args, resourceUID: 'plugin::users-permissions.user' },
|
|
42
|
+
};
|
|
43
|
+
},
|
|
44
|
+
};
|
|
45
|
+
};
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const { checkBadRequest } = require('../../../utils');
|
|
4
|
+
|
|
5
|
+
const usersPermissionsUserUID = 'plugin::users-permissions.user';
|
|
6
|
+
|
|
7
|
+
module.exports = ({ nexus, strapi }) => {
|
|
8
|
+
const { nonNull } = nexus;
|
|
9
|
+
const { getEntityResponseName } = strapi.plugin('graphql').service('utils').naming;
|
|
10
|
+
|
|
11
|
+
const userContentType = strapi.getModel(usersPermissionsUserUID);
|
|
12
|
+
|
|
13
|
+
const responseName = getEntityResponseName(userContentType);
|
|
14
|
+
|
|
15
|
+
return {
|
|
16
|
+
type: nonNull(responseName),
|
|
17
|
+
|
|
18
|
+
args: {
|
|
19
|
+
id: nonNull('ID'),
|
|
20
|
+
},
|
|
21
|
+
|
|
22
|
+
description: 'Delete an existing user',
|
|
23
|
+
|
|
24
|
+
async resolve(parent, args, context) {
|
|
25
|
+
const { koaContext } = context;
|
|
26
|
+
|
|
27
|
+
koaContext.params = { id: args.id };
|
|
28
|
+
|
|
29
|
+
await strapi.plugin('users-permissions').controller('user').destroy(koaContext);
|
|
30
|
+
|
|
31
|
+
checkBadRequest(koaContext.body);
|
|
32
|
+
|
|
33
|
+
return {
|
|
34
|
+
value: koaContext.body,
|
|
35
|
+
info: { args, resourceUID: 'plugin::users-permissions.user' },
|
|
36
|
+
};
|
|
37
|
+
},
|
|
38
|
+
};
|
|
39
|
+
};
|
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const { toPlainObject } = require('lodash/fp');
|
|
4
|
+
|
|
5
|
+
const { checkBadRequest } = require('../../../utils');
|
|
6
|
+
|
|
7
|
+
const usersPermissionsUserUID = 'plugin::users-permissions.user';
|
|
8
|
+
|
|
9
|
+
module.exports = ({ nexus, strapi }) => {
|
|
10
|
+
const { nonNull } = nexus;
|
|
11
|
+
const { getContentTypeInputName, getEntityResponseName } = strapi
|
|
12
|
+
.plugin('graphql')
|
|
13
|
+
.service('utils').naming;
|
|
14
|
+
|
|
15
|
+
const userContentType = strapi.getModel(usersPermissionsUserUID);
|
|
16
|
+
|
|
17
|
+
const userInputName = getContentTypeInputName(userContentType);
|
|
18
|
+
const responseName = getEntityResponseName(userContentType);
|
|
19
|
+
|
|
20
|
+
return {
|
|
21
|
+
type: nonNull(responseName),
|
|
22
|
+
|
|
23
|
+
args: {
|
|
24
|
+
id: nonNull('ID'),
|
|
25
|
+
data: nonNull(userInputName),
|
|
26
|
+
},
|
|
27
|
+
|
|
28
|
+
description: 'Update an existing user',
|
|
29
|
+
|
|
30
|
+
async resolve(parent, args, context) {
|
|
31
|
+
const { koaContext } = context;
|
|
32
|
+
|
|
33
|
+
koaContext.params = { id: args.id };
|
|
34
|
+
koaContext.request.body = toPlainObject(args.data);
|
|
35
|
+
|
|
36
|
+
await strapi.plugin('users-permissions').controller('user').update(koaContext);
|
|
37
|
+
|
|
38
|
+
checkBadRequest(koaContext.body);
|
|
39
|
+
|
|
40
|
+
return {
|
|
41
|
+
value: koaContext.body,
|
|
42
|
+
info: { args, resourceUID: 'plugin::users-permissions.user' },
|
|
43
|
+
};
|
|
44
|
+
},
|
|
45
|
+
};
|
|
46
|
+
};
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const userUID = 'plugin::users-permissions.user';
|
|
4
|
+
const roleUID = 'plugin::users-permissions.role';
|
|
5
|
+
|
|
6
|
+
module.exports = (context) => {
|
|
7
|
+
const { nexus, strapi } = context;
|
|
8
|
+
|
|
9
|
+
const { naming } = strapi.plugin('graphql').service('utils');
|
|
10
|
+
|
|
11
|
+
const user = strapi.getModel(userUID);
|
|
12
|
+
const role = strapi.getModel(roleUID);
|
|
13
|
+
|
|
14
|
+
const mutations = {
|
|
15
|
+
// CRUD (user & role)
|
|
16
|
+
[naming.getCreateMutationTypeName(role)]: require('./crud/role/create-role'),
|
|
17
|
+
[naming.getUpdateMutationTypeName(role)]: require('./crud/role/update-role'),
|
|
18
|
+
[naming.getDeleteMutationTypeName(role)]: require('./crud/role/delete-role'),
|
|
19
|
+
[naming.getCreateMutationTypeName(user)]: require('./crud/user/create-user'),
|
|
20
|
+
[naming.getUpdateMutationTypeName(user)]: require('./crud/user/update-user'),
|
|
21
|
+
[naming.getDeleteMutationTypeName(user)]: require('./crud/user/delete-user'),
|
|
22
|
+
|
|
23
|
+
// Other mutations
|
|
24
|
+
login: require('./auth/login'),
|
|
25
|
+
register: require('./auth/register'),
|
|
26
|
+
forgotPassword: require('./auth/forgot-password'),
|
|
27
|
+
resetPassword: require('./auth/reset-password'),
|
|
28
|
+
changePassword: require('./auth/change-password'),
|
|
29
|
+
emailConfirmation: require('./auth/email-confirmation'),
|
|
30
|
+
};
|
|
31
|
+
|
|
32
|
+
return nexus.extendType({
|
|
33
|
+
type: 'Mutation',
|
|
34
|
+
|
|
35
|
+
definition(t) {
|
|
36
|
+
for (const [name, getConfig] of Object.entries(mutations)) {
|
|
37
|
+
const config = getConfig(context);
|
|
38
|
+
|
|
39
|
+
t.field(name, config);
|
|
40
|
+
}
|
|
41
|
+
},
|
|
42
|
+
});
|
|
43
|
+
};
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = () => ({
|
|
4
|
+
type: 'UsersPermissionsMe',
|
|
5
|
+
|
|
6
|
+
args: {},
|
|
7
|
+
|
|
8
|
+
resolve(parent, args, context) {
|
|
9
|
+
const { user } = context.state;
|
|
10
|
+
|
|
11
|
+
if (!user) {
|
|
12
|
+
throw new Error('Authentication requested');
|
|
13
|
+
}
|
|
14
|
+
|
|
15
|
+
return user;
|
|
16
|
+
},
|
|
17
|
+
});
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const userUID = 'plugin::users-permissions.user';
|
|
4
|
+
const roleUID = 'plugin::users-permissions.role';
|
|
5
|
+
|
|
6
|
+
module.exports = ({ strapi }) => {
|
|
7
|
+
const { naming } = strapi.plugin('graphql').service('utils');
|
|
8
|
+
|
|
9
|
+
const user = strapi.getModel(userUID);
|
|
10
|
+
const role = strapi.getModel(roleUID);
|
|
11
|
+
|
|
12
|
+
const createRole = naming.getCreateMutationTypeName(role);
|
|
13
|
+
const updateRole = naming.getUpdateMutationTypeName(role);
|
|
14
|
+
const deleteRole = naming.getDeleteMutationTypeName(role);
|
|
15
|
+
const createUser = naming.getCreateMutationTypeName(user);
|
|
16
|
+
const updateUser = naming.getUpdateMutationTypeName(user);
|
|
17
|
+
const deleteUser = naming.getDeleteMutationTypeName(user);
|
|
18
|
+
|
|
19
|
+
return {
|
|
20
|
+
// Disabled auth for some operations
|
|
21
|
+
'Mutation.login': { auth: false },
|
|
22
|
+
'Mutation.register': { auth: false },
|
|
23
|
+
'Mutation.forgotPassword': { auth: false },
|
|
24
|
+
'Mutation.resetPassword': { auth: false },
|
|
25
|
+
'Mutation.emailConfirmation': { auth: false },
|
|
26
|
+
'Mutation.changePassword': {
|
|
27
|
+
auth: {
|
|
28
|
+
scope: 'plugin::users-permissions.auth.changePassword',
|
|
29
|
+
},
|
|
30
|
+
},
|
|
31
|
+
|
|
32
|
+
// Scoped auth for replaced CRUD operations
|
|
33
|
+
// Role
|
|
34
|
+
[`Mutation.${createRole}`]: { auth: { scope: [`${roleUID}.createRole`] } },
|
|
35
|
+
[`Mutation.${updateRole}`]: { auth: { scope: [`${roleUID}.updateRole`] } },
|
|
36
|
+
[`Mutation.${deleteRole}`]: { auth: { scope: [`${roleUID}.deleteRole`] } },
|
|
37
|
+
// User
|
|
38
|
+
[`Mutation.${createUser}`]: { auth: { scope: [`${userUID}.create`] } },
|
|
39
|
+
[`Mutation.${updateUser}`]: { auth: { scope: [`${userUID}.update`] } },
|
|
40
|
+
[`Mutation.${deleteUser}`]: { auth: { scope: [`${userUID}.destroy`] } },
|
|
41
|
+
};
|
|
42
|
+
};
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const typesFactories = [
|
|
4
|
+
require('./me'),
|
|
5
|
+
require('./me-role'),
|
|
6
|
+
require('./register-input'),
|
|
7
|
+
require('./login-input'),
|
|
8
|
+
require('./password-payload'),
|
|
9
|
+
require('./login-payload'),
|
|
10
|
+
require('./create-role-payload'),
|
|
11
|
+
require('./update-role-payload'),
|
|
12
|
+
require('./delete-role-payload'),
|
|
13
|
+
];
|
|
14
|
+
|
|
15
|
+
/**
|
|
16
|
+
* @param {object} context
|
|
17
|
+
* @param {object} context.nexus
|
|
18
|
+
* @param {object} context.strapi
|
|
19
|
+
* @return {any[]}
|
|
20
|
+
*/
|
|
21
|
+
module.exports = (context) => typesFactories.map((factory) => factory(context));
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = ({ nexus }) => {
|
|
4
|
+
return nexus.inputObjectType({
|
|
5
|
+
name: 'UsersPermissionsLoginInput',
|
|
6
|
+
|
|
7
|
+
definition(t) {
|
|
8
|
+
t.nonNull.string('identifier');
|
|
9
|
+
t.nonNull.string('password');
|
|
10
|
+
t.nonNull.string('provider', { default: 'local' });
|
|
11
|
+
},
|
|
12
|
+
});
|
|
13
|
+
};
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = ({ nexus }) => {
|
|
4
|
+
return nexus.objectType({
|
|
5
|
+
name: 'UsersPermissionsMe',
|
|
6
|
+
|
|
7
|
+
definition(t) {
|
|
8
|
+
t.nonNull.id('id');
|
|
9
|
+
t.nonNull.string('username');
|
|
10
|
+
t.string('email');
|
|
11
|
+
t.boolean('confirmed');
|
|
12
|
+
t.boolean('blocked');
|
|
13
|
+
t.field('role', { type: 'UsersPermissionsMeRole' });
|
|
14
|
+
},
|
|
15
|
+
});
|
|
16
|
+
};
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = ({ nexus }) => {
|
|
4
|
+
return nexus.inputObjectType({
|
|
5
|
+
name: 'UsersPermissionsRegisterInput',
|
|
6
|
+
|
|
7
|
+
definition(t) {
|
|
8
|
+
t.nonNull.string('username');
|
|
9
|
+
t.nonNull.string('email');
|
|
10
|
+
t.nonNull.string('password');
|
|
11
|
+
},
|
|
12
|
+
});
|
|
13
|
+
};
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const { getOr } = require('lodash/fp');
|
|
4
|
+
|
|
5
|
+
/**
|
|
6
|
+
* Throws an ApolloError if context body contains a bad request
|
|
7
|
+
* @param contextBody - body of the context object given to the resolver
|
|
8
|
+
* @throws ApolloError if the body is a bad request
|
|
9
|
+
*/
|
|
10
|
+
function checkBadRequest(contextBody) {
|
|
11
|
+
const statusCode = getOr(200, 'statusCode', contextBody);
|
|
12
|
+
|
|
13
|
+
if (statusCode !== 200) {
|
|
14
|
+
const errorMessage = getOr('Bad Request', 'error', contextBody);
|
|
15
|
+
|
|
16
|
+
const exception = new Error(errorMessage);
|
|
17
|
+
|
|
18
|
+
exception.code = statusCode || 400;
|
|
19
|
+
exception.data = contextBody;
|
|
20
|
+
|
|
21
|
+
throw exception;
|
|
22
|
+
}
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
module.exports = {
|
|
26
|
+
checkBadRequest,
|
|
27
|
+
};
|
package/server/index.js
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const register = require('./register');
|
|
4
|
+
const bootstrap = require('./bootstrap');
|
|
5
|
+
const contentTypes = require('./content-types');
|
|
6
|
+
const middlewares = require('./middlewares');
|
|
7
|
+
const services = require('./services');
|
|
8
|
+
const routes = require('./routes');
|
|
9
|
+
const controllers = require('./controllers');
|
|
10
|
+
const config = require('./config');
|
|
11
|
+
|
|
12
|
+
module.exports = () => ({
|
|
13
|
+
register,
|
|
14
|
+
bootstrap,
|
|
15
|
+
config,
|
|
16
|
+
routes,
|
|
17
|
+
controllers,
|
|
18
|
+
contentTypes,
|
|
19
|
+
middlewares,
|
|
20
|
+
services,
|
|
21
|
+
});
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports =
|
|
4
|
+
(config, { strapi }) =>
|
|
5
|
+
async (ctx, next) => {
|
|
6
|
+
const ratelimit = require('koa2-ratelimit').RateLimit;
|
|
7
|
+
|
|
8
|
+
const message = [
|
|
9
|
+
{
|
|
10
|
+
messages: [
|
|
11
|
+
{
|
|
12
|
+
id: 'Auth.form.error.ratelimit',
|
|
13
|
+
message: 'Too many attempts, please try again in a minute.',
|
|
14
|
+
},
|
|
15
|
+
],
|
|
16
|
+
},
|
|
17
|
+
];
|
|
18
|
+
|
|
19
|
+
return ratelimit.middleware({
|
|
20
|
+
interval: 1 * 60 * 1000,
|
|
21
|
+
max: 5,
|
|
22
|
+
prefixKey: `${ctx.request.path}:${ctx.request.ip}`,
|
|
23
|
+
message,
|
|
24
|
+
...strapi.config.get('plugin.users-permissions.ratelimit'),
|
|
25
|
+
...config,
|
|
26
|
+
})(ctx, next);
|
|
27
|
+
};
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const fs = require('fs');
|
|
4
|
+
const path = require('path');
|
|
5
|
+
|
|
6
|
+
const authStrategy = require('./strategies/users-permissions');
|
|
7
|
+
const sanitizers = require('./utils/sanitize/sanitizers');
|
|
8
|
+
|
|
9
|
+
module.exports = ({ strapi }) => {
|
|
10
|
+
strapi.container.get('auth').register('content-api', authStrategy);
|
|
11
|
+
strapi.sanitizers.add('content-api.output', sanitizers.defaultSanitizeOutput);
|
|
12
|
+
|
|
13
|
+
if (strapi.plugin('graphql')) {
|
|
14
|
+
require('./graphql')({ strapi });
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
if (strapi.plugin('documentation')) {
|
|
18
|
+
const specPath = path.join(__dirname, '../documentation/content-api.yaml');
|
|
19
|
+
const spec = fs.readFileSync(specPath, 'utf8');
|
|
20
|
+
|
|
21
|
+
strapi.plugin('documentation').service('documentation').registerDoc(spec);
|
|
22
|
+
}
|
|
23
|
+
};
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
const permissionsRoutes = require('./permissions');
|
|
4
|
+
const settingsRoutes = require('./settings');
|
|
5
|
+
const roleRoutes = require('./role');
|
|
6
|
+
|
|
7
|
+
module.exports = {
|
|
8
|
+
type: 'admin',
|
|
9
|
+
routes: [...roleRoutes, ...settingsRoutes, ...permissionsRoutes],
|
|
10
|
+
};
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
module.exports = [
|
|
4
|
+
{
|
|
5
|
+
method: 'GET',
|
|
6
|
+
path: '/permissions',
|
|
7
|
+
handler: 'permissions.getPermissions',
|
|
8
|
+
},
|
|
9
|
+
{
|
|
10
|
+
method: 'GET',
|
|
11
|
+
path: '/policies',
|
|
12
|
+
handler: 'permissions.getPolicies',
|
|
13
|
+
},
|
|
14
|
+
|
|
15
|
+
{
|
|
16
|
+
method: 'GET',
|
|
17
|
+
path: '/routes',
|
|
18
|
+
handler: 'permissions.getRoutes',
|
|
19
|
+
},
|
|
20
|
+
];
|