@strapi/plugin-users-permissions 0.0.0-4fc90398602f

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (168) hide show
  1. package/LICENSE +22 -0
  2. package/README.md +1 -0
  3. package/admin/src/components/BoundRoute/getMethodColor.js +41 -0
  4. package/admin/src/components/BoundRoute/index.js +72 -0
  5. package/admin/src/components/FormModal/Input/index.js +121 -0
  6. package/admin/src/components/FormModal/index.js +121 -0
  7. package/admin/src/components/Permissions/PermissionRow/CheckboxWrapper.js +30 -0
  8. package/admin/src/components/Permissions/PermissionRow/SubCategory.js +114 -0
  9. package/admin/src/components/Permissions/PermissionRow/index.js +53 -0
  10. package/admin/src/components/Permissions/index.js +56 -0
  11. package/admin/src/components/Permissions/init.js +9 -0
  12. package/admin/src/components/Permissions/reducer.js +27 -0
  13. package/admin/src/components/Policies/index.js +60 -0
  14. package/admin/src/components/UsersPermissions/index.js +94 -0
  15. package/admin/src/components/UsersPermissions/init.js +10 -0
  16. package/admin/src/components/UsersPermissions/reducer.js +60 -0
  17. package/admin/src/contexts/UsersPermissionsContext/index.js +17 -0
  18. package/admin/src/hooks/index.js +5 -0
  19. package/admin/src/hooks/useFetchRole/index.js +64 -0
  20. package/admin/src/hooks/useFetchRole/reducer.js +31 -0
  21. package/admin/src/hooks/useForm/index.js +70 -0
  22. package/admin/src/hooks/useForm/reducer.js +40 -0
  23. package/admin/src/hooks/usePlugins/index.js +65 -0
  24. package/admin/src/hooks/usePlugins/init.js +5 -0
  25. package/admin/src/hooks/usePlugins/reducer.js +34 -0
  26. package/admin/src/hooks/useRolesList/index.js +63 -0
  27. package/admin/src/hooks/useRolesList/init.js +5 -0
  28. package/admin/src/hooks/useRolesList/reducer.js +31 -0
  29. package/admin/src/index.js +123 -0
  30. package/admin/src/pages/AdvancedSettings/index.js +238 -0
  31. package/admin/src/pages/AdvancedSettings/utils/api.js +13 -0
  32. package/admin/src/pages/AdvancedSettings/utils/layout.js +96 -0
  33. package/admin/src/pages/AdvancedSettings/utils/schema.js +19 -0
  34. package/admin/src/pages/EmailTemplates/components/EmailForm.js +173 -0
  35. package/admin/src/pages/EmailTemplates/components/EmailTable.js +121 -0
  36. package/admin/src/pages/EmailTemplates/index.js +162 -0
  37. package/admin/src/pages/EmailTemplates/utils/api.js +13 -0
  38. package/admin/src/pages/EmailTemplates/utils/schema.js +22 -0
  39. package/admin/src/pages/Providers/index.js +274 -0
  40. package/admin/src/pages/Providers/reducer.js +54 -0
  41. package/admin/src/pages/Providers/utils/api.js +21 -0
  42. package/admin/src/pages/Providers/utils/createProvidersArray.js +21 -0
  43. package/admin/src/pages/Providers/utils/forms.js +244 -0
  44. package/admin/src/pages/Roles/CreatePage/index.js +177 -0
  45. package/admin/src/pages/Roles/CreatePage/utils/schema.js +9 -0
  46. package/admin/src/pages/Roles/EditPage/index.js +190 -0
  47. package/admin/src/pages/Roles/EditPage/utils/schema.js +9 -0
  48. package/admin/src/pages/Roles/ListPage/components/TableBody.js +96 -0
  49. package/admin/src/pages/Roles/ListPage/index.js +216 -0
  50. package/admin/src/pages/Roles/ListPage/utils/api.js +28 -0
  51. package/admin/src/pages/Roles/ProtectedCreatePage/index.js +12 -0
  52. package/admin/src/pages/Roles/ProtectedEditPage/index.js +12 -0
  53. package/admin/src/pages/Roles/ProtectedListPage/index.js +15 -0
  54. package/admin/src/pages/Roles/index.js +27 -0
  55. package/admin/src/permissions.js +31 -0
  56. package/admin/src/pluginId.js +5 -0
  57. package/admin/src/translations/ar.json +40 -0
  58. package/admin/src/translations/cs.json +46 -0
  59. package/admin/src/translations/de.json +58 -0
  60. package/admin/src/translations/dk.json +83 -0
  61. package/admin/src/translations/en.json +83 -0
  62. package/admin/src/translations/es.json +83 -0
  63. package/admin/src/translations/fr.json +46 -0
  64. package/admin/src/translations/id.json +58 -0
  65. package/admin/src/translations/it.json +58 -0
  66. package/admin/src/translations/ja.json +44 -0
  67. package/admin/src/translations/ko.json +83 -0
  68. package/admin/src/translations/ms.json +45 -0
  69. package/admin/src/translations/nl.json +44 -0
  70. package/admin/src/translations/pl.json +83 -0
  71. package/admin/src/translations/pt-BR.json +40 -0
  72. package/admin/src/translations/pt.json +44 -0
  73. package/admin/src/translations/ru.json +58 -0
  74. package/admin/src/translations/sk.json +46 -0
  75. package/admin/src/translations/sv.json +58 -0
  76. package/admin/src/translations/th.json +56 -0
  77. package/admin/src/translations/tr.json +44 -0
  78. package/admin/src/translations/uk.json +45 -0
  79. package/admin/src/translations/vi.json +46 -0
  80. package/admin/src/translations/zh-Hans.json +62 -0
  81. package/admin/src/translations/zh.json +44 -0
  82. package/admin/src/utils/axiosInstance.js +36 -0
  83. package/admin/src/utils/cleanPermissions.js +25 -0
  84. package/admin/src/utils/formatPluginName.js +26 -0
  85. package/admin/src/utils/formatPolicies.js +8 -0
  86. package/admin/src/utils/getRequestURL.js +5 -0
  87. package/admin/src/utils/getTrad.js +5 -0
  88. package/admin/src/utils/index.js +5 -0
  89. package/documentation/content-api.yaml +848 -0
  90. package/jest.config.front.js +10 -0
  91. package/package.json +60 -0
  92. package/server/bootstrap/grant-config.js +123 -0
  93. package/server/bootstrap/index.js +133 -0
  94. package/server/bootstrap/users-permissions-actions.js +80 -0
  95. package/server/config.js +23 -0
  96. package/server/content-types/index.js +11 -0
  97. package/server/content-types/permission/index.js +34 -0
  98. package/server/content-types/role/index.js +51 -0
  99. package/server/content-types/user/index.js +72 -0
  100. package/server/content-types/user/schema-config.js +15 -0
  101. package/server/controllers/auth.js +398 -0
  102. package/server/controllers/content-manager-user.js +175 -0
  103. package/server/controllers/index.js +17 -0
  104. package/server/controllers/permissions.js +26 -0
  105. package/server/controllers/role.js +77 -0
  106. package/server/controllers/settings.js +85 -0
  107. package/server/controllers/user.js +198 -0
  108. package/server/controllers/validation/auth.js +57 -0
  109. package/server/controllers/validation/email-template.js +50 -0
  110. package/server/controllers/validation/user.js +26 -0
  111. package/server/graphql/index.js +44 -0
  112. package/server/graphql/mutations/auth/change-password.js +38 -0
  113. package/server/graphql/mutations/auth/email-confirmation.js +39 -0
  114. package/server/graphql/mutations/auth/forgot-password.js +35 -0
  115. package/server/graphql/mutations/auth/login.js +35 -0
  116. package/server/graphql/mutations/auth/register.js +36 -0
  117. package/server/graphql/mutations/auth/reset-password.js +38 -0
  118. package/server/graphql/mutations/crud/role/create-role.js +34 -0
  119. package/server/graphql/mutations/crud/role/delete-role.js +25 -0
  120. package/server/graphql/mutations/crud/role/update-role.js +35 -0
  121. package/server/graphql/mutations/crud/user/create-user.js +45 -0
  122. package/server/graphql/mutations/crud/user/delete-user.js +39 -0
  123. package/server/graphql/mutations/crud/user/update-user.js +46 -0
  124. package/server/graphql/mutations/index.js +43 -0
  125. package/server/graphql/queries/index.js +13 -0
  126. package/server/graphql/queries/me.js +17 -0
  127. package/server/graphql/resolvers-configs.js +42 -0
  128. package/server/graphql/types/create-role-payload.js +11 -0
  129. package/server/graphql/types/delete-role-payload.js +11 -0
  130. package/server/graphql/types/index.js +21 -0
  131. package/server/graphql/types/login-input.js +13 -0
  132. package/server/graphql/types/login-payload.js +12 -0
  133. package/server/graphql/types/me-role.js +14 -0
  134. package/server/graphql/types/me.js +16 -0
  135. package/server/graphql/types/password-payload.js +11 -0
  136. package/server/graphql/types/register-input.js +13 -0
  137. package/server/graphql/types/update-role-payload.js +11 -0
  138. package/server/graphql/utils.js +27 -0
  139. package/server/index.js +21 -0
  140. package/server/middlewares/index.js +7 -0
  141. package/server/middlewares/rateLimit.js +27 -0
  142. package/server/register.js +23 -0
  143. package/server/routes/admin/index.js +10 -0
  144. package/server/routes/admin/permissions.js +20 -0
  145. package/server/routes/admin/role.js +79 -0
  146. package/server/routes/admin/settings.js +95 -0
  147. package/server/routes/content-api/auth.js +82 -0
  148. package/server/routes/content-api/index.js +11 -0
  149. package/server/routes/content-api/permissions.js +9 -0
  150. package/server/routes/content-api/role.js +29 -0
  151. package/server/routes/content-api/user.js +60 -0
  152. package/server/routes/index.js +6 -0
  153. package/server/services/index.js +17 -0
  154. package/server/services/jwt.js +55 -0
  155. package/server/services/providers-registry.js +292 -0
  156. package/server/services/providers.js +115 -0
  157. package/server/services/role.js +177 -0
  158. package/server/services/user.js +140 -0
  159. package/server/services/users-permissions.js +236 -0
  160. package/server/strategies/users-permissions.js +102 -0
  161. package/server/utils/index.d.ts +16 -0
  162. package/server/utils/index.js +12 -0
  163. package/server/utils/sanitize/index.js +9 -0
  164. package/server/utils/sanitize/sanitizers.js +19 -0
  165. package/server/utils/sanitize/visitors/index.js +5 -0
  166. package/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js +11 -0
  167. package/strapi-admin.js +3 -0
  168. package/strapi-server.js +3 -0
@@ -0,0 +1,140 @@
1
+ 'use strict';
2
+
3
+ /**
4
+ * User.js service
5
+ *
6
+ * @description: A set of functions similar to controller's actions to avoid code duplication.
7
+ */
8
+
9
+ const crypto = require('crypto');
10
+ const bcrypt = require('bcryptjs');
11
+ const urlJoin = require('url-join');
12
+
13
+ const { getAbsoluteAdminUrl, getAbsoluteServerUrl, sanitize } = require('@strapi/utils');
14
+ const { getService } = require('../utils');
15
+
16
+ module.exports = ({ strapi }) => ({
17
+ /**
18
+ * Promise to count users
19
+ *
20
+ * @return {Promise}
21
+ */
22
+
23
+ count(params) {
24
+ return strapi.query('plugin::users-permissions.user').count({ where: params });
25
+ },
26
+
27
+ /**
28
+ * Promise to search count users
29
+ *
30
+ * @return {Promise}
31
+ */
32
+
33
+ /**
34
+ * Promise to add a/an user.
35
+ * @return {Promise}
36
+ */
37
+ async add(values) {
38
+ return strapi.entityService.create('plugin::users-permissions.user', {
39
+ data: values,
40
+ populate: ['role'],
41
+ });
42
+ },
43
+
44
+ /**
45
+ * Promise to edit a/an user.
46
+ * @param {string} userId
47
+ * @param {object} params
48
+ * @return {Promise}
49
+ */
50
+ async edit(userId, params = {}) {
51
+ return strapi.entityService.update('plugin::users-permissions.user', userId, {
52
+ data: params,
53
+ populate: ['role'],
54
+ });
55
+ },
56
+
57
+ /**
58
+ * Promise to fetch a/an user.
59
+ * @return {Promise}
60
+ */
61
+ fetch(id, params) {
62
+ return strapi.entityService.findOne('plugin::users-permissions.user', id, params);
63
+ },
64
+
65
+ /**
66
+ * Promise to fetch authenticated user.
67
+ * @return {Promise}
68
+ */
69
+ fetchAuthenticatedUser(id) {
70
+ return strapi
71
+ .query('plugin::users-permissions.user')
72
+ .findOne({ where: { id }, populate: ['role'] });
73
+ },
74
+
75
+ /**
76
+ * Promise to fetch all users.
77
+ * @return {Promise}
78
+ */
79
+ fetchAll(params) {
80
+ return strapi.entityService.findMany('plugin::users-permissions.user', params);
81
+ },
82
+
83
+ /**
84
+ * Promise to remove a/an user.
85
+ * @return {Promise}
86
+ */
87
+ async remove(params) {
88
+ return strapi.query('plugin::users-permissions.user').delete({ where: params });
89
+ },
90
+
91
+ validatePassword(password, hash) {
92
+ return bcrypt.compare(password, hash);
93
+ },
94
+
95
+ async sendConfirmationEmail(user) {
96
+ const userPermissionService = getService('users-permissions');
97
+ const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });
98
+ const userSchema = strapi.getModel('plugin::users-permissions.user');
99
+
100
+ const settings = await pluginStore
101
+ .get({ key: 'email' })
102
+ .then((storeEmail) => storeEmail.email_confirmation.options);
103
+
104
+ // Sanitize the template's user information
105
+ const sanitizedUserInfo = await sanitize.sanitizers.defaultSanitizeOutput(userSchema, user);
106
+
107
+ const confirmationToken = crypto.randomBytes(20).toString('hex');
108
+
109
+ await this.edit(user.id, { confirmationToken });
110
+
111
+ const apiPrefix = strapi.config.get('api.rest.prefix');
112
+ settings.message = await userPermissionService.template(settings.message, {
113
+ URL: urlJoin(getAbsoluteServerUrl(strapi.config), apiPrefix, '/auth/email-confirmation'),
114
+ SERVER_URL: getAbsoluteServerUrl(strapi.config),
115
+ ADMIN_URL: getAbsoluteAdminUrl(strapi.config),
116
+ USER: sanitizedUserInfo,
117
+ CODE: confirmationToken,
118
+ });
119
+
120
+ settings.object = await userPermissionService.template(settings.object, {
121
+ USER: sanitizedUserInfo,
122
+ });
123
+
124
+ // Send an email to the user.
125
+ await strapi
126
+ .plugin('email')
127
+ .service('email')
128
+ .send({
129
+ to: user.email,
130
+ from:
131
+ settings.from.email && settings.from.name
132
+ ? `${settings.from.name} <${settings.from.email}>`
133
+ : undefined,
134
+ replyTo: settings.response_email,
135
+ subject: settings.object,
136
+ text: settings.message,
137
+ html: settings.message,
138
+ });
139
+ },
140
+ });
@@ -0,0 +1,236 @@
1
+ 'use strict';
2
+
3
+ const _ = require('lodash');
4
+ const { filter, map, pipe, prop } = require('lodash/fp');
5
+ const urlJoin = require('url-join');
6
+
7
+ const { getService } = require('../utils');
8
+
9
+ const DEFAULT_PERMISSIONS = [
10
+ { action: 'plugin::users-permissions.auth.callback', roleType: 'public' },
11
+ { action: 'plugin::users-permissions.auth.connect', roleType: 'public' },
12
+ { action: 'plugin::users-permissions.auth.forgotPassword', roleType: 'public' },
13
+ { action: 'plugin::users-permissions.auth.resetPassword', roleType: 'public' },
14
+ { action: 'plugin::users-permissions.auth.register', roleType: 'public' },
15
+ { action: 'plugin::users-permissions.auth.emailConfirmation', roleType: 'public' },
16
+ { action: 'plugin::users-permissions.auth.sendEmailConfirmation', roleType: 'public' },
17
+ { action: 'plugin::users-permissions.user.me', roleType: 'authenticated' },
18
+ { action: 'plugin::users-permissions.auth.changePassword', roleType: 'authenticated' },
19
+ ];
20
+
21
+ const transformRoutePrefixFor = (pluginName) => (route) => {
22
+ const prefix = route.config && route.config.prefix;
23
+ const path = prefix !== undefined ? `${prefix}${route.path}` : `/${pluginName}${route.path}`;
24
+
25
+ return {
26
+ ...route,
27
+ path,
28
+ };
29
+ };
30
+
31
+ module.exports = ({ strapi }) => ({
32
+ getActions({ defaultEnable = false } = {}) {
33
+ const actionMap = {};
34
+
35
+ const isContentApi = (action) => {
36
+ if (!_.has(action, Symbol.for('__type__'))) {
37
+ return false;
38
+ }
39
+
40
+ return action[Symbol.for('__type__')].includes('content-api');
41
+ };
42
+
43
+ _.forEach(strapi.api, (api, apiName) => {
44
+ const controllers = _.reduce(
45
+ api.controllers,
46
+ (acc, controller, controllerName) => {
47
+ const contentApiActions = _.pickBy(controller, isContentApi);
48
+
49
+ if (_.isEmpty(contentApiActions)) {
50
+ return acc;
51
+ }
52
+
53
+ acc[controllerName] = _.mapValues(contentApiActions, () => {
54
+ return {
55
+ enabled: defaultEnable,
56
+ policy: '',
57
+ };
58
+ });
59
+
60
+ return acc;
61
+ },
62
+ {}
63
+ );
64
+
65
+ if (!_.isEmpty(controllers)) {
66
+ actionMap[`api::${apiName}`] = { controllers };
67
+ }
68
+ });
69
+
70
+ _.forEach(strapi.plugins, (plugin, pluginName) => {
71
+ const controllers = _.reduce(
72
+ plugin.controllers,
73
+ (acc, controller, controllerName) => {
74
+ const contentApiActions = _.pickBy(controller, isContentApi);
75
+
76
+ if (_.isEmpty(contentApiActions)) {
77
+ return acc;
78
+ }
79
+
80
+ acc[controllerName] = _.mapValues(contentApiActions, () => {
81
+ return {
82
+ enabled: defaultEnable,
83
+ policy: '',
84
+ };
85
+ });
86
+
87
+ return acc;
88
+ },
89
+ {}
90
+ );
91
+
92
+ if (!_.isEmpty(controllers)) {
93
+ actionMap[`plugin::${pluginName}`] = { controllers };
94
+ }
95
+ });
96
+
97
+ return actionMap;
98
+ },
99
+
100
+ async getRoutes() {
101
+ const routesMap = {};
102
+
103
+ _.forEach(strapi.api, (api, apiName) => {
104
+ const routes = _.flatMap(api.routes, (route) => {
105
+ if (_.has(route, 'routes')) {
106
+ return route.routes;
107
+ }
108
+
109
+ return route;
110
+ }).filter((route) => route.info.type === 'content-api');
111
+
112
+ if (routes.length === 0) {
113
+ return;
114
+ }
115
+
116
+ const apiPrefix = strapi.config.get('api.rest.prefix');
117
+ routesMap[`api::${apiName}`] = routes.map((route) => ({
118
+ ...route,
119
+ path: urlJoin(apiPrefix, route.path),
120
+ }));
121
+ });
122
+
123
+ _.forEach(strapi.plugins, (plugin, pluginName) => {
124
+ const transformPrefix = transformRoutePrefixFor(pluginName);
125
+
126
+ const routes = _.flatMap(plugin.routes, (route) => {
127
+ if (_.has(route, 'routes')) {
128
+ return route.routes.map(transformPrefix);
129
+ }
130
+
131
+ return transformPrefix(route);
132
+ }).filter((route) => route.info.type === 'content-api');
133
+
134
+ if (routes.length === 0) {
135
+ return;
136
+ }
137
+
138
+ const apiPrefix = strapi.config.get('api.rest.prefix');
139
+ routesMap[`plugin::${pluginName}`] = routes.map((route) => ({
140
+ ...route,
141
+ path: urlJoin(apiPrefix, route.path),
142
+ }));
143
+ });
144
+
145
+ return routesMap;
146
+ },
147
+
148
+ async syncPermissions() {
149
+ const roles = await strapi.query('plugin::users-permissions.role').findMany();
150
+ const dbPermissions = await strapi.query('plugin::users-permissions.permission').findMany();
151
+
152
+ const permissionsFoundInDB = _.uniq(_.map(dbPermissions, 'action'));
153
+
154
+ const appActions = _.flatMap(strapi.api, (api, apiName) => {
155
+ return _.flatMap(api.controllers, (controller, controllerName) => {
156
+ return _.keys(controller).map((actionName) => {
157
+ return `api::${apiName}.${controllerName}.${actionName}`;
158
+ });
159
+ });
160
+ });
161
+
162
+ const pluginsActions = _.flatMap(strapi.plugins, (plugin, pluginName) => {
163
+ return _.flatMap(plugin.controllers, (controller, controllerName) => {
164
+ return _.keys(controller).map((actionName) => {
165
+ return `plugin::${pluginName}.${controllerName}.${actionName}`;
166
+ });
167
+ });
168
+ });
169
+
170
+ const allActions = [...appActions, ...pluginsActions];
171
+
172
+ const toDelete = _.difference(permissionsFoundInDB, allActions);
173
+
174
+ await Promise.all(
175
+ toDelete.map((action) => {
176
+ return strapi.query('plugin::users-permissions.permission').delete({ where: { action } });
177
+ })
178
+ );
179
+
180
+ if (permissionsFoundInDB.length === 0) {
181
+ // create default permissions
182
+ for (const role of roles) {
183
+ const toCreate = pipe(
184
+ filter(({ roleType }) => roleType === role.type || roleType === null),
185
+ map(prop('action'))
186
+ )(DEFAULT_PERMISSIONS);
187
+
188
+ await Promise.all(
189
+ toCreate.map((action) => {
190
+ return strapi.query('plugin::users-permissions.permission').create({
191
+ data: {
192
+ action,
193
+ role: role.id,
194
+ },
195
+ });
196
+ })
197
+ );
198
+ }
199
+ }
200
+ },
201
+
202
+ async initialize() {
203
+ const roleCount = await strapi.query('plugin::users-permissions.role').count();
204
+
205
+ if (roleCount === 0) {
206
+ await strapi.query('plugin::users-permissions.role').create({
207
+ data: {
208
+ name: 'Authenticated',
209
+ description: 'Default role given to authenticated user.',
210
+ type: 'authenticated',
211
+ },
212
+ });
213
+
214
+ await strapi.query('plugin::users-permissions.role').create({
215
+ data: {
216
+ name: 'Public',
217
+ description: 'Default role given to unauthenticated user.',
218
+ type: 'public',
219
+ },
220
+ });
221
+ }
222
+
223
+ return getService('users-permissions').syncPermissions();
224
+ },
225
+
226
+ async updateUserRole(user, role) {
227
+ return strapi
228
+ .query('plugin::users-permissions.user')
229
+ .update({ where: { id: user.id }, data: { role } });
230
+ },
231
+
232
+ template(layout, data) {
233
+ const compiledObject = _.template(layout);
234
+ return compiledObject(data);
235
+ },
236
+ });
@@ -0,0 +1,102 @@
1
+ 'use strict';
2
+
3
+ const { castArray, map } = require('lodash/fp');
4
+ const { ForbiddenError, UnauthorizedError } = require('@strapi/utils').errors;
5
+
6
+ const { getService } = require('../utils');
7
+
8
+ const getAdvancedSettings = () => {
9
+ return strapi.store({ type: 'plugin', name: 'users-permissions' }).get({ key: 'advanced' });
10
+ };
11
+
12
+ const authenticate = async (ctx) => {
13
+ try {
14
+ const token = await getService('jwt').getToken(ctx);
15
+
16
+ if (token) {
17
+ const { id } = token;
18
+
19
+ if (id === undefined) {
20
+ return { authenticated: false };
21
+ }
22
+
23
+ // fetch authenticated user
24
+ const user = await getService('user').fetchAuthenticatedUser(id);
25
+
26
+ if (!user) {
27
+ return { error: 'Invalid credentials' };
28
+ }
29
+
30
+ const advancedSettings = await getAdvancedSettings();
31
+
32
+ if (advancedSettings.email_confirmation && !user.confirmed) {
33
+ return { error: 'Invalid credentials' };
34
+ }
35
+
36
+ if (user.blocked) {
37
+ return { error: 'Invalid credentials' };
38
+ }
39
+
40
+ ctx.state.user = user;
41
+
42
+ return {
43
+ authenticated: true,
44
+ credentials: user,
45
+ };
46
+ }
47
+
48
+ const publicPermissions = await strapi.query('plugin::users-permissions.permission').findMany({
49
+ where: {
50
+ role: { type: 'public' },
51
+ },
52
+ });
53
+
54
+ if (publicPermissions.length === 0) {
55
+ return { authenticated: false };
56
+ }
57
+
58
+ return {
59
+ authenticated: true,
60
+ credentials: null,
61
+ };
62
+ } catch (err) {
63
+ return { authenticated: false };
64
+ }
65
+ };
66
+
67
+ const verify = async (auth, config) => {
68
+ const { credentials: user } = auth;
69
+
70
+ if (!config.scope) {
71
+ if (!user) {
72
+ // A non authenticated user cannot access routes that do not have a scope
73
+ throw new UnauthorizedError();
74
+ } else {
75
+ // An authenticated user can access non scoped routes
76
+ return;
77
+ }
78
+ }
79
+
80
+ let { allowedActions } = auth;
81
+
82
+ if (!allowedActions) {
83
+ const permissions = await strapi.query('plugin::users-permissions.permission').findMany({
84
+ where: { role: user ? user.role.id : { type: 'public' } },
85
+ });
86
+
87
+ allowedActions = map('action', permissions);
88
+ auth.allowedActions = allowedActions;
89
+ }
90
+
91
+ const isAllowed = castArray(config.scope).every((scope) => allowedActions.includes(scope));
92
+
93
+ if (!isAllowed) {
94
+ throw new ForbiddenError();
95
+ }
96
+ };
97
+
98
+ module.exports = {
99
+ name: 'users-permissions',
100
+ authenticate,
101
+ verify,
102
+ };
@@ -0,0 +1,16 @@
1
+ import * as usersPermissions from '../services/users-permissions';
2
+ import * as user from '../services/user';
3
+ import * as role from '../services/role';
4
+ import * as jwt from '../services/jwt';
5
+ import * as providers from '../services/providers';
6
+
7
+ type S = {
8
+ ['users-permissions']: typeof usersPermissions;
9
+ ['role']: typeof role;
10
+ user: typeof user;
11
+ jwt: typeof jwt;
12
+ providers: typeof providers;
13
+ ['providers-registry']: typeof providers;
14
+ };
15
+
16
+ export function getService<T extends keyof S>(name: T): ReturnType<S[T]>;
@@ -0,0 +1,12 @@
1
+ 'use strict';
2
+
3
+ const sanitize = require('./sanitize');
4
+
5
+ const getService = (name) => {
6
+ return strapi.plugin('users-permissions').service(name);
7
+ };
8
+
9
+ module.exports = {
10
+ getService,
11
+ sanitize,
12
+ };
@@ -0,0 +1,9 @@
1
+ 'use strict';
2
+
3
+ const visitors = require('./visitors');
4
+ const sanitizers = require('./sanitizers');
5
+
6
+ module.exports = {
7
+ sanitizers,
8
+ visitors,
9
+ };
@@ -0,0 +1,19 @@
1
+ 'use strict';
2
+
3
+ const { curry } = require('lodash/fp');
4
+ const { traverseEntity, pipeAsync } = require('@strapi/utils');
5
+
6
+ const { removeUserRelationFromRoleEntities } = require('./visitors');
7
+
8
+ const sanitizeUserRelationFromRoleEntities = curry((schema, entity) => {
9
+ return traverseEntity(removeUserRelationFromRoleEntities, { schema }, entity);
10
+ });
11
+
12
+ const defaultSanitizeOutput = curry((schema, entity) => {
13
+ return pipeAsync(sanitizeUserRelationFromRoleEntities(schema))(entity);
14
+ });
15
+
16
+ module.exports = {
17
+ sanitizeUserRelationFromRoleEntities,
18
+ defaultSanitizeOutput,
19
+ };
@@ -0,0 +1,5 @@
1
+ 'use strict';
2
+
3
+ module.exports = {
4
+ removeUserRelationFromRoleEntities: require('./remove-user-relation-from-role-entities'),
5
+ };
@@ -0,0 +1,11 @@
1
+ 'use strict';
2
+
3
+ module.exports = ({ schema, key, attribute }, { remove }) => {
4
+ if (
5
+ attribute.type === 'relation' &&
6
+ attribute.target === 'plugin::users-permissions.user' &&
7
+ schema.uid === 'plugin::users-permissions.role'
8
+ ) {
9
+ remove(key);
10
+ }
11
+ };
@@ -0,0 +1,3 @@
1
+ 'use strict';
2
+
3
+ module.exports = require('./admin/src').default;
@@ -0,0 +1,3 @@
1
+ 'use strict';
2
+
3
+ module.exports = require('./server');