@strapi/plugin-users-permissions 0.0.0-next.f45143c5e2a8a9d85691d0abf79a3f42024a0c71 → 0.0.0-next.f4ec69568d980c6fee91ce2ee0f41c138347aa81

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. package/.eslintignore +1 -2
  2. package/.eslintrc +17 -0
  3. package/LICENSE +18 -3
  4. package/admin/src/components/BoundRoute/{index.js → index.jsx} +6 -4
  5. package/admin/src/components/FormModal/Input/{index.js → index.jsx} +37 -33
  6. package/admin/src/components/FormModal/index.jsx +115 -0
  7. package/admin/src/components/Permissions/PermissionRow/{CheckboxWrapper.js → CheckboxWrapper.jsx} +4 -3
  8. package/admin/src/components/Permissions/PermissionRow/{SubCategory.js → SubCategory.jsx} +27 -15
  9. package/admin/src/components/Permissions/PermissionRow/{index.js → index.jsx} +4 -2
  10. package/admin/src/components/Permissions/index.jsx +47 -0
  11. package/admin/src/components/Permissions/reducer.js +1 -1
  12. package/admin/src/components/Policies/{index.js → index.jsx} +9 -6
  13. package/admin/src/components/UsersPermissions/{index.js → index.jsx} +22 -11
  14. package/admin/src/components/UsersPermissions/reducer.js +1 -1
  15. package/admin/src/{permissions.js → constants.js} +1 -3
  16. package/admin/src/contexts/UsersPermissionsContext/{index.js → index.jsx} +1 -0
  17. package/admin/src/index.js +25 -51
  18. package/admin/src/pages/AdvancedSettings/index.jsx +214 -0
  19. package/admin/src/pages/AdvancedSettings/utils/layout.js +20 -35
  20. package/admin/src/pages/AdvancedSettings/utils/schema.js +5 -2
  21. package/admin/src/pages/EmailTemplates/components/EmailForm.jsx +156 -0
  22. package/admin/src/pages/EmailTemplates/components/{EmailTable.js → EmailTable.jsx} +27 -22
  23. package/admin/src/pages/EmailTemplates/index.jsx +148 -0
  24. package/admin/src/pages/EmailTemplates/utils/schema.js +18 -6
  25. package/admin/src/pages/Providers/index.jsx +262 -0
  26. package/admin/src/pages/Providers/utils/forms.js +23 -11
  27. package/admin/src/pages/Roles/constants.js +7 -0
  28. package/admin/src/pages/Roles/hooks/usePlugins.js +78 -0
  29. package/admin/src/pages/Roles/index.jsx +24 -0
  30. package/admin/src/pages/Roles/pages/CreatePage.jsx +194 -0
  31. package/admin/src/pages/Roles/pages/EditPage.jsx +215 -0
  32. package/admin/src/pages/Roles/pages/ListPage/components/TableBody.jsx +119 -0
  33. package/admin/src/pages/Roles/{ListPage/index.js → pages/ListPage/index.jsx} +108 -83
  34. package/admin/src/translations/en.json +1 -1
  35. package/admin/src/translations/ru.json +50 -26
  36. package/admin/src/translations/zh-Hans.json +80 -80
  37. package/admin/src/utils/index.js +1 -2
  38. package/admin/src/utils/prefixPluginTranslations.js +13 -0
  39. package/dist/_chunks/ar-BguGUqwK.js +44 -0
  40. package/dist/_chunks/ar-BguGUqwK.js.map +1 -0
  41. package/dist/_chunks/ar-CK8BRRXB.mjs +44 -0
  42. package/dist/_chunks/ar-CK8BRRXB.mjs.map +1 -0
  43. package/dist/_chunks/cs-BVigMk0l.mjs +50 -0
  44. package/dist/_chunks/cs-BVigMk0l.mjs.map +1 -0
  45. package/dist/_chunks/cs-BW8-K_GY.js +50 -0
  46. package/dist/_chunks/cs-BW8-K_GY.js.map +1 -0
  47. package/dist/_chunks/de-BKUdRFI4.mjs +62 -0
  48. package/dist/_chunks/de-BKUdRFI4.mjs.map +1 -0
  49. package/dist/_chunks/de-owXpVluI.js +62 -0
  50. package/dist/_chunks/de-owXpVluI.js.map +1 -0
  51. package/dist/_chunks/dk-BQiTK50l.mjs +86 -0
  52. package/dist/_chunks/dk-BQiTK50l.mjs.map +1 -0
  53. package/dist/_chunks/dk-LXAnbuBk.js +86 -0
  54. package/dist/_chunks/dk-LXAnbuBk.js.map +1 -0
  55. package/dist/_chunks/en-DOHtPf-2.mjs +86 -0
  56. package/dist/_chunks/en-DOHtPf-2.mjs.map +1 -0
  57. package/dist/_chunks/en-MHo5mcsU.js +86 -0
  58. package/dist/_chunks/en-MHo5mcsU.js.map +1 -0
  59. package/dist/_chunks/es-BwLCLXAQ.js +86 -0
  60. package/dist/_chunks/es-BwLCLXAQ.js.map +1 -0
  61. package/dist/_chunks/es-DNgOVMjD.mjs +86 -0
  62. package/dist/_chunks/es-DNgOVMjD.mjs.map +1 -0
  63. package/dist/_chunks/fr-DkgRugiU.mjs +50 -0
  64. package/dist/_chunks/fr-DkgRugiU.mjs.map +1 -0
  65. package/dist/_chunks/fr-DkhpSjjm.js +50 -0
  66. package/dist/_chunks/fr-DkhpSjjm.js.map +1 -0
  67. package/dist/_chunks/id-BTemOeTZ.js +62 -0
  68. package/dist/_chunks/id-BTemOeTZ.js.map +1 -0
  69. package/dist/_chunks/id-BdEsvnaF.mjs +62 -0
  70. package/dist/_chunks/id-BdEsvnaF.mjs.map +1 -0
  71. package/dist/_chunks/index-2awRBazk.js +281 -0
  72. package/dist/_chunks/index-2awRBazk.js.map +1 -0
  73. package/dist/_chunks/index-BAHBK68t.js +1172 -0
  74. package/dist/_chunks/index-BAHBK68t.js.map +1 -0
  75. package/dist/_chunks/index-BHbzbu1p.mjs +246 -0
  76. package/dist/_chunks/index-BHbzbu1p.mjs.map +1 -0
  77. package/dist/_chunks/index-Be4qNiZI.js +640 -0
  78. package/dist/_chunks/index-Be4qNiZI.js.map +1 -0
  79. package/dist/_chunks/index-C88EQQJQ-C4oUQUND.js +12026 -0
  80. package/dist/_chunks/index-C88EQQJQ-C4oUQUND.js.map +1 -0
  81. package/dist/_chunks/index-C88EQQJQ-DAZ1lfuF.mjs +12002 -0
  82. package/dist/_chunks/index-C88EQQJQ-DAZ1lfuF.mjs.map +1 -0
  83. package/dist/_chunks/index-CbKOY95_.mjs +344 -0
  84. package/dist/_chunks/index-CbKOY95_.mjs.map +1 -0
  85. package/dist/_chunks/index-CeweK3q9.mjs +617 -0
  86. package/dist/_chunks/index-CeweK3q9.mjs.map +1 -0
  87. package/dist/_chunks/index-QcDREbPt.mjs +262 -0
  88. package/dist/_chunks/index-QcDREbPt.mjs.map +1 -0
  89. package/dist/_chunks/index-YTFP-hNZ.js +245 -0
  90. package/dist/_chunks/index-YTFP-hNZ.js.map +1 -0
  91. package/dist/_chunks/index-YZkqoYZN.js +366 -0
  92. package/dist/_chunks/index-YZkqoYZN.js.map +1 -0
  93. package/dist/_chunks/index-mKh-etKG.mjs +1142 -0
  94. package/dist/_chunks/index-mKh-etKG.mjs.map +1 -0
  95. package/dist/_chunks/it-B-rv0E24.mjs +62 -0
  96. package/dist/_chunks/it-B-rv0E24.mjs.map +1 -0
  97. package/dist/_chunks/it-D1rH6V6_.js +62 -0
  98. package/dist/_chunks/it-D1rH6V6_.js.map +1 -0
  99. package/dist/_chunks/ja-C8K-VBPD.mjs +48 -0
  100. package/dist/_chunks/ja-C8K-VBPD.mjs.map +1 -0
  101. package/dist/_chunks/ja-DqShgTMf.js +48 -0
  102. package/dist/_chunks/ja-DqShgTMf.js.map +1 -0
  103. package/dist/_chunks/ko-B9DGEPWH.js +86 -0
  104. package/dist/_chunks/ko-B9DGEPWH.js.map +1 -0
  105. package/dist/_chunks/ko-Busb0wIY.mjs +86 -0
  106. package/dist/_chunks/ko-Busb0wIY.mjs.map +1 -0
  107. package/dist/_chunks/ms-ByvsQjRt.mjs +49 -0
  108. package/dist/_chunks/ms-ByvsQjRt.mjs.map +1 -0
  109. package/dist/_chunks/ms-CPBU3LWf.js +49 -0
  110. package/dist/_chunks/ms-CPBU3LWf.js.map +1 -0
  111. package/dist/_chunks/nl-5qO8Rpcy.mjs +48 -0
  112. package/dist/_chunks/nl-5qO8Rpcy.mjs.map +1 -0
  113. package/dist/_chunks/nl-CwNB6YoO.js +48 -0
  114. package/dist/_chunks/nl-CwNB6YoO.js.map +1 -0
  115. package/dist/_chunks/pl-BdIzifBE.mjs +86 -0
  116. package/dist/_chunks/pl-BdIzifBE.mjs.map +1 -0
  117. package/dist/_chunks/pl-Do9UD69f.js +86 -0
  118. package/dist/_chunks/pl-Do9UD69f.js.map +1 -0
  119. package/dist/_chunks/pt-BIO24ioG.mjs +48 -0
  120. package/dist/_chunks/pt-BIO24ioG.mjs.map +1 -0
  121. package/dist/_chunks/pt-BR-D7dZhxuP.js +44 -0
  122. package/dist/_chunks/pt-BR-D7dZhxuP.js.map +1 -0
  123. package/dist/_chunks/pt-BR-f0p23AQZ.mjs +44 -0
  124. package/dist/_chunks/pt-BR-f0p23AQZ.mjs.map +1 -0
  125. package/dist/_chunks/pt-fdvyOnUp.js +48 -0
  126. package/dist/_chunks/pt-fdvyOnUp.js.map +1 -0
  127. package/dist/_chunks/ru-C94rjPGA.js +86 -0
  128. package/dist/_chunks/ru-C94rjPGA.js.map +1 -0
  129. package/dist/_chunks/ru-VWy-IB7K.mjs +86 -0
  130. package/dist/_chunks/ru-VWy-IB7K.mjs.map +1 -0
  131. package/dist/_chunks/sk-BABEhykl.js +50 -0
  132. package/dist/_chunks/sk-BABEhykl.js.map +1 -0
  133. package/dist/_chunks/sk-B_LIcepm.mjs +50 -0
  134. package/dist/_chunks/sk-B_LIcepm.mjs.map +1 -0
  135. package/dist/_chunks/sv-ABLKOokl.mjs +86 -0
  136. package/dist/_chunks/sv-ABLKOokl.mjs.map +1 -0
  137. package/dist/_chunks/sv-Be43LhA9.js +86 -0
  138. package/dist/_chunks/sv-Be43LhA9.js.map +1 -0
  139. package/dist/_chunks/th-DKyP7ueR.mjs +60 -0
  140. package/dist/_chunks/th-DKyP7ueR.mjs.map +1 -0
  141. package/dist/_chunks/th-DgVhVLhL.js +60 -0
  142. package/dist/_chunks/th-DgVhVLhL.js.map +1 -0
  143. package/dist/_chunks/tr-B_idhkEs.js +85 -0
  144. package/dist/_chunks/tr-B_idhkEs.js.map +1 -0
  145. package/dist/_chunks/tr-qa1Q5UjC.mjs +85 -0
  146. package/dist/_chunks/tr-qa1Q5UjC.mjs.map +1 -0
  147. package/dist/_chunks/uk-BmRqbeQc.mjs +49 -0
  148. package/dist/_chunks/uk-BmRqbeQc.mjs.map +1 -0
  149. package/dist/_chunks/uk-LHOivnhP.js +49 -0
  150. package/dist/_chunks/uk-LHOivnhP.js.map +1 -0
  151. package/dist/_chunks/vi-CdVRdKDw.js +50 -0
  152. package/dist/_chunks/vi-CdVRdKDw.js.map +1 -0
  153. package/dist/_chunks/vi-HW-EdMea.mjs +50 -0
  154. package/dist/_chunks/vi-HW-EdMea.mjs.map +1 -0
  155. package/dist/_chunks/zh-5hKkVPA4.mjs +86 -0
  156. package/dist/_chunks/zh-5hKkVPA4.mjs.map +1 -0
  157. package/dist/_chunks/zh-Cuq8gMnF.js +86 -0
  158. package/dist/_chunks/zh-Cuq8gMnF.js.map +1 -0
  159. package/dist/_chunks/zh-Hans-BHilK-yc.mjs +86 -0
  160. package/dist/_chunks/zh-Hans-BHilK-yc.mjs.map +1 -0
  161. package/dist/_chunks/zh-Hans-GQDMKtY4.js +86 -0
  162. package/dist/_chunks/zh-Hans-GQDMKtY4.js.map +1 -0
  163. package/dist/admin/index.js +4 -0
  164. package/dist/admin/index.js.map +1 -0
  165. package/dist/admin/index.mjs +5 -0
  166. package/dist/admin/index.mjs.map +1 -0
  167. package/documentation/content-api.yaml +23 -15
  168. package/jest.config.front.js +2 -0
  169. package/package.json +51 -35
  170. package/packup.config.ts +22 -0
  171. package/server/bootstrap/index.js +18 -15
  172. package/server/bootstrap/users-permissions-actions.js +6 -0
  173. package/server/config.js +29 -0
  174. package/server/content-types/user/index.js +0 -1
  175. package/server/controllers/auth.js +74 -38
  176. package/server/controllers/content-manager-user.js +28 -30
  177. package/server/controllers/role.js +17 -4
  178. package/server/controllers/user.js +18 -8
  179. package/server/controllers/validation/auth.js +81 -25
  180. package/server/middlewares/rateLimit.js +41 -21
  181. package/server/register.js +8 -2
  182. package/server/services/jwt.js +3 -3
  183. package/server/services/permission.js +3 -7
  184. package/server/services/providers-registry.js +469 -261
  185. package/server/services/providers.js +10 -5
  186. package/server/services/role.js +15 -13
  187. package/server/services/user.js +56 -19
  188. package/server/services/users-permissions.js +15 -13
  189. package/server/strategies/users-permissions.js +1 -8
  190. package/server/utils/index.d.ts +2 -1
  191. package/server/utils/sanitize/sanitizers.js +7 -3
  192. package/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js +2 -2
  193. package/.eslintrc.js +0 -14
  194. package/admin/src/components/FormModal/index.js +0 -123
  195. package/admin/src/components/Permissions/index.js +0 -54
  196. package/admin/src/hooks/index.js +0 -5
  197. package/admin/src/hooks/useFetchRole/index.js +0 -64
  198. package/admin/src/hooks/useFetchRole/reducer.js +0 -31
  199. package/admin/src/hooks/useForm/index.js +0 -70
  200. package/admin/src/hooks/useForm/reducer.js +0 -40
  201. package/admin/src/hooks/usePlugins/index.js +0 -67
  202. package/admin/src/hooks/usePlugins/init.js +0 -5
  203. package/admin/src/hooks/usePlugins/reducer.js +0 -34
  204. package/admin/src/hooks/useRolesList/index.js +0 -63
  205. package/admin/src/hooks/useRolesList/init.js +0 -5
  206. package/admin/src/hooks/useRolesList/reducer.js +0 -31
  207. package/admin/src/pages/AdvancedSettings/index.js +0 -243
  208. package/admin/src/pages/AdvancedSettings/utils/api.js +0 -17
  209. package/admin/src/pages/EmailTemplates/components/EmailForm.js +0 -175
  210. package/admin/src/pages/EmailTemplates/index.js +0 -160
  211. package/admin/src/pages/EmailTemplates/utils/api.js +0 -17
  212. package/admin/src/pages/Providers/index.js +0 -272
  213. package/admin/src/pages/Providers/reducer.js +0 -54
  214. package/admin/src/pages/Providers/utils/api.js +0 -25
  215. package/admin/src/pages/Providers/utils/createProvidersArray.js +0 -21
  216. package/admin/src/pages/Roles/CreatePage/index.js +0 -182
  217. package/admin/src/pages/Roles/CreatePage/utils/schema.js +0 -9
  218. package/admin/src/pages/Roles/EditPage/index.js +0 -194
  219. package/admin/src/pages/Roles/EditPage/utils/schema.js +0 -9
  220. package/admin/src/pages/Roles/ListPage/components/TableBody.js +0 -92
  221. package/admin/src/pages/Roles/ListPage/utils/api.js +0 -31
  222. package/admin/src/pages/Roles/ProtectedCreatePage/index.js +0 -12
  223. package/admin/src/pages/Roles/ProtectedEditPage/index.js +0 -12
  224. package/admin/src/pages/Roles/ProtectedListPage/index.js +0 -15
  225. package/admin/src/pages/Roles/index.js +0 -27
  226. package/admin/src/utils/getRequestURL.js +0 -5
  227. package/server/bootstrap/grant-config.js +0 -131
  228. package/strapi-admin.js +0 -3
  229. package/strapi-server.js +0 -3
@@ -0,0 +1,22 @@
1
+ import { Config, defineConfig } from '@strapi/pack-up';
2
+ import { transformWithEsbuild } from 'vite';
3
+
4
+ const config: Config = defineConfig({
5
+ bundles: [
6
+ {
7
+ source: './admin/src/index.js',
8
+ import: './dist/admin/index.mjs',
9
+ require: './dist/admin/index.js',
10
+ runtime: 'web',
11
+ },
12
+ ],
13
+ dist: './dist',
14
+ /**
15
+ * Because we're exporting a server & client package
16
+ * which have different runtimes we want to ignore
17
+ * what they look like in the package.json
18
+ */
19
+ exports: {},
20
+ });
21
+
22
+ export default config;
@@ -9,23 +9,26 @@
9
9
  */
10
10
  const crypto = require('crypto');
11
11
  const _ = require('lodash');
12
- const urljoin = require('url-join');
13
12
  const { getService } = require('../utils');
14
- const getGrantConfig = require('./grant-config');
15
-
16
13
  const usersPermissionsActions = require('./users-permissions-actions');
17
14
 
18
15
  const initGrant = async (pluginStore) => {
19
- const apiPrefix = strapi.config.get('api.rest.prefix');
20
- const baseURL = urljoin(strapi.config.server.url, apiPrefix, 'auth');
16
+ const allProviders = getService('providers-registry').getAll();
17
+
18
+ const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {
19
+ const { icon, enabled, grantConfig } = provider;
21
20
 
22
- const grantConfig = getGrantConfig(baseURL);
21
+ acc[name] = {
22
+ icon,
23
+ enabled,
24
+ ...grantConfig,
25
+ };
26
+ return acc;
27
+ }, {});
23
28
 
24
29
  const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};
25
- // store grant auth config to db
26
- // when plugin_users-permissions_grant is not existed in db
27
- // or we have added/deleted provider here.
28
- if (!prevGrantConfig || !_.isEqual(_.keys(prevGrantConfig), _.keys(grantConfig))) {
30
+
31
+ if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {
29
32
  // merge with the previous provider config.
30
33
  _.keys(grantConfig).forEach((key) => {
31
34
  if (key in prevGrantConfig) {
@@ -104,13 +107,13 @@ module.exports = async ({ strapi }) => {
104
107
  await initEmails(pluginStore);
105
108
  await initAdvancedOptions(pluginStore);
106
109
 
107
- await strapi.admin.services.permission.actionProvider.registerMany(
108
- usersPermissionsActions.actions
109
- );
110
+ await strapi
111
+ .service('admin::permission')
112
+ .actionProvider.registerMany(usersPermissionsActions.actions);
110
113
 
111
114
  await getService('users-permissions').initialize();
112
115
 
113
- if (!strapi.config.get('plugin.users-permissions.jwtSecret')) {
116
+ if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {
114
117
  if (process.env.NODE_ENV !== 'development') {
115
118
  throw new Error(
116
119
  `Missing jwtSecret. Please, set configuration variable "jwtSecret" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \`crypto.randomBytes(16).toString('base64')\`).
@@ -120,7 +123,7 @@ For security reasons, prefer storing the secret in an environment variable and r
120
123
 
121
124
  const jwtSecret = crypto.randomBytes(16).toString('base64');
122
125
 
123
- strapi.config.set('plugin.users-permissions.jwtSecret', jwtSecret);
126
+ strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);
124
127
 
125
128
  if (!process.env.JWT_SECRET) {
126
129
  const envPath = process.env.ENV_PATH || '.env';
@@ -16,6 +16,12 @@ module.exports = {
16
16
  uid: 'roles.read',
17
17
  subCategory: 'roles',
18
18
  pluginName: 'users-permissions',
19
+ aliases: [
20
+ {
21
+ actionId: 'plugin::content-manager.explorer.read',
22
+ subjects: ['plugin::users-permissions.role'],
23
+ },
24
+ ],
19
25
  },
20
26
  {
21
27
  section: 'plugins',
package/server/config.js CHANGED
@@ -18,6 +18,35 @@ module.exports = {
18
18
  },
19
19
  },
20
20
  },
21
+ callback: {
22
+ validate(callback, provider) {
23
+ let uCallback;
24
+ let uProviderCallback;
25
+
26
+ try {
27
+ uCallback = new URL(callback);
28
+ uProviderCallback = new URL(provider.callback);
29
+ } catch {
30
+ throw new Error('The callback is not a valid URL');
31
+ }
32
+
33
+ // Make sure the different origin matches
34
+ if (uCallback.origin !== uProviderCallback.origin) {
35
+ throw new Error(
36
+ `Forbidden callback provided: origins don't match. Please verify your config.`
37
+ );
38
+ }
39
+
40
+ // Make sure the different pathname matches
41
+ if (uCallback.pathname !== uProviderCallback.pathname) {
42
+ throw new Error(
43
+ `Forbidden callback provided: pathname don't match. Please verify your config.`
44
+ );
45
+ }
46
+
47
+ // NOTE: We're not checking the search parameters on purpose to allow passing different states
48
+ },
49
+ },
21
50
  }),
22
51
  validator() {},
23
52
  };
@@ -12,7 +12,6 @@ module.exports = {
12
12
  displayName: 'User',
13
13
  },
14
14
  options: {
15
- draftAndPublish: false,
16
15
  timestamps: true,
17
16
  },
18
17
  attributes: {
@@ -9,6 +9,7 @@
9
9
  /* eslint-disable no-useless-escape */
10
10
  const crypto = require('crypto');
11
11
  const _ = require('lodash');
12
+ const { concat, compact, isArray } = require('lodash/fp');
12
13
  const utils = require('@strapi/utils');
13
14
  const { getService } = require('../utils');
14
15
  const {
@@ -21,17 +22,16 @@ const {
21
22
  validateChangePasswordBody,
22
23
  } = require('./validation/auth');
23
24
 
24
- const { getAbsoluteAdminUrl, getAbsoluteServerUrl, sanitize } = utils;
25
- const { ApplicationError, ValidationError } = utils.errors;
25
+ const { ApplicationError, ValidationError, ForbiddenError } = utils.errors;
26
26
 
27
27
  const sanitizeUser = (user, ctx) => {
28
28
  const { auth } = ctx.state;
29
29
  const userSchema = strapi.getModel('plugin::users-permissions.user');
30
30
 
31
- return sanitize.contentAPI.output(user, userSchema, { auth });
31
+ return strapi.contentAPI.sanitize.output(user, userSchema, { auth });
32
32
  };
33
33
 
34
- module.exports = {
34
+ module.exports = ({ strapi }) => ({
35
35
  async callback(ctx) {
36
36
  const provider = ctx.params.provider || 'local';
37
37
  const params = ctx.request.body;
@@ -51,7 +51,7 @@ module.exports = {
51
51
  const { identifier } = params;
52
52
 
53
53
  // Check if the user exists.
54
- const user = await strapi.query('plugin::users-permissions.user').findOne({
54
+ const user = await strapi.db.query('plugin::users-permissions.user').findOne({
55
55
  where: {
56
56
  provider,
57
57
  $or: [{ email: identifier.toLowerCase() }, { username: identifier }],
@@ -96,6 +96,10 @@ module.exports = {
96
96
  try {
97
97
  const user = await getService('providers').connect(provider, ctx.query);
98
98
 
99
+ if (user.blocked) {
100
+ throw new ForbiddenError('Your account has been blocked by an administrator');
101
+ }
102
+
99
103
  return ctx.send({
100
104
  jwt: getService('jwt').issue({ id: user.id }),
101
105
  user: await sanitizeUser(user, ctx),
@@ -110,13 +114,17 @@ module.exports = {
110
114
  throw new ApplicationError('You must be authenticated to reset your password');
111
115
  }
112
116
 
113
- const { currentPassword, password } = await validateChangePasswordBody(ctx.request.body);
117
+ const validations = strapi.config.get('plugin::users-permissions.validationRules');
114
118
 
115
- const user = await strapi.entityService.findOne(
116
- 'plugin::users-permissions.user',
117
- ctx.state.user.id
119
+ const { currentPassword, password } = await validateChangePasswordBody(
120
+ ctx.request.body,
121
+ validations
118
122
  );
119
123
 
124
+ const user = await strapi.db
125
+ .query('plugin::users-permissions.user')
126
+ .findOne({ where: { id: ctx.state.user.id } });
127
+
120
128
  const validPassword = await getService('user').validatePassword(currentPassword, user.password);
121
129
 
122
130
  if (!validPassword) {
@@ -136,15 +144,18 @@ module.exports = {
136
144
  },
137
145
 
138
146
  async resetPassword(ctx) {
147
+ const validations = strapi.config.get('plugin::users-permissions.validationRules');
148
+
139
149
  const { password, passwordConfirmation, code } = await validateResetPasswordBody(
140
- ctx.request.body
150
+ ctx.request.body,
151
+ validations
141
152
  );
142
153
 
143
154
  if (password !== passwordConfirmation) {
144
155
  throw new ValidationError('Passwords do not match');
145
156
  }
146
157
 
147
- const user = await strapi
158
+ const user = await strapi.db
148
159
  .query('plugin::users-permissions.user')
149
160
  .findOne({ where: { resetPasswordToken: code } });
150
161
 
@@ -193,10 +204,28 @@ module.exports = {
193
204
  }
194
205
 
195
206
  // Ability to pass OAuth callback dynamically
196
- grantConfig[provider].callback =
197
- _.get(ctx, 'query.callback') ||
198
- _.get(ctx, 'session.grant.dynamic.callback') ||
199
- grantConfig[provider].callback;
207
+ const queryCustomCallback = _.get(ctx, 'query.callback');
208
+ const dynamicSessionCallback = _.get(ctx, 'session.grant.dynamic.callback');
209
+
210
+ const customCallback = queryCustomCallback ?? dynamicSessionCallback;
211
+
212
+ // The custom callback is validated to make sure it's not redirecting to an unwanted actor.
213
+ if (customCallback !== undefined) {
214
+ try {
215
+ // We're extracting the callback validator from the plugin config since it can be user-customized
216
+ const { validate: validateCallback } = strapi
217
+ .plugin('users-permissions')
218
+ .config('callback');
219
+
220
+ await validateCallback(customCallback, grantConfig[provider]);
221
+
222
+ grantConfig[provider].callback = customCallback;
223
+ } catch (e) {
224
+ throw new ValidationError('Invalid callback URL provided', { callback: customCallback });
225
+ }
226
+ }
227
+
228
+ // Build a valid redirect URI for the current provider
200
229
  grantConfig[provider].redirect_uri = getService('providers').buildRedirectUri(provider);
201
230
 
202
231
  return grant(grantConfig)(ctx, next);
@@ -211,7 +240,7 @@ module.exports = {
211
240
  const advancedSettings = await pluginStore.get({ key: 'advanced' });
212
241
 
213
242
  // Find the user by email.
214
- const user = await strapi
243
+ const user = await strapi.db
215
244
  .query('plugin::users-permissions.user')
216
245
  .findOne({ where: { email: email.toLowerCase() } });
217
246
 
@@ -229,8 +258,8 @@ module.exports = {
229
258
  resetPasswordSettings.message,
230
259
  {
231
260
  URL: advancedSettings.email_reset_password,
232
- SERVER_URL: getAbsoluteServerUrl(strapi.config),
233
- ADMIN_URL: getAbsoluteAdminUrl(strapi.config),
261
+ SERVER_URL: strapi.config.get('server.absoluteUrl'),
262
+ ADMIN_URL: strapi.config.get('admin.absoluteUrl'),
234
263
  USER: userInfo,
235
264
  TOKEN: resetPasswordToken,
236
265
  }
@@ -273,26 +302,32 @@ module.exports = {
273
302
  throw new ApplicationError('Register action is currently disabled');
274
303
  }
275
304
 
305
+ const { register } = strapi.config.get('plugin::users-permissions');
306
+ const alwaysAllowedKeys = ['username', 'password', 'email'];
307
+
308
+ // Note that we intentionally do not filter allowedFields to allow a project to explicitly accept private or other Strapi field on registration
309
+ const allowedKeys = compact(
310
+ concat(alwaysAllowedKeys, isArray(register?.allowedFields) ? register.allowedFields : [])
311
+ );
312
+
313
+ // Check if there are any keys in requestBody that are not in allowedKeys
314
+ const invalidKeys = Object.keys(ctx.request.body).filter((key) => !allowedKeys.includes(key));
315
+
316
+ if (invalidKeys.length > 0) {
317
+ // If there are invalid keys, throw an error
318
+ throw new ValidationError(`Invalid parameters: ${invalidKeys.join(', ')}`);
319
+ }
320
+
276
321
  const params = {
277
- ..._.omit(ctx.request.body, [
278
- 'confirmed',
279
- 'blocked',
280
- 'confirmationToken',
281
- 'resetPasswordToken',
282
- 'provider',
283
- 'id',
284
- 'createdAt',
285
- 'updatedAt',
286
- 'createdBy',
287
- 'updatedBy',
288
- 'role',
289
- ]),
322
+ ..._.pick(ctx.request.body, allowedKeys),
290
323
  provider: 'local',
291
324
  };
292
325
 
293
- await validateRegisterBody(params);
326
+ const validations = strapi.config.get('plugin::users-permissions.validationRules');
294
327
 
295
- const role = await strapi
328
+ await validateRegisterBody(params, validations);
329
+
330
+ const role = await strapi.db
296
331
  .query('plugin::users-permissions.role')
297
332
  .findOne({ where: { type: settings.default_role } });
298
333
 
@@ -311,7 +346,7 @@ module.exports = {
311
346
  ],
312
347
  };
313
348
 
314
- const conflictingUserCount = await strapi.query('plugin::users-permissions.user').count({
349
+ const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({
315
350
  where: { ...identifierFilter, provider },
316
351
  });
317
352
 
@@ -320,7 +355,7 @@ module.exports = {
320
355
  }
321
356
 
322
357
  if (settings.unique_email) {
323
- const conflictingUserCount = await strapi.query('plugin::users-permissions.user').count({
358
+ const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({
324
359
  where: { ...identifierFilter },
325
360
  });
326
361
 
@@ -345,7 +380,8 @@ module.exports = {
345
380
  try {
346
381
  await getService('user').sendConfirmationEmail(sanitizedUser);
347
382
  } catch (err) {
348
- throw new ApplicationError(err.message);
383
+ strapi.log.error(err);
384
+ throw new ApplicationError('Error sending confirmation email');
349
385
  }
350
386
 
351
387
  return ctx.send({ user: sanitizedUser });
@@ -390,7 +426,7 @@ module.exports = {
390
426
  async sendEmailConfirmation(ctx) {
391
427
  const { email } = await validateSendEmailConfirmationBody(ctx.request.body);
392
428
 
393
- const user = await strapi.query('plugin::users-permissions.user').findOne({
429
+ const user = await strapi.db.query('plugin::users-permissions.user').findOne({
394
430
  where: { email: email.toLowerCase() },
395
431
  });
396
432
 
@@ -413,4 +449,4 @@ module.exports = {
413
449
  sent: true,
414
450
  });
415
451
  },
416
- };
452
+ });
@@ -17,24 +17,25 @@ const ACTIONS = {
17
17
  };
18
18
 
19
19
  const findEntityAndCheckPermissions = async (ability, action, model, id) => {
20
- const entity = await strapi.query(userModel).findOne({
21
- where: { id },
20
+ const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {
22
21
  populate: [`${CREATED_BY_ATTRIBUTE}.roles`],
23
22
  });
24
23
 
25
- if (_.isNil(entity)) {
24
+ if (_.isNil(doc)) {
26
25
  throw new NotFoundError();
27
26
  }
28
27
 
29
- const pm = strapi.admin.services.permission.createPermissionsManager({ ability, action, model });
28
+ const pm = strapi
29
+ .service('admin::permission')
30
+ .createPermissionsManager({ ability, action, model });
30
31
 
31
- if (pm.ability.cannot(pm.action, pm.toSubject(entity))) {
32
+ if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {
32
33
  throw new ForbiddenError();
33
34
  }
34
35
 
35
- const entityWithoutCreatorRoles = _.omit(entity, `${CREATED_BY_ATTRIBUTE}.roles`);
36
+ const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);
36
37
 
37
- return { pm, entity: entityWithoutCreatorRoles };
38
+ return { pm, doc: docWithoutCreatorRoles };
38
39
  };
39
40
 
40
41
  module.exports = {
@@ -48,7 +49,7 @@ module.exports = {
48
49
 
49
50
  const { email, username } = body;
50
51
 
51
- const pm = strapi.admin.services.permission.createPermissionsManager({
52
+ const pm = strapi.service('admin::permission').createPermissionsManager({
52
53
  ability: userAbility,
53
54
  action: ACTIONS.create,
54
55
  model: userModel,
@@ -66,7 +67,7 @@ module.exports = {
66
67
 
67
68
  await validateCreateUserBody(ctx.request.body);
68
69
 
69
- const userWithSameUsername = await strapi
70
+ const userWithSameUsername = await strapi.db
70
71
  .query('plugin::users-permissions.user')
71
72
  .findOne({ where: { username } });
72
73
 
@@ -75,7 +76,7 @@ module.exports = {
75
76
  }
76
77
 
77
78
  if (advanced.unique_email) {
78
- const userWithSameEmail = await strapi
79
+ const userWithSameEmail = await strapi.db
79
80
  .query('plugin::users-permissions.user')
80
81
  .findOne({ where: { email: email.toLowerCase() } });
81
82
 
@@ -93,18 +94,11 @@ module.exports = {
93
94
 
94
95
  user.email = _.toLower(user.email);
95
96
 
96
- if (!user.role) {
97
- const defaultRole = await strapi
98
- .query('plugin::users-permissions.role')
99
- .findOne({ where: { type: advanced.default_role } });
100
-
101
- user.role = defaultRole.id;
102
- }
103
-
104
97
  try {
105
98
  const data = await strapi
106
- .service('plugin::content-manager.entity-manager')
107
- .create(user, userModel);
99
+ .service('plugin::content-manager.document-manager')
100
+ .create(userModel, { data: user });
101
+
108
102
  const sanitizedData = await pm.sanitizeOutput(data, { action: ACTIONS.read });
109
103
 
110
104
  ctx.created(sanitizedData);
@@ -118,7 +112,7 @@ module.exports = {
118
112
  */
119
113
 
120
114
  async update(ctx) {
121
- const { id } = ctx.params;
115
+ const { id: documentId } = ctx.params;
122
116
  const { body } = ctx.request;
123
117
  const { user: admin, userAbility } = ctx.state;
124
118
 
@@ -128,13 +122,14 @@ module.exports = {
128
122
 
129
123
  const { email, username, password } = body;
130
124
 
131
- const { pm, entity } = await findEntityAndCheckPermissions(
125
+ const { pm, doc } = await findEntityAndCheckPermissions(
132
126
  userAbility,
133
127
  ACTIONS.edit,
134
128
  userModel,
135
- id
129
+ documentId
136
130
  );
137
- const user = entity;
131
+
132
+ const user = doc;
138
133
 
139
134
  await validateUpdateUserBody(ctx.request.body);
140
135
 
@@ -143,23 +138,24 @@ module.exports = {
143
138
  }
144
139
 
145
140
  if (_.has(body, 'username')) {
146
- const userWithSameUsername = await strapi
141
+ const userWithSameUsername = await strapi.db
147
142
  .query('plugin::users-permissions.user')
148
143
  .findOne({ where: { username } });
149
144
 
150
- if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(id)) {
145
+ if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {
151
146
  throw new ApplicationError('Username already taken');
152
147
  }
153
148
  }
154
149
 
155
150
  if (_.has(body, 'email') && advancedConfigs.unique_email) {
156
- const userWithSameEmail = await strapi
151
+ const userWithSameEmail = await strapi.db
157
152
  .query('plugin::users-permissions.user')
158
153
  .findOne({ where: { email: _.toLower(email) } });
159
154
 
160
- if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(id)) {
155
+ if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {
161
156
  throw new ApplicationError('Email already taken');
162
157
  }
158
+
163
159
  body.email = _.toLower(body.email);
164
160
  }
165
161
 
@@ -167,8 +163,10 @@ module.exports = {
167
163
  const updateData = _.omit({ ...sanitizedData, updatedBy: admin.id }, 'createdBy');
168
164
 
169
165
  const data = await strapi
170
- .service('plugin::content-manager.entity-manager')
171
- .update({ id }, updateData, userModel);
166
+ .service('plugin::content-manager.document-manager')
167
+ .update(documentId, userModel, {
168
+ data: updateData,
169
+ });
172
170
 
173
171
  ctx.body = await pm.sanitizeOutput(data, { action: ACTIONS.read });
174
172
  },
@@ -1,10 +1,19 @@
1
1
  'use strict';
2
2
 
3
3
  const _ = require('lodash');
4
- const { ApplicationError, ValidationError } = require('@strapi/utils').errors;
4
+ const { async, errors } = require('@strapi/utils');
5
5
  const { getService } = require('../utils');
6
6
  const { validateDeleteRoleBody } = require('./validation/user');
7
7
 
8
+ const { ApplicationError, ValidationError } = errors;
9
+
10
+ const sanitizeOutput = async (role) => {
11
+ const { sanitizeLocalizationFields } = strapi.plugin('i18n').service('sanitize');
12
+ const schema = strapi.getModel('plugin::users-permissions.role');
13
+
14
+ return async.pipe(sanitizeLocalizationFields(schema))(role);
15
+ };
16
+
8
17
  module.exports = {
9
18
  /**
10
19
  * Default action.
@@ -30,13 +39,17 @@ module.exports = {
30
39
  return ctx.notFound();
31
40
  }
32
41
 
33
- ctx.send({ role });
42
+ const safeRole = await sanitizeOutput(role);
43
+
44
+ ctx.send({ role: safeRole });
34
45
  },
35
46
 
36
47
  async find(ctx) {
37
48
  const roles = await getService('role').find();
38
49
 
39
- ctx.send({ roles });
50
+ const safeRoles = await Promise.all(roles.map(sanitizeOutput));
51
+
52
+ ctx.send({ roles: safeRoles });
40
53
  },
41
54
 
42
55
  async updateRole(ctx) {
@@ -59,7 +72,7 @@ module.exports = {
59
72
  }
60
73
 
61
74
  // Fetch public role.
62
- const publicRole = await strapi
75
+ const publicRole = await strapi.db
63
76
  .query('plugin::users-permissions.role')
64
77
  .findOne({ where: { type: 'public' } });
65
78
 
@@ -11,21 +11,27 @@ const utils = require('@strapi/utils');
11
11
  const { getService } = require('../utils');
12
12
  const { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');
13
13
 
14
- const { sanitize } = utils;
15
14
  const { ApplicationError, ValidationError, NotFoundError } = utils.errors;
16
15
 
17
16
  const sanitizeOutput = async (user, ctx) => {
18
17
  const schema = strapi.getModel('plugin::users-permissions.user');
19
18
  const { auth } = ctx.state;
20
19
 
21
- return sanitize.contentAPI.output(user, schema, { auth });
20
+ return strapi.contentAPI.sanitize.output(user, schema, { auth });
21
+ };
22
+
23
+ const validateQuery = async (query, ctx) => {
24
+ const schema = strapi.getModel('plugin::users-permissions.user');
25
+ const { auth } = ctx.state;
26
+
27
+ return strapi.contentAPI.validate.query(query, schema, { auth });
22
28
  };
23
29
 
24
30
  const sanitizeQuery = async (query, ctx) => {
25
31
  const schema = strapi.getModel('plugin::users-permissions.user');
26
32
  const { auth } = ctx.state;
27
33
 
28
- return sanitize.contentAPI.query(query, schema, { auth });
34
+ return strapi.contentAPI.sanitize.query(query, schema, { auth });
29
35
  };
30
36
 
31
37
  module.exports = {
@@ -42,7 +48,7 @@ module.exports = {
42
48
 
43
49
  const { email, username, role } = ctx.request.body;
44
50
 
45
- const userWithSameUsername = await strapi
51
+ const userWithSameUsername = await strapi.db
46
52
  .query('plugin::users-permissions.user')
47
53
  .findOne({ where: { username } });
48
54
 
@@ -51,7 +57,7 @@ module.exports = {
51
57
  }
52
58
 
53
59
  if (advanced.unique_email) {
54
- const userWithSameEmail = await strapi
60
+ const userWithSameEmail = await strapi.db
55
61
  .query('plugin::users-permissions.user')
56
62
  .findOne({ where: { email: email.toLowerCase() } });
57
63
 
@@ -67,7 +73,7 @@ module.exports = {
67
73
  };
68
74
 
69
75
  if (!role) {
70
- const defaultRole = await strapi
76
+ const defaultRole = await strapi.db
71
77
  .query('plugin::users-permissions.role')
72
78
  .findOne({ where: { type: advanced.default_role } });
73
79
 
@@ -108,7 +114,7 @@ module.exports = {
108
114
  }
109
115
 
110
116
  if (_.has(ctx.request.body, 'username')) {
111
- const userWithSameUsername = await strapi
117
+ const userWithSameUsername = await strapi.db
112
118
  .query('plugin::users-permissions.user')
113
119
  .findOne({ where: { username } });
114
120
 
@@ -118,7 +124,7 @@ module.exports = {
118
124
  }
119
125
 
120
126
  if (_.has(ctx.request.body, 'email') && advancedConfigs.unique_email) {
121
- const userWithSameEmail = await strapi
127
+ const userWithSameEmail = await strapi.db
122
128
  .query('plugin::users-permissions.user')
123
129
  .findOne({ where: { email: email.toLowerCase() } });
124
130
 
@@ -143,6 +149,7 @@ module.exports = {
143
149
  * @return {Object|Array}
144
150
  */
145
151
  async find(ctx) {
152
+ await validateQuery(ctx.query, ctx);
146
153
  const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);
147
154
  const users = await getService('user').fetchAll(sanitizedQuery);
148
155
 
@@ -155,6 +162,7 @@ module.exports = {
155
162
  */
156
163
  async findOne(ctx) {
157
164
  const { id } = ctx.params;
165
+ await validateQuery(ctx.query, ctx);
158
166
  const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);
159
167
 
160
168
  let data = await getService('user').fetch(id, sanitizedQuery);
@@ -171,6 +179,7 @@ module.exports = {
171
179
  * @return {Number}
172
180
  */
173
181
  async count(ctx) {
182
+ await validateQuery(ctx.query, ctx);
174
183
  const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);
175
184
 
176
185
  ctx.body = await getService('user').count(sanitizedQuery);
@@ -201,6 +210,7 @@ module.exports = {
201
210
  return ctx.unauthorized();
202
211
  }
203
212
 
213
+ await validateQuery(query, ctx);
204
214
  const sanitizedQuery = await sanitizeQuery(query, ctx);
205
215
  const user = await getService('user').fetch(authUser.id, sanitizedQuery);
206
216