@strapi/plugin-users-permissions 4.0.0-next.1 → 4.0.0-next.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. package/admin/src/index.js +31 -28
  2. package/admin/src/pages/AdvancedSettings/index.js +14 -2
  3. package/admin/src/pages/AdvancedSettings/utils/form.js +2 -2
  4. package/admin/src/pages/EmailTemplates/index.js +8 -1
  5. package/admin/src/pages/Providers/index.js +8 -1
  6. package/admin/src/pages/Roles/CreatePage/index.js +1 -1
  7. package/admin/src/pages/Roles/EditPage/index.js +2 -2
  8. package/admin/src/pages/Roles/ListPage/index.js +1 -1
  9. package/admin/src/pages/Roles/index.js +14 -8
  10. package/admin/src/permissions.js +12 -14
  11. package/admin/src/translations/en.json +4 -0
  12. package/admin/src/translations/zh-Hans.json +26 -7
  13. package/documentation/1.0.0/overrides/users-permissions-Role.json +6 -6
  14. package/package.json +8 -6
  15. package/{config/functions/bootstrap.js → server/bootstrap/index.js} +9 -18
  16. package/{config → server/bootstrap}/users-permissions-actions.js +0 -0
  17. package/server/config.js +23 -0
  18. package/server/content-types/index.js +11 -0
  19. package/server/content-types/permission/index.js +31 -0
  20. package/server/content-types/role/index.js +48 -0
  21. package/server/content-types/user/index.js +72 -0
  22. package/{models/User.config.js → server/content-types/user/schema-config.js} +0 -0
  23. package/{controllers → server/controllers}/auth.js +63 -77
  24. package/server/controllers/index.js +15 -0
  25. package/server/controllers/permissions.js +26 -0
  26. package/server/controllers/role.js +77 -0
  27. package/server/controllers/settings.js +84 -0
  28. package/{controllers → server/controllers}/user/admin.js +26 -42
  29. package/{controllers → server/controllers}/user/api.js +11 -27
  30. package/{controllers → server/controllers}/user.js +2 -18
  31. package/{controllers → server/controllers}/validation/email-template.js +0 -0
  32. package/server/index.js +21 -0
  33. package/server/policies/index.js +7 -0
  34. package/{config → server}/policies/rateLimit.js +4 -8
  35. package/server/register.js +7 -0
  36. package/server/routes/admin/index.js +10 -0
  37. package/server/routes/admin/permissions.js +20 -0
  38. package/server/routes/admin/role.js +79 -0
  39. package/server/routes/admin/settings.js +95 -0
  40. package/server/routes/content-api/auth.js +73 -0
  41. package/server/routes/content-api/index.js +11 -0
  42. package/server/routes/content-api/permissions.js +9 -0
  43. package/server/routes/content-api/role.js +29 -0
  44. package/server/routes/content-api/user.js +61 -0
  45. package/server/routes/index.js +6 -0
  46. package/{config → server}/schema.graphql.js +96 -63
  47. package/server/services/index.js +15 -0
  48. package/{services → server/services}/jwt.js +12 -14
  49. package/server/services/providers.js +592 -0
  50. package/server/services/role.js +182 -0
  51. package/{services → server/services}/user.js +31 -34
  52. package/server/services/users-permissions.js +222 -0
  53. package/server/strategies/users-permissions.js +122 -0
  54. package/{utils → server/utils}/index.d.ts +6 -1
  55. package/server/utils/index.js +9 -0
  56. package/strapi-server.js +3 -0
  57. package/config/layout.js +0 -10
  58. package/config/policies/isAuthenticated.js +0 -9
  59. package/config/policies/permissions.js +0 -94
  60. package/config/request.json +0 -6
  61. package/config/routes.json +0 -381
  62. package/config/security.json +0 -5
  63. package/controllers/users-permissions.js +0 -271
  64. package/middlewares/users-permissions/defaults.json +0 -5
  65. package/middlewares/users-permissions/index.js +0 -40
  66. package/models/Permission.js +0 -7
  67. package/models/Permission.settings.json +0 -45
  68. package/models/Role.js +0 -7
  69. package/models/Role.settings.json +0 -43
  70. package/models/User.js +0 -7
  71. package/models/User.settings.json +0 -63
  72. package/services/providers.js +0 -598
  73. package/services/users-permissions.js +0 -430
  74. package/utils/index.js +0 -11
@@ -1,598 +0,0 @@
1
- 'use strict';
2
-
3
- /**
4
- * Module dependencies.
5
- */
6
-
7
- // Public node modules.
8
- const _ = require('lodash');
9
- const request = require('request');
10
-
11
- // Purest strategies.
12
- const purest = require('purest')({ request });
13
- const purestConfig = require('@purest/providers');
14
- const { getAbsoluteServerUrl } = require('@strapi/utils');
15
- const jwt = require('jsonwebtoken');
16
-
17
- /**
18
- * Connect thanks to a third-party provider.
19
- *
20
- *
21
- * @param {String} provider
22
- * @param {String} access_token
23
- *
24
- * @return {*}
25
- */
26
-
27
- const connect = (provider, query) => {
28
- const access_token = query.access_token || query.code || query.oauth_token;
29
-
30
- return new Promise((resolve, reject) => {
31
- if (!access_token) {
32
- return reject([null, { message: 'No access_token.' }]);
33
- }
34
-
35
- // Get the profile.
36
- getProfile(provider, query, async (err, profile) => {
37
- if (err) {
38
- return reject([null, err]);
39
- }
40
-
41
- // We need at least the mail.
42
- if (!profile.email) {
43
- return reject([null, { message: 'Email was not available.' }]);
44
- }
45
-
46
- try {
47
- const users = await strapi.query('plugins::users-permissions.user').findMany({
48
- where: { email: profile.email },
49
- });
50
-
51
- const advanced = await strapi
52
- .store({
53
- environment: '',
54
- type: 'plugin',
55
- name: 'users-permissions',
56
- key: 'advanced',
57
- })
58
- .get();
59
-
60
- const user = _.find(users, { provider });
61
-
62
- if (_.isEmpty(user) && !advanced.allow_register) {
63
- return resolve([
64
- null,
65
- [{ messages: [{ id: 'Auth.advanced.allow_register' }] }],
66
- 'Register action is actualy not available.',
67
- ]);
68
- }
69
-
70
- if (!_.isEmpty(user)) {
71
- return resolve([user, null]);
72
- }
73
-
74
- if (
75
- !_.isEmpty(_.find(users, user => user.provider !== provider)) &&
76
- advanced.unique_email
77
- ) {
78
- return resolve([
79
- null,
80
- [{ messages: [{ id: 'Auth.form.error.email.taken' }] }],
81
- 'Email is already taken.',
82
- ]);
83
- }
84
-
85
- // Retrieve default role.
86
- const defaultRole = await strapi
87
- .query('plugins::users-permissions.role')
88
- .findOne({ where: { type: advanced.default_role } });
89
-
90
- // Create the new user.
91
- const params = _.assign(profile, {
92
- provider: provider,
93
- role: defaultRole.id,
94
- confirmed: true,
95
- });
96
-
97
- const createdUser = await strapi
98
- .query('plugins::users-permissions.user')
99
- .create({ data: params });
100
-
101
- return resolve([createdUser, null]);
102
- } catch (err) {
103
- reject([null, err]);
104
- }
105
- });
106
- });
107
- };
108
-
109
- /**
110
- * Helper to get profiles
111
- *
112
- * @param {String} provider
113
- * @param {Function} callback
114
- */
115
-
116
- const getProfile = async (provider, query, callback) => {
117
- const access_token = query.access_token || query.code || query.oauth_token;
118
-
119
- const grant = await strapi
120
- .store({
121
- environment: '',
122
- type: 'plugin',
123
- name: 'users-permissions',
124
- key: 'grant',
125
- })
126
- .get();
127
-
128
- switch (provider) {
129
- case 'discord': {
130
- const discord = purest({
131
- provider: 'discord',
132
- config: {
133
- discord: {
134
- 'https://discordapp.com/api/': {
135
- __domain: {
136
- auth: {
137
- auth: { bearer: '[0]' },
138
- },
139
- },
140
- '{endpoint}': {
141
- __path: {
142
- alias: '__default',
143
- },
144
- },
145
- },
146
- },
147
- },
148
- });
149
- discord
150
- .query()
151
- .get('users/@me')
152
- .auth(access_token)
153
- .request((err, res, body) => {
154
- if (err) {
155
- callback(err);
156
- } else {
157
- // Combine username and discriminator because discord username is not unique
158
- var username = `${body.username}#${body.discriminator}`;
159
- callback(null, {
160
- username: username,
161
- email: body.email,
162
- });
163
- }
164
- });
165
- break;
166
- }
167
- case 'cognito': {
168
- // get the id_token
169
- const idToken = query.id_token;
170
- // decode the jwt token
171
- const tokenPayload = jwt.decode(idToken);
172
- if (!tokenPayload) {
173
- callback(new Error('unable to decode jwt token'));
174
- } else {
175
- callback(null, {
176
- username: tokenPayload['cognito:username'],
177
- email: tokenPayload.email,
178
- });
179
- }
180
- break;
181
- }
182
- case 'facebook': {
183
- const facebook = purest({
184
- provider: 'facebook',
185
- config: purestConfig,
186
- });
187
-
188
- facebook
189
- .query()
190
- .get('me?fields=name,email')
191
- .auth(access_token)
192
- .request((err, res, body) => {
193
- if (err) {
194
- callback(err);
195
- } else {
196
- callback(null, {
197
- username: body.name,
198
- email: body.email,
199
- });
200
- }
201
- });
202
- break;
203
- }
204
- case 'google': {
205
- const google = purest({ provider: 'google', config: purestConfig });
206
-
207
- google
208
- .query('oauth')
209
- .get('tokeninfo')
210
- .qs({ access_token })
211
- .request((err, res, body) => {
212
- if (err) {
213
- callback(err);
214
- } else {
215
- callback(null, {
216
- username: body.email.split('@')[0],
217
- email: body.email,
218
- });
219
- }
220
- });
221
- break;
222
- }
223
- case 'github': {
224
- const github = purest({
225
- provider: 'github',
226
- config: purestConfig,
227
- defaults: {
228
- headers: {
229
- 'user-agent': 'strapi',
230
- },
231
- },
232
- });
233
-
234
- github
235
- .query()
236
- .get('user')
237
- .auth(access_token)
238
- .request((err, res, userbody) => {
239
- if (err) {
240
- return callback(err);
241
- }
242
-
243
- // This is the public email on the github profile
244
- if (userbody.email) {
245
- return callback(null, {
246
- username: userbody.login,
247
- email: userbody.email,
248
- });
249
- }
250
-
251
- // Get the email with Github's user/emails API
252
- github
253
- .query()
254
- .get('user/emails')
255
- .auth(access_token)
256
- .request((err, res, emailsbody) => {
257
- if (err) {
258
- return callback(err);
259
- }
260
-
261
- return callback(null, {
262
- username: userbody.login,
263
- email: Array.isArray(emailsbody)
264
- ? emailsbody.find(email => email.primary === true).email
265
- : null,
266
- });
267
- });
268
- });
269
- break;
270
- }
271
- case 'microsoft': {
272
- const microsoft = purest({
273
- provider: 'microsoft',
274
- config: purestConfig,
275
- });
276
-
277
- microsoft
278
- .query()
279
- .get('me')
280
- .auth(access_token)
281
- .request((err, res, body) => {
282
- if (err) {
283
- callback(err);
284
- } else {
285
- callback(null, {
286
- username: body.userPrincipalName,
287
- email: body.userPrincipalName,
288
- });
289
- }
290
- });
291
- break;
292
- }
293
- case 'twitter': {
294
- const twitter = purest({
295
- provider: 'twitter',
296
- config: purestConfig,
297
- key: grant.twitter.key,
298
- secret: grant.twitter.secret,
299
- });
300
-
301
- twitter
302
- .query()
303
- .get('account/verify_credentials')
304
- .auth(access_token, query.access_secret)
305
- .qs({ screen_name: query['raw[screen_name]'], include_email: 'true' })
306
- .request((err, res, body) => {
307
- if (err) {
308
- callback(err);
309
- } else {
310
- callback(null, {
311
- username: body.screen_name,
312
- email: body.email,
313
- });
314
- }
315
- });
316
- break;
317
- }
318
- case 'instagram': {
319
- const instagram = purest({
320
- provider: 'instagram',
321
- key: grant.instagram.key,
322
- secret: grant.instagram.secret,
323
- config: purestConfig,
324
- });
325
-
326
- instagram
327
- .query()
328
- .get('me')
329
- .qs({ access_token, fields: 'id,username' })
330
- .request((err, res, body) => {
331
- if (err) {
332
- callback(err);
333
- } else {
334
- callback(null, {
335
- username: body.username,
336
- email: `${body.username}@strapi.io`, // dummy email as Instagram does not provide user email
337
- });
338
- }
339
- });
340
- break;
341
- }
342
- case 'vk': {
343
- const vk = purest({
344
- provider: 'vk',
345
- config: purestConfig,
346
- });
347
-
348
- vk.query()
349
- .get('users.get')
350
- .qs({ access_token, id: query.raw.user_id, v: '5.122' })
351
- .request((err, res, body) => {
352
- if (err) {
353
- callback(err);
354
- } else {
355
- callback(null, {
356
- username: `${body.response[0].last_name} ${body.response[0].first_name}`,
357
- email: query.raw.email,
358
- });
359
- }
360
- });
361
- break;
362
- }
363
- case 'twitch': {
364
- const twitch = purest({
365
- provider: 'twitch',
366
- config: {
367
- twitch: {
368
- 'https://api.twitch.tv': {
369
- __domain: {
370
- auth: {
371
- headers: {
372
- Authorization: 'Bearer [0]',
373
- 'Client-ID': '[1]',
374
- },
375
- },
376
- },
377
- 'helix/{endpoint}': {
378
- __path: {
379
- alias: '__default',
380
- },
381
- },
382
- 'oauth2/{endpoint}': {
383
- __path: {
384
- alias: 'oauth',
385
- },
386
- },
387
- },
388
- },
389
- },
390
- });
391
-
392
- twitch
393
- .get('users')
394
- .auth(access_token, grant.twitch.key)
395
- .request((err, res, body) => {
396
- if (err) {
397
- callback(err);
398
- } else {
399
- callback(null, {
400
- username: body.data[0].login,
401
- email: body.data[0].email,
402
- });
403
- }
404
- });
405
- break;
406
- }
407
- case 'linkedin': {
408
- const linkedIn = purest({
409
- provider: 'linkedin',
410
- config: {
411
- linkedin: {
412
- 'https://api.linkedin.com': {
413
- __domain: {
414
- auth: [{ auth: { bearer: '[0]' } }],
415
- },
416
- '[version]/{endpoint}': {
417
- __path: {
418
- alias: '__default',
419
- version: 'v2',
420
- },
421
- },
422
- },
423
- },
424
- },
425
- });
426
- try {
427
- const getDetailsRequest = () => {
428
- return new Promise((resolve, reject) => {
429
- linkedIn
430
- .query()
431
- .get('me')
432
- .auth(access_token)
433
- .request((err, res, body) => {
434
- if (err) {
435
- return reject(err);
436
- }
437
- resolve(body);
438
- });
439
- });
440
- };
441
-
442
- const getEmailRequest = () => {
443
- return new Promise((resolve, reject) => {
444
- linkedIn
445
- .query()
446
- .get('emailAddress?q=members&projection=(elements*(handle~))')
447
- .auth(access_token)
448
- .request((err, res, body) => {
449
- if (err) {
450
- return reject(err);
451
- }
452
- resolve(body);
453
- });
454
- });
455
- };
456
-
457
- const { localizedFirstName } = await getDetailsRequest();
458
- const { elements } = await getEmailRequest();
459
- const email = elements[0]['handle~'];
460
-
461
- callback(null, {
462
- username: localizedFirstName,
463
- email: email.emailAddress,
464
- });
465
- } catch (err) {
466
- callback(err);
467
- }
468
- break;
469
- }
470
- case 'reddit': {
471
- const reddit = purest({
472
- provider: 'reddit',
473
- config: purestConfig,
474
- defaults: {
475
- headers: {
476
- 'user-agent': 'strapi',
477
- },
478
- },
479
- });
480
-
481
- reddit
482
- .query('auth')
483
- .get('me')
484
- .auth(access_token)
485
- .request((err, res, body) => {
486
- if (err) {
487
- callback(err);
488
- } else {
489
- callback(null, {
490
- username: body.name,
491
- email: `${body.name}@strapi.io`, // dummy email as Reddit does not provide user email
492
- });
493
- }
494
- });
495
- break;
496
- }
497
- case 'auth0': {
498
- const purestAuth0Conf = {};
499
- purestAuth0Conf[`https://${grant.auth0.subdomain}.auth0.com`] = {
500
- __domain: {
501
- auth: {
502
- auth: { bearer: '[0]' },
503
- },
504
- },
505
- '{endpoint}': {
506
- __path: {
507
- alias: '__default',
508
- },
509
- },
510
- };
511
- const auth0 = purest({
512
- provider: 'auth0',
513
- config: {
514
- auth0: purestAuth0Conf,
515
- },
516
- });
517
-
518
- auth0
519
- .get('userinfo')
520
- .auth(access_token)
521
- .request((err, res, body) => {
522
- if (err) {
523
- callback(err);
524
- } else {
525
- const username =
526
- body.username || body.nickname || body.name || body.email.split('@')[0];
527
- const email = body.email || `${username.replace(/\s+/g, '.')}@strapi.io`;
528
-
529
- callback(null, {
530
- username,
531
- email,
532
- });
533
- }
534
- });
535
- break;
536
- }
537
- case 'cas': {
538
- const provider_url = 'https://' + _.get(grant['cas'], 'subdomain');
539
- const cas = purest({
540
- provider: 'cas',
541
- config: {
542
- cas: {
543
- [provider_url]: {
544
- __domain: {
545
- auth: {
546
- auth: { bearer: '[0]' },
547
- },
548
- },
549
- '{endpoint}': {
550
- __path: {
551
- alias: '__default',
552
- },
553
- },
554
- },
555
- },
556
- },
557
- });
558
- cas
559
- .query()
560
- .get('oidc/profile')
561
- .auth(access_token)
562
- .request((err, res, body) => {
563
- if (err) {
564
- callback(err);
565
- } else {
566
- // CAS attribute may be in body.attributes or "FLAT", depending on CAS config
567
- const username = body.attributes
568
- ? body.attributes.strapiusername || body.id || body.sub
569
- : body.strapiusername || body.id || body.sub;
570
- const email = body.attributes
571
- ? body.attributes.strapiemail || body.attributes.email
572
- : body.strapiemail || body.email;
573
- if (!username || !email) {
574
- strapi.log.warn(
575
- 'CAS Response Body did not contain required attributes: ' + JSON.stringify(body)
576
- );
577
- }
578
- callback(null, {
579
- username,
580
- email,
581
- });
582
- }
583
- });
584
- break;
585
- }
586
- default:
587
- callback(new Error('Unknown provider.'));
588
- break;
589
- }
590
- };
591
-
592
- const buildRedirectUri = (provider = '') =>
593
- `${getAbsoluteServerUrl(strapi.config)}/connect/${provider}/callback`;
594
-
595
- module.exports = {
596
- connect,
597
- buildRedirectUri,
598
- };