@strapi/plugin-users-permissions 4.0.0-next.1 → 4.0.0-next.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/admin/src/index.js +31 -28
- package/admin/src/pages/AdvancedSettings/index.js +14 -2
- package/admin/src/pages/AdvancedSettings/utils/form.js +2 -2
- package/admin/src/pages/EmailTemplates/index.js +8 -1
- package/admin/src/pages/Providers/index.js +8 -1
- package/admin/src/pages/Roles/CreatePage/index.js +1 -1
- package/admin/src/pages/Roles/EditPage/index.js +2 -2
- package/admin/src/pages/Roles/ListPage/index.js +1 -1
- package/admin/src/pages/Roles/index.js +14 -8
- package/admin/src/permissions.js +12 -14
- package/admin/src/translations/en.json +4 -0
- package/admin/src/translations/zh-Hans.json +26 -7
- package/documentation/1.0.0/overrides/users-permissions-Role.json +6 -6
- package/package.json +8 -6
- package/{config/functions/bootstrap.js → server/bootstrap/index.js} +9 -18
- package/{config → server/bootstrap}/users-permissions-actions.js +0 -0
- package/server/config.js +23 -0
- package/server/content-types/index.js +11 -0
- package/server/content-types/permission/index.js +31 -0
- package/server/content-types/role/index.js +48 -0
- package/server/content-types/user/index.js +72 -0
- package/{models/User.config.js → server/content-types/user/schema-config.js} +0 -0
- package/{controllers → server/controllers}/auth.js +63 -77
- package/server/controllers/index.js +15 -0
- package/server/controllers/permissions.js +26 -0
- package/server/controllers/role.js +77 -0
- package/server/controllers/settings.js +84 -0
- package/{controllers → server/controllers}/user/admin.js +26 -42
- package/{controllers → server/controllers}/user/api.js +11 -27
- package/{controllers → server/controllers}/user.js +2 -18
- package/{controllers → server/controllers}/validation/email-template.js +0 -0
- package/server/index.js +21 -0
- package/server/policies/index.js +7 -0
- package/{config → server}/policies/rateLimit.js +4 -8
- package/server/register.js +7 -0
- package/server/routes/admin/index.js +10 -0
- package/server/routes/admin/permissions.js +20 -0
- package/server/routes/admin/role.js +79 -0
- package/server/routes/admin/settings.js +95 -0
- package/server/routes/content-api/auth.js +73 -0
- package/server/routes/content-api/index.js +11 -0
- package/server/routes/content-api/permissions.js +9 -0
- package/server/routes/content-api/role.js +29 -0
- package/server/routes/content-api/user.js +61 -0
- package/server/routes/index.js +6 -0
- package/{config → server}/schema.graphql.js +96 -63
- package/server/services/index.js +15 -0
- package/{services → server/services}/jwt.js +12 -14
- package/server/services/providers.js +592 -0
- package/server/services/role.js +182 -0
- package/{services → server/services}/user.js +31 -34
- package/server/services/users-permissions.js +222 -0
- package/server/strategies/users-permissions.js +122 -0
- package/{utils → server/utils}/index.d.ts +6 -1
- package/server/utils/index.js +9 -0
- package/strapi-server.js +3 -0
- package/config/layout.js +0 -10
- package/config/policies/isAuthenticated.js +0 -9
- package/config/policies/permissions.js +0 -94
- package/config/request.json +0 -6
- package/config/routes.json +0 -381
- package/config/security.json +0 -5
- package/controllers/users-permissions.js +0 -271
- package/middlewares/users-permissions/defaults.json +0 -5
- package/middlewares/users-permissions/index.js +0 -40
- package/models/Permission.js +0 -7
- package/models/Permission.settings.json +0 -45
- package/models/Role.js +0 -7
- package/models/Role.settings.json +0 -43
- package/models/User.js +0 -7
- package/models/User.settings.json +0 -63
- package/services/providers.js +0 -598
- package/services/users-permissions.js +0 -430
- package/utils/index.js +0 -11
package/services/providers.js
DELETED
|
@@ -1,598 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
/**
|
|
4
|
-
* Module dependencies.
|
|
5
|
-
*/
|
|
6
|
-
|
|
7
|
-
// Public node modules.
|
|
8
|
-
const _ = require('lodash');
|
|
9
|
-
const request = require('request');
|
|
10
|
-
|
|
11
|
-
// Purest strategies.
|
|
12
|
-
const purest = require('purest')({ request });
|
|
13
|
-
const purestConfig = require('@purest/providers');
|
|
14
|
-
const { getAbsoluteServerUrl } = require('@strapi/utils');
|
|
15
|
-
const jwt = require('jsonwebtoken');
|
|
16
|
-
|
|
17
|
-
/**
|
|
18
|
-
* Connect thanks to a third-party provider.
|
|
19
|
-
*
|
|
20
|
-
*
|
|
21
|
-
* @param {String} provider
|
|
22
|
-
* @param {String} access_token
|
|
23
|
-
*
|
|
24
|
-
* @return {*}
|
|
25
|
-
*/
|
|
26
|
-
|
|
27
|
-
const connect = (provider, query) => {
|
|
28
|
-
const access_token = query.access_token || query.code || query.oauth_token;
|
|
29
|
-
|
|
30
|
-
return new Promise((resolve, reject) => {
|
|
31
|
-
if (!access_token) {
|
|
32
|
-
return reject([null, { message: 'No access_token.' }]);
|
|
33
|
-
}
|
|
34
|
-
|
|
35
|
-
// Get the profile.
|
|
36
|
-
getProfile(provider, query, async (err, profile) => {
|
|
37
|
-
if (err) {
|
|
38
|
-
return reject([null, err]);
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
// We need at least the mail.
|
|
42
|
-
if (!profile.email) {
|
|
43
|
-
return reject([null, { message: 'Email was not available.' }]);
|
|
44
|
-
}
|
|
45
|
-
|
|
46
|
-
try {
|
|
47
|
-
const users = await strapi.query('plugins::users-permissions.user').findMany({
|
|
48
|
-
where: { email: profile.email },
|
|
49
|
-
});
|
|
50
|
-
|
|
51
|
-
const advanced = await strapi
|
|
52
|
-
.store({
|
|
53
|
-
environment: '',
|
|
54
|
-
type: 'plugin',
|
|
55
|
-
name: 'users-permissions',
|
|
56
|
-
key: 'advanced',
|
|
57
|
-
})
|
|
58
|
-
.get();
|
|
59
|
-
|
|
60
|
-
const user = _.find(users, { provider });
|
|
61
|
-
|
|
62
|
-
if (_.isEmpty(user) && !advanced.allow_register) {
|
|
63
|
-
return resolve([
|
|
64
|
-
null,
|
|
65
|
-
[{ messages: [{ id: 'Auth.advanced.allow_register' }] }],
|
|
66
|
-
'Register action is actualy not available.',
|
|
67
|
-
]);
|
|
68
|
-
}
|
|
69
|
-
|
|
70
|
-
if (!_.isEmpty(user)) {
|
|
71
|
-
return resolve([user, null]);
|
|
72
|
-
}
|
|
73
|
-
|
|
74
|
-
if (
|
|
75
|
-
!_.isEmpty(_.find(users, user => user.provider !== provider)) &&
|
|
76
|
-
advanced.unique_email
|
|
77
|
-
) {
|
|
78
|
-
return resolve([
|
|
79
|
-
null,
|
|
80
|
-
[{ messages: [{ id: 'Auth.form.error.email.taken' }] }],
|
|
81
|
-
'Email is already taken.',
|
|
82
|
-
]);
|
|
83
|
-
}
|
|
84
|
-
|
|
85
|
-
// Retrieve default role.
|
|
86
|
-
const defaultRole = await strapi
|
|
87
|
-
.query('plugins::users-permissions.role')
|
|
88
|
-
.findOne({ where: { type: advanced.default_role } });
|
|
89
|
-
|
|
90
|
-
// Create the new user.
|
|
91
|
-
const params = _.assign(profile, {
|
|
92
|
-
provider: provider,
|
|
93
|
-
role: defaultRole.id,
|
|
94
|
-
confirmed: true,
|
|
95
|
-
});
|
|
96
|
-
|
|
97
|
-
const createdUser = await strapi
|
|
98
|
-
.query('plugins::users-permissions.user')
|
|
99
|
-
.create({ data: params });
|
|
100
|
-
|
|
101
|
-
return resolve([createdUser, null]);
|
|
102
|
-
} catch (err) {
|
|
103
|
-
reject([null, err]);
|
|
104
|
-
}
|
|
105
|
-
});
|
|
106
|
-
});
|
|
107
|
-
};
|
|
108
|
-
|
|
109
|
-
/**
|
|
110
|
-
* Helper to get profiles
|
|
111
|
-
*
|
|
112
|
-
* @param {String} provider
|
|
113
|
-
* @param {Function} callback
|
|
114
|
-
*/
|
|
115
|
-
|
|
116
|
-
const getProfile = async (provider, query, callback) => {
|
|
117
|
-
const access_token = query.access_token || query.code || query.oauth_token;
|
|
118
|
-
|
|
119
|
-
const grant = await strapi
|
|
120
|
-
.store({
|
|
121
|
-
environment: '',
|
|
122
|
-
type: 'plugin',
|
|
123
|
-
name: 'users-permissions',
|
|
124
|
-
key: 'grant',
|
|
125
|
-
})
|
|
126
|
-
.get();
|
|
127
|
-
|
|
128
|
-
switch (provider) {
|
|
129
|
-
case 'discord': {
|
|
130
|
-
const discord = purest({
|
|
131
|
-
provider: 'discord',
|
|
132
|
-
config: {
|
|
133
|
-
discord: {
|
|
134
|
-
'https://discordapp.com/api/': {
|
|
135
|
-
__domain: {
|
|
136
|
-
auth: {
|
|
137
|
-
auth: { bearer: '[0]' },
|
|
138
|
-
},
|
|
139
|
-
},
|
|
140
|
-
'{endpoint}': {
|
|
141
|
-
__path: {
|
|
142
|
-
alias: '__default',
|
|
143
|
-
},
|
|
144
|
-
},
|
|
145
|
-
},
|
|
146
|
-
},
|
|
147
|
-
},
|
|
148
|
-
});
|
|
149
|
-
discord
|
|
150
|
-
.query()
|
|
151
|
-
.get('users/@me')
|
|
152
|
-
.auth(access_token)
|
|
153
|
-
.request((err, res, body) => {
|
|
154
|
-
if (err) {
|
|
155
|
-
callback(err);
|
|
156
|
-
} else {
|
|
157
|
-
// Combine username and discriminator because discord username is not unique
|
|
158
|
-
var username = `${body.username}#${body.discriminator}`;
|
|
159
|
-
callback(null, {
|
|
160
|
-
username: username,
|
|
161
|
-
email: body.email,
|
|
162
|
-
});
|
|
163
|
-
}
|
|
164
|
-
});
|
|
165
|
-
break;
|
|
166
|
-
}
|
|
167
|
-
case 'cognito': {
|
|
168
|
-
// get the id_token
|
|
169
|
-
const idToken = query.id_token;
|
|
170
|
-
// decode the jwt token
|
|
171
|
-
const tokenPayload = jwt.decode(idToken);
|
|
172
|
-
if (!tokenPayload) {
|
|
173
|
-
callback(new Error('unable to decode jwt token'));
|
|
174
|
-
} else {
|
|
175
|
-
callback(null, {
|
|
176
|
-
username: tokenPayload['cognito:username'],
|
|
177
|
-
email: tokenPayload.email,
|
|
178
|
-
});
|
|
179
|
-
}
|
|
180
|
-
break;
|
|
181
|
-
}
|
|
182
|
-
case 'facebook': {
|
|
183
|
-
const facebook = purest({
|
|
184
|
-
provider: 'facebook',
|
|
185
|
-
config: purestConfig,
|
|
186
|
-
});
|
|
187
|
-
|
|
188
|
-
facebook
|
|
189
|
-
.query()
|
|
190
|
-
.get('me?fields=name,email')
|
|
191
|
-
.auth(access_token)
|
|
192
|
-
.request((err, res, body) => {
|
|
193
|
-
if (err) {
|
|
194
|
-
callback(err);
|
|
195
|
-
} else {
|
|
196
|
-
callback(null, {
|
|
197
|
-
username: body.name,
|
|
198
|
-
email: body.email,
|
|
199
|
-
});
|
|
200
|
-
}
|
|
201
|
-
});
|
|
202
|
-
break;
|
|
203
|
-
}
|
|
204
|
-
case 'google': {
|
|
205
|
-
const google = purest({ provider: 'google', config: purestConfig });
|
|
206
|
-
|
|
207
|
-
google
|
|
208
|
-
.query('oauth')
|
|
209
|
-
.get('tokeninfo')
|
|
210
|
-
.qs({ access_token })
|
|
211
|
-
.request((err, res, body) => {
|
|
212
|
-
if (err) {
|
|
213
|
-
callback(err);
|
|
214
|
-
} else {
|
|
215
|
-
callback(null, {
|
|
216
|
-
username: body.email.split('@')[0],
|
|
217
|
-
email: body.email,
|
|
218
|
-
});
|
|
219
|
-
}
|
|
220
|
-
});
|
|
221
|
-
break;
|
|
222
|
-
}
|
|
223
|
-
case 'github': {
|
|
224
|
-
const github = purest({
|
|
225
|
-
provider: 'github',
|
|
226
|
-
config: purestConfig,
|
|
227
|
-
defaults: {
|
|
228
|
-
headers: {
|
|
229
|
-
'user-agent': 'strapi',
|
|
230
|
-
},
|
|
231
|
-
},
|
|
232
|
-
});
|
|
233
|
-
|
|
234
|
-
github
|
|
235
|
-
.query()
|
|
236
|
-
.get('user')
|
|
237
|
-
.auth(access_token)
|
|
238
|
-
.request((err, res, userbody) => {
|
|
239
|
-
if (err) {
|
|
240
|
-
return callback(err);
|
|
241
|
-
}
|
|
242
|
-
|
|
243
|
-
// This is the public email on the github profile
|
|
244
|
-
if (userbody.email) {
|
|
245
|
-
return callback(null, {
|
|
246
|
-
username: userbody.login,
|
|
247
|
-
email: userbody.email,
|
|
248
|
-
});
|
|
249
|
-
}
|
|
250
|
-
|
|
251
|
-
// Get the email with Github's user/emails API
|
|
252
|
-
github
|
|
253
|
-
.query()
|
|
254
|
-
.get('user/emails')
|
|
255
|
-
.auth(access_token)
|
|
256
|
-
.request((err, res, emailsbody) => {
|
|
257
|
-
if (err) {
|
|
258
|
-
return callback(err);
|
|
259
|
-
}
|
|
260
|
-
|
|
261
|
-
return callback(null, {
|
|
262
|
-
username: userbody.login,
|
|
263
|
-
email: Array.isArray(emailsbody)
|
|
264
|
-
? emailsbody.find(email => email.primary === true).email
|
|
265
|
-
: null,
|
|
266
|
-
});
|
|
267
|
-
});
|
|
268
|
-
});
|
|
269
|
-
break;
|
|
270
|
-
}
|
|
271
|
-
case 'microsoft': {
|
|
272
|
-
const microsoft = purest({
|
|
273
|
-
provider: 'microsoft',
|
|
274
|
-
config: purestConfig,
|
|
275
|
-
});
|
|
276
|
-
|
|
277
|
-
microsoft
|
|
278
|
-
.query()
|
|
279
|
-
.get('me')
|
|
280
|
-
.auth(access_token)
|
|
281
|
-
.request((err, res, body) => {
|
|
282
|
-
if (err) {
|
|
283
|
-
callback(err);
|
|
284
|
-
} else {
|
|
285
|
-
callback(null, {
|
|
286
|
-
username: body.userPrincipalName,
|
|
287
|
-
email: body.userPrincipalName,
|
|
288
|
-
});
|
|
289
|
-
}
|
|
290
|
-
});
|
|
291
|
-
break;
|
|
292
|
-
}
|
|
293
|
-
case 'twitter': {
|
|
294
|
-
const twitter = purest({
|
|
295
|
-
provider: 'twitter',
|
|
296
|
-
config: purestConfig,
|
|
297
|
-
key: grant.twitter.key,
|
|
298
|
-
secret: grant.twitter.secret,
|
|
299
|
-
});
|
|
300
|
-
|
|
301
|
-
twitter
|
|
302
|
-
.query()
|
|
303
|
-
.get('account/verify_credentials')
|
|
304
|
-
.auth(access_token, query.access_secret)
|
|
305
|
-
.qs({ screen_name: query['raw[screen_name]'], include_email: 'true' })
|
|
306
|
-
.request((err, res, body) => {
|
|
307
|
-
if (err) {
|
|
308
|
-
callback(err);
|
|
309
|
-
} else {
|
|
310
|
-
callback(null, {
|
|
311
|
-
username: body.screen_name,
|
|
312
|
-
email: body.email,
|
|
313
|
-
});
|
|
314
|
-
}
|
|
315
|
-
});
|
|
316
|
-
break;
|
|
317
|
-
}
|
|
318
|
-
case 'instagram': {
|
|
319
|
-
const instagram = purest({
|
|
320
|
-
provider: 'instagram',
|
|
321
|
-
key: grant.instagram.key,
|
|
322
|
-
secret: grant.instagram.secret,
|
|
323
|
-
config: purestConfig,
|
|
324
|
-
});
|
|
325
|
-
|
|
326
|
-
instagram
|
|
327
|
-
.query()
|
|
328
|
-
.get('me')
|
|
329
|
-
.qs({ access_token, fields: 'id,username' })
|
|
330
|
-
.request((err, res, body) => {
|
|
331
|
-
if (err) {
|
|
332
|
-
callback(err);
|
|
333
|
-
} else {
|
|
334
|
-
callback(null, {
|
|
335
|
-
username: body.username,
|
|
336
|
-
email: `${body.username}@strapi.io`, // dummy email as Instagram does not provide user email
|
|
337
|
-
});
|
|
338
|
-
}
|
|
339
|
-
});
|
|
340
|
-
break;
|
|
341
|
-
}
|
|
342
|
-
case 'vk': {
|
|
343
|
-
const vk = purest({
|
|
344
|
-
provider: 'vk',
|
|
345
|
-
config: purestConfig,
|
|
346
|
-
});
|
|
347
|
-
|
|
348
|
-
vk.query()
|
|
349
|
-
.get('users.get')
|
|
350
|
-
.qs({ access_token, id: query.raw.user_id, v: '5.122' })
|
|
351
|
-
.request((err, res, body) => {
|
|
352
|
-
if (err) {
|
|
353
|
-
callback(err);
|
|
354
|
-
} else {
|
|
355
|
-
callback(null, {
|
|
356
|
-
username: `${body.response[0].last_name} ${body.response[0].first_name}`,
|
|
357
|
-
email: query.raw.email,
|
|
358
|
-
});
|
|
359
|
-
}
|
|
360
|
-
});
|
|
361
|
-
break;
|
|
362
|
-
}
|
|
363
|
-
case 'twitch': {
|
|
364
|
-
const twitch = purest({
|
|
365
|
-
provider: 'twitch',
|
|
366
|
-
config: {
|
|
367
|
-
twitch: {
|
|
368
|
-
'https://api.twitch.tv': {
|
|
369
|
-
__domain: {
|
|
370
|
-
auth: {
|
|
371
|
-
headers: {
|
|
372
|
-
Authorization: 'Bearer [0]',
|
|
373
|
-
'Client-ID': '[1]',
|
|
374
|
-
},
|
|
375
|
-
},
|
|
376
|
-
},
|
|
377
|
-
'helix/{endpoint}': {
|
|
378
|
-
__path: {
|
|
379
|
-
alias: '__default',
|
|
380
|
-
},
|
|
381
|
-
},
|
|
382
|
-
'oauth2/{endpoint}': {
|
|
383
|
-
__path: {
|
|
384
|
-
alias: 'oauth',
|
|
385
|
-
},
|
|
386
|
-
},
|
|
387
|
-
},
|
|
388
|
-
},
|
|
389
|
-
},
|
|
390
|
-
});
|
|
391
|
-
|
|
392
|
-
twitch
|
|
393
|
-
.get('users')
|
|
394
|
-
.auth(access_token, grant.twitch.key)
|
|
395
|
-
.request((err, res, body) => {
|
|
396
|
-
if (err) {
|
|
397
|
-
callback(err);
|
|
398
|
-
} else {
|
|
399
|
-
callback(null, {
|
|
400
|
-
username: body.data[0].login,
|
|
401
|
-
email: body.data[0].email,
|
|
402
|
-
});
|
|
403
|
-
}
|
|
404
|
-
});
|
|
405
|
-
break;
|
|
406
|
-
}
|
|
407
|
-
case 'linkedin': {
|
|
408
|
-
const linkedIn = purest({
|
|
409
|
-
provider: 'linkedin',
|
|
410
|
-
config: {
|
|
411
|
-
linkedin: {
|
|
412
|
-
'https://api.linkedin.com': {
|
|
413
|
-
__domain: {
|
|
414
|
-
auth: [{ auth: { bearer: '[0]' } }],
|
|
415
|
-
},
|
|
416
|
-
'[version]/{endpoint}': {
|
|
417
|
-
__path: {
|
|
418
|
-
alias: '__default',
|
|
419
|
-
version: 'v2',
|
|
420
|
-
},
|
|
421
|
-
},
|
|
422
|
-
},
|
|
423
|
-
},
|
|
424
|
-
},
|
|
425
|
-
});
|
|
426
|
-
try {
|
|
427
|
-
const getDetailsRequest = () => {
|
|
428
|
-
return new Promise((resolve, reject) => {
|
|
429
|
-
linkedIn
|
|
430
|
-
.query()
|
|
431
|
-
.get('me')
|
|
432
|
-
.auth(access_token)
|
|
433
|
-
.request((err, res, body) => {
|
|
434
|
-
if (err) {
|
|
435
|
-
return reject(err);
|
|
436
|
-
}
|
|
437
|
-
resolve(body);
|
|
438
|
-
});
|
|
439
|
-
});
|
|
440
|
-
};
|
|
441
|
-
|
|
442
|
-
const getEmailRequest = () => {
|
|
443
|
-
return new Promise((resolve, reject) => {
|
|
444
|
-
linkedIn
|
|
445
|
-
.query()
|
|
446
|
-
.get('emailAddress?q=members&projection=(elements*(handle~))')
|
|
447
|
-
.auth(access_token)
|
|
448
|
-
.request((err, res, body) => {
|
|
449
|
-
if (err) {
|
|
450
|
-
return reject(err);
|
|
451
|
-
}
|
|
452
|
-
resolve(body);
|
|
453
|
-
});
|
|
454
|
-
});
|
|
455
|
-
};
|
|
456
|
-
|
|
457
|
-
const { localizedFirstName } = await getDetailsRequest();
|
|
458
|
-
const { elements } = await getEmailRequest();
|
|
459
|
-
const email = elements[0]['handle~'];
|
|
460
|
-
|
|
461
|
-
callback(null, {
|
|
462
|
-
username: localizedFirstName,
|
|
463
|
-
email: email.emailAddress,
|
|
464
|
-
});
|
|
465
|
-
} catch (err) {
|
|
466
|
-
callback(err);
|
|
467
|
-
}
|
|
468
|
-
break;
|
|
469
|
-
}
|
|
470
|
-
case 'reddit': {
|
|
471
|
-
const reddit = purest({
|
|
472
|
-
provider: 'reddit',
|
|
473
|
-
config: purestConfig,
|
|
474
|
-
defaults: {
|
|
475
|
-
headers: {
|
|
476
|
-
'user-agent': 'strapi',
|
|
477
|
-
},
|
|
478
|
-
},
|
|
479
|
-
});
|
|
480
|
-
|
|
481
|
-
reddit
|
|
482
|
-
.query('auth')
|
|
483
|
-
.get('me')
|
|
484
|
-
.auth(access_token)
|
|
485
|
-
.request((err, res, body) => {
|
|
486
|
-
if (err) {
|
|
487
|
-
callback(err);
|
|
488
|
-
} else {
|
|
489
|
-
callback(null, {
|
|
490
|
-
username: body.name,
|
|
491
|
-
email: `${body.name}@strapi.io`, // dummy email as Reddit does not provide user email
|
|
492
|
-
});
|
|
493
|
-
}
|
|
494
|
-
});
|
|
495
|
-
break;
|
|
496
|
-
}
|
|
497
|
-
case 'auth0': {
|
|
498
|
-
const purestAuth0Conf = {};
|
|
499
|
-
purestAuth0Conf[`https://${grant.auth0.subdomain}.auth0.com`] = {
|
|
500
|
-
__domain: {
|
|
501
|
-
auth: {
|
|
502
|
-
auth: { bearer: '[0]' },
|
|
503
|
-
},
|
|
504
|
-
},
|
|
505
|
-
'{endpoint}': {
|
|
506
|
-
__path: {
|
|
507
|
-
alias: '__default',
|
|
508
|
-
},
|
|
509
|
-
},
|
|
510
|
-
};
|
|
511
|
-
const auth0 = purest({
|
|
512
|
-
provider: 'auth0',
|
|
513
|
-
config: {
|
|
514
|
-
auth0: purestAuth0Conf,
|
|
515
|
-
},
|
|
516
|
-
});
|
|
517
|
-
|
|
518
|
-
auth0
|
|
519
|
-
.get('userinfo')
|
|
520
|
-
.auth(access_token)
|
|
521
|
-
.request((err, res, body) => {
|
|
522
|
-
if (err) {
|
|
523
|
-
callback(err);
|
|
524
|
-
} else {
|
|
525
|
-
const username =
|
|
526
|
-
body.username || body.nickname || body.name || body.email.split('@')[0];
|
|
527
|
-
const email = body.email || `${username.replace(/\s+/g, '.')}@strapi.io`;
|
|
528
|
-
|
|
529
|
-
callback(null, {
|
|
530
|
-
username,
|
|
531
|
-
email,
|
|
532
|
-
});
|
|
533
|
-
}
|
|
534
|
-
});
|
|
535
|
-
break;
|
|
536
|
-
}
|
|
537
|
-
case 'cas': {
|
|
538
|
-
const provider_url = 'https://' + _.get(grant['cas'], 'subdomain');
|
|
539
|
-
const cas = purest({
|
|
540
|
-
provider: 'cas',
|
|
541
|
-
config: {
|
|
542
|
-
cas: {
|
|
543
|
-
[provider_url]: {
|
|
544
|
-
__domain: {
|
|
545
|
-
auth: {
|
|
546
|
-
auth: { bearer: '[0]' },
|
|
547
|
-
},
|
|
548
|
-
},
|
|
549
|
-
'{endpoint}': {
|
|
550
|
-
__path: {
|
|
551
|
-
alias: '__default',
|
|
552
|
-
},
|
|
553
|
-
},
|
|
554
|
-
},
|
|
555
|
-
},
|
|
556
|
-
},
|
|
557
|
-
});
|
|
558
|
-
cas
|
|
559
|
-
.query()
|
|
560
|
-
.get('oidc/profile')
|
|
561
|
-
.auth(access_token)
|
|
562
|
-
.request((err, res, body) => {
|
|
563
|
-
if (err) {
|
|
564
|
-
callback(err);
|
|
565
|
-
} else {
|
|
566
|
-
// CAS attribute may be in body.attributes or "FLAT", depending on CAS config
|
|
567
|
-
const username = body.attributes
|
|
568
|
-
? body.attributes.strapiusername || body.id || body.sub
|
|
569
|
-
: body.strapiusername || body.id || body.sub;
|
|
570
|
-
const email = body.attributes
|
|
571
|
-
? body.attributes.strapiemail || body.attributes.email
|
|
572
|
-
: body.strapiemail || body.email;
|
|
573
|
-
if (!username || !email) {
|
|
574
|
-
strapi.log.warn(
|
|
575
|
-
'CAS Response Body did not contain required attributes: ' + JSON.stringify(body)
|
|
576
|
-
);
|
|
577
|
-
}
|
|
578
|
-
callback(null, {
|
|
579
|
-
username,
|
|
580
|
-
email,
|
|
581
|
-
});
|
|
582
|
-
}
|
|
583
|
-
});
|
|
584
|
-
break;
|
|
585
|
-
}
|
|
586
|
-
default:
|
|
587
|
-
callback(new Error('Unknown provider.'));
|
|
588
|
-
break;
|
|
589
|
-
}
|
|
590
|
-
};
|
|
591
|
-
|
|
592
|
-
const buildRedirectUri = (provider = '') =>
|
|
593
|
-
`${getAbsoluteServerUrl(strapi.config)}/connect/${provider}/callback`;
|
|
594
|
-
|
|
595
|
-
module.exports = {
|
|
596
|
-
connect,
|
|
597
|
-
buildRedirectUri,
|
|
598
|
-
};
|