123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- // Copyright (c) 2014 Sandstorm Development Group, Inc. and contributors
- // Licensed under the MIT License:
- //
- // Permission is hereby granted, free of charge, to any person obtaining a copy
- // of this software and associated documentation files (the "Software"), to deal
- // in the Software without restriction, including without limitation the rights
- // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- // copies of the Software, and to permit persons to whom the Software is
- // furnished to do so, subject to the following conditions:
- //
- // The above copyright notice and this permission notice shall be included in
- // all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
- // THE SOFTWARE.
- if (process.env.SANDSTORM) {
- __meteor_runtime_config__.SANDSTORM = true;
- }
- if (__meteor_runtime_config__.SANDSTORM) {
- if (Package["accounts-base"]) {
- // Highlander Mode: Disable all non-Sandstorm login mechanisms.
- Package["accounts-base"].Accounts.validateLoginAttempt(function (attempt) {
- if (!attempt.allowed) {
- return false;
- }
- if (attempt.type !== "sandstorm") {
- throw new Meteor.Error(403, "Non-Sandstorm login mechanisms disabled on Sandstorm.");
- }
- return true;
- });
- Package["accounts-base"].Accounts.validateNewUser(function (user) {
- if (!user.services.sandstorm) {
- throw new Meteor.Error(403, "Non-Sandstorm login mechanisms disabled on Sandstorm.");
- }
- return true;
- });
- }
- var Future = Npm.require("fibers/future");
- var inMeteor = Meteor.bindEnvironment(function (callback) {
- callback();
- });
- var logins = {};
- // Maps tokens to currently-waiting login method calls.
- if (Package["accounts-base"]) {
- Meteor.users.createIndex("services.sandstorm.id", {unique: 1, sparse: 1});
- }
- Meteor.onConnection(function (connection) {
- connection._sandstormUser = null;
- connection._sandstormSessionId = null;
- connection._sandstormTabId = null;
- connection.sandstormUser = function () {
- if (!connection._sandstormUser) {
- throw new Meteor.Error(400, "Client did not complete authentication handshake.");
- }
- return this._sandstormUser;
- };
- connection.sandstormSessionId = function () {
- if (!connection._sandstormUser) {
- throw new Meteor.Error(400, "Client did not complete authentication handshake.");
- }
- return this._sandstormSessionId;
- }
- connection.sandstormTabId = function () {
- if (!connection._sandstormUser) {
- throw new Meteor.Error(400, "Client did not complete authentication handshake.");
- }
- return this._sandstormTabId;
- }
- });
- Meteor.methods({
- loginWithSandstorm: function (token) {
- check(token, String);
- var future = new Future();
- logins[token] = future;
- var timeout = setTimeout(function () {
- future.throw(new Meteor.Error("timeout", "Gave up waiting for login rendezvous XHR."));
- }, 10000);
- var info;
- try {
- info = future.wait();
- } finally {
- clearTimeout(timeout);
- delete logins[token];
- }
- // Set connection info. The call to setUserId() resets all publishes. We update the
- // connection's sandstorm info first so that when the publishes are re-run they'll see the
- // new info. In theory we really want to update it exactly when this.userId is updated, but
- // we'd have to dig into Meteor internals to pull that off. Probably updating it a little
- // early is fine?
- //
- // Note that calling setUserId() with the same ID a second time still goes through the motions
- // of restarting all subscriptions, which is important if the permissions changed. Hopefully
- // Meteor won't decide to "optimize" this by returning early if the user ID hasn't changed.
- this.connection._sandstormUser = info.sandstorm;
- this.connection._sandstormSessionId = info.sessionId;
- this.connection._sandstormTabId = info.tabId;
- this.setUserId(info.userId);
- return info;
- }
- });
- WebApp.rawConnectHandlers.use(function (req, res, next) {
- if (req.url === "/.sandstorm-login") {
- handlePostToken(req, res);
- return;
- }
- return next();
- });
- function readAll(stream) {
- var future = new Future();
- var chunks = [];
- stream.on("data", function (chunk) {
- chunks.push(chunk.toString());
- });
- stream.on("error", function (err) {
- future.throw(err);
- });
- stream.on("end", function () {
- future.return();
- });
- future.wait();
- return chunks.join("");
- }
- var handlePostToken = Meteor.bindEnvironment(function (req, res) {
- inMeteor(function () {
- try {
- // Note that cross-origin POSTs cannot set arbitrary Content-Types without explicit CORS
- // permission, so this effectively prevents XSRF.
- if (req.headers["content-type"].split(";")[0].trim() !== "application/x-sandstorm-login-token") {
- throw new Error("wrong Content-Type for .sandstorm-login: " + req.headers["content-type"]);
- }
- var token = readAll(req);
- var future = logins[token];
- if (!future) {
- throw new Error("no current login request matching token");
- }
- var permissions = req.headers["x-sandstorm-permissions"];
- if (permissions && permissions !== "") {
- permissions = permissions.split(",");
- } else {
- permissions = [];
- }
- var sandstormInfo = {
- id: req.headers["x-sandstorm-user-id"] || null,
- name: decodeURIComponent(req.headers["x-sandstorm-username"]),
- permissions: permissions,
- picture: req.headers["x-sandstorm-user-picture"] || null,
- preferredHandle: req.headers["x-sandstorm-preferred-handle"] || null,
- pronouns: req.headers["x-sandstorm-user-pronouns"] || null,
- };
- var userInfo = {sandstorm: sandstormInfo};
- if (Package["accounts-base"]) {
- if (sandstormInfo.id) {
- // The user is logged into Sandstorm. Create a Meteor account for them, or find the
- // existing one, and record the user ID.
- var login = Package["accounts-base"].Accounts.updateOrCreateUserFromExternalService(
- "sandstorm", sandstormInfo, {profile: {name: sandstormInfo.name}});
- userInfo.userId = login.userId;
- } else {
- userInfo.userId = null;
- }
- } else {
- // Since the app isn't using regular Meteor accounts, we can define Meteor.userId()
- // however we want.
- userInfo.userId = sandstormInfo.id;
- }
- userInfo.sessionId = req.headers["x-sandstorm-session-id"] || null;
- userInfo.tabId = req.headers["x-sandstorm-tab-id"] || null;
- future.return(userInfo);
- res.writeHead(204, {});
- res.end();
- } catch (err) {
- res.writeHead(500, {
- "Content-Type": "text/plain"
- });
- res.end(err.stack);
- }
- });
- });
- }
|