authentication.mjs 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. import _ from 'lodash-es'
  2. import { generateError, generateSuccess } from '../../helpers/graph.mjs'
  3. import jwt from 'jsonwebtoken'
  4. import ms from 'ms'
  5. import { DateTime } from 'luxon'
  6. export default {
  7. Query: {
  8. /**
  9. * List of API Keys
  10. */
  11. async apiKeys (obj, args, context) {
  12. const keys = await WIKI.db.apiKeys.query().orderBy(['isRevoked', 'name'])
  13. return keys.map(k => ({
  14. id: k.id,
  15. name: k.name,
  16. keyShort: '...' + k.key.substring(k.key.length - 20),
  17. isRevoked: k.isRevoked,
  18. expiration: k.expiration,
  19. createdAt: k.createdAt,
  20. updatedAt: k.updatedAt
  21. }))
  22. },
  23. /**
  24. * Current API State
  25. */
  26. apiState () {
  27. return WIKI.config.api.isEnabled
  28. },
  29. /**
  30. * Fetch authentication strategies
  31. */
  32. async authStrategies () {
  33. return WIKI.data.authentication.map(stg => ({
  34. ...stg,
  35. isAvailable: stg.isAvailable === true
  36. }))
  37. },
  38. /**
  39. * Fetch active authentication strategies
  40. */
  41. async authActiveStrategies (obj, args, context) {
  42. return WIKI.db.authentication.getStrategies({ enabledOnly: args.enabledOnly })
  43. },
  44. /**
  45. * Fetch site authentication strategies
  46. */
  47. async authSiteStrategies (obj, args, context, info) {
  48. const site = await WIKI.db.sites.query().findById(args.siteId)
  49. const activeStrategies = await WIKI.db.authentication.getStrategies({ enabledOnly: true })
  50. return activeStrategies.map(str => {
  51. const siteAuth = _.find(site.config.authStrategies, ['id', str.id]) || {}
  52. return {
  53. id: str.id,
  54. activeStrategy: str,
  55. order: siteAuth.order ?? 0,
  56. isVisible: siteAuth.isVisible ?? false
  57. }
  58. })
  59. }
  60. },
  61. Mutation: {
  62. /**
  63. * Create New API Key
  64. */
  65. async createApiKey (obj, args, context) {
  66. try {
  67. const key = await WIKI.db.apiKeys.createNewKey(args)
  68. await WIKI.auth.reloadApiKeys()
  69. WIKI.events.outbound.emit('reloadApiKeys')
  70. return {
  71. key,
  72. operation: generateSuccess('API Key created successfully')
  73. }
  74. } catch (err) {
  75. WIKI.logger.warn(err)
  76. return generateError(err)
  77. }
  78. },
  79. /**
  80. * Perform Login
  81. */
  82. async login (obj, args, context) {
  83. try {
  84. const authResult = await WIKI.db.users.login(args, context)
  85. return {
  86. ...authResult,
  87. operation: generateSuccess('Login success')
  88. }
  89. } catch (err) {
  90. // LDAP Debug Flag
  91. if (args.strategy === 'ldap' && WIKI.config.flags.ldapdebug) {
  92. WIKI.logger.warn('LDAP LOGIN ERROR (c1): ', err)
  93. }
  94. console.error(err)
  95. return generateError(err)
  96. }
  97. },
  98. /**
  99. * Perform 2FA Login
  100. */
  101. async loginTFA (obj, args, context) {
  102. try {
  103. const authResult = await WIKI.db.users.loginTFA(args, context)
  104. return {
  105. ...authResult,
  106. responseResult: generateSuccess('TFA success')
  107. }
  108. } catch (err) {
  109. return generateError(err)
  110. }
  111. },
  112. /**
  113. * Perform Password Change
  114. */
  115. async changePassword (obj, args, context) {
  116. try {
  117. const authResult = await WIKI.db.users.loginChangePassword(args, context)
  118. return {
  119. ...authResult,
  120. responseResult: generateSuccess('Password changed successfully')
  121. }
  122. } catch (err) {
  123. return generateError(err)
  124. }
  125. },
  126. /**
  127. * Perform Forget Password
  128. */
  129. async forgotPassword (obj, args, context) {
  130. try {
  131. await WIKI.db.users.loginForgotPassword(args, context)
  132. return {
  133. responseResult: generateSuccess('Password reset request processed.')
  134. }
  135. } catch (err) {
  136. return generateError(err)
  137. }
  138. },
  139. /**
  140. * Register a new account
  141. */
  142. async register (obj, args, context) {
  143. try {
  144. await WIKI.db.users.register({ ...args, verify: true }, context)
  145. return {
  146. responseResult: generateSuccess('Registration success')
  147. }
  148. } catch (err) {
  149. return generateError(err)
  150. }
  151. },
  152. /**
  153. * Refresh Token
  154. */
  155. async refreshToken (obj, args, context) {
  156. try {
  157. let decoded = {}
  158. if (!args.token) {
  159. throw new Error('ERR_MISSING_TOKEN')
  160. }
  161. try {
  162. decoded = jwt.verify(args.token, WIKI.config.auth.certs.public, {
  163. audience: WIKI.config.auth.audience,
  164. issuer: 'urn:wiki.js',
  165. algorithms: ['RS256'],
  166. ignoreExpiration: true
  167. })
  168. } catch (err) {
  169. throw new Error('ERR_INVALID_TOKEN')
  170. }
  171. if (DateTime.utc().minus(ms(WIKI.config.auth.tokenRenewal)) > DateTime.fromSeconds(decoded.exp)) {
  172. throw new Error('ERR_EXPIRED_TOKEN')
  173. }
  174. const newToken = await WIKI.db.users.refreshToken(decoded.id)
  175. return {
  176. jwt: newToken.token,
  177. operation: generateSuccess('Token refreshed successfully')
  178. }
  179. } catch (err) {
  180. return generateError(err)
  181. }
  182. },
  183. /**
  184. * Set API state
  185. */
  186. async setApiState (obj, args, context) {
  187. try {
  188. WIKI.config.api.isEnabled = args.enabled
  189. await WIKI.configSvc.saveToDb(['api'])
  190. return {
  191. operation: generateSuccess('API State changed successfully')
  192. }
  193. } catch (err) {
  194. return generateError(err)
  195. }
  196. },
  197. /**
  198. * Revoke an API key
  199. */
  200. async revokeApiKey (obj, args, context) {
  201. try {
  202. await WIKI.db.apiKeys.query().findById(args.id).patch({
  203. isRevoked: true
  204. })
  205. await WIKI.auth.reloadApiKeys()
  206. WIKI.events.outbound.emit('reloadApiKeys')
  207. return {
  208. operation: generateSuccess('API Key revoked successfully')
  209. }
  210. } catch (err) {
  211. return generateError(err)
  212. }
  213. },
  214. /**
  215. * Update Authentication Strategies
  216. */
  217. async updateAuthStrategies (obj, args, context) {
  218. try {
  219. const previousStrategies = await WIKI.db.authentication.getStrategies()
  220. for (const str of args.strategies) {
  221. const newStr = {
  222. displayName: str.displayName,
  223. order: str.order,
  224. isEnabled: str.isEnabled,
  225. config: _.reduce(str.config, (result, value, key) => {
  226. _.set(result, `${value.key}`, _.get(JSON.parse(value.value), 'v', null))
  227. return result
  228. }, {}),
  229. selfRegistration: str.selfRegistration,
  230. domainWhitelist: { v: str.domainWhitelist },
  231. autoEnrollGroups: { v: str.autoEnrollGroups }
  232. }
  233. if (_.some(previousStrategies, ['key', str.key])) {
  234. await WIKI.db.authentication.query().patch({
  235. key: str.key,
  236. strategyKey: str.strategyKey,
  237. ...newStr
  238. }).where('key', str.key)
  239. } else {
  240. await WIKI.db.authentication.query().insert({
  241. key: str.key,
  242. strategyKey: str.strategyKey,
  243. ...newStr
  244. })
  245. }
  246. }
  247. for (const str of _.differenceBy(previousStrategies, args.strategies, 'key')) {
  248. const hasUsers = await WIKI.db.users.query().count('* as total').where({ providerKey: str.key }).first()
  249. if (_.toSafeInteger(hasUsers.total) > 0) {
  250. throw new Error(`Cannot delete ${str.displayName} as 1 or more users are still using it.`)
  251. } else {
  252. await WIKI.db.authentication.query().delete().where('key', str.key)
  253. }
  254. }
  255. await WIKI.auth.activateStrategies()
  256. WIKI.events.outbound.emit('reloadAuthStrategies')
  257. return {
  258. responseResult: generateSuccess('Strategies updated successfully')
  259. }
  260. } catch (err) {
  261. return generateError(err)
  262. }
  263. },
  264. /**
  265. * Generate New Authentication Public / Private Key Certificates
  266. */
  267. async regenerateCertificates (obj, args, context) {
  268. try {
  269. await WIKI.auth.regenerateCertificates()
  270. return {
  271. responseResult: generateSuccess('Certificates have been regenerated successfully.')
  272. }
  273. } catch (err) {
  274. return generateError(err)
  275. }
  276. },
  277. /**
  278. * Reset Guest User
  279. */
  280. async resetGuestUser (obj, args, context) {
  281. try {
  282. await WIKI.auth.resetGuestUser()
  283. return {
  284. responseResult: generateSuccess('Guest user has been reset successfully.')
  285. }
  286. } catch (err) {
  287. return generateError(err)
  288. }
  289. }
  290. },
  291. AuthenticationActiveStrategy: {
  292. strategy (obj, args, context) {
  293. return _.find(WIKI.data.authentication, ['key', obj.module])
  294. }
  295. }
  296. }