mirror of
https://github.com/docmost/docmost.git
synced 2025-11-13 04:42:37 +10:00
* stripe init git submodules for enterprise modules * * Cloud billing UI - WIP * Proxy websockets in dev mode * Separate workspace login and creation for cloud * Other fixes * feat: billing (cloud) * * add domain service * prepare links from workspace hostname * WIP * Add exchange token generation * Validate JWT token type during verification * domain service * add SkipTransform decorator * * updates (server) * add new packages * new sso migration file * WIP * Fix hostname generation * WIP * WIP * Reduce input error font-size * set max password length * jwt package * license page - WIP * * License management UI * Move license key store to db * add reflector * SSO enforcement * * Add default plan * Add usePlan hook * * Fix auth container margin in mobile * Redirect login and home to select page in cloud * update .gitignore * Default to yearly * * Trial messaging * Handle ended trials * Don't set to readonly on collab disconnect (Cloud) * Refine trial (UI) * Fix bug caused by using jotai optics atom in AppHeader component * configurable database maximum pool * Close SSO form on save * wip * sync * Only show sign-in in cloud * exclude base api part from workspaceId check * close db connection beforeApplicationShutdown * Add health/live endpoint * clear cookie on hostname change * reset currentUser atom * Change text * return 401 if workspace does not match * feat: show user workspace list in cloud login page * sync * Add home path * Prefetch to speed up queries * * Add robots.txt * Disallow login and forgot password routes * wildcard user-agent * Fix space query cache * fix * fix * use space uuid for recent pages * prefetch billing plans * enhance license page * sync
79 lines
2.4 KiB
TypeScript
79 lines
2.4 KiB
TypeScript
import { Extension, onAuthenticatePayload } from '@hocuspocus/server';
|
|
import {
|
|
Injectable,
|
|
Logger,
|
|
NotFoundException,
|
|
UnauthorizedException,
|
|
} from '@nestjs/common';
|
|
import { TokenService } from '../../core/auth/services/token.service';
|
|
import { UserRepo } from '@docmost/db/repos/user/user.repo';
|
|
import { PageRepo } from '@docmost/db/repos/page/page.repo';
|
|
import { SpaceMemberRepo } from '@docmost/db/repos/space/space-member.repo';
|
|
import { findHighestUserSpaceRole } from '@docmost/db/repos/space/utils';
|
|
import { SpaceRole } from '../../common/helpers/types/permission';
|
|
import { getPageId } from '../collaboration.util';
|
|
import { JwtCollabPayload, JwtType } from '../../core/auth/dto/jwt-payload';
|
|
|
|
@Injectable()
|
|
export class AuthenticationExtension implements Extension {
|
|
private readonly logger = new Logger(AuthenticationExtension.name);
|
|
|
|
constructor(
|
|
private tokenService: TokenService,
|
|
private userRepo: UserRepo,
|
|
private pageRepo: PageRepo,
|
|
private readonly spaceMemberRepo: SpaceMemberRepo,
|
|
) {}
|
|
|
|
async onAuthenticate(data: onAuthenticatePayload) {
|
|
const { documentName, token } = data;
|
|
const pageId = getPageId(documentName);
|
|
|
|
let jwtPayload: JwtCollabPayload;
|
|
|
|
try {
|
|
jwtPayload = await this.tokenService.verifyJwt(token, JwtType.COLLAB);
|
|
} catch (error) {
|
|
throw new UnauthorizedException('Invalid collab token');
|
|
}
|
|
|
|
const userId = jwtPayload.sub;
|
|
const workspaceId = jwtPayload.workspaceId;
|
|
|
|
const user = await this.userRepo.findById(userId, workspaceId);
|
|
|
|
if (!user) {
|
|
throw new UnauthorizedException();
|
|
}
|
|
|
|
const page = await this.pageRepo.findById(pageId);
|
|
if (!page) {
|
|
this.logger.warn(`Page not found: ${pageId}`);
|
|
throw new NotFoundException('Page not found');
|
|
}
|
|
|
|
const userSpaceRoles = await this.spaceMemberRepo.getUserSpaceRoles(
|
|
user.id,
|
|
page.spaceId,
|
|
);
|
|
|
|
const userSpaceRole = findHighestUserSpaceRole(userSpaceRoles);
|
|
|
|
if (!userSpaceRole) {
|
|
this.logger.warn(`User not authorized to access page: ${pageId}`);
|
|
throw new UnauthorizedException();
|
|
}
|
|
|
|
if (userSpaceRole === SpaceRole.READER) {
|
|
data.connection.readOnly = true;
|
|
this.logger.debug(`User granted readonly access to page: ${pageId}`);
|
|
}
|
|
|
|
this.logger.debug(`Authenticated user ${user.id} on page ${pageId}`);
|
|
|
|
return {
|
|
user,
|
|
};
|
|
}
|
|
}
|