auth deploy
This commit is contained in:
parent
757b85cabb
commit
7a45538d69
122
app/assets/auth/forms.css
Normal file
122
app/assets/auth/forms.css
Normal file
@ -0,0 +1,122 @@
|
||||
:root {
|
||||
--input-padding-x: 1.5rem;
|
||||
--input-padding-y: 0.75rem;
|
||||
}
|
||||
|
||||
.login,
|
||||
.image {
|
||||
min-height: 100vh;
|
||||
}
|
||||
|
||||
.bg-image {
|
||||
background-image: url('https://source.unsplash.com/4812YdII6W0/2592x1728');
|
||||
background-size: cover;
|
||||
background-position: center;
|
||||
}
|
||||
|
||||
.login-heading {
|
||||
font-weight: 300;
|
||||
}
|
||||
|
||||
.btn-login {
|
||||
font-size: 0.9rem;
|
||||
letter-spacing: 0.05rem;
|
||||
padding: 0.75rem 1rem;
|
||||
border-radius: 2rem;
|
||||
}
|
||||
|
||||
.form-label-group {
|
||||
position: relative;
|
||||
margin-bottom: 1rem;
|
||||
}
|
||||
|
||||
.form-label-group>input,
|
||||
.form-label-group>label {
|
||||
padding: var(--input-padding-y) var(--input-padding-x);
|
||||
height: auto;
|
||||
border-radius: 2rem;
|
||||
}
|
||||
|
||||
.form-label-group>label {
|
||||
position: absolute;
|
||||
top: 0;
|
||||
left: 0;
|
||||
display: block;
|
||||
width: 100%;
|
||||
margin-bottom: 0;
|
||||
/* Override default `<label>` margin */
|
||||
line-height: 1.5;
|
||||
color: #495057;
|
||||
cursor: text;
|
||||
/* Match the input under the label */
|
||||
border: 1px solid transparent;
|
||||
border-radius: .25rem;
|
||||
transition: all .1s ease-in-out;
|
||||
}
|
||||
|
||||
.form-label-group input::-webkit-input-placeholder {
|
||||
color: transparent;
|
||||
}
|
||||
|
||||
.form-label-group input:-ms-input-placeholder {
|
||||
color: transparent;
|
||||
}
|
||||
|
||||
.form-label-group input::-ms-input-placeholder {
|
||||
color: transparent;
|
||||
}
|
||||
|
||||
.form-label-group input::-moz-placeholder {
|
||||
color: transparent;
|
||||
}
|
||||
|
||||
.form-label-group input::placeholder {
|
||||
color: transparent;
|
||||
}
|
||||
|
||||
.form-label-group input:not(:placeholder-shown) {
|
||||
padding-top: calc(var(--input-padding-y) + var(--input-padding-y) * (2 / 3));
|
||||
padding-bottom: calc(var(--input-padding-y) / 3);
|
||||
}
|
||||
|
||||
.form-label-group input:not(:placeholder-shown)~label {
|
||||
padding-top: calc(var(--input-padding-y) / 3);
|
||||
padding-bottom: calc(var(--input-padding-y) / 3);
|
||||
font-size: 12px;
|
||||
color: #777;
|
||||
}
|
||||
|
||||
.form-error-message {
|
||||
color: red;
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
.form-submit-button {
|
||||
margin-top: 50px;
|
||||
margin-bottom: 50px;
|
||||
}
|
||||
|
||||
/* Fallback for Edge
|
||||
-------------------------------------------------- */
|
||||
|
||||
@supports (-ms-ime-align: auto) {
|
||||
.form-label-group>label {
|
||||
display: none;
|
||||
}
|
||||
.form-label-group input::-ms-input-placeholder {
|
||||
color: #777;
|
||||
}
|
||||
}
|
||||
|
||||
/* Fallback for IE
|
||||
-------------------------------------------------- */
|
||||
|
||||
@media all and (-ms-high-contrast: none),
|
||||
(-ms-high-contrast: active) {
|
||||
.form-label-group>label {
|
||||
display: none;
|
||||
}
|
||||
.form-label-group input:-ms-input-placeholder {
|
||||
color: #777;
|
||||
}
|
||||
}
|
12
app/controllers/auth/Forms.controller.js
Normal file
12
app/controllers/auth/Forms.controller.js
Normal file
@ -0,0 +1,12 @@
|
||||
const FormController = require('flitter-auth/controllers/Forms')
|
||||
|
||||
/*
|
||||
* Handles views and processing for auth registration/login/logout/etc.
|
||||
* Most handlers are inherited from the default flitter-auth/controllers/Forms
|
||||
* controller, however you can override them here as you need.
|
||||
*/
|
||||
class Forms extends FormController {
|
||||
|
||||
}
|
||||
|
||||
module.exports = exports = Forms
|
16
app/controllers/auth/KeyAction.controller.js
Normal file
16
app/controllers/auth/KeyAction.controller.js
Normal file
@ -0,0 +1,16 @@
|
||||
const Controller = require('flitter-auth/controllers/KeyAction')
|
||||
|
||||
/*
|
||||
* KeyAction Controller
|
||||
* -------------------------------------------------------------
|
||||
* Provides handler methods for flitter-auth's key actions.
|
||||
* Key actions allow your application to dynamically generate
|
||||
* one-time links that call methods on controllers and (optionally)
|
||||
* can even automatically sign in a user for the request, then log
|
||||
* them out. e.g. a password reset link could use a key action.
|
||||
*/
|
||||
class KeyAction extends Controller {
|
||||
|
||||
}
|
||||
|
||||
module.exports = exports = KeyAction
|
13
app/controllers/auth/Oauth2.controller.js
Normal file
13
app/controllers/auth/Oauth2.controller.js
Normal file
@ -0,0 +1,13 @@
|
||||
const Oauth2Controller = require('flitter-auth/controllers/Oauth2')
|
||||
|
||||
/*
|
||||
* Handles views, processing, and data retrieval for flitter-auth's
|
||||
* built-in OAuth2 server, if it is enabled. Most handlers are inherited
|
||||
* from flitter-auth/controllers/Oauth2, but you can override them here
|
||||
* as you need.
|
||||
*/
|
||||
class Oauth2 extends Oauth2Controller {
|
||||
|
||||
}
|
||||
|
||||
module.exports = exports = Oauth2
|
25
app/models/auth/KeyAction.model.js
Normal file
25
app/models/auth/KeyAction.model.js
Normal file
@ -0,0 +1,25 @@
|
||||
const Model = require('flitter-auth/model/KeyAction')
|
||||
|
||||
/*
|
||||
* KeyAction Model
|
||||
* -------------------------------------------------------------
|
||||
* Represents a single available key action. Key actions
|
||||
* are one-time use links that directly call a method on
|
||||
* a controller. These actions:
|
||||
*
|
||||
* - Can pass along context
|
||||
* - Have expiration dates
|
||||
* - Are single-use only
|
||||
* - Can automatically log in a user during the request lifecycle
|
||||
*
|
||||
* You can generate these actions using the request.security.keyaction()
|
||||
* method.
|
||||
*
|
||||
* See: module:flitter-auth/SecurityContext~SecurityContext#keyaction
|
||||
* See: module:flitter-auth/model/KeyAction~KeyAction
|
||||
*/
|
||||
class KeyAction extends Model {
|
||||
|
||||
}
|
||||
|
||||
module.exports = exports = KeyAction
|
18
app/models/auth/User.model.js
Normal file
18
app/models/auth/User.model.js
Normal file
@ -0,0 +1,18 @@
|
||||
const AuthUser = require('flitter-auth/model/User')
|
||||
|
||||
/*
|
||||
* Auth user model. This inherits fields and methods from the default
|
||||
* flitter-auth/model/User model, however you can override methods and
|
||||
* properties here as you need.
|
||||
*/
|
||||
class User extends AuthUser {
|
||||
static get schema() {
|
||||
return {...super.schema, ...{
|
||||
// other schema fields here
|
||||
}}
|
||||
}
|
||||
|
||||
// Other members and methods here
|
||||
}
|
||||
|
||||
module.exports = exports = User
|
@ -9,6 +9,7 @@
|
||||
* routes file.
|
||||
*/
|
||||
const Middleware = [
|
||||
"auth:Utility",
|
||||
|
||||
// 'MiddlewareName',
|
||||
|
||||
|
15
app/routing/middleware/auth/GuestOnly.middleware.js
Normal file
15
app/routing/middleware/auth/GuestOnly.middleware.js
Normal file
@ -0,0 +1,15 @@
|
||||
/*
|
||||
* GuestOnly Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Allows the request to proceed unless there's an authenticated user
|
||||
* in the session. If so, redirect to the auth flow destination if one
|
||||
* exists. If not, redirect to the default login route.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/GuestOnly')
|
||||
class GuestOnly extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = GuestOnly
|
12
app/routing/middleware/auth/KeyAction.middleware.js
Normal file
12
app/routing/middleware/auth/KeyAction.middleware.js
Normal file
@ -0,0 +1,12 @@
|
||||
const Middleware = require('flitter-auth/middleware/KeyAction')
|
||||
|
||||
/*
|
||||
* KeyAction Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Middleware for processing key actions.
|
||||
*/
|
||||
class KeyAction extends Middleware {
|
||||
|
||||
}
|
||||
|
||||
module.exports = exports = KeyAction
|
14
app/routing/middleware/auth/Oauth2TokenOnly.middleware.js
Normal file
14
app/routing/middleware/auth/Oauth2TokenOnly.middleware.js
Normal file
@ -0,0 +1,14 @@
|
||||
/*
|
||||
* Oauth2TokenOnly Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Allows the request to proceed if a valid OAuth2 bearer token was
|
||||
* provided. If not, return a JSON-encoded error message.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/Oauth2TokenOnly')
|
||||
class Oauth2TokenOnly extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = Oauth2TokenOnly
|
@ -0,0 +1,14 @@
|
||||
/*
|
||||
* ProviderRegistrationEnabled Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Redirects the user to the login page if the registration page for
|
||||
* a particular auth provider is not enabled.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/ProviderRegistrationEnabled')
|
||||
class ProviderRegistrationEnabled extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = ProviderRegistrationEnabled
|
15
app/routing/middleware/auth/ProviderRoute.middleware.js
Normal file
15
app/routing/middleware/auth/ProviderRoute.middleware.js
Normal file
@ -0,0 +1,15 @@
|
||||
/*
|
||||
* Auth ProviderRoute Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Many auth routes specify the name of a particular auth provider to
|
||||
* use. This middleware looks up the provider by that name and injects
|
||||
* it into the request.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/ProviderRoute')
|
||||
class ProviderRoute extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = ProviderRoute
|
15
app/routing/middleware/auth/UserOnly.middleware.js
Normal file
15
app/routing/middleware/auth/UserOnly.middleware.js
Normal file
@ -0,0 +1,15 @@
|
||||
/*
|
||||
* UserOnly Middleware
|
||||
* -------------------------------------------------------------
|
||||
* Allows the request to proceed if there's an authenticated user
|
||||
* in the session. Otherwise, redirects the user to the login page
|
||||
* of the default provider.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/UserOnly')
|
||||
class UserOnly extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = UserOnly
|
15
app/routing/middleware/auth/Utility.middleware.js
Normal file
15
app/routing/middleware/auth/Utility.middleware.js
Normal file
@ -0,0 +1,15 @@
|
||||
/*
|
||||
* Auth Utility Middleware
|
||||
* -------------------------------------------------------------
|
||||
* This should be applied globally. Ensures basic things about the
|
||||
* request are true. For example, it provides the auth session data
|
||||
* and handles auth flow.
|
||||
*/
|
||||
const Middleware = require('flitter-auth/middleware/Utility')
|
||||
class Utility extends Middleware {
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
module.exports = Utility
|
113
app/routing/routers/auth/forms.routes.js
Normal file
113
app/routing/routers/auth/forms.routes.js
Normal file
@ -0,0 +1,113 @@
|
||||
/*
|
||||
* Auth Form Routes
|
||||
* -------------------------------------------------------------
|
||||
* The routes here pertain to auth forms like register/login etc.
|
||||
* The general structure is as follows:
|
||||
*
|
||||
* /auth/{provider name}/{action}
|
||||
|
||||
* Individual providers may be interacted with individually, therefore:
|
||||
*
|
||||
* /auth/flitter/register
|
||||
*
|
||||
* You can omit the provider name to use the default provider:
|
||||
*
|
||||
* /auth/register
|
||||
*/
|
||||
const index = {
|
||||
|
||||
prefix: '/auth',
|
||||
|
||||
middleware: [
|
||||
|
||||
],
|
||||
|
||||
get: {
|
||||
'/:provider/register': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'middleware::auth:ProviderRegistrationEnabled',
|
||||
'controller::auth:Forms.registration_provider_get',
|
||||
],
|
||||
'/register': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'middleware::auth:ProviderRegistrationEnabled',
|
||||
'controller::auth:Forms.registration_provider_get',
|
||||
],
|
||||
|
||||
'/:provider/login': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'controller::auth:Forms.login_provider_get',
|
||||
],
|
||||
'/login': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'controller::auth:Forms.login_provider_get',
|
||||
],
|
||||
|
||||
'/:provider/logout': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Forms.logout_provider_clean_session',
|
||||
|
||||
// Note, this separation is between when the auth action has happened properly
|
||||
// and before the user is allowed to continue. You can use it to add your own
|
||||
// custom middleware for auth flow handling.
|
||||
|
||||
'controller::auth:Forms.logout_provider_present_success',
|
||||
],
|
||||
'/logout': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Forms.logout_provider_clean_session',
|
||||
'controller::auth:Forms.logout_provider_present_success',
|
||||
],
|
||||
},
|
||||
|
||||
post: {
|
||||
'/:provider/register': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'middleware::auth:ProviderRegistrationEnabled',
|
||||
'controller::auth:Forms.registration_provider_create_user',
|
||||
'controller::auth:Forms.registration_provider_present_user_created',
|
||||
],
|
||||
'/register': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'middleware::auth:ProviderRegistrationEnabled',
|
||||
'controller::auth:Forms.registration_provider_create_user',
|
||||
'controller::auth:Forms.registration_provider_present_user_created',
|
||||
],
|
||||
|
||||
'/:provider/login': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'controller::auth:Forms.login_provider_authenticate_user',
|
||||
'controller::auth:Forms.login_provider_present_success',
|
||||
],
|
||||
'/login': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:GuestOnly',
|
||||
'controller::auth:Forms.login_provider_authenticate_user',
|
||||
'controller::auth:Forms.login_provider_present_success',
|
||||
],
|
||||
|
||||
'/:provider/logout': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Forms.logout_provider_clean_session',
|
||||
'controller::auth:Forms.logout_provider_present_success',
|
||||
],
|
||||
'/logout': [
|
||||
'middleware::auth:ProviderRoute',
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Forms.logout_provider_clean_session',
|
||||
'controller::auth:Forms.logout_provider_present_success',
|
||||
],
|
||||
},
|
||||
}
|
||||
|
||||
module.exports = exports = index
|
16
app/routing/routers/auth/keyaction.routes.js
Normal file
16
app/routing/routers/auth/keyaction.routes.js
Normal file
@ -0,0 +1,16 @@
|
||||
module.exports = exports = {
|
||||
prefix: '/auth/action', // This is assumed by flitter-auth. Don't change it.
|
||||
middleware: [],
|
||||
get: {
|
||||
'/:key': [
|
||||
'middleware::auth:KeyAction',
|
||||
'controller::auth:KeyAction.handle',
|
||||
],
|
||||
},
|
||||
post: {
|
||||
'/:key': [
|
||||
'middleware::auth:KeyAction',
|
||||
'controller::auth:KeyAction.handle',
|
||||
],
|
||||
},
|
||||
}
|
46
app/routing/routers/auth/oauth2.routes.js
Normal file
46
app/routing/routers/auth/oauth2.routes.js
Normal file
@ -0,0 +1,46 @@
|
||||
/*
|
||||
* oauth2 Routes
|
||||
* -------------------------------------------------------------
|
||||
* Routes pertaining to the flitter-auth OAuth2 server implementation.
|
||||
*/
|
||||
const oauth2 = {
|
||||
|
||||
// Route prefix for all below routes
|
||||
prefix: '/auth/service/oauth2/',
|
||||
|
||||
middleware: [
|
||||
// Return 404 errors for these routes if the oauth2 server isn't enabled
|
||||
['util:Config', {key: 'auth.servers.oauth2.enable'}],
|
||||
],
|
||||
|
||||
get: {
|
||||
// Show the authorization page
|
||||
'/authorize': [
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Oauth2.authorize_get',
|
||||
],
|
||||
|
||||
// Built-in data endpoints
|
||||
// Get the user info using a bearer token
|
||||
'/data/user': [
|
||||
['util:Config', {key: 'auth.servers.oauth2.build_in_endpoints.user.enable'}],
|
||||
'middleware::auth:Oauth2TokenOnly',
|
||||
'controller::auth:Oauth2.data_user_get',
|
||||
],
|
||||
},
|
||||
|
||||
post: {
|
||||
// Handle a successful authorization
|
||||
'/authorize': [
|
||||
'middleware::auth:UserOnly',
|
||||
'controller::auth:Oauth2.authorize_post',
|
||||
],
|
||||
|
||||
// Redeem an authorization code for an OAuth2 bearer token
|
||||
'/redeem': [
|
||||
'controller::auth:Oauth2.redeem_token',
|
||||
],
|
||||
},
|
||||
}
|
||||
|
||||
module.exports = oauth2
|
17
app/views/auth/auth_page.pug
Normal file
17
app/views/auth/auth_page.pug
Normal file
@ -0,0 +1,17 @@
|
||||
html
|
||||
head
|
||||
title #{title} | #{_app.name}
|
||||
meta(name='viewport' content='width=device-width initial-scale=1')
|
||||
link(rel='stylesheet' href='https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css')
|
||||
link(rel='stylesheet' href='/assets/auth/forms.css')
|
||||
body
|
||||
.container-fluid
|
||||
.row.no-gutter
|
||||
.d-none.d-md-flex.col-md-6.col-lg-8.bg-image
|
||||
.col-md-6.col-lg-4
|
||||
.login.d-flex.align-items-center.py-5
|
||||
.container
|
||||
.row
|
||||
.col-md-9.col-lg-8.mx-auto
|
||||
block content
|
||||
script(src='https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css')
|
9
app/views/auth/form.pug
Normal file
9
app/views/auth/form.pug
Normal file
@ -0,0 +1,9 @@
|
||||
extends ./auth_page
|
||||
|
||||
block content
|
||||
h3.login-heading.mb-4 #{heading_text}
|
||||
if errors
|
||||
each error in errors
|
||||
p.form-error-message #{error}
|
||||
form(method='post' enctype='multipart/form-data')
|
||||
block form
|
5
app/views/auth/form_page.pug
Normal file
5
app/views/auth/form_page.pug
Normal file
@ -0,0 +1,5 @@
|
||||
extends ./auth_page
|
||||
|
||||
block content
|
||||
h3.login-heading.mb-4 #{message}
|
||||
a.btn.btn-lg.btn-primary.btn-block.btn-login.text-uppercase.font-weight-bold.mb-2.form-submit-button(href=button_link) #{button_text}
|
17
app/views/auth/login.pug
Normal file
17
app/views/auth/login.pug
Normal file
@ -0,0 +1,17 @@
|
||||
extends ./form
|
||||
|
||||
block form
|
||||
.form-label-group
|
||||
input#inputUsername.form-control(type='text' name='username' value=(form_data ? form_data.username : '') required placeholder='Username' autofocus)
|
||||
label(for='inputUsername') Username
|
||||
.form-label-group
|
||||
input#inputPassword.form-control(type='password' name='password' required placeholder='Password')
|
||||
label(for='inputPassword') Password
|
||||
button.btn.btn-lg.btn-primary.btn-block.btn-login.text-uppercase.font-weight-bold.mb-2.form-submit-button(type='submit') Login
|
||||
|
||||
if registration_enabled
|
||||
.text-center
|
||||
span.small Need an account?
|
||||
a(href='./register') Register here.
|
||||
.text-center
|
||||
span.small(style="color: #999999;") Provider: #{provider_name}
|
12
app/views/auth/oauth2_authorize.pug
Normal file
12
app/views/auth/oauth2_authorize.pug
Normal file
@ -0,0 +1,12 @@
|
||||
extends ./auth_page
|
||||
|
||||
block content
|
||||
h3.login-heading.mb-4 Authorize #{client.name}?
|
||||
h5.login-heading.mb-4 #{client.name} wants to access basic user information about your #{_app.name} account.
|
||||
h5.login-heading.mb-4 After authorization, you may not be prompted again.
|
||||
form(method='post' enctype='multipart/form-data')
|
||||
input(type='hidden' name='redirect_uri' value=uri.toString())
|
||||
input(type='hidden' name='client_id' value=client.clientID)
|
||||
button.btn.btn-lg.btn-primary.btn-block.btn-login.text-uppercase.font-weight-bold.mb-2.form-submit-button(type='submit') Authorize #{client.name}
|
||||
.text-center
|
||||
span.small(style="color: #999999;") Will redirect to: #{uri.host}
|
16
app/views/auth/register.pug
Normal file
16
app/views/auth/register.pug
Normal file
@ -0,0 +1,16 @@
|
||||
extends ./form
|
||||
|
||||
block form
|
||||
.form-label-group
|
||||
input#inputUsername.form-control(type='text' name='username' value=(form_data ? form_data.username : '') required placeholder='Username' autofocus)
|
||||
label(for='inputUsername') Username
|
||||
.form-label-group
|
||||
input#inputPassword.form-control(type='password' name='password' required placeholder='Password')
|
||||
label(for='inputPassword') Password
|
||||
button.btn.btn-lg.btn-primary.btn-block.btn-login.text-uppercase.font-weight-bold.mb-2.form-submit-button(type='submit') Register
|
||||
.text-center
|
||||
span.small Already registered?
|
||||
a(href='./login') Log-in here.
|
||||
.text-center
|
||||
span.small(style="color: #999999;") Provider: #{provider_name}
|
||||
|
177
config/auth.config.js
Normal file
177
config/auth.config.js
Normal file
@ -0,0 +1,177 @@
|
||||
const auth_config = {
|
||||
|
||||
default_provider: env('AUTH_DEFAULT_PROVIDER', 'flitter'),
|
||||
default_login_route: '/dash',
|
||||
|
||||
servers: {
|
||||
// OAuth2 authorization server
|
||||
oauth2: {
|
||||
enable: env('OAUTH2_SERVER_ENABLE', false),
|
||||
|
||||
// Grants that are available to clients. Supported types are authorization_code, password
|
||||
grants: ['authorization_code'],
|
||||
|
||||
// Built in data retrieval endpoints. These are protected by user-specific OAuth2 tokens
|
||||
built_in_endpoints: {
|
||||
|
||||
// Get the token user's data
|
||||
user: {
|
||||
enable: env('OAUTH2_SERVER_ENABLE', true),
|
||||
|
||||
// Fields to return to the endpoint
|
||||
// The keys are the keys in the request. The values are the keys in the user.
|
||||
fields: {
|
||||
username: 'uid',
|
||||
id: 'uuid',
|
||||
|
||||
// Data is a special key. It's key-value pairs are included,
|
||||
// unserialized, from the user's JSON data.
|
||||
data: {
|
||||
// Fields stored in serialized data can be included here:
|
||||
// special_field: 'some_json_data_field',
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
||||
// Auth provider configurations
|
||||
// You can have multiple of the same 'type' of auth source, but they
|
||||
// must have unique names. The name is the key of the source config.
|
||||
// Valid types are (by default): FlitterProvider, LdapProvider, Oauth2Provider
|
||||
sources: {
|
||||
// Default, database-backed auth provider
|
||||
flitter: {
|
||||
type: 'FlitterProvider',
|
||||
enable: env('AUTH_FLITTER_ENABLE', false),
|
||||
registration: env('AUTH_FLITTER_REGISTRATION', true),
|
||||
min_password_length: env('AUTH_MIN_PASSWORD_LENGTH', 8),
|
||||
},
|
||||
|
||||
// LDAP-backed auth provider
|
||||
example_ldap: {
|
||||
type: 'LdapProvider',
|
||||
enable: env('AUTH_LDAP_ENABLE', false),
|
||||
|
||||
host: env('AUTH_LDAP_HOST', 'localhost'),
|
||||
port: env('AUTH_LDAP_PORT', 389),
|
||||
secure: env('AUTH_LDAP_BIND_SECURE', false),
|
||||
bind_dn: env('AUTH_LDAP_BIND_DN', 'uid=auth_agent,ou=people,dc=domain,dc=local'),
|
||||
bind_secret: env('AUTH_LDAP_BIND_PW'),
|
||||
|
||||
user_search_base: env('AUTH_LDAP_SEARCH_BASE', 'ou=people,dc=domain,dc=local'),
|
||||
user_filter: env('AUTH_LDAP_USER_FILTER', '(uid=%u)'), // %u is the login provided username
|
||||
|
||||
min_password_length: env('AUTH_MIN_PASSWORD_LENGTH', 8),
|
||||
|
||||
// Maps flitter-auth roles to LDAP groups
|
||||
role_groups: {
|
||||
// Should correspond to existing auth roles
|
||||
// role_name: 'cn=somegroup,ou=groups,dc=domain,dc=local',
|
||||
},
|
||||
|
||||
// Maps user attributes to LDAP data attributes
|
||||
attributes: {
|
||||
uid: env('AUTH_LDAP_ATTR_UID', 'uid'),
|
||||
first_name: env('AUTH_LDAP_ATTR_FIRST_NAME', 'cn'),
|
||||
last_name: env('AUTH_LDAP_ATTR_LAST_NAME', 'sn'),
|
||||
email: env('AUTH_LDAP_ATTR_EMAIL', 'mail'),
|
||||
|
||||
// Special case - used to determine group memberships
|
||||
group_membership: env('AUTH_LDAP_ATTR_GROUPS', 'memberOf'),
|
||||
},
|
||||
|
||||
registration: env('AUTH_LDAP_REGISTRATION', false),
|
||||
|
||||
// Default attributes for new registered users
|
||||
// %u can be used to interpolate the registered user's uid
|
||||
registration_merge_attributes: {
|
||||
objectClass: ['posixAccount', 'shadowAccount', 'inetOrgPerson'],
|
||||
sn: '%u',
|
||||
cn: '%u',
|
||||
gecos: '%u',
|
||||
uidNumber: -1,
|
||||
gidNumber: -1,
|
||||
homeDirectory: '/dev/null',
|
||||
},
|
||||
},
|
||||
|
||||
example_oauth: {
|
||||
type: 'Oauth2Provider',
|
||||
enable: env('AUTH_OAUTH2_ENABLE', true),
|
||||
|
||||
source_name: env('AUTH_OAUTH2_SOURCE_NAME', 'GitHub'),
|
||||
source_client_id: env('AUTH_OAUTH2_CLIENT_ID'),
|
||||
source_client_secret: env('AUTH_OAUTH2_CLIENT_SECRET'),
|
||||
|
||||
// Login page destination where the user will be redirected to on login
|
||||
// %c will be interpolated with the client id
|
||||
// %r will be interpolated with the redirect callback url
|
||||
// NOTE: This url is the same as the login page - /auth/oauth2/login
|
||||
source_login_page: env('AUTH_OAUTH2_LOGIN_REDIRECT', 'https://github.com/login/oauth/authorize?client_id=%c'),
|
||||
|
||||
// Information about the OAuth2 Callback
|
||||
callback: {
|
||||
// URL query parameter name with the authorization_code token
|
||||
// e.g. ?code=XXXXXXXXXX
|
||||
token_key: 'code',
|
||||
},
|
||||
|
||||
// Information about the endpoint flitter-auth will use to redeem
|
||||
// the authorization_code token for a bearer token
|
||||
source_token: {
|
||||
endpoint: 'https://github.com/login/oauth/access_token',
|
||||
|
||||
// Field name where the authorization_code token will be specified in the request
|
||||
token_key: 'code',
|
||||
|
||||
// Field name for the client id
|
||||
client_id_key: 'client_id',
|
||||
|
||||
// Field name for the client secret
|
||||
client_secret_key: 'client_secret',
|
||||
|
||||
// Field name for the grant_type ('authorization_type')
|
||||
grant_type_key: 'grant_type',
|
||||
|
||||
// Field name where the bearer token will be specified in the response
|
||||
response_token_key: 'access_token',
|
||||
},
|
||||
|
||||
// Information about the endpoint flitter-auth will use to get
|
||||
// user information after it retrieves a bearer token
|
||||
user_data: {
|
||||
endpoint: 'https://api.github.com/user',
|
||||
method: 'get', // 'get' or 'post' only
|
||||
|
||||
// In the response data, what key is the user data in?
|
||||
// e.g. if 'data', then {'data': { ... }}
|
||||
// Set falsy to assume the data exists in the root: { ... }
|
||||
// data_root: 'data',
|
||||
|
||||
// Value that prefixes the token in the 'Authorization: ' header.
|
||||
// e.g. 'token ' would mean 'token a0fw93ja0w93ja093wj'
|
||||
// 'Bearer ' would be 'Bearer 0329j0239dj209j3209jd'
|
||||
token_prefix: 'token ',
|
||||
|
||||
// Mapping of user model attributes to OAuth2 return data from the endpoint
|
||||
// Note that uuid is not allowed, and uid is required
|
||||
attributes: {
|
||||
uid: 'login',
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
|
||||
roles: {
|
||||
|
||||
// Roles can be defined here as arrays of permissions:
|
||||
// 'role_name': [ 'permission1', 'permission2' ],
|
||||
// Then, users with that role will automatically inherit the permissions.
|
||||
|
||||
},
|
||||
|
||||
}
|
||||
|
||||
module.exports = auth_config
|
@ -15,3 +15,6 @@ ENVIRONMENT=production
|
||||
SSL_ENABLE=false
|
||||
SSL_CERT_FILE=cert.pem
|
||||
SSL_CERT_KEY=cert.key
|
||||
|
||||
#for development, AUTH_FLITTER_ENABLE should be true
|
||||
#AUTH_FLITTER_ENABLE=true
|
Loading…
Reference in New Issue
Block a user