Improvements to error handling and authentication
This commit is contained in:
parent
853770a9e8
commit
466cad7893
@ -30,6 +30,7 @@ function NavContainer() {
|
||||
export default function App() {
|
||||
return (
|
||||
<Switch>
|
||||
<Route path="/login" component={p.LoginPage}/>
|
||||
<Route path="/login" component={p.LoginPage}/>
|
||||
<NavContainer/>
|
||||
</Switch>
|
||||
|
@ -1,28 +1,42 @@
|
||||
import { Location } from "history";
|
||||
import * as History from "history";
|
||||
import * as React from "react";
|
||||
import { withRouter } from "react-router";
|
||||
import { Link } from "react-router-dom";
|
||||
import { Menu } from "semantic-ui-react";
|
||||
|
||||
import { AppState, injectState } from "@app/state";
|
||||
import { observer } from "mobx-react";
|
||||
|
||||
interface NavItemProps {
|
||||
to: string;
|
||||
children: React.ReactNode;
|
||||
location: History.Location;
|
||||
}
|
||||
|
||||
function NavItem({ to, children }: NavItemProps) {
|
||||
@observer
|
||||
function NavItem({ to, children, location }: NavItemProps) {
|
||||
return <Menu.Item as={Link} to={to} active={location.pathname.startsWith(to)}>{children}</Menu.Item>;
|
||||
}
|
||||
|
||||
function NavBar({ location }: { location: Location }) {
|
||||
function NavBar({ appState }: { appState: AppState }) {
|
||||
let loginMenu;
|
||||
if (appState.isLoggedIn) {
|
||||
loginMenu = (
|
||||
<NavItem to="/logout">Logout</NavItem>
|
||||
);
|
||||
} else {
|
||||
loginMenu = (
|
||||
<NavItem to="/login">Login</NavItem>
|
||||
);
|
||||
}
|
||||
return (
|
||||
<Menu>
|
||||
<NavItem to="/devices/grinklers">Device grinklers</NavItem>
|
||||
<NavItem to="/messagesTest">Messages test</NavItem>
|
||||
<Menu.Menu position="right">
|
||||
<NavItem to="/login">Login</NavItem>
|
||||
{loginMenu}
|
||||
</Menu.Menu>
|
||||
</Menu>
|
||||
);
|
||||
}
|
||||
|
||||
export default withRouter(NavBar);
|
||||
export default observer(injectState(NavBar));
|
||||
|
@ -25,7 +25,7 @@ class LoginPageState {
|
||||
|
||||
login(appState: AppState) {
|
||||
this.loading = true;
|
||||
appState.httpApi.tokenStore.grantPassword(this.username, this.password)
|
||||
appState.tokenStore.grantPassword(this.username, this.password)
|
||||
.then(() => {
|
||||
this.loading = false;
|
||||
log.info("logged in");
|
||||
|
@ -121,7 +121,8 @@ export class WebSocketRpcClient implements s.SprinklersRPC {
|
||||
}
|
||||
|
||||
async tryAuthenticate() {
|
||||
when(() => this.tokenStore.accessToken.isValid, () => {
|
||||
when(() => this.connectionState.clientToServer === true
|
||||
&& this.tokenStore.accessToken.isValid, () => {
|
||||
return this.authenticate(this.tokenStore.accessToken.token!);
|
||||
});
|
||||
}
|
||||
|
@ -2,19 +2,30 @@ import { WebSocketRpcClient } from "@app/sprinklersRpc/websocketClient";
|
||||
import HttpApi from "@app/state/HttpApi";
|
||||
import { UiStore } from "@app/state/UiStore";
|
||||
import { createBrowserHistory, History } from "history";
|
||||
import { RouterStore, syncHistoryWithStore } from "mobx-react-router";
|
||||
import { computed } from "mobx";
|
||||
|
||||
const isDev = process.env.NODE_ENV === "development";
|
||||
const websocketPort = isDev ? 8080 : location.port;
|
||||
|
||||
export default class AppState {
|
||||
history: History = createBrowserHistory();
|
||||
routerStore = new RouterStore();
|
||||
uiStore = new UiStore();
|
||||
httpApi = new HttpApi();
|
||||
tokenStore = this.httpApi.tokenStore;
|
||||
sprinklersRpc = new WebSocketRpcClient(`ws://${location.hostname}:${websocketPort}`,
|
||||
this.tokenStore);
|
||||
|
||||
@computed get isLoggedIn() {
|
||||
return this.tokenStore.accessToken.isValid;
|
||||
}
|
||||
|
||||
async start() {
|
||||
syncHistoryWithStore(this.history, this.routerStore);
|
||||
|
||||
this.tokenStore.loadLocalStorage();
|
||||
|
||||
if (!this.httpApi.tokenStore.accessToken.isValid) {
|
||||
if (this.httpApi.tokenStore.refreshToken.isValid) {
|
||||
await this.httpApi.tokenStore.grantRefresh();
|
||||
|
@ -23,6 +23,10 @@ export class Token {
|
||||
this.updateCurrentTime();
|
||||
}
|
||||
|
||||
toJSON() {
|
||||
return this.token;
|
||||
}
|
||||
|
||||
private updateCurrentTime = (reportChanged: boolean = true) => {
|
||||
if (reportChanged) {
|
||||
this.isExpiredAtom.reportChanged();
|
||||
|
@ -7,6 +7,8 @@ import logger from "@common/logger";
|
||||
|
||||
const log = logger.child({ source: "TokenStore"});
|
||||
|
||||
const LOCAL_STORAGE_KEY = "TokenStore";
|
||||
|
||||
export class TokenStore {
|
||||
@observable accessToken: Token = new Token();
|
||||
@observable refreshToken: Token = new Token();
|
||||
@ -17,6 +19,18 @@ export class TokenStore {
|
||||
this.api = api;
|
||||
}
|
||||
|
||||
saveLocalStorage() {
|
||||
window.localStorage.setItem(LOCAL_STORAGE_KEY, JSON.stringify(this.toJSON()));
|
||||
}
|
||||
|
||||
loadLocalStorage() {
|
||||
const data = window.localStorage.getItem(LOCAL_STORAGE_KEY);
|
||||
if (data) {
|
||||
const data2 = JSON.parse(data);
|
||||
this.updateFromJson(data2);
|
||||
}
|
||||
}
|
||||
|
||||
async grantPassword(username: string, password: string) {
|
||||
const request: TokenGrantPasswordRequest = {
|
||||
grant_type: "password", username, password,
|
||||
@ -26,6 +40,7 @@ export class TokenStore {
|
||||
}, request);
|
||||
this.accessToken.token = response.access_token;
|
||||
this.refreshToken.token = response.refresh_token;
|
||||
this.saveLocalStorage();
|
||||
log.debug({ aud: this.accessToken.claims!.aud }, "got password grant tokens");
|
||||
}
|
||||
|
||||
@ -41,6 +56,16 @@ export class TokenStore {
|
||||
}, request);
|
||||
this.accessToken.token = response.access_token;
|
||||
this.refreshToken.token = response.refresh_token;
|
||||
this.saveLocalStorage();
|
||||
log.debug({ aud: this.accessToken.claims!.aud }, "got refresh grant tokens");
|
||||
}
|
||||
|
||||
toJSON() {
|
||||
return { accessToken: this.accessToken.toJSON(), refreshToken: this.refreshToken.toJSON() }
|
||||
}
|
||||
|
||||
updateFromJson(json: any) {
|
||||
this.accessToken.token = json.accessToken;
|
||||
this.refreshToken.token = json.refreshToken;
|
||||
}
|
||||
}
|
||||
|
@ -7,8 +7,32 @@ export enum ErrorCode {
|
||||
BadToken = 105,
|
||||
Unauthorized = 106,
|
||||
NoPermission = 107,
|
||||
NotImplemented = 108,
|
||||
Internal = 200,
|
||||
Timeout = 300,
|
||||
ServerDisconnected = 301,
|
||||
BrokerDisconnected = 302,
|
||||
}
|
||||
|
||||
export function toHttpStatus(errorCode: ErrorCode): number {
|
||||
switch (errorCode) {
|
||||
case ErrorCode.BadRequest:
|
||||
case ErrorCode.NotSpecified:
|
||||
case ErrorCode.Parse:
|
||||
case ErrorCode.Range:
|
||||
case ErrorCode.InvalidData:
|
||||
return 400; // Bad request
|
||||
case ErrorCode.Unauthorized:
|
||||
case ErrorCode.BadToken:
|
||||
return 401; // Unauthorized
|
||||
case ErrorCode.NoPermission:
|
||||
return 403; // Forbidden
|
||||
case ErrorCode.NotImplemented:
|
||||
return 501;
|
||||
case ErrorCode.Internal:
|
||||
case ErrorCode.ServerDisconnected:
|
||||
case ErrorCode.BrokerDisconnected:
|
||||
default:
|
||||
return 500;
|
||||
}
|
||||
}
|
||||
|
@ -87,6 +87,7 @@
|
||||
"mini-css-extract-plugin": "^0.4.0",
|
||||
"mobx-react": "^5.2.3",
|
||||
"mobx-react-devtools": "^5.0.1",
|
||||
"mobx-react-router": "^4.0.4",
|
||||
"node-sass": "^4.8.3",
|
||||
"nodemon": "^1.17.5",
|
||||
"npm-run-all": "^4.1.3",
|
||||
|
@ -4,15 +4,16 @@ import * as jwt from "jsonwebtoken";
|
||||
|
||||
import TokenClaims from "@common/TokenClaims";
|
||||
|
||||
import { User } from "../models/User";
|
||||
import { ServerState } from "../state";
|
||||
import { ApiError } from "./errors";
|
||||
import {
|
||||
TokenGrantPasswordRequest,
|
||||
TokenGrantRefreshRequest,
|
||||
TokenGrantRequest,
|
||||
TokenGrantResponse
|
||||
TokenGrantResponse,
|
||||
} from "@common/http";
|
||||
import { ErrorCode } from "@common/sprinklersRpc/ErrorCode";
|
||||
import { User } from "../models/User";
|
||||
import { ServerState } from "../state";
|
||||
import { ApiError } from "./errors";
|
||||
|
||||
export { TokenClaims };
|
||||
|
||||
@ -56,9 +57,9 @@ export function verifyToken(token: string): Promise<TokenClaims> {
|
||||
jwt.verify(token, JWT_SECRET, (err, decoded) => {
|
||||
if (err) {
|
||||
if (err.name === "TokenExpiredError") {
|
||||
reject(new ApiError(401, "The specified token is expired", err));
|
||||
reject(new ApiError("The specified token is expired", ErrorCode.BadToken, err));
|
||||
} else if (err.name === "JsonWebTokenError") {
|
||||
reject(new ApiError(400, "Invalid token", err));
|
||||
reject(new ApiError("Invalid token", ErrorCode.BadToken, err));
|
||||
} else {
|
||||
reject(err);
|
||||
}
|
||||
@ -100,32 +101,32 @@ export function authentication(state: ServerState) {
|
||||
async function passwordGrant(body: TokenGrantPasswordRequest, res: Express.Response): Promise<User> {
|
||||
const { username, password } = body;
|
||||
if (!body || !username || !password) {
|
||||
throw new ApiError(400, "Must specify username and password");
|
||||
throw new ApiError("Must specify username and password");
|
||||
}
|
||||
const user = await User.loadByUsername(state.database, username);
|
||||
if (!user) {
|
||||
throw new ApiError(400, "User does not exist");
|
||||
throw new ApiError("User does not exist");
|
||||
}
|
||||
const passwordMatches = await user.comparePassword(password);
|
||||
if (passwordMatches) {
|
||||
return user;
|
||||
} else {
|
||||
throw new ApiError(401, "Invalid user credentials");
|
||||
throw new ApiError("Invalid user credentials");
|
||||
}
|
||||
}
|
||||
|
||||
async function refreshGrant(body: TokenGrantRefreshRequest, res: Express.Response): Promise<User> {
|
||||
const { refresh_token } = body;
|
||||
if (!body || !refresh_token) {
|
||||
throw new ApiError(400, "Must specify a refresh_token");
|
||||
throw new ApiError("Must specify a refresh_token");
|
||||
}
|
||||
const claims = await verifyToken(refresh_token);
|
||||
if (claims.type !== "refresh") {
|
||||
throw new ApiError(400, "Not a refresh token");
|
||||
throw new ApiError("Not a refresh token");
|
||||
}
|
||||
const user = await User.load(state.database, claims.aud);
|
||||
if (!user) {
|
||||
throw new ApiError(400, "User does not exist");
|
||||
throw new ApiError("User no longer exists");
|
||||
}
|
||||
return user;
|
||||
}
|
||||
@ -138,7 +139,7 @@ export function authentication(state: ServerState) {
|
||||
} else if (body.grant_type === "refresh") {
|
||||
user = await refreshGrant(body, res);
|
||||
} else {
|
||||
throw new ApiError(400, "Invalid grant_type");
|
||||
throw new ApiError("Invalid grant_type");
|
||||
}
|
||||
const [access_token, refresh_token] = await Promise.all(
|
||||
[await generateAccessToken(user, JWT_SECRET),
|
||||
@ -162,11 +163,11 @@ export function authentication(state: ServerState) {
|
||||
export async function authorizeAccess(req: Express.Request, res: Express.Response) {
|
||||
const bearer = req.headers.authorization;
|
||||
if (!bearer) {
|
||||
throw new ApiError(401, "No bearer token specified");
|
||||
throw new ApiError("No Authorization header specified", ErrorCode.BadToken);
|
||||
}
|
||||
const matches = /^Bearer (.*)$/.exec(bearer);
|
||||
if (!matches || !matches[1]) {
|
||||
throw new ApiError(400, "Invalid bearer token specified");
|
||||
throw new ApiError("Invalid Authorization header, must be Bearer", ErrorCode.BadToken);
|
||||
}
|
||||
const token = matches[1];
|
||||
|
||||
|
@ -1,11 +1,26 @@
|
||||
import { ErrorCode, toHttpStatus } from "@common/sprinklersRpc/ErrorCode";
|
||||
|
||||
export class ApiError extends Error {
|
||||
name = "ApiError";
|
||||
statusCode: number;
|
||||
cause?: Error;
|
||||
code: ErrorCode;
|
||||
data: any;
|
||||
|
||||
constructor(statusCode: number, message: string, cause?: Error) {
|
||||
constructor(message: string, code: ErrorCode = ErrorCode.BadRequest, data: any = {}) {
|
||||
super(message);
|
||||
this.statusCode = statusCode;
|
||||
this.cause = cause;
|
||||
this.statusCode = toHttpStatus(code);
|
||||
this.code = code;
|
||||
// tslint:disable-next-line:prefer-conditional-expression
|
||||
if (data instanceof Error) {
|
||||
this.data = data.toString();
|
||||
} else {
|
||||
this.data = data;
|
||||
}
|
||||
}
|
||||
|
||||
toJSON() {
|
||||
return {
|
||||
message: this.message, code: this.code, data: this.data,
|
||||
};
|
||||
}
|
||||
}
|
||||
|
@ -4,7 +4,7 @@ import { serialize} from "serializr";
|
||||
|
||||
import * as schema from "@common/sprinklersRpc/schema";
|
||||
import { ServerState } from "../state";
|
||||
import logger from "./logger";
|
||||
import requestLogger from "./requestLogger";
|
||||
import serveApp from "./serveApp";
|
||||
|
||||
import { User } from "../models/User";
|
||||
@ -13,7 +13,7 @@ import { authentication } from "./authentication";
|
||||
export function createApp(state: ServerState) {
|
||||
const app = express();
|
||||
|
||||
app.use(logger);
|
||||
app.use(requestLogger);
|
||||
app.use(bodyParser.json());
|
||||
|
||||
app.get("/api/devices/:deviceId", (req, res) => {
|
||||
|
7724
yarn-error.log
Normal file
7724
yarn-error.log
Normal file
File diff suppressed because it is too large
Load Diff
@ -2133,7 +2133,7 @@ expand-tilde@^2.0.0, expand-tilde@^2.0.2:
|
||||
|
||||
express-pino-logger@^3.0.2:
|
||||
version "3.0.2"
|
||||
resolved "https://registry.yarnpkg.com/express-pino-logger/-/express-pino-logger-3.0.2.tgz#6384763e492a246dfbe795f9380a7234f300acc1"
|
||||
resolved "https://registry.yarnpkg.com/express-pino-requestLogger/-/express-pino-requestLogger-3.0.2.tgz#6384763e492a246dfbe795f9380a7234f300acc1"
|
||||
dependencies:
|
||||
pino-http "^3.0.1"
|
||||
|
||||
@ -4131,6 +4131,10 @@ mobx-react-devtools@^5.0.1:
|
||||
version "5.0.1"
|
||||
resolved "https://registry.yarnpkg.com/mobx-react-devtools/-/mobx-react-devtools-5.0.1.tgz#9473c85929b2fc0c95086430419028cebd96fb3b"
|
||||
|
||||
mobx-react-router@^4.0.4:
|
||||
version "4.0.4"
|
||||
resolved "https://registry.yarnpkg.com/mobx-react-router/-/mobx-react-router-4.0.4.tgz#b778618c84f16057f5ae9c09a4d364deade95fd8"
|
||||
|
||||
mobx-react@^5.2.3:
|
||||
version "5.2.3"
|
||||
resolved "https://registry.yarnpkg.com/mobx-react/-/mobx-react-5.2.3.tgz#cdf6141c2fe63377c5813cbd254e8ce0d4676631"
|
||||
|
Loading…
x
Reference in New Issue
Block a user