You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

168 lines
5.5 KiB

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

'use strict';
/**
* An asynchronous bootstrap function that runs before
* your application gets started.
*
* This gives you an opportunity to set up your data model,
* run jobs, or perform some special logic.
*/
const crypto = require('crypto');
const _ = require('lodash');
const { getService } = require('../utils');
const usersPermissionsActions = require('./users-permissions-actions');
const {
DEFAULT_ACCESS_TOKEN_LIFESPAN,
DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,
DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,
DEFAULT_MAX_SESSION_LIFESPAN,
DEFAULT_IDLE_SESSION_LIFESPAN,
} = require('../services/constants');
const getSessionManager = () => {
const manager = strapi.sessionManager;
return manager ?? null;
};
const initGrant = async (pluginStore) => {
const allProviders = getService('providers-registry').getAll();
const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {
const { icon, enabled, grantConfig } = provider;
acc[name] = {
icon,
enabled,
...grantConfig,
};
return acc;
}, {});
const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};
if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {
// merge with the previous provider config.
_.keys(grantConfig).forEach((key) => {
if (key in prevGrantConfig) {
grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);
}
});
await pluginStore.set({ key: 'grant', value: grantConfig });
}
};
const initEmails = async (pluginStore) => {
if (!(await pluginStore.get({ key: 'email' }))) {
const value = {
reset_password: {
display: 'Email.template.reset_password',
icon: 'sync',
options: {
from: {
name: 'Administration Panel',
email: 'no-reply@strapi.io',
},
response_email: '',
object: 'Reset password',
message: `<p>We heard that you lost your password. Sorry about that!</p>
<p>But dont worry! You can use the following link to reset your password:</p>
<p><%= URL %>?code=<%= TOKEN %></p>
<p>Thanks.</p>`,
},
},
email_confirmation: {
display: 'Email.template.email_confirmation',
icon: 'check-square',
options: {
from: {
name: 'Administration Panel',
email: 'no-reply@strapi.io',
},
response_email: '',
object: 'Account confirmation',
message: `<p>Thank you for registering!</p>
<p>You have to confirm your email address. Please click on the link below.</p>
<p><%= URL %>?confirmation=<%= CODE %></p>
<p>Thanks.</p>`,
},
},
};
await pluginStore.set({ key: 'email', value });
}
};
const initAdvancedOptions = async (pluginStore) => {
if (!(await pluginStore.get({ key: 'advanced' }))) {
const value = {
unique_email: true,
allow_register: true,
email_confirmation: false,
email_reset_password: null,
email_confirmation_redirection: null,
default_role: 'authenticated',
};
await pluginStore.set({ key: 'advanced', value });
}
};
module.exports = async ({ strapi }) => {
const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });
await initGrant(pluginStore);
await initEmails(pluginStore);
await initAdvancedOptions(pluginStore);
await strapi
.service('admin::permission')
.actionProvider.registerMany(usersPermissionsActions.actions);
await getService('users-permissions').initialize();
// Define users-permissions origin configuration for sessionManager
const upConfig = strapi.config.get('plugin::users-permissions');
const sessionManager = getSessionManager();
if (sessionManager) {
sessionManager.defineOrigin('users-permissions', {
jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),
accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,
maxRefreshTokenLifespan:
upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,
idleRefreshTokenLifespan:
upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,
maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,
idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,
algorithm: upConfig.jwt?.algorithm,
jwtOptions: upConfig.jwt || {},
});
}
if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {
if (process.env.NODE_ENV !== 'development') {
throw new Error(
`Missing jwtSecret. Please, set configuration variable "jwtSecret" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \`crypto.randomBytes(16).toString('base64')\`).
For security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`
);
}
const jwtSecret = crypto.randomBytes(16).toString('base64');
strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);
if (!process.env.JWT_SECRET) {
const envPath = process.env.ENV_PATH || '.env';
strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\n`);
strapi.log.info(
`The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`
);
}
}
};