mirror of
https://github.com/fosrl/pangolin.git
synced 2026-03-02 16:56:39 +00:00
add org policy check to verify session
This commit is contained in:
@@ -95,6 +95,13 @@ export async function checkOrgAccessPolicy(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (props.session.userId !== props.user.userId) {
|
||||||
|
return {
|
||||||
|
allowed: false,
|
||||||
|
error: "Session does not belong to the user"
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
// now check the policies
|
// now check the policies
|
||||||
const policies: CheckOrgAccessPolicyResult["policies"] = {};
|
const policies: CheckOrgAccessPolicyResult["policies"] = {};
|
||||||
|
|
||||||
|
|||||||
@@ -73,6 +73,8 @@ import { validateResourceSessionToken } from "@server/auth/sessions/resource";
|
|||||||
import { checkExitNodeOrg, resolveExitNodes } from "#private/lib/exitNodes";
|
import { checkExitNodeOrg, resolveExitNodes } from "#private/lib/exitNodes";
|
||||||
import { maxmindLookup } from "@server/db/maxmind";
|
import { maxmindLookup } from "@server/db/maxmind";
|
||||||
import { verifyResourceAccessToken } from "@server/auth/verifyResourceAccessToken";
|
import { verifyResourceAccessToken } from "@server/auth/verifyResourceAccessToken";
|
||||||
|
import { checkOrgAccessPolicy } from "#dynamic/lib/checkOrgAccessPolicy";
|
||||||
|
import { CheckOrgAccessPolicyResult } from "@server/lib/checkOrgAccessPolicy";
|
||||||
|
|
||||||
// Zod schemas for request validation
|
// Zod schemas for request validation
|
||||||
const getResourceByDomainParamsSchema = z
|
const getResourceByDomainParamsSchema = z
|
||||||
@@ -300,7 +302,8 @@ function loadEncryptData() {
|
|||||||
return; // already loaded
|
return; // already loaded
|
||||||
}
|
}
|
||||||
|
|
||||||
encryptionKeyPath = privateConfig.getRawPrivateConfig().server.encryption_key_path;
|
encryptionKeyPath =
|
||||||
|
privateConfig.getRawPrivateConfig().server.encryption_key_path;
|
||||||
|
|
||||||
if (!fs.existsSync(encryptionKeyPath)) {
|
if (!fs.existsSync(encryptionKeyPath)) {
|
||||||
throw new Error(
|
throw new Error(
|
||||||
@@ -1582,3 +1585,90 @@ hybridRouter.post(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
|
||||||
|
const getOrgAccessPolicyParamsSchema = z
|
||||||
|
.object({
|
||||||
|
orgId: z.string().min(1),
|
||||||
|
userId: z.string().min(1)
|
||||||
|
})
|
||||||
|
.strict();
|
||||||
|
|
||||||
|
const getOrgAccessPolicyBodySchema = z
|
||||||
|
.object({
|
||||||
|
sessionId: z.string().min(1)
|
||||||
|
})
|
||||||
|
.strict();
|
||||||
|
|
||||||
|
hybridRouter.get(
|
||||||
|
"/org/:orgId/user/:userId/access",
|
||||||
|
async (req: Request, res: Response, next: NextFunction) => {
|
||||||
|
try {
|
||||||
|
const parsedParams = getOrgAccessPolicyParamsSchema.safeParse(
|
||||||
|
req.params
|
||||||
|
);
|
||||||
|
if (!parsedParams.success) {
|
||||||
|
return next(
|
||||||
|
createHttpError(
|
||||||
|
HttpCode.BAD_REQUEST,
|
||||||
|
fromError(parsedParams.error).toString()
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const parsedBody = getOrgAccessPolicyBodySchema.safeParse(req.body);
|
||||||
|
if (!parsedBody.success) {
|
||||||
|
return next(
|
||||||
|
createHttpError(
|
||||||
|
HttpCode.BAD_REQUEST,
|
||||||
|
fromError(parsedBody.error).toString()
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const { orgId, userId } = parsedParams.data;
|
||||||
|
const { sessionId } = parsedBody.data;
|
||||||
|
const remoteExitNode = req.remoteExitNode;
|
||||||
|
|
||||||
|
if (!remoteExitNode?.exitNodeId) {
|
||||||
|
return next(
|
||||||
|
createHttpError(
|
||||||
|
HttpCode.BAD_REQUEST,
|
||||||
|
"Remote exit node not found"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (await checkExitNodeOrg(remoteExitNode.exitNodeId, orgId)) {
|
||||||
|
// If the exit node is not allowed for the org, return an error
|
||||||
|
return next(
|
||||||
|
createHttpError(
|
||||||
|
HttpCode.FORBIDDEN,
|
||||||
|
"Exit node not allowed for this organization"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const accessPolicy = await checkOrgAccessPolicy({
|
||||||
|
orgId,
|
||||||
|
userId,
|
||||||
|
sessionId
|
||||||
|
});
|
||||||
|
|
||||||
|
return response<CheckOrgAccessPolicyResult>(res, {
|
||||||
|
data: accessPolicy,
|
||||||
|
success: true,
|
||||||
|
error: false,
|
||||||
|
message: "Org access policy retrieved successfully",
|
||||||
|
status: HttpCode.OK
|
||||||
|
});
|
||||||
|
} catch (error) {
|
||||||
|
logger.error(error);
|
||||||
|
return next(
|
||||||
|
createHttpError(
|
||||||
|
HttpCode.INTERNAL_SERVER_ERROR,
|
||||||
|
"Failed to get org login page"
|
||||||
|
)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
);
|
||||||
|
|||||||
@@ -37,6 +37,7 @@ import { getCountryCodeForIp } from "@server/lib/geoip";
|
|||||||
import { getOrgTierData } from "#dynamic/lib/billing";
|
import { getOrgTierData } from "#dynamic/lib/billing";
|
||||||
import { TierId } from "@server/lib/billing/tiers";
|
import { TierId } from "@server/lib/billing/tiers";
|
||||||
import { verifyPassword } from "@server/auth/password";
|
import { verifyPassword } from "@server/auth/password";
|
||||||
|
import { checkOrgAccessPolicy } from "#dynamic/lib/checkOrgAccessPolicy";
|
||||||
|
|
||||||
// We'll see if this speeds anything up
|
// We'll see if this speeds anything up
|
||||||
const cache = new NodeCache({
|
const cache = new NodeCache({
|
||||||
@@ -313,7 +314,8 @@ export async function verifyResourceSession(
|
|||||||
return allowed(res);
|
return allowed(res);
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( // we dont want to redirect if this is the only auth method and we did not pass here
|
if (
|
||||||
|
// we dont want to redirect if this is the only auth method and we did not pass here
|
||||||
!sso &&
|
!sso &&
|
||||||
!pincode &&
|
!pincode &&
|
||||||
!password &&
|
!password &&
|
||||||
@@ -589,6 +591,18 @@ async function isUserAllowedToAccessResource(
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const accessPolicy = await checkOrgAccessPolicy({
|
||||||
|
orgId: resource.orgId,
|
||||||
|
userId: user.userId,
|
||||||
|
sessionId: session.sessionId
|
||||||
|
});
|
||||||
|
if (!accessPolicy.allowed || accessPolicy.error) {
|
||||||
|
logger.debug(`User not allowed by org access policy because`, {
|
||||||
|
accessPolicy
|
||||||
|
});
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
const roleResourceAccess = await getRoleResourceAccess(
|
const roleResourceAccess = await getRoleResourceAccess(
|
||||||
resource.resourceId,
|
resource.resourceId,
|
||||||
userOrgRole.roleId
|
userOrgRole.roleId
|
||||||
|
|||||||
@@ -1,3 +0,0 @@
|
|||||||
export async function OrgPolicyPage() {
|
|
||||||
return <div>Org Policy Page</div>;
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user