feat(auth): Revamp authentication setup (#7387)

* chore: Clean up authentication middlewares

* chore: Rename AuthUser to AuthIdentity

* feat: Define link between user, customer, and auth identity

* feat: Use links for auth, update auth context content

* fix: Adjust user create command with new auth setup

* fix: Make auth login more dynamic, review fixes

* fix: Change test assertions for created by
This commit is contained in:
Stevche Radevski
2024-05-22 10:27:32 +02:00
committed by GitHub
parent b7df447682
commit 5ede560f70
88 changed files with 887 additions and 1014 deletions

View File

@@ -38,7 +38,7 @@ medusaIntegrationTestRunner({
expect.objectContaining({
id: created.data.api_key.id,
title: "Test Secret Key",
created_by: "admin_user",
created_by: expect.any(String),
})
)
// On create we get the token in raw form so we can store it.

View File

@@ -120,7 +120,7 @@ describe("/admin/order-edits", () => {
const orderEdit = await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: order.id,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
@@ -176,7 +176,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -289,7 +289,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: order.id,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
@@ -303,7 +303,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("random-oe-id"),
order_id: additionalOrder.id,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test unused note",
})
})
@@ -327,7 +327,7 @@ describe("/admin/order-edits", () => {
expect.arrayContaining([
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -344,7 +344,7 @@ describe("/admin/order-edits", () => {
}),
expect.objectContaining({
order_id: IdMap.getId("random-order-id"),
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -381,7 +381,7 @@ describe("/admin/order-edits", () => {
expect.objectContaining({
id: orderEditId,
order_id: orderId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -416,7 +416,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edits).toEqual([
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -712,7 +712,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
order_id: orderId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -788,7 +788,7 @@ describe("/admin/order-edits", () => {
order_id: orderId,
internal_note: "test",
confirmed_at: new Date(),
created_by: "admin_user",
created_by: expect.any(String),
})
const payload = {
@@ -806,7 +806,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
order_id: orderId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -912,12 +912,12 @@ describe("/admin/order-edits", () => {
})
const { id } = await simpleOrderEditFactory(dbConnection, {
created_by: "admin_user",
created_by: expect.any(String),
order_id: order.id,
})
const noChangesEdit = await simpleOrderEditFactory(dbConnection, {
created_by: "admin_user",
created_by: expect.any(String),
})
const lineItemAdded = await simpleLineItemFactory(dbConnection, {
@@ -1103,7 +1103,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -1174,7 +1174,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: order.id,
created_by: "admin_user",
created_by: expect.any(String),
})
})
@@ -1196,7 +1196,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
requested_by: null,
canceled_by: null,
confirmed_by: null,
@@ -1534,7 +1534,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: orderId1,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
@@ -1577,7 +1577,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: orderId1,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note 2",
})
@@ -1592,7 +1592,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId2,
order_id: orderId1,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note 2",
})
@@ -1623,7 +1623,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: orderId1,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note 3",
confirmed_at: new Date(),
})
@@ -1655,7 +1655,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: orderId1,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note 4",
canceled_at: new Date(),
})
@@ -1694,7 +1694,7 @@ describe("/admin/order-edits", () => {
await simpleOrderEditFactory(dbConnection, {
id: cancellableEditId,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
@@ -1702,14 +1702,14 @@ describe("/admin/order-edits", () => {
id: canceledEditId,
canceled_at: new Date(),
canceled_by: "admin_user",
created_by: "admin_user",
created_by: expect.any(String),
})
await simpleOrderEditFactory(dbConnection, {
id: confirmedEditId,
confirmed_at: new Date(),
confirmed_by: "admin_user",
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
})
@@ -1732,7 +1732,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: cancellableEditId,
created_by: "admin_user",
created_by: expect.any(String),
canceled_by: "admin_user",
canceled_at: expect.any(String),
status: "canceled",
@@ -1753,7 +1753,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: canceledEditId,
created_by: "admin_user",
created_by: expect.any(String),
canceled_by: "admin_user",
canceled_at: expect.any(String),
status: "canceled",
@@ -1868,7 +1868,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: orderEditId,
created_by: "admin_user",
created_by: expect.any(String),
confirmed_by: "admin_user",
confirmed_at: expect.any(String),
status: "confirmed",
@@ -1915,7 +1915,7 @@ describe("/admin/order-edits", () => {
const api = useApi()
const confirmedOrderEdit = await simpleOrderEditFactory(dbConnection, {
created_by: "admin_user",
created_by: expect.any(String),
confirmed_at: new Date(),
confirmed_by: "admin_user",
})
@@ -1930,7 +1930,7 @@ describe("/admin/order-edits", () => {
expect(response.data.order_edit).toEqual(
expect.objectContaining({
id: confirmedOrderEdit.id,
created_by: "admin_user",
created_by: expect.any(String),
confirmed_by: "admin_user",
confirmed_at: expect.any(String),
status: "confirmed",
@@ -1942,7 +1942,7 @@ describe("/admin/order-edits", () => {
const api = useApi()
const canceledOrderEdit = await simpleOrderEditFactory(dbConnection, {
created_by: "admin_user",
created_by: expect.any(String),
canceled_at: new Date(),
canceled_by: "admin_user",
})
@@ -1965,7 +1965,7 @@ describe("/admin/order-edits", () => {
const api = useApi()
const declinedOrderEdit = await simpleOrderEditFactory(dbConnection, {
created_by: "admin_user",
created_by: expect.any(String),
declined_at: new Date(),
declined_by: "admin_user",
})
@@ -2155,7 +2155,7 @@ describe("/admin/order-edits", () => {
status: "created",
order_id: orderId,
internal_note: "This is an internal note",
created_by: "admin_user",
created_by: expect.any(String),
items: expect.arrayContaining([
expect.objectContaining({
id: expect.any(String),
@@ -2330,7 +2330,7 @@ describe("/admin/order-edits", () => {
status: "created",
order_id: orderId,
internal_note: "This is an internal note",
created_by: "admin_user",
created_by: expect.any(String),
items: expect.arrayContaining([
expect.objectContaining({
id: expect.any(String),
@@ -2503,7 +2503,7 @@ describe("/admin/order-edits", () => {
status: "created",
order_id: order.id,
internal_note: "This is an internal note",
created_by: "admin_user",
created_by: expect.any(String),
items: expect.arrayContaining([
expect.objectContaining({
id: expect.any(String),
@@ -2617,7 +2617,7 @@ describe("/admin/order-edits", () => {
status: "created",
order_id: order.id,
internal_note: "This is an internal note",
created_by: "admin_user",
created_by: expect.any(String),
items: expect.arrayContaining([
expect.objectContaining({
id: expect.any(String),
@@ -2810,7 +2810,7 @@ describe("/admin/order-edits", () => {
status: "created",
order_id: orderId,
internal_note: "This is an internal note",
created_by: "admin_user",
created_by: expect.any(String),
items: expect.arrayContaining([
expect.objectContaining({
id: expect.any(String),
@@ -3040,7 +3040,7 @@ describe("/admin/order-edits", () => {
]),
status: "created",
order_id: orderId,
created_by: "admin_user",
created_by: expect.any(String),
items: [
expect.objectContaining({
id: expect.any(String),
@@ -3164,7 +3164,7 @@ describe("/admin/order-edits", () => {
],
status: "created",
order_id: discountOrder.id,
created_by: "admin_user",
created_by: expect.any(String),
items: [
expect.objectContaining({
id: expect.any(String),
@@ -3298,7 +3298,7 @@ describe("/admin/order-edits", () => {
],
status: "created",
order_id: discountOrder.id,
created_by: "admin_user",
created_by: expect.any(String),
items: [
expect.objectContaining({
id: expect.any(String),

View File

@@ -164,7 +164,7 @@ describe("Publishable API keys", () => {
expect(response.status).toBe(200)
expect(response.data.publishable_api_key).toMatchObject({
created_by: "admin_user",
created_by: expect.any(String),
id: expect.any(String),
title: "Store api key",
revoked_by: null,

View File

@@ -24,17 +24,17 @@ const setupJobDb = async (dbConnection) => {
await simpleBatchJobFactory(dbConnection, {
id: "job_1",
type: "product-export",
created_by: "admin_user",
created_by: expect.any(String),
})
await simpleBatchJobFactory(dbConnection, {
id: "job_2",
type: "product-export",
created_by: "admin_user",
created_by: expect.any(String),
})
await simpleBatchJobFactory(dbConnection, {
id: "job_3",
type: "product-export",
created_by: "admin_user",
created_by: expect.any(String),
})
await simpleBatchJobFactory(dbConnection, {
id: "job_4",
@@ -47,7 +47,7 @@ const setupJobDb = async (dbConnection) => {
type: "product-export",
status: "completed",
completed_at: "2022-06-27T22:00:00.000Z",
created_by: "admin_user",
created_by: expect.any(String),
})
}
@@ -91,25 +91,25 @@ describe("/admin/batch-jobs", () => {
id: "job_5",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
id: "job_3",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
id: "job_2",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
id: "job_1",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
]),
})
@@ -132,19 +132,19 @@ describe("/admin/batch-jobs", () => {
id: "job_3",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
id: "job_2",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
id: "job_1",
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
}),
]),
})
@@ -171,7 +171,7 @@ describe("/admin/batch-jobs", () => {
expect.objectContaining({
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
})
)
})
@@ -213,7 +213,7 @@ describe("/admin/batch-jobs", () => {
expect(response.status).toEqual(201)
expect(response.data.batch_job).toEqual(
expect.objectContaining({
created_by: "admin_user",
created_by: expect.any(String),
status: "created",
id: expect.any(String),
})
@@ -254,7 +254,7 @@ describe("/admin/batch-jobs", () => {
await simpleBatchJobFactory(dbConnection, {
id: "job_complete",
type: "product-export",
created_by: "admin_user",
created_by: expect.any(String),
completed_at: new Date(),
})
})

View File

@@ -123,7 +123,7 @@ describe("/store/order-edits", () => {
const orderEdit = await simpleOrderEditFactory(dbConnection, {
id: orderEditId,
order_id: order.id,
created_by: "admin_user",
created_by: expect.any(String),
internal_note: "test internal note",
})
@@ -254,20 +254,20 @@ describe("/store/order-edits", () => {
declineableOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-1"),
created_by: "admin_user",
created_by: expect.any(String),
requested_at: new Date(),
})
declinedOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-2"),
created_by: "admin_user",
created_by: expect.any(String),
declined_reason: "wrong size",
declined_at: new Date(),
})
confirmedOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-3"),
created_by: "admin_user",
created_by: expect.any(String),
confirmed_at: new Date(),
})
})
@@ -360,20 +360,20 @@ describe("/store/order-edits", () => {
requestedOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-1"),
created_by: "admin_user",
created_by: expect.any(String),
requested_at: new Date(),
})
confirmedOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-2"),
created_by: "admin_user",
created_by: expect.any(String),
confirmed_at: new Date(),
confirmed_by: "admin_user",
})
createdOrderEdit = await simpleOrderEditFactory(dbConnection, {
id: IdMap.getId("order-edit-3"),
created_by: "admin_user",
created_by: expect.any(String),
})
})

View File

@@ -1,8 +1,8 @@
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { IAuthModuleService } from "@medusajs/types"
import { ModuleRegistrationName, Modules } from "@medusajs/modules-sdk"
import { IAuthModuleService, IUserModuleService } from "@medusajs/types"
import jwt from "jsonwebtoken"
import { getContainer } from "../environment-helpers/use-container"
import adminSeeder from "./admin-seeder"
import { ContainerRegistrationKeys } from "@medusajs/utils"
export const adminHeaders = {
headers: { "x-medusa-access-token": "test_token" },
@@ -13,26 +13,53 @@ export const createAdminUser = async (
adminHeaders,
container?
) => {
const { password_hash } = await adminSeeder(dbConnection)
const appContainer = container ?? getContainer()!
const userModule: IUserModuleService = appContainer.resolve(
ModuleRegistrationName.USER
)
const authModule: IAuthModuleService = appContainer.resolve(
ModuleRegistrationName.AUTH
)
if (authModule) {
const authUser = await authModule.create({
provider: "emailpass",
entity_id: "admin@medusa.js",
scope: "admin",
app_metadata: {
user_id: "admin_user",
},
provider_metadata: {
password: password_hash,
},
})
const remoteLink = appContainer.resolve(ContainerRegistrationKeys.REMOTE_LINK)
const token = jwt.sign(authUser, "test")
adminHeaders.headers["authorization"] = `Bearer ${token}`
}
const user = await userModule.create({
first_name: "Admin",
last_name: "User",
email: "admin@medusa.js",
})
const authIdentity = await authModule.create({
provider: "emailpass",
entity_id: "admin@medusa.js",
scope: "admin",
provider_metadata: {
password: "somepassword",
},
})
// Ideally we simulate a signup process than manually linking here.
await remoteLink.create([
{
[Modules.USER]: {
user_id: user.id,
},
[Modules.AUTH]: {
auth_identity_id: authIdentity.id,
},
},
])
const token = jwt.sign(
{
actor_id: user.id,
actor_type: "user",
auth_identity_id: authIdentity.id,
scope: "admin",
app_metadata: {},
},
"test"
)
adminHeaders.headers["authorization"] = `Bearer ${token}`
}

View File

@@ -43,7 +43,7 @@ medusaIntegrationTestRunner({
expect.objectContaining({
id: expect.any(String),
name: "VIP",
created_by: "admin_user",
created_by: expect.any(String),
})
)
})

View File

@@ -44,7 +44,7 @@ medusaIntegrationTestRunner({
id: expect.any(String),
first_name: "John",
last_name: "Doe",
created_by: "admin_user",
created_by: expect.any(String),
})
)
})

View File

@@ -7,6 +7,7 @@ import {
adminHeaders,
createAdminUser,
} from "../../../../helpers/create-admin-user"
import { ContainerRegistrationKeys } from "@medusajs/utils"
jest.setTimeout(50000)
@@ -17,32 +18,30 @@ medusaIntegrationTestRunner({
testSuite: ({ dbConnection, getContainer, api }) => {
describe("POST /store/customers", () => {
let appContainer
let customerModuleService: ICustomerModuleService
beforeAll(async () => {
appContainer = getContainer()
customerModuleService = appContainer.resolve(
ModuleRegistrationName.CUSTOMER
)
})
beforeEach(async () => {
await createAdminUser(dbConnection, adminHeaders, appContainer)
})
it("should create a customer", async () => {
// TODO: Reenable once the customer authentication is fixed, and use the HTTP endpoints instead.
it.skip("should create a customer", async () => {
const authService: IAuthModuleService = appContainer.resolve(
ModuleRegistrationName.AUTH
)
const { http } =
appContainer.resolve("configModule").projectConfig
const authUser = await authService.create({
const { http } = appContainer.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const authIdentity = await authService.create({
entity_id: "store_user",
provider: "emailpass",
scope: "store",
})
const token = jwt.sign(authUser, http.jwtSecret)
const token = jwt.sign(authIdentity, http.jwtSecret)
const response = await api.post(
`/store/customers`,

View File

@@ -117,7 +117,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
provider_id: null,
metadata: null,
children: [],
@@ -151,7 +151,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
is_combinable: false,
tax_region: expect.any(Object),
rules: [
@@ -183,7 +183,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
metadata: null,
provider_id: null,
children: [],
@@ -222,7 +222,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({ id: defRes.data.tax_rate.id }),
expect.objectContaining({
@@ -260,7 +260,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
provider_id: null,
metadata: null,
children: [],
@@ -294,7 +294,7 @@ medusaIntegrationTestRunner({
created_at: expect.any(String),
updated_at: expect.any(String),
deleted_at: null,
created_by: "admin_user",
created_by: expect.any(String),
is_combinable: false,
tax_region: expect.any(Object),
rules: [
@@ -331,7 +331,7 @@ medusaIntegrationTestRunner({
deleted_at: null,
created_at: expect.any(String),
updated_at: expect.any(String),
created_by: "admin_user",
created_by: expect.any(String),
is_combinable: true,
tax_region: expect.any(Object),
rules: [
@@ -525,7 +525,7 @@ medusaIntegrationTestRunner({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_1234",
created_by: "admin_user",
created_by: expect.any(String),
created_at: expect.any(Date),
updated_at: expect.any(Date),
deleted_at: null,
@@ -558,19 +558,19 @@ medusaIntegrationTestRunner({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_1234",
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_1111",
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_2222",
created_by: "admin_user",
created_by: expect.any(String),
}),
])
)
@@ -604,25 +604,25 @@ medusaIntegrationTestRunner({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_3333",
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_4444",
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_5555",
created_by: "admin_user",
created_by: expect.any(String),
}),
expect.objectContaining({
tax_rate_id: rateId,
reference: "product",
reference_id: "prod_6666",
created_by: "admin_user",
created_by: expect.any(String),
}),
])
)

View File

@@ -27,7 +27,7 @@ medusaIntegrationTestRunner({
expect(response.status).toEqual(200)
expect(response.data).toEqual({
user: expect.objectContaining({ id: "admin_user" }),
user: expect.objectContaining({ id: expect.any(String) }),
})
})
})

View File

@@ -1,7 +1,8 @@
import { CreateCustomerDTO, MedusaContainer } from "@medusajs/types"
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { ModuleRegistrationName, Modules } from "@medusajs/modules-sdk"
import jwt from "jsonwebtoken"
import { ContainerRegistrationKeys } from "@medusajs/utils"
export const createAuthenticatedCustomer = async (
appContainer: MedusaContainer,
@@ -12,6 +13,7 @@ export const createAuthenticatedCustomer = async (
const customerModuleService = appContainer.resolve(
ModuleRegistrationName.CUSTOMER
)
const remoteLink = appContainer.resolve(ContainerRegistrationKeys.REMOTE_LINK)
const customer = await customerModuleService.create({
first_name: "John",
@@ -20,14 +22,34 @@ export const createAuthenticatedCustomer = async (
...customerData,
})
const authUser = await authService.create({
const authIdentity = await authService.create({
entity_id: "store_user",
provider: "emailpass",
scope: "store",
app_metadata: { customer_id: customer.id },
})
const token = jwt.sign(authUser, http.jwtSecret)
// Ideally we simulate a signup process than manually linking here.
await remoteLink.create([
{
[Modules.CUSTOMER]: {
customer_id: customer.id,
},
[Modules.AUTH]: {
auth_identity_id: authIdentity.id,
},
},
])
return { customer, authUser, jwt: token }
const token = jwt.sign(
{
actor_id: customer.id,
actor_type: "customer",
auth_identity_id: authIdentity.id,
scope: "store",
app_metadata: {},
},
http.jwtSecret
)
return { customer, authIdentity, jwt: token }
}

View File

@@ -1 +0,0 @@
export * from "./steps"

View File

@@ -1 +0,0 @@
export * from "./set-auth-app-metadata"

View File

@@ -1,60 +0,0 @@
import { StepResponse, createStep } from "@medusajs/workflows-sdk"
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { IAuthModuleService } from "@medusajs/types"
import { isDefined } from "@medusajs/utils"
type StepInput = {
authUserId: string
key: string
value: string
}
export const setAuthAppMetadataStepId = "set-auth-app-metadata"
export const setAuthAppMetadataStep = createStep(
setAuthAppMetadataStepId,
async (data: StepInput, { container }) => {
const service = container.resolve<IAuthModuleService>(
ModuleRegistrationName.AUTH
)
const authUser = await service.retrieve(data.authUserId)
const appMetadata = authUser.app_metadata || {}
if (isDefined(appMetadata[data.key])) {
throw new Error(`Key ${data.key} already exists in app metadata`)
}
appMetadata[data.key] = data.value
await service.update({
id: authUser.id,
app_metadata: appMetadata,
})
return new StepResponse(authUser, { id: authUser.id, key: data.key })
},
async (idAndKey, { container }) => {
if (!idAndKey) {
return
}
const { id, key } = idAndKey
const service = container.resolve<IAuthModuleService>(
ModuleRegistrationName.AUTH
)
const authUser = await service.retrieve(id)
const appMetadata = authUser.app_metadata || {}
if (isDefined(appMetadata[key])) {
delete appMetadata[key]
}
await service.update({
id: authUser.id,
app_metadata: appMetadata,
})
}
)

View File

@@ -1,11 +1,12 @@
import { CreateCustomerDTO, CustomerDTO } from "@medusajs/types"
import { createWorkflow, WorkflowData } from "@medusajs/workflows-sdk"
import { createCustomersStep } from "../steps"
import { setAuthAppMetadataStep } from "../../auth/steps"
import { transform } from "@medusajs/workflows-sdk"
import { Modules } from "@medusajs/modules-sdk"
import { createLinkStep } from "../../common"
type WorkflowInput = {
authUserId: string
authIdentityId: string
customersData: CreateCustomerDTO
}
@@ -20,12 +21,19 @@ export const createCustomerAccountWorkflow = createWorkflow(
(customers: CustomerDTO[]) => customers[0]
)
setAuthAppMetadataStep({
authUserId: input.authUserId,
key: "customer_id",
value: customer.id,
})
const link = transform(
{ customer, authIdentityId: input.authIdentityId },
(data) => {
return [
{
[Modules.CUSTOMER]: { customer_id: data.customer.id },
[Modules.AUTH]: { auth_identity_id: data.authIdentityId },
},
]
}
)
createLinkStep(link)
return customer
}
)

View File

@@ -1,5 +1,4 @@
export * from "./api-key"
export * from "./auth"
export * from "./common"
export * from "./customer"
export * from "./customer-group"

View File

@@ -4,10 +4,11 @@ import {
createWorkflow,
transform,
} from "@medusajs/workflows-sdk"
import { setAuthAppMetadataStep } from "../../auth"
import { createUsersStep } from "../../user"
import { deleteInvitesStep } from "../steps"
import { validateTokenStep } from "../steps/validate-token"
import { Modules } from "@medusajs/modules-sdk"
import { createLinkStep } from "../../common"
export const acceptInviteWorkflowId = "accept-invite-workflow"
export const acceptInviteWorkflow = createWorkflow(
@@ -31,18 +32,20 @@ export const acceptInviteWorkflow = createWorkflow(
const users = createUsersStep(createUserInput)
const authUserInput = transform({ input, users }, ({ input, users }) => {
const createdUser = users[0]
return {
authUserId: input.auth_user_id,
key: "user_id",
value: createdUser.id,
const link = transform(
{ users, authIdentityId: input.auth_identity_id },
(data) => {
const user = data.users[0]
return [
{
[Modules.USER]: { user_id: user.id },
[Modules.AUTH]: { auth_identity_id: data.authIdentityId },
},
]
}
})
setAuthAppMetadataStep(authUserInput)
)
createLinkStep(link)
deleteInvitesStep([invite.id])
return users

View File

@@ -4,11 +4,12 @@ import {
createWorkflow,
transform,
} from "@medusajs/workflows-sdk"
import { setAuthAppMetadataStep } from "../../auth/steps"
import { createUsersStep } from "../steps"
import { Modules } from "@medusajs/modules-sdk"
import { createLinkStep } from "../../common"
type WorkflowInput = {
authUserId: string
authIdentityId: string
userData: CreateUserDTO
}
@@ -17,15 +18,21 @@ export const createUserAccountWorkflow = createWorkflow(
createUserAccountWorkflowId,
(input: WorkflowData<WorkflowInput>): WorkflowData<UserDTO> => {
const users = createUsersStep([input.userData])
const user = transform(users, (users: UserDTO[]) => users[0])
setAuthAppMetadataStep({
authUserId: input.authUserId,
key: "user_id",
value: user.id,
})
const link = transform(
{ user, authIdentityId: input.authIdentityId },
(data) => {
return [
{
[Modules.USER]: { user_id: data.user.id },
[Modules.AUTH]: { auth_identity_id: data.authIdentityId },
},
]
}
)
createLinkStep(link)
return user
}
)

View File

@@ -3,11 +3,11 @@ import { BaseFilterable } from "../../dal"
/**
* @interface
*
* The auth user details.
* The auth identity details.
*/
export type AuthUserDTO = {
export type AuthIdentityDTO = {
/**
* The ID of the auth user.
* The ID of the auth identity.
*/
id: string
@@ -23,7 +23,7 @@ export type AuthUserDTO = {
entity_id: string
/**
* The scope of the auth user. For example,
* The scope of the auth identity. For example,
* `admin` or `store`.
*/
scope: string
@@ -47,11 +47,11 @@ export type AuthUserDTO = {
/**
* @interface
*
* The auth user to be created.
* The auth identity to be created.
*/
export type CreateAuthUserDTO = {
export type CreateAuthIdentityDTO = {
/**
* The ID of the auth user.
* The ID of the auth identity.
*/
id?: string
@@ -68,7 +68,7 @@ export type CreateAuthUserDTO = {
entity_id: string
/**
* The scope of the auth user. For example,
* The scope of the auth identity. For example,
* `admin` or `store`.
*/
scope: string
@@ -92,11 +92,11 @@ export type CreateAuthUserDTO = {
/**
* @interface
*
* The attributes to update in the auth user.
* The attributes to update in the auth identity.
*/
export type UpdateAuthUserDTO = {
export type UpdateAuthIdentityDTO = {
/**
* The ID of the auth user.
* The ID of the auth identity.
*/
id: string
@@ -117,17 +117,17 @@ export type UpdateAuthUserDTO = {
}
/**
* The filters to apply on the retrieved auth user.
* The filters to apply on the retrieved auth identity.
*/
export interface FilterableAuthUserProps
extends BaseFilterable<FilterableAuthUserProps> {
export interface FilterableAuthIdentityProps
extends BaseFilterable<FilterableAuthIdentityProps> {
/**
* The IDs to filter the auth user by.
* The IDs to filter the auth identity by.
*/
id?: string[]
/**
* Filter the auth users by the ID of their auth provider.
* Filter the auth identitys by the ID of their auth provider.
*/
provider?: string[] | string
}

View File

@@ -1,2 +1,2 @@
export * from "./auth-user"
export * from "./auth-identity"
export * from "./provider"

View File

@@ -12,7 +12,7 @@ export type AuthenticationResponse = {
/**
* The authenticated user's details.
*/
authUser?: any
authIdentity?: any
/**
* If an error occurs during the authentication process,

View File

@@ -1,10 +1,10 @@
import {
AuthUserDTO,
AuthIdentityDTO,
AuthenticationInput,
AuthenticationResponse,
CreateAuthUserDTO,
FilterableAuthUserProps,
UpdateAuthUserDTO,
CreateAuthIdentityDTO,
FilterableAuthIdentityProps,
UpdateAuthIdentityDTO,
} from "./common"
import { Context } from "../shared-context"
import { FindConfig } from "../common"
@@ -37,7 +37,7 @@ export interface IAuthModuleService extends IModuleService {
* `req` is an instance of the `MedusaRequest` object:
*
* ```ts
* const { success, authUser, location, error } =
* const { success, authIdentity, location, error } =
* await authModuleService.authenticate("emailpass", {
* url: req.url,
* headers: req.headers,
@@ -75,7 +75,7 @@ export interface IAuthModuleService extends IModuleService {
* `req` is an instance of the `MedusaRequest` object:
*
* ```ts
* const { success, authUser, error, successRedirectUrl } =
* const { success, authIdentity, error, successRedirectUrl } =
* await authModuleService.validateCallback("google", {
* url: req.url,
* headers: req.headers,
@@ -93,37 +93,37 @@ export interface IAuthModuleService extends IModuleService {
): Promise<AuthenticationResponse>
/**
* This method retrieves an auth user by its ID.
* This method retrieves an auth identity by its ID.
*
* @param {string} id - The ID of the auth user.
* @param {FindConfig<AuthUserDTO>} config - The configurations determining how the auth user is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth user.
* @param {string} id - The ID of the auth identity.
* @param {FindConfig<AuthIdentityDTO>} config - The configurations determining how the auth identity is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth identity.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO>} The retrieved auth user.
* @returns {Promise<AuthIdentityDTO>} The retrieved auth identity.
*
* @example
* const authUser = await authModuleService.retrieve("authusr_1")
* const authIdentity = await authModuleService.retrieve("authusr_1")
*/
retrieve(
id: string,
config?: FindConfig<AuthUserDTO>,
config?: FindConfig<AuthIdentityDTO>,
sharedContext?: Context
): Promise<AuthUserDTO>
): Promise<AuthIdentityDTO>
/**
* This method retrieves a paginated list of auth users based on optional filters and configuration.
* This method retrieves a paginated list of auth identitys based on optional filters and configuration.
*
* @param {FilterableAuthUserProps} filters - The filters to apply on the retrieved auth users.
* @param {FindConfig<AuthUserDTO>} config - The configurations determining how the auth user is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth user.
* @param {FilterableAuthIdentityProps} filters - The filters to apply on the retrieved auth identitys.
* @param {FindConfig<AuthIdentityDTO>} config - The configurations determining how the auth identity is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth identity.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO[]>} The list of auth users.
* @returns {Promise<AuthIdentityDTO[]>} The list of auth identitys.
*
* @example
* To retrieve a list of auth users using their IDs:
* To retrieve a list of auth identitys using their IDs:
*
* ```ts
* const authUsers = await authModuleService.list({
* const authIdentities = await authModuleService.list({
* id: ["authusr_123", "authusr_321"],
* })
* ```
@@ -131,7 +131,7 @@ export interface IAuthModuleService extends IModuleService {
* By default, only the first `15` records are retrieved. You can control pagination by specifying the `skip` and `take` properties of the `config` parameter:
*
* ```ts
* const authUsers = await authModuleService.list(
* const authIdentities = await authModuleService.list(
* {
* id: ["authusr_123", "authusr_321"],
* },
@@ -143,25 +143,25 @@ export interface IAuthModuleService extends IModuleService {
* ```
*/
list(
filters?: FilterableAuthUserProps,
config?: FindConfig<AuthUserDTO>,
filters?: FilterableAuthIdentityProps,
config?: FindConfig<AuthIdentityDTO>,
sharedContext?: Context
): Promise<AuthUserDTO[]>
): Promise<AuthIdentityDTO[]>
/**
* This method retrieves a paginated list of auth users along with the total count of available auth users satisfying the provided filters.
* This method retrieves a paginated list of auth identitys along with the total count of available auth identitys satisfying the provided filters.
*
* @param {FilterableAuthUserProps} filters - The filters to apply on the retrieved auth users.
* @param {FindConfig<AuthUserDTO>} config - The configurations determining how the auth user is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth user.
* @param {FilterableAuthIdentityProps} filters - The filters to apply on the retrieved auth identitys.
* @param {FindConfig<AuthIdentityDTO>} config - The configurations determining how the auth identity is retrieved. Its properties, such as `select` or `relations`, accept the
* attributes or relations associated with a auth identity.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<[AuthUserDTO[], number]>} The list of auth users along with their total count.
* @returns {Promise<[AuthIdentityDTO[], number]>} The list of auth identitys along with their total count.
*
* @example
* To retrieve a list of auth users using their IDs:
* To retrieve a list of auth identitys using their IDs:
*
* ```ts
* const [authUsers, count] =
* const [authIdentities, count] =
* await authModuleService.listAndCount({
* id: ["authusr_123", "authusr_321"],
* })
@@ -170,7 +170,7 @@ export interface IAuthModuleService extends IModuleService {
* By default, only the first `15` records are retrieved. You can control pagination by specifying the `skip` and `take` properties of the `config` parameter:
*
* ```ts
* const [authUsers, count] =
* const [authIdentities, count] =
* await authModuleService.listAndCount(
* {
* id: ["authusr_123", "authusr_321"],
@@ -183,20 +183,20 @@ export interface IAuthModuleService extends IModuleService {
* ```
*/
listAndCount(
filters?: FilterableAuthUserProps,
config?: FindConfig<AuthUserDTO>,
filters?: FilterableAuthIdentityProps,
config?: FindConfig<AuthIdentityDTO>,
sharedContext?: Context
): Promise<[AuthUserDTO[], number]>
): Promise<[AuthIdentityDTO[], number]>
/**
* This method creates auth users.
* This method creates auth identitys.
*
* @param {CreateAuthUserDTO[]} data - The auth users to be created.
* @param {CreateAuthIdentityDTO[]} data - The auth identitys to be created.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO[]>} The created auth users.
* @returns {Promise<AuthIdentityDTO[]>} The created auth identitys.
*
* @example
* const authUsers = await authModuleService.create([
* const authIdentities = await authModuleService.create([
* {
* provider: "emailpass",
* entity_id: "user@example.com",
@@ -210,35 +210,38 @@ export interface IAuthModuleService extends IModuleService {
* ])
*/
create(
data: CreateAuthUserDTO[],
data: CreateAuthIdentityDTO[],
sharedContext?: Context
): Promise<AuthUserDTO[]>
): Promise<AuthIdentityDTO[]>
/**
* This method creates an auth user.
* This method creates an auth identity.
*
* @param {CreateAuthUserDTO} data - The auth user to be created.
* @param {CreateAuthIdentityDTO} data - The auth identity to be created.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO>} The created auth user.
* @returns {Promise<AuthIdentityDTO>} The created auth identity.
*
* @example
* const authUser = await authModuleService.create({
* const authIdentity = await authModuleService.create({
* provider: "emailpass",
* entity_id: "user@example.com",
* scope: "admin",
* })
*/
create(data: CreateAuthUserDTO, sharedContext?: Context): Promise<AuthUserDTO>
create(
data: CreateAuthIdentityDTO,
sharedContext?: Context
): Promise<AuthIdentityDTO>
/**
* This method updates existing auths.
*
* @param {UpdateAuthUserDTO[]} data - The attributes to update in the auth users.
* @param {UpdateAuthIdentityDTO[]} data - The attributes to update in the auth identitys.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO[]>} The updated auths.
* @returns {Promise<AuthIdentityDTO[]>} The updated auths.
*
* @example
* const authUsers = await authModuleService.update([
* const authIdentities = await authModuleService.update([
* {
* id: "authusr_123",
* app_metadata: {
@@ -248,26 +251,29 @@ export interface IAuthModuleService extends IModuleService {
* ])
*/
update(
data: UpdateAuthUserDTO[],
data: UpdateAuthIdentityDTO[],
sharedContext?: Context
): Promise<AuthUserDTO[]>
): Promise<AuthIdentityDTO[]>
/**
* This method updates an existing auth.
*
* @param {UpdateAuthUserDTO} data - The attributes to update in the auth user.
* @param {UpdateAuthIdentityDTO} data - The attributes to update in the auth identity.
* @param {Context} sharedContext - A context used to share resources, such as transaction manager, between the application and the module.
* @returns {Promise<AuthUserDTO>} The updated auth.
* @returns {Promise<AuthIdentityDTO>} The updated auth.
*
* @example
* const authUser = await authModuleService.update({
* const authIdentity = await authModuleService.update({
* id: "authusr_123",
* app_metadata: {
* test: true,
* },
* })
*/
update(data: UpdateAuthUserDTO, sharedContext?: Context): Promise<AuthUserDTO>
update(
data: UpdateAuthIdentityDTO,
sharedContext?: Context
): Promise<AuthIdentityDTO>
/**
* This method deletes a auth by its ID.

View File

@@ -1,6 +1,6 @@
export interface AcceptInviteWorkflowInputDTO {
invite_token: string
auth_user_id: string
auth_identity_id: string
user: {
email?: string
first_name?: string | null

View File

@@ -48,7 +48,6 @@ export * from "./rules"
export * from "./selector-constraints-to-string"
export * from "./set-metadata"
export * from "./simple-hash"
export * from "./string-or-regex-equals"
export * from "./string-to-select-relation-object"
export * from "./stringify-circular"
export * from "./to-camel-case"

View File

@@ -1,9 +0,0 @@
export const stringEqualsOrRegexMatch = (
stringOrRegex: string | RegExp,
testString: string
) => {
if (stringOrRegex instanceof RegExp) {
return stringOrRegex.test(testString)
}
return stringOrRegex === testString
}

View File

@@ -86,4 +86,16 @@ export const LINKS = {
Modules.FULFILLMENT,
"fulfillment_id"
),
UserAuth: composeLinkName(
Modules.USER,
"user_id",
Modules.AUTH,
"auth_identity_id"
),
CustomerAuth: composeLinkName(
Modules.CUSTOMER,
"customer_id",
Modules.AUTH,
"auth_identity_id"
),
}

View File

@@ -15,7 +15,7 @@ export const POST = async (
selector: { id: req.params.id },
revoke: {
...req.validatedBody,
revoked_by: req.auth.actor_id,
revoked_by: req.auth_context.actor_id,
},
},
throwOnError: false,

View File

@@ -41,7 +41,7 @@ export const POST = async (
const input = [
{
...req.validatedBody,
created_by: req.auth.actor_id,
created_by: req.auth_context.actor_id,
},
]

View File

@@ -43,7 +43,7 @@ export const POST = async (
const customersData = [
{
...req.validatedBody,
created_by: req.auth.actor_id,
created_by: req.auth_context.actor_id,
},
]

View File

@@ -48,7 +48,7 @@ export const POST = async (
const customersData = [
{
...req.validatedBody,
created_by: req.auth?.actor_id,
created_by: req.auth_context.actor_id,
},
]

View File

@@ -1,28 +1,26 @@
import { acceptInviteWorkflow } from "@medusajs/core-flows"
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { IUserModuleService, InviteWorkflow } from "@medusajs/types"
import { InviteWorkflow } from "@medusajs/types"
import {
AuthenticatedMedusaRequest,
MedusaResponse,
} from "../../../../types/routing"
import { AdminInviteAcceptType } from "../validators"
import { MedusaError } from "@medusajs/utils"
export const POST = async (
req: AuthenticatedMedusaRequest<AdminInviteAcceptType>,
res: MedusaResponse
) => {
if (req.auth.actor_id) {
const moduleService: IUserModuleService = req.scope.resolve(
ModuleRegistrationName.USER
if (req.auth_context.actor_id) {
throw new MedusaError(
MedusaError.Types.INVALID_DATA,
"The user is already authenticated and cannot accept an invite."
)
const user = await moduleService.retrieve(req.auth.actor_id)
res.status(200).json({ user })
return
}
const input = {
invite_token: req.filterableFields.token as string,
auth_user_id: req.auth?.auth_user_id,
auth_identity_id: req.auth_context.auth_identity_id,
user: req.validatedBody,
} as InviteWorkflow.AcceptInviteWorkflowInputDTO
@@ -36,10 +34,5 @@ export const POST = async (
return
}
// Set customer_id on session user if we are in session
if (req.session.auth_user) {
req.session.auth_user.app_metadata.user_id = users[0].id
}
res.status(200).json({ user: users[0] })
}

View File

@@ -15,7 +15,7 @@ export const POST = async (
const { errors } = await capturePaymentWorkflow(req.scope).run({
input: {
payment_id: id,
captured_by: req.auth?.actor_id,
captured_by: req.auth_context.actor_id,
amount: req.validatedBody.amount,
},
throwOnError: false,

View File

@@ -14,7 +14,7 @@ export const POST = async (
const { errors } = await refundPaymentWorkflow(req.scope).run({
input: {
payment_id: id,
created_by: req.auth?.actor_id,
created_by: req.auth_context.actor_id,
amount: req.validatedBody.amount,
},
throwOnError: false,

View File

@@ -23,7 +23,7 @@ export const POST = async (
const { errors } = await updateTaxRatesWorkflow(req.scope).run({
input: {
selector: { id: req.params.id },
update: { ...req.validatedBody, updated_by: req.auth.actor_id },
update: { ...req.validatedBody, updated_by: req.auth_context.actor_id },
},
throwOnError: false,
})

View File

@@ -16,7 +16,7 @@ export const POST = async (
{
...req.validatedBody,
tax_rate_id: req.params.id,
created_by: req.auth.actor_id,
created_by: req.auth_context.actor_id,
},
],
},

View File

@@ -21,7 +21,7 @@ export const POST = async (
input: [
{
...req.validatedBody,
created_by: req.auth.actor_id,
created_by: req.auth_context.actor_id,
},
],
throwOnError: false,

View File

@@ -21,7 +21,7 @@ export const POST = async (
input: [
{
...req.validatedBody,
created_by: req.auth.actor_id,
created_by: req.auth_context.actor_id,
},
],
throwOnError: false,

View File

@@ -12,7 +12,7 @@ export const GET = async (
req: AuthenticatedMedusaRequest,
res: MedusaResponse
) => {
const id = req.auth.app_metadata.user_id
const id = req.auth_context.actor_id
const remoteQuery = req.scope.resolve(ContainerRegistrationKeys.REMOTE_QUERY)
if (!id) {

View File

@@ -5,12 +5,12 @@ import {
MedusaError,
remoteQueryObjectFromString,
} from "@medusajs/utils"
import jwt from "jsonwebtoken"
import {
AuthenticatedMedusaRequest,
MedusaResponse,
} from "../../../types/routing"
import { refetchUser } from "./helpers"
import { generateJwtToken } from "../../utils/auth/token"
export const GET = async (
req: AuthenticatedMedusaRequest,
@@ -41,7 +41,7 @@ export const POST = async (
res: MedusaResponse
) => {
// If `actor_id` is present, the request carries authentication for an existing user
if (req.auth.actor_id) {
if (req.auth_context.actor_id) {
throw new MedusaError(
MedusaError.Types.INVALID_DATA,
"Request carries authentication for an existing user"
@@ -51,30 +51,42 @@ export const POST = async (
const input = {
input: {
userData: req.validatedBody,
authUserId: req.auth.auth_user_id,
authIdentityId: req.auth_context.auth_identity_id,
},
throwOnError: false,
}
const { errors } = await createUserAccountWorkflow(req.scope).run(input)
const { result, errors } = await createUserAccountWorkflow(req.scope).run(
input
)
if (Array.isArray(errors) && errors[0]) {
throw errors[0].error
}
const { http } = req.scope.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const { jwtSecret, jwtExpiresIn } = http
const token = generateJwtToken(
{
actor_id: result.id,
actor_type: "user",
auth_identity_id: req.auth_context.auth_identity_id,
app_metadata: {},
scope: "admin",
},
{
secret: jwtSecret,
expiresIn: jwtExpiresIn,
}
)
const user = await refetchUser(
req.auth.auth_user_id,
result.id,
req.scope,
req.remoteQueryConfig.fields
)
const { http } = req.scope.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const token = jwt.sign(user, http.jwtSecret, {
expiresIn: http.jwtExpiresIn,
})
res.status(200).json({ user, token })
}

View File

@@ -1,12 +1,18 @@
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { AuthenticationInput, IAuthModuleService } from "@medusajs/types"
import { MedusaError } from "@medusajs/utils"
import jwt from "jsonwebtoken"
import {
ContainerRegistrationKeys,
MedusaError,
remoteQueryObjectFromString,
} from "@medusajs/utils"
import { MedusaRequest, MedusaResponse } from "../../../../../types/routing"
import { generateJwtToken } from "../../../../utils/auth/token"
export const GET = async (req: MedusaRequest, res: MedusaResponse) => {
const { scope, auth_provider } = req.params
const actorType = scope === "admin" ? "user" : "customer"
const remoteQuery = req.scope.resolve(ContainerRegistrationKeys.REMOTE_QUERY)
const service: IAuthModuleService = req.scope.resolve(
ModuleRegistrationName.AUTH
)
@@ -20,16 +26,37 @@ export const GET = async (req: MedusaRequest, res: MedusaResponse) => {
protocol: req.protocol,
} as AuthenticationInput
const authResult = await service.validateCallback(auth_provider, authData)
const { success, error, authIdentity, successRedirectUrl } =
await service.validateCallback(auth_provider, authData)
const { success, error, authUser, successRedirectUrl } = authResult
const queryObject = remoteQueryObjectFromString({
entryPoint: "auth_identity",
fields: [`${actorType}.id`],
variables: { id: authIdentity.id },
})
const [actorData] = await remoteQuery(queryObject)
const entityId = actorData?.[actorType]?.id
if (success) {
const { http } = req.scope.resolve("configModule").projectConfig
const { http } = req.scope.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const { jwtSecret, jwtExpiresIn } = http
const token = jwt.sign(authUser, jwtSecret, { expiresIn: jwtExpiresIn })
// TODO: Clean up mapping between scope and actor type
const token = generateJwtToken(
{
actor_id: entityId,
actor_type: actorType,
auth_identity_id: authIdentity.id,
app_metadata: {},
scope,
},
{
secret: jwtSecret,
expiresIn: jwtExpiresIn,
}
)
if (successRedirectUrl) {
const url = new URL(successRedirectUrl!)

View File

@@ -1,11 +1,17 @@
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { AuthenticationInput, IAuthModuleService } from "@medusajs/types"
import { MedusaError } from "@medusajs/utils"
import jwt from "jsonwebtoken"
import {
ContainerRegistrationKeys,
MedusaError,
remoteQueryObjectFromString,
} from "@medusajs/utils"
import { MedusaRequest, MedusaResponse } from "../../../../types/routing"
import { generateJwtToken } from "../../../utils/auth/token"
export const GET = async (req: MedusaRequest, res: MedusaResponse) => {
const { scope, auth_provider } = req.params
const actorType = scope === "admin" ? "user" : "customer"
const remoteQuery = req.scope.resolve(ContainerRegistrationKeys.REMOTE_QUERY)
const service: IAuthModuleService = req.scope.resolve(
ModuleRegistrationName.AUTH
@@ -20,9 +26,10 @@ export const GET = async (req: MedusaRequest, res: MedusaResponse) => {
protocol: req.protocol,
} as AuthenticationInput
const authResult = await service.authenticate(auth_provider, authData)
const { success, error, authUser, location } = authResult
const { success, error, authIdentity, location } = await service.authenticate(
auth_provider,
authData
)
if (location) {
res.redirect(location)
@@ -30,11 +37,33 @@ export const GET = async (req: MedusaRequest, res: MedusaResponse) => {
}
if (success) {
const { http } = req.scope.resolve("configModule").projectConfig
const { http } = req.scope.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const token = jwt.sign(authUser, http.jwtSecret, {
expiresIn: http.jwtExpiresIn,
const queryObject = remoteQueryObjectFromString({
entryPoint: "auth_identity",
fields: [`${actorType}.id`],
variables: { id: authIdentity.id },
})
const [actorData] = await remoteQuery(queryObject)
const entityId = actorData?.[actorType]?.id
const { jwtSecret, jwtExpiresIn } = http
// TODO: Clean up mapping between scope and actor type
const token = generateJwtToken(
{
actor_id: entityId,
actor_type: actorType,
auth_identity_id: authIdentity.id,
app_metadata: {},
scope,
},
{
secret: jwtSecret,
expiresIn: jwtExpiresIn,
}
)
return res.status(200).json({ token })
}

View File

@@ -5,12 +5,12 @@ export const authRoutesMiddlewares: MiddlewareRoute[] = [
{
method: ["POST"],
matcher: "/auth/session",
middlewares: [authenticate(/.*/, "bearer")],
middlewares: [authenticate("*", "bearer")],
},
{
method: ["DELETE"],
matcher: "/auth/session",
middlewares: [authenticate(/.*/, ["session"])],
middlewares: [authenticate("*", ["session"])],
},
{
method: ["POST"],

View File

@@ -7,9 +7,9 @@ export const POST = async (
req: AuthenticatedMedusaRequest,
res: MedusaResponse
) => {
req.session.auth_user = req.auth
req.session.auth_context = req.auth_context
res.status(200).json({ user: req.auth })
res.status(200).json({ user: req.auth_context })
}
export const DELETE = async (

View File

@@ -12,7 +12,7 @@ export const POST = async (
) => {
const workflowInput = {
...req.validatedBody,
customer_id: req.auth?.actor_id,
customer_id: req.auth_context?.actor_id,
}
const { result, errors } = await createCartWorkflow(req.scope).run({

View File

@@ -23,7 +23,7 @@ export const GET = async (
req: AuthenticatedMedusaRequest<StoreGetCustomerAddressParamsType>,
res: MedusaResponse
) => {
const customerId = req.auth.actor_id
const customerId = req.auth_context.actor_id
const remoteQuery = req.scope.resolve(ContainerRegistrationKeys.REMOTE_QUERY)
const queryObject = remoteQueryObjectFromString({
@@ -49,7 +49,7 @@ export const POST = async (
req: AuthenticatedMedusaRequest<StoreUpdateCustomerAddressType>,
res: MedusaResponse
) => {
const id = req.auth.actor_id!
const id = req.auth_context.actor_id!
await validateCustomerAddress(req.scope, id, req.params.address_id)
const updateAddresses = updateCustomerAddressesWorkflow(req.scope)
@@ -78,7 +78,7 @@ export const DELETE = async (
req: AuthenticatedMedusaRequest,
res: MedusaResponse
) => {
const id = req.auth.actor_id
const id = req.auth_context.actor_id
await validateCustomerAddress(req.scope, id, req.params.address_id)
const deleteAddress = deleteCustomerAddressesWorkflow(req.scope)

View File

@@ -18,7 +18,7 @@ export const GET = async (
req: AuthenticatedMedusaRequest<StoreGetCustomerAddressesParamsType>,
res: MedusaResponse
) => {
const customerId = req.auth.actor_id
const customerId = req.auth_context.actor_id
const remoteQuery = req.scope.resolve(ContainerRegistrationKeys.REMOTE_QUERY)
const queryObject = remoteQueryObjectFromString({
@@ -44,7 +44,7 @@ export const POST = async (
req: AuthenticatedMedusaRequest<StoreCreateCustomerAddressType>,
res: MedusaResponse
) => {
const customerId = req.auth.actor_id
const customerId = req.auth_context.actor_id
const createAddresses = createCustomerAddressesWorkflow(req.scope)
const addresses = [

View File

@@ -15,7 +15,7 @@ export const GET = async (
req: AuthenticatedMedusaRequest<StoreGetCustomerParamsType>,
res: MedusaResponse
) => {
const id = req.auth.actor_id
const id = req.auth_context.actor_id
const customer = await refetchCustomer(
id,
req.scope,
@@ -36,7 +36,7 @@ export const POST = async (
req: AuthenticatedMedusaRequest<StoreUpdateCustomerType>,
res: MedusaResponse
) => {
const customerId = req.auth.actor_id
const customerId = req.auth_context.actor_id
const { errors } = await updateCustomersWorkflow(req.scope).run({
input: {
selector: { id: customerId },

View File

@@ -2,53 +2,59 @@ import {
AuthenticatedMedusaRequest,
MedusaResponse,
} from "../../../types/routing"
import {
ContainerRegistrationKeys,
remoteQueryObjectFromString,
} from "@medusajs/utils"
import { ContainerRegistrationKeys, MedusaError } from "@medusajs/utils"
import { createCustomerAccountWorkflow } from "@medusajs/core-flows"
import { refetchCustomer } from "./helpers"
import { StoreCreateCustomerType } from "./validators"
import { generateJwtToken } from "../../utils/auth/token"
export const POST = async (
req: AuthenticatedMedusaRequest<StoreCreateCustomerType>,
res: MedusaResponse
) => {
if (req.auth.actor_id) {
const remoteQuery = req.scope.resolve(
ContainerRegistrationKeys.REMOTE_QUERY
// If `actor_id` is present, the request carries authentication for an existing customer
if (req.auth_context.actor_id) {
throw new MedusaError(
MedusaError.Types.INVALID_DATA,
"Request already authenticated as a customer."
)
const query = remoteQueryObjectFromString({
entryPoint: "customer",
variables: { id: req.auth.actor_id },
fields: [],
})
const [customer] = await remoteQuery(query)
res.status(200).json({ customer })
return
}
const createCustomers = createCustomerAccountWorkflow(req.scope)
const customersData = req.validatedBody
const { result } = await createCustomers.run({
input: { customersData, authUserId: req.auth.auth_user_id },
const { result, errors } = await createCustomers.run({
input: { customersData, authIdentityId: req.auth_context.auth_identity_id },
})
// Set customer_id on session user if we are in session
if (req.session.auth_user) {
req.session.auth_user.app_metadata.customer_id = result.id
if (Array.isArray(errors) && errors[0]) {
throw errors[0].error
}
const { http } = req.scope.resolve(
ContainerRegistrationKeys.CONFIG_MODULE
).projectConfig
const { jwtSecret, jwtExpiresIn } = http
const token = generateJwtToken(
{
actor_id: result.id,
actor_type: "customer",
auth_identity_id: req.auth_context.auth_identity_id,
app_metadata: {},
scope: "store",
},
{
secret: jwtSecret,
expiresIn: jwtExpiresIn,
}
)
const customer = await refetchCustomer(
result.id,
req.scope,
req.remoteQueryConfig.fields
)
res.status(200).json({ customer })
res.status(200).json({ customer, token })
}

View File

@@ -17,7 +17,10 @@ export const GET = async (
const queryObject = remoteQueryObjectFromString({
entryPoint: "order",
variables: {
filters: { ...req.filterableFields, customer_id: req.auth.actor_id },
filters: {
...req.filterableFields,
customer_id: req.auth_context.actor_id,
},
...req.remoteQueryConfig.pagination,
},
fields: req.remoteQueryConfig.fields,

View File

@@ -14,9 +14,9 @@ export const POST = async (
const { context = {}, data, provider_id } = req.body
// If the customer is logged in, we auto-assign them to the payment collection
if (req.auth?.actor_id) {
if (req.auth_context?.actor_id) {
;(context as any).customer = {
id: req.auth.actor_id,
id: req.auth_context?.actor_id,
}
}
const workflowInput = {

View File

@@ -0,0 +1,14 @@
import { AuthContext } from "../../../types/routing"
import jwt from "jsonwebtoken"
export const generateJwtToken = (
authContext: AuthContext,
jwtConfig: {
secret: string
expiresIn: string
}
) => {
return jwt.sign(authContext, jwtConfig.secret, {
expiresIn: jwtConfig.expiresIn,
})
}

View File

@@ -6,7 +6,8 @@ import { track } from "medusa-telemetry"
import loaders from "../loaders"
import Logger from "../loaders/logger"
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import { ModuleRegistrationName, Modules } from "@medusajs/modules-sdk"
import { ContainerRegistrationKeys } from "@medusajs/utils"
export default async function ({
directory,
@@ -26,6 +27,8 @@ export default async function ({
const userService = container.resolve(ModuleRegistrationName.USER)
const authService = container.resolve(ModuleRegistrationName.AUTH)
const remoteLink = container.resolve(ContainerRegistrationKeys.REMOTE_LINK)
const provider = "emailpass"
if (invite) {
@@ -37,7 +40,7 @@ export default async function ({
} else {
const user = await userService.create({ email })
const { authUser } = await authService.authenticate(provider, {
const { authIdentity } = await authService.authenticate(provider, {
body: {
email,
password,
@@ -45,12 +48,16 @@ export default async function ({
authScope: "admin",
})
await authService.update({
id: authUser.id,
app_metadata: {
user_id: user.id,
await remoteLink.create([
{
[Modules.USER]: {
user_id: user.id,
},
[Modules.AUTH]: {
auth_identity_id: authIdentity.id,
},
},
})
])
}
} catch (err) {
console.error(err)

View File

@@ -16,7 +16,6 @@ import supertest from "supertest"
import apiLoader from "../../../../api"
import { getResolvedPlugins } from "../../../../helpers/resolve-plugins"
import featureFlagLoader, { featureFlagRouter } from "../../../../feature-flags"
import passportLoader from "../../../../passport"
import RoutesLoader from "../.."
import { config } from "../mocks"
@@ -90,7 +89,6 @@ export const createServer = async (rootDir) => {
const plugins = getResolvedPlugins(rootDir, config) || []
featureFlagLoader(config)
await passportLoader({ app: app, configModule: config })
await moduleLoader({ container, moduleResolutions })
app.use((req, res, next) => {

View File

@@ -168,7 +168,8 @@ describe("RoutesLoader", function () {
expect(res.text).toBe("GET /store/protected")
})
it("should return 401 when customer is not authenticated", async () => {
// The authentication middleware has changed and is not automatically attached currently
it.skip("should return 401 when customer is not authenticated", async () => {
const res = await request("GET", "/store/me/protected")
expect(res.status).toBe(401)

View File

@@ -6,12 +6,7 @@ import { readdir } from "fs/promises"
import { parseCorsOrigins } from "medusa-core-utils"
import { extname, join, sep } from "path"
import { MedusaRequest, MedusaResponse } from "../../../types/routing"
import {
authenticateCustomer,
authenticateLegacy,
errorHandler,
requireCustomerAuthentication,
} from "../../../utils/middlewares"
import { errorHandler } from "../../../utils/middlewares"
import logger from "../../logger"
import {
AsyncRouteHandler,
@@ -645,27 +640,6 @@ export class RoutesLoader {
)
}
if (descriptor.config.shouldAppendCustomer) {
/**
* Add the customer to the request object
*/
this.router.use(descriptor.route, authenticateCustomer())
}
if (descriptor.config.shouldRequireCustomerAuth) {
/**
* Require the customer to be authenticated
*/
this.router.use(descriptor.route, requireCustomerAuthentication())
}
if (descriptor.config.shouldRequireAdminAuth) {
/**
* Require the admin to be authenticated
*/
this.router.use(descriptor.route, authenticateLegacy())
}
for (const route of routes) {
/**
* Apply the body parser middleware if the route

View File

@@ -1,144 +0,0 @@
import { ConfigModule } from "@medusajs/types"
import { Express } from "express"
import passport from "passport"
import { Strategy as CustomStrategy } from "passport-custom"
import { ExtractJwt, Strategy as JWTStrategy } from "passport-jwt"
/* import { AuthService } from "../services"*/
export default async ({
app,
configModule,
}: {
app: Express
configModule: ConfigModule
}): Promise<void> => {
// For good old email password authentication
/* passport.use(
new LocalStrategy(
{
usernameField: "email",
passwordField: "password",
passReqToCallback: true,
},
async (req: MedusaRequest, email, password, done) => {
const authService = req.scope.resolve<AuthService>("authService")
try {
const { success, user } = await authService.authenticate(
email,
password
)
if (success) {
return done(null, user)
} else {
return done("Incorrect Username / Password")
}
} catch (error) {
return done(error)
}
}
)
)*/
// After a user has authenticated a JWT will be placed on a cookie, all
// calls will be authenticated based on the JWT
const { http } = configModule.projectConfig
passport.use(
"admin-session",
new CustomStrategy(async (req, done) => {
// @ts-ignore
if (req.session?.user_id) {
// @ts-ignore
return done(null, { userId: req.session.user_id })
}
return done(null, false)
})
)
passport.use(
"store-session",
new CustomStrategy(async (req, done) => {
// @ts-ignore
if (req.session?.customer_id) {
// @ts-ignore
return done(null, { customer_id: req.session.customer_id })
}
return done(null, false)
})
)
// Alternatively use API token to authenticate to the admin api
/* passport.use(
"admin-api-token",
new CustomStrategy(async (req, done) => {
// extract the token from the header
const token = req.headers["x-medusa-access-token"]
// check if header exists and is string
// typescript will complain if we don't check for type
if (!token || typeof token !== "string") {
return done(null, false)
}
const authService = req.scope.resolve<AuthService>("authService")
const auth = await authService.authenticateAPIToken(token)
if (auth.success) {
done(null, auth.user)
} else {
done(null, false)
}
})
)*/
// Admin bearer JWT token authentication strategy, best suited for web SPAs or mobile apps
passport.use(
"admin-bearer",
new JWTStrategy(
{
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
secretOrKey: http.jwtSecret,
},
(token, done) => {
if (token.domain !== "admin") {
done(null, false)
return
}
if (!token.user_id) {
done(null, false)
return
}
done(null, { userId: token.user_id })
}
)
)
// Store bearer JWT token authentication strategy, best suited for web SPAs or mobile apps
passport.use(
"store-bearer",
new JWTStrategy(
{
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
secretOrKey: http.jwtSecret,
},
(token, done) => {
if (token.domain !== "store") {
done(null, false)
return
}
if (!token.customer_id) {
done(null, false)
return
}
done(null, { customer_id: token.customer_id })
}
)
)
app.use(passport.initialize())
app.use(passport.session())
}

View File

@@ -59,15 +59,18 @@ export interface MedusaRequest<Body = unknown>
pricingContext?: MedusaPricingContext
}
export interface AuthContext {
actor_id: string
// TODO: We possibly want to make this more open-ended so it's easy to extend.
actor_type: "api-key" | "user" | "customer" | "unknown"
auth_identity_id: string
scope: string
app_metadata: Record<string, any>
}
export interface AuthenticatedMedusaRequest<Body = never>
extends MedusaRequest<Body> {
user: { customer_id?: string; userId?: string } // TODO: Remove this property when v2 is released
auth: {
actor_id: string
auth_user_id: string
app_metadata: Record<string, any>
scope: string
}
auth_context: AuthContext
}
export type MedusaResponse<Body = unknown> = Response<Body>

View File

@@ -1,11 +0,0 @@
import { NextFunction, Request, RequestHandler, Response } from "express"
// TODO: See how this should look like for v2.
// Optional customer authentication
// If authenticated, middleware attaches customer to request (as user) otherwise we pass through
// If you want to require authentication, use `requireCustomerAuthentication` in `packages/medusa/src/api/middlewares/require-customer-authentication.ts`
export default (): RequestHandler => {
return (req: Request, res: Response, next: NextFunction): void => {
return next()
}
}

View File

@@ -1,14 +1,9 @@
import { ModuleRegistrationName } from "@medusajs/modules-sdk"
import {
ApiKeyDTO,
AuthUserDTO,
ConfigModule,
IApiKeyModuleService,
} from "@medusajs/types"
import { stringEqualsOrRegexMatch } from "@medusajs/utils"
import { ApiKeyDTO, ConfigModule, IApiKeyModuleService } from "@medusajs/types"
import { NextFunction, RequestHandler } from "express"
import jwt, { JwtPayload } from "jsonwebtoken"
import {
AuthContext,
AuthenticatedMedusaRequest,
MedusaRequest,
MedusaResponse,
@@ -20,13 +15,18 @@ const API_KEY_AUTH = "api-key"
type AuthType = typeof SESSION_AUTH | typeof BEARER_AUTH | typeof API_KEY_AUTH
const ADMIN_SCOPE = "admin"
const STORE_SCOPE = "store"
const ALL_SCOPE = "*"
type Scope = typeof ADMIN_SCOPE | typeof STORE_SCOPE | typeof ALL_SCOPE
type MedusaSession = {
auth_user: AuthUserDTO
scope: string
auth_context: AuthContext
}
export const authenticate = (
authScope: string | RegExp,
authScope: Scope | Scope[],
authType: AuthType | AuthType[],
options: { allowUnauthenticated?: boolean; allowUnregistered?: boolean } = {}
): RequestHandler => {
@@ -36,63 +36,58 @@ export const authenticate = (
next: NextFunction
): Promise<void> => {
const authTypes = Array.isArray(authType) ? authType : [authType]
const scopes = Array.isArray(authScope) ? authScope : [authScope]
const req_ = req as AuthenticatedMedusaRequest
// We only allow authenticating using a secret API key on the admin
if (authTypes.includes(API_KEY_AUTH) && isAdminScope(authScope)) {
const isExclusivelyAdmin =
scopes.length === 1 && scopes.includes(ADMIN_SCOPE)
if (authTypes.includes(API_KEY_AUTH) && isExclusivelyAdmin) {
const apiKey = await getApiKeyInfo(req)
if (apiKey) {
;(req as AuthenticatedMedusaRequest).auth = {
req_.auth_context = {
actor_id: apiKey.id,
auth_user_id: "",
actor_type: "api-key",
auth_identity_id: "",
app_metadata: {},
// TODO: Add more limited scope once we have support for it in the API key module
scope: "admin",
scope: ADMIN_SCOPE,
}
return next()
}
}
let authUser: AuthUserDTO | null = getAuthUserFromSession(
// We try to extract the auth context either from the session or from a JWT token
let authContext: AuthContext | null = getAuthContextFromSession(
req.session,
authTypes,
authScope
scopes
)
if (!authUser) {
if (!authContext) {
const { http } =
req.scope.resolve<ConfigModule>("configModule").projectConfig
authUser = getAuthUserFromJwtToken(
authContext = getAuthContextFromJwtToken(
req.headers.authorization,
http.jwtSecret!,
authTypes,
authScope
scopes
)
}
const isMedusaScope = isAdminScope(authScope) || isStoreScope(authScope)
const isRegistered =
!isMedusaScope ||
(authUser?.app_metadata?.user_id &&
stringEqualsOrRegexMatch(authScope, "admin")) ||
(authUser?.app_metadata?.customer_id &&
stringEqualsOrRegexMatch(authScope, "store"))
if (
authUser &&
(isRegistered || (!isRegistered && options.allowUnregistered))
) {
;(req as AuthenticatedMedusaRequest).auth = {
actor_id: getActorId(authUser, authScope) as string, // TODO: fix types for auth_users not in the medusa system
auth_user_id: authUser.id,
app_metadata: authUser.app_metadata,
scope: authUser.scope,
}
// If the entity is authenticated, and it is a registered user/customer we can continue
if (!!authContext?.actor_id && authContext.actor_type !== "unknown") {
req_.auth_context = authContext
return next()
}
// If the entity is authenticated, but there is no user/customer yet, we can continue (eg. in the case of a user invite) if allow unregistered is set
if (authContext?.auth_identity_id && options.allowUnregistered) {
req_.auth_context = authContext
return next()
}
// If we allow unauthenticated requests (i.e public endpoints), just continue
if (options.allowUnauthenticated) {
return next()
}
@@ -144,31 +139,32 @@ const getApiKeyInfo = async (req: MedusaRequest): Promise<ApiKeyDTO | null> => {
}
}
const getAuthUserFromSession = (
const getAuthContextFromSession = (
session: Partial<MedusaSession> = {},
authTypes: AuthType[],
authScope: string | RegExp
): AuthUserDTO | null => {
scopes: Scope[]
): AuthContext | null => {
if (!authTypes.includes(SESSION_AUTH)) {
return null
}
if (
session.auth_user &&
stringEqualsOrRegexMatch(authScope, session.auth_user.scope)
session.auth_context &&
(scopes.includes("*") ||
scopes.includes(session.auth_context.scope as Scope))
) {
return session.auth_user
return session.auth_context
}
return null
}
const getAuthUserFromJwtToken = (
const getAuthContextFromJwtToken = (
authHeader: string | undefined,
jwtSecret: string,
authTypes: AuthType[],
authScope: string | RegExp
): AuthUserDTO | null => {
scopes: Scope[]
): AuthContext | null => {
if (!authTypes.includes(BEARER_AUTH)) {
return null
}
@@ -189,8 +185,8 @@ const getAuthUserFromJwtToken = (
// verify token and set authUser
try {
const verified = jwt.verify(token, jwtSecret) as JwtPayload
if (stringEqualsOrRegexMatch(authScope, verified.scope)) {
return verified as AuthUserDTO
if (scopes.includes("*") || scopes.includes(verified.scope)) {
return verified as AuthContext
}
} catch (err) {
return null
@@ -200,26 +196,3 @@ const getAuthUserFromJwtToken = (
return null
}
const getActorId = (
authUser: AuthUserDTO,
scope: string | RegExp
): string | undefined => {
if (stringEqualsOrRegexMatch(scope, "admin")) {
return authUser.app_metadata.user_id as string
}
if (stringEqualsOrRegexMatch(scope, "store")) {
return authUser.app_metadata.customer_id as string
}
return undefined
}
const isAdminScope = (authScope: string | RegExp): boolean => {
return stringEqualsOrRegexMatch(authScope, "admin")
}
const isStoreScope = (authScope: string | RegExp): boolean => {
return stringEqualsOrRegexMatch(authScope, "store")
}

View File

@@ -1,8 +0,0 @@
import { NextFunction, Request, RequestHandler, Response } from "express"
// TODO: See how this should look like for v2.
export default (): RequestHandler => {
return (req: Request, res: Response, next: NextFunction): void => {
return next()
}
}

View File

@@ -1,5 +1,2 @@
export { default as authenticateLegacy } from "./authenticate"
export { authenticate } from "./authenticate-middleware"
export { default as authenticateCustomer } from "./authenticate-customer"
export { default as errorHandler } from "./error-handler"
export { default as requireCustomerAuthentication } from "./require-customer-authentication"

View File

@@ -1,16 +0,0 @@
import { NextFunction, Request, RequestHandler, Response } from "express"
import passport from "passport"
export default (): RequestHandler => {
return (req: Request, res: Response, next: NextFunction): void => {
if (req.user) {
return next()
}
passport.authenticate(["store-session", "store-bearer"], { session: false })(
req,
res,
next
)
}
}

View File

@@ -1,7 +1,7 @@
import { AuthUser } from "@models"
import { AuthIdentity } from "@models"
import { SqlEntityManager } from "@mikro-orm/postgresql"
export async function createAuthUsers(
export async function createAuthIdentities(
manager: SqlEntityManager,
userData: any[] = [
{
@@ -22,16 +22,16 @@ export async function createAuthUsers(
scope: "store",
},
]
): Promise<AuthUser[]> {
const authUsers: AuthUser[] = []
): Promise<AuthIdentity[]> {
const authIdentities: AuthIdentity[] = []
for (const user of userData) {
const authUser = manager.create(AuthUser, user)
const authIdentity = manager.create(AuthIdentity, user)
authUsers.push(authUser)
authIdentities.push(authIdentity)
}
await manager.persistAndFlush(authUsers)
await manager.persistAndFlush(authIdentities)
return authUsers
return authIdentities
}

View File

@@ -1,4 +1,4 @@
import { createAuthUsers } from "../../../__fixtures__/auth-user"
import { createAuthIdentities } from "../../../__fixtures__/auth-identity"
import { moduleIntegrationTestRunner, SuiteOptions } from "medusa-test-utils"
import { Modules } from "@medusajs/modules-sdk"
import { IAuthModuleService } from "@medusajs/types"
@@ -11,15 +11,15 @@ moduleIntegrationTestRunner({
MikroOrmWrapper,
service,
}: SuiteOptions<IAuthModuleService>) => {
describe("AuthUser Service", () => {
describe("AuthIdentity Service", () => {
beforeEach(async () => {
await createAuthUsers(MikroOrmWrapper.forkManager())
await createAuthIdentities(MikroOrmWrapper.forkManager())
})
describe("list", () => {
it("should list authUsers", async () => {
const authUsers = await service.list()
const serialized = JSON.parse(JSON.stringify(authUsers))
it("should list authIdentities", async () => {
const authIdentities = await service.list()
const serialized = JSON.parse(JSON.stringify(authIdentities))
expect(serialized).toEqual([
expect.objectContaining({
@@ -34,24 +34,24 @@ moduleIntegrationTestRunner({
])
})
it("should list authUsers by id", async () => {
const authUsers = await service.list({
it("should list authIdentities by id", async () => {
const authIdentities = await service.list({
id: ["test-id"],
})
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
id: "test-id",
}),
])
})
it("should list authUsers by provider_id", async () => {
const authUsers = await service.list({
it("should list authIdentities by provider_id", async () => {
const authIdentities = await service.list({
provider: "manual",
})
const serialized = JSON.parse(JSON.stringify(authUsers))
const serialized = JSON.parse(JSON.stringify(authIdentities))
expect(serialized).toEqual([
expect.objectContaining({
@@ -65,9 +65,9 @@ moduleIntegrationTestRunner({
})
describe("listAndCount", () => {
it("should list authUsers", async () => {
const [authUsers, count] = await service.listAndCount()
const serialized = JSON.parse(JSON.stringify(authUsers))
it("should list authIdentities", async () => {
const [authIdentities, count] = await service.listAndCount()
const serialized = JSON.parse(JSON.stringify(authIdentities))
expect(count).toEqual(3)
expect(serialized).toEqual([
@@ -83,13 +83,13 @@ moduleIntegrationTestRunner({
])
})
it("should listAndCount authUsers by provider_id", async () => {
const [authUsers, count] = await service.listAndCount({
it("should listAndCount authIdentities by provider_id", async () => {
const [authIdentities, count] = await service.listAndCount({
provider: "manual",
})
expect(count).toEqual(2)
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
id: "test-id",
}),
@@ -103,29 +103,29 @@ moduleIntegrationTestRunner({
describe("retrieve", () => {
const id = "test-id"
it("should return an authUser for the given id", async () => {
const authUser = await service.retrieve(id)
it("should return an authIdentity for the given id", async () => {
const authIdentity = await service.retrieve(id)
expect(authUser).toEqual(
expect(authIdentity).toEqual(
expect.objectContaining({
id,
})
)
})
it("should return authUser based on config select param", async () => {
const authUser = await service.retrieve(id, {
it("should return authIdentity based on config select param", async () => {
const authIdentity = await service.retrieve(id, {
select: ["id"],
})
const serialized = JSON.parse(JSON.stringify(authUser))
const serialized = JSON.parse(JSON.stringify(authIdentity))
expect(serialized).toEqual({
id,
})
})
it("should throw an error when an authUser with the given id does not exist", async () => {
it("should throw an error when an authIdentity with the given id does not exist", async () => {
let error
try {
@@ -135,11 +135,11 @@ moduleIntegrationTestRunner({
}
expect(error.message).toEqual(
"AuthUser with id: does-not-exist was not found"
"AuthIdentity with id: does-not-exist was not found"
)
})
it("should throw an error when a authUserId is not provided", async () => {
it("should throw an error when a authIdentityId is not provided", async () => {
let error
try {
@@ -148,21 +148,21 @@ moduleIntegrationTestRunner({
error = e
}
expect(error.message).toEqual("authUser - id must be defined")
expect(error.message).toEqual("authIdentity - id must be defined")
})
})
describe("delete", () => {
it("should delete the authUsers given an id successfully", async () => {
it("should delete the authIdentities given an id successfully", async () => {
const id = "test-id"
await service.delete([id])
const authUsers = await service.list({
const authIdentities = await service.list({
id: [id],
})
expect(authUsers).toHaveLength(0)
expect(authIdentities).toHaveLength(0)
})
})
@@ -181,11 +181,11 @@ moduleIntegrationTestRunner({
}
expect(error.message).toEqual(
'AuthUser with id "does-not-exist" not found'
'AuthIdentity with id "does-not-exist" not found'
)
})
it("should update authUser", async () => {
it("should update authIdentity", async () => {
const id = "test-id"
await service.update([
@@ -195,8 +195,8 @@ moduleIntegrationTestRunner({
},
])
const [authUser] = await service.list({ id: [id] })
expect(authUser).toEqual(
const [authIdentity] = await service.list({ id: [id] })
expect(authIdentity).toEqual(
expect.objectContaining({
provider_metadata: { email: "test@email.com" },
})
@@ -205,7 +205,7 @@ moduleIntegrationTestRunner({
})
describe("create", () => {
it("should create a authUser successfully", async () => {
it("should create a authIdentity successfully", async () => {
await service.create([
{
id: "test",
@@ -215,11 +215,11 @@ moduleIntegrationTestRunner({
},
])
const [authUser] = await service.list({
const [authIdentity] = await service.list({
id: ["test"],
})
expect(authUser).toEqual(
expect(authIdentity).toEqual(
expect.objectContaining({
id: "test",
})

View File

@@ -1,6 +1,6 @@
import { IAuthModuleService } from "@medusajs/types"
import { Modules } from "@medusajs/modules-sdk"
import { createAuthUsers } from "../../../__fixtures__/auth-user"
import { createAuthIdentities } from "../../../__fixtures__/auth-identity"
import { moduleIntegrationTestRunner, SuiteOptions } from "medusa-test-utils"
jest.setTimeout(30000)
@@ -11,16 +11,16 @@ moduleIntegrationTestRunner({
MikroOrmWrapper,
service,
}: SuiteOptions<IAuthModuleService>) => {
describe("AuthModuleService - AuthUser", () => {
describe("AuthModuleService - AuthIdentity", () => {
beforeEach(async () => {
await createAuthUsers(MikroOrmWrapper.forkManager())
await createAuthIdentities(MikroOrmWrapper.forkManager())
})
describe("listAuthUsers", () => {
it("should list authUsers", async () => {
const authUsers = await service.list()
describe("listAuthIdentities", () => {
it("should list authIdentities", async () => {
const authIdentities = await service.list()
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
provider: "store",
}),
@@ -33,24 +33,24 @@ moduleIntegrationTestRunner({
])
})
it("should list authUsers by id", async () => {
const authUsers = await service.list({
it("should list authIdentities by id", async () => {
const authIdentities = await service.list({
id: ["test-id"],
})
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
id: "test-id",
}),
])
})
it("should list authUsers by provider", async () => {
const authUsers = await service.list({
it("should list authIdentities by provider", async () => {
const authIdentities = await service.list({
provider: "manual",
})
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
id: "test-id",
}),
@@ -61,12 +61,12 @@ moduleIntegrationTestRunner({
})
})
describe("listAndCountAuthUsers", () => {
it("should list and count authUsers", async () => {
const [authUsers, count] = await service.listAndCount()
describe("listAndCountAuthIdentities", () => {
it("should list and count authIdentities", async () => {
const [authIdentities, count] = await service.listAndCount()
expect(count).toEqual(3)
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
provider: "store",
}),
@@ -79,13 +79,13 @@ moduleIntegrationTestRunner({
])
})
it("should listAndCount authUsers by provider_id", async () => {
const [authUsers, count] = await service.listAndCount({
it("should listAndCount authIdentities by provider_id", async () => {
const [authIdentities, count] = await service.listAndCount({
provider: "manual",
})
expect(count).toEqual(2)
expect(authUsers).toEqual([
expect(authIdentities).toEqual([
expect.objectContaining({
id: "test-id",
}),
@@ -96,20 +96,20 @@ moduleIntegrationTestRunner({
})
})
describe("retrieveAuthUser", () => {
describe("retrieveAuthIdentity", () => {
const id = "test-id"
it("should return an authUser for the given id", async () => {
const authUser = await service.retrieve(id)
it("should return an authIdentity for the given id", async () => {
const authIdentity = await service.retrieve(id)
expect(authUser).toEqual(
expect(authIdentity).toEqual(
expect.objectContaining({
id,
})
)
})
it("should throw an error when an authUser with the given id does not exist", async () => {
it("should throw an error when an authIdentity with the given id does not exist", async () => {
let error
try {
@@ -119,22 +119,22 @@ moduleIntegrationTestRunner({
}
expect(error.message).toEqual(
"AuthUser with id: does-not-exist was not found"
"AuthIdentity with id: does-not-exist was not found"
)
})
it("should not return an authUser with password hash", async () => {
const authUser = await service.retrieve("test-id-1")
it("should not return an authIdentity with password hash", async () => {
const authIdentity = await service.retrieve("test-id-1")
expect(authUser).toEqual(
expect(authIdentity).toEqual(
expect.objectContaining({
id: "test-id-1",
})
)
expect(authUser["password_hash"]).toEqual(undefined)
expect(authIdentity["password_hash"]).toEqual(undefined)
})
it("should throw an error when a authUserId is not provided", async () => {
it("should throw an error when a authIdentityId is not provided", async () => {
let error
try {
@@ -143,35 +143,35 @@ moduleIntegrationTestRunner({
error = e
}
expect(error.message).toEqual("authUser - id must be defined")
expect(error.message).toEqual("authIdentity - id must be defined")
})
it("should return authUser based on config select param", async () => {
const authUser = await service.retrieve(id, {
it("should return authIdentity based on config select param", async () => {
const authIdentity = await service.retrieve(id, {
select: ["id"],
})
expect(authUser).toEqual({
expect(authIdentity).toEqual({
id,
})
})
})
describe("deleteAuthUser", () => {
describe("deleteAuthIdentity", () => {
const id = "test-id"
it("should delete the authUsers given an id successfully", async () => {
it("should delete the authIdentities given an id successfully", async () => {
await service.delete([id])
const authUsers = await service.list({
const authIdentities = await service.list({
id: [id],
})
expect(authUsers).toHaveLength(0)
expect(authIdentities).toHaveLength(0)
})
})
describe("updateAuthUser", () => {
describe("updateAuthIdentity", () => {
const id = "test-id"
it("should throw an error when a id does not exist", async () => {
@@ -188,11 +188,11 @@ moduleIntegrationTestRunner({
}
expect(error.message).toEqual(
'AuthUser with id "does-not-exist" not found'
'AuthIdentity with id "does-not-exist" not found'
)
})
it("should update authUser", async () => {
it("should update authIdentity", async () => {
await service.update([
{
id,
@@ -200,8 +200,8 @@ moduleIntegrationTestRunner({
},
])
const [authUser] = await service.list({ id: [id] })
expect(authUser).toEqual(
const [authIdentity] = await service.list({ id: [id] })
expect(authIdentity).toEqual(
expect.objectContaining({
provider_metadata: { email: "test@email.com" },
})
@@ -209,8 +209,8 @@ moduleIntegrationTestRunner({
})
})
describe("createAuthUser", () => {
it("should create a authUser successfully", async () => {
describe("createAuthIdentity", () => {
it("should create a authIdentity successfully", async () => {
await service.create([
{
id: "test",
@@ -220,12 +220,12 @@ moduleIntegrationTestRunner({
},
])
const [authUser, count] = await service.listAndCount({
const [authIdentity, count] = await service.listAndCount({
id: ["test"],
})
expect(count).toEqual(1)
expect(authUser[0]).toEqual(
expect(authIdentity[0]).toEqual(
expect.objectContaining({
id: "test",
})

View File

@@ -1,4 +1,4 @@
import { MedusaModule, Modules } from "@medusajs/modules-sdk"
import { Modules } from "@medusajs/modules-sdk"
import { IAuthModuleService } from "@medusajs/types"
import { moduleIntegrationTestRunner, SuiteOptions } from "medusa-test-utils"

View File

@@ -2,12 +2,12 @@ import { MedusaModule, Modules } from "@medusajs/modules-sdk"
import { IAuthModuleService } from "@medusajs/types"
import Scrypt from "scrypt-kdf"
import { createAuthUsers } from "../../../__fixtures__/auth-user"
import { createAuthIdentities } from "../../../__fixtures__/auth-identity"
import { moduleIntegrationTestRunner, SuiteOptions } from "medusa-test-utils"
jest.setTimeout(30000)
const seedDefaultData = async (manager) => {
await createAuthUsers(manager)
await createAuthIdentities(manager)
}
moduleIntegrationTestRunner({
@@ -37,7 +37,7 @@ moduleIntegrationTestRunner({
).toString("base64")
await seedDefaultData(MikroOrmWrapper.forkManager())
await createAuthUsers(MikroOrmWrapper.forkManager(), [
await createAuthIdentities(MikroOrmWrapper.forkManager(), [
// Add authenticated user
{
provider: "emailpass",
@@ -59,7 +59,7 @@ moduleIntegrationTestRunner({
expect(res).toEqual({
success: true,
authUser: expect.objectContaining({
authIdentity: expect.objectContaining({
entity_id: email,
provider_metadata: {},
}),
@@ -102,7 +102,7 @@ moduleIntegrationTestRunner({
).toString("base64")
await seedDefaultData(MikroOrmWrapper.forkManager())
await createAuthUsers(MikroOrmWrapper.forkManager(), [
await createAuthIdentities(MikroOrmWrapper.forkManager(), [
// Add authenticated user
{
provider: "emailpass",

View File

@@ -1,10 +1,10 @@
import { AuthUser } from "@models"
import { AuthIdentity } from "@models"
import { MapToConfig } from "@medusajs/utils"
import { ModuleJoinerConfig } from "@medusajs/types"
import { Modules } from "@medusajs/modules-sdk"
export const LinkableKeys = {
auth_user_id: AuthUser.name,
auth_identity_id: AuthIdentity.name,
}
const entityLinkableKeysMap: MapToConfig = {}
@@ -23,9 +23,9 @@ export const joinerConfig: ModuleJoinerConfig = {
primaryKeys: ["id"],
linkableKeys: LinkableKeys,
alias: {
name: ["auth_user", "auth_users"],
name: ["auth_identity", "auth_identities"],
args: {
entity: AuthUser.name,
entity: AuthIdentity.name,
},
},
}

View File

@@ -1,7 +1,5 @@
{
"namespaces": [
"public"
],
"namespaces": ["public"],
"name": "public",
"tables": [
{
@@ -70,25 +68,19 @@
"mappedType": "json"
}
},
"name": "auth_user",
"name": "auth_identity",
"schema": "public",
"indexes": [
{
"keyName": "IDX_auth_user_provider_scope_entity_id",
"columnNames": [
"provider",
"scope",
"entity_id"
],
"keyName": "IDX_auth_identity_provider_scope_entity_id",
"columnNames": ["provider", "scope", "entity_id"],
"composite": true,
"primary": false,
"unique": true
},
{
"keyName": "auth_user_pkey",
"columnNames": [
"id"
],
"keyName": "auth_identity_pkey",
"columnNames": ["id"],
"composite": false,
"primary": true,
"unique": true

View File

@@ -3,14 +3,14 @@ import { Migration } from "@mikro-orm/migrations"
export class Migration20240205025924 extends Migration {
async up(): Promise<void> {
this.addSql(
'create table if not exists "auth_user" ("id" text not null, "entity_id" text not null, "provider" text not null, "scope" text not null, "user_metadata" jsonb null, "app_metadata" jsonb not null, "provider_metadata" jsonb null, constraint "auth_user_pkey" primary key ("id"));'
'create table if not exists "auth_identity" ("id" text not null, "entity_id" text not null, "provider" text not null, "scope" text not null, "user_metadata" jsonb null, "app_metadata" jsonb not null, "provider_metadata" jsonb null, constraint "auth_identity_pkey" primary key ("id"));'
)
this.addSql(
'alter table "auth_user" add constraint "IDX_auth_user_provider_scope_entity_id" unique ("provider", "scope", "entity_id");'
'alter table "auth_identity" add constraint "IDX_auth_identity_provider_scope_entity_id" unique ("provider", "scope", "entity_id");'
)
}
async down(): Promise<void> {
this.addSql('drop table if exists "auth_user" cascade;')
this.addSql('drop table if exists "auth_identity" cascade;')
}
}

View File

@@ -15,9 +15,9 @@ type OptionalFields = "provider_metadata" | "app_metadata" | "user_metadata"
@Entity()
@Unique({
properties: ["provider", "scope", "entity_id"],
name: "IDX_auth_user_provider_scope_entity_id",
name: "IDX_auth_identity_provider_scope_entity_id",
})
export default class AuthUser {
export default class AuthIdentity {
[OptionalProps]: OptionalFields
@PrimaryKey({ columnType: "text" })
@@ -43,11 +43,11 @@ export default class AuthUser {
@BeforeCreate()
onCreate() {
this.id = generateEntityId(this.id, "authusr")
this.id = generateEntityId(this.id, "authid")
}
@OnInit()
onInit() {
this.id = generateEntityId(this.id, "authusr")
this.id = generateEntityId(this.id, "authid")
}
}

View File

@@ -1 +1 @@
export { default as AuthUser } from "./auth-user"
export { default as AuthIdentity } from "./auth-identity"

View File

@@ -5,24 +5,26 @@ import {
isString,
} from "@medusajs/utils"
import { AuthUserService } from "@services"
import { AuthIdentityService } from "@services"
import Scrypt from "scrypt-kdf"
const EXPIRATION = "1d"
class EmailPasswordProvider extends AbstractAuthModuleProvider {
public static PROVIDER = "emailpass"
public static DISPLAY_NAME = "Email/Password Authentication"
protected readonly authUserSerivce_: AuthUserService
protected readonly authIdentitySerivce_: AuthIdentityService
constructor({ authUserService }: { authUserService: AuthUserService }) {
constructor({
authIdentityService,
}: {
authIdentityService: AuthIdentityService
}) {
super(arguments[0], {
provider: EmailPasswordProvider.PROVIDER,
displayName: EmailPasswordProvider.DISPLAY_NAME,
})
this.authUserSerivce_ = authUserService
this.authIdentitySerivce_ = authIdentityService
}
private getHashConfig() {
@@ -54,18 +56,19 @@ class EmailPasswordProvider extends AbstractAuthModuleProvider {
error: "Email should be a string",
}
}
let authUser
let authIdentity
try {
authUser = await this.authUserSerivce_.retrieveByProviderAndEntityId(
email,
EmailPasswordProvider.PROVIDER
)
authIdentity =
await this.authIdentitySerivce_.retrieveByProviderAndEntityId(
email,
EmailPasswordProvider.PROVIDER
)
} catch (error) {
if (error.type === MedusaError.Types.NOT_FOUND) {
const password_hash = await Scrypt.kdf(password, this.getHashConfig())
const [createdAuthUser] = await this.authUserSerivce_.create([
const [createdAuthIdentity] = await this.authIdentitySerivce_.create([
{
entity_id: email,
provider: EmailPasswordProvider.PROVIDER,
@@ -78,13 +81,13 @@ class EmailPasswordProvider extends AbstractAuthModuleProvider {
return {
success: true,
authUser: JSON.parse(JSON.stringify(createdAuthUser)),
authIdentity: JSON.parse(JSON.stringify(createdAuthIdentity)),
}
}
return { success: false, error: error.message }
}
const password_hash = authUser.provider_metadata?.password
const password_hash = authIdentity.provider_metadata?.password
if (isString(password_hash)) {
const buf = Buffer.from(password_hash as string, "base64")
@@ -92,9 +95,12 @@ class EmailPasswordProvider extends AbstractAuthModuleProvider {
const success = await Scrypt.verify(buf, password)
if (success) {
delete authUser.provider_metadata!.password
delete authIdentity.provider_metadata!.password
return { success, authUser: JSON.parse(JSON.stringify(authUser)) }
return {
success,
authIdentity: JSON.parse(JSON.stringify(authIdentity)),
}
}
}

View File

@@ -1,13 +1,13 @@
import { AuthenticationInput, AuthenticationResponse } from "@medusajs/types"
import { AbstractAuthModuleProvider, MedusaError } from "@medusajs/utils"
import { AuthUserService } from "@services"
import { AuthIdentityService } from "@services"
import jwt, { JwtPayload } from "jsonwebtoken"
import { AuthorizationCode } from "simple-oauth2"
import url from "url"
type InjectedDependencies = {
authUserService: AuthUserService
authIdentityService: AuthIdentityService
}
type ProviderConfig = {
@@ -21,15 +21,15 @@ class GoogleProvider extends AbstractAuthModuleProvider {
public static PROVIDER = "google"
public static DISPLAY_NAME = "Google Authentication"
protected readonly authUserService_: AuthUserService
protected readonly authIdentityService_: AuthIdentityService
constructor({ authUserService }: InjectedDependencies) {
constructor({ authIdentityService }: InjectedDependencies) {
super(arguments[0], {
provider: GoogleProvider.PROVIDER,
displayName: GoogleProvider.DISPLAY_NAME,
})
this.authUserService_ = authUserService
this.authIdentityService_ = authIdentityService
}
async authenticate(
@@ -83,16 +83,17 @@ class GoogleProvider extends AbstractAuthModuleProvider {
}) as JwtPayload
const entity_id = jwtData.payload.email
let authUser
let authIdentity
try {
authUser = await this.authUserService_.retrieveByProviderAndEntityId(
entity_id,
GoogleProvider.PROVIDER
)
authIdentity =
await this.authIdentityService_.retrieveByProviderAndEntityId(
entity_id,
GoogleProvider.PROVIDER
)
} catch (error) {
if (error.type === MedusaError.Types.NOT_FOUND) {
const [createdAuthUser] = await this.authUserService_.create([
const [createdAuthIdentity] = await this.authIdentityService_.create([
{
entity_id,
provider: GoogleProvider.PROVIDER,
@@ -100,7 +101,7 @@ class GoogleProvider extends AbstractAuthModuleProvider {
scope: this.scope_,
},
])
authUser = createdAuthUser
authIdentity = createdAuthIdentity
} else {
return { success: false, error: error.message }
}
@@ -108,7 +109,7 @@ class GoogleProvider extends AbstractAuthModuleProvider {
return {
success: true,
authUser,
authIdentity,
}
}
@@ -127,7 +128,7 @@ class GoogleProvider extends AbstractAuthModuleProvider {
try {
const accessToken = await client.getToken(tokenParams)
const { authUser, success } = await this.verify_(
const { authIdentity, success } = await this.verify_(
accessToken.token.id_token
)
@@ -135,7 +136,7 @@ class GoogleProvider extends AbstractAuthModuleProvider {
return {
success,
authUser,
authIdentity,
successRedirectUrl,
}
} catch (error) {

View File

@@ -1,19 +0,0 @@
#!/usr/bin/env node
import { EOL } from "os"
import { run } from "../seed"
const args = process.argv
const path = args.pop() as string
export default (async () => {
const { config } = await import("dotenv")
config()
if (!path) {
throw new Error(
`filePath is required.${EOL}Example: medusa-auth-seed <filePath>`
)
}
await run({ path })
})()

View File

@@ -1,65 +0,0 @@
import * as AuthModels from "@models"
import { DALUtils, ModulesSdkUtils } from "@medusajs/utils"
import { LoaderOptions, Logger, ModulesSdkTypes } from "@medusajs/types"
import { EOL } from "os"
import { EntitySchema } from "@mikro-orm/core"
import { Modules } from "@medusajs/modules-sdk"
import { resolve } from "path"
export async function run({
options,
logger,
path,
}: Partial<
Pick<
LoaderOptions<ModulesSdkTypes.ModuleServiceInitializeOptions>,
"options" | "logger"
>
> & {
path: string
}) {
logger ??= console as unknown as Logger
logger.info(`Loading seed data from ${path}...`)
const { authenticationData } = await import(
resolve(process.cwd(), path)
).catch((e) => {
logger?.error(
`Failed to load seed data from ${path}. Please, provide a relative path and check that you export the following: authenticationData.${EOL}${e}`
)
throw e
})
const dbData = ModulesSdkUtils.loadDatabaseConfig(
Modules.AUTH,
options
)!
const entities = Object.values(
AuthModels
) as unknown as EntitySchema[]
const pathToMigrations = __dirname + "/../migrations"
const orm = await DALUtils.mikroOrmCreateConnection(
dbData,
entities,
pathToMigrations
)
const manager = orm.em.fork()
try {
logger.info("Seeding authentication data..")
// TODO: implement authentication seed data
// await createAuthUsers(manager, authUsersData)
} catch (e) {
logger.error(
`Failed to insert the seed data in the PostgreSQL database ${dbData.clientUrl}.${EOL}${e}`
)
}
await orm.close(true)
}

View File

@@ -11,40 +11,42 @@ import {
MedusaError,
ModulesSdkUtils,
} from "@medusajs/utils"
import { AuthUser } from "@models"
import { AuthIdentity } from "@models"
type InjectedDependencies = {
baseRepository: DAL.RepositoryService
authUserRepository: DAL.RepositoryService
authIdentityRepository: DAL.RepositoryService
}
export default class AuthUserService<
TEntity extends AuthUser = AuthUser
export default class AuthIdentityService<
TEntity extends AuthIdentity = AuthIdentity
> extends ModulesSdkUtils.internalModuleServiceFactory<InjectedDependencies>(
AuthUser
AuthIdentity
)<TEntity> {
protected readonly authUserRepository_: RepositoryService<TEntity>
protected readonly authIdentityRepository_: RepositoryService<TEntity>
protected baseRepository_: DAL.RepositoryService
constructor(container: InjectedDependencies) {
// @ts-ignore
super(...arguments)
this.authUserRepository_ = container.authUserRepository
this.authIdentityRepository_ = container.authIdentityRepository
this.baseRepository_ = container.baseRepository
}
@InjectManager("authUserRepository_")
async retrieveByProviderAndEntityId<TEntityMethod = AuthTypes.AuthUserDTO>(
@InjectManager("authIdentityRepository_")
async retrieveByProviderAndEntityId<
TEntityMethod = AuthTypes.AuthIdentityDTO
>(
entityId: string,
provider: string,
config: FindConfig<TEntityMethod> = {},
@MedusaContext() sharedContext: Context = {}
): Promise<AuthTypes.AuthUserDTO> {
): Promise<AuthTypes.AuthIdentityDTO> {
const queryConfig = ModulesSdkUtils.buildQuery<TEntity>(
{ entity_id: entityId, provider },
{ ...config, take: 1 }
)
const [result] = await this.authUserRepository_.find(
const [result] = await this.authIdentityRepository_.find(
queryConfig,
sharedContext
)
@@ -52,10 +54,12 @@ export default class AuthUserService<
if (!result) {
throw new MedusaError(
MedusaError.Types.NOT_FOUND,
`AuthUser with entity_id: "${entityId}" and provider: "${provider}" not found`
`AuthIdentity with entity_id: "${entityId}" and provider: "${provider}" not found`
)
}
return await this.baseRepository_.serialize<AuthTypes.AuthUserDTO>(result)
return await this.baseRepository_.serialize<AuthTypes.AuthIdentityDTO>(
result
)
}
}

View File

@@ -2,17 +2,14 @@ import {
AuthenticationInput,
AuthenticationResponse,
AuthTypes,
AuthUserDTO,
Context,
CreateAuthUserDTO,
DAL,
InternalModuleDeclaration,
ModuleJoinerConfig,
ModulesSdkTypes,
UpdateAuthUserDTO,
} from "@medusajs/types"
import { AuthUser } from "@models"
import { AuthIdentity } from "@models"
import { entityNameToLinkableKeysMap, joinerConfig } from "../joiner-config"
@@ -26,33 +23,35 @@ import {
type InjectedDependencies = {
baseRepository: DAL.RepositoryService
authUserService: ModulesSdkTypes.InternalModuleService<any>
authIdentityService: ModulesSdkTypes.InternalModuleService<any>
}
const generateMethodForModels = [AuthUser]
const generateMethodForModels = [AuthIdentity]
export default class AuthModuleService<TAuthUser extends AuthUser = AuthUser>
export default class AuthModuleService<
TAuthIdentity extends AuthIdentity = AuthIdentity
>
extends ModulesSdkUtils.abstractModuleServiceFactory<
InjectedDependencies,
AuthTypes.AuthUserDTO,
AuthTypes.AuthIdentityDTO,
{
AuthUser: { dto: AuthUserDTO }
AuthIdentity: { dto: AuthTypes.AuthIdentityDTO }
}
>(AuthUser, generateMethodForModels, entityNameToLinkableKeysMap)
>(AuthIdentity, generateMethodForModels, entityNameToLinkableKeysMap)
implements AuthTypes.IAuthModuleService
{
protected baseRepository_: DAL.RepositoryService
protected authUserService_: ModulesSdkTypes.InternalModuleService<TAuthUser>
protected authIdentityService_: ModulesSdkTypes.InternalModuleService<TAuthIdentity>
constructor(
{ authUserService, baseRepository }: InjectedDependencies,
{ authIdentityService, baseRepository }: InjectedDependencies,
protected readonly moduleDeclaration: InternalModuleDeclaration
) {
// @ts-ignore
super(...arguments)
this.baseRepository_ = baseRepository
this.authUserService_ = authUserService
this.authIdentityService_ = authIdentityService
}
__joinerConfig(): ModuleJoinerConfig {
@@ -60,21 +59,27 @@ export default class AuthModuleService<TAuthUser extends AuthUser = AuthUser>
}
create(
data: CreateAuthUserDTO[],
data: AuthTypes.CreateAuthIdentityDTO[],
sharedContext?: Context
): Promise<AuthUserDTO[]>
): Promise<AuthTypes.AuthIdentityDTO[]>
create(data: CreateAuthUserDTO, sharedContext?: Context): Promise<AuthUserDTO>
create(
data: AuthTypes.CreateAuthIdentityDTO,
sharedContext?: Context
): Promise<AuthTypes.AuthIdentityDTO>
@InjectManager("baseRepository_")
async create(
data: CreateAuthUserDTO[] | CreateAuthUserDTO,
data: AuthTypes.CreateAuthIdentityDTO[] | AuthTypes.CreateAuthIdentityDTO,
@MedusaContext() sharedContext: Context = {}
): Promise<AuthTypes.AuthUserDTO | AuthTypes.AuthUserDTO[]> {
const authUsers = await this.authUserService_.create(data, sharedContext)
): Promise<AuthTypes.AuthIdentityDTO | AuthTypes.AuthIdentityDTO[]> {
const authIdentities = await this.authIdentityService_.create(
data,
sharedContext
)
return await this.baseRepository_.serialize<AuthTypes.AuthUserDTO[]>(
authUsers,
return await this.baseRepository_.serialize<AuthTypes.AuthIdentityDTO[]>(
authIdentities,
{
populate: true,
}
@@ -82,22 +87,28 @@ export default class AuthModuleService<TAuthUser extends AuthUser = AuthUser>
}
update(
data: UpdateAuthUserDTO[],
data: AuthTypes.UpdateAuthIdentityDTO[],
sharedContext?: Context
): Promise<AuthUserDTO[]>
): Promise<AuthTypes.AuthIdentityDTO[]>
update(data: UpdateAuthUserDTO, sharedContext?: Context): Promise<AuthUserDTO>
update(
data: AuthTypes.UpdateAuthIdentityDTO,
sharedContext?: Context
): Promise<AuthTypes.AuthIdentityDTO>
// TODO: should be pluralized, see convention about the methods naming or the abstract module service interface definition @engineering
@InjectManager("baseRepository_")
async update(
data: UpdateAuthUserDTO | UpdateAuthUserDTO[],
data: AuthTypes.UpdateAuthIdentityDTO | AuthTypes.UpdateAuthIdentityDTO[],
@MedusaContext() sharedContext: Context = {}
): Promise<AuthTypes.AuthUserDTO | AuthTypes.AuthUserDTO[]> {
const updatedUsers = await this.authUserService_.update(data, sharedContext)
): Promise<AuthTypes.AuthIdentityDTO | AuthTypes.AuthIdentityDTO[]> {
const updatedUsers = await this.authIdentityService_.update(
data,
sharedContext
)
const serializedUsers = await this.baseRepository_.serialize<
AuthTypes.AuthUserDTO[]
AuthTypes.AuthIdentityDTO[]
>(updatedUsers, {
populate: true,
})

View File

@@ -1,2 +1,2 @@
export { default as AuthModuleService } from "./auth-module"
export { default as AuthUserService } from "./auth-user"
export { default as AuthIdentityService } from "./auth-identity"

View File

@@ -3,6 +3,3 @@ import { Logger } from "@medusajs/types"
export type InitializeModuleInjectableDependencies = {
logger?: Logger
}
export * as RepositoryTypes from "./repositories"
export * as ServiceTypes from "./services"

View File

@@ -1,19 +0,0 @@
import { AuthUser } from "@models"
export type CreateAuthUserDTO = {
provider_id: string
entity_id: string
provider_metadata?: Record<string, unknown>
user_metadata?: Record<string, unknown>
app_metadata?: Record<string, unknown>
}
export type UpdateAuthUserDTO = {
update: {
id: string
provider_metadata?: Record<string, unknown>
user_metadata?: Record<string, unknown>
app_metadata?: Record<string, unknown>
}
user: AuthUser
}

View File

@@ -1 +0,0 @@
export * from "./auth-user"

View File

@@ -1,28 +0,0 @@
export type AuthUserDTO = {
id: string
provider_id: string
entity_id: string
scope: string
provider: string
provider_metadata?: Record<string, unknown>
user_metadata: Record<string, unknown>
app_metadata: Record<string, unknown>
}
export type CreateAuthUserDTO = {
entity_id: string
provider: string
scope: string
provider_metadata?: Record<string, unknown>
user_metadata?: Record<string, unknown>
app_metadata?: Record<string, unknown>
}
export type UpdateAuthUserDTO = {
id: string
provider_metadata?: Record<string, unknown>
user_metadata?: Record<string, unknown>
app_metadata?: Record<string, unknown>
}
export type FilterableAuthUserProps = {}

View File

@@ -1 +0,0 @@
export * from "./auth-user"

View File

@@ -0,0 +1,62 @@
import { Modules } from "@medusajs/modules-sdk"
import { ModuleJoinerConfig } from "@medusajs/types"
import { LINKS } from "@medusajs/utils"
export const CustomerAuth: ModuleJoinerConfig = {
serviceName: LINKS.CustomerAuth,
isLink: true,
databaseConfig: {
tableName: "customer_auth_identity",
idPrefix: "cusauth",
},
alias: [
{
name: "customer_auth_identity",
},
{
name: "customer_auth_identities",
},
],
primaryKeys: ["id", "customer_id", "auth_identity_id"],
relationships: [
{
serviceName: Modules.CUSTOMER,
primaryKey: "id",
foreignKey: "customer_id",
alias: "customer",
},
{
serviceName: Modules.AUTH,
isInternalService: true,
primaryKey: "id",
foreignKey: "auth_identity_id",
alias: "auth",
},
],
extends: [
{
serviceName: Modules.CUSTOMER,
fieldAlias: {
auth_identity: "auth_link.auth_identity",
},
relationship: {
serviceName: LINKS.CustomerAuth,
primaryKey: "customer_id",
foreignKey: "id",
alias: "auth_link",
},
},
{
serviceName: Modules.AUTH,
fieldAlias: {
customer: "customer_link.customer",
},
relationship: {
serviceName: LINKS.CustomerAuth,
primaryKey: "auth_identity_id",
foreignKey: "id",
alias: "customer_link",
},
},
],
}

View File

@@ -14,3 +14,5 @@ export * from "./region-payment-provider"
export * from "./sales-channel-location"
export * from "./shipping-option-price-set"
export * from "./order-fulfillment"
export * from "./user-auth"
export * from "./customer-auth"

View File

@@ -0,0 +1,62 @@
import { Modules } from "@medusajs/modules-sdk"
import { ModuleJoinerConfig } from "@medusajs/types"
import { LINKS } from "@medusajs/utils"
export const UserAuth: ModuleJoinerConfig = {
serviceName: LINKS.UserAuth,
isLink: true,
databaseConfig: {
tableName: "user_auth_identity",
idPrefix: "usrauth",
},
alias: [
{
name: "user_auth_identity",
},
{
name: "user_auth_identities",
},
],
primaryKeys: ["id", "user_id", "auth_identity_id"],
relationships: [
{
serviceName: Modules.USER,
primaryKey: "id",
foreignKey: "user_id",
alias: "user",
},
{
serviceName: Modules.AUTH,
isInternalService: true,
primaryKey: "id",
foreignKey: "auth_identity_id",
alias: "auth",
},
],
extends: [
{
serviceName: Modules.USER,
fieldAlias: {
auth_identity: "auth_link.auth_identity",
},
relationship: {
serviceName: LINKS.UserAuth,
primaryKey: "user_id",
foreignKey: "id",
alias: "auth_link",
},
},
{
serviceName: Modules.AUTH,
fieldAlias: {
user: "user_link.user",
},
relationship: {
serviceName: LINKS.UserAuth,
primaryKey: "auth_identity_id",
foreignKey: "id",
alias: "user_link",
},
},
],
}