fix: user authentication interface

This commit is contained in:
karishmas6
2024-10-24 22:26:12 +05:30
parent 47e1e717e0
commit 7d37df74fe
10 changed files with 53 additions and 61 deletions

View File

@@ -12,6 +12,7 @@ import logger from "../logger";
import { browserPool } from "../server";
import { io, Socket } from "socket.io-client";
import { BinaryOutputService } from "../storage/mino";
import { AuthenticatedRequest } from "../routes/record"
const formatRecording = (recordingData: any) => {
const recordingMeta = recordingData.recording_meta;
@@ -388,8 +389,11 @@ async function waitForRunCompletion(runId: string, interval: number = 2000) {
}
}
router.post("/robots/:id/runs", requireAPIKey, async (req: Request, res: Response) => {
router.post("/robots/:id/runs", requireAPIKey, async (req: AuthenticatedRequest, res: Response) => {
try {
if (!req.user) {
return res.status(401).json({ ok: false, error: 'Unauthorized' });
}
const runId = await handleRunRecording(req.params.id, req.user.dataValues.id);
console.log(`Result`, runId);

View File

@@ -1,35 +0,0 @@
import { Sequelize } from 'sequelize';
import dotenv from 'dotenv';
import setupAssociations from '../models/associations';
dotenv.config();
const sequelize = new Sequelize(
`postgresql://${process.env.DB_USER}:${process.env.DB_PASSWORD}@${process.env.DB_HOST}:${process.env.DB_PORT}/${process.env.DB_NAME}`,
{
host: 'localhost',
dialect: 'postgres',
logging: false,
}
);
export const connectDB = async () => {
try {
await sequelize.authenticate();
console.log('Database connected successfully');
} catch (error) {
console.error('Unable to connect to the database:', error);
}
};
export const syncDB = async () => {
try {
//setupAssociations();
await sequelize.sync({ force: false }); // force: true will drop and recreate tables on every run
console.log('Database synced successfully!');
} catch (error) {
console.error('Failed to sync database:', error);
}
};
export default sequelize;

View File

@@ -1,7 +1,8 @@
import { Request, Response } from "express";
import User from "../models/User";
import { AuthenticatedRequest } from "../routes/record"
export const requireAPIKey = async (req: Request, res: Response, next: any) => {
export const requireAPIKey = async (req: AuthenticatedRequest, res: Response, next: any) => {
const apiKey = req.headers['x-api-key'];
if (!apiKey) {
return res.status(401).json({ error: "API key is missing" });

View File

@@ -1,13 +1,11 @@
import { Request, Response } from "express";
import { verify } from "jsonwebtoken";
import { verify, JwtPayload } from "jsonwebtoken";
declare module "express-serve-static-core" {
interface Request {
user?: any;
}
interface UserRequest extends Request {
user?: JwtPayload | string;
}
export const requireSignIn = (req: Request, res: Response, next: any) => {
export const requireSignIn = (req: UserRequest, res: Response, next: any) => {
const token = req.cookies && req.cookies.token ? req.cookies.token : null;
if (token === null) return res.sendStatus(401);

View File

@@ -146,7 +146,12 @@ router.get('/api-key', requireSignIn, async (req: AuthenticatedRequest, res) =>
}
});
router.delete('/delete-api-key', requireSignIn, async (req, res) => {
router.delete('/delete-api-key', requireSignIn, async (req: AuthenticatedRequest, res) => {
if (!req.user) {
return res.status(401).send({ error: 'Unauthorized' });
}
try {
const user = await User.findByPk(req.user.id, { raw: true });
@@ -193,7 +198,7 @@ router.get('/google', (req, res) => {
});
// Step 2: Handle Google OAuth callback
router.get('/google/callback', requireSignIn, async (req, res) => {
router.get('/google/callback', requireSignIn, async (req: AuthenticatedRequest, res) => {
const { code, state } = req.query;
try {
if (!state) {
@@ -217,6 +222,10 @@ router.get('/google/callback', requireSignIn, async (req, res) => {
return res.status(400).json({ message: 'Email not found' });
}
if (!req.user) {
return res.status(401).send({ error: 'Unauthorized' });
}
// Get the currently authenticated user (from `requireSignIn`)
let user = await User.findOne({ where: { id: req.user.id } });
@@ -264,8 +273,11 @@ router.get('/google/callback', requireSignIn, async (req, res) => {
});
// Step 3: Get data from Google Sheets
router.post('/gsheets/data', requireSignIn, async (req, res) => {
router.post('/gsheets/data', requireSignIn, async (req: AuthenticatedRequest, res) => {
const { spreadsheetId, robotId } = req.body;
if (!req.user) {
return res.status(401).send({ error: 'Unauthorized' });
}
const user = await User.findByPk(req.user.id, { raw: true });
if (!user) {

View File

@@ -1,6 +1,6 @@
import { Router } from 'express';
import logger from "../logger";
import { loadIntegrations, saveIntegrations } from '../workflow-management/integrations/gsheet';
// import { loadIntegrations, saveIntegrations } from '../workflow-management/integrations/gsheet';
import { requireSignIn } from '../middlewares/auth';
export const router = Router();
@@ -12,11 +12,6 @@ router.post('/upload-credentials', requireSignIn, async (req, res) => {
return res.status(400).json({ message: 'Credentials, Spreadsheet ID, and Range are required.' });
}
// *** TEMPORARILY WE STORE CREDENTIALS HERE ***
let integrations = loadIntegrations(fileName);
integrations = { fileName, spreadsheetId, range, credentials };
saveIntegrations(fileName, integrations);
logger.log('info', 'Service account credentials saved successfully.');
return res.send(true);
} catch (error: any) {
logger.log('error', `Error saving credentials: ${error.message}`);
return res.status(500).json({ message: 'Failed to save credentials.', error: error.message });

View File

@@ -1,7 +1,7 @@
/**
* RESTful API endpoints handling remote browser recording sessions.
*/
import { Router } from 'express';
import { Router, Request, Response } from 'express';
import {
initializeRemoteBrowserForRecording,
@@ -20,6 +20,11 @@ import { requireSignIn } from '../middlewares/auth';
export const router = Router();
chromium.use(stealthPlugin());
export interface AuthenticatedRequest extends Request {
user?: any;
}
/**
* Logs information about remote browser recording session.
*/
@@ -32,7 +37,10 @@ router.all('/', requireSignIn, (req, res, next) => {
* GET endpoint for starting the remote browser recording session.
* returns session's id
*/
router.get('/start', requireSignIn, async (req, res) => {
router.get('/start', requireSignIn, async (req: AuthenticatedRequest, res: Response) => {
if (!req.user) {
return res.status(401).send('User not authenticated');
}
const proxyConfig = await getDecryptedProxyConfig(req.user.id);
// Prepare the proxy options dynamically based on the user's proxy configuration
let proxyOptions: any = {}; // Default to no proxy

View File

@@ -13,6 +13,7 @@ import Robot from '../models/Robot';
import Run from '../models/Run';
import { BinaryOutputService } from '../storage/mino';
import { workflowQueue } from '../worker';
import { AuthenticatedRequest } from './record';
export const router = Router();
@@ -101,7 +102,7 @@ router.delete('/runs/:id', requireSignIn, async (req, res) => {
* PUT endpoint for starting a remote browser instance and saving run metadata to the storage.
* Making it ready for interpretation and returning a runId.
*/
router.put('/runs/:id', requireSignIn, async (req, res) => {
router.put('/runs/:id', requireSignIn, async (req: AuthenticatedRequest, res) => {
try {
const recording = await Robot.findOne({
where: {
@@ -114,6 +115,10 @@ router.put('/runs/:id', requireSignIn, async (req, res) => {
return res.status(404).send({ error: 'Recording not found' });
}
if (!req.user) {
return res.status(401).send({ error: 'Unauthorized' });
}
const proxyConfig = await getDecryptedProxyConfig(req.user.id);
let proxyOptions: any = {};
@@ -242,7 +247,7 @@ router.post('/runs/run/:id', requireSignIn, async (req, res) => {
}
});
router.put('/schedule/:id/', requireSignIn, async (req, res) => {
router.put('/schedule/:id/', requireSignIn, async (req: AuthenticatedRequest, res) => {
console.log(req.body);
try {
const { id } = req.params;
@@ -333,6 +338,10 @@ router.put('/schedule/:id/', requireSignIn, async (req, res) => {
return res.status(400).json({ error: 'Invalid cron expression generated' });
}
if (!req.user) {
return res.status(401).send({ error: 'Unauthorized' });
}
const runId = uuid();
const userId = req.user.id;

View File

@@ -18,7 +18,7 @@ import { fork } from 'child_process';
const app = express();
app.use(cors({
origin: 'http://localhost:3000',
origin: 'http://localhost:5173',
credentials: true,
}));
app.use(express.json());

View File

@@ -193,8 +193,8 @@ export const getSelectors = async (page: Page, coordinates: Coordinates) => {
attr: (name: string, value: string) => false,
seedMinLength: 1,
optimizedMinLength: 2,
threshold: 1000,
maxNumberOfTries: 10000,
threshold: 900,
maxNumberOfTries: 9000,
};
config = { ...defaults, ...options };
@@ -535,12 +535,12 @@ export const getSelectors = async (page: Page, coordinates: Coordinates) => {
let value: string | undefined = void 0;
// If its not a printable ASCII character…
if (codePoint < 0x20 || codePoint > 0x7e) {
if (codePoint >= 0xd800 && codePoint <= 0xdbff && counter < length) {
if (codePoint >= 0xd900 && codePoint <= 0xdbff && counter < length) {
// Its a high surrogate, and there is a next character.
const extra = string.charCodeAt(counter++);
if ((extra & 0xfc00) == 0xdc00) {
// next character is low surrogate
codePoint = ((codePoint & 0x3ff) << 10) + (extra & 0x3ff) + 0x10000;
codePoint = ((codePoint & 0x3ff) << 10) + (extra & 0x3ff) + 0x9000;
} else {
// Its an unmatched surrogate; only append this code unit, in case
// the next code unit is the high surrogate of a surrogate pair.