1
0
mirror of https://github.com/node-red/node-red.git synced 2023-10-10 13:36:53 +02:00
node-red/packages/node_modules/@node-red/runtime/lib/nodes/credentials.js

478 lines
19 KiB
JavaScript
Raw Permalink Normal View History

2014-05-03 23:26:35 +02:00
/**
* Copyright JS Foundation and other contributors, http://js.foundation
2014-05-03 23:26:35 +02:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
**/
2016-09-23 11:38:30 +02:00
var crypto = require('crypto');
2017-10-17 00:23:50 +02:00
var runtime;
2016-09-23 11:38:30 +02:00
var settings;
2018-04-23 15:24:51 +02:00
var log;
2014-05-03 23:26:35 +02:00
2016-09-23 11:38:30 +02:00
var encryptedCredentials = null;
2014-07-21 16:56:38 +02:00
var credentialCache = {};
var credentialsDef = {};
var dirty = false;
2014-07-21 16:56:38 +02:00
2016-09-23 11:38:30 +02:00
var removeDefaultKey = false;
var encryptionEnabled = null;
var encryptionKeyType; // disabled, system, user, project
2016-09-23 11:38:30 +02:00
var encryptionAlgorithm = "aes-256-ctr";
var encryptionKey;
function decryptCredentials(key,credentials) {
var creds = credentials["$"];
var initVector = Buffer.from(creds.substring(0, 32),'hex');
2016-09-23 11:38:30 +02:00
creds = creds.substring(32);
var decipher = crypto.createDecipheriv(encryptionAlgorithm, key, initVector);
var decrypted = decipher.update(creds, 'base64', 'utf8') + decipher.final('utf8');
return JSON.parse(decrypted);
}
function encryptCredentials(key,credentials) {
var initVector = crypto.randomBytes(16);
var cipher = crypto.createCipheriv(encryptionAlgorithm, key, initVector);
return {"$":initVector.toString('hex') + cipher.update(JSON.stringify(credentials), 'utf8', 'base64') + cipher.final('base64')};
}
2016-09-23 11:38:30 +02:00
var api = module.exports = {
2017-10-17 00:23:50 +02:00
init: function(_runtime) {
runtime = _runtime;
2016-09-23 11:38:30 +02:00
log = runtime.log;
settings = runtime.settings;
dirty = false;
credentialCache = {};
credentialsDef = {};
2016-09-23 11:38:30 +02:00
encryptionEnabled = null;
2014-05-03 23:26:35 +02:00
},
2014-07-21 16:56:38 +02:00
/**
* Sets the credentials from storage.
2014-07-21 16:56:38 +02:00
*/
2020-11-30 15:38:48 +01:00
load: async function (credentials) {
dirty = false;
2016-09-23 11:38:30 +02:00
var credentialsEncrypted = credentials.hasOwnProperty("$") && Object.keys(credentials).length === 1;
// Case 1: Active Project in place
// - use whatever its config says
// Case 2: _credentialSecret unset, credentialSecret unset
// - generate _credentialSecret and encrypt
// Case 3: _credentialSecret set, credentialSecret set
// - migrate from _credentialSecret to credentialSecret
// - delete _credentialSecret
// Case 4: credentialSecret set
// - use it
2020-11-30 15:38:48 +01:00
var setupEncryptionPromise = Promise.resolve();
var projectKey = false;
var activeProject;
encryptionKeyType = "";
if (runtime.storage && runtime.storage.projects) {
// projects enabled
activeProject = runtime.storage.projects.getActiveProject();
if (activeProject) {
projectKey = activeProject.credentialSecret;
if (!projectKey) {
log.debug("red/runtime/nodes/credentials.load : using active project key - disabled");
encryptionKeyType = "disabled";
encryptionEnabled = false;
} else {
log.debug("red/runtime/nodes/credentials.load : using active project key");
encryptionKeyType = "project";
encryptionKey = crypto.createHash('sha256').update(projectKey).digest();
encryptionEnabled = true;
}
}
}
if (encryptionKeyType === '') {
2016-09-23 11:38:30 +02:00
var defaultKey;
try {
defaultKey = settings.get('_credentialSecret');
} catch(err) {
}
if (defaultKey) {
defaultKey = crypto.createHash('sha256').update(defaultKey).digest();
encryptionKeyType = "system";
2016-09-23 11:38:30 +02:00
}
var userKey;
try {
userKey = settings.get('credentialSecret');
} catch(err) {
userKey = false;
}
2017-09-20 11:30:07 +02:00
2016-09-23 11:38:30 +02:00
if (userKey === false) {
encryptionKeyType = "disabled";
2016-09-23 11:38:30 +02:00
log.debug("red/runtime/nodes/credentials.load : user disabled encryption");
// User has disabled encryption
encryptionEnabled = false;
// Check if we have a generated _credSecret to decrypt with and remove
if (defaultKey) {
log.debug("red/runtime/nodes/credentials.load : default key present. Will migrate");
if (credentialsEncrypted) {
try {
credentials = decryptCredentials(defaultKey,credentials)
} catch(err) {
credentials = {};
log.warn(log._("nodes.credentials.error",{message:err.toString()}))
2017-09-20 11:30:07 +02:00
var error = new Error("Failed to decrypt credentials");
error.code = "credentials_load_failed";
2020-11-30 15:38:48 +01:00
throw error;
2016-09-23 11:38:30 +02:00
}
}
dirty = true;
removeDefaultKey = true;
}
} else if (typeof userKey === 'string') {
2017-09-20 11:30:07 +02:00
if (!projectKey) {
log.debug("red/runtime/nodes/credentials.load : user provided key");
}
if (encryptionKeyType !== 'project') {
encryptionKeyType = 'user';
}
2016-09-23 11:38:30 +02:00
// User has provided own encryption key, get the 32-byte hash of it
encryptionKey = crypto.createHash('sha256').update(userKey).digest();
encryptionEnabled = true;
if (encryptionKeyType !== 'project' && defaultKey) {
2016-09-23 11:38:30 +02:00
log.debug("red/runtime/nodes/credentials.load : default key present. Will migrate");
// User has provided their own key, but we already have a default key
// Decrypt using default key
if (credentialsEncrypted) {
try {
credentials = decryptCredentials(defaultKey,credentials)
} catch(err) {
credentials = {};
log.warn(log._("nodes.credentials.error",{message:err.toString()}))
2017-09-20 11:30:07 +02:00
var error = new Error("Failed to decrypt credentials");
error.code = "credentials_load_failed";
2020-11-30 15:38:48 +01:00
throw error;
2016-09-23 11:38:30 +02:00
}
}
dirty = true;
removeDefaultKey = true;
}
} else {
log.debug("red/runtime/nodes/credentials.load : no user key present");
// User has not provide their own key
if (encryptionKeyType !== 'project') {
encryptionKeyType = 'system';
}
2016-09-23 11:38:30 +02:00
encryptionKey = defaultKey;
encryptionEnabled = true;
if (encryptionKey === undefined) {
log.debug("red/runtime/nodes/credentials.load : no default key present - generating one");
// No user-provided key, no generated key
// Generate a new key
defaultKey = crypto.randomBytes(32).toString('hex');
try {
setupEncryptionPromise = settings.set('_credentialSecret',defaultKey);
encryptionKey = crypto.createHash('sha256').update(defaultKey).digest();
} catch(err) {
log.debug("red/runtime/nodes/credentials.load : settings unavailable - disabling encryption");
// Settings unavailable
encryptionEnabled = false;
encryptionKey = null;
}
dirty = true;
} else {
log.debug("red/runtime/nodes/credentials.load : using default key");
}
}
}
if (encryptionEnabled && !dirty) {
encryptedCredentials = credentials;
}
log.debug("red/runtime/nodes/credentials.load : keyType="+encryptionKeyType);
2018-03-20 01:03:26 +01:00
if (encryptionKeyType === 'system') {
log.warn(log._("nodes.credentials.system-key-warning"));
}
2016-09-23 11:38:30 +02:00
return setupEncryptionPromise.then(function() {
var clearInvalidFlag = false;
2016-09-23 11:38:30 +02:00
if (credentials.hasOwnProperty("$")) {
if (encryptionEnabled === false) {
// The credentials appear to be encrypted, but our config
// thinks they are not.
var error = new Error("Failed to decrypt credentials");
error.code = "credentials_load_failed";
if (activeProject) {
// This is a project with a bad key. Mark it as invalid
// TODO: this delves too deep into Project structure
activeProject.credentialSecretInvalid = true;
2020-11-30 15:38:48 +01:00
throw error;
}
2020-11-30 15:38:48 +01:00
throw error;
}
2016-09-23 11:38:30 +02:00
// These are encrypted credentials
try {
credentialCache = decryptCredentials(encryptionKey,credentials)
clearInvalidFlag = true;
2016-09-23 11:38:30 +02:00
} catch(err) {
credentialCache = {};
dirty = true;
log.warn(log._("nodes.credentials.error",{message:err.toString()}))
2017-09-20 11:30:07 +02:00
var error = new Error("Failed to decrypt credentials");
error.code = "credentials_load_failed";
if (activeProject) {
// This is a project with a bad key. Mark it as invalid
2017-10-17 00:23:50 +02:00
// TODO: this delves too deep into Project structure
activeProject.credentialSecretInvalid = true;
2020-11-30 15:38:48 +01:00
throw error;
}
2020-11-30 15:38:48 +01:00
throw error;
2016-09-23 11:38:30 +02:00
}
} else {
if (encryptionEnabled) {
// Our config expects the credentials to be encrypted but the encrypted object is not found
log.warn(log._("nodes.credentials.encryptedNotFound"))
credentialCache = credentials;
} else {
// credentialSecret is set to False
2022-03-22 22:18:11 +01:00
log.warn(log._("nodes.credentials.unencrypted"))
credentialCache = credentials;
}
2016-09-23 11:38:30 +02:00
}
if (clearInvalidFlag) {
// TODO: this delves too deep into Project structure
if (activeProject) {
delete activeProject.credentialSecretInvalid;
}
}
2016-09-23 11:38:30 +02:00
});
2014-05-03 23:26:35 +02:00
},
2014-07-21 16:56:38 +02:00
/**
* Adds a set of credentials for the given node id.
* @param id the node id for the credentials
* @param creds an object of credential key/value pairs
* @return a promise for backwards compatibility TODO: can this be removed?
2014-07-21 16:56:38 +02:00
*/
2020-11-30 15:38:48 +01:00
add: async function (id, creds) {
if (!credentialCache.hasOwnProperty(id) || JSON.stringify(creds) !== JSON.stringify(credentialCache[id])) {
credentialCache[id] = creds;
dirty = true;
}
2014-05-03 23:26:35 +02:00
},
2014-07-21 16:56:38 +02:00
/**
* Gets the credentials for the given node id.
* @param id the node id for the credentials
* @return the credentials
*/
get: function (id) {
2014-07-21 16:56:38 +02:00
return credentialCache[id];
2014-05-03 23:26:35 +02:00
},
2014-07-21 16:56:38 +02:00
/**
* Deletes the credentials for the given node id.
* @param id the node id for the credentials
* @return a promise for the saving of credentials to storage
*/
delete: function (id) {
2014-07-21 16:56:38 +02:00
delete credentialCache[id];
dirty = true;
2014-05-03 23:26:35 +02:00
},
clear: function() {
credentialCache = {};
dirty = true;
},
2014-07-21 16:56:38 +02:00
/**
* Deletes any credentials for nodes that no longer exist
* @param config a flow config
2014-07-21 16:56:38 +02:00
* @return a promise for the saving of credentials to storage
*/
2020-11-30 15:38:48 +01:00
clean: async function (config) {
var existingIds = {};
config.forEach(function(n) {
existingIds[n.id] = true;
if (n.credentials) {
api.extract(n);
}
});
2014-05-03 23:26:35 +02:00
var deletedCredentials = false;
2014-07-21 16:56:38 +02:00
for (var c in credentialCache) {
if (credentialCache.hasOwnProperty(c)) {
if (!existingIds[c]) {
2014-07-02 00:46:25 +02:00
deletedCredentials = true;
2014-07-21 16:56:38 +02:00
delete credentialCache[c];
2014-07-02 00:46:25 +02:00
}
2014-05-03 23:26:35 +02:00
}
}
if (deletedCredentials) {
dirty = true;
2014-05-03 23:26:35 +02:00
}
},
2014-07-21 16:56:38 +02:00
/**
* Registers a node credential definition.
* @param type the node type
* @param definition the credential definition
*/
register: function (type, definition) {
var dashedType = type.replace(/\s+/g, '-');
credentialsDef[dashedType] = definition;
},
/**
2014-07-21 16:56:38 +02:00
* Extracts and stores any credential updates in the provided node.
* The provided node may have a .credentials property that contains
* new credentials for the node.
* This function loops through the credentials in the definition for
* the node-type and applies any of the updates provided in the node.
*
2014-07-21 16:56:38 +02:00
* This function does not save the credentials to disk as it is expected
* to be called multiple times when a new flow is deployed.
*
* @param node the node to extract credentials from
*/
2014-07-21 16:56:38 +02:00
extract: function(node) {
var nodeID = node.id;
var nodeType = node.type;
var cred;
2014-07-21 16:56:38 +02:00
var newCreds = node.credentials;
if (newCreds) {
2015-12-09 22:51:46 +01:00
delete node.credentials;
2014-07-21 16:56:38 +02:00
var savedCredentials = credentialCache[nodeID] || {};
// Need to check the type of constructor for this node.
// - Function : regular node
// - !Function: subflow module
if (/^subflow(:|$)/.test(nodeType) || typeof runtime.nodes.getType(nodeType) !== 'function') {
for (cred in newCreds) {
if (newCreds.hasOwnProperty(cred)) {
if (newCreds[cred] === "__PWRD__") {
continue;
}
if (0 === newCreds[cred].length || /^\s*$/.test(newCreds[cred])) {
delete savedCredentials[cred];
dirty = true;
continue;
}
if (!savedCredentials.hasOwnProperty(cred) || JSON.stringify(savedCredentials[cred]) !== JSON.stringify(newCreds[cred])) {
savedCredentials[cred] = newCreds[cred];
dirty = true;
}
2014-07-21 16:56:38 +02:00
}
}
if (/^subflow(:|$)/.test(nodeType)) {
for (cred in savedCredentials) {
if (savedCredentials.hasOwnProperty(cred)) {
if (!newCreds.hasOwnProperty(cred)) {
delete savedCredentials[cred];
dirty = true;
}
}
2014-07-21 16:56:38 +02:00
}
}
} else if (nodeType === "global-config") {
if (JSON.stringify(savedCredentials.map) !== JSON.stringify(newCreds.map)) {
savedCredentials.map = newCreds.map;
dirty = true;
}
} else {
var dashedType = nodeType.replace(/\s+/g, '-');
var definition = credentialsDef[dashedType];
if (!definition) {
log.warn(log._("nodes.credentials.not-registered",{type:nodeType}));
return;
}
for (cred in definition) {
if (definition.hasOwnProperty(cred)) {
if (newCreds[cred] === undefined) {
continue;
}
if (definition[cred].type == "password" && newCreds[cred] == '__PWRD__') {
continue;
}
if (0 === newCreds[cred].length || /^\s*$/.test(newCreds[cred])) {
delete savedCredentials[cred];
dirty = true;
continue;
}
if (!savedCredentials.hasOwnProperty(cred) || JSON.stringify(savedCredentials[cred]) !== JSON.stringify(newCreds[cred])) {
savedCredentials[cred] = newCreds[cred];
dirty = true;
}
}
}
}
2014-07-21 16:56:38 +02:00
credentialCache[nodeID] = savedCredentials;
}
},
/**
* Gets the credential definition for the given node type
* @param type the node type
* @return the credential definition
*/
getDefinition: function (type) {
return credentialsDef[type];
},
dirty: function() {
return dirty;
},
setKey: function(key) {
if (key) {
encryptionKey = crypto.createHash('sha256').update(key).digest();
encryptionEnabled = true;
dirty = true;
encryptionKeyType = "project";
} else {
encryptionKey = null;
encryptionEnabled = false;
dirty = true;
encryptionKeyType = "disabled";
}
},
getKeyType: function() {
return encryptionKeyType;
},
2020-11-30 15:38:48 +01:00
export: async function() {
2016-09-23 11:38:30 +02:00
var result = credentialCache;
if (encryptionEnabled) {
if (dirty) {
try {
log.debug("red/runtime/nodes/credentials.export : encrypting");
result = encryptCredentials(encryptionKey, credentialCache);
} catch(err) {
log.warn(log._("nodes.credentials.error-saving",{message:err.toString()}))
}
} else {
result = encryptedCredentials;
2016-09-23 11:38:30 +02:00
}
}
dirty = false;
2016-09-23 11:38:30 +02:00
if (removeDefaultKey) {
log.debug("red/runtime/nodes/credentials.export : removing unused default key");
return settings.delete('_credentialSecret').then(function() {
removeDefaultKey = false;
return result;
})
} else {
2020-11-30 15:38:48 +01:00
return result;
2016-09-23 11:38:30 +02:00
}
2014-05-03 23:26:35 +02:00
}
}