feat: Add request context middleware for config and dependency injection in hooks (#8480)
This commit is contained in:
@@ -188,6 +188,8 @@ function wrapToHTTPRequest(hook, key) {
|
||||
return req => {
|
||||
const jsonBody = {};
|
||||
for (var i in req) {
|
||||
// Parse Server config is not serializable
|
||||
if (i === 'config') { continue; }
|
||||
jsonBody[i] = req[i];
|
||||
}
|
||||
if (req.object) {
|
||||
|
||||
@@ -128,6 +128,19 @@ class ParseGraphQLServer {
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* @static
|
||||
* Allow developers to customize each request with inversion of control/dependency injection
|
||||
*/
|
||||
applyRequestContextMiddleware(api, options) {
|
||||
if (options.requestContextMiddleware) {
|
||||
if (typeof options.requestContextMiddleware !== 'function') {
|
||||
throw new Error('requestContextMiddleware must be a function');
|
||||
}
|
||||
api.use(this.config.graphQLPath, options.requestContextMiddleware);
|
||||
}
|
||||
}
|
||||
|
||||
applyGraphQL(app) {
|
||||
if (!app || !app.use) {
|
||||
requiredParameter('You must provide an Express.js app instance!');
|
||||
@@ -135,6 +148,7 @@ class ParseGraphQLServer {
|
||||
app.use(this.config.graphQLPath, corsMiddleware());
|
||||
app.use(this.config.graphQLPath, handleParseHeaders);
|
||||
app.use(this.config.graphQLPath, handleParseSession);
|
||||
this.applyRequestContextMiddleware(app, this.parseServer.config);
|
||||
app.use(this.config.graphQLPath, handleParseErrors);
|
||||
app.use(
|
||||
this.config.graphQLPath,
|
||||
|
||||
@@ -514,6 +514,11 @@ module.exports.ParseServerOptions = {
|
||||
env: 'PARSE_SERVER_READ_ONLY_MASTER_KEY',
|
||||
help: 'Read-only key, which has the same capabilities as MasterKey without writes',
|
||||
},
|
||||
requestContextMiddleware: {
|
||||
env: 'PARSE_SERVER_REQUEST_CONTEXT_MIDDLEWARE',
|
||||
help:
|
||||
'Options to customize the request context using inversion of control/dependency injection.',
|
||||
},
|
||||
requestKeywordDenylist: {
|
||||
env: 'PARSE_SERVER_REQUEST_KEYWORD_DENYLIST',
|
||||
help:
|
||||
|
||||
@@ -91,6 +91,7 @@
|
||||
* @property {Any} push Configuration for push, as stringified JSON. See http://docs.parseplatform.org/parse-server/guide/#push-notifications
|
||||
* @property {RateLimitOptions[]} rateLimit Options to limit repeated requests to Parse Server APIs. This can be used to protect sensitive endpoints such as `/requestPasswordReset` from brute-force attacks or Parse Server as a whole from denial-of-service (DoS) attacks.<br><br>ℹ️ Mind the following limitations:<br>- rate limits applied per IP address; this limits protection against distributed denial-of-service (DDoS) attacks where many requests are coming from various IP addresses<br>- if multiple Parse Server instances are behind a load balancer or ran in a cluster, each instance will calculate it's own request rates, independent from other instances; this limits the applicability of this feature when using a load balancer and another rate limiting solution that takes requests across all instances into account may be more suitable<br>- this feature provides basic protection against denial-of-service attacks, but a more sophisticated solution works earlier in the request flow and prevents a malicious requests to even reach a server instance; it's therefore recommended to implement a solution according to architecture and user case.
|
||||
* @property {String} readOnlyMasterKey Read-only key, which has the same capabilities as MasterKey without writes
|
||||
* @property {Function} requestContextMiddleware Options to customize the request context using inversion of control/dependency injection.
|
||||
* @property {RequestKeywordDenylist[]} requestKeywordDenylist An array of keys and values that are prohibited in database read and write requests to prevent potential security vulnerabilities. It is possible to specify only a key (`{"key":"..."}`), only a value (`{"value":"..."}`) or a key-value pair (`{"key":"...","value":"..."}`). The specification can use the following types: `boolean`, `numeric` or `string`, where `string` will be interpreted as a regex notation. Request data is deep-scanned for matching definitions to detect also any nested occurrences. Defaults are patterns that are likely to be used in malicious requests. Setting this option will override the default patterns.
|
||||
* @property {String} restAPIKey Key for REST calls
|
||||
* @property {Boolean} revokeSessionOnPasswordReset When a user changes their password, either through the reset password email or while logged in, all sessions are revoked if this is true. Set to false if you don't want to revoke sessions.
|
||||
|
||||
@@ -342,6 +342,8 @@ export interface ParseServerOptions {
|
||||
/* Options to limit repeated requests to Parse Server APIs. This can be used to protect sensitive endpoints such as `/requestPasswordReset` from brute-force attacks or Parse Server as a whole from denial-of-service (DoS) attacks.<br><br>ℹ️ Mind the following limitations:<br>- rate limits applied per IP address; this limits protection against distributed denial-of-service (DDoS) attacks where many requests are coming from various IP addresses<br>- if multiple Parse Server instances are behind a load balancer or ran in a cluster, each instance will calculate it's own request rates, independent from other instances; this limits the applicability of this feature when using a load balancer and another rate limiting solution that takes requests across all instances into account may be more suitable<br>- this feature provides basic protection against denial-of-service attacks, but a more sophisticated solution works earlier in the request flow and prevents a malicious requests to even reach a server instance; it's therefore recommended to implement a solution according to architecture and user case.
|
||||
:DEFAULT: [] */
|
||||
rateLimit: ?(RateLimitOptions[]);
|
||||
/* Options to customize the request context using inversion of control/dependency injection.*/
|
||||
requestContextMiddleware: ?((req: any, res: any, next: any) => void);
|
||||
}
|
||||
|
||||
export interface RateLimitOptions {
|
||||
|
||||
@@ -279,6 +279,18 @@ class ParseServer {
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @static
|
||||
* Allow developers to customize each request with inversion of control/dependency injection
|
||||
*/
|
||||
static applyRequestContextMiddleware(api, options) {
|
||||
if (options.requestContextMiddleware) {
|
||||
if (typeof options.requestContextMiddleware !== 'function') {
|
||||
throw new Error('requestContextMiddleware must be a function');
|
||||
}
|
||||
api.use(options.requestContextMiddleware);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* @static
|
||||
* Create an express app for the parse server
|
||||
@@ -326,7 +338,7 @@ class ParseServer {
|
||||
middlewares.addRateLimit(route, options);
|
||||
}
|
||||
api.use(middlewares.handleParseSession);
|
||||
|
||||
this.applyRequestContextMiddleware(api, options);
|
||||
const appRouter = ParseServer.promiseRouter({ appId });
|
||||
api.use(appRouter.expressRouter());
|
||||
|
||||
|
||||
@@ -73,6 +73,7 @@ export class FunctionsRouter extends PromiseRouter {
|
||||
headers: req.config.headers,
|
||||
ip: req.config.ip,
|
||||
jobName,
|
||||
config: req.config,
|
||||
message: jobHandler.setMessage.bind(jobHandler),
|
||||
};
|
||||
|
||||
@@ -129,6 +130,7 @@ export class FunctionsRouter extends PromiseRouter {
|
||||
params = parseParams(params, req.config);
|
||||
const request = {
|
||||
params: params,
|
||||
config: req.config,
|
||||
master: req.auth && req.auth.isMaster,
|
||||
user: req.auth && req.auth.user,
|
||||
installationId: req.info.installationId,
|
||||
|
||||
@@ -670,6 +670,7 @@ module.exports = ParseCloud;
|
||||
* @property {String} triggerName The name of the trigger (`beforeSave`, `afterSave`, ...)
|
||||
* @property {Object} log The current logger inside Parse Server.
|
||||
* @property {Parse.Object} original If set, the object, as currently stored.
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
@@ -684,6 +685,7 @@ module.exports = ParseCloud;
|
||||
* @property {Object} headers The original HTTP headers for the request.
|
||||
* @property {String} triggerName The name of the trigger (`beforeSave`, `afterSave`)
|
||||
* @property {Object} log The current logger inside Parse Server.
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
@@ -721,6 +723,7 @@ module.exports = ParseCloud;
|
||||
* @property {String} triggerName The name of the trigger (`beforeSave`, `afterSave`, ...)
|
||||
* @property {Object} log The current logger inside Parse Server.
|
||||
* @property {Boolean} isGet wether the query a `get` or a `find`
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
@@ -734,6 +737,7 @@ module.exports = ParseCloud;
|
||||
* @property {Object} headers The original HTTP headers for the request.
|
||||
* @property {String} triggerName The name of the trigger (`beforeSave`, `afterSave`, ...)
|
||||
* @property {Object} log The current logger inside Parse Server.
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
@@ -742,12 +746,14 @@ module.exports = ParseCloud;
|
||||
* @property {Boolean} master If true, means the master key was used.
|
||||
* @property {Parse.User} user If set, the user that made the request.
|
||||
* @property {Object} params The params passed to the cloud function.
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
* @interface Parse.Cloud.JobRequest
|
||||
* @property {Object} params The params passed to the background job.
|
||||
* @property {function} message If message is called with a string argument, will update the current message to be stored in the job status.
|
||||
* @property {Object} config The Parse Server config.
|
||||
*/
|
||||
|
||||
/**
|
||||
|
||||
@@ -270,6 +270,7 @@ export function getRequestObject(
|
||||
log: config.loggerController,
|
||||
headers: config.headers,
|
||||
ip: config.ip,
|
||||
config,
|
||||
};
|
||||
|
||||
if (isGet !== undefined) {
|
||||
@@ -320,6 +321,7 @@ export function getRequestQueryObject(triggerType, auth, query, count, config, c
|
||||
headers: config.headers,
|
||||
ip: config.ip,
|
||||
context: context || {},
|
||||
config,
|
||||
};
|
||||
|
||||
if (!auth) {
|
||||
@@ -1018,6 +1020,7 @@ export function getRequestFileObject(triggerType, auth, fileObject, config) {
|
||||
log: config.loggerController,
|
||||
headers: config.headers,
|
||||
ip: config.ip,
|
||||
config,
|
||||
};
|
||||
|
||||
if (!auth) {
|
||||
|
||||
Reference in New Issue
Block a user