Normalize legacy /admin login redirect targets
This commit is contained in:
@@ -3,6 +3,7 @@
|
|||||||
## Admin login
|
## Admin login
|
||||||
|
|
||||||
- The IndieKit admin uses root auth/session paths (for example: `/session/login`, `/auth`, `/auth/new-password`).
|
- The IndieKit admin uses root auth/session paths (for example: `/session/login`, `/auth`, `/auth/new-password`).
|
||||||
|
- Legacy `/admin` request paths are normalized to root login redirects (for example `/admin/posts` -> `/session/login?redirect=/posts`) to avoid post-login dead-end targets.
|
||||||
- Login uses `PASSWORD_SECRET` (bcrypt hash), not `INDIEKIT_PASSWORD`.
|
- Login uses `PASSWORD_SECRET` (bcrypt hash), not `INDIEKIT_PASSWORD`.
|
||||||
- If no `PASSWORD_SECRET` exists yet, open `/auth/new-password` once to generate it.
|
- If no `PASSWORD_SECRET` exists yet, open `/auth/new-password` once to generate it.
|
||||||
- If login is blocked because `PASSWORD_SECRET` is missing/invalid, set `INDIEKIT_ALLOW_PASSWORD_SETUP=1` temporarily, restart, generate a new hash via `/auth/new-password`, set `PASSWORD_SECRET` to that hash, then remove `INDIEKIT_ALLOW_PASSWORD_SETUP`.
|
- If login is blocked because `PASSWORD_SECRET` is missing/invalid, set `INDIEKIT_ALLOW_PASSWORD_SETUP=1` temporarily, restart, generate a new hash via `/auth/new-password`, set `PASSWORD_SECRET` to that hash, then remove `INDIEKIT_ALLOW_PASSWORD_SETUP`.
|
||||||
|
|||||||
@@ -4,16 +4,32 @@ const candidates = [
|
|||||||
"node_modules/@indiekit/indiekit/lib/indieauth.js",
|
"node_modules/@indiekit/indiekit/lib/indieauth.js",
|
||||||
];
|
];
|
||||||
|
|
||||||
const oldCode = `if (devMode) {
|
const oldDevModeCode = `if (devMode) {
|
||||||
request.session.access_token = process.env.NODE_ENV;
|
request.session.access_token = process.env.NODE_ENV;
|
||||||
request.session.scope = "create update delete media";
|
request.session.scope = "create update delete media";
|
||||||
} else if (!process.env.PASSWORD_SECRET) {`;
|
} else if (!process.env.PASSWORD_SECRET) {`;
|
||||||
|
|
||||||
const newCode = `if (devMode && process.env.INDIEKIT_ALLOW_DEV_AUTH === "1") {
|
const newDevModeCode = `if (devMode && process.env.INDIEKIT_ALLOW_DEV_AUTH === "1") {
|
||||||
request.session.access_token = process.env.NODE_ENV;
|
request.session.access_token = process.env.NODE_ENV;
|
||||||
request.session.scope = "create update delete media";
|
request.session.scope = "create update delete media";
|
||||||
} else if (!process.env.PASSWORD_SECRET) {`;
|
} else if (!process.env.PASSWORD_SECRET) {`;
|
||||||
|
|
||||||
|
const oldLoginRedirectCode = ` if (request.method === "GET") {
|
||||||
|
return response.redirect(
|
||||||
|
\`/session/login?redirect=\${request.originalUrl}\`,
|
||||||
|
);
|
||||||
|
}`;
|
||||||
|
|
||||||
|
const newLoginRedirectCode = ` if (request.method === "GET") {
|
||||||
|
const loginRedirect =
|
||||||
|
request.originalUrl === "/admin"
|
||||||
|
? "/"
|
||||||
|
: request.originalUrl.replace(/^\\/admin(?=\\/)/, "");
|
||||||
|
return response.redirect(
|
||||||
|
\`/session/login?redirect=\${loginRedirect}\`,
|
||||||
|
);
|
||||||
|
}`;
|
||||||
|
|
||||||
async function exists(path) {
|
async function exists(path) {
|
||||||
try {
|
try {
|
||||||
await access(path);
|
await access(path);
|
||||||
@@ -34,24 +50,29 @@ for (const filePath of candidates) {
|
|||||||
checked += 1;
|
checked += 1;
|
||||||
|
|
||||||
const source = await readFile(filePath, "utf8");
|
const source = await readFile(filePath, "utf8");
|
||||||
|
let updated = source;
|
||||||
|
|
||||||
if (source.includes(newCode)) {
|
if (!updated.includes(newDevModeCode) && updated.includes(oldDevModeCode)) {
|
||||||
continue;
|
updated = updated.replace(oldDevModeCode, newDevModeCode);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!source.includes(oldCode)) {
|
if (
|
||||||
continue;
|
!updated.includes(newLoginRedirectCode) &&
|
||||||
|
updated.includes(oldLoginRedirectCode)
|
||||||
|
) {
|
||||||
|
updated = updated.replace(oldLoginRedirectCode, newLoginRedirectCode);
|
||||||
}
|
}
|
||||||
|
|
||||||
const updated = source.replace(oldCode, newCode);
|
if (updated !== source) {
|
||||||
await writeFile(filePath, updated, "utf8");
|
await writeFile(filePath, updated, "utf8");
|
||||||
patched += 1;
|
patched += 1;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (checked === 0) {
|
if (checked === 0) {
|
||||||
console.log("[postinstall] No indieauth middleware files found");
|
console.log("[postinstall] No indieauth middleware files found");
|
||||||
} else if (patched === 0) {
|
} else if (patched === 0) {
|
||||||
console.log("[postinstall] indieauth dev-mode guard already patched");
|
console.log("[postinstall] indieauth auth-guard patches already applied");
|
||||||
} else {
|
} else {
|
||||||
console.log(`[postinstall] Patched indieauth dev-mode guard in ${patched} file(s)`);
|
console.log(`[postinstall] Patched indieauth auth guards in ${patched} file(s)`);
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user