From d6a72ace83fb0972b1a1ba9840e89d689639c994 Mon Sep 17 00:00:00 2001 From: mifi Date: Tue, 9 May 2023 19:43:58 -0400 Subject: [PATCH 1/2] Probably not... --- docker-compose.staging_image.yml | 39 ++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 docker-compose.staging_image.yml diff --git a/docker-compose.staging_image.yml b/docker-compose.staging_image.yml new file mode 100644 index 0000000..a6caca2 --- /dev/null +++ b/docker-compose.staging_image.yml @@ -0,0 +1,39 @@ +version: '3.8' + +services: + auth-service_mongo: + container_name: ${CONTAINER_PREFIX}-auth-service_mongo + env_file: + - staging.env + networks: + - docknet + volumes: + - '/volume1/docker/labs/auth/mongo:/data/db' + # - ./mongo-init.js:/docker-entrypoint-initdb.d/mongo-init.js:ro + restart: unless-stopped + image: mongo:latest + auth-service: + env_file: + - staging.env + build: . + container_name: ${CONTAINER_PREFIX}-auth-service + environment: + - DB_HOST=${CONTAINER_PREFIX}-auth-service_mongo + labels: + - 'traefik.enable=true' + - 'traefik.http.routers.grow.rule=Host(`${HOST}`) && Path(`${ROUTE_PREFIX}`)' + - 'traefik.http.routers.grow.entrypoints=websecure' + - 'traefik.http.routers.grow.tls=true' + - 'traefik.http.routers.grow.tls.certresolver=letsencrypt' + - 'traefik.http.routers.grow.service=grow-service' + - 'traefik.http.services.grow-service.loadbalancer.server.port=${PORT}' + networks: + - docknet + restart: unless-stopped + image: node:20-alpine + depends_on: + - auth-service_mongo +networks: + docknet: + name: docknet + external: true \ No newline at end of file From 991dc32ce404f427ec9bf63104057137087b1d97 Mon Sep 17 00:00:00 2001 From: mifi Date: Tue, 9 May 2023 20:04:11 -0400 Subject: [PATCH 2/2] Some extra changes --- lib/server/controllers/auth.ts | 3 +++ 1 file changed, 3 insertions(+) diff --git a/lib/server/controllers/auth.ts b/lib/server/controllers/auth.ts index 9048e6d..836285a 100644 --- a/lib/server/controllers/auth.ts +++ b/lib/server/controllers/auth.ts @@ -45,6 +45,9 @@ router.post(process.env.RESET_ROUTE || RESET_ROUTE, async (ctx, next) => { }); router.patch('/:record', authenticated(), (ctx: Koa.Context) => { + if (ctx.user !== ctx.param.record) { + ctx.throw(StatusCodes.UNAUTHORIZED); + } const data = Auth.findOneAndUpdate({ record: ctx.params.record }); if (!data) { ctx.throw(StatusCodes.NOT_FOUND);