summary refs log tree commit diff
path: root/api/src/middlewares/Authentication.ts
diff options
context:
space:
mode:
authorFlam3rboy <34555296+Flam3rboy@users.noreply.github.com>2021-08-12 20:22:16 +0200
committerFlam3rboy <34555296+Flam3rboy@users.noreply.github.com>2021-08-12 20:22:16 +0200
commitbdc0cc723c7d5974a4c4e3e8b0793917684ec85d (patch)
tree7123410553a6698d90ddaae69b05cde8402ded36 /api/src/middlewares/Authentication.ts
parent1.3.52 (diff)
parent:sparkles: gateway (diff)
downloadserver-bdc0cc723c7d5974a4c4e3e8b0793917684ec85d.tar.xz
Merge branch 'master' into util
Diffstat (limited to 'api/src/middlewares/Authentication.ts')
-rw-r--r--api/src/middlewares/Authentication.ts48
1 files changed, 48 insertions, 0 deletions
diff --git a/api/src/middlewares/Authentication.ts b/api/src/middlewares/Authentication.ts
new file mode 100644

index 00000000..01b7ef57 --- /dev/null +++ b/api/src/middlewares/Authentication.ts
@@ -0,0 +1,48 @@ +import { NextFunction, Request, Response } from "express"; +import { HTTPError } from "lambert-server"; +import { checkToken, Config } from "@fosscord/server-util"; + +export const NO_AUTHORIZATION_ROUTES = [ + /^\/api(\/v\d+)?\/auth\/login/, + /^\/api(\/v\d+)?\/auth\/register/, + /^\/api(\/v\d+)?\/webhooks\//, + /^\/api(\/v\d+)?\/ping/, + /^\/api(\/v\d+)?\/gateway/, + /^\/api(\/v\d+)?\/experiments/, + /^\/api(\/v\d+)?\/guilds\/\d+\/widget\.(json|png)/ +]; + +export const API_PREFIX = /^\/api(\/v\d+)?/; +export const API_PREFIX_TRAILING_SLASH = /^\/api(\/v\d+)?\//; + +declare global { + namespace Express { + interface Request { + user_id: any; + user_bot: boolean; + token: any; + } + } +} + +export async function Authentication(req: Request, res: Response, next: NextFunction) { + if (req.method === "OPTIONS") return res.sendStatus(204); + if (!req.url.startsWith("/api")) return next(); + const apiPath = req.url.replace(API_PREFIX, ""); + if (apiPath.startsWith("/invites") && req.method === "GET") return next(); + if (NO_AUTHORIZATION_ROUTES.some((x) => x.test(req.url))) return next(); + if (!req.headers.authorization) return next(new HTTPError("Missing Authorization Header", 401)); + + try { + const { jwtSecret } = Config.get().security; + + const { decoded, user }: any = await checkToken(req.headers.authorization, jwtSecret); + + req.token = decoded; + req.user_id = decoded.id; + req.user_bot = user.bot; + return next(); + } catch (error) { + return next(new HTTPError(error.toString(), 400)); + } +}