chore: Add tests for jwt authorization
This commit is contained in:
committed by
mrugesh mohapatra
parent
f5ca6ce5e9
commit
36c4737998
96
api-server/server/middlewares/request-authorization.js
Normal file
96
api-server/server/middlewares/request-authorization.js
Normal file
@ -0,0 +1,96 @@
|
||||
import loopback from 'loopback';
|
||||
import jwt from 'jsonwebtoken';
|
||||
import { isBefore } from 'date-fns';
|
||||
import { isEmpty } from 'lodash';
|
||||
|
||||
import { homeLocation } from '../../../config/env';
|
||||
|
||||
import { wrapHandledError } from '../utils/create-handled-error';
|
||||
|
||||
// We need to tunnel through a proxy path set up within
|
||||
// the gatsby app, at this time, that path is /internal
|
||||
const apiProxyRE = /^\/internal\/|^\/external\//;
|
||||
const newsShortLinksRE = /^\/internal\/n\/|^\/internal\/p\?/;
|
||||
const loopbackAPIPathRE = /^\/internal\/api\//;
|
||||
|
||||
const _whiteListREs = [newsShortLinksRE, loopbackAPIPathRE];
|
||||
|
||||
export function isWhiteListedPath(path, whiteListREs = _whiteListREs) {
|
||||
return whiteListREs.some(re => re.test(path));
|
||||
}
|
||||
|
||||
export default ({
|
||||
_jwtSecret = process.env.JWT_SECRET,
|
||||
getUserById = _getUserById
|
||||
} = {}) =>
|
||||
function requestAuthorisation(req, res, next) {
|
||||
const { path } = req;
|
||||
if (apiProxyRE.test(path) && !isWhiteListedPath(path)) {
|
||||
const cookie =
|
||||
(req.signedCookies && req.signedCookies['jwt_access_token']) ||
|
||||
(req.cookie && req.cookie['jwt_access_token']);
|
||||
|
||||
if (!cookie) {
|
||||
throw wrapHandledError(
|
||||
new Error('Access token is required for this request'),
|
||||
{
|
||||
type: 'info',
|
||||
redirect: `${homeLocation}/signin`,
|
||||
message: 'Access token is required for this request',
|
||||
status: 403
|
||||
}
|
||||
);
|
||||
}
|
||||
let token;
|
||||
try {
|
||||
token = jwt.verify(cookie, _jwtSecret);
|
||||
} catch (err) {
|
||||
throw wrapHandledError(new Error(err.message), {
|
||||
type: 'info',
|
||||
redirect: `${homeLocation}/signin`,
|
||||
message: 'Your access token is invalid',
|
||||
status: 403
|
||||
});
|
||||
}
|
||||
const {
|
||||
accessToken: { created, ttl, userId }
|
||||
} = token;
|
||||
const valid = isBefore(Date.now(), Date.parse(created) + ttl);
|
||||
if (!valid) {
|
||||
throw wrapHandledError(new Error('Access token is no longer vaild'), {
|
||||
type: 'info',
|
||||
redirect: `${homeLocation}/signin`,
|
||||
message: 'Access token is no longer vaild',
|
||||
status: 403
|
||||
});
|
||||
}
|
||||
|
||||
if (isEmpty(req.user)) {
|
||||
return getUserById(userId)
|
||||
.then(user => {
|
||||
if (user) {
|
||||
user.points = user.progressTimestamps.length;
|
||||
req.user = user;
|
||||
}
|
||||
return;
|
||||
})
|
||||
.then(next)
|
||||
.catch(next);
|
||||
} else {
|
||||
return Promise.resolve(next());
|
||||
}
|
||||
}
|
||||
return Promise.resolve(next());
|
||||
};
|
||||
|
||||
export function _getUserById(id) {
|
||||
const User = loopback.getModelByType('User');
|
||||
return new Promise((resolve, reject) =>
|
||||
User.findById(id, (err, instance) => {
|
||||
if (err) {
|
||||
return reject(err);
|
||||
}
|
||||
return resolve(instance);
|
||||
})
|
||||
);
|
||||
}
|
Reference in New Issue
Block a user