fixed auth parsing

ref #6
This commit is contained in:
Philipp Dormann 2020-11-27 21:16:15 +01:00
parent cb5f5b9ecb
commit 5f4aed2f02
3 changed files with 43 additions and 30 deletions

View File

@ -4,12 +4,14 @@ import { createExpressServer } from "routing-controllers";
import consola from "consola"; import consola from "consola";
import loaders from "./loaders/index"; import loaders from "./loaders/index";
import authchecker from "./authchecker"; import authchecker from "./authchecker";
import { ErrorHandler } from './middlewares/ErrorHandler';
// //
dotenvSafe.config(); dotenvSafe.config();
const PORT = process.env.APP_PORT || 4010; const PORT = process.env.APP_PORT || 4010;
const app = createExpressServer({ const app = createExpressServer({
authorizationChecker: authchecker, authorizationChecker: authchecker,
middlewares: [ErrorHandler],
development: false, development: false,
controllers: [`${__dirname}/controllers/*.ts`], controllers: [`${__dirname}/controllers/*.ts`],
}); });

View File

@ -3,8 +3,8 @@ import { Action, HttpError } from "routing-controllers";
// ----------- // -----------
const sampletoken = jwt.sign({ const sampletoken = jwt.sign({
"permissions": { "permissions": {
// "TRACKS": ["read", "update", "delete", "add"] "TRACKS": ["read", "update", "delete", "add"]
"TRACKS": [] // "TRACKS": []
} }
}, process.env.JWT_SECRET || "secretjwtsecret") }, process.env.JWT_SECRET || "secretjwtsecret")
console.log(`sampletoken: ${sampletoken}`); console.log(`sampletoken: ${sampletoken}`);
@ -18,36 +18,27 @@ const authchecker = async (action: Action, permissions: string | string[]) => {
} }
// const token = action.request.headers["authorization"]; // const token = action.request.headers["authorization"];
const provided_token = action.request.query["auth"]; const provided_token = action.request.query["auth"];
let jwtPayload = undefined
try { try {
const jwtPayload = <any>jwt.verify(provided_token, process.env.JWT_SECRET || "secretjwtsecret"); jwtPayload = <any>jwt.verify(provided_token, process.env.JWT_SECRET || "secretjwtsecret");
} catch (error) {
throw new HttpError(401, "jwt_illegal")
}
if (jwtPayload.permissions) { if (jwtPayload.permissions) {
action.response.local = {} action.response.local = {}
action.response.local.jwtPayload = jwtPayload.permissions action.response.local.jwtPayload = jwtPayload.permissions
required_permissions.forEach(r => { required_permissions.forEach(r => {
const permission_key = r.split(":")[0] const permission_key = r.split(":")[0]
const actual_accesslevel_for_permission = jwtPayload.permissions[permission_key] const actual_accesslevel_for_permission = jwtPayload.permissions[permission_key]
console.log(actual_accesslevel_for_permission);
const permission_access_level = r.split(":")[1] const permission_access_level = r.split(":")[1]
console.log(permission_key);
console.log(permission_access_level);
// console.log(permission_key);
// console.log(permission_access_level);
if (actual_accesslevel_for_permission.includes(permission_access_level)) { if (actual_accesslevel_for_permission.includes(permission_access_level)) {
return true; return true;
} else { } else {
// TODO: throw/return proper HttpError
throw new HttpError(403, "no") throw new HttpError(403, "no")
return false;
} }
}); });
} else { } else {
// TODO: throw/return proper HttpError throw new HttpError(403, "no")
return false;
}
} catch (error) {
console.log(error);
// throw new HttpError(401, "jwt_illegal")
return false
} }
return true; return true;
} }

View File

@ -0,0 +1,20 @@
import {
Middleware,
ExpressErrorMiddlewareInterface
} from "routing-controllers";
@Middleware({ type: "after" })
export class ErrorHandler implements ExpressErrorMiddlewareInterface {
public error(
error: any,
request: any,
response: any,
next: (err: any) => any
) {
if (response.headersSent) {
return;
}
response.json(error);
}
}