1
0
Fork 0
mirror of synced 2024-06-29 19:41:03 +12:00
budibase/packages/auth/src/middleware/authenticated.js

84 lines
2.6 KiB
JavaScript
Raw Normal View History

2021-04-11 22:35:55 +12:00
const { Cookies } = require("../constants")
2021-04-22 22:45:22 +12:00
const database = require("../db")
const { getCookie, clearCookie } = require("../utils")
2021-04-22 22:45:22 +12:00
const { StaticDatabases } = require("../db/utils")
const env = require("../environment")
2021-04-11 22:35:55 +12:00
const PARAM_REGEX = /\/:(.*?)\//g
2021-04-29 01:28:25 +12:00
function buildNoAuthRegex(patterns) {
return patterns.map(pattern => {
const isObj = typeof pattern === "object" && pattern.route
const method = isObj ? pattern.method : "GET"
let route = isObj ? pattern.route : pattern
const matches = route.match(PARAM_REGEX)
if (matches) {
for (let match of matches) {
route = route.replace(match, "/.*/")
}
}
return { regex: new RegExp(route), method }
})
2021-04-29 01:28:25 +12:00
}
function finalise(ctx, { authenticated, user, internal } = {}) {
ctx.isAuthenticated = authenticated || false
ctx.user = user
ctx.internal = internal || false
}
module.exports = (noAuthPatterns = [], opts) => {
const noAuthOptions = noAuthPatterns ? buildNoAuthRegex(noAuthPatterns) : []
return async (ctx, next) => {
// the path is not authenticated
const found = noAuthOptions.find(({ regex, method }) => {
return (
regex.test(ctx.request.url) &&
ctx.request.method.toLowerCase() === method.toLowerCase()
)
})
if (found != null) {
return next()
2021-04-11 22:35:55 +12:00
}
try {
// check the actual user is authenticated first
const authCookie = getCookie(ctx, Cookies.Auth)
let authenticated = false,
user = null,
internal = false
if (authCookie) {
try {
const db = database.getDB(StaticDatabases.GLOBAL.name)
user = await db.get(authCookie.userId)
delete user.password
authenticated = true
} catch (err) {
// remove the cookie as the use does not exist anymore
clearCookie(ctx, Cookies.Auth)
}
}
const apiKey = ctx.request.headers["x-budibase-api-key"]
// this is an internal request, no user made it
if (!authenticated && apiKey && apiKey === env.INTERNAL_API_KEY) {
authenticated = true
internal = true
}
// be explicit
if (authenticated !== true) {
authenticated = false
}
// isAuthenticated is a function, so use a variable to be able to check authed state
finalise(ctx, { authenticated, user, internal })
return next()
} catch (err) {
// allow configuring for public access
if (opts && opts.publicAllowed) {
finalise(ctx, { authenticated: false })
} else {
ctx.throw(err.status || 403, err)
}
}
2021-04-11 22:35:55 +12:00
}
}