You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
const { SystemSettings } = require("../../models/systemSettings");const { User } = require("../../models/user");const { EncryptionManager } = require("../EncryptionManager");const { decodeJWT } = require("../http");const EncryptionMgr = new EncryptionManager();
async function validatedRequest(request, response, next) { const multiUserMode = await SystemSettings.isMultiUserMode(); response.locals.multiUserMode = multiUserMode; if (multiUserMode) return await validateMultiUserRequest(request, response, next);
// When in development passthrough auth token for ease of development.
// Or if the user simply did not set an Auth token or JWT Secret
if ( process.env.NODE_ENV === "development" || !process.env.AUTH_TOKEN || !process.env.JWT_SECRET ) { next(); return; }
if (!process.env.AUTH_TOKEN) { response.status(401).json({ error: "You need to set an AUTH_TOKEN environment variable.", }); return; }
const auth = request.header("Authorization"); const token = auth ? auth.split(" ")[1] : null;
if (!token) { response.status(401).json({ error: "No auth token found.", }); return; }
const bcrypt = require("bcrypt"); const { p } = decodeJWT(token);
if (p === null || !/\w{32}:\w{32}/.test(p)) { response.status(401).json({ error: "Token expired or failed validation.", }); return; }
// Since the blame of this comment we have been encrypting the `p` property of JWTs with the persistent
// encryptionManager PEM's. This prevents us from storing the `p` unencrypted in the JWT itself, which could
// be unsafe. As a consequence, existing JWTs with invalid `p` values that do not match the regex
// in ln:44 will be marked invalid so they can be logged out and forced to log back in and obtain an encrypted token.
// This kind of methodology only applies to single-user password mode.
if ( !bcrypt.compareSync( EncryptionMgr.decrypt(p), bcrypt.hashSync(process.env.AUTH_TOKEN, 10) ) ) { response.status(401).json({ error: "Invalid auth credentials.", }); return; }
next();}
async function validateMultiUserRequest(request, response, next) { const auth = request.header("Authorization"); const token = auth ? auth.split(" ")[1] : null;
if (!token) { response.status(401).json({ error: "No auth token found.", }); return; }
const valid = decodeJWT(token); if (!valid || !valid.id) { response.status(401).json({ error: "Invalid auth token.", }); return; }
const user = await User.get({ id: valid.id }); if (!user) { response.status(401).json({ error: "Invalid auth for user.", }); return; }
if (user.suspended) { response.status(401).json({ error: "User is suspended from system", }); return; }
response.locals.user = user; next();}
module.exports = { validatedRequest,};
|