middlewares.js 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. const uniq = require('lodash/uniq')
  2. const cors = require('cors')
  3. const tokenService = require('./helpers/jwt')
  4. const logger = require('./logger')
  5. exports.hasSessionAndProvider = (req, res, next) => {
  6. if (!req.session || !req.body) {
  7. logger.debug('No session/body attached to req object. Exiting dispatcher.', null, req.id)
  8. return res.sendStatus(400)
  9. }
  10. if (!req.companion.provider) {
  11. logger.debug('No provider/provider-handler found. Exiting dispatcher.', null, req.id)
  12. return res.sendStatus(400)
  13. }
  14. return next()
  15. }
  16. exports.hasSearchQuery = (req, res, next) => {
  17. if (typeof req.query.q !== 'string') {
  18. logger.debug('search request has no search query', 'search.query.check', req.id)
  19. return res.sendStatus(400)
  20. }
  21. return next()
  22. }
  23. exports.verifyToken = (req, res, next) => {
  24. const token = req.companion.authToken
  25. if (token == null) {
  26. logger.info('cannot auth token', 'token.verify.unset', req.id)
  27. return res.sendStatus(401)
  28. }
  29. const { providerName } = req.params
  30. const { err, payload } = tokenService.verifyEncryptedToken(token, req.companion.options.secret)
  31. if (err || !payload[providerName]) {
  32. if (err) {
  33. logger.error(err, 'token.verify.error', req.id)
  34. }
  35. return res.sendStatus(401)
  36. }
  37. req.companion.providerTokens = payload
  38. req.companion.providerToken = payload[providerName]
  39. next()
  40. }
  41. // does not fail if token is invalid
  42. exports.gentleVerifyToken = (req, res, next) => {
  43. const { providerName } = req.params
  44. if (req.companion.authToken) {
  45. const { err, payload } = tokenService.verifyEncryptedToken(req.companion.authToken, req.companion.options.secret)
  46. if (!err && payload[providerName]) {
  47. req.companion.providerTokens = payload
  48. }
  49. }
  50. next()
  51. }
  52. exports.cookieAuthToken = (req, res, next) => {
  53. req.companion.authToken = req.cookies[`uppyAuthToken--${req.companion.provider.authProvider}`]
  54. return next()
  55. }
  56. exports.loadSearchProviderToken = (req, res, next) => {
  57. const { searchProviders } = req.companion.options.providerOptions
  58. const providerName = req.params.searchProviderName
  59. if (!searchProviders || !searchProviders[providerName] || !searchProviders[providerName].key) {
  60. logger.info(`unconfigured credentials for ${providerName}`, 'searchtoken.load.unset', req.id)
  61. return res.sendStatus(501)
  62. }
  63. req.companion.providerToken = searchProviders[providerName].key
  64. next()
  65. }
  66. exports.cors = (options = {}) => (req, res, next) => {
  67. const exposedHeaders = [
  68. // exposed so it can be accessed for our custom uppy client preflight
  69. 'Access-Control-Allow-Headers',
  70. ]
  71. if (options.sendSelfEndpoint) exposedHeaders.push('i-am')
  72. if (res.get('Access-Control-Expose-Headers')) exposedHeaders.push(res.get('Access-Control-Expose-Headers'))
  73. const allowedHeaders = [
  74. 'uppy-auth-token',
  75. 'uppy-versions',
  76. 'uppy-credentials-params',
  77. ]
  78. if (res.get('Access-Control-Allow-Headers')) allowedHeaders.push(res.get('Access-Control-Allow-Headers'))
  79. const existingAllowMethodsHeader = res.get('Access-Control-Allow-Methods')
  80. let methods = []
  81. if (existingAllowMethodsHeader) {
  82. methods = existingAllowMethodsHeader.replace(/\s/g, '').split(',').map((method) => method.toUpperCase())
  83. }
  84. methods = uniq([...methods, 'GET', 'POST', 'OPTIONS', 'DELETE'])
  85. // If endpoint urls are specified, then we only allow those endpoints.
  86. // Otherwise, we allow any client url to access companion.
  87. // Must be set to at least true (origin "*" with "credentials: true" will cause error in many browsers)
  88. // https://github.com/expressjs/cors/issues/119
  89. // allowedOrigins can also be any type supported by https://github.com/expressjs/cors#configuration-options
  90. const { corsOrigins: origin = true } = options
  91. // Because we need to merge with existing headers, we need to call cors inside our own middleware
  92. return cors({
  93. credentials: true,
  94. origin,
  95. methods,
  96. allowedHeaders: allowedHeaders.join(','),
  97. exposedHeaders: exposedHeaders.join(','),
  98. })(req, res, next)
  99. }