AutoMod/api/src/utils.ts
Declan Chidlow 2c851516b2 I forget
2024-07-14 18:42:59 +08:00

124 lines
4.6 KiB
TypeScript

import { Request, Response } from "express";
import { Collection, Db } from "mongodb";
import { botReq } from "./routes/internal/ws";
let sessionsCollection: Collection;
export function initializeSessionAuthentication(db: Db) {
sessionsCollection = db.collection('sessions');
}
class Session {
user: string;
token: string;
nonce: string;
expires: number;
invalid: boolean;
}
/**
*
* @param req
* @returns false if not authenticated, otherwise the (Revolt) user ID
*/
async function isAuthenticated(req: Request, res?: Response, send401?: boolean): Promise<string|false> {
const user = req.header('x-auth-user');
const token = req.header('x-auth-token');
if (!user || !token) return false;
const info = await getSessionInfo(user, token);
if (res && send401 && !info.valid) {
res.status(401).send({ error: 'Unauthorized' });
}
return info.valid ? user : false;
}
type SessionInfo = { exists: boolean, valid: boolean, nonce?: string }
async function getSessionInfo(user: string, token: string): Promise<SessionInfo> {
const session = await sessionsCollection.findOne<Session>({ user, token });
return {
exists: !!session,
valid: !!(session && !session.invalid && session.expires > Date.now()),
nonce: session?.nonce
}
}
function badRequest(res: Response, infoText?: string) {
res.status(400).send(JSON.stringify({ "error": "Invalid request body", "info": infoText || undefined }, null, 4));
}
function unauthorized(res: Response, infoText?: string) {
res.status(401).send(JSON.stringify({ "error": "Unauthorized", "info": infoText || undefined }, null, 4));
}
async function getPermissionLevel(user: string, server: string) {
return await botReq('getPermissionLevel', { user, server });
}
type RequireAuthConfig = { permission?: 0|1|2|3, requireLogin?: boolean, noAuthOnly?: boolean }
function requireAuth(config: RequireAuthConfig): (req: Request, res: Response, next: () => void) => void {
return async (req: Request, res: Response, next: () => void) => {
const auth = await isAuthenticated(req);
if (config.noAuthOnly && typeof auth == 'string') return res.status(403).send({ error: 'Cannot access this route with authentication' });
if (config.requireLogin && !auth) return unauthorized(res, 'Authentication required for this route');
if (config.permission != undefined) {
if (!auth) return unauthorized(res, 'Authentication required for this route');
const server_id = req.params['serverid'] || req.params['server'];
const levelRes = await getPermissionLevel(auth, server_id);
if (!levelRes.success) return res.status(500).send({ error: 'Unknown server or other error' });
if (levelRes['level'] < config.permission) return unauthorized(res, 'Your permission level is too low');
}
next();
}
}
/**
* Strips the input object of unwanted fields and
* throws if a value has the wrong type
* @param obj
* @param structure
*/
function ensureObjectStructure(obj: any, structure: { [key: string]: 'string'|'number'|'float'|'strarray' }, allowEmpty?: boolean): any {
const returnObj: any = {}
for (const key of Object.keys(obj)) {
const type = obj[key] == null ? 'null' : typeof obj[key];
if (allowEmpty && (type == 'undefined' || type == 'null')) continue;
switch(structure[key]) {
case 'string':
case 'number':
case 'float':
if (type != structure[key]) throw `Property '${key}' was expected to be of type '${structure[key]}', got '${type}' instead`;
if (structure[key] == 'number' && `${Math.round(obj[key])}` != `${obj[key]}`)
throw `Property '${key}' was expected to be of type '${structure[key]}', got 'float' instead`;
returnObj[key] = obj[key];
break;
case 'strarray':
if (!(obj[key] instanceof Array)) {
throw `Property '${key}' was expected to be of type 'string[]', got '${type}' instead`;
}
for (const i in obj[key]) {
const item = obj[key][i];
if (typeof item != 'string') throw `Property '${key}' was expected to be of type 'string[]', `
+ `found '${typeof item}' at index ${i}`;
}
returnObj[key] = obj[key];
break;
default: continue;
}
}
return returnObj;
}
export { isAuthenticated, getSessionInfo, badRequest, unauthorized, getPermissionLevel, requireAuth, ensureObjectStructure }