mirror of
https://github.com/standardnotes/server
synced 2026-01-16 20:04:32 -05:00
152 lines
5.5 KiB
TypeScript
152 lines
5.5 KiB
TypeScript
import { CrossServiceTokenData } from '@standardnotes/security'
|
|
import { TimerInterface } from '@standardnotes/time'
|
|
import { NextFunction, Request, Response } from 'express'
|
|
import { BaseMiddleware } from 'inversify-express-utils'
|
|
import { verify } from 'jsonwebtoken'
|
|
import { AxiosError } from 'axios'
|
|
import { Logger } from 'winston'
|
|
|
|
import { CrossServiceTokenCacheInterface } from '../Service/Cache/CrossServiceTokenCacheInterface'
|
|
import { ServiceProxyInterface } from '../Service/Proxy/ServiceProxyInterface'
|
|
|
|
export abstract class AuthMiddleware extends BaseMiddleware {
|
|
constructor(
|
|
private serviceProxy: ServiceProxyInterface,
|
|
private jwtSecret: string,
|
|
private crossServiceTokenCacheTTL: number,
|
|
private crossServiceTokenCache: CrossServiceTokenCacheInterface,
|
|
private timer: TimerInterface,
|
|
protected logger: Logger,
|
|
) {
|
|
super()
|
|
}
|
|
|
|
async handler(request: Request, response: Response, next: NextFunction): Promise<void> {
|
|
if (!this.handleMissingAuthHeader(request.headers.authorization, response, next)) {
|
|
return
|
|
}
|
|
|
|
const authHeaderValue = request.headers.authorization as string
|
|
const sharedVaultOwnerContextHeaderValue = request.headers['x-shared-vault-owner-context'] as string | undefined
|
|
const cacheKey = `${authHeaderValue}${
|
|
sharedVaultOwnerContextHeaderValue ? `:${sharedVaultOwnerContextHeaderValue}` : ''
|
|
}`
|
|
|
|
try {
|
|
let crossServiceTokenFetchedFromCache = true
|
|
let crossServiceToken = null
|
|
if (this.crossServiceTokenCacheTTL) {
|
|
crossServiceToken = await this.crossServiceTokenCache.get(cacheKey)
|
|
}
|
|
|
|
if (crossServiceToken === null) {
|
|
const authResponse = await this.serviceProxy.validateSession({
|
|
authorization: authHeaderValue,
|
|
sharedVaultOwnerContext: sharedVaultOwnerContextHeaderValue,
|
|
})
|
|
|
|
if (!this.handleSessionValidationResponse(authResponse, response, next)) {
|
|
return
|
|
}
|
|
|
|
this.logger.debug('[AuthMiddleware] Fetched cross-service token from underlying service')
|
|
|
|
crossServiceToken = (authResponse.data as { authToken: string }).authToken
|
|
crossServiceTokenFetchedFromCache = false
|
|
}
|
|
|
|
response.locals.authToken = crossServiceToken
|
|
|
|
const decodedToken = <CrossServiceTokenData>(
|
|
verify(response.locals.authToken, this.jwtSecret, { algorithms: ['HS256'] })
|
|
)
|
|
|
|
if (this.crossServiceTokenCacheTTL && !crossServiceTokenFetchedFromCache) {
|
|
await this.crossServiceTokenCache.set({
|
|
key: cacheKey,
|
|
encodedCrossServiceToken: response.locals.authToken,
|
|
expiresAtInSeconds: this.getCrossServiceTokenCacheExpireTimestamp(decodedToken),
|
|
userUuid: decodedToken.user.uuid,
|
|
})
|
|
}
|
|
|
|
response.locals.user = decodedToken.user
|
|
response.locals.session = decodedToken.session
|
|
response.locals.roles = decodedToken.roles
|
|
response.locals.sharedVaultOwnerContext = decodedToken.shared_vault_owner_context
|
|
response.locals.readOnlyAccess = decodedToken.session?.readonly_access ?? false
|
|
if (response.locals.readOnlyAccess) {
|
|
this.logger.info('User operates on read-only access', {
|
|
codeTag: 'AuthMiddleware',
|
|
userId: response.locals.user.uuid,
|
|
})
|
|
}
|
|
response.locals.belongsToSharedVaults = decodedToken.belongs_to_shared_vaults ?? []
|
|
} catch (error) {
|
|
let detailedErrorMessage = (error as Error).message
|
|
if (error instanceof AxiosError) {
|
|
detailedErrorMessage = `Status: ${error.status}, code: ${error.code}, message: ${error.message}`
|
|
}
|
|
|
|
this.logger.error(
|
|
`Could not pass the request to sessions/validate on underlying service: ${detailedErrorMessage}`,
|
|
)
|
|
|
|
this.logger.debug(`Response error: ${JSON.stringify(error)}`)
|
|
|
|
if ((error as AxiosError).response?.headers['content-type']) {
|
|
response.setHeader('content-type', (error as AxiosError).response?.headers['content-type'] as string)
|
|
}
|
|
|
|
const errorCode =
|
|
(error as AxiosError).isAxiosError && !isNaN(+((error as AxiosError).code as string))
|
|
? +((error as AxiosError).code as string)
|
|
: 500
|
|
|
|
const responseErrorMessage = (error as AxiosError).response?.data
|
|
|
|
response
|
|
.status(errorCode)
|
|
.send(
|
|
responseErrorMessage ??
|
|
"Unfortunately, we couldn't handle your request. Please try again or contact our support if the error persists.",
|
|
)
|
|
|
|
return
|
|
}
|
|
|
|
return next()
|
|
}
|
|
|
|
protected abstract handleSessionValidationResponse(
|
|
authResponse: {
|
|
status: number
|
|
data: unknown
|
|
headers: {
|
|
contentType: string
|
|
}
|
|
},
|
|
response: Response,
|
|
next: NextFunction,
|
|
): boolean
|
|
|
|
protected abstract handleMissingAuthHeader(
|
|
authHeaderValue: string | undefined,
|
|
response: Response,
|
|
next: NextFunction,
|
|
): boolean
|
|
|
|
private getCrossServiceTokenCacheExpireTimestamp(token: CrossServiceTokenData): number {
|
|
const crossServiceTokenDefaultCacheExpiration = this.timer.getTimestampInSeconds() + this.crossServiceTokenCacheTTL
|
|
|
|
if (token.session === undefined) {
|
|
return crossServiceTokenDefaultCacheExpiration
|
|
}
|
|
|
|
const sessionAccessExpiration = this.timer.convertStringDateToSeconds(token.session.access_expiration)
|
|
const sessionRefreshExpiration = this.timer.convertStringDateToSeconds(token.session.refresh_expiration)
|
|
|
|
return Math.min(crossServiceTokenDefaultCacheExpiration, sessionAccessExpiration, sessionRefreshExpiration)
|
|
}
|
|
}
|