@jeaks03/overseer
Version:
Just another TypeScript Back-End framework
50 lines • 3.9 kB
JavaScript
;
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
const standard_responses_1 = require("../misc/standard-responses");
const logger_1 = __importDefault(require("@jeaks03/logger"));
const requisites_1 = require("../core/requisites");
const requisite_1 = require("../decorators/requisite");
const authentication_1 = require("./authentications/authentication");
const no_authentication_1 = require("./authentications/no-authentication");
const utils_1 = require("../misc/utils");
const http_error_1 = require("../errors/http-error");
const lifecycle_1 = require("../decorators/lifecycle");
let Authorizer = class Authorizer {
onStart() {
this.auth = requisites_1.Requisites.find(authentication_1.Authentication) || new no_authentication_1.NoAuthentication();
logger_1.default.info(this, 'Proceeding with {} security', this.auth.constructor.name);
}
authorizeRoute(route, info) {
const principalPromise = this.auth.authenticate(info);
const principal = utils_1.Utils.clearPromise(principalPromise);
info.user = principal;
for (const guard of route.details.guards) {
if (!(new guard()).canAccess(principal, info)) {
throw new http_error_1.HttpError(standard_responses_1.UNAUTHORIZED);
}
}
}
};
__decorate([
lifecycle_1.AfterInit(),
__metadata("design:type", Function),
__metadata("design:paramtypes", []),
__metadata("design:returntype", void 0)
], Authorizer.prototype, "onStart", null);
Authorizer = __decorate([
requisite_1.Requisite
], Authorizer);
exports.Authorizer = Authorizer;
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXV0aG9yaXplci5jb21wb25lbnQuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvc2VjdXJpdHkvYXV0aG9yaXplci5jb21wb25lbnQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7QUFBQSxtRUFBMEQ7QUFDMUQsNkRBQXFDO0FBQ3JDLG1EQUFnRDtBQUNoRCx1REFBb0Q7QUFDcEQscUVBQWtFO0FBQ2xFLDJFQUF1RTtBQUd2RSx5Q0FBc0M7QUFDdEMscURBQWlEO0FBQ2pELHVEQUFvRDtBQUdwRCxJQUFhLFVBQVUsR0FBdkIsTUFBYSxVQUFVO0lBSW5CLE9BQU87UUFDSCxJQUFJLENBQUMsSUFBSSxHQUFHLHVCQUFVLENBQUMsSUFBSSxDQUFDLCtCQUFjLENBQUMsSUFBSSxJQUFJLG9DQUFnQixFQUFFLENBQUM7UUFDdEUsZ0JBQU0sQ0FBQyxJQUFJLENBQUMsSUFBSSxFQUFFLDZCQUE2QixFQUFFLElBQUksQ0FBQyxJQUFJLENBQUMsV0FBVyxDQUFDLElBQUksQ0FBQyxDQUFBO0lBQ2hGLENBQUM7SUFFRCxjQUFjLENBQUMsS0FBWSxFQUFFLElBQWM7UUFDdkMsTUFBTSxnQkFBZ0IsR0FBRyxJQUFJLENBQUMsSUFBSSxDQUFDLFlBQVksQ0FBQyxJQUFJLENBQUMsQ0FBQztRQUN0RCxNQUFNLFNBQVMsR0FBRyxhQUFLLENBQUMsWUFBWSxDQUFDLGdCQUFnQixDQUFDLENBQUM7UUFFdkQsSUFBSSxDQUFDLElBQUksR0FBRyxTQUFTLENBQUM7UUFFdEIsS0FBSyxNQUFNLEtBQUssSUFBSSxLQUFLLENBQUMsT0FBTyxDQUFDLE1BQU0sRUFBRTtZQUN0QyxJQUFHLENBQUMsQ0FBQyxJQUFJLEtBQUssRUFBRSxDQUFDLENBQUMsU0FBUyxDQUFDLFNBQVMsRUFBRSxJQUFJLENBQUMsRUFBRTtnQkFDMUMsTUFBTSxJQUFJLHNCQUFTLENBQUMsaUNBQVksQ0FBQyxDQUFDO2FBQ3JDO1NBQ0o7SUFDTCxDQUFDO0NBRUosQ0FBQTtBQWxCRztJQURDLHFCQUFTLEVBQUU7Ozs7eUNBSVg7QUFQUSxVQUFVO0lBRHRCLHFCQUFTO0dBQ0csVUFBVSxDQXNCdEI7QUF0QlksZ0NBQVUifQ==