@kitstack/nest-powertools
Version:
A comprehensive collection of NestJS powertools, decorators, and utilities to supercharge your backend development
62 lines • 2.94 kB
JavaScript
;
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.ConfigurableAuthGuard = void 0;
const common_1 = require("@nestjs/common");
let ConfigurableAuthGuard = class ConfigurableAuthGuard {
constructor(reflector) {
this.reflector = reflector;
}
async canActivate(context) {
const authConfig = this.reflector.getAllAndOverride('authConfig', [context.getHandler(), context.getClass()]);
if (!authConfig) {
return true;
}
const request = context.switchToHttp().getRequest();
const user = request.user;
if (!user) {
throw new common_1.UnauthorizedException('Authentication required');
}
if (authConfig.customValidator) {
const isValid = await authConfig.customValidator(user, context);
if (!isValid) {
throw new common_1.ForbiddenException('Access denied by custom validator');
}
return true;
}
if (authConfig.guard) {
const canAccess = await authConfig.guard.canActivate(context, user, authConfig.permissions);
if (!canAccess) {
throw new common_1.ForbiddenException('Access denied by custom guard');
}
return true;
}
if (authConfig.roles?.length) {
const hasRole = authConfig.roles.some((role) => user.roles?.includes(role));
if (!hasRole) {
throw new common_1.ForbiddenException('Insufficient role permissions');
}
}
if (authConfig.permissions?.length) {
const hasPermission = authConfig.permissions.every((permission) => user.permissions?.includes(permission));
if (!hasPermission) {
throw new common_1.ForbiddenException('Insufficient permissions');
}
}
return true;
}
};
exports.ConfigurableAuthGuard = ConfigurableAuthGuard;
exports.ConfigurableAuthGuard = ConfigurableAuthGuard = __decorate([
(0, common_1.Injectable)(),
__metadata("design:paramtypes", [Function])
], ConfigurableAuthGuard);
//# sourceMappingURL=configurable-auth.guard.js.map