1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-12-23 15:49:44 -05:00
denoland-deno/cli/bench/testdata/npm/hono/dist/middleware/bearer-auth/index.js
2022-08-19 15:54:54 +05:30

61 lines
2.1 KiB
JavaScript

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.bearerAuth = void 0;
const buffer_1 = require("../../utils/buffer");
const TOKEN_STRINGS = '[A-Za-z0-9._~+/-]+=*';
const PREFIX = 'Bearer';
const bearerAuth = (options) => {
if (!options.token) {
throw new Error('bearer auth middleware requires options for "token"');
}
if (!options.realm) {
options.realm = '';
}
if (!options.prefix) {
options.prefix = PREFIX;
}
const realm = options.realm?.replace(/"/g, '\\"');
return async (c, next) => {
const headerToken = c.req.headers.get('Authorization');
if (!headerToken) {
// No Authorization header
c.res = new Response('Unauthorized', {
status: 401,
headers: {
'WWW-Authenticate': `${options.prefix} realm="` + realm + '"',
},
});
}
else {
const regexp = new RegExp('^' + options.prefix + ' +(' + TOKEN_STRINGS + ') *$');
const match = regexp.exec(headerToken);
if (!match) {
// Invalid Request
c.res = new Response('Bad Request', {
status: 400,
headers: {
'WWW-Authenticate': `${options.prefix} error="invalid_request"`,
},
});
}
else {
const equal = await (0, buffer_1.timingSafeEqual)(options.token, match[1], options.hashFunction);
if (!equal) {
// Invalid Token
c.res = new Response('Unauthorized', {
status: 401,
headers: {
'WWW-Authenticate': `${options.prefix} error="invalid_token"`,
},
});
}
else {
// Authorize OK
await next();
return;
}
}
}
};
};
exports.bearerAuth = bearerAuth;