File size: 1,468 Bytes
6a7bf05
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2703d15
 
 
 
 
6a7bf05
2703d15
 
 
 
6a7bf05
2703d15
 
 
 
 
6a7bf05
2703d15
 
 
 
 
 
6a7bf05
2703d15
 
6a7bf05
2703d15
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
import { IJwtLoginPayload } from "@common/interfaces/jwt-payload.interface";
import { JwtPayload, verify } from "jsonwebtoken";
import { HttpError } from "@lib/error-handling/http-error";
import { NextFunction, Request, Response } from "express";
import { config } from "@configs/config";

type OptionalIfUndefined<T> = [T] extends [undefined]
  ? (args?: T) => void
  : (args: T) => void;

export const genGuard =
  <T = undefined>(
    validationMethod?: (
      validationArgs: T,
      payload: IJwtLoginPayload,
      req: Request,
      res: Response
    ) => boolean | Promise<boolean>
  ): OptionalIfUndefined<T> =>
    (args: T) =>
      async (req: Request, res: Response, next: NextFunction) => {
        // get token from cookie
        const token = req.headers.authorization?.split(" ")[1];
        let payload: IJwtLoginPayload;

        // validate token
        if (!token) {
          return next(new HttpError(401, "Unauthorized"));
        }

        try {
          payload = verify(token, config.jwt.secret);
        } catch (err) {
          return next(new HttpError(401, "Unauthorized"));
        }

        if (
          validationMethod &&
          !(await validationMethod(args, payload, req, res))
        ) {
          return next(new HttpError(401, "Unauthorized"));
        }

        // inject payload in request
        (req as unknown as { jwtPayload: JwtPayload }).jwtPayload = payload;

        // go on
        next();
      };