request-context.service.ts 3.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. import { Injectable } from '@nestjs/common';
  2. import { Request } from 'express';
  3. import { LanguageCode, Permission } from 'shared/generated-types';
  4. import { idsAreEqual } from '../../common/utils';
  5. import { ConfigService } from '../../config/config.service';
  6. import { Channel } from '../../entity/channel/channel.entity';
  7. import { AuthenticatedSession } from '../../entity/session/authenticated-session.entity';
  8. import { Session } from '../../entity/session/session.entity';
  9. import { User } from '../../entity/user/user.entity';
  10. import { ChannelService } from '../../service/providers/channel.service';
  11. import { RequestContext } from './request-context';
  12. export const REQUEST_CONTEXT_KEY = 'vendureRequestContext';
  13. /**
  14. * Creates new RequestContext instances.
  15. */
  16. @Injectable()
  17. export class RequestContextService {
  18. constructor(private channelService: ChannelService, private configService: ConfigService) {}
  19. /**
  20. * Creates a new RequestContext based on an Express request object.
  21. */
  22. async fromRequest(
  23. req: Request,
  24. requiredPermissions?: Permission[],
  25. session?: Session,
  26. ): Promise<RequestContext> {
  27. const channelToken = this.getChannelToken(req);
  28. const channel = (channelToken && this.channelService.getChannelFromToken(channelToken)) || undefined;
  29. const hasOwnerPermission = !!requiredPermissions && requiredPermissions.includes(Permission.Owner);
  30. const languageCode = this.getLanguageCode(req);
  31. const user = session && (session as AuthenticatedSession).user;
  32. const isAuthorized = this.userHasRequiredPermissionsOnChannel(requiredPermissions, channel, user);
  33. const authorizedAsOwnerOnly = !isAuthorized && hasOwnerPermission;
  34. return new RequestContext({
  35. channel,
  36. languageCode,
  37. session,
  38. isAuthorized,
  39. authorizedAsOwnerOnly,
  40. });
  41. }
  42. private getChannelToken(req: Request): string | undefined {
  43. const tokenKey = this.configService.channelTokenKey;
  44. let channelToken: string | undefined;
  45. if (req && req.query && req.query[tokenKey]) {
  46. channelToken = req.query[tokenKey];
  47. } else if (req && req.headers && req.headers[tokenKey]) {
  48. channelToken = req.headers[tokenKey] as string;
  49. }
  50. return channelToken;
  51. }
  52. private getLanguageCode(req: Request): LanguageCode | undefined {
  53. return req.body && req.body.variables && req.body.variables.languageCode;
  54. }
  55. private isAuthenticatedSession(session?: Session): session is AuthenticatedSession {
  56. return !!session && !!(session as AuthenticatedSession).user;
  57. }
  58. private userHasRequiredPermissionsOnChannel(
  59. permissions: Permission[] = [],
  60. channel?: Channel,
  61. user?: User,
  62. ): boolean {
  63. if (!user || !channel) {
  64. return false;
  65. }
  66. const permissionsOnChannel = user.roles
  67. .filter(role => role.channels.find(c => idsAreEqual(c.id, channel.id)))
  68. .reduce((output, role) => [...output, ...role.permissions], [] as Permission[]);
  69. return this.arraysIntersect(permissions, permissionsOnChannel);
  70. }
  71. /**
  72. * Returns true if any element of arr1 appears in arr2.
  73. */
  74. private arraysIntersect<T>(arr1: T[], arr2: T[]): boolean {
  75. return arr1.reduce((intersects, role) => {
  76. return intersects || arr2.includes(role);
  77. }, false);
  78. }
  79. }