Meteor-back/middleware/grabauth.js

64 lines
2.4 KiB
JavaScript

const jwt = require('jsonwebtoken')
require('dotenv').config()
const JWT_SECRET = process.env.JWT_SECRET
const atob = require("atob");
const model = require("./../model/user.js")
const grabAuth = (req,res,next) => {
if (!req.cookies && req.headers['authorization']) {
return next()
}
const token = req.cookies.jwt??req.cookies['.ROBLOSECURITY']??req.headers['authorization']
if (!token) {
return next()
}
jwt.verify(token,JWT_SECRET, (err,decodedtoken) => {
if (err){
next()
}else{
var tokendata = decodedtoken
var name = tokendata.username
try {
model.findOne({username: new RegExp('^'+name+'$', "i")}, function(err, doc) {
req.numberofcoins = doc.coins
req.admin = doc.admin
req.tokenData = tokendata
req.userdocument = doc
moderationstatus = JSON.parse(doc.moderation)
if (moderationstatus.status !== "ok") {
// if they are moderated then we invalidate the cookie and proceed
//res.cookie('jwt', "", {SameSite: "Strict",maxAge: 1 })
//return res.send("You have been moderated for "+moderationstatus.Reason+" expires at"+moderationstatus.ExpiresIn+" Moderated by "+moderationstatus.BannedBy )
var date = Date.parse(moderationstatus.ExpiresIn)
var datetime = new Date();
var datetime2 = Date.parse(datetime)
if (date <= datetime2){
// they have served there time
model.updateOne({userid: doc.userid}, {
$set: {
moderation: JSON.stringify({"status":"ok","Reason":"none","ExpiresIn":"none", "BannedBy": "none"})
}
},
function(err, doc) {
//console.log(err)
})
}
return res.json({status: "error", error:"Moderated", moderationstatus})
}
next()
})/*.lean() rip*/}
catch (error) {
console.error(error);
}
}
})
}
module.exports = {grabAuth}