trashposs/src/server/api/call.ts

79 lines
1.6 KiB
TypeScript
Raw Normal View History

2018-07-15 20:25:35 +02:00
import * as path from 'path';
import * as glob from 'glob';
import Endpoint from './endpoint';
import limitter from './limitter';
import { IUser } from '../../models/user';
import { IApp } from '../../models/app';
2018-07-15 20:25:35 +02:00
const files = glob.sync('**/*.js', {
cwd: path.resolve(__dirname + '/endpoints/')
});
const endpoints: Array<{
exec: any,
meta: Endpoint
}> = files.map(f => {
const ep = require('./endpoints/' + f);
ep.meta = ep.meta || {};
ep.meta.name = f.replace('.js', '');
return {
exec: ep.default,
meta: ep.meta
};
});
2018-04-13 04:44:39 +02:00
export default (endpoint: string | Endpoint, user: IUser, app: IApp, data: any, file?: any) => new Promise<any>(async (ok, rej) => {
const isSecure = user != null && app == null;
2018-07-13 16:17:02 +02:00
const epName = typeof endpoint === 'string' ? endpoint : endpoint.name;
2018-07-15 20:25:35 +02:00
const ep = endpoints.find(e => e.meta.name === epName);
2018-07-15 20:25:35 +02:00
if (ep.meta.secure && !isSecure) {
return rej('ACCESS_DENIED');
}
2018-07-15 20:25:35 +02:00
if (ep.meta.requireCredential && user == null) {
return rej('SIGNIN_REQUIRED');
}
2018-07-15 20:25:35 +02:00
if (ep.meta.requireCredential && user.isSuspended) {
return rej('YOUR_ACCOUNT_HAS_BEEN_SUSPENDED');
}
2018-07-15 20:25:35 +02:00
if (app && ep.meta.kind) {
if (!app.permission.some(p => p === ep.meta.kind)) {
return rej('PERMISSION_DENIED');
}
}
2018-07-15 20:25:35 +02:00
if (ep.meta.requireCredential && ep.meta.limit) {
try {
2018-07-15 20:25:35 +02:00
await limitter(ep.meta, user); // Rate limit
} catch (e) {
// drop request if limit exceeded
return rej('RATE_LIMIT_EXCEEDED');
}
}
2018-07-15 20:25:35 +02:00
let exec = ep.exec;
2018-07-15 20:25:35 +02:00
if (ep.meta.withFile && file) {
2018-04-13 04:44:39 +02:00
exec = exec.bind(null, file);
}
let res;
// API invoking
try {
res = await exec(data, user, app);
} catch (e) {
rej(e);
return;
}
ok(res);
});