forked from hippoz/brainlet
110 lines
No EOL
4.2 KiB
JavaScript
110 lines
No EOL
4.2 KiB
JavaScript
const User = require('../../../models/User');
|
|
const secret = require('../../../secret');
|
|
const config = require('../../../config');
|
|
const Category = require('../../../models/Category');
|
|
|
|
const jwt = require('jsonwebtoken');
|
|
const siolib = require('socket.io');
|
|
const uuid = require('uuid');
|
|
|
|
class GatewayServer {
|
|
constructor(httpServer) {
|
|
this._io = siolib(httpServer);
|
|
this._gateway = this._io.of('/gateway');
|
|
this.eventSetup();
|
|
}
|
|
}
|
|
|
|
GatewayServer.prototype.authDisconnect = function(socket, callback) {
|
|
console.log('[E] [gateway] [handshake] User disconnected due to failed authentication');
|
|
socket.isConnected = false;
|
|
socket.disconnect();
|
|
socket.disconnect(true);
|
|
callback(new Error('ERR_GATEWAY_AUTH_FAIL'));
|
|
};
|
|
|
|
GatewayServer.prototype.eventSetup = function() {
|
|
this._gateway.use((socket, callback) => {
|
|
console.log('[*] [gateway] [handshake] User authentication attempt');
|
|
socket.isConnected = false;
|
|
|
|
setTimeout(() => {
|
|
if (socket.isConnected) return;
|
|
console.log('[*] [gateway] [handshake] User still not connected after timeout, removing...');
|
|
socket.disconnect();
|
|
socket.disconnect(true);
|
|
}, config.gatewayStillNotConnectedTimeoutMS);
|
|
|
|
// TODO: Maybe passing the token in the query is not the best idea?
|
|
const token = socket.handshake.query.token;
|
|
|
|
if (!token) return this.authDisconnect(socket, callback);
|
|
|
|
jwt.verify(token, secret.jwtPrivateKey, {}, async (err, data) => {
|
|
if (err) return this.authDisconnect(socket, callback);
|
|
if (!data) return this.authDisconnect(socket, callback);
|
|
if (!data.username) return this.authDisconnect(socket, callback);
|
|
|
|
const user = await User.findByUsername(data.username);
|
|
|
|
if (!user) return this.authDisconnect(socket, callback);
|
|
|
|
let permissionLevel = config.roleMap[user.role];
|
|
if (!permissionLevel) {
|
|
permissionLevel = 0;
|
|
}
|
|
|
|
if (permissionLevel < config.roleMap.USER) return this.authDisconnect(socket, callback);
|
|
|
|
socket.username = data.username;
|
|
socket.userId = user._id;
|
|
console.log(`[*] [gateway] [handshake] User ${data.username} has successfully authenticated`);
|
|
return callback();
|
|
});
|
|
});
|
|
|
|
this._gateway.on('connection', (socket) => {
|
|
console.log(`[*] [gateway] [handshake] User ${socket.username} connected, sending hello and waiting for yoo...`);
|
|
socket.emit('hello');
|
|
socket.once('yoo', () => {
|
|
console.log(`[*] [gateway] [handshake] Got yoo from ${socket.username}, connection is finally completed!`);
|
|
socket.isConnected = true;
|
|
|
|
socket.on('message', ({ category, content }) => {
|
|
// TODO: When/if category permissions are added, check if the user has permissions for that category
|
|
const categoryTitle = socket.joinedCategories[category._id];
|
|
if (!categoryTitle) return;
|
|
|
|
const messageObject = {
|
|
author: {
|
|
username: socket.username,
|
|
_id: socket.userId
|
|
},
|
|
category: {
|
|
title: categoryTitle,
|
|
_id: category._id
|
|
},
|
|
content: content,
|
|
_id: uuid.v4()
|
|
};
|
|
|
|
socket.to(category._id).emit('message', messageObject);
|
|
socket.emit('message', messageObject);
|
|
});
|
|
|
|
socket.on('subscribe', async (categories) => {
|
|
for (let v of categories) {
|
|
// TODO: When/if category permissions are added, check if the user has permissions for that category
|
|
const category = await Category.findById(v);
|
|
if (category && category.title && category._id) {
|
|
if (!socket.joinedCategories) socket.joinedCategories = {};
|
|
socket.joinedCategories[v] = category.title;
|
|
socket.join(v);
|
|
}
|
|
}
|
|
});
|
|
});
|
|
});
|
|
};
|
|
|
|
module.exports = GatewayServer; |