2013-06-05 13:38:33 +02:00
|
|
|
var xtend = require('xtend');
|
|
|
|
|
|
|
|
function parseCookie(auth, cookieHeader) {
|
|
|
|
var cookieParser = auth.cookieParser(auth.secret);
|
|
|
|
var req = {
|
|
|
|
headers:{
|
|
|
|
cookie: cookieHeader
|
|
|
|
}
|
|
|
|
};
|
|
|
|
var result;
|
|
|
|
cookieParser(req, {}, function (err) {
|
|
|
|
if (err) throw err;
|
|
|
|
result = req.signedCookies;
|
|
|
|
});
|
|
|
|
return result;
|
|
|
|
}
|
2012-10-26 18:13:28 +02:00
|
|
|
|
|
|
|
function authorize(options) {
|
2013-02-05 23:15:04 +01:00
|
|
|
var defaults = {
|
2013-06-05 13:38:33 +02:00
|
|
|
passport: require('passport'),
|
|
|
|
key: 'connect.sid',
|
|
|
|
secret: null,
|
|
|
|
store: null,
|
|
|
|
success: null,
|
|
|
|
fail: null
|
2012-10-26 18:13:28 +02:00
|
|
|
};
|
2012-09-05 20:14:36 +02:00
|
|
|
|
2013-02-05 23:15:04 +01:00
|
|
|
var auth = xtend({}, defaults, options );
|
2013-06-30 21:06:21 +02:00
|
|
|
|
2012-10-26 18:13:28 +02:00
|
|
|
auth.userProperty = auth.passport._userProperty || 'user';
|
2012-09-05 20:14:36 +02:00
|
|
|
|
2013-06-05 13:38:33 +02:00
|
|
|
if (typeof auth.cookieParser === 'undefined' || !auth.cookieParser) {
|
|
|
|
throw new Error('cookieParser is required use connect.cookieParser or express.cookieParser');
|
|
|
|
}
|
|
|
|
|
2012-09-05 20:14:36 +02:00
|
|
|
return function(data, accept){
|
|
|
|
if (!data.headers.cookie) {
|
2012-11-16 09:58:33 +01:00
|
|
|
return accept(null, false);
|
2012-09-05 20:14:36 +02:00
|
|
|
}
|
|
|
|
|
2013-06-05 13:38:33 +02:00
|
|
|
data.cookie = parseCookie(auth, data.headers.cookie);
|
2012-09-05 20:14:36 +02:00
|
|
|
|
2013-02-05 23:15:04 +01:00
|
|
|
data.sessionID = data.cookie[ auth.key ];
|
2012-09-05 20:14:36 +02:00
|
|
|
|
2013-02-05 23:15:04 +01:00
|
|
|
auth.store.get(data.sessionID, function(err, session){
|
2012-09-05 20:14:36 +02:00
|
|
|
if (err) {
|
|
|
|
return accept('Error in session store.', false);
|
|
|
|
} else if (!session) {
|
2012-11-16 09:58:33 +01:00
|
|
|
return accept(null, false);
|
2012-09-05 20:14:36 +02:00
|
|
|
}
|
|
|
|
|
2012-10-26 18:13:28 +02:00
|
|
|
if( !session[ auth.passport._key ] ){
|
2012-09-05 20:14:36 +02:00
|
|
|
return accept('passport was not initialized', false);
|
|
|
|
}
|
|
|
|
|
2012-10-26 18:13:28 +02:00
|
|
|
var userKey = session[ auth.passport._key ][ auth.userProperty ];
|
2012-11-16 09:58:33 +01:00
|
|
|
|
2013-06-30 21:44:46 +02:00
|
|
|
if(userKey === undefined) {
|
2013-06-30 21:06:21 +02:00
|
|
|
if(auth.fail)
|
|
|
|
return auth.fail( data, accept );
|
|
|
|
else
|
|
|
|
return accept(null, false);
|
2012-09-05 20:14:36 +02:00
|
|
|
}
|
|
|
|
|
2012-10-26 18:13:28 +02:00
|
|
|
auth.passport.deserializeUser(userKey, function(err, user) {
|
|
|
|
data[ auth.userProperty ] = user;
|
2013-01-07 15:30:15 +01:00
|
|
|
if( auth.success ) {
|
|
|
|
return auth.success( data, accept );
|
|
|
|
}
|
|
|
|
accept(null, true);
|
2012-09-05 20:14:36 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
});
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
function filterSocketsByUser(socketIo, filter){
|
|
|
|
var handshaken = socketIo.sockets.manager.handshaken;
|
|
|
|
return Object.keys(handshaken || {})
|
|
|
|
.filter(function(skey){
|
|
|
|
return filter(handshaken[skey].user);
|
|
|
|
})
|
|
|
|
.map(function(skey){
|
|
|
|
return socketIo.sockets.manager.sockets.sockets[skey];
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
exports.authorize = authorize;
|
2012-10-26 18:13:28 +02:00
|
|
|
exports.filterSocketsByUser = filterSocketsByUser;
|