Press n or j to go to the next uncovered block, b, p or k for the previous block.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 | /* * Touch MSCA session is an endpoint exposed for the client to refresh ECAS session timers on action or page load * */ import { NextApiRequest, NextApiResponse } from 'next' import { AuthIsDisabled, AuthIsValid, ValidateSession, getIdToken, } from '../../lib/auth' import { getLogger } from '../../logging/log-util' import { authOptions } from './auth/[...nextauth]' import { getServerSession } from 'next-auth/next' import * as crypto from 'crypto' //The below sets the minimum logging level to error and surpresses everything below that const logger = getLogger('refresh-msca') logger.level = 'error' export default async function handler( req: NextApiRequest, res: NextApiResponse, ) { const session = await getServerSession(req, res, authOptions) const token = await getIdToken(req) //Generate a random id for each request to ensure unique responses/no caching const id = crypto.randomBytes(20).toString('hex') if (req.method === 'GET') { //Send request to ECAS to refresh MSCA session if (AuthIsDisabled()) { //Service unavailable when auth is disabled res.status(503).json({ success: false }) } else if (await AuthIsValid(req, session)) { //If auth session is valid, make GET request to validateSession endpoint const sessionValid = token && (await ValidateSession(process.env.CLIENT_ID, token.sid)) if (sessionValid) { res.status(200).json({ success: sessionValid, id: id }) } else { res.status(401).json({ success: sessionValid, id: id }) } } else { res.status(401).json({ success: false }) logger.error('Authentication is not valid') } } else { //return unimplemented res.status(501).json({ success: false }) logger.error( 'Something went wrong when trying reach the MSCA refresh endpoint', ) } } |