All files / pages/api refresh-msca.ts

0% Statements 0/18
0% Branches 0/5
0% Functions 0/1
0% Lines 0/18

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58                                                                                                                   
/*
 * Touch MSCA session is an endpoint exposed for the client to refresh ECAS session timers on action or page load
 *
 */
 
import { AuthIsDisabled, ValidateSession } from '../../lib/auth'
import { getLogger } from '../../logging/log-util'
import { NextApiRequest, NextApiResponse } from 'next'
import {
  deleteAllCookiesWithPrefix,
  extendExpiryTime,
} from '../../lib/cookie-utils'
// Including crypto module
import crypto from 'crypto'
 
//The below sets the minimum logging level to error and surpresses everything below that
const logger = getLogger('refresh-msca')
logger.level = 'error'
 
export default async function handler(
  req: NextApiRequest,
  res: NextApiResponse,
) {
  //Generate a random id for each request to ensure unique responses/no caching
  const id = crypto.randomBytes(20).toString('hex')
 
  Iif (req.method === 'GET') {
    //Send request to ECAS to refresh MSCA session
    if (AuthIsDisabled()) {
      //Service unavailable when auth is disabled
      res.status(503).json({ success: false })
    } else {
      //If auth session is valid, make GET request to validateSession endpoint
      const sessionValid = await ValidateSession(
        req.cookies,
        process.env.CLIENT_ID as string,
      )
      if (sessionValid) {
        extendExpiryTime(
          req,
          res,
          process.env.AUTH_COOKIE_PREFIX + 'sessionId',
          Number(process.env.SESSION_MAX_AGE as string),
        )
        res.status(200).json({ success: true, id: id })
      } else {
        deleteAllCookiesWithPrefix(
          req,
          res,
          process.env.AUTH_COOKIE_PREFIX as string,
        )
        res.status(401).json({ success: false, id: id })
        logger.error('Authentication is not valid')
      }
    }
  }
}