2018-04-11 17:40:01 +09:00
|
|
|
import endpoints, { Endpoint } from './endpoints';
|
|
|
|
import limitter from './limitter';
|
|
|
|
import { IUser } from '../../models/user';
|
|
|
|
import { IApp } from '../../models/app';
|
|
|
|
|
2018-04-13 11:44:39 +09:00
|
|
|
export default (endpoint: string | Endpoint, user: IUser, app: IApp, data: any, file?: any) => new Promise<any>(async (ok, rej) => {
|
2018-04-11 17:40:01 +09:00
|
|
|
const isSecure = user != null && app == null;
|
|
|
|
|
2018-07-13 23:17:02 +09:00
|
|
|
const epName = typeof endpoint === 'string' ? endpoint : endpoint.name;
|
|
|
|
const ep = endpoints.find(e => e.name === epName);
|
2018-04-11 17:40:01 +09:00
|
|
|
|
|
|
|
if (ep.secure && !isSecure) {
|
|
|
|
return rej('ACCESS_DENIED');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ep.withCredential && user == null) {
|
|
|
|
return rej('SIGNIN_REQUIRED');
|
|
|
|
}
|
|
|
|
|
2018-07-13 23:44:45 +09:00
|
|
|
if (ep.withCredential && user.isSuspended) {
|
|
|
|
return rej('YOUR_ACCOUNT_HAS_BEEN_SUSPENDED');
|
|
|
|
}
|
|
|
|
|
2018-04-11 17:40:01 +09:00
|
|
|
if (app && ep.kind) {
|
|
|
|
if (!app.permission.some(p => p === ep.kind)) {
|
|
|
|
return rej('PERMISSION_DENIED');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ep.withCredential && ep.limit) {
|
|
|
|
try {
|
|
|
|
await limitter(ep, user); // Rate limit
|
|
|
|
} catch (e) {
|
|
|
|
// drop request if limit exceeded
|
|
|
|
return rej('RATE_LIMIT_EXCEEDED');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-06 23:52:47 +09:00
|
|
|
let exec = require(`${__dirname}/endpoints/${ep.name}`).default;
|
2018-04-11 17:40:01 +09:00
|
|
|
|
2018-04-13 11:44:39 +09:00
|
|
|
if (ep.withFile && file) {
|
|
|
|
exec = exec.bind(null, file);
|
2018-04-11 17:40:01 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
let res;
|
|
|
|
|
|
|
|
// API invoking
|
|
|
|
try {
|
|
|
|
res = await exec(data, user, app);
|
|
|
|
} catch (e) {
|
|
|
|
rej(e);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ok(res);
|
|
|
|
});
|