deno.land / x / deno@v1.28.2 / cli / bench / testdata / npm / hono / dist / middleware / bearer-auth / index.js
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162"use strict";Object.defineProperty(exports, "__esModule", { value: true });exports.bearerAuth = void 0;const buffer_1 = require("../../utils/buffer");const TOKEN_STRINGS = '[A-Za-z0-9._~+/-]+=*';const PREFIX = 'Bearer';const bearerAuth = (options) => { if (!options.token) { throw new Error('bearer auth middleware requires options for "token"'); } if (!options.realm) { options.realm = ''; } if (!options.prefix) { options.prefix = PREFIX; } const realm = options.realm?.replace(/"/g, '\\"'); return async (c, next) => { const headerToken = c.req.headers.get('Authorization'); if (!headerToken) { // No Authorization header c.res = new Response('Unauthorized', { status: 401, headers: { 'WWW-Authenticate': `${options.prefix} realm="` + realm + '"', }, }); } else { const regexp = new RegExp('^' + options.prefix + ' +(' + TOKEN_STRINGS + ') *$'); const match = regexp.exec(headerToken); if (!match) { // Invalid Request c.res = new Response('Bad Request', { status: 400, headers: { 'WWW-Authenticate': `${options.prefix} error="invalid_request"`, }, }); } else { const equal = await (0, buffer_1.timingSafeEqual)(options.token, match[1], options.hashFunction); if (!equal) { // Invalid Token c.res = new Response('Unauthorized', { status: 401, headers: { 'WWW-Authenticate': `${options.prefix} error="invalid_token"`, }, }); } else { // Authorize OK await next(); return; } } } };};exports.bearerAuth = bearerAuth;
Version Info