2024-04-20 19:38:05 -04:00
|
|
|
import { parseApi } from "../../src/lib/parseApi";
|
|
|
|
import { getRateLimiter } from "../../src/services/rate-limiter";
|
2024-04-21 13:36:48 -04:00
|
|
|
import { AuthResponse, RateLimiterMode } from "../../src/types";
|
2024-04-20 19:38:05 -04:00
|
|
|
import { supabase_service } from "../../src/services/supabase";
|
2024-04-21 13:36:48 -04:00
|
|
|
import { withAuth } from "../../src/lib/withAuth";
|
2024-04-20 19:38:05 -04:00
|
|
|
|
2024-04-21 12:31:22 -04:00
|
|
|
|
2024-04-21 13:36:48 -04:00
|
|
|
export async function authenticateUser(req, res, mode?: RateLimiterMode) : Promise<AuthResponse> {
|
|
|
|
return withAuth(supaAuthenticateUser)(req, res, mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
export async function supaAuthenticateUser(
|
2024-04-20 19:38:05 -04:00
|
|
|
req,
|
|
|
|
res,
|
|
|
|
mode?: RateLimiterMode
|
|
|
|
): Promise<{
|
|
|
|
success: boolean;
|
|
|
|
team_id?: string;
|
|
|
|
error?: string;
|
|
|
|
status?: number;
|
|
|
|
}> {
|
2024-04-21 12:31:22 -04:00
|
|
|
|
2024-04-20 19:38:05 -04:00
|
|
|
const authHeader = req.headers.authorization;
|
|
|
|
if (!authHeader) {
|
|
|
|
return { success: false, error: "Unauthorized", status: 401 };
|
|
|
|
}
|
|
|
|
const token = authHeader.split(" ")[1]; // Extract the token from "Bearer <token>"
|
|
|
|
if (!token) {
|
|
|
|
return {
|
|
|
|
success: false,
|
|
|
|
error: "Unauthorized: Token missing",
|
|
|
|
status: 401,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const incomingIP = (req.headers["x-forwarded-for"] ||
|
|
|
|
req.socket.remoteAddress) as string;
|
|
|
|
const iptoken = incomingIP + token;
|
|
|
|
await getRateLimiter(
|
|
|
|
token === "this_is_just_a_preview_token" ? RateLimiterMode.Preview : mode
|
|
|
|
).consume(iptoken);
|
|
|
|
} catch (rateLimiterRes) {
|
|
|
|
console.error(rateLimiterRes);
|
|
|
|
return {
|
|
|
|
success: false,
|
|
|
|
error: "Rate limit exceeded. Too many requests, try again in 1 minute.",
|
|
|
|
status: 429,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (
|
|
|
|
token === "this_is_just_a_preview_token" &&
|
2024-04-26 15:57:49 -04:00
|
|
|
(mode === RateLimiterMode.Scrape || mode === RateLimiterMode.Preview || mode === RateLimiterMode.Search)
|
2024-04-20 19:38:05 -04:00
|
|
|
) {
|
|
|
|
return { success: true, team_id: "preview" };
|
2024-04-26 15:57:49 -04:00
|
|
|
// check the origin of the request and make sure its from firecrawl.dev
|
|
|
|
// const origin = req.headers.origin;
|
|
|
|
// if (origin && origin.includes("firecrawl.dev")){
|
|
|
|
// return { success: true, team_id: "preview" };
|
|
|
|
// }
|
|
|
|
// if(process.env.ENV !== "production") {
|
|
|
|
// return { success: true, team_id: "preview" };
|
|
|
|
// }
|
|
|
|
|
|
|
|
// return { success: false, error: "Unauthorized: Invalid token", status: 401 };
|
2024-04-20 19:38:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
const normalizedApi = parseApi(token);
|
|
|
|
// make sure api key is valid, based on the api_keys table in supabase
|
|
|
|
const { data, error } = await supabase_service
|
|
|
|
.from("api_keys")
|
|
|
|
.select("*")
|
|
|
|
.eq("key", normalizedApi);
|
|
|
|
if (error || !data || data.length === 0) {
|
|
|
|
return {
|
|
|
|
success: false,
|
|
|
|
error: "Unauthorized: Invalid token",
|
|
|
|
status: 401,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
return { success: true, team_id: data[0].team_id };
|
|
|
|
}
|