160 lines
5.6 KiB
JavaScript
160 lines
5.6 KiB
JavaScript
|
"use strict";
|
||
|
(() => {
|
||
|
var exports = {};
|
||
|
exports.id = 2890;
|
||
|
exports.ids = [2890];
|
||
|
exports.modules = {
|
||
|
|
||
|
/***/ 6781:
|
||
|
/***/ ((module) => {
|
||
|
|
||
|
module.exports = require("google-auth-library");
|
||
|
|
||
|
/***/ }),
|
||
|
|
||
|
/***/ 4300:
|
||
|
/***/ ((module) => {
|
||
|
|
||
|
module.exports = require("buffer");
|
||
|
|
||
|
/***/ }),
|
||
|
|
||
|
/***/ 6113:
|
||
|
/***/ ((module) => {
|
||
|
|
||
|
module.exports = require("crypto");
|
||
|
|
||
|
/***/ }),
|
||
|
|
||
|
/***/ 7147:
|
||
|
/***/ ((module) => {
|
||
|
|
||
|
module.exports = require("fs");
|
||
|
|
||
|
/***/ }),
|
||
|
|
||
|
/***/ 4606:
|
||
|
/***/ ((__unused_webpack_module, __webpack_exports__, __webpack_require__) => {
|
||
|
|
||
|
__webpack_require__.r(__webpack_exports__);
|
||
|
/* harmony export */ __webpack_require__.d(__webpack_exports__, {
|
||
|
/* harmony export */ "default": () => (/* binding */ handler)
|
||
|
/* harmony export */ });
|
||
|
/* harmony import */ var _package_shared_functions_backend_decrypt__WEBPACK_IMPORTED_MODULE_0__ = __webpack_require__(5425);
|
||
|
/* harmony import */ var _package_shared_functions_backend_decrypt__WEBPACK_IMPORTED_MODULE_0___default = /*#__PURE__*/__webpack_require__.n(_package_shared_functions_backend_decrypt__WEBPACK_IMPORTED_MODULE_0__);
|
||
|
/* harmony import */ var _functions_backend_serverError__WEBPACK_IMPORTED_MODULE_1__ = __webpack_require__(2163);
|
||
|
/* harmony import */ var _functions_backend_serverError__WEBPACK_IMPORTED_MODULE_1___default = /*#__PURE__*/__webpack_require__.n(_functions_backend_serverError__WEBPACK_IMPORTED_MODULE_1__);
|
||
|
// @ts-check
|
||
|
/** # MODULE TRACE
|
||
|
======================================================================
|
||
|
* No imports found for this Module
|
||
|
==== MODULE TRACE END ==== */ /**
|
||
|
* ==============================================================================
|
||
|
* Imports
|
||
|
* ==============================================================================
|
||
|
*/ const fs = __webpack_require__(7147);
|
||
|
const { OAuth2Client } = __webpack_require__(6781);
|
||
|
|
||
|
|
||
|
/** ****************************************************************************** */ /** ****************************************************************************** */ /** ****************************************************************************** */ /** ****************************************************************************** */ /** ****************************************************************************** */ /** ****************************************************************************** */ /**
|
||
|
* @type {import("next").NextApiHandler}
|
||
|
*/ async function handler(req, res) {
|
||
|
/**
|
||
|
* Check method
|
||
|
*
|
||
|
* @description Check request method and return if invalid
|
||
|
*/ if (req.method !== "POST") return res.json({
|
||
|
success: false,
|
||
|
payload: null,
|
||
|
msg: "Failed!"
|
||
|
});
|
||
|
/**
|
||
|
* Send Response
|
||
|
*
|
||
|
* @description Send a boolean response
|
||
|
*/ try {
|
||
|
/**
|
||
|
* User auth
|
||
|
*
|
||
|
* @description Authenticate user
|
||
|
*/ const deletedKeys = fs.readFileSync("./apiKeys/deleted.txt", "utf8");
|
||
|
/** @type {string} */ // @ts-ignore
|
||
|
const authorization = req.headers.authorization;
|
||
|
if (deletedKeys.includes(authorization)) {
|
||
|
return res.json({
|
||
|
success: false,
|
||
|
payload: null,
|
||
|
msg: "Key Inactive!"
|
||
|
});
|
||
|
}
|
||
|
const userJSON = _package_shared_functions_backend_decrypt__WEBPACK_IMPORTED_MODULE_0___default()(authorization);
|
||
|
if (!userJSON) throw new Error("Failed!");
|
||
|
const user = JSON.parse(userJSON);
|
||
|
const { user_id , full_access , csrf } = user;
|
||
|
try {
|
||
|
const decryptedCsrfJSON = _package_shared_functions_backend_decrypt__WEBPACK_IMPORTED_MODULE_0___default()(csrf);
|
||
|
const decryptedCsrf = JSON.parse(decryptedCsrfJSON || "");
|
||
|
} catch (error) {}
|
||
|
if (!full_access || !csrf) return res.json({
|
||
|
success: false,
|
||
|
payload: null,
|
||
|
msg: "Unauthorized"
|
||
|
});
|
||
|
////////////////////////////////////////
|
||
|
////////////////////////////////////////
|
||
|
////////////////////////////////////////
|
||
|
/**
|
||
|
* Grab User data
|
||
|
*
|
||
|
* @description Grab User data
|
||
|
*/ const { token , clientId } = req.body;
|
||
|
const client = new OAuth2Client(clientId);
|
||
|
const ticket = await client.verifyIdToken({
|
||
|
idToken: token,
|
||
|
audience: clientId
|
||
|
});
|
||
|
if (!ticket?.getPayload()?.email_verified) {
|
||
|
return res.json({
|
||
|
success: false,
|
||
|
payload: null,
|
||
|
msg: "User not verified!"
|
||
|
});
|
||
|
}
|
||
|
const payload = ticket.getPayload();
|
||
|
////////////////////////////////////////
|
||
|
////////////////////////////////////////
|
||
|
////////////////////////////////////////
|
||
|
res.json({
|
||
|
success: true,
|
||
|
payload
|
||
|
});
|
||
|
////////////////////////////////////////
|
||
|
} catch (/** @type {any} */ error1) {
|
||
|
////////////////////////////////////////
|
||
|
_functions_backend_serverError__WEBPACK_IMPORTED_MODULE_1___default()({
|
||
|
component: "/api/user/grab-google-user-from-token/main-catch-error",
|
||
|
message: error1.message
|
||
|
});
|
||
|
res.json({
|
||
|
success: false,
|
||
|
payload: null,
|
||
|
msg: "User fetch Error"
|
||
|
});
|
||
|
////////////////////////////////////////
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|
||
|
/***/ })
|
||
|
|
||
|
};
|
||
|
;
|
||
|
|
||
|
// load runtime
|
||
|
var __webpack_require__ = require("../../../webpack-api-runtime.js");
|
||
|
__webpack_require__.C(exports);
|
||
|
var __webpack_exec__ = (moduleId) => (__webpack_require__(__webpack_require__.s = moduleId))
|
||
|
var __webpack_exports__ = __webpack_require__.X(0, [5425,2163], () => (__webpack_exec__(4606)));
|
||
|
module.exports = __webpack_exports__;
|
||
|
|
||
|
})();
|