8
8
*/
9
9
10
10
'use strict' ;
11
- var g = require ( '../../lib/globalize' ) ;
12
- var loopback = require ( '../../lib/loopback' ) ;
13
- var assert = require ( 'assert' ) ;
14
- var uid = require ( 'uid2' ) ;
15
- var DEFAULT_TOKEN_LEN = 64 ;
11
+ const g = require ( '../../lib/globalize' ) ;
12
+ const loopback = require ( '../../lib/loopback' ) ;
13
+ const assert = require ( 'assert' ) ;
14
+ const uid = require ( 'uid2' ) ;
15
+ const DEFAULT_TOKEN_LEN = 64 ;
16
16
17
17
/**
18
18
* Token based authentication and access control.
@@ -93,11 +93,11 @@ module.exports = function(AccessToken) {
93
93
*/
94
94
AccessToken . getIdForRequest = function ( req , options ) {
95
95
options = options || { } ;
96
- var params = options . params || [ ] ;
97
- var headers = options . headers || [ ] ;
98
- var cookies = options . cookies || [ ] ;
99
- var i = 0 ;
100
- var length , id ;
96
+ let params = options . params || [ ] ;
97
+ let headers = options . headers || [ ] ;
98
+ let cookies = options . cookies || [ ] ;
99
+ let i = 0 ;
100
+ let length , id ;
101
101
102
102
// https://github.com/strongloop/loopback/issues/1326
103
103
if ( options . searchDefaultTokenKeys !== false ) {
@@ -107,7 +107,7 @@ module.exports = function(AccessToken) {
107
107
}
108
108
109
109
for ( length = params . length ; i < length ; i ++ ) {
110
- var param = params [ i ] ;
110
+ const param = params [ i ] ;
111
111
// replacement for deprecated req.param()
112
112
id = req . params && req . params [ param ] !== undefined ? req . params [ param ] :
113
113
req . body && req . body [ param ] !== undefined ? req . body [ param ] :
@@ -134,7 +134,7 @@ module.exports = function(AccessToken) {
134
134
id = id . substring ( 7 ) ;
135
135
if ( options . bearerTokenBase64Encoded ) {
136
136
// Decode from base64
137
- var buf = new Buffer ( id , 'base64' ) ;
137
+ const buf = new Buffer ( id , 'base64' ) ;
138
138
id = buf . toString ( 'utf8' ) ;
139
139
}
140
140
} else if ( / ^ B a s i c / i. test ( id ) ) {
@@ -147,7 +147,7 @@ module.exports = function(AccessToken) {
147
147
// "a2b2c3:" (curl http://a2b2c3@localhost:3000/)
148
148
// "token:a2b2c3" (curl http://token:a2b2c3@localhost:3000/)
149
149
// ":a2b2c3"
150
- var parts = / ^ ( [ ^ : ] * ) : ( .* ) $ / . exec ( id ) ;
150
+ const parts = / ^ ( [ ^ : ] * ) : ( .* ) $ / . exec ( id ) ;
151
151
if ( parts ) {
152
152
id = parts [ 2 ] . length > parts [ 1 ] . length ? parts [ 2 ] : parts [ 1 ] ;
153
153
}
@@ -186,7 +186,7 @@ module.exports = function(AccessToken) {
186
186
} else if ( isValid ) {
187
187
cb ( null , token ) ;
188
188
} else {
189
- var e = new Error ( g . f ( 'Invalid Access Token' ) ) ;
189
+ const e = new Error ( g . f ( 'Invalid Access Token' ) ) ;
190
190
e . status = e . statusCode = 401 ;
191
191
e . code = 'INVALID_TOKEN' ;
192
192
cb ( e ) ;
@@ -213,7 +213,7 @@ module.exports = function(AccessToken) {
213
213
options = { } ;
214
214
}
215
215
216
- var id = this . getIdForRequest ( req , options ) ;
216
+ const id = this . getIdForRequest ( req , options ) ;
217
217
218
218
if ( id ) {
219
219
this . resolve ( id , cb ) ;
@@ -239,9 +239,9 @@ module.exports = function(AccessToken) {
239
239
assert ( this . ttl , 'token.ttl must exist' ) ;
240
240
assert ( this . ttl >= - 1 , 'token.ttl must be >= -1' ) ;
241
241
242
- var AccessToken = this . constructor ;
243
- var userRelation = AccessToken . relations . user ; // may not be set up
244
- var User = userRelation && userRelation . modelTo ;
242
+ const AccessToken = this . constructor ;
243
+ const userRelation = AccessToken . relations . user ; // may not be set up
244
+ let User = userRelation && userRelation . modelTo ;
245
245
246
246
// redefine user model if accessToken's principalType is available
247
247
if ( this . principalType ) {
@@ -253,13 +253,13 @@ module.exports = function(AccessToken) {
253
253
}
254
254
}
255
255
256
- var now = Date . now ( ) ;
257
- var created = this . created . getTime ( ) ;
258
- var elapsedSeconds = ( now - created ) / 1000 ;
259
- var secondsToLive = this . ttl ;
260
- var eternalTokensAllowed = ! ! ( User && User . settings . allowEternalTokens ) ;
261
- var isEternalToken = secondsToLive === - 1 ;
262
- var isValid = isEternalToken ?
256
+ const now = Date . now ( ) ;
257
+ const created = this . created . getTime ( ) ;
258
+ const elapsedSeconds = ( now - created ) / 1000 ;
259
+ const secondsToLive = this . ttl ;
260
+ const eternalTokensAllowed = ! ! ( User && User . settings . allowEternalTokens ) ;
261
+ const isEternalToken = secondsToLive === - 1 ;
262
+ const isValid = isEternalToken ?
263
263
eternalTokensAllowed :
264
264
elapsedSeconds < secondsToLive ;
265
265
0 commit comments