mirror of
https://github.com/overleaf/overleaf.git
synced 2024-11-07 20:31:06 -05:00
f5471481d9
Using server messages in asyncForm for 400 errors GitOrigin-RevId: 1cf1bae7d5ac61051f8ed923631ae7874984572c
103 lines
3.4 KiB
JavaScript
103 lines
3.4 KiB
JavaScript
let ErrorController
|
|
const Errors = require('./Errors')
|
|
const logger = require('logger-sharelatex')
|
|
const AuthenticationController = require('../Authentication/AuthenticationController')
|
|
const SamlLogHandler = require('../SamlLog/SamlLogHandler')
|
|
const HttpErrorHandler = require('./HttpErrorHandler')
|
|
|
|
module.exports = ErrorController = {
|
|
notFound(req, res) {
|
|
res.status(404)
|
|
res.render('general/404', { title: 'page_not_found' })
|
|
},
|
|
|
|
forbidden(req, res) {
|
|
res.status(403)
|
|
res.render('user/restricted')
|
|
},
|
|
|
|
serverError(req, res) {
|
|
res.status(500)
|
|
res.render('general/500', { title: 'Server Error' })
|
|
},
|
|
|
|
handleError(error, req, res, next) {
|
|
const user = AuthenticationController.getSessionUser(req)
|
|
// log errors related to SAML flow
|
|
if (req.session && req.session.saml) {
|
|
SamlLogHandler.log(req.session.saml.universityId, req.sessionID, {
|
|
error: {
|
|
message: error && error.message,
|
|
stack: error && error.stack
|
|
},
|
|
body: req.body,
|
|
path: req.path,
|
|
query: req.query,
|
|
saml: req.session.saml,
|
|
user_id: user && user._id
|
|
})
|
|
}
|
|
if (error.code === 'EBADCSRFTOKEN') {
|
|
logger.warn(
|
|
{ err: error, url: req.url, method: req.method, user },
|
|
'invalid csrf'
|
|
)
|
|
res.sendStatus(403)
|
|
} else if (error instanceof Errors.NotFoundError) {
|
|
logger.warn({ err: error, url: req.url }, 'not found error')
|
|
ErrorController.notFound(req, res)
|
|
} else if (
|
|
error instanceof URIError &&
|
|
error.message.match(/^Failed to decode param/)
|
|
) {
|
|
logger.warn({ err: error, url: req.url }, 'Express URIError')
|
|
res.status(400)
|
|
res.render('general/500', { title: 'Invalid Error' })
|
|
} else if (error instanceof Errors.ForbiddenError) {
|
|
logger.error({ err: error }, 'forbidden error')
|
|
ErrorController.forbidden(req, res)
|
|
} else if (error instanceof Errors.TooManyRequestsError) {
|
|
logger.warn({ err: error, url: req.url }, 'too many requests error')
|
|
res.sendStatus(429)
|
|
} else if (error instanceof Errors.InvalidError) {
|
|
logger.warn({ err: error, url: req.url }, 'invalid error')
|
|
res.status(400)
|
|
res.send(error.message)
|
|
} else if (error instanceof Errors.InvalidNameError) {
|
|
logger.warn({ err: error, url: req.url }, 'invalid name error')
|
|
res.status(400)
|
|
res.send(error.message)
|
|
} else if (error instanceof Errors.SAMLSessionDataMissing) {
|
|
logger.warn(
|
|
{ err: error, url: req.url },
|
|
'missing SAML session data error'
|
|
)
|
|
HttpErrorHandler.badRequest(req, res, error.message)
|
|
} else {
|
|
logger.error(
|
|
{ err: error, url: req.url, method: req.method, user },
|
|
'error passed to top level next middleware'
|
|
)
|
|
ErrorController.serverError(req, res)
|
|
}
|
|
},
|
|
|
|
handleApiError(error, req, res, next) {
|
|
if (error instanceof Errors.NotFoundError) {
|
|
logger.warn({ err: error, url: req.url }, 'not found error')
|
|
res.sendStatus(404)
|
|
} else if (
|
|
error instanceof URIError &&
|
|
error.message.match(/^Failed to decode param/)
|
|
) {
|
|
logger.warn({ err: error, url: req.url }, 'Express URIError')
|
|
res.sendStatus(400)
|
|
} else {
|
|
logger.error(
|
|
{ err: error, url: req.url, method: req.method },
|
|
'error passed to top level next middleware'
|
|
)
|
|
res.sendStatus(500)
|
|
}
|
|
}
|
|
}
|