73 lines
1.8 KiB
JavaScript
Raw Normal View History

2017-11-16 14:12:03 +01:00
'use strict';
/**
* Jwt.js service
*
* @description: A set of functions similar to controller's actions to avoid code duplication.
*/
const _ = require('lodash');
const jwt = require('jsonwebtoken');
2018-01-26 07:32:28 +01:00
const defaultJwtOptions = { expiresIn: '30d' };
2017-11-16 14:12:03 +01:00
module.exports = {
getToken: function (ctx) {
const params = _.assign({}, ctx.request.body, ctx.request.query);
let token = '';
if (ctx.request && ctx.request.header && ctx.request.header.authorization) {
const parts = ctx.request.header.authorization.split(' ');
if (parts.length === 2) {
const scheme = parts[0];
const credentials = parts[1];
if (/^Bearer$/i.test(scheme)) {
token = credentials;
}
} else {
throw new Error('Invalid authorization header format. Format is Authorization: Bearer [token]');
}
} else if (params.token) {
token = params.token;
} else {
throw new Error('No authorization header was found');
}
return this.verify(token);
2017-12-07 15:27:11 +01:00
},
2018-01-27 08:08:59 +01:00
issue: (payload, jwtOptions = {}) => {
2018-01-26 07:32:28 +01:00
_.defaults(jwtOptions, defaultJwtOptions);
2017-12-07 15:27:11 +01:00
return jwt.sign(
_.clone(payload.toJSON ? payload.toJSON() : payload),
2018-01-26 07:32:28 +01:00
process.env.JWT_SECRET || _.get(strapi.plugins['users-permissions'], 'config.jwtSecret') || 'oursecret',
jwtOptions,
2017-12-07 15:27:11 +01:00
);
},
verify: (token) => {
return new Promise(function (resolve, reject) {
jwt.verify(
token,
process.env.JWT_SECRET || _.get(strapi.plugins['users-permissions'], 'config.jwtSecret') || 'oursecret',
{},
2018-01-22 18:19:44 +01:00
function (err, user = {}) {
if (err) {
2017-12-07 15:27:11 +01:00
return reject('Invalid token.');
}
2018-01-22 18:19:44 +01:00
const { _id, id } = user;
if ((id || _id) === undefined) {
return reject('Invalid token #2.');
}
2017-12-07 15:27:11 +01:00
resolve(user);
}
);
});
2017-11-16 14:12:03 +01:00
}
};