2020-05-13 11:46:52 +02:00
|
|
|
'use strict';
|
|
|
|
|
2020-05-14 11:06:16 +02:00
|
|
|
const _ = require('lodash');
|
2020-05-13 12:27:46 +02:00
|
|
|
const crypto = require('crypto');
|
2020-05-14 11:06:16 +02:00
|
|
|
const jwt = require('jsonwebtoken');
|
|
|
|
const defaultJwtOptions = { expiresIn: '30d' };
|
|
|
|
|
|
|
|
const getTokenOptions = () => {
|
|
|
|
const { options, secret } = strapi.config.get('server.admin.auth', {});
|
|
|
|
|
|
|
|
return {
|
|
|
|
secret,
|
|
|
|
options: _.merge(defaultJwtOptions, options),
|
|
|
|
};
|
|
|
|
};
|
2020-05-13 11:46:52 +02:00
|
|
|
|
2020-05-14 10:37:32 +02:00
|
|
|
/**
|
2020-05-14 11:06:16 +02:00
|
|
|
* Create a random token
|
2020-05-14 10:37:32 +02:00
|
|
|
* @returns {string}
|
|
|
|
*/
|
2020-05-14 11:06:16 +02:00
|
|
|
const createToken = () => {
|
2020-05-14 18:54:52 +02:00
|
|
|
return crypto.randomBytes(20).toString('hex');
|
2020-05-14 11:06:16 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates a JWT token for an administration user
|
|
|
|
* @param {object} user - admin user
|
|
|
|
*/
|
|
|
|
const createJwtToken = user => {
|
|
|
|
const { options, secret } = getTokenOptions();
|
|
|
|
|
|
|
|
return jwt.sign({ id: user.id }, secret, options);
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Tries to decode a token an return its payload and if it is valid
|
|
|
|
* @param {string} token - a token to decode
|
|
|
|
* @return {Object} decodeInfo - the decoded info
|
|
|
|
*/
|
|
|
|
const decodeJwtToken = token => {
|
|
|
|
const { secret } = getTokenOptions();
|
|
|
|
|
|
|
|
try {
|
|
|
|
const payload = jwt.verify(token, secret);
|
|
|
|
return { payload, isValid: true };
|
|
|
|
} catch (err) {
|
|
|
|
return { payload: null, isValid: false };
|
|
|
|
}
|
|
|
|
};
|
2020-05-14 10:37:32 +02:00
|
|
|
|
2020-05-13 11:46:52 +02:00
|
|
|
module.exports = {
|
2020-05-14 11:06:16 +02:00
|
|
|
createToken,
|
|
|
|
createJwtToken,
|
|
|
|
getTokenOptions,
|
|
|
|
decodeJwtToken,
|
2020-05-13 11:46:52 +02:00
|
|
|
};
|