mirror of
https://github.com/honojs/hono.git
synced 2024-12-01 10:51:01 +00:00
8d4f23a1ea
* Expose the Jwt fucntions under the 'hono/jwt' path * Run yarn denoify
84 lines
2.3 KiB
TypeScript
84 lines
2.3 KiB
TypeScript
import { HTTPException } from '../../http-exception.ts'
|
|
import type { MiddlewareHandler } from '../../types.ts'
|
|
import { Jwt } from '../../utils/jwt/index.ts'
|
|
import type { AlgorithmTypes } from '../../utils/jwt/types.ts'
|
|
import '../../context.ts'
|
|
|
|
declare module '../../context.ts' {
|
|
interface ContextVariableMap {
|
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
jwtPayload: any
|
|
}
|
|
}
|
|
|
|
export const jwt = (options: {
|
|
secret: string
|
|
cookie?: string
|
|
alg?: string
|
|
}): MiddlewareHandler => {
|
|
if (!options) {
|
|
throw new Error('JWT auth middleware requires options for "secret')
|
|
}
|
|
|
|
if (!crypto.subtle || !crypto.subtle.importKey) {
|
|
throw new Error('`crypto.subtle.importKey` is undefined. JWT auth middleware requires it.')
|
|
}
|
|
|
|
return async (ctx, next) => {
|
|
const credentials = ctx.req.headers.get('Authorization')
|
|
let token
|
|
if (credentials) {
|
|
const parts = credentials.split(/\s+/)
|
|
if (parts.length !== 2) {
|
|
const res = new Response('Unauthorized', {
|
|
status: 401,
|
|
headers: {
|
|
'WWW-Authenticate': `Bearer realm="${ctx.req.url}",error="invalid_request",error_description="invalid credentials structure"`,
|
|
},
|
|
})
|
|
throw new HTTPException(401, { res })
|
|
} else {
|
|
token = parts[1]
|
|
}
|
|
} else if (options.cookie) {
|
|
token = ctx.req.cookie(options.cookie)
|
|
}
|
|
|
|
if (!token) {
|
|
const res = new Response('Unauthorized', {
|
|
status: 401,
|
|
headers: {
|
|
'WWW-Authenticate': `Bearer realm="${ctx.req.url}",error="invalid_request",error_description="no authorization included in request"`,
|
|
},
|
|
})
|
|
throw new HTTPException(401, { res })
|
|
}
|
|
|
|
let payload
|
|
let msg = ''
|
|
try {
|
|
payload = await Jwt.verify(token, options.secret, options.alg as AlgorithmTypes)
|
|
} catch (e) {
|
|
msg = `${e}`
|
|
}
|
|
if (!payload) {
|
|
const res = new Response('Unauthorized', {
|
|
status: 401,
|
|
statusText: msg,
|
|
headers: {
|
|
'WWW-Authenticate': `Bearer realm="${ctx.req.url}",error="invalid_token",error_description="token verification failure"`,
|
|
},
|
|
})
|
|
throw new HTTPException(401, { res })
|
|
}
|
|
|
|
ctx.set('jwtPayload', payload)
|
|
|
|
await next()
|
|
}
|
|
}
|
|
|
|
export const verify = Jwt.verify
|
|
export const decode = Jwt.decode
|
|
export const sign = Jwt.sign
|