one-link/node_modules/hono/dist/middleware/jwt/index.js

86 lines
2.3 KiB
JavaScript

// src/middleware/jwt/index.ts
import { getCookie } from "../../helper/cookie/index.js";
import { HTTPException } from "../../http-exception.js";
import { Jwt } from "../../utils/jwt/index.js";
import "../../context.js";
var jwt = (options) => {
if (!options) {
throw new Error('JWT auth middleware requires options for "secret');
}
if (!crypto.subtle || !crypto.subtle.importKey) {
throw new Error("`crypto.subtle.importKey` is undefined. JWT auth middleware requires it.");
}
return async function jwt2(ctx, next) {
const credentials = ctx.req.raw.headers.get("Authorization");
let token;
if (credentials) {
const parts = credentials.split(/\s+/);
if (parts.length !== 2) {
const errDescription = "invalid credentials structure";
throw new HTTPException(401, {
message: errDescription,
res: unauthorizedResponse({
ctx,
error: "invalid_request",
errDescription
})
});
} else {
token = parts[1];
}
} else if (options.cookie) {
token = getCookie(ctx)[options.cookie];
}
if (!token) {
const errDescription = "no authorization included in request";
throw new HTTPException(401, {
message: errDescription,
res: unauthorizedResponse({
ctx,
error: "invalid_request",
errDescription
})
});
}
let payload;
let cause;
try {
payload = await Jwt.verify(token, options.secret, options.alg);
} catch (e) {
cause = e;
}
if (!payload) {
throw new HTTPException(401, {
message: "Unauthorized",
res: unauthorizedResponse({
ctx,
error: "invalid_token",
statusText: "Unauthorized",
errDescription: "token verification failure"
}),
cause
});
}
ctx.set("jwtPayload", payload);
await next();
};
};
function unauthorizedResponse(opts) {
return new Response("Unauthorized", {
status: 401,
statusText: opts.statusText,
headers: {
"WWW-Authenticate": `Bearer realm="${opts.ctx.req.url}",error="${opts.error}",error_description="${opts.errDescription}"`
}
});
}
var verify = Jwt.verify;
var decode = Jwt.decode;
var sign = Jwt.sign;
export {
decode,
jwt,
sign,
verify
};