@notadd/authentication
Version:
Notadd Backend Package.
51 lines (49 loc) • 2.13 kB
JavaScript
;
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
return c > 3 && r && Object.defineProperty(target, key, r), r;
};
var __metadata = (this && this.__metadata) || function (k, v) {
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
};
Object.defineProperty(exports, "__esModule", { value: true });
const jwt = require("jsonwebtoken");
const crypto_1 = require("crypto");
const common_1 = require("@nestjs/common");
const user_service_1 = require("@notadd/user/service/user.service");
let AuthService = class AuthService {
constructor(userService) {
this.userService = userService;
}
async createToken(username, password) {
const user = await this.userService.getUserByName(username);
if (typeof user === "undefined") {
throw new Error("User Do not exists!");
}
if (user.password !== crypto_1.createHash("sha256").update(password + user.salt).digest("hex")) {
throw new Error("Password is incorrect!");
}
const expiresIn = 60 * 60;
const secretOrKey = "secret";
const playload = {
id: user.id,
userName: user.userName,
};
const token = jwt.sign(playload, secretOrKey, { expiresIn });
return {
expires: expiresIn,
token,
};
}
async validateUser(signedUser) {
return true;
}
};
AuthService = __decorate([
common_1.Injectable(),
__metadata("design:paramtypes", [user_service_1.UserService])
], AuthService);
exports.AuthService = AuthService;
//# sourceMappingURL=auth.service.js.map