UNPKG

auth-vir

Version:

Auth made easy and secure via JWT cookies, CSRF tokens, and password hashing helpers.

42 lines (41 loc) 1.53 kB
import { defineShape, isValidShape } from 'object-shape-tester'; import { createJwt, parseJwt } from './jwt.js'; /** * Shape definition and source of truth for {@link UserJwtData}. * * @category Internal */ export const userJwtDataShape = defineShape({ /** The id from your database of the user you're authenticating. */ userId: '', /** * CSRF token. This can be any cryptographically secure randomized string. * * Consider using {@link generateCsrfToken} to generate this. */ csrfToken: '', }); /** * Creates a new signed and encrypted {@link UserJwtData} when a client (frontend) successfully * authenticates with the host (backend). This is used by host (backend) code to establish a new * user session. The output of this function should be sent to the client (frontend) for storage. * * @category Internal */ export async function createUserJwt(data, params) { return await createJwt(data, params); } /** * Parses a {@link UserJwtData} generated from {@link createUserJwt}. This should be used on the host * (backend) to a client (frontend) request. Do not use this function in client (frontend) code: it * requires JWT signing keys which should not be shared with any client (frontend). * * @category Internal */ export async function parseUserJwt(encryptedJwt, params) { const parsed = await parseJwt(encryptedJwt, params); if (!isValidShape(parsed, userJwtDataShape)) { throw new TypeError('Verified jwt has wrong data.'); } return parsed; }