hono
Version:
Web framework built on Web Standards
131 lines (130 loc) • 4.29 kB
JavaScript
var __defProp = Object.defineProperty;
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
var __getOwnPropNames = Object.getOwnPropertyNames;
var __hasOwnProp = Object.prototype.hasOwnProperty;
var __export = (target, all) => {
for (var name in all)
__defProp(target, name, { get: all[name], enumerable: true });
};
var __copyProps = (to, from, except, desc) => {
if (from && typeof from === "object" || typeof from === "function") {
for (let key of __getOwnPropNames(from))
if (!__hasOwnProp.call(to, key) && key !== except)
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
}
return to;
};
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
var jwt_exports = {};
__export(jwt_exports, {
decode: () => decode,
jwt: () => jwt,
sign: () => sign,
verify: () => verify
});
module.exports = __toCommonJS(jwt_exports);
var import_cookie = require("../../helper/cookie");
var import_http_exception = require("../../http-exception");
var import_jwt = require("../../utils/jwt");
var import_context = require("../../context");
const jwt = (options) => {
if (!options || !options.secret) {
throw new Error('JWT auth middleware requires options for "secret"');
}
if (!crypto.subtle || !crypto.subtle.importKey) {
throw new Error("`crypto.subtle.importKey` is undefined. JWT auth middleware requires it.");
}
return async function jwt2(ctx, next) {
const credentials = ctx.req.raw.headers.get("Authorization");
let token;
if (credentials) {
const parts = credentials.split(/\s+/);
if (parts.length !== 2) {
const errDescription = "invalid credentials structure";
throw new import_http_exception.HTTPException(401, {
message: errDescription,
res: unauthorizedResponse({
ctx,
error: "invalid_request",
errDescription
})
});
} else {
token = parts[1];
}
} else if (options.cookie) {
if (typeof options.cookie == "string") {
token = (0, import_cookie.getCookie)(ctx, options.cookie);
} else if (options.cookie.secret) {
if (options.cookie.prefixOptions) {
token = await (0, import_cookie.getSignedCookie)(
ctx,
options.cookie.secret,
options.cookie.key,
options.cookie.prefixOptions
);
} else {
token = await (0, import_cookie.getSignedCookie)(ctx, options.cookie.secret, options.cookie.key);
}
} else {
if (options.cookie.prefixOptions) {
token = (0, import_cookie.getCookie)(ctx, options.cookie.key, options.cookie.prefixOptions);
} else {
token = (0, import_cookie.getCookie)(ctx, options.cookie.key);
}
}
}
if (!token) {
const errDescription = "no authorization included in request";
throw new import_http_exception.HTTPException(401, {
message: errDescription,
res: unauthorizedResponse({
ctx,
error: "invalid_request",
errDescription
})
});
}
let payload;
let cause;
try {
payload = await import_jwt.Jwt.verify(token, options.secret, options.alg);
} catch (e) {
cause = e;
}
if (!payload) {
throw new import_http_exception.HTTPException(401, {
message: "Unauthorized",
res: unauthorizedResponse({
ctx,
error: "invalid_token",
statusText: "Unauthorized",
errDescription: "token verification failure"
}),
cause
});
}
ctx.set("jwtPayload", payload);
await next();
};
};
function unauthorizedResponse(opts) {
return new Response("Unauthorized", {
status: 401,
statusText: opts.statusText,
headers: {
"WWW-Authenticate": `Bearer realm="${opts.ctx.req.url}",error="${opts.error}",error_description="${opts.errDescription}"`
}
});
}
const verify = import_jwt.Jwt.verify;
const decode = import_jwt.Jwt.decode;
const sign = import_jwt.Jwt.sign;
// Annotate the CommonJS export names for ESM import in node:
0 && (module.exports = {
decode,
jwt,
sign,
verify
});
;