jwt-utils.ts 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. import type { EventHandlerRequest, H3Event } from 'h3';
  2. import jwt from 'jsonwebtoken';
  3. import { UserInfo } from './mock-data';
  4. export interface UserPayload extends UserInfo {
  5. iat: number;
  6. exp: number;
  7. }
  8. export function generateAccessToken(user: UserInfo) {
  9. return jwt.sign(user, process.env.ACCESS_TOKEN_SECRET, { expiresIn: '2h' });
  10. }
  11. export function generateRefreshToken(user: UserInfo) {
  12. return jwt.sign(user, process.env.REFRESH_TOKEN_SECRET, {
  13. expiresIn: '30d',
  14. });
  15. }
  16. export function verifyAccessToken(
  17. event: H3Event<EventHandlerRequest>,
  18. ): null | Omit<UserInfo, 'password'> {
  19. const authHeader = getHeader(event, 'Authorization');
  20. if (!authHeader?.startsWith('Bearer')) {
  21. return null;
  22. }
  23. const token = authHeader.split(' ')[1];
  24. try {
  25. const decoded = jwt.verify(
  26. token,
  27. process.env.ACCESS_TOKEN_SECRET,
  28. ) as UserPayload;
  29. const username = decoded.username;
  30. const user = MOCK_USERS.find((item) => item.username === username);
  31. const { password: _pwd, ...userinfo } = user;
  32. return userinfo;
  33. } catch {
  34. return null;
  35. }
  36. }
  37. export function verifyRefreshToken(
  38. token: string,
  39. ): null | Omit<UserInfo, 'password'> {
  40. try {
  41. const decoded = jwt.verify(
  42. token,
  43. process.env.REFRESH_TOKEN_SECRET,
  44. ) as UserPayload;
  45. const username = decoded.username;
  46. const user = MOCK_USERS.find((item) => item.username === username);
  47. const { password: _pwd, ...userinfo } = user;
  48. return userinfo;
  49. } catch {
  50. return null;
  51. }
  52. }