passport.js 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. const passport = require('passport');
  2. const JwtStrategy = require('passport-jwt').Strategy;
  3. const { ExtractJwt } = require('passport-jwt');
  4. const LocalStratergy = require('passport-local').Strategy;
  5. const LocalAPIKeyStrategy = require('passport-localapikey').Strategy;
  6. const bcrypt = require('bcryptjs');
  7. const config = require('./config');
  8. const { getUser } = require('./db/user');
  9. const jwtOptions = {
  10. jwtFromRequest: ExtractJwt.fromHeader('authorization'),
  11. secretOrKey: config.JWT_SECRET,
  12. };
  13. passport.use(
  14. new JwtStrategy(jwtOptions, async (payload, done) => {
  15. try {
  16. const user = await getUser({ email: payload.sub });
  17. if (!user) return done(null, false);
  18. return done(null, user);
  19. } catch (err) {
  20. return done(err);
  21. }
  22. })
  23. );
  24. const localOptions = {
  25. usernameField: 'email',
  26. };
  27. passport.use(
  28. new LocalStratergy(localOptions, async (email, password, done) => {
  29. try {
  30. const user = await getUser({ email });
  31. if (!user) {
  32. return done(null, false);
  33. }
  34. const isMatch = await bcrypt.compare(password, user.password);
  35. if (!isMatch) {
  36. return done(null, false);
  37. }
  38. return done(null, user);
  39. } catch (err) {
  40. return done(err);
  41. }
  42. })
  43. );
  44. passport.use(
  45. new LocalAPIKeyStrategy(async (apikey, done) => {
  46. try {
  47. const user = await getUser({ apikey });
  48. if (!user) {
  49. return done(null, false);
  50. }
  51. return done(null, user);
  52. } catch (err) {
  53. return done(err);
  54. }
  55. })
  56. );