Compare commits

...

1 Commits

Author SHA1 Message Date
Ratstail91 58bc3f6b9d HOTFIX: don't test in prod 2023-12-24 06:43:05 +11:00
4 changed files with 15 additions and 10 deletions
+2 -2
View File
@@ -1,12 +1,12 @@
{
"name": "auth-server",
"version": "1.8.3",
"version": "1.8.4",
"lockfileVersion": 3,
"requires": true,
"packages": {
"": {
"name": "auth-server",
"version": "1.8.3",
"version": "1.8.4",
"license": "ISC",
"dependencies": {
"bcryptjs": "^2.4.3",
+1 -1
View File
@@ -1,6 +1,6 @@
{
"name": "auth-server",
"version": "1.8.3",
"version": "1.8.4",
"description": "An API centric auth server. Uses Sequelize and mariaDB by default.",
"main": "server/server.js",
"scripts": {
+3 -7
View File
@@ -9,13 +9,9 @@ module.exports = (req, res, next) => {
return res.status(401).send('No access token provided');
}
return jwt.decode(accessToken, process.env.SECRET_ACCESS, (err, user) => {
if (err) {
return res.status(403).send(err);
}
const decoded = jwt.decode(accessToken);
req.user = user;
req.user = decoded.payload;
return next();
});
return next();
};
+9
View File
@@ -48,6 +48,9 @@ const TokenProvider = props => {
//ping the auth server for a new access token
const response = await fetch(`${process.env.AUTH_URI}/auth/token`, {
method: 'POST',
headers: {
'Authorization': `Bearer ${bearer}`
},
credentials: 'include'
});
@@ -79,6 +82,9 @@ const TokenProvider = props => {
//access the refreshed token via callback
const tokenCallback = async (cb) => {
//use this?
let bearer = accessToken;
//if expired (10 minutes, normally)
const expired = new Date(decode(accessToken).exp) < Date.now() / 1000;
@@ -86,6 +92,9 @@ const TokenProvider = props => {
//ping the auth server for a new token
const response = await fetch(`${process.env.AUTH_URI}/auth/token`, {
method: 'POST',
headers: {
'Authorization': `Bearer ${bearer}`
},
credentials: 'include'
});