Last active
March 2, 2024 16:31
-
-
Save hariscs/25095ac873faa2b3854cd981188520f1 to your computer and use it in GitHub Desktop.
HTTP only Cookie Auth Middleware
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import { Request as ExpressRequest, Response, NextFunction } from 'express' | |
import jwt, { JwtPayload } from 'jsonwebtoken' | |
import { USER_SCHEMA } from '@/models/user_model' | |
import { log } from 'console' | |
interface User { | |
name?: string | |
email: string | |
password: string | |
} | |
interface Request extends ExpressRequest { | |
user?: User | |
} | |
export async function protect_route( | |
req: Request, | |
res: Response, | |
next: NextFunction | |
) { | |
try { | |
const token = req.cookies.token | |
if (!token) { | |
res.status(401).json({ error: 'Unauthorized' }) | |
return | |
} | |
const secret = process.env.JWT_SECRET | |
if (!secret) { | |
res.status(500).json({ error: 'JWT secret is undefined' }) | |
return | |
} | |
const decoded = jwt.verify(token, secret) as JwtPayload | |
const user = await USER_SCHEMA.findById(decoded.user_id).select('-password') | |
log(user) | |
next() | |
} catch (error) { | |
res.status(500).json({ error: 'Internal server error' }) | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment