add user module and jwt

This commit is contained in:
liuyi 2025-06-22 17:57:19 +08:00
parent b8cc65a768
commit 1e043718b4
5 changed files with 109 additions and 3 deletions

View File

@ -31,3 +31,10 @@ export enum UserOrderType {
CREATED = 'createdAt',
UPDATED = 'updatedAt',
}
export const TokenConst = {
USER_TOKEN_SECRET: 'USER_TOKEN_SECRET',
DEFAULT_USER_TOKEN_SECRET: 'my-access-secret',
USER_REFRESH_TOKEN_EXPIRED: 'USER_REFRESH_TOKEN_EXPIRED',
DEFAULT_USER_REFRESH_TOKEN_EXPIRED: 'my-refresh-secret',
};

View File

@ -0,0 +1,28 @@
import { BadGatewayException, ExecutionContext, Injectable } from '@nestjs/common';
import { AuthGuard } from '@nestjs/passport';
import { plainToClass } from 'class-transformer';
import { validateOrReject } from 'class-validator';
import { CredentialDto } from '../dtos/auth.dto';
/**
*
*/
@Injectable()
export class LocalAuthGuard extends AuthGuard('local') {
async canActivate(context: ExecutionContext): Promise<boolean> {
const request = context.switchToHttp().getRequest();
try {
await validateOrReject(plainToClass(CredentialDto, request.body), {
validationError: { target: false },
});
} catch (error) {
const messages = (error as any[])
.map((e) => e.constraints ?? {})
.reduce((o, n) => ({ ...o, ...n }), {});
throw new BadGatewayException(Object.values(messages));
}
return super.canActivate(context) as boolean;
}
}

View File

@ -16,6 +16,8 @@ import { AccessTokenEntity } from '@/modules/user/entities/access.token.entity';
import { RefreshTokenEntity } from '@/modules/user/entities/refresh.token.entity';
import { JwtConfig, JwtPayload, UserConfig } from '@/modules/user/types';
import { TokenConst } from '../constants';
/**
*
*/
@ -85,7 +87,10 @@ export class TokenService {
const refreshToken = new RefreshTokenEntity();
refreshToken.value = jwt.sign(
refreshTokenPayload,
this.configure.env.get('USER_REFRESH_TOKEN_EXPIRED', 'my-refresh-secret'),
this.configure.env.get(
TokenConst.USER_REFRESH_TOKEN_EXPIRED,
TokenConst.DEFAULT_USER_REFRESH_TOKEN_EXPIRED,
),
);
refreshToken.expiredAt = now.add(config.refreshTokenExpired, 'second').toDate();
refreshToken.accessToken = accessToken;
@ -136,7 +141,10 @@ export class TokenService {
async verifyAccessToken(token: AccessTokenEntity) {
const result = jwt.verify(
token.value,
this.configure.env.get('USER_TOKEN_SECRET', 'my-access-secret'),
this.configure.env.get(
TokenConst.USER_TOKEN_SECRET,
TokenConst.DEFAULT_USER_TOKEN_SECRET,
),
);
if (result) {
return token.user;
@ -152,7 +160,10 @@ export class TokenService {
defaultUserConfig(configure),
);
const options: JwtModuleOptions = {
secret: configure.env.get('USER_TOKEN_SECRET', 'my-access-secret'),
secret: configure.env.get(
TokenConst.USER_TOKEN_SECRET,
TokenConst.DEFAULT_USER_TOKEN_SECRET,
),
verifyOptions: {
ignoreExpiration: !configure.env.isProd(),
},

View File

@ -0,0 +1,37 @@
import { PassportStrategy } from '@nestjs/passport';
import { instanceToPlain } from 'class-transformer';
import { ExtractJwt, Strategy } from 'passport-jwt';
import { Configure } from '@/modules/config/configure';
import { TokenConst } from '../constants';
import { UserRepository } from '../repositories/UserRepository';
import { JwtPayload } from '../types';
export class JwtStrategy extends PassportStrategy(Strategy) {
constructor(
protected configure: Configure,
protected userRepository: UserRepository,
) {
const secret = configure.env.get(
TokenConst.USER_TOKEN_SECRET,
TokenConst.DEFAULT_USER_TOKEN_SECRET,
);
super({
jwtFromRequest: ExtractJwt.fromAuthHeaderAsBearerToken(),
ignoreExpiration: false,
secretOrKey: secret,
});
}
/**
* ID
* ID查询出用户是否存在,id放入request方便后续操作
* @param payload
*/
async validate(payload: JwtPayload) {
const user = await this.userRepository.findOneOrFail({ where: { id: payload.sub } });
return instanceToPlain(user);
}
}

View File

@ -0,0 +1,23 @@
import { Injectable, UnauthorizedException } from '@nestjs/common';
import { PassportStrategy } from '@nestjs/passport';
import { Strategy } from 'passport-local';
import { AuthService } from '../services/auth.service';
/**
*
*/
@Injectable()
export class LocalStrategy extends PassportStrategy(Strategy) {
constructor(protected authService: AuthService) {
super({ usernameField: 'credential', passwordField: 'password' });
}
async validate(credential: string, password: string): Promise<any> {
const user = await this.authService.validateUser(credential, password);
if (!user) {
throw new UnauthorizedException();
}
return user;
}
}