57 lines
1.4 KiB
TypeScript
57 lines
1.4 KiB
TypeScript
"use server";
|
|
|
|
import { SignJWT, jwtVerify, JWTPayload } from "jose";
|
|
import { cookies } from "next/headers";
|
|
|
|
const secretKey = process.env.SESSION_SECRET;
|
|
const key = new TextEncoder().encode(secretKey);
|
|
|
|
type SessionPayload = JWTPayload & {
|
|
user?: { name: string };
|
|
expires?: Date;
|
|
};
|
|
|
|
export async function encrypt(payload: SessionPayload) {
|
|
return await new SignJWT(payload)
|
|
.setProtectedHeader({ alg: "HS256" })
|
|
.setIssuedAt()
|
|
.setExpirationTime("7d")
|
|
.sign(key);
|
|
}
|
|
|
|
export async function decrypt(session: string | undefined = "") {
|
|
try {
|
|
const { payload } = await jwtVerify(session, key, {
|
|
algorithms: ["HS256"],
|
|
});
|
|
return payload;
|
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
|
} catch (error) {
|
|
return null;
|
|
}
|
|
}
|
|
|
|
export async function login(name: string) {
|
|
// Verify credentials && get the user
|
|
|
|
const user = { name: name };
|
|
|
|
// Create the session
|
|
const expires = new Date(Date.now() + 7 * 24 * 60 * 60 * 1000);
|
|
const session = await encrypt({ user, expires });
|
|
|
|
// Save the session in a cookie
|
|
(await cookies()).set("session", session, { expires, httpOnly: true });
|
|
}
|
|
|
|
export async function logout() {
|
|
// Destroy the session
|
|
(await cookies()).set("session", "", { expires: new Date(0) });
|
|
}
|
|
|
|
export async function getSession() {
|
|
const session = (await cookies()).get("session")?.value;
|
|
if (!session) return null;
|
|
return await decrypt(session);
|
|
}
|