fpavon-ee-shared 1.0.20 → 1.0.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -40,14 +40,14 @@ exports.validarToken = asyncHandlerWrapper;
|
|
|
40
40
|
const validarToken = (req, res, next) => __awaiter(void 0, void 0, void 0, function* () {
|
|
41
41
|
try {
|
|
42
42
|
const bearerHeader = req.header('Authorization') || "";
|
|
43
|
-
console.error("bearerHeader: validarToken ", bearerHeader);
|
|
44
43
|
if (bearerHeader !== "") {
|
|
45
44
|
const bearer = bearerHeader.split(" ");
|
|
46
45
|
let token = bearer[1];
|
|
47
46
|
// Limpio el token de comillas por las dudas
|
|
48
47
|
token = token.replace(/['"]+/g, '');
|
|
48
|
+
console.error("token: validarToken ", token);
|
|
49
49
|
const secret = getSecret();
|
|
50
|
-
let data = jsonwebtoken_1.default.verify(token,
|
|
50
|
+
let data = jsonwebtoken_1.default.verify(token, secret);
|
|
51
51
|
const { afiliado, idNavegador } = data;
|
|
52
52
|
// Verificar si el usuario está deslogueado
|
|
53
53
|
const queryVerificar = `SELECT logueado, idNavegador FROM Usuarios WHERE afiliado = '${data.afiliado}'`;
|
|
@@ -131,9 +131,9 @@ exports.extraerNivel = extraerNivel;
|
|
|
131
131
|
//Para generar token que se usará en el front end
|
|
132
132
|
const cifrado = (usuario) => {
|
|
133
133
|
const secreto = getSecret();
|
|
134
|
-
console.error("SECRET: cifrado ", secreto);
|
|
135
134
|
return new Promise((resolve, reject) => {
|
|
136
135
|
jsonwebtoken_1.default.sign(usuario, secreto, { expiresIn: '12h' }, (err, token) => {
|
|
136
|
+
console.error("token: cifrado ", token);
|
|
137
137
|
return err ? reject("no se pudo generar el JWT") : resolve(token);
|
|
138
138
|
});
|
|
139
139
|
});
|
|
@@ -33,15 +33,16 @@ const asyncHandlerWrapper: RequestHandler = (req: Request, res: Response, next:
|
|
|
33
33
|
const validarToken = async (req: Request, res: Response, next: NextFunction): Promise<void> => {
|
|
34
34
|
try {
|
|
35
35
|
const bearerHeader = req.header('Authorization') || "";
|
|
36
|
-
console.error("bearerHeader: validarToken ", bearerHeader)
|
|
37
36
|
|
|
38
37
|
if (bearerHeader !== "") {
|
|
39
38
|
const bearer = bearerHeader.split(" ");
|
|
40
39
|
let token = bearer[1];
|
|
41
40
|
// Limpio el token de comillas por las dudas
|
|
42
41
|
token = token.replace(/['"]+/g, '');
|
|
42
|
+
console.error("token: validarToken ", token)
|
|
43
|
+
|
|
43
44
|
const secret = getSecret();
|
|
44
|
-
let data: any = jwt.verify(token,
|
|
45
|
+
let data: any = jwt.verify(token, secret);
|
|
45
46
|
const { afiliado, idNavegador } = data;
|
|
46
47
|
|
|
47
48
|
// Verificar si el usuario está deslogueado
|
|
@@ -143,11 +144,11 @@ export const cifrado = (usuario:any)=>{
|
|
|
143
144
|
|
|
144
145
|
|
|
145
146
|
const secreto:any= getSecret();
|
|
146
|
-
console.error("SECRET: cifrado ", secreto)
|
|
147
|
-
|
|
148
147
|
return new Promise((resolve:any,reject:any)=>{
|
|
149
148
|
|
|
150
149
|
jwt.sign(usuario, secreto ,{expiresIn:'12h'},(err,token)=>{
|
|
150
|
+
console.error("token: cifrado ", token)
|
|
151
|
+
|
|
151
152
|
return err ? reject("no se pudo generar el JWT") : resolve(token);
|
|
152
153
|
});
|
|
153
154
|
|