sol-auth 1.0.6 → 1.0.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +22 -22
- package/dist/auth/auth.service.js +5 -3
- package/dist/auth/auth.service.js.map +1 -1
- package/package.json +1 -1
- package/src/auth/auth.service.ts +10 -9
package/README.md
CHANGED
|
@@ -8,70 +8,70 @@ Just import and use it in your project.
|
|
|
8
8
|
|
|
9
9
|
# Install
|
|
10
10
|
---
|
|
11
|
-
```
|
|
11
|
+
```
|
|
12
|
+
npm i sol-auth
|
|
12
13
|
```
|
|
13
14
|
# Uses
|
|
14
15
|
---
|
|
15
16
|
|
|
16
17
|
Import the package
|
|
17
18
|
|
|
18
|
-
```
|
|
19
|
+
```
|
|
20
|
+
const auth = require("sol-auth");
|
|
19
21
|
```
|
|
20
22
|
|
|
21
23
|
SignIn Option
|
|
22
24
|
|
|
23
|
-
```
|
|
25
|
+
```
|
|
26
|
+
auth.signUp({
|
|
24
27
|
username: username,
|
|
25
28
|
password: pass,
|
|
26
29
|
salt: salt
|
|
27
|
-
|
|
30
|
+
});
|
|
28
31
|
```
|
|
29
32
|
|
|
30
33
|
LogIn Option
|
|
31
34
|
|
|
32
|
-
```
|
|
35
|
+
```
|
|
36
|
+
auth.logIn({
|
|
33
37
|
username: username,
|
|
34
38
|
password: password,
|
|
35
39
|
hashPassword: hashPassword
|
|
36
|
-
|
|
40
|
+
});
|
|
37
41
|
```
|
|
38
42
|
|
|
39
43
|
LogIn with JWT Token
|
|
40
44
|
|
|
41
|
-
```
|
|
45
|
+
```
|
|
46
|
+
auth.logIn({
|
|
42
47
|
username: username,
|
|
43
48
|
password: password ,
|
|
44
49
|
hashPassword: hashPassword ,
|
|
45
50
|
payload , secret, expiresIn
|
|
46
|
-
|
|
51
|
+
});
|
|
47
52
|
```
|
|
48
53
|
|
|
49
|
-
Examples
|
|
54
|
+
# Examples
|
|
50
55
|
|
|
51
56
|
```
|
|
52
|
-
|
|
53
|
-
|
|
57
|
+
const signUpFunction = async () => {
|
|
58
|
+
const signinData = await auth.signUp({
|
|
54
59
|
username: username,
|
|
55
60
|
password: pass,
|
|
56
61
|
salt: salt
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
console.log(signData);
|
|
60
|
-
}
|
|
62
|
+
});
|
|
63
|
+
}
|
|
61
64
|
|
|
62
65
|
signInFunction()
|
|
63
66
|
```
|
|
64
67
|
```
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
const loginData = await auth.logIn({
|
|
68
|
+
const logInFunction = async () =>{
|
|
69
|
+
const loginData = await auth.logIn({
|
|
68
70
|
username: username,
|
|
69
71
|
password: pass ,
|
|
70
72
|
hashPassword: hashPassword
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
console.log(loginData);
|
|
74
|
-
}
|
|
73
|
+
});
|
|
74
|
+
}
|
|
75
75
|
|
|
76
76
|
logInFunction()
|
|
77
77
|
```
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
const bcrypt = require("bcrypt");
|
|
4
4
|
const jwt = require("jsonwebtoken");
|
|
5
|
-
async function
|
|
5
|
+
async function signUp({ username, email, password, salt }) {
|
|
6
6
|
if (!((username || email) && password)) {
|
|
7
7
|
return Error("Missing Field");
|
|
8
8
|
}
|
|
@@ -27,7 +27,9 @@ async function signIn({ username, email, password, salt }) {
|
|
|
27
27
|
return Error('Password must contain at least one symbol');
|
|
28
28
|
}
|
|
29
29
|
const hashPassword = await bcrypt.hash(password, salt);
|
|
30
|
-
return {
|
|
30
|
+
return {
|
|
31
|
+
username, email, hashPassword
|
|
32
|
+
};
|
|
31
33
|
}
|
|
32
34
|
async function logIn({ username, email, password, hashPassword, payload, secret, expiresIn }) {
|
|
33
35
|
if (!((username || email) && password)) {
|
|
@@ -43,5 +45,5 @@ async function logIn({ username, email, password, hashPassword, payload, secret,
|
|
|
43
45
|
}
|
|
44
46
|
return { username, email, password: isPasswordValid, token };
|
|
45
47
|
}
|
|
46
|
-
module.exports = {
|
|
48
|
+
module.exports = { signUp, logIn };
|
|
47
49
|
//# sourceMappingURL=auth.service.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth.service.js","sourceRoot":"","sources":["../../src/auth/auth.service.ts"],"names":[],"mappings":";;AAAA,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;AAChC,MAAM,GAAG,GAAG,OAAO,CAAC,cAAc,CAAC,CAAA;
|
|
1
|
+
{"version":3,"file":"auth.service.js","sourceRoot":"","sources":["../../src/auth/auth.service.ts"],"names":[],"mappings":";;AAAA,MAAM,MAAM,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;AAChC,MAAM,GAAG,GAAG,OAAO,CAAC,cAAc,CAAC,CAAA;AAwBnC,KAAK,UAAU,MAAM,CAAC,EAAE,QAAQ,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAe;IAElE,IAAI,CAAC,CAAC,CAAC,QAAQ,IAAI,KAAK,CAAC,IAAI,QAAQ,CAAC,EAAE,CAAC;QACrC,OAAO,KAAK,CAAC,eAAe,CAAC,CAAA;IACjC,CAAC;IAED,IAAI,KAAK,EAAE,CAAC;QACR,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACvB,OAAO,KAAK,CAAC,yBAAyB,CAAC,CAAA;QAC3C,CAAC;IACL,CAAC;IAGD,IAAI,QAAQ,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;QACvB,OAAO,KAAK,CAAC,6BAA6B,CAAC,CAAA;IAC/C,CAAC;IAED,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACjC,OAAO,KAAK,CAAC,qDAAqD,CAAC,CAAA;IACvE,CAAC;SAAM,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACvC,OAAO,KAAK,CAAC,qDAAqD,CAAC,CAAA;IACvE,CAAC;SAAM,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACpC,OAAO,KAAK,CAAC,0CAA0C,CAAC,CAAA;IAC5D,CAAC;SAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC3C,OAAO,KAAK,CAAC,2CAA2C,CAAC,CAAA;IAC7D,CAAC;IAED,MAAM,YAAY,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAA;IAEtD,OAAO;QACH,QAAQ,EAAG,KAAK,EAAE,YAAY;KACjC,CAAA;AAEL,CAAC;AAED,KAAK,UAAU,KAAK,CAAC,EAAE,QAAQ,EAAE,KAAK,EAAE,QAAQ,EAAE,YAAY,EAAE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAY;IAClG,IAAI,CAAC,CAAC,CAAC,QAAQ,IAAI,KAAK,CAAC,IAAI,QAAQ,CAAC,EAAE,CAAC;QACrC,OAAO,KAAK,CAAC,eAAe,CAAC,CAAA;IACjC,CAAC;IAED,MAAM,eAAe,GAAG,MAAM,MAAM,CAAC,OAAO,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAA;IAEpE,IAAI,CAAC,eAAe,EAAE,CAAC;QACnB,OAAO,KAAK,CAAC,uBAAuB,CAAC,CAAA;IACzC,CAAC;IAED,IAAI,KAAK,GAAwB,SAAS,CAAA;IAE1C,IAAI,OAAO,IAAI,MAAM,EAAE,CAAC;QACpB,KAAK,GAAG,GAAG,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE,EAAE,SAAS,EAAE,SAAS,IAAI,KAAK,EAAE,CAAC,CAAA;IAC5E,CAAC;IAGD,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,QAAQ,EAAE,eAAe,EAAE,KAAK,EAAE,CAAA;AAChE,CAAC;AAID,MAAM,CAAC,OAAO,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,CAAA"}
|
package/package.json
CHANGED
package/src/auth/auth.service.ts
CHANGED
|
@@ -1,13 +1,15 @@
|
|
|
1
1
|
const bcrypt = require("bcrypt")
|
|
2
2
|
const jwt = require("jsonwebtoken")
|
|
3
3
|
|
|
4
|
-
interface
|
|
4
|
+
interface signUpInput {
|
|
5
5
|
username?: string,
|
|
6
6
|
email?: string,
|
|
7
7
|
password: string,
|
|
8
8
|
salt: Number
|
|
9
9
|
}
|
|
10
10
|
|
|
11
|
+
|
|
12
|
+
|
|
11
13
|
interface logInput {
|
|
12
14
|
username?: string,
|
|
13
15
|
email?: string,
|
|
@@ -19,15 +21,14 @@ interface logInput {
|
|
|
19
21
|
}
|
|
20
22
|
|
|
21
23
|
|
|
22
|
-
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
async function signUp({ username, email, password, salt }: signUpInput) {
|
|
23
27
|
|
|
24
28
|
if (!((username || email) && password)) {
|
|
25
29
|
return Error("Missing Field")
|
|
26
30
|
}
|
|
27
31
|
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
32
|
if (email) {
|
|
32
33
|
if (!email.includes("@")) {
|
|
33
34
|
return Error("Email should contains @")
|
|
@@ -51,8 +52,9 @@ async function signIn({ username, email, password, salt }: signInput) {
|
|
|
51
52
|
|
|
52
53
|
const hashPassword = await bcrypt.hash(password, salt)
|
|
53
54
|
|
|
54
|
-
return {
|
|
55
|
-
|
|
55
|
+
return {
|
|
56
|
+
username , email, hashPassword
|
|
57
|
+
}
|
|
56
58
|
|
|
57
59
|
}
|
|
58
60
|
|
|
@@ -74,10 +76,9 @@ async function logIn({ username, email, password, hashPassword, payload, secret,
|
|
|
74
76
|
}
|
|
75
77
|
|
|
76
78
|
|
|
77
|
-
|
|
78
79
|
return { username, email, password: isPasswordValid, token }
|
|
79
80
|
}
|
|
80
81
|
|
|
81
82
|
|
|
82
83
|
|
|
83
|
-
module.exports = {
|
|
84
|
+
module.exports = { signUp, logIn }
|