Skip to content

Commit 446c6b1

Browse files
committed
Update js version 2.0.0 & react 1.2.0
1 parent a171f97 commit 446c6b1

File tree

20 files changed

+22186
-19770
lines changed

20 files changed

+22186
-19770
lines changed

with-express-js/auth_middleware.js

+16-13
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,41 @@
1-
const { Authorizer } = require("@authorizerdev/authorizer-js");
1+
const { Authorizer } = require('@authorizerdev/authorizer-js');
22

33
const authRef = new Authorizer({
4-
authorizerURL: "https://demo.authorizer.dev",
5-
redirectURL: "https://demo.authorizer.dev/app",
6-
clientID: "96fed66c-9779-4694-a79a-260fc489ce33",
4+
authorizerURL: 'https://demo.authorizer.dev',
5+
redirectURL: 'https://demo.authorizer.dev/app',
6+
clientID: '96fed66c-9779-4694-a79a-260fc489ce33',
77
});
88

99
const authMiddleware = async (req, res, next) => {
1010
const authHeader = req.headers.authorization;
1111
if (!authHeader) {
12-
return res.status(403).json({ error: "Authorization not found" });
12+
return res.status(403).json({ error: 'Authorization not found' });
1313
}
1414

15-
const splitHeader = authHeader.split(" ");
15+
const splitHeader = authHeader.split(' ');
1616
if (splitHeader.length != 2) {
17-
return res.status(403).json({ error: "Invalid auth header" });
17+
return res.status(403).json({ error: 'Invalid auth header' });
1818
}
1919

20-
if (splitHeader[0].toLowerCase() != "bearer") {
21-
return res.status(403).json({ error: "Bearer token not found" });
20+
if (splitHeader[0].toLowerCase() != 'bearer') {
21+
return res.status(403).json({ error: 'Bearer token not found' });
2222
}
2323

2424
const token = splitHeader[1];
2525
// Validate jwt token via authorizer sdk
2626
try {
27-
const res = await authRef.validateJWTToken({
27+
const { data, errors } = await authRef.validateJWTToken({
2828
token,
29-
token_type: "id_token", // This can be access_token, refresh_token
29+
token_type: 'id_token', // This can be access_token, refresh_token
3030
// roles: [user] // specify roles that you want to validate jwt for, by default it will just verify jwt.
3131
});
32-
req.user = res.claims;
32+
if (errors.length) {
33+
throw new Error(errors[0].message);
34+
}
35+
req.user = data.claims;
3336
} catch (err) {
3437
console.error(err);
35-
return res.status(403).json({ error: "Invalid JWT token" });
38+
return res.status(403).json({ error: 'Invalid JWT token' });
3639
}
3740

3841
next();

with-express-js/package-lock.json

+11-8
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

with-express-js/package.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
"author": "Lakhan Samani",
1212
"license": "ISC",
1313
"dependencies": {
14-
"@authorizerdev/authorizer-js": "^1.1.3",
14+
"@authorizerdev/authorizer-js": "^2.0.0",
1515
"express": "^4.18.2"
1616
}
1717
}

0 commit comments

Comments
 (0)