65 lines
1.8 KiB
TypeScript
65 lines
1.8 KiB
TypeScript
import 'server-only'
|
|
import { SignJWT, jwtVerify } from 'jose'
|
|
import { SessionPayload } from '@/app/_lib/definitions'
|
|
import { cookies } from 'next/headers'
|
|
|
|
const secretKey = process.env.SESSION_SECRET
|
|
const encodedKey = new TextEncoder().encode(secretKey)
|
|
|
|
export async function encrypt(payload: SessionPayload) {
|
|
return new SignJWT(payload)
|
|
.setProtectedHeader({ alg: 'HS256' })
|
|
.setIssuedAt()
|
|
.setExpirationTime('7d')
|
|
.sign(encodedKey)
|
|
}
|
|
|
|
export async function decrypt(session: string | undefined = '') {
|
|
try {
|
|
if (!session) {
|
|
throw new Error('Session is empty or undefined');
|
|
}
|
|
const { payload } = await jwtVerify(session, encodedKey, {
|
|
algorithms: ['HS256'],
|
|
})
|
|
return payload
|
|
} catch (error) {
|
|
console.log('Failed to verify session')
|
|
}
|
|
}
|
|
export async function createSession(userId: string) {
|
|
const expiresAt = new Date(Date.now() + 7 * 24 * 60 * 60 * 1000)
|
|
const session = await encrypt({ userId, expiresAt })
|
|
const cookieStore = await cookies()
|
|
|
|
cookieStore.set('session', session, {
|
|
httpOnly: true,
|
|
secure: true,
|
|
expires: expiresAt,
|
|
sameSite: 'lax',
|
|
path: '/',
|
|
})
|
|
}
|
|
export async function updateSession() {
|
|
const session = (await cookies()).get('session')?.value
|
|
const payload = await decrypt(session)
|
|
|
|
if (!session || !payload) {
|
|
return null
|
|
}
|
|
|
|
const expires = new Date(Date.now() + 7 * 24 * 60 * 60 * 1000)
|
|
|
|
const cookieStore = await cookies()
|
|
cookieStore.set('session', session, {
|
|
httpOnly: true,
|
|
secure: true,
|
|
expires: expires,
|
|
sameSite: 'lax',
|
|
path: '/',
|
|
})
|
|
}
|
|
export async function deleteSession() {
|
|
const cookieStore = await cookies()
|
|
cookieStore.delete('session')
|
|
} |