async parse(token) { if (token) { try { return jwt.verify(token, secret); } catch (err) { return null; } } return null; }
app.get('/playground/context', catchErrors((req, res) => { this.cubejsServer.event('Dev Server Env Open'); res.json({ cubejsToken: jwt.sign({}, this.cubejsServer.apiSecret, { expiresIn: '1d' }), apiUrl: process.env.CUBEJS_API_URL, anonymousId: this.cubejsServer.anonymousId, coreServerVersion: this.cubejsServer.coreServerVersion, projectFingerprint: this.cubejsServer.projectFingerprint }); }));
async create(userInfo) { const token = jwt.sign(userInfo, secret); return token; }
const saslOAuthBearerConnectionOpts = () => Object.assign(sslConnectionOpts(), { port: 9094, sasl: { mechanism: 'oauthbearer', oauthBearerProvider: () => { const token = jwt.sign({ sub: 'test' }, 'abc', { algorithm: 'none' }) return { value: token, } }, }, })
async function getSessions () { let tokens = {} try { const data = await readFile(credentialsPath) tokens = JSON.parse(data) } catch (err) {} const sessions = {} Object.keys(tokens).forEach((url) => { sessions[url] = validateToken(tokens[url]) ? jwt.decode(tokens[url]) : null }) return sessions }
test('will include JWT claims as jwtClaims in context callback', async () => { const pgClient = { query: jest.fn(), release: jest.fn() }; const pgPool = { connect: jest.fn(() => pgClient) }; const { jwtClaims } = await withPostGraphileContext( { pgPool, jwtToken: jwt.sign({ aud: 'postgraphile', a: 1, b: 2, c: 3 }, 'secret', { noTimestamp: true, }), jwtSecret: 'secret', }, context => context, ); expect(jwtClaims).toEqual({ aud: 'postgraphile', a: 1, b: 2, c: 3 }); });
/** * Check that a JWT has Ask terms accepted. */ function validateAskPermission (token) { const header = jwt.decode(token) return validateToken(token) && header[ASK_CLAIM_KEY] }
async parse(token) { if (token) { try { return jwt.verify(token, secret); } catch (err) { return null; } } return null; }
async create(userInfo) { const token = jwt.sign(userInfo, secret); return token; }