Compare commits

...

5 commits

Author SHA1 Message Date
1c8aee2fa0 feat: refresh and save token 2024-11-11 14:57:33 +00:00
b9dee09060 feat: request queue 2024-11-11 14:50:12 +00:00
4fc9ec59c8 fix: add refresh token to storage and check if it is expired 2024-11-08 18:40:33 +00:00
2a05becbb3 feat: check if token is expired or invalid 2024-11-08 12:35:02 +00:00
67bc310158 feat: pass signOut function to api interceptor
So it can logout the user when the token expires and refresh token fails
2024-11-08 11:50:57 +00:00
3 changed files with 108 additions and 19 deletions

View file

@ -32,11 +32,15 @@ export function AuthContextProvider({ children }: AuthContextProviderProps) {
setUser(userData);
}
async function saveUserAndTokenStorageData(userData: UserDTO, token: string) {
async function saveUserAndTokenStorageData(
userData: UserDTO,
token: string,
refresh_token: string,
) {
try {
setIsLoadingUserStorageData(true);
await storageUserSave(userData);
await storageAuthTokenSave(token);
await storageAuthTokenSave({ token, refresh_token });
} catch (error) {
throw error;
} finally {
@ -48,8 +52,8 @@ export function AuthContextProvider({ children }: AuthContextProviderProps) {
try {
const { data } = await api.post('/sessions', { email, password });
if (data.user && data.token) {
saveUserAndTokenStorageData(data.user, data.token);
if (data.user && data.token && data.refresh_token) {
saveUserAndTokenStorageData(data.user, data.token, data.refresh_token);
updateUserAndTokenData(data.user, data.token);
}
} catch (error) {
@ -86,7 +90,7 @@ export function AuthContextProvider({ children }: AuthContextProviderProps) {
setIsLoadingUserStorageData(true);
const loggedUser = await storageUserGet();
const token = await storageAuthTokenGet();
const { token } = await storageAuthTokenGet();
if (loggedUser && token) {
updateUserAndTokenData(loggedUser, token);
@ -102,6 +106,14 @@ export function AuthContextProvider({ children }: AuthContextProviderProps) {
loadUserData();
}, []);
useEffect(() => {
const subscription = api.registerInterceptTokenManager(signOut);
return () => {
subscription();
};
}, []);
return (
<AuthContext.Provider
value={{ user, signIn, signOut, updateUserData, isLoadingUserStorageData }}>

View file

@ -1,10 +1,23 @@
import axios from 'axios';
import axios, { AxiosError, AxiosInstance } from 'axios';
import { AppError } from '@utils/AppError';
import { storageAuthTokenGet, storageAuthTokenSave } from '@storage/storageAuthToken';
type SignOut = () => void;
type PromiseType = {
onSuccess: (token: string) => void;
onFailure: (error: AxiosError) => void;
};
type APIInstanceProps = AxiosInstance & {
registerInterceptTokenManager: (signOut: SignOut) => () => void;
};
const api = axios.create({
baseURL: 'http://192.168.0.61:3333',
});
}) as APIInstanceProps;
api.interceptors.request.use(
(config) => {
@ -15,14 +28,71 @@ api.interceptors.request.use(
},
);
api.interceptors.response.use(
let failedQueue: Array<PromiseType> = [];
let isRefreshing = false;
api.registerInterceptTokenManager = (signOut: SignOut) => {
const interceptTokenManager = api.interceptors.response.use(
(response) => response,
(error) => {
if (error.response && error.response.data) {
return Promise.reject(new AppError(error.response.data.message));
async (requestError) => {
if (requestError?.response?.status === 401) {
if (
requestError.response.data?.message === 'token.expired' ||
requestError.response.data?.message === 'token.invalid'
) {
const { refresh_token } = await storageAuthTokenGet();
if (!refresh_token) {
signOut();
return Promise.reject(requestError);
}
return Promise.reject(error);
const originalRequestConfig = requestError.config;
if (isRefreshing) {
return new Promise((resolve, reject) => {
failedQueue.push({
onSuccess: (token: string) => {
originalRequestConfig.headers.Authorization = `Bearer ${token}`;
resolve(api(originalRequestConfig));
},
onFailure: (error: AxiosError) => {
reject(error);
},
});
});
}
isRefreshing = true;
return new Promise(async (resolve, reject) => {
try {
const { data } = api.post('/sessions/refresh_token', { refresh_token });
await storageAuthTokenSave({ token: data.token, refresh_token: data.refresh_token });
} catch (error: any) {
failedQueue.forEach((request) => request.onFailure(error));
signOut();
reject(error);
} finally {
isRefreshing = false;
failedQueue = [];
}
});
}
signOut();
}
if (requestError.response && requestError.response.data) {
return Promise.reject(new AppError(requestError.response.data.message));
}
return Promise.reject(requestError);
},
);
return () => {
api.interceptors.response.eject(interceptTokenManager);
};
};
export { api };

View file

@ -2,12 +2,19 @@ import AsyncStorage from '@react-native-async-storage/async-storage';
import { TOKEN_STORAGE } from './storageConfig';
export async function storageAuthTokenSave(token: string) {
await AsyncStorage.setItem(TOKEN_STORAGE, token);
type AuthTokenStorageProps = {
token: string;
refresh_token?: string;
};
export async function storageAuthTokenSave({ token, refresh_token }: AuthTokenStorageProps) {
await AsyncStorage.setItem(TOKEN_STORAGE, JSON.stringify({ token, refresh_token }));
}
export async function storageAuthTokenGet() {
return await AsyncStorage.getItem(TOKEN_STORAGE);
const response = await AsyncStorage.getItem(TOKEN_STORAGE);
const { token, refresh_token }: AuthTokenStorageProps = response ? JSON.parse(response) : {};
return { token, refresh_token };
}
export async function storageAuthTokenRemove() {