diff options
author | Joseph Ditton <jditton.atomic@gmail.com> | 2022-03-08 18:18:38 -0700 |
---|---|---|
committer | Joseph Ditton <jditton.atomic@gmail.com> | 2022-03-08 18:18:38 -0700 |
commit | 1b7c6ee006b50ce29c9cb3ee42fad29b7db0f6f3 (patch) | |
tree | 3e9cd6e10f81a65f76478910f6feb1b89d6ce1dc /server/providers | |
parent | 0f1009bf0ab0c79f480e8160a796d59e36d522fb (diff) | |
download | locchat-1b7c6ee006b50ce29c9cb3ee42fad29b7db0f6f3.tar.gz locchat-1b7c6ee006b50ce29c9cb3ee42fad29b7db0f6f3.zip |
finish gateway websocket example
Diffstat (limited to 'server/providers')
-rw-r--r-- | server/providers/gateways/ping.gateway.ts | 68 | ||||
-rw-r--r-- | server/providers/guards/gatewayauth.guard.ts | 27 |
2 files changed, 89 insertions, 6 deletions
diff --git a/server/providers/gateways/ping.gateway.ts b/server/providers/gateways/ping.gateway.ts index 6abc034..27fe785 100644 --- a/server/providers/gateways/ping.gateway.ts +++ b/server/providers/gateways/ping.gateway.ts @@ -1,11 +1,67 @@ -import { SubscribeMessage, WebSocketGateway } from '@nestjs/websockets'; +import { UseGuards } from '@nestjs/common'; +import { ConnectedSocket, MessageBody, OnGatewayConnection, OnGatewayDisconnect, OnGatewayInit, SubscribeMessage, WebSocketGateway, WebSocketServer, WsException } from '@nestjs/websockets'; +import { GatewayJwtBody } from 'server/decorators/gateway_jwt_body.decorator'; +import { JwtBodyDto } from 'server/dto/jwt_body.dto'; +import { Server, Socket } from 'socket.io'; +import { GatewayAuthGuard } from '../guards/gatewayauth.guard'; +import { JwtService } from '../services/jwt.service'; + +class JoinPayload { + currentRoom?: string; + newRoom: string; +} + +class PingPayload { + currentRoom: string; +} @WebSocketGateway() -export class PingGateway { - constructor() {} +@UseGuards(GatewayAuthGuard) +export class PingGateway implements OnGatewayInit, OnGatewayConnection, OnGatewayDisconnect { + @WebSocketServer() + server: Server; + + constructor(private jwtService: JwtService) {} + + afterInit(server: Server) { + console.log('Sockets initialized'); + } + + handleConnection(client: Socket) { + // you can do things like add users to rooms + // or emit events here. + // IMPORTANT! The GatewayAuthGuard doesn't trigger on these handlers + // if you need to do anything in this method you need to authenticate the JWT + // manually. + try { + const jwt = client.handshake.auth.token; + const jwtBody = this.jwtService.parseToken(jwt); + console.log(client.handshake.query); + console.log('Client Connected: ', jwtBody.userId); + } catch (e) { + throw new WsException('Invalid token'); + } + } + + handleDisconnect(client: Socket) { + console.log('Client Disconnected'); + } + + @SubscribeMessage('ping') + public handlePing( + @ConnectedSocket() client: Socket, + @MessageBody() payload: PingPayload, + @GatewayJwtBody() jwtBody: JwtBodyDto, + ) { + this.server.to(payload.currentRoom).emit('pong', { message: { userId: jwtBody.userId } }); + console.log(client.rooms); + } - @SubscribeMessage('ping/:id') - public handlePing() { - return { message: 'recieved ping' }; + @SubscribeMessage('join-room') + public async joinRoom(client: Socket, payload: JoinPayload) { + console.log(payload); + payload.currentRoom && (await client.leave(payload.currentRoom)); + await client.join(payload.newRoom); + return { msg: 'Joined room', room: payload.newRoom }; } } diff --git a/server/providers/guards/gatewayauth.guard.ts b/server/providers/guards/gatewayauth.guard.ts new file mode 100644 index 0000000..0843752 --- /dev/null +++ b/server/providers/guards/gatewayauth.guard.ts @@ -0,0 +1,27 @@ +import { Injectable, CanActivate, ExecutionContext } from '@nestjs/common'; +import { JwtService } from '../services/jwt.service'; +import { GuardUtil } from '../util/guard.util'; +import { Socket } from 'socket.io'; +import { WsException } from '@nestjs/websockets'; + +@Injectable() +export class GatewayAuthGuard implements CanActivate { + constructor(private guardUtil: GuardUtil, private jwtService: JwtService) {} + + canActivate(context: ExecutionContext) { + // Handlers and Controllers can both skip this guard in the event that + if (this.guardUtil.shouldSkip(this, context)) { + return true; + } + + const req = context.switchToHttp().getRequest() as Socket; + const jwt = req.handshake.auth.token; + if (!jwt) throw new WsException('Invalid auth token'); + try { + req.handshake.auth.jwtBody = this.jwtService.parseToken(jwt); + } catch (e) { + throw new WsException('Invalid auth token'); + } + return true; + } +} |