..
Viewing
index.js
80 lines (76 loc) • 1.9 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80 | // API for logging in
const express = require("express");
const router = express.Router();
const jwt = require("jsonwebtoken");
const bcyrpt = require("bcryptjs");
const userController = require("../../controllers/users.controller");
const { verifyJWT } = require("../../functions");
require("dotenv").config();
router.post("/verify", (req, res) => {
// get token from auth header
const token = req.headers.authorization;
// verify token
const decoded = verifyJWT(token.replace("Bearer ", ""));
if (decoded) {
res.status(200).json({
message: "Token is valid",
decoded: decoded,
});
} else {
res.status(401).json({
message: "Token is invalid",
});
}
});
router.post("/create", (req, res) => {
const { username, password } = req.body;
const saltRounds = 10;
const hash = bcyrpt.hashSync(password, saltRounds);
userController.create(username, hash).then((user) => {
const token = jwt.sign({ id: user.id }, process.env.JWT_SECRET, {
expiresIn: "1h",
});
res.json({
token,
user,
});
});
});
router.post("/login", (req, res) => {
const { username, password } = req.body;
// get user by username
userController.findByUsername(username).then((user) => {
if (!user) {
return res.status(400).json({
message: "User not found",
});
}
// check if password is correct
bcyrpt.compare(password, user.password).then((isMatch) => {
if (!isMatch) {
return res.status(400).json({
message: "Invalid credentials",
});
}
// generate jwt
const payload = {
id: user.id,
username: user.username,
};
jwt.sign(
payload,
process.env.JWT_SECRET,
{
expiresIn: 60 * 60 * 24 * 7,
},
(err, token) => {
if (err) throw err;
res.json({
token,
});
}
);
});
});
});
module.exports = router;
|
|