|
1 |
| -const catchError = require('../utils/catchError') |
2 |
| -const UserModel = require('../models/userSchema') |
3 |
| -const jwt = require('jsonwebtoken') |
4 |
| -const bcrypt = require('bcryptjs') |
5 |
| -const validator = require('validator') |
6 |
| -const { config } = require('../configs/config') |
7 |
| - |
8 |
| -const testRoute = catchError(async (req, res) => { |
9 |
| - res.json({ success: true, message: 'API IS WORKING 🥳' }) |
10 |
| -}) |
11 |
| - |
12 |
| -const login = catchError(async (req, res) => { |
13 |
| - try { |
14 |
| - const { email, password } = req.body |
15 |
| - const user = await UserModel.findOne({ email }) |
16 |
| - if (!user) { |
17 |
| - return res.status(404).json({ |
18 |
| - success: false, |
19 |
| - message: 'Invalid credentials', |
20 |
| - }) |
21 |
| - } |
22 |
| - const isPasswordMatch = await bcrypt.compare(password, user.password) |
23 |
| - if (!isPasswordMatch) { |
24 |
| - return res.status(401).json({ |
25 |
| - success: false, |
26 |
| - message: 'Invalid credentials', |
27 |
| - }) |
28 |
| - } |
29 |
| - const token = jwt.sign({ userId: user._id }, config.JWT_SECRET) |
30 |
| - const expireTime = parseInt(config.JWT_COOKIE_EXPIRES_IN) |
31 |
| - |
32 |
| - const cookieOptions = { |
33 |
| - expires: new Date(Date.now() + expireTime * 24 * 60 * 60 * 1000), |
34 |
| - httpOnly: true, |
35 |
| - secure: req.secure || req.headers['x-forwarded-proto'] === 'https', |
36 |
| - sameSite: 'strict', |
37 |
| - } |
38 |
| - res.cookie('jwt', token, cookieOptions) |
39 |
| - user.password = undefined |
40 |
| - user.cpassword = undefined |
41 |
| - res.setHeader('Authorization', `Bearer ${token}`) |
42 |
| - |
43 |
| - res.status(200).json({ success: true, data: user, jwt_token: token }) |
44 |
| - } catch (error) { |
45 |
| - console.error('Login error:', error) |
46 |
| - res.status(500).json({ |
47 |
| - success: false, |
48 |
| - message: 'Internal server error', |
49 |
| - }) |
50 |
| - } |
51 |
| -}) |
52 |
| - |
53 |
| -const register = catchError(async (req, res) => { |
54 |
| - const { name, email, password, cpassword } = req.body |
55 |
| - |
56 |
| - if ( |
57 |
| - !name || |
58 |
| - !email || |
59 |
| - !password || |
60 |
| - !cpassword || |
61 |
| - !validator.isEmail(email) |
62 |
| - ) { |
63 |
| - return res |
64 |
| - .status(400) |
65 |
| - .json({ message: 'Invalid input data!', success: false }) |
66 |
| - } |
67 |
| - const checkUser = await UserModel.findOne({ email }) |
68 |
| - if (checkUser) { |
69 |
| - return res |
70 |
| - .status(409) |
71 |
| - .json({ success: false, message: 'User already exists!' }) |
72 |
| - } |
73 |
| - try { |
74 |
| - const user = new UserModel({ |
75 |
| - name, |
76 |
| - email, |
77 |
| - password, |
78 |
| - cpassword, |
79 |
| - }) |
80 |
| - await user.save() |
81 |
| - return res.status(201).json({ |
82 |
| - message: 'Registration successful!', |
83 |
| - success: true, |
84 |
| - userId: user._id, |
85 |
| - }) |
86 |
| - } catch (error) { |
87 |
| - console.error('Registration error:', error) |
88 |
| - return res |
89 |
| - .status(500) |
90 |
| - .json({ message: 'Registration failed!', success: false }) |
91 |
| - } |
92 |
| -}) |
93 |
| - |
94 |
| -module.exports = { testRoute, login, register } |
| 1 | +const catchError = require('../utils/catchError') |
| 2 | +const UserModel = require('../models/userSchema') |
| 3 | +const jwt = require('jsonwebtoken') |
| 4 | +const bcrypt = require('bcryptjs') |
| 5 | +const validator = require('validator') |
| 6 | +const { config } = require('../configs/config') |
| 7 | + |
| 8 | +const testRoute = catchError(async (req, res) => { |
| 9 | + res.json({ success: true, message: 'API IS WORKING 🥳' }) |
| 10 | +}) |
| 11 | + |
| 12 | +const login = catchError(async (req, res) => { |
| 13 | + try { |
| 14 | + const { email, password } = req.body |
| 15 | + const user = await UserModel.findOne({ email }) |
| 16 | + if (!user) { |
| 17 | + return res.status(404).json({ |
| 18 | + success: false, |
| 19 | + message: 'Invalid credentials', |
| 20 | + }) |
| 21 | + } |
| 22 | + const isPasswordMatch = await bcrypt.compare(password, user.password) |
| 23 | + if (!isPasswordMatch) { |
| 24 | + return res.status(401).json({ |
| 25 | + success: false, |
| 26 | + message: 'Invalid credentials', |
| 27 | + }) |
| 28 | + } |
| 29 | + const token = jwt.sign({ userId: user._id }, config.JWT_SECRET) |
| 30 | + const expireTime = parseInt(config.JWT_COOKIE_EXPIRES_IN) |
| 31 | + |
| 32 | + const cookieOptions = { |
| 33 | + expires: new Date(Date.now() + expireTime * 24 * 60 * 60 * 1000), |
| 34 | + httpOnly: true, |
| 35 | + secure: req.secure || req.headers['x-forwarded-proto'] === 'https', |
| 36 | + sameSite: 'strict', |
| 37 | + } |
| 38 | + res.cookie('jwt', token, cookieOptions) |
| 39 | + user.password = undefined |
| 40 | + user.cpassword = undefined |
| 41 | + res.setHeader('Authorization', `Bearer ${token}`) |
| 42 | + |
| 43 | + res.status(200).json({ success: true, data: user, jwt_token: token }) |
| 44 | + } catch (error) { |
| 45 | + console.error('Login error:', error) |
| 46 | + res.status(500).json({ |
| 47 | + success: false, |
| 48 | + message: 'Internal server error', |
| 49 | + }) |
| 50 | + } |
| 51 | +}) |
| 52 | + |
| 53 | +const register = catchError(async (req, res) => { |
| 54 | + const { name, email, password, cpassword } = req.body |
| 55 | + |
| 56 | + if ( |
| 57 | + !name || |
| 58 | + !email || |
| 59 | + !password || |
| 60 | + !cpassword || |
| 61 | + !validator.isEmail(email) |
| 62 | + ) { |
| 63 | + return res |
| 64 | + .status(400) |
| 65 | + .json({ message: 'Invalid input data!', success: false }) |
| 66 | + } |
| 67 | + const checkUser = await UserModel.findOne({ email }) |
| 68 | + if (checkUser) { |
| 69 | + return res |
| 70 | + .status(409) |
| 71 | + .json({ success: false, message: 'User already exists!' }) |
| 72 | + } |
| 73 | + try { |
| 74 | + const user = new UserModel({ |
| 75 | + name, |
| 76 | + email, |
| 77 | + password, |
| 78 | + cpassword, |
| 79 | + }) |
| 80 | + await user.save() |
| 81 | + return res.status(201).json({ |
| 82 | + message: 'Registration successful!', |
| 83 | + success: true, |
| 84 | + userId: user._id, |
| 85 | + }) |
| 86 | + } catch (error) { |
| 87 | + console.error('Registration error:', error) |
| 88 | + return res |
| 89 | + .status(500) |
| 90 | + .json({ message: 'Registration failed!', success: false }) |
| 91 | + } |
| 92 | +}) |
| 93 | + |
| 94 | +module.exports = { testRoute, login, register } |
0 commit comments