-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpassport-loader.js
More file actions
71 lines (67 loc) · 2.86 KB
/
passport-loader.js
File metadata and controls
71 lines (67 loc) · 2.86 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
const LocalStrategy = require('passport-local').Strategy;
const ExtractJWT = require('passport-jwt').ExtractJwt;
const JWTstrategy = require('passport-jwt').Strategy;
const passport = require('passport');
const bcrypt = require('bcrypt');
const moment = require('moment');
const { encoderBase64 } = require('./helper');
// load user model
const UserModel = require('./models').User;
// Signup passport
passport.use('signup', new LocalStrategy({ usernameField: 'email', passwordField: 'password', passReqToCallback: true },
async (req, uname, pass, done) => {
const {
name, email, password, phone,
} = req.body;
UserModel.findOne({ where: { email } }).then((user) => {
if (user) return done(null, false, { message: 'That email is already taken' });
const hashpass = bcrypt.hashSync(password, bcrypt.genSaltSync());
const data = {
name, email, password: hashpass, phone,
};
UserModel.create(data).then((newUser) => {
if (!newUser) return done(null, false);
if (newUser) return done(null, newUser);
return null;
});
return null;
});
}));
// Login passport
passport.use('login', new LocalStrategy({ usernameField: 'email', passwordField: 'password' },
async (email, password, done) => {
try {
// Find the user associated with the email/username provided by the user
const user = await UserModel.findOne({ where: { email } });
if (!user) return done(null, false, { message: 'User not found' });
// Validate password & make sure it matches with the corresponding hash stored in the database
// If the passwords match, it returns a value of true.
const validate = await bcrypt.compare(password, user.password);
if (!validate) return done(null, false, { message: 'Wrong Password' });
// //Send the user information to the next middleware
return done(null, user, { message: 'Logged in Successfully' });
} catch (error) {
return done(error, false, { message: error });
}
}));
// JWT passport
passport.use('jwt', new JWTstrategy({
jwtFromRequest: ExtractJWT.fromAuthHeaderAsBearerToken(),
secretOrKey: process.env.PROJECT_JWT_SECRET,
}, async (jwt_payload, done) => {
const user = await UserModel.findOne({ where: { id: jwt_payload.uid } });
if (user) {
return done(null, user);
}
return done(null, false);
}));
passport.use('forgotpasswordjwt', new JWTstrategy({
jwtFromRequest: ExtractJWT.fromBodyField('token'),
secretOrKey: process.env.PROJECT_JWT_SECRET,
}, async (jwt_payload, done) => {
const user = await UserModel.findOne({ where: { id: encoderBase64(jwt_payload.uid, false) } });
if (!user) return done('Fail to validate user', false); // not valid user
if (moment().unix() > encoderBase64(jwt_payload.token, false)) return done('Token expired', false); // expired
if (user) return done(null, user);
return null;
}));