passport-jwt/auth/auth.mts

66 lines
1.4 KiB
TypeScript
Raw Normal View History

2024-05-28 20:22:41 +00:00
import passport from 'passport'
import { Strategy as localStrategy } from 'passport-local'
import { User, UserModel } from '../model/model.mjs'
import { Strategy as JWTstrategy, ExtractJwt } from 'passport-jwt'
passport.use('signup', new localStrategy(
{
usernameField: 'email',
passwordField: 'password'
},
async (email, password, done) => {
try {
const user = await UserModel.create({ email, password })
return done(null, user)
} catch (err) {
done(err)
}
}))
2024-05-29 09:34:21 +00:00
passport.use('login',
2024-05-28 20:22:41 +00:00
new localStrategy(
{
usernameField: "email",
passwordField: "password",
session: false
},
async (email, password, done) => {
2024-05-29 09:34:21 +00:00
console.log("local strategy called")
2024-05-28 20:22:41 +00:00
try {
const user: User = await UserModel.findOne({ email })
console.log(`user: ${user}`)
if (!user) {
return done(null, false, { message: "user not found" })
}
const validate: boolean = await user.isValidPassword(password)
2024-05-29 09:34:21 +00:00
console.log(`isValidPassword? ${validate}`)
2024-05-28 20:22:41 +00:00
if (!validate) {
return done(null, false, { message: "wrong password" })
}
2024-05-29 09:34:21 +00:00
return done(null, user, { message: "logged in successfully" })
2024-05-28 20:22:41 +00:00
} catch (error) {
return done(error)
}
}
)
)
passport.use(
new JWTstrategy(
{
secretOrKey: "TOP_SECRET",
2024-05-29 13:52:57 +00:00
jwtFromRequest: ExtractJwt.fromAuthHeaderWithScheme('secret_token')
2024-05-28 20:22:41 +00:00
},
async (token, done) => {
try {
return done(null, token.user)
} catch (error) {
done(error)
}
}
)
)