Compare commits
No commits in common. "knex-sqlite3-working-model" and "main" have entirely different histories.
knex-sqlit
...
main
|
@ -1,7 +1,4 @@
|
|||
node_modules/
|
||||
package-lock.json
|
||||
dist/
|
||||
!dist/submissions
|
||||
!dist/users
|
||||
|
||||
dist
|
||||
|
||||
|
|
|
@ -1,23 +1,18 @@
|
|||
import passport from 'passport'
|
||||
import { Strategy as localStrategy } from 'passport-local'
|
||||
import { User, encryptPwd, pwdIsValid } from '../model/model.mjs'
|
||||
import { User, UserModel } from '../model/model.mjs'
|
||||
import { Strategy as JWTstrategy, ExtractJwt } from 'passport-jwt'
|
||||
import { userDb } from '../db.mjs'
|
||||
|
||||
passport.use('signup', new localStrategy(
|
||||
{
|
||||
usernameField: 'username',
|
||||
usernameField: 'email',
|
||||
passwordField: 'password'
|
||||
},
|
||||
async (username, password, done) => {
|
||||
console.log("signup auth strategy has begun")
|
||||
async (email, password, done) => {
|
||||
try {
|
||||
const encryptedPwd = await encryptPwd(password)
|
||||
const user = await userDb("users").insert({ username: username, password: encryptedPwd }).returning(["username", "password"])
|
||||
console.log(`user: ${user}`)
|
||||
const user = await UserModel.create({ email, password })
|
||||
return done(null, user)
|
||||
} catch (err) {
|
||||
console.error(err)
|
||||
done(err)
|
||||
}
|
||||
}))
|
||||
|
@ -25,21 +20,20 @@ passport.use('signup', new localStrategy(
|
|||
passport.use('login',
|
||||
new localStrategy(
|
||||
{
|
||||
usernameField: "username",
|
||||
usernameField: "email",
|
||||
passwordField: "password",
|
||||
session: false
|
||||
},
|
||||
async (email, password, done) => {
|
||||
console.log("local strategy called")
|
||||
try {
|
||||
let returnedUser: Array<User> = await userDb("users").select("username", "password").where({ username: email })
|
||||
const user: User = returnedUser[0]
|
||||
const user: User = await UserModel.findOne({ email })
|
||||
console.log(`user: ${user}`)
|
||||
if (!user || returnedUser.length === 0) {
|
||||
if (!user) {
|
||||
return done(null, false, { message: "user not found" })
|
||||
}
|
||||
|
||||
const validate: boolean = await pwdIsValid(password, user)
|
||||
const validate: boolean = await user.isValidPassword(password)
|
||||
console.log(`isValidPassword? ${validate}`)
|
||||
|
||||
if (!validate) {
|
||||
|
|
7
db.mts
7
db.mts
|
@ -16,13 +16,6 @@ export const testDb = knex({
|
|||
useNullAsDefault: true
|
||||
})
|
||||
|
||||
export const userDb = knex({
|
||||
client: "sqlite3",
|
||||
connection: {
|
||||
filename: "./users"
|
||||
},
|
||||
useNullAsDefault: true
|
||||
})
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -9,39 +9,33 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|||
};
|
||||
import passport from 'passport';
|
||||
import { Strategy as localStrategy } from 'passport-local';
|
||||
import { encryptPwd, pwdIsValid } from '../model/model.mjs';
|
||||
import { UserModel } from '../model/model.mjs';
|
||||
import { Strategy as JWTstrategy, ExtractJwt } from 'passport-jwt';
|
||||
import { userDb } from '../db.mjs';
|
||||
passport.use('signup', new localStrategy({
|
||||
usernameField: 'username',
|
||||
usernameField: 'email',
|
||||
passwordField: 'password'
|
||||
}, (username, password, done) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
console.log("signup auth strategy has begun");
|
||||
}, (email, password, done) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
try {
|
||||
const encryptedPwd = yield encryptPwd(password);
|
||||
const user = yield userDb("users").insert({ username: username, password: encryptedPwd }).returning(["username", "password"]);
|
||||
console.log(`user: ${user}`);
|
||||
const user = yield UserModel.create({ email, password });
|
||||
return done(null, user);
|
||||
}
|
||||
catch (err) {
|
||||
console.error(err);
|
||||
done(err);
|
||||
}
|
||||
})));
|
||||
passport.use('login', new localStrategy({
|
||||
usernameField: "username",
|
||||
usernameField: "email",
|
||||
passwordField: "password",
|
||||
session: false
|
||||
}, (email, password, done) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
console.log("local strategy called");
|
||||
try {
|
||||
let returnedUser = yield userDb("users").select("username", "password").where({ username: email });
|
||||
const user = returnedUser[0];
|
||||
const user = yield UserModel.findOne({ email });
|
||||
console.log(`user: ${user}`);
|
||||
if (!user || returnedUser.length === 0) {
|
||||
if (!user) {
|
||||
return done(null, false, { message: "user not found" });
|
||||
}
|
||||
const validate = yield pwdIsValid(password, user);
|
||||
const validate = yield user.isValidPassword(password);
|
||||
console.log(`isValidPassword? ${validate}`);
|
||||
if (!validate) {
|
||||
return done(null, false, { message: "wrong password" });
|
||||
|
@ -54,7 +48,7 @@ passport.use('login', new localStrategy({
|
|||
})));
|
||||
passport.use(new JWTstrategy({
|
||||
secretOrKey: "TOP_SECRET",
|
||||
jwtFromRequest: ExtractJwt.fromAuthHeaderWithScheme('secret_token')
|
||||
jwtFromRequest: ExtractJwt.fromUrlQueryParameter('secret_token')
|
||||
}, (token, done) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
try {
|
||||
return done(null, token.user);
|
||||
|
|
|
@ -13,10 +13,3 @@ export const testDb = knex({
|
|||
},
|
||||
useNullAsDefault: true
|
||||
});
|
||||
export const userDb = knex({
|
||||
client: "sqlite3",
|
||||
connection: {
|
||||
filename: "./users"
|
||||
},
|
||||
useNullAsDefault: true
|
||||
});
|
||||
|
|
|
@ -35,13 +35,3 @@ UserSchema.methods.isValidPassword = function (password) {
|
|||
});
|
||||
};
|
||||
export const UserModel = mongoose.model("user", UserSchema);
|
||||
export function encryptPwd(pwd) {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
return Promise.resolve(bcrypt.hash(pwd, 10));
|
||||
});
|
||||
}
|
||||
export function pwdIsValid(pwd, user) {
|
||||
return __awaiter(this, void 0, void 0, function* () {
|
||||
return Promise.resolve(bcrypt.compare(pwd, user.password));
|
||||
});
|
||||
}
|
||||
|
|
|
@ -17,6 +17,10 @@ router.post("/signup", passport.authenticate("signup", { session: false }), (req
|
|||
user: req.user
|
||||
});
|
||||
}));
|
||||
// router.post("/login", passport.authenticate('local'),
|
||||
// function(req, res) {
|
||||
// res.json({ res })
|
||||
// })
|
||||
router.post('/login', (req, res, next) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
passport.authenticate('login', (err, user, info) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
try {
|
||||
|
@ -27,8 +31,8 @@ router.post('/login', (req, res, next) => __awaiter(void 0, void 0, void 0, func
|
|||
req.login(user, { session: false }, (error) => __awaiter(void 0, void 0, void 0, function* () {
|
||||
if (error)
|
||||
return next(error);
|
||||
const body = { _id: user._id, username: user.username };
|
||||
const token = jwt.sign({ user: body }, 'TOP_SECRET', { expiresIn: "20m" });
|
||||
const body = { _id: user._id, email: user.email };
|
||||
const token = jwt.sign({ user: body }, 'TOP_SECRET');
|
||||
return res.json({ token });
|
||||
}));
|
||||
}
|
||||
|
|
Binary file not shown.
|
@ -1,10 +1,15 @@
|
|||
import express from "express"
|
||||
import mongoose from "mongoose"
|
||||
import passport from "passport"
|
||||
import bodyParser from "body-parser"
|
||||
import { db } from "./db.mjs"
|
||||
|
||||
import { UserModel } from "./model/model.mjs"
|
||||
import { default as routes } from "./routes/routes.mjs"
|
||||
import { default as secureRoute } from "./routes/secure-routes.mjs"
|
||||
import "./auth/auth.mjs"
|
||||
mongoose.connect("mongodb://127.0.0.1:27017/passport-jwt", {});
|
||||
mongoose.connection.on('error', error => console.log(error));
|
||||
mongoose.Promise = global.Promise;
|
||||
|
||||
const app = express()
|
||||
app.use(passport.initialize())
|
||||
|
|
|
@ -1,10 +1,41 @@
|
|||
import mongoose from "mongoose";
|
||||
import bcrypt from "bcrypt"
|
||||
export async function encryptPwd(pwd: string) {
|
||||
return Promise.resolve(bcrypt.hash(pwd, 10))
|
||||
|
||||
const Schema = mongoose.Schema
|
||||
|
||||
const UserSchema = new Schema({
|
||||
email: {
|
||||
type: String,
|
||||
required: true,
|
||||
unique: true
|
||||
},
|
||||
password: {
|
||||
type: String,
|
||||
required: true
|
||||
}
|
||||
})
|
||||
|
||||
UserSchema.pre(
|
||||
"save",
|
||||
async function(next) {
|
||||
const hash = await bcrypt.hash(this.password, 10)
|
||||
this.password = hash;
|
||||
next();
|
||||
}
|
||||
)
|
||||
|
||||
UserSchema.methods.isValidPassword = async function(password: string) {
|
||||
const compare = await bcrypt.compare(password, this.password)
|
||||
return compare
|
||||
}
|
||||
|
||||
export async function pwdIsValid(pwd: string, user: User): Promise<boolean> {
|
||||
return Promise.resolve(bcrypt.compare(pwd, user.password))
|
||||
export interface User {
|
||||
email: string;
|
||||
password: string;
|
||||
isValidPassword: (password: string) => Promise<boolean>
|
||||
}
|
||||
|
||||
export const UserModel = mongoose.model("user", UserSchema)
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -20,7 +20,6 @@
|
|||
"typescript": "^5.4.5"
|
||||
},
|
||||
"dependencies": {
|
||||
"@types/knex": "^0.16.1",
|
||||
"bcrypt": "^5.1.1",
|
||||
"body-parser": "^1.20.2",
|
||||
"express": "^4.19.2",
|
||||
|
@ -29,7 +28,6 @@
|
|||
"mongoose": "^8.4.0",
|
||||
"passport": "^0.7.0",
|
||||
"passport-jwt": "^4.0.1",
|
||||
"passport-local": "^1.0.0",
|
||||
"sqlite3": "^5.1.7"
|
||||
"passport-local": "^1.0.0"
|
||||
}
|
||||
}
|
||||
|
|
|
@ -12,7 +12,10 @@ router.post("/signup",
|
|||
user: req.user
|
||||
})
|
||||
})
|
||||
|
||||
// router.post("/login", passport.authenticate('local'),
|
||||
// function(req, res) {
|
||||
// res.json({ res })
|
||||
// })
|
||||
router.post(
|
||||
'/login',
|
||||
async (req, res, next) => {
|
||||
|
@ -32,7 +35,7 @@ router.post(
|
|||
async (error) => {
|
||||
if (error) return next(error);
|
||||
|
||||
const body = { _id: user._id, username: user.username };
|
||||
const body = { _id: user._id, email: user.email };
|
||||
const token = jwt.sign({ user: body }, 'TOP_SECRET', { expiresIn: "20m" });
|
||||
|
||||
return res.json({ token });
|
||||
|
|
BIN
submissions
BIN
submissions
Binary file not shown.
Loading…
Reference in New Issue