Compare commits

..

No commits in common. "knex-sqlite3-working-model" and "main" have entirely different histories.

14 changed files with 71 additions and 69 deletions

5
.gitignore vendored
View File

@ -1,7 +1,4 @@
node_modules/
package-lock.json
dist/
!dist/submissions
!dist/users
dist

View File

@ -1,23 +1,18 @@
import passport from 'passport'
import { Strategy as localStrategy } from 'passport-local'
import { User, encryptPwd, pwdIsValid } from '../model/model.mjs'
import { User, UserModel } from '../model/model.mjs'
import { Strategy as JWTstrategy, ExtractJwt } from 'passport-jwt'
import { userDb } from '../db.mjs'
passport.use('signup', new localStrategy(
{
usernameField: 'username',
usernameField: 'email',
passwordField: 'password'
},
async (username, password, done) => {
console.log("signup auth strategy has begun")
async (email, password, done) => {
try {
const encryptedPwd = await encryptPwd(password)
const user = await userDb("users").insert({ username: username, password: encryptedPwd }).returning(["username", "password"])
console.log(`user: ${user}`)
const user = await UserModel.create({ email, password })
return done(null, user)
} catch (err) {
console.error(err)
done(err)
}
}))
@ -25,21 +20,20 @@ passport.use('signup', new localStrategy(
passport.use('login',
new localStrategy(
{
usernameField: "username",
usernameField: "email",
passwordField: "password",
session: false
},
async (email, password, done) => {
console.log("local strategy called")
try {
let returnedUser: Array<User> = await userDb("users").select("username", "password").where({ username: email })
const user: User = returnedUser[0]
const user: User = await UserModel.findOne({ email })
console.log(`user: ${user}`)
if (!user || returnedUser.length === 0) {
if (!user) {
return done(null, false, { message: "user not found" })
}
const validate: boolean = await pwdIsValid(password, user)
const validate: boolean = await user.isValidPassword(password)
console.log(`isValidPassword? ${validate}`)
if (!validate) {

7
db.mts
View File

@ -16,13 +16,6 @@ export const testDb = knex({
useNullAsDefault: true
})
export const userDb = knex({
client: "sqlite3",
connection: {
filename: "./users"
},
useNullAsDefault: true
})

24
dist/auth/auth.mjs vendored
View File

@ -9,39 +9,33 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
};
import passport from 'passport';
import { Strategy as localStrategy } from 'passport-local';
import { encryptPwd, pwdIsValid } from '../model/model.mjs';
import { UserModel } from '../model/model.mjs';
import { Strategy as JWTstrategy, ExtractJwt } from 'passport-jwt';
import { userDb } from '../db.mjs';
passport.use('signup', new localStrategy({
usernameField: 'username',
usernameField: 'email',
passwordField: 'password'
}, (username, password, done) => __awaiter(void 0, void 0, void 0, function* () {
console.log("signup auth strategy has begun");
}, (email, password, done) => __awaiter(void 0, void 0, void 0, function* () {
try {
const encryptedPwd = yield encryptPwd(password);
const user = yield userDb("users").insert({ username: username, password: encryptedPwd }).returning(["username", "password"]);
console.log(`user: ${user}`);
const user = yield UserModel.create({ email, password });
return done(null, user);
}
catch (err) {
console.error(err);
done(err);
}
})));
passport.use('login', new localStrategy({
usernameField: "username",
usernameField: "email",
passwordField: "password",
session: false
}, (email, password, done) => __awaiter(void 0, void 0, void 0, function* () {
console.log("local strategy called");
try {
let returnedUser = yield userDb("users").select("username", "password").where({ username: email });
const user = returnedUser[0];
const user = yield UserModel.findOne({ email });
console.log(`user: ${user}`);
if (!user || returnedUser.length === 0) {
if (!user) {
return done(null, false, { message: "user not found" });
}
const validate = yield pwdIsValid(password, user);
const validate = yield user.isValidPassword(password);
console.log(`isValidPassword? ${validate}`);
if (!validate) {
return done(null, false, { message: "wrong password" });
@ -54,7 +48,7 @@ passport.use('login', new localStrategy({
})));
passport.use(new JWTstrategy({
secretOrKey: "TOP_SECRET",
jwtFromRequest: ExtractJwt.fromAuthHeaderWithScheme('secret_token')
jwtFromRequest: ExtractJwt.fromUrlQueryParameter('secret_token')
}, (token, done) => __awaiter(void 0, void 0, void 0, function* () {
try {
return done(null, token.user);

7
dist/db.mjs vendored
View File

@ -13,10 +13,3 @@ export const testDb = knex({
},
useNullAsDefault: true
});
export const userDb = knex({
client: "sqlite3",
connection: {
filename: "./users"
},
useNullAsDefault: true
});

10
dist/model/model.mjs vendored
View File

@ -35,13 +35,3 @@ UserSchema.methods.isValidPassword = function (password) {
});
};
export const UserModel = mongoose.model("user", UserSchema);
export function encryptPwd(pwd) {
return __awaiter(this, void 0, void 0, function* () {
return Promise.resolve(bcrypt.hash(pwd, 10));
});
}
export function pwdIsValid(pwd, user) {
return __awaiter(this, void 0, void 0, function* () {
return Promise.resolve(bcrypt.compare(pwd, user.password));
});
}

View File

@ -17,6 +17,10 @@ router.post("/signup", passport.authenticate("signup", { session: false }), (req
user: req.user
});
}));
// router.post("/login", passport.authenticate('local'),
// function(req, res) {
// res.json({ res })
// })
router.post('/login', (req, res, next) => __awaiter(void 0, void 0, void 0, function* () {
passport.authenticate('login', (err, user, info) => __awaiter(void 0, void 0, void 0, function* () {
try {
@ -27,8 +31,8 @@ router.post('/login', (req, res, next) => __awaiter(void 0, void 0, void 0, func
req.login(user, { session: false }, (error) => __awaiter(void 0, void 0, void 0, function* () {
if (error)
return next(error);
const body = { _id: user._id, username: user.username };
const token = jwt.sign({ user: body }, 'TOP_SECRET', { expiresIn: "20m" });
const body = { _id: user._id, email: user.email };
const token = jwt.sign({ user: body }, 'TOP_SECRET');
return res.json({ token });
}));
}

0
dist/submissions vendored
View File

BIN
dist/users vendored

Binary file not shown.

View File

@ -1,10 +1,15 @@
import express from "express"
import mongoose from "mongoose"
import passport from "passport"
import bodyParser from "body-parser"
import { db } from "./db.mjs"
import { UserModel } from "./model/model.mjs"
import { default as routes } from "./routes/routes.mjs"
import { default as secureRoute } from "./routes/secure-routes.mjs"
import "./auth/auth.mjs"
mongoose.connect("mongodb://127.0.0.1:27017/passport-jwt", {});
mongoose.connection.on('error', error => console.log(error));
mongoose.Promise = global.Promise;
const app = express()
app.use(passport.initialize())

View File

@ -1,10 +1,41 @@
import mongoose from "mongoose";
import bcrypt from "bcrypt"
export async function encryptPwd(pwd: string) {
return Promise.resolve(bcrypt.hash(pwd, 10))
const Schema = mongoose.Schema
const UserSchema = new Schema({
email: {
type: String,
required: true,
unique: true
},
password: {
type: String,
required: true
}
})
UserSchema.pre(
"save",
async function(next) {
const hash = await bcrypt.hash(this.password, 10)
this.password = hash;
next();
}
)
UserSchema.methods.isValidPassword = async function(password: string) {
const compare = await bcrypt.compare(password, this.password)
return compare
}
export async function pwdIsValid(pwd: string, user: User): Promise<boolean> {
return Promise.resolve(bcrypt.compare(pwd, user.password))
export interface User {
email: string;
password: string;
isValidPassword: (password: string) => Promise<boolean>
}
export const UserModel = mongoose.model("user", UserSchema)

View File

@ -20,7 +20,6 @@
"typescript": "^5.4.5"
},
"dependencies": {
"@types/knex": "^0.16.1",
"bcrypt": "^5.1.1",
"body-parser": "^1.20.2",
"express": "^4.19.2",
@ -29,7 +28,6 @@
"mongoose": "^8.4.0",
"passport": "^0.7.0",
"passport-jwt": "^4.0.1",
"passport-local": "^1.0.0",
"sqlite3": "^5.1.7"
"passport-local": "^1.0.0"
}
}

View File

@ -12,7 +12,10 @@ router.post("/signup",
user: req.user
})
})
// router.post("/login", passport.authenticate('local'),
// function(req, res) {
// res.json({ res })
// })
router.post(
'/login',
async (req, res, next) => {
@ -32,7 +35,7 @@ router.post(
async (error) => {
if (error) return next(error);
const body = { _id: user._id, username: user.username };
const body = { _id: user._id, email: user.email };
const token = jwt.sign({ user: body }, 'TOP_SECRET', { expiresIn: "20m" });
return res.json({ token });

Binary file not shown.