Spaces:
Paused
Paused
File size: 1,729 Bytes
a0fda44 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 |
const User = require("../models/User");
const ReqError = require("../utilities/ReqError");
const jwt = require("jsonwebtoken");
const catchAsyncError = require("../utilities/catchAsyncError");
const signToken = (user) => {
return jwt.sign({ id: user._id }, process.env.JWT_SECRET_KEY, {
expiresIn: process.env.JWT_EXPIRES_IN,
});
};
const assignTokenToCookie = (user, res, statusCode) => {
const token = signToken(user);
const cookieOptions = {
httpOnly: true,
secure: true,
expires: new Date(
Date.now() + parseInt(process.env.JWT_EXPIRES_IN) * 24 * 60 * 60 * 1000
),
};
res.cookie("telegramToken", token, cookieOptions);
res.cookie("userId", user._id);
user.password = undefined;
res.status(statusCode).json({
status: "success",
data: {
token,
user,
},
});
};
exports.login = catchAsyncError(async (req, res, next) => {
// Takes in username and password
const { username, password } = req.body;
// If there's no details given
if (!username) return next(new ReqError(400, "Username and Password needed"));
const foundUser = await User.findOne({ username });
// If username does not exist
if (!foundUser)
return next(new ReqError(400, "Username or Password incorrect"));
const passwordGivenCorrect = await foundUser.checkPasswordValidity(
password,
foundUser.password
);
// If given password is incorrect
if (!passwordGivenCorrect)
return next(new ReqError(400, "Username or Password incorrect"));
assignTokenToCookie(foundUser, res, 200);
});
exports.register = catchAsyncError(async (req, res, next) => {
const newUser = await User.create(req.body);
assignTokenToCookie(newUser, res, 201);
});
|