-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathauth.js
More file actions
51 lines (47 loc) · 1.74 KB
/
auth.js
File metadata and controls
51 lines (47 loc) · 1.74 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
/**
* Secret key used for signing and verifying JWT tokens.
* This key must be the same as the one used in your JWTStrategy within passport.js.
* Keep this key secure and avoid hardcoding it in production environments.
*/
const jwtSecret = 'your_jwt_secret'; // must be the same key used in JWTStrategy in passport.js
const jwt = require('jsonwebtoken'),
passport = require('passport');
require('./passport'); // local passport file
/**
* Generates a JSON Web Token (JWT) for the provided user object.
* @param {object} user - The user object containing information to be encoded in the JWT.
* @returns {string} The generated JWT token.
*/
let generateJWTToken = (user) => {
return jwt.sign(user, jwtSecret, {
subject: user.Username, //will be encoded
expiresIn: '30d', //days
algorithm: 'HS256' //this is the algorithm used to "sign" or encode values in JWT
});
}
/**
* POST login route handler.
* @param {object} router - The Express router object to attach the route to.
*/
module.exports = (router) => {
router.post('/login', (req, res) => {
passport.authenticate('local', {session: false}, (error, user, info) => {
if (error || !user) {
return res.status(400).json({
message: 'Something is not right',
user: user
});
}
req.login(user, {session: false}, (error) => {
if (error) {
res.send(error);
}
/**
* Generates a JWT token for the logged-in user.
*/
let token = generateJWTToken(user.toJSON());
return res.json({user, token});
});
})(req, res);
});
}