Locaft-backend/server/routes/users.js

113 lines
3.0 KiB
JavaScript
Raw Normal View History

2020-11-29 09:05:56 -08:00
const router = require("express").Router();
const bcrypt = require("bcryptjs");
const jwt = require("jsonwebtoken");
const auth = require("../middleware/auth");
2020-11-30 08:56:17 -08:00
const User = require("../schemas/User");
const config = require("config");
2020-11-29 09:05:56 -08:00
2020-12-06 08:59:40 -08:00
2020-11-29 09:05:56 -08:00
router.post("/register", async (req, res) => {
try {
let { username,email,phonenumber,password} = req.body;
2021-02-27 09:25:16 -08:00
2020-11-29 09:05:56 -08:00
2020-11-30 08:56:17 -08:00
if (!email || !password )
2020-11-29 09:05:56 -08:00
return res.status(400).json({ msg: "Not all fields have been entered." });
if (password.length < 5)
return res
.status(400)
.json({ msg: "The password needs to be at least 5 characters long." });
const existingUser = await User.findOne({ email: email });
if (existingUser)
return res
.status(400)
.json({ msg: "An account with this email already exists." });
if (!username) username = email;
const salt = await bcrypt.genSalt();
const passwordHash = await bcrypt.hash(password, salt);
const newUser = new User({
username,
email,
phonenumber,
password: passwordHash,
});
const savedUser = await newUser.save();
res.json(savedUser);
} catch (err) {
res.status(500).json({ error: err.message });
}
});
router.post("/login", async (req, res) => {
try {
const { email, password } = req.body;
// validate
if (!email || !password)
return res.status(400).json({ msg: "Not all fields have been entered." });
const user = await User.findOne({ email: email });
if (!user)
return res
.status(400)
.json({ msg: "No account with this email has been registered." });
const isMatch = await bcrypt.compare(password, user.password);
if (!isMatch) return res.status(400).json({ msg: "Invalid credentials." });
2020-11-30 08:56:17 -08:00
const token = jwt.sign({ id: user._id },config.get('jwtSecret'));
2020-12-07 09:49:14 -08:00
if(token) return res
.json({
2020-11-29 09:05:56 -08:00
token,
user: {
id: user._id,
username: user.username,
},
});
} catch (err) {
res.status(500).json({ error: err.message });
}
});
router.delete("/delete", auth, async (req, res) => {
try {
const deletedUser = await User.findByIdAndDelete(req.user);
res.json(deletedUser);
} catch (err) {
res.status(500).json({ error: err.message });
}
});
router.post("/tokenIsValid", async (req, res) => {
try {
const token = req.header("x-auth-token");
2020-12-07 09:49:14 -08:00
if (!token) return res.json({error: message});
2020-12-06 08:59:40 -08:00
const verified = jwt.verify(token, config.get("jwtSecret"));
2020-11-29 09:05:56 -08:00
2020-12-07 09:49:14 -08:00
if (!verified) return res.json({error: message});
2020-11-29 09:05:56 -08:00
const user = await User.findById(verified.id);
2020-12-07 09:49:14 -08:00
if (!user) return res.json({error: message});
2020-11-29 09:05:56 -08:00
return res.json(true);
} catch (err) {
res.status(500).json({ error: err.message });
}
});
router.get("/", auth, async (req, res) => {
const user = await User.findById(req.user);
2020-12-07 09:49:14 -08:00
console.log(user);
2020-11-29 09:05:56 -08:00
res.json({
username: user.username,
id: user._id,
});
});
2020-11-08 09:28:21 -08:00
module.exports = router;