blob: 7a2b78a60bb6ff977ddbac1da2ae636cf207b103 (
plain) (
tree)
|
|
const bcrypt = require('bcryptjs');
const jwt = require('jsonwebtoken');
const User = require('../models/User');
const {masterKey} = require("../config/env");
module.exports = {
register(req, res) {
if (req.body.password !== req.body.confirmPassword)
res.json({status: "Passwords do not match!"});
else {
const newUser = new User({
firstname: req.body.firstname,
lastname: req.body.lastname,
email: req.body.email,
password: bcrypt.hashSync(req.body.password)
});
newUser.save()
.then(user => res.json({
status: "User successfully registered!",
token: jwt.sign({sub: user._id}, masterKey, {expiresIn: "1d"})
}))
.catch(err => res.status(400).json({
status: "Error when registering user!",
error: err
}));
}
},
login(req, res) {
User.findOne({email: req.body.email}, (err, user) => {
if (err)
res.json({status: "Database error.", error: err});
if (!user)
return res.status(404).json({status: "No such user found!"});
if (!bcrypt.compareSync(req.body.password, user.password))
res.json({status: "Wrong credentials!"});
else {
const payload = {sub: user._id};
const token = jwt.sign(payload, masterKey, {expiresIn: "1d"});
res.json({
status: "Successfully logged in!",
token,
isAdmin: user.admin
});
}
});
}
};
|