-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathencryption.js
More file actions
82 lines (55 loc) · 1.49 KB
/
encryption.js
File metadata and controls
82 lines (55 loc) · 1.49 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
import bcrypt from 'bcrypt';
import dotenv from 'dotenv';
dotenv.config();
export async function hashPassword(password) {
const saltRounds = 10
try {
const hash = await bcrypt.hash(password, saltRounds);
return hash;
} catch (err) {
console.log(err);
throw err;
}
}
export async function comparePassword(password, hashedPassword) {
try{
const result = await bcrypt.compare(password, hashedPassword);
return result;
}
catch (err){
console.log(err);
throw err;
}
}
import jwt from 'jsonwebtoken';
const SECRET = process.env.JWT_SECRET ;
export function createToken(data){
const payload = {
userData : data,
}
const options = {
expiresIn: "24h",
}
const token = jwt.sign(payload, SECRET, options)
console.log(token);
return token
}
export function authenticateToken(req, res, next) {
const authHeader = req.headers['authorization'];
const token = authHeader && authHeader.split(' ')[1];
if (!token) return res.status(401).json({ message: 'Access Denied' });
jwt.verify(token, SECRET, (err, user) => {
if (err) {
console.log("Invalid Token");
return res.status(403).json({ message: 'Invalid Token' });
}
console.log("JWT PASSED");
console.log('JWT payload:', user);
req.user = user;
next();
});
}
export function decodeToken(token){
const decodedToken = jwt.decode(token)
return decodedToken;
}