-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathAuthController.js
executable file
·66 lines (54 loc) · 1.89 KB
/
AuthController.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
// module that handles authentication token
/* eslint-disable quote-props */
import { v4 as uuidv4 } from 'uuid';
import sha1 from 'sha1';
import redisClient from '../utils/redis';
import dbClient from '../utils/db';
class AuthController {
static async getConnect(req, res) {
try {
const authHeader = req.headers.authorization;
if (!authHeader || !authHeader.startsWith('Basic ')) {
res.status(401).json({ error: 'Unauthorized' });
return;
}
const credentialsBase64 = authHeader.slice('Basic '.length);
const credentials = Buffer.from(credentialsBase64, 'base64').toString('utf-8');
const [email, password] = credentials.split(':');
const user = await dbClient.client.db().collection('users').findOne({ email, password: sha1(password) });
if (!user) {
res.status(401).json({ error: 'Unauthorized' });
return;
}
const token = uuidv4();
const key = `auth_${token}`;
const expirationTimeInSeconds = 86400;
await redisClient.set(key, user._id.toString(), expirationTimeInSeconds);
res.status(200).json({ 'token': token });
} catch (error) {
console.error('Error in getConnect:', error);
res.status(500).json({ error: 'Internal Server Error' });
}
}
static async getDisconnect(req, res) {
try {
const { 'x-token': token } = req.headers;
if (!token) {
res.status(401).json({ error: 'Unauthorized' });
return;
}
const key = `auth_${token}`;
const userId = await redisClient.get(key);
if (!userId) {
res.status(401).json({ error: 'Unauthorized' });
return;
}
await redisClient.del(key);
res.status(204).end();
} catch (error) {
console.error('Error in getDisconnect:', error);
res.status(500).json({ error: 'Internal Server Error' });
}
}
}
export default AuthController;