83 lines
3.3 KiB
JavaScript
83 lines
3.3 KiB
JavaScript
"use strict";
|
|
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
};
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
const express_1 = require("express");
|
|
const bcryptjs_1 = __importDefault(require("bcryptjs"));
|
|
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
|
const index_js_1 = require("../index.js");
|
|
const router = (0, express_1.Router)();
|
|
const JWT_SECRET = process.env.JWT_SECRET || 'treasure-trails-secret-key';
|
|
router.post('/register', async (req, res) => {
|
|
try {
|
|
const { email, password, name } = req.body;
|
|
if (!email || !password || !name) {
|
|
return res.status(400).json({ error: 'Email, password, and name are required' });
|
|
}
|
|
const existingUser = await index_js_1.prisma.user.findUnique({ where: { email } });
|
|
if (existingUser) {
|
|
return res.status(400).json({ error: 'Email already registered' });
|
|
}
|
|
const passwordHash = await bcryptjs_1.default.hash(password, 10);
|
|
const user = await index_js_1.prisma.user.create({
|
|
data: { email, passwordHash, name }
|
|
});
|
|
const token = jsonwebtoken_1.default.sign({ userId: user.id }, JWT_SECRET, { expiresIn: '7d' });
|
|
res.json({
|
|
token,
|
|
user: { id: user.id, email: user.email, name: user.name }
|
|
});
|
|
}
|
|
catch (error) {
|
|
console.error('Register error:', error);
|
|
res.status(500).json({ error: 'Failed to register' });
|
|
}
|
|
});
|
|
router.post('/login', async (req, res) => {
|
|
try {
|
|
const { email, password } = req.body;
|
|
if (!email || !password) {
|
|
return res.status(400).json({ error: 'Email and password are required' });
|
|
}
|
|
const user = await index_js_1.prisma.user.findUnique({ where: { email } });
|
|
if (!user) {
|
|
return res.status(401).json({ error: 'Invalid credentials' });
|
|
}
|
|
const validPassword = await bcryptjs_1.default.compare(password, user.passwordHash);
|
|
if (!validPassword) {
|
|
return res.status(401).json({ error: 'Invalid credentials' });
|
|
}
|
|
const token = jsonwebtoken_1.default.sign({ userId: user.id }, JWT_SECRET, { expiresIn: '7d' });
|
|
res.json({
|
|
token,
|
|
user: { id: user.id, email: user.email, name: user.name }
|
|
});
|
|
}
|
|
catch (error) {
|
|
console.error('Login error:', error);
|
|
res.status(500).json({ error: 'Failed to login' });
|
|
}
|
|
});
|
|
router.get('/me', async (req, res) => {
|
|
try {
|
|
const authHeader = req.headers.authorization;
|
|
if (!authHeader || !authHeader.startsWith('Bearer ')) {
|
|
return res.status(401).json({ error: 'No token provided' });
|
|
}
|
|
const token = authHeader.split(' ')[1];
|
|
const decoded = jsonwebtoken_1.default.verify(token, JWT_SECRET);
|
|
const user = await index_js_1.prisma.user.findUnique({
|
|
where: { id: decoded.userId },
|
|
select: { id: true, email: true, name: true, createdAt: true }
|
|
});
|
|
if (!user) {
|
|
return res.status(401).json({ error: 'User not found' });
|
|
}
|
|
res.json(user);
|
|
}
|
|
catch {
|
|
res.status(401).json({ error: 'Invalid token' });
|
|
}
|
|
});
|
|
exports.default = router;
|