Skip to content

Commit 4c7f4d3

Browse files
Full StackFull Stack
Full Stack
authored and
Full Stack
committedApr 9, 2020
adding files
1 parent 9ffd608 commit 4c7f4d3

18 files changed

+1197
-0
lines changed
 

‎.gitignore

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
node_modules
2+
.DS_Store
3+
thumbs.db

‎config/config.json

+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
{
2+
"development": {
3+
"username": "root",
4+
"password": null,
5+
"database": "passport_demo",
6+
"host": "127.0.0.1",
7+
"dialect": "mysql"
8+
},
9+
"test": {
10+
"username": "root",
11+
"password": null,
12+
"database": "database_test",
13+
"host": "127.0.0.1",
14+
"dialect": "mysql"
15+
},
16+
"production": {
17+
"username": "root",
18+
"password": null,
19+
"database": "database_production",
20+
"host": "127.0.0.1",
21+
"dialect": "mysql"
22+
}
23+
}

‎config/middleware/isAuthenticated.js

+10
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
// This is middleware for restricting routes a user is not allowed to visit if not logged in
2+
module.exports = function(req, res, next) {
3+
// If the user is logged in, continue with the request to the restricted route
4+
if (req.user) {
5+
return next();
6+
}
7+
8+
// If the user isn't logged in, redirect them to the login page
9+
return res.redirect("/");
10+
};

‎config/passport.js

+49
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
var passport = require("passport");
2+
var LocalStrategy = require("passport-local").Strategy;
3+
4+
var db = require("../models");
5+
6+
// Telling passport we want to use a Local Strategy. In other words, we want login with a username/email and password
7+
passport.use(new LocalStrategy(
8+
// Our user will sign in using an email, rather than a "username"
9+
{
10+
usernameField: "email"
11+
},
12+
function(email, password, done) {
13+
// When a user tries to sign in this code runs
14+
db.User.findOne({
15+
where: {
16+
email: email
17+
}
18+
}).then(function(dbUser) {
19+
// If there's no user with the given email
20+
if (!dbUser) {
21+
return done(null, false, {
22+
message: "Incorrect email."
23+
});
24+
}
25+
// If there is a user with the given email, but the password the user gives us is incorrect
26+
else if (!dbUser.validPassword(password)) {
27+
return done(null, false, {
28+
message: "Incorrect password."
29+
});
30+
}
31+
// If none of the above, return the user
32+
return done(null, dbUser);
33+
});
34+
}
35+
));
36+
37+
// In order to help keep authentication state across HTTP requests,
38+
// Sequelize needs to serialize and deserialize the user
39+
// Just consider this part boilerplate needed to make it all work
40+
passport.serializeUser(function(user, cb) {
41+
cb(null, user);
42+
});
43+
44+
passport.deserializeUser(function(obj, cb) {
45+
cb(null, obj);
46+
});
47+
48+
// Exporting our configured passport
49+
module.exports = passport;

‎models/index.js

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
'use strict';
2+
3+
var fs = require('fs');
4+
var path = require('path');
5+
var Sequelize = require('sequelize');
6+
var basename = path.basename(module.filename);
7+
var env = process.env.NODE_ENV || 'development';
8+
var config = require(__dirname + '/../config/config.json')[env];
9+
var db = {};
10+
11+
if (config.use_env_variable) {
12+
var sequelize = new Sequelize(process.env[config.use_env_variable]);
13+
} else {
14+
var sequelize = new Sequelize(config.database, config.username, config.password, config);
15+
}
16+
17+
fs
18+
.readdirSync(__dirname)
19+
.filter(function(file) {
20+
return (file.indexOf('.') !== 0) && (file !== basename) && (file.slice(-3) === '.js');
21+
})
22+
.forEach(function(file) {
23+
var model = sequelize['import'](path.join(__dirname, file));
24+
db[model.name] = model;
25+
});
26+
27+
Object.keys(db).forEach(function(modelName) {
28+
if (db[modelName].associate) {
29+
db[modelName].associate(db);
30+
}
31+
});
32+
33+
db.sequelize = sequelize;
34+
db.Sequelize = Sequelize;
35+
36+
module.exports = db;

‎models/user.js

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
// Requiring bcrypt for password hashing. Using the bcryptjs version as the regular bcrypt module sometimes causes errors on Windows machines
2+
var bcrypt = require("bcryptjs");
3+
// Creating our User model
4+
module.exports = function(sequelize, DataTypes) {
5+
var User = sequelize.define("User", {
6+
// The email cannot be null, and must be a proper email before creation
7+
email: {
8+
type: DataTypes.STRING,
9+
allowNull: false,
10+
unique: true,
11+
validate: {
12+
isEmail: true
13+
}
14+
},
15+
// The password cannot be null
16+
password: {
17+
type: DataTypes.STRING,
18+
allowNull: false
19+
}
20+
});
21+
// Creating a custom method for our User model. This will check if an unhashed password entered by the user can be compared to the hashed password stored in our database
22+
User.prototype.validPassword = function(password) {
23+
return bcrypt.compareSync(password, this.password);
24+
};
25+
// Hooks are automatic methods that run during various phases of the User Model lifecycle
26+
// In this case, before a User is created, we will automatically hash their password
27+
User.addHook("beforeCreate", function(user) {
28+
user.password = bcrypt.hashSync(user.password, bcrypt.genSaltSync(10), null);
29+
});
30+
return User;
31+
};

0 commit comments

Comments
 (0)