Files
SkyArtShop/backend/routes/auth.js

128 lines
3.4 KiB
JavaScript
Raw Normal View History

const express = require("express");
const bcrypt = require("bcrypt");
const { query } = require("../config/database");
2025-12-19 20:44:46 -06:00
const logger = require("../config/logger");
const {
validators,
handleValidationErrors,
} = require("../middleware/validators");
const { asyncHandler } = require("../middleware/errorHandler");
const {
sendSuccess,
sendError,
sendUnauthorized,
} = require("../utils/responseHelpers");
const { HTTP_STATUS } = require("../config/constants");
2026-01-04 17:52:37 -06:00
const {
recordFailedAttempt,
resetFailedAttempts,
checkBlocked,
} = require("../middleware/bruteForceProtection");
const router = express.Router();
2025-12-19 20:44:46 -06:00
const getUserByEmail = async (email) => {
const result = await query(
`SELECT u.id, u.email, u.username, u.passwordhash, u.role_id, u.isactive,
r.name as role_name, r.permissions
FROM adminusers u
LEFT JOIN roles r ON u.role_id = r.id
WHERE u.email = $1`,
[email]
);
return result.rows[0] || null;
};
2025-12-19 20:44:46 -06:00
const updateLastLogin = async (userId) => {
await query("UPDATE adminusers SET last_login = NOW() WHERE id = $1", [
userId,
]);
};
const createUserSession = (req, user) => {
req.session.user = {
id: user.id,
email: user.email,
username: user.username,
role_id: user.role_id,
role_name: user.role_name,
permissions: user.permissions,
};
};
2025-12-19 20:44:46 -06:00
// Login endpoint
router.post(
"/login",
2026-01-04 17:52:37 -06:00
checkBlocked,
2025-12-19 20:44:46 -06:00
validators.login,
handleValidationErrors,
asyncHandler(async (req, res) => {
const { email, password } = req.body;
2026-01-04 17:52:37 -06:00
const ip = req.ip || req.connection.remoteAddress;
2025-12-19 20:44:46 -06:00
const admin = await getUserByEmail(email);
if (!admin) {
2026-01-04 17:52:37 -06:00
logger.warn("Login attempt with invalid email", { email, ip });
recordFailedAttempt(ip);
2025-12-19 20:44:46 -06:00
return sendUnauthorized(res, "Invalid email or password");
}
if (!admin.isactive) {
2026-01-04 17:52:37 -06:00
logger.warn("Login attempt with deactivated account", { email, ip });
recordFailedAttempt(ip);
2025-12-19 20:44:46 -06:00
return sendUnauthorized(res, "Account is deactivated");
}
const validPassword = await bcrypt.compare(password, admin.passwordhash);
if (!validPassword) {
2026-01-04 17:52:37 -06:00
logger.warn("Login attempt with invalid password", { email, ip });
recordFailedAttempt(ip);
2025-12-19 20:44:46 -06:00
return sendUnauthorized(res, "Invalid email or password");
}
2026-01-04 17:52:37 -06:00
// Reset failed attempts on successful login
resetFailedAttempts(ip);
2025-12-19 20:44:46 -06:00
await updateLastLogin(admin.id);
createUserSession(req, admin);
req.session.save((err) => {
if (err) {
2025-12-19 20:44:46 -06:00
logger.error("Session save error:", err);
return sendError(res, "Session error");
}
2025-12-19 20:44:46 -06:00
logger.info("User logged in successfully", {
userId: admin.id,
email: admin.email,
2026-01-04 17:52:37 -06:00
ip,
});
2025-12-19 20:44:46 -06:00
sendSuccess(res, { user: req.session.user });
});
2025-12-19 20:44:46 -06:00
})
);
// Check session endpoint
router.get("/session", (req, res) => {
2025-12-19 20:44:46 -06:00
if (req.session?.user) {
return sendSuccess(res, { authenticated: true, user: req.session.user });
}
2025-12-19 20:44:46 -06:00
res.status(HTTP_STATUS.UNAUTHORIZED).json({ authenticated: false });
});
// Logout endpoint
router.post("/logout", (req, res) => {
2025-12-19 20:44:46 -06:00
const userId = req.session?.user?.id;
req.session.destroy((err) => {
if (err) {
2025-12-19 20:44:46 -06:00
logger.error("Logout error:", err);
return sendError(res, "Logout failed");
}
2025-12-19 20:44:46 -06:00
logger.info("User logged out", { userId });
sendSuccess(res, { message: "Logged out successfully" });
});
});
module.exports = router;