Implement enterprise-grade security measures and input validation: Security Features: - Add Helmet.js for security headers (XSS, clickjacking, MIME protection) - Implement rate limiting (5/15min for auth, 100/15min for API) - Add Socket.IO JWT authentication middleware - Fix JWT auth middleware (remove throw in catch, extend token to 7 days) - Implement centralized error handling with AppError class - Add CORS restrictive configuration Input Validation: - Add express-validator to all routes (auth, streets, tasks, posts, events, rewards, reports, users) - Create comprehensive validation schemas in middleware/validators/ - Consistent error response format for validation failures Additional Features: - Add pagination middleware for all list endpoints - Add Multer file upload middleware (5MB limit, image validation) - Update .env.example with all required environment variables Dependencies Added: - helmet@8.1.0 - express-rate-limit@8.2.1 - express-validator@7.3.0 - multer@1.4.5-lts.1 - cloudinary@2.8.0 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
109 lines
2.3 KiB
JavaScript
109 lines
2.3 KiB
JavaScript
const express = require("express");
|
|
const bcrypt = require("bcryptjs");
|
|
const jwt = require("jsonwebtoken");
|
|
const User = require("../models/User");
|
|
const auth = require("../middleware/auth");
|
|
const { asyncHandler } = require("../middleware/errorHandler");
|
|
const {
|
|
registerValidation,
|
|
loginValidation,
|
|
} = require("../middleware/validators/authValidator");
|
|
|
|
const router = express.Router();
|
|
|
|
// Get user
|
|
router.get(
|
|
"/",
|
|
auth,
|
|
asyncHandler(async (req, res) => {
|
|
const user = await User.findById(req.user.id).select("-password");
|
|
res.json(user);
|
|
}),
|
|
);
|
|
|
|
// Register
|
|
router.post(
|
|
"/register",
|
|
registerValidation,
|
|
asyncHandler(async (req, res) => {
|
|
const { name, email, password } = req.body;
|
|
|
|
let user = await User.findOne({ email });
|
|
if (user) {
|
|
return res.status(400).json({ success: false, msg: "User already exists" });
|
|
}
|
|
|
|
user = new User({
|
|
name,
|
|
email,
|
|
password,
|
|
});
|
|
|
|
const salt = await bcrypt.genSalt(10);
|
|
user.password = await bcrypt.hash(password, salt);
|
|
|
|
await user.save();
|
|
|
|
const payload = {
|
|
user: {
|
|
id: user.id,
|
|
},
|
|
};
|
|
|
|
const token = await new Promise((resolve, reject) => {
|
|
jwt.sign(
|
|
payload,
|
|
process.env.JWT_SECRET,
|
|
{ expiresIn: "7d" },
|
|
(err, token) => {
|
|
if (err) reject(err);
|
|
else resolve(token);
|
|
},
|
|
);
|
|
});
|
|
|
|
res.json({ success: true, token });
|
|
}),
|
|
);
|
|
|
|
// Login
|
|
router.post(
|
|
"/login",
|
|
loginValidation,
|
|
asyncHandler(async (req, res) => {
|
|
const { email, password } = req.body;
|
|
|
|
let user = await User.findOne({ email });
|
|
if (!user) {
|
|
return res.status(400).json({ success: false, msg: "Invalid credentials" });
|
|
}
|
|
|
|
const isMatch = await bcrypt.compare(password, user.password);
|
|
if (!isMatch) {
|
|
return res.status(400).json({ success: false, msg: "Invalid credentials" });
|
|
}
|
|
|
|
const payload = {
|
|
user: {
|
|
id: user.id,
|
|
},
|
|
};
|
|
|
|
const token = await new Promise((resolve, reject) => {
|
|
jwt.sign(
|
|
payload,
|
|
process.env.JWT_SECRET,
|
|
{ expiresIn: "7d" },
|
|
(err, token) => {
|
|
if (err) reject(err);
|
|
else resolve(token);
|
|
},
|
|
);
|
|
});
|
|
|
|
res.json({ success: true, token });
|
|
}),
|
|
);
|
|
|
|
module.exports = router;
|