Files
turftracker/backend/src/middleware/auth.js
Jake Kasper be4951153c auth stuff
2025-08-21 12:57:23 -05:00

78 lines
2.0 KiB
JavaScript

const jwt = require('jsonwebtoken');
const pool = require('../config/database');
const authenticateToken = async (req, res, next) => {
const authHeader = req.headers['authorization'];
const token = authHeader && authHeader.split(' ')[1]; // Bearer TOKEN
if (!token || token === 'undefined' || token === 'null') {
return res.status(401).json({
success: false,
message: 'Access token required'
});
}
// Log token for debugging (remove in production)
console.log('Token received:', token.substring(0, 20) + '...');
try {
const decoded = jwt.verify(token, process.env.JWT_SECRET);
// Verify user still exists and is active
const userResult = await pool.query(
'SELECT id, email, role FROM users WHERE id = $1',
[decoded.userId]
);
if (userResult.rows.length === 0) {
return res.status(401).json({
success: false,
message: 'Invalid token - user not found'
});
}
req.user = userResult.rows[0];
next();
} catch (error) {
console.error('Token verification error:', error);
return res.status(403).json({
success: false,
message: 'Invalid or expired token'
});
}
};
const requireAdmin = (req, res, next) => {
if (req.user.role !== 'admin') {
return res.status(403).json({
success: false,
message: 'Admin access required'
});
}
next();
};
const requireOwnership = (resourceUserIdField = 'user_id') => {
return (req, res, next) => {
const resourceUserId = req.params[resourceUserIdField] || req.body[resourceUserIdField];
if (req.user.role === 'admin') {
return next(); // Admins can access any resource
}
if (parseInt(resourceUserId) !== req.user.id) {
return res.status(403).json({
success: false,
message: 'Access denied - you can only access your own resources'
});
}
next();
};
};
module.exports = {
authenticateToken,
requireAdmin,
requireOwnership
};