users.get(username, (err, user) => { if (err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if (err) return callback(err); if (!res) return callback(new Error('Invalid password')); const token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });
Bcrypt.compare(password, user.password, function (err, isValid) { if (isValid) { request.server.log('info', 'user authentication successful') request.cookieAuth.set(user); return reply.view('profile') } return reply.view('index') })
// auth (login) users router.post('/', async (req,res) => { const {error} = validate(req.body); if(error) return res.status(400).send(error.details[0].message); let user = await User.findOne({email: req.body.email}); if (!user) return res.status(400).send('Invalid Email or Password.') const validPassword = await bcrypt.compare(req.body.password, user.password); if (!validPassword) return res.status(400).send('Invalid Email or Password.') const token = user.generateAuthToken(); res.send(token); });
// Compares two passwords. function comparePasswords(password, callback) { console.log('hello iam herer'); bcrypt.compare(password, this.password, function(error, isMatch) { if(error) { return callback(error); } return callback(null, isMatch); }); }
router.post('/', async (req, res) => { const result = validate(req.body) if (result.error) { return res.status(400).send(result.error.details[0].message) } let user = await Users.findOne({ email: req.body.email }) if (!user) return res.status(400).send('invalid email and password!') const isValid = await bcrypt.compare(req.body.password, user.password) if (!isValid) return res.status(400).send('invalid email and password!') const token = user.generateAuthToken() res.header('x-auth-auth',token).send(JSON.stringify(_.pick(user, ['_id', 'name', 'email']))) })
bcrypt.compare(plain, hash[0].Password, function (err, res) { if (err) reject(err); resolve({auth: res}); });
bcrypt.compare(plainPass, hashword, function (err, isPasswordMatch) { return err == null ? callback(null, isPasswordMatch) : callback(err); });
bcrypt.compare(passw, this.password, (err, isMatch) => { if (err) { return cb(err); } cb(null, isMatch); });
bcrypt.compare(req.body.password, user[0].password, (err, result) => { if (err || !result) { return false; } return true; });
// login router.post("/", async (req, res) => { const { error } = validate(req.body); if (error) return res.status(400).send(error.details[0].message); let user = await User.findOne({ email: req.body.email }); if (!user) return res.status(400).send({status:400, message: "Invalid Email or Password"}); const validPassword = await bcrypt.compare(req.body.password, user.password); if (!validPassword) return res.status(400).send({status:400, message: "Invalid Email or Password"}); const token = user.generateAuthToken(); res.status(200).send({status:200, data: token, message: "User Loggedin Succesfully"}); });
users.get(username, (err, user) => { if(err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if(err) return callback(err); if(!res) return callback(new Error('Invalid password')); const token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });
users.get(username, (err, user) => { if (err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if (err) return callback(err); if (!res) return callback(new Error('Invalid password')); const token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });
users.get(username, (err, user) => { if (err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if (err) return callback(err); if (!res) return callback(new Error('Invalid password')); const token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });
users.get(username, (err, user) => { if(err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if(err) return callback(err); if(!res) return callback(new Error('Invalid password')); let token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });
users.get(username, (err, user) => { if (err) return callback(err); bcrypt.compare(password, user.hash, (err, res) => { if (err) return callback(err); if (!res) return callback(new Error('Invalid password')); var token = jwt.encode({ username: username, expire: Date.now() + (1000 * 60 * 60) //1 hour }, tokenSecret); callback(null, token); }); });