refactor: use requireAuth in updates routes (required-auth)

This commit is contained in:
Jennie Robinson Faber 2026-04-04 12:36:25 +01:00
parent 15fdf77be8
commit cbb519449a
4 changed files with 8 additions and 92 deletions

View file

@ -1,29 +1,8 @@
import jwt from "jsonwebtoken";
import Update from "../../models/update.js"; import Update from "../../models/update.js";
import { connectDB } from "../../utils/mongoose.js";
export default defineEventHandler(async (event) => { export default defineEventHandler(async (event) => {
await connectDB(); const member = await requireAuth(event);
const memberId = member._id.toString();
const token = getCookie(event, "auth-token");
if (!token) {
throw createError({
statusCode: 401,
statusMessage: "Not authenticated",
});
}
let memberId;
try {
const decoded = jwt.verify(token, useRuntimeConfig().jwtSecret);
memberId = decoded.memberId;
} catch (err) {
throw createError({
statusCode: 401,
statusMessage: "Invalid or expired token",
});
}
const id = getRouterParam(event, "id"); const id = getRouterParam(event, "id");

View file

@ -1,29 +1,8 @@
import jwt from "jsonwebtoken";
import Update from "../../models/update.js"; import Update from "../../models/update.js";
import { connectDB } from "../../utils/mongoose.js";
export default defineEventHandler(async (event) => { export default defineEventHandler(async (event) => {
await connectDB(); const member = await requireAuth(event);
const memberId = member._id.toString();
const token = getCookie(event, "auth-token");
if (!token) {
throw createError({
statusCode: 401,
statusMessage: "Not authenticated",
});
}
let memberId;
try {
const decoded = jwt.verify(token, useRuntimeConfig().jwtSecret);
memberId = decoded.memberId;
} catch (err) {
throw createError({
statusCode: 401,
statusMessage: "Invalid or expired token",
});
}
const id = getRouterParam(event, "id"); const id = getRouterParam(event, "id");
const body = await validateBody(event, updatePatchSchema); const body = await validateBody(event, updatePatchSchema);

View file

@ -1,31 +1,10 @@
import jwt from "jsonwebtoken";
import Update from "../../models/update.js"; import Update from "../../models/update.js";
import { connectDB } from "../../utils/mongoose.js";
import { validateBody } from "../../utils/validateBody.js"; import { validateBody } from "../../utils/validateBody.js";
import { updateCreateSchema } from "../../utils/schemas.js"; import { updateCreateSchema } from "../../utils/schemas.js";
export default defineEventHandler(async (event) => { export default defineEventHandler(async (event) => {
await connectDB(); const member = await requireAuth(event);
const memberId = member._id.toString();
const token = getCookie(event, "auth-token");
if (!token) {
throw createError({
statusCode: 401,
statusMessage: "Not authenticated",
});
}
let memberId;
try {
const decoded = jwt.verify(token, useRuntimeConfig().jwtSecret);
memberId = decoded.memberId;
} catch (err) {
throw createError({
statusCode: 401,
statusMessage: "Invalid or expired token",
});
}
const body = await validateBody(event, updateCreateSchema); const body = await validateBody(event, updateCreateSchema);

View file

@ -1,29 +1,8 @@
import jwt from "jsonwebtoken";
import Update from "../../models/update.js"; import Update from "../../models/update.js";
import { connectDB } from "../../utils/mongoose.js";
export default defineEventHandler(async (event) => { export default defineEventHandler(async (event) => {
await connectDB(); const member = await requireAuth(event);
const memberId = member._id.toString();
const token = getCookie(event, "auth-token");
if (!token) {
throw createError({
statusCode: 401,
statusMessage: "Not authenticated",
});
}
let memberId;
try {
const decoded = jwt.verify(token, useRuntimeConfig().jwtSecret);
memberId = decoded.memberId;
} catch (err) {
throw createError({
statusCode: 401,
statusMessage: "Invalid or expired token",
});
}
const query = getQuery(event); const query = getQuery(event);
const limit = parseInt(query.limit) || 20; const limit = parseInt(query.limit) || 20;