diff options
| author | syuilo <syuilotan@yahoo.co.jp> | 2017-11-08 14:58:48 +0900 |
|---|---|---|
| committer | syuilo <syuilotan@yahoo.co.jp> | 2017-11-08 14:58:48 +0900 |
| commit | 93c0af613f97cd70dddd454150d8174c1dee3577 (patch) | |
| tree | 1a092b84fc4bb4070ea2dda552f15eba6340c3f8 /src/api/endpoints/i | |
| parent | Fix bugs (diff) | |
| download | sharkey-93c0af613f97cd70dddd454150d8174c1dee3577.tar.gz sharkey-93c0af613f97cd70dddd454150d8174c1dee3577.tar.bz2 sharkey-93c0af613f97cd70dddd454150d8174c1dee3577.zip | |
Improve performance
Diffstat (limited to 'src/api/endpoints/i')
| -rw-r--r-- | src/api/endpoints/i/change_password.ts | 6 | ||||
| -rw-r--r-- | src/api/endpoints/i/regenerate_token.ts | 2 |
2 files changed, 4 insertions, 4 deletions
diff --git a/src/api/endpoints/i/change_password.ts b/src/api/endpoints/i/change_password.ts index faceded29d..16f1a2e4ec 100644 --- a/src/api/endpoints/i/change_password.ts +++ b/src/api/endpoints/i/change_password.ts @@ -22,15 +22,15 @@ module.exports = async (params, user) => new Promise(async (res, rej) => { if (newPasswordErr) return rej('invalid new_password param'); // Compare password - const same = bcrypt.compareSync(currentPassword, user.password); + const same = await bcrypt.compare(currentPassword, user.password); if (!same) { return rej('incorrect password'); } // Generate hash of password - const salt = bcrypt.genSaltSync(8); - const hash = bcrypt.hashSync(newPassword, salt); + const salt = await bcrypt.genSalt(8); + const hash = await bcrypt.hash(newPassword, salt); await User.update(user._id, { $set: { diff --git a/src/api/endpoints/i/regenerate_token.ts b/src/api/endpoints/i/regenerate_token.ts index f96d10ebfc..653468330f 100644 --- a/src/api/endpoints/i/regenerate_token.ts +++ b/src/api/endpoints/i/regenerate_token.ts @@ -20,7 +20,7 @@ module.exports = async (params, user) => new Promise(async (res, rej) => { if (passwordErr) return rej('invalid password param'); // Compare password - const same = bcrypt.compareSync(password, user.password); + const same = await bcrypt.compare(password, user.password); if (!same) { return rej('incorrect password'); |