Reduce bcrypt iterations from 15 to 12 (common for 2025 processors)

This commit is contained in:
Nicolas
2025-04-28 12:12:56 +02:00
parent c00b64d666
commit b5e96e02c3
4 changed files with 72 additions and 72 deletions

View File

@@ -1,56 +1,56 @@
'use server';
import { prisma, Prisma, PrismaClient } from '@repo/db';
import { getServerSession } from '../../api/auth/[...nextauth]/auth';
import bcrypt from 'bcryptjs';
"use server";
import { prisma, Prisma, PrismaClient } from "@repo/db";
import { getServerSession } from "../../api/auth/[...nextauth]/auth";
import bcrypt from "bcryptjs";
export const unlinkDiscord = async (userId: string) => {
const client = new PrismaClient();
await client.discordAccount.deleteMany({
where: {
userId,
},
});
const client = new PrismaClient();
await client.discordAccount.deleteMany({
where: {
userId,
},
});
};
export const updateUser = async (changes: Prisma.UserUpdateInput) => {
const session = await getServerSession();
if (!session) return null;
const session = await getServerSession();
if (!session) return null;
const client = new PrismaClient();
const client = new PrismaClient();
await client.user.update({
where: {
id: session.user.id,
},
data: changes,
});
await client.user.update({
where: {
id: session.user.id,
},
data: changes,
});
};
export const changePassword = async (
oldPassword: string,
newPassword: string
oldPassword: string,
newPassword: string,
) => {
const session = await getServerSession();
if (!session)
return {
error: 'User not found',
};
const session = await getServerSession();
if (!session)
return {
error: "User not found",
};
if (!(await bcrypt.compare(oldPassword, session.user.password)))
return {
error: 'Old password is incorrect',
};
if (!(await bcrypt.compare(oldPassword, session.user.password)))
return {
error: "Old password is incorrect",
};
const hashedPassword = await bcrypt.hash(newPassword, 15);
await prisma.user.update({
data: {
password: hashedPassword,
},
where: {
id: session.user.id,
},
});
return {
success: true,
};
const hashedPassword = await bcrypt.hash(newPassword, 12);
await prisma.user.update({
data: {
password: hashedPassword,
},
where: {
id: session.user.id,
},
});
return {
success: true,
};
};