Expire token after 1 hour

This commit is contained in:
Ephraim Atta-Duncan
2023-06-05 16:54:12 +00:00
parent 2b9a2ff250
commit 3a0648c85d
6 changed files with 25 additions and 23 deletions

View File

@ -27,7 +27,7 @@ export default function ForgotPassword() {
}),
{
loading: "Sending...",
success: `Reset link sent. `,
success: "Reset link sent.",
error: "Could not send reset link :/",
}
);

View File

@ -40,20 +40,8 @@ export default function ResetPassword(props: any) {
if (!response.ok) {
toast.dismiss();
if (response.status == 404) {
toast.error("Invalid Token");
}
if (response.status == 400) {
toast.error("New password must be different");
}
if (response.status == 500) {
toast.error("Something went wrong.");
}
return;
const error = await response.json();
toast.error(error.message);
}
if (response.ok) {

View File

@ -20,7 +20,7 @@ async function postHandler(req: NextApiRequest, res: NextApiResponse) {
});
if (!user) {
return res.status(404).json({ message: "No user found with this email." });
return res.status(404).json({ message: "No user found with this email" });
}
const existingToken = await prisma.passwordResetToken.findFirst({
@ -33,23 +33,24 @@ async function postHandler(req: NextApiRequest, res: NextApiResponse) {
});
if (existingToken) {
return res
.status(400)
.json({ message: "A password reset has already been requested. Please check your email." });
return res.status(400).json({ message: "Password reset requested." });
}
const token = crypto.randomBytes(64).toString("hex");
const expiry = new Date();
expiry.setHours(expiry.getHours() + 1); // Set expiry to one hour from now
let passwordResetToken;
try {
passwordResetToken = await prisma.passwordResetToken.create({
data: {
token,
expiry,
userId: user.id,
},
});
} catch (error) {
return res.status(500).json({ message: "Error saving token." });
return res.status(500).json({ message: "Something went wrong" });
}
await sendResetPassword(user, passwordResetToken.token);

View File

@ -25,12 +25,16 @@ async function postHandler(req: NextApiRequest, res: NextApiResponse) {
return res.status(404).json({ message: "Invalid token." });
}
const now = new Date();
if (now > foundToken.expiry) {
return res.status(400).json({ message: "Token has expired" });
}
const isSamePassword = await verifyPassword(password, foundToken.User.password!);
if (isSamePassword) {
return res
.status(400)
.json({ message: "New password must be different from the current password." });
return res.status(400).json({ message: "New password must be different" });
}
const hashedPassword = await hashPassword(password);

View File

@ -0,0 +1,8 @@
/*
Warnings:
- Added the required column `expiry` to the `PasswordResetToken` table without a default value. This is not possible if the table is not empty.
*/
-- AlterTable
ALTER TABLE "PasswordResetToken" ADD COLUMN "expiry" TIMESTAMP(3) NOT NULL;

View File

@ -164,6 +164,7 @@ model PasswordResetToken {
id Int @id @default(autoincrement())
token String @unique
createdAt DateTime @default(now())
expiry DateTime
userId Int
User User @relation(fields: [userId], references: [id])
}