const genSalt = (user, SALT_FACTOR, next) => { bcrypt.genSalt(SALT_FACTOR, (err, salt) => { if (err) { return next(err) } return hash(user, salt, next) }) }
// manual update password router.put('/password', auth, async (req,res,next) => { const {error} = validatePassword(req.body); if(error) return res.status(400).send(error.details[0].message); user = await User.findById(req.user._id); if(!user) return res.status(404).send('User account not found.'); const salt = await bcrypt.genSalt(10); user.password = await bcrypt.hash(req.body.password, salt); user.save(); res.status(200).send(_.pick(user, ['_id'])); });
async function saveUser(name, email, password) { const forgotPassword = { token: crypto.randomBytes(20).toString('hex'), createdAt: moment().unix() }; const user = new User({name, email, password, forgotPassword}); const salt = await bcrypt.genSalt(10); user.password = await bcrypt.hash(user.password, salt); return await user.save(); }
UserSchema.pre('save', (next) => { let user = this if (!user.isModified('password')) return next() bcrypt.genSalt(10, (err, salt) => { if (err) return next(err) bcrypt.hash(user.password, salt, null, (err, hash) => { if (err) return next(err) user.password = hash next() }) }) })
Model.beforeSave(async (user, options) => { //Function to convert plain password to encrypt form let err; if (user.changed('Password')){ let salt, hash [err, salt] = await to(bcrypt.genSalt(10)); if(err) TE(err.message, true); [err, hash] = await to(bcrypt.hash(user.Password, salt)); if(err) TE(err.message, true); user.Password = hash; } });
bcrypt.genSalt(10, (err, salt) => { bcrypt.hash(values.password, salt, (err, hash) => { if (err) return cb(err) values.password = hash cb() }) })
bcrypt.genSalt(12, function(err, salt){ if (err) return fn(err); user.salt = salt; bcrypt.hash(user.pass, salt, function(err, hash){ if (err) return fn(err); user.pass = hash; fn(); }) });
bcrypt.genSalt(saltRounds, function (err, salt) { bcrypt.hash(password, salt, function (err, hash) { if (err) reject(err); resolve(hash); }); if (err) reject(err); });
bcrypt.genSalt(10, function(err, salt) { if (err) { return done(err); } bcrypt.hash(password, salt, function(err, hash) { done(err, hash); }); });
hashPassword(cb) { bcrypt.genSalt(12, (err, salt) => { if (err) return cb(err); this.salt = salt; bcrypt.hash(this.pass, salt, (err, hash) => { if (err) return cb(err); this.pass = hash; cb(); }); }); }
bcrypt.genSalt(10, function(err, salt) { bcrypt.hash(newUser.password, salt, function(err, hash) { newUser.password = hash; newUser.save(callback); }); });
hashPassword(cb) { bcrypt.genSalt(12, (err, salt) => { if (err) return cb(err); this.salt = salt; bcrypt.hash(this.pass, salt, (err, hash) => { if (err) return cb(err); this.pass = hash; cb(); }); }); }
async function saveUser(name, email, password) { const forgotPassword = { token: crypto.randomBytes(20).toString('hex'), createdAt: moment().unix() }; const user = new User({name, email, password, forgotPassword}); const salt = await bcrypt.genSalt(10); user.password = await bcrypt.hash(user.password, salt); return await user.save(); }
async function saveUser(name, email, password) { const forgotPassword = { token: crypto.randomBytes(20).toString('hex'), createdAt: moment().unix() }; const user = new User({name, email, password, forgotPassword}); const salt = await bcrypt.genSalt(10); user.password = await bcrypt.hash(user.password, salt); return await user.save(); }
bcrypt.genSalt(10, (err, salt) => { bcrypt.hash(values.password, salt, (err, hash) => { if (err) return cb(err) values.password = hash cb() }) })