refs #6427 perf: restorePasswordSMS
gitea/salix/pipeline/pr-dev This commit looks good Details

This commit is contained in:
Javier Segarra 2024-03-20 14:11:05 +01:00
parent 1089dfcbb0
commit f75bd04736
1 changed files with 22 additions and 16 deletions

View File

@ -1,29 +1,29 @@
const UserError = require('vn-loopback/util/user-error');
const OTP_CHAR = ':';
function original({id, phone}) {
// Suma el número de teléfono y el número aleatorio
let suma = parseInt(phone) + parseInt(id);
const total = parseInt(phone) + parseInt(id);
const value = total.toString().slice(-6);
// Convierte la suma a una cadena y toma solo los últimos 6 dígitos
let resultado = suma.toString().slice(-6);
// Devuelve los últimos 6 dígitos
return parseInt(resultado); // Devolvemos un número entero, no una cadena
return parseInt(value); // Devolvemos un número entero, no una cadena
}
function reverse(params) {
const _original = original(params);
return parseInt(_original.toString().split('').reverse().join(''));
}
function generateOTP(params, _otpType) {
function selectOTPMethod() {
const otpIndex = Math.floor(Math.random() * Object.keys(OTP_TYPES).length);
const otpType = _otpType ?? Object.keys(OTP_TYPES)[otpIndex];
return Object.keys(OTP_TYPES)[otpIndex];
}
function generateOTP(params, _otpType, format = true) {
const otpType = _otpType ?? selectOTPMethod();
const otp = OTP_TYPES[otpType](params);
return formatOTP(otpType, otp);
if (format) return formatOTP({otpType, otp});
return {otpType, otp};
}
function formatOTP(otpType, otpValue) {
return `${otpType}${OTP_CHAR}${otpValue}`;
function formatOTP({otpType, otp}) {
return `${otpType}${OTP_CHAR}${otp}`;
}
function checkOTP(params, otp) {
@ -72,7 +72,7 @@ module.exports = Self => {
}
});
Self.recoverPasswordSMS = async function(ctx, id, phone, otp) {
Self.recoverPasswordSMS = async function(ctx, id, phone, _otp) {
const usesPhone = new RegExp(/([+]\d{2})?\d{9}/, 'g').test(+phone);
if (!usesPhone) throw new UserError('Phone not valid');
@ -86,13 +86,19 @@ module.exports = Self => {
if (!user) throw new UserError('Credentials not valid');
try {
if (otp) {
if (_otp) {
return {
valid: checkOTP(query.where, otp),
valid: checkOTP(query.where, _otp),
token: await user.accessTokens.create({})
};
}
return {otp: generateOTP(query.where)};
// ONLY FOR TESTS
// return {otp: generateOTP(query.where)};
// AFTER TESTS
// const otp = generateOTP(query.where, null, false);
// await Self.app.models.Sms.send({req: {accessToken: {userId: id}}}, +phone, formatOTP(otp));
// return {otp: otp.otpType};
} catch (err) {
if (err.code === 'EMAIL_NOT_FOUND')
return;