From 288a19ea9700b096907284b75fea539694662a5b Mon Sep 17 00:00:00 2001 From: bill bittner Date: Sun, 29 Oct 2017 20:40:05 -0700 Subject: [PATCH] created migration to brypt existing passwords --- migrations/UpdateUserPasswords5.js | 46 ++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 migrations/UpdateUserPasswords5.js diff --git a/migrations/UpdateUserPasswords5.js b/migrations/UpdateUserPasswords5.js new file mode 100644 index 00000000..f911c86e --- /dev/null +++ b/migrations/UpdateUserPasswords5.js @@ -0,0 +1,46 @@ +const db = require('../models'); +const bcrypt = require('bcrypt'); +const logger = require('winston'); + +module.exports = { + up: (queryInterface, Sequelize) => { + // get all the users + return db.User + .findAll() + .then((users) => { + // create an array of promises, with each promise bcrypting a password and updating the record + const promises = users.map((record) => { + // bcrypt + // generate a salt string to use for hashing + return new Promise((resolve, reject) => { + bcrypt.genSalt((saltError, salt) => { + if (saltError) { + logger.error('salt error', saltError); + reject(saltError); + return; + } + // generate a hashed version of the user's password + bcrypt.hash(record.password, salt, (hashError, hash) => { + // if there is an error with the hash generation return the error + if (hashError) { + logger.error('hash error', hashError); + reject(hashError); + return; + } + // replace the password string with the hash password value + resolve(queryInterface.sequelize.query(`UPDATE User SET User.password = "${hash}" WHERE User.id = ${record.id}`)); + }); + }); + }); + }); + // return the array of promises + return Promise.all(promises); + }) + .catch(error => { + logger.error('error prepping promises array', error); + }); + }, + down: (queryInterface, Sequelize) => { + // logic for reverting the changes + }, +};