Compare commits

..

No commits in common. "9ed5a41d32676d306820ca8809864d2764396e93" and "e9c558abe18667b6bf6ad7c4b88e262080ed300c" have entirely different histories.

View File

@ -4,7 +4,7 @@ from ..dependencies import users_token, database, mail
from ..models import users, email
from fastapi.responses import JSONResponse, HTMLResponse
from fastapi_mail import MessageSchema, MessageType, FastMail
import random, os, bcrypt
import random, os
router = APIRouter()
@ -68,28 +68,15 @@ async def reset_password(request: Request, key: str | None = None, email: str |
detail="Parameters 'key' and 'email' are required"
)
# Récupérer la clé hachée depuis Redis
# Vérifier que la clé correspond à celle stockée dans Redis
key_hashed = database.connect_redis.get(email)
if key_hashed is None:
if key_hashed is None or key_hashed != key:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail="Invalid or expired reset key"
detail="Key is invalid or expired"
)
# Redis stocke les valeurs en `bytes`, donc il faut décoder si nécessaire
if isinstance(key_hashed, bytes):
key_hashed = key_hashed.decode()
# Vérifier que la clé en clair correspond au hash stocké
if not bcrypt.checkpw(key.encode(), key_hashed.encode()):
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail="Invalid reset key"
)
# Afficher la page HTML de réinitialisation du mot de passe
return templates.TemplateResponse("reset_password.html", {"request": request, "email": email, "key": key})