@@ -505,7 +505,7 @@ RestWrite.prototype.ensureUniqueAuthDataId = async function () {
505
505
key => this . data . authData [ key ] && this . data . authData [ key ] . id
506
506
) ;
507
507
508
- if ( ! hasAuthDataId ) return ;
508
+ if ( ! hasAuthDataId ) { return ; }
509
509
510
510
const r = await Auth . findUsersWithAuthData ( this . config , this . data . authData ) ;
511
511
const results = this . filteredObjectsByACL ( r ) ;
@@ -810,7 +810,7 @@ RestWrite.prototype._validateEmail = function () {
810
810
} ;
811
811
812
812
RestWrite . prototype . _validatePasswordPolicy = function ( ) {
813
- if ( ! this . config . passwordPolicy ) return Promise . resolve ( ) ;
813
+ if ( ! this . config . passwordPolicy ) { return Promise . resolve ( ) ; }
814
814
return this . _validatePasswordRequirements ( ) . then ( ( ) => {
815
815
return this . _validatePasswordHistory ( ) ;
816
816
} ) ;
@@ -845,17 +845,17 @@ RestWrite.prototype._validatePasswordRequirements = function () {
845
845
if ( this . data . username ) {
846
846
// username is not passed during password reset
847
847
if ( this . data . password . indexOf ( this . data . username ) >= 0 )
848
- return Promise . reject ( new Parse . Error ( Parse . Error . VALIDATION_ERROR , containsUsernameError ) ) ;
848
+ { return Promise . reject ( new Parse . Error ( Parse . Error . VALIDATION_ERROR , containsUsernameError ) ) ; }
849
849
} else {
850
850
// retrieve the User object using objectId during password reset
851
851
return this . config . database . find ( '_User' , { objectId : this . objectId ( ) } ) . then ( results => {
852
852
if ( results . length != 1 ) {
853
853
throw undefined ;
854
854
}
855
855
if ( this . data . password . indexOf ( results [ 0 ] . username ) >= 0 )
856
- return Promise . reject (
857
- new Parse . Error ( Parse . Error . VALIDATION_ERROR , containsUsernameError )
858
- ) ;
856
+ { return Promise . reject (
857
+ new Parse . Error ( Parse . Error . VALIDATION_ERROR , containsUsernameError )
858
+ ) ; }
859
859
return Promise . resolve ( ) ;
860
860
} ) ;
861
861
}
@@ -880,18 +880,18 @@ RestWrite.prototype._validatePasswordHistory = function () {
880
880
const user = results [ 0 ] ;
881
881
let oldPasswords = [ ] ;
882
882
if ( user . _password_history )
883
- oldPasswords = _ . take (
884
- user . _password_history ,
885
- this . config . passwordPolicy . maxPasswordHistory - 1
886
- ) ;
883
+ { oldPasswords = _ . take (
884
+ user . _password_history ,
885
+ this . config . passwordPolicy . maxPasswordHistory - 1
886
+ ) ; }
887
887
oldPasswords . push ( user . password ) ;
888
888
const newPassword = this . data . password ;
889
889
// compare the new password hash with all old password hashes
890
890
const promises = oldPasswords . map ( function ( hash ) {
891
891
return passwordCrypto . compare ( newPassword , hash ) . then ( result => {
892
892
if ( result )
893
- // reject if there is a match
894
- return Promise . reject ( 'REPEAT_PASSWORD' ) ;
893
+ // reject if there is a match
894
+ { return Promise . reject ( 'REPEAT_PASSWORD' ) ; }
895
895
return Promise . resolve ( ) ;
896
896
} ) ;
897
897
} ) ;
@@ -902,13 +902,13 @@ RestWrite.prototype._validatePasswordHistory = function () {
902
902
} )
903
903
. catch ( err => {
904
904
if ( err === 'REPEAT_PASSWORD' )
905
- // a match was found
906
- return Promise . reject (
907
- new Parse . Error (
908
- Parse . Error . VALIDATION_ERROR ,
909
- `New password should not be the same as last ${ this . config . passwordPolicy . maxPasswordHistory } passwords.`
910
- )
911
- ) ;
905
+ // a match was found
906
+ { return Promise . reject (
907
+ new Parse . Error (
908
+ Parse . Error . VALIDATION_ERROR ,
909
+ `New password should not be the same as last ${ this . config . passwordPolicy . maxPasswordHistory } passwords.`
910
+ )
911
+ ) ; }
912
912
throw err ;
913
913
} ) ;
914
914
} ) ;
0 commit comments