rudeshark.net/src/server/api/endpoints/i/2fa/register.ts

55 lines
1.1 KiB
TypeScript
Raw Normal View History

2017-12-08 14:57:58 +01:00
import $ from 'cafy';
import * as bcrypt from 'bcryptjs';
import * as speakeasy from 'speakeasy';
import * as QRCode from 'qrcode';
2018-11-02 05:47:44 +01:00
import User from '../../../../../models/user';
2018-04-02 06:15:53 +02:00
import config from '../../../../../config';
2018-11-02 05:47:44 +01:00
import define from '../../../define';
2017-12-08 14:57:58 +01:00
2018-07-16 21:36:44 +02:00
export const meta = {
requireCredential: true,
2018-11-02 04:49:08 +01:00
secure: true,
params: {
password: {
validator: $.str
}
}
2018-07-16 21:36:44 +02:00
};
2018-11-02 05:47:44 +01:00
export default define(meta, (ps, user) => new Promise(async (res, rej) => {
2017-12-08 14:57:58 +01:00
// Compare password
2018-11-02 04:49:08 +01:00
const same = await bcrypt.compare(ps.password, user.password);
2017-12-08 14:57:58 +01:00
if (!same) {
return rej('incorrect password');
}
// Generate user's secret key
const secret = speakeasy.generateSecret({
length: 32
});
await User.update(user._id, {
$set: {
2018-03-29 07:48:47 +02:00
twoFactorTempSecret: secret.base32
2017-12-08 14:57:58 +01:00
}
});
// Get the data URL of the authenticator URL
QRCode.toDataURL(speakeasy.otpauthURL({
secret: secret.base32,
encoding: 'base32',
label: user.username,
issuer: config.host
}), (err, data_url) => {
res({
qr: data_url,
secret: secret.base32,
label: user.username,
issuer: config.host
});
});
2018-11-02 05:47:44 +01:00
}));