rudeshark.net/src/server/api/endpoints/i/2fa/register.ts

46 lines
1.1 KiB
TypeScript
Raw Normal View History

2017-12-08 14:57:58 +01:00
import $ from 'cafy';
import * as bcrypt from 'bcryptjs';
import * as speakeasy from 'speakeasy';
import * as QRCode from 'qrcode';
2018-06-18 02:54:53 +02:00
import User, { ILocalUser } from '../../../../../models/user';
2018-04-02 06:15:53 +02:00
import config from '../../../../../config';
2017-12-08 14:57:58 +01:00
2018-07-05 19:58:29 +02:00
export default async (params: any, user: ILocalUser) => new Promise(async (res, rej) => {
2017-12-08 14:57:58 +01:00
// Get 'password' parameter
2018-05-02 11:06:16 +02:00
const [password, passwordErr] = $.str.get(params.password);
2017-12-08 14:57:58 +01:00
if (passwordErr) return rej('invalid password param');
// Compare password
2018-04-07 20:58:11 +02:00
const same = await bcrypt.compare(password, user.password);
2017-12-08 14:57:58 +01:00
if (!same) {
return rej('incorrect password');
}
// Generate user's secret key
const secret = speakeasy.generateSecret({
length: 32
});
await User.update(user._id, {
$set: {
2018-03-29 07:48:47 +02:00
twoFactorTempSecret: secret.base32
2017-12-08 14:57:58 +01:00
}
});
// Get the data URL of the authenticator URL
QRCode.toDataURL(speakeasy.otpauthURL({
secret: secret.base32,
encoding: 'base32',
label: user.username,
issuer: config.host
}), (err, data_url) => {
res({
qr: data_url,
secret: secret.base32,
label: user.username,
issuer: config.host
});
});
});