rudeshark.net/src/server/api/endpoints/i/2fa/register.ts

58 lines
1.2 KiB
TypeScript
Raw Normal View History

2017-12-08 14:57:58 +01:00
import $ from 'cafy';
import * as bcrypt from 'bcryptjs';
import * as speakeasy from 'speakeasy';
import * as QRCode from 'qrcode';
2018-06-18 02:54:53 +02:00
import User, { ILocalUser } from '../../../../../models/user';
2018-04-02 06:15:53 +02:00
import config from '../../../../../config';
2018-11-02 04:49:08 +01:00
import getParams from '../../../get-params';
2017-12-08 14:57:58 +01:00
2018-07-16 21:36:44 +02:00
export const meta = {
requireCredential: true,
2018-11-02 04:49:08 +01:00
secure: true,
params: {
password: {
validator: $.str
}
}
2018-07-16 21:36:44 +02:00
};
2018-07-05 19:58:29 +02:00
export default async (params: any, user: ILocalUser) => new Promise(async (res, rej) => {
2018-11-02 04:49:08 +01:00
const [ps, psErr] = getParams(meta, params);
if (psErr) return rej(psErr);
2017-12-08 14:57:58 +01:00
// Compare password
2018-11-02 04:49:08 +01:00
const same = await bcrypt.compare(ps.password, user.password);
2017-12-08 14:57:58 +01:00
if (!same) {
return rej('incorrect password');
}
// Generate user's secret key
const secret = speakeasy.generateSecret({
length: 32
});
await User.update(user._id, {
$set: {
2018-03-29 07:48:47 +02:00
twoFactorTempSecret: secret.base32
2017-12-08 14:57:58 +01:00
}
});
// Get the data URL of the authenticator URL
QRCode.toDataURL(speakeasy.otpauthURL({
secret: secret.base32,
encoding: 'base32',
label: user.username,
issuer: config.host
}), (err, data_url) => {
res({
qr: data_url,
secret: secret.base32,
label: user.username,
issuer: config.host
});
});
});