summary refs log tree commit diff
path: root/api/src/routes/users/@me/mfa/codes.ts
blob: 6ddf32f068e7cc8f2ca2d2e5defff679f8940305 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
import { Router, Request, Response } from "express";
import { route } from "@fosscord/api";
import { BackupCode, Config, FieldErrors, generateMfaBackupCodes, User } from "@fosscord/util";
import bcrypt from "bcrypt";

const router = Router();

export interface MfaCodesSchema {
	password: string;
	regenerate?: boolean;
}

// TODO: This route is replaced with users/@me/mfa/codes-verification in newer clients

router.post("/", route({ body: "MfaCodesSchema" }), async (req: Request, res: Response) => {
	const { password, regenerate } = req.body as MfaCodesSchema;

	const user = await User.findOneOrFail({ id: req.user_id }, { select: ["data"] });

	if (!await bcrypt.compare(password, user.data.hash || "")) {
		throw FieldErrors({ password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" } });
	}

	var codes: BackupCode[];
	if (regenerate && Config.get().security.twoFactor.generateBackupCodes) {
		await BackupCode.update(
			{ user: { id: req.user_id } },
			{ expired: true }
		);

		codes = generateMfaBackupCodes(req.user_id);
		await Promise.all(codes.map(x => x.save()));
	}
	else {
		codes = await BackupCode.find({
			user: {
				id: req.user_id,
			},
			expired: false,
		});
	}

	return res.json({
		backup_codes: codes.map(x => ({ ...x, expired: undefined })),
	})
});

export default router;