summary refs log tree commit diff
path: root/src/api/routes/users/@me/mfa/codes.ts
blob: 956ac2aeee1d83809f0b0a1a000656f108f03d2b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
import { BackupCode, Config, FieldErrors, generateMfaBackupCodes, MfaCodesSchema, User } from "@fosscord/util";
import bcrypt from "bcrypt";
import { Request, Response, Router } from "express";
import { route } from "../../../..";

let bcrypt: any;
try {
	bcrypt = require("bcrypt");
} catch {
	bcrypt = require("bcryptjs");
	console.log("Warning: using bcryptjs because bcrypt is not installed! Performance will be affected.");
}

const router = Router();

// TODO: This route is replaced with users/@me/mfa/codes-verification in newer clients

router.post("/", route({ body: "MfaCodesSchema" }), async (req: Request, res: Response) => {
	const { password, regenerate } = req.body as MfaCodesSchema;

	const user = await User.findOneOrFail({ where: { id: req.user_id }, select: ["data"] });

	if (!(await bcrypt.compare(password, user.data.hash || ""))) {
		throw FieldErrors({ password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" } });
	}

	var codes: BackupCode[];
	if (regenerate && Config.get().security.twoFactor.generateBackupCodes) {
		await BackupCode.update({ user: { id: req.user_id } }, { expired: true });

		codes = generateMfaBackupCodes(req.user_id);
		await Promise.all(codes.map((x) => x.save()));
	} else {
		codes = await BackupCode.find({
			where: {
				user: {
					id: req.user_id
				},
				expired: false
			}
		});
	}

	return res.json({
		backup_codes: codes.map((x) => ({ ...x, expired: undefined }))
	});
});

export default router;