summary refs log tree commit diff
path: root/src/api/routes/users/@me/mfa/codes.ts
blob: 67bd3d5b1d9393858db46bbf1c92b7c2acb349cc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
import { Router, Request, Response } from "express";
import { route } from "@fosscord/api";
import { BackupCode, FieldErrors, generateMfaBackupCodes, User } from "@fosscord/util";
import bcrypt from "bcrypt";

const router = Router();

export interface MfaCodesSchema {
	password: string;
	regenerate?: boolean;
}

// TODO: This route is replaced with users/@me/mfa/codes-verification in newer clients

router.post("/", route({ body: "MfaCodesSchema" }), async (req: Request, res: Response) => {
	const { password, regenerate } = req.body as MfaCodesSchema;

	const user = await User.findOneOrFail({ where: { id: req.user_id }, select: ["data"] });

	if (!await bcrypt.compare(password, user.data.hash || "")) {
		throw FieldErrors({ password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" } });
	}

	var codes: BackupCode[];
	if (regenerate) {
		await BackupCode.update(
			{ user: { id: req.user_id } },
			{ expired: true }
		);

		codes = generateMfaBackupCodes(req.user_id);
		await Promise.all(codes.map(x => x.save()));
	}
	else {
		codes = await BackupCode.find({
			where: {
				user: {
					id: req.user_id,
				},
				expired: false,
			}
		});
	}

	return res.json({
		backup_codes: codes.map(x => ({ ...x, expired: undefined })),
	});
});

export default router;