generate 2fa backup codes

This commit is contained in:
Milo Schwartz 2024-10-05 15:31:28 -04:00
parent e7080c4aa8
commit 4a5e0e1c57
No known key found for this signature in database
4 changed files with 40 additions and 5 deletions

View file

@ -49,7 +49,7 @@ interface DatabaseUserAttributes {
email: string; email: string;
passwordHash: string; passwordHash: string;
twoFactorEnabled: boolean; twoFactorEnabled: boolean;
twoFactorSecret: string | null; twoFactorSecret?: string;
emailVerified: boolean; emailVerified: boolean;
} }

View file

@ -83,6 +83,14 @@ export const users = sqliteTable("user", {
.default(false), .default(false),
}); });
export const twoFactorBackupCodes = sqliteTable("twoFactorBackupCodes", {
id: integer("id").primaryKey({ autoIncrement: true }),
userId: text("userId")
.notNull()
.references(() => users.id, { onDelete: "cascade" }),
codeHash: text("codeHash").notNull(),
});
// Sessions table // Sessions table
export const sessions = sqliteTable("session", { export const sessions = sqliteTable("session", {
id: text("id").primaryKey(), // has to be id not sessionId for lucia id: text("id").primaryKey(), // has to be id not sessionId for lucia
@ -124,3 +132,4 @@ export type Session = InferSelectModel<typeof sessions>;
export type EmailVerificationCode = InferSelectModel< export type EmailVerificationCode = InferSelectModel<
typeof emailVerificationCodes typeof emailVerificationCodes
>; >;
export type TwoFactorBackupCode = InferSelectModel<typeof twoFactorBackupCodes>;

View file

@ -5,7 +5,7 @@ import { fromError } from "zod-validation-error";
import { unauthorized } from "@server/auth"; import { unauthorized } from "@server/auth";
import { z } from "zod"; import { z } from "zod";
import { db } from "@server/db"; import { db } from "@server/db";
import { User, users } from "@server/db/schema"; import { twoFactorBackupCodes, User, users } from "@server/db/schema";
import { eq } from "drizzle-orm"; import { eq } from "drizzle-orm";
import { response } from "@server/utils"; import { response } from "@server/utils";
import { verifyPassword } from "./password"; import { verifyPassword } from "./password";
@ -82,6 +82,10 @@ export async function disable2fa(
.set({ twoFactorEnabled: false }) .set({ twoFactorEnabled: false })
.where(eq(users.id, user.id)); .where(eq(users.id, user.id));
await db
.delete(twoFactorBackupCodes)
.where(eq(twoFactorBackupCodes.userId, user.id));
return response<null>(res, { return response<null>(res, {
data: null, data: null,
success: true, success: true,

View file

@ -7,8 +7,10 @@ import { TOTPController } from "oslo/otp";
import HttpCode from "@server/types/HttpCode"; import HttpCode from "@server/types/HttpCode";
import { response } from "@server/utils"; import { response } from "@server/utils";
import { db } from "@server/db"; import { db } from "@server/db";
import { User, users } from "@server/db/schema"; import { twoFactorBackupCodes, User, users } from "@server/db/schema";
import { eq } from "drizzle-orm"; import { eq } from "drizzle-orm";
import { alphabet, generateRandomString } from "oslo/crypto";
import { hashPassword } from "./password";
export const verifyTotpBody = z.object({ export const verifyTotpBody = z.object({
code: z.string(), code: z.string(),
@ -18,6 +20,7 @@ export type VerifyTotpBody = z.infer<typeof verifyTotpBody>;
export type VerifyTotpResponse = { export type VerifyTotpResponse = {
valid: boolean; valid: boolean;
backupCodes: string[];
}; };
export async function verifyTotp( export async function verifyTotp(
@ -65,6 +68,16 @@ export async function verifyTotp(
decodeHex(user.twoFactorSecret), decodeHex(user.twoFactorSecret),
); );
const backupCodes = await generateBackupCodes();
for (const code of backupCodes) {
const hash = await hashPassword(code);
await db.insert(twoFactorBackupCodes).values({
userId: user.id,
codeHash: hash,
});
}
if (valid) { if (valid) {
// if valid, enable two-factor authentication; the totp secret is no longer temporary // if valid, enable two-factor authentication; the totp secret is no longer temporary
await db await db
@ -73,8 +86,8 @@ export async function verifyTotp(
.where(eq(users.id, user.id)); .where(eq(users.id, user.id));
} }
return response<{ valid: boolean }>(res, { return response<VerifyTotpResponse>(res, {
data: { valid }, data: { valid, backupCodes },
success: true, success: true,
error: false, error: false,
message: valid message: valid
@ -91,3 +104,12 @@ export async function verifyTotp(
); );
} }
} }
async function generateBackupCodes(): Promise<string[]> {
const codes = [];
for (let i = 0; i < 10; i++) {
const code = generateRandomString(8, alphabet("0-9", "A-Z", "a-z"));
codes.push(code);
}
return codes;
}