mirror of
https://github.com/fosrl/pangolin.git
synced 2025-08-17 16:01:22 +02:00
generate 2fa backup codes
This commit is contained in:
parent
e7080c4aa8
commit
4a5e0e1c57
4 changed files with 40 additions and 5 deletions
|
@ -49,7 +49,7 @@ interface DatabaseUserAttributes {
|
||||||
email: string;
|
email: string;
|
||||||
passwordHash: string;
|
passwordHash: string;
|
||||||
twoFactorEnabled: boolean;
|
twoFactorEnabled: boolean;
|
||||||
twoFactorSecret: string | null;
|
twoFactorSecret?: string;
|
||||||
emailVerified: boolean;
|
emailVerified: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -83,6 +83,14 @@ export const users = sqliteTable("user", {
|
||||||
.default(false),
|
.default(false),
|
||||||
});
|
});
|
||||||
|
|
||||||
|
export const twoFactorBackupCodes = sqliteTable("twoFactorBackupCodes", {
|
||||||
|
id: integer("id").primaryKey({ autoIncrement: true }),
|
||||||
|
userId: text("userId")
|
||||||
|
.notNull()
|
||||||
|
.references(() => users.id, { onDelete: "cascade" }),
|
||||||
|
codeHash: text("codeHash").notNull(),
|
||||||
|
});
|
||||||
|
|
||||||
// Sessions table
|
// Sessions table
|
||||||
export const sessions = sqliteTable("session", {
|
export const sessions = sqliteTable("session", {
|
||||||
id: text("id").primaryKey(), // has to be id not sessionId for lucia
|
id: text("id").primaryKey(), // has to be id not sessionId for lucia
|
||||||
|
@ -124,3 +132,4 @@ export type Session = InferSelectModel<typeof sessions>;
|
||||||
export type EmailVerificationCode = InferSelectModel<
|
export type EmailVerificationCode = InferSelectModel<
|
||||||
typeof emailVerificationCodes
|
typeof emailVerificationCodes
|
||||||
>;
|
>;
|
||||||
|
export type TwoFactorBackupCode = InferSelectModel<typeof twoFactorBackupCodes>;
|
||||||
|
|
|
@ -5,7 +5,7 @@ import { fromError } from "zod-validation-error";
|
||||||
import { unauthorized } from "@server/auth";
|
import { unauthorized } from "@server/auth";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
import { db } from "@server/db";
|
import { db } from "@server/db";
|
||||||
import { User, users } from "@server/db/schema";
|
import { twoFactorBackupCodes, User, users } from "@server/db/schema";
|
||||||
import { eq } from "drizzle-orm";
|
import { eq } from "drizzle-orm";
|
||||||
import { response } from "@server/utils";
|
import { response } from "@server/utils";
|
||||||
import { verifyPassword } from "./password";
|
import { verifyPassword } from "./password";
|
||||||
|
@ -82,6 +82,10 @@ export async function disable2fa(
|
||||||
.set({ twoFactorEnabled: false })
|
.set({ twoFactorEnabled: false })
|
||||||
.where(eq(users.id, user.id));
|
.where(eq(users.id, user.id));
|
||||||
|
|
||||||
|
await db
|
||||||
|
.delete(twoFactorBackupCodes)
|
||||||
|
.where(eq(twoFactorBackupCodes.userId, user.id));
|
||||||
|
|
||||||
return response<null>(res, {
|
return response<null>(res, {
|
||||||
data: null,
|
data: null,
|
||||||
success: true,
|
success: true,
|
||||||
|
|
|
@ -7,8 +7,10 @@ import { TOTPController } from "oslo/otp";
|
||||||
import HttpCode from "@server/types/HttpCode";
|
import HttpCode from "@server/types/HttpCode";
|
||||||
import { response } from "@server/utils";
|
import { response } from "@server/utils";
|
||||||
import { db } from "@server/db";
|
import { db } from "@server/db";
|
||||||
import { User, users } from "@server/db/schema";
|
import { twoFactorBackupCodes, User, users } from "@server/db/schema";
|
||||||
import { eq } from "drizzle-orm";
|
import { eq } from "drizzle-orm";
|
||||||
|
import { alphabet, generateRandomString } from "oslo/crypto";
|
||||||
|
import { hashPassword } from "./password";
|
||||||
|
|
||||||
export const verifyTotpBody = z.object({
|
export const verifyTotpBody = z.object({
|
||||||
code: z.string(),
|
code: z.string(),
|
||||||
|
@ -18,6 +20,7 @@ export type VerifyTotpBody = z.infer<typeof verifyTotpBody>;
|
||||||
|
|
||||||
export type VerifyTotpResponse = {
|
export type VerifyTotpResponse = {
|
||||||
valid: boolean;
|
valid: boolean;
|
||||||
|
backupCodes: string[];
|
||||||
};
|
};
|
||||||
|
|
||||||
export async function verifyTotp(
|
export async function verifyTotp(
|
||||||
|
@ -65,6 +68,16 @@ export async function verifyTotp(
|
||||||
decodeHex(user.twoFactorSecret),
|
decodeHex(user.twoFactorSecret),
|
||||||
);
|
);
|
||||||
|
|
||||||
|
const backupCodes = await generateBackupCodes();
|
||||||
|
for (const code of backupCodes) {
|
||||||
|
const hash = await hashPassword(code);
|
||||||
|
|
||||||
|
await db.insert(twoFactorBackupCodes).values({
|
||||||
|
userId: user.id,
|
||||||
|
codeHash: hash,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
if (valid) {
|
if (valid) {
|
||||||
// if valid, enable two-factor authentication; the totp secret is no longer temporary
|
// if valid, enable two-factor authentication; the totp secret is no longer temporary
|
||||||
await db
|
await db
|
||||||
|
@ -73,8 +86,8 @@ export async function verifyTotp(
|
||||||
.where(eq(users.id, user.id));
|
.where(eq(users.id, user.id));
|
||||||
}
|
}
|
||||||
|
|
||||||
return response<{ valid: boolean }>(res, {
|
return response<VerifyTotpResponse>(res, {
|
||||||
data: { valid },
|
data: { valid, backupCodes },
|
||||||
success: true,
|
success: true,
|
||||||
error: false,
|
error: false,
|
||||||
message: valid
|
message: valid
|
||||||
|
@ -91,3 +104,12 @@ export async function verifyTotp(
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async function generateBackupCodes(): Promise<string[]> {
|
||||||
|
const codes = [];
|
||||||
|
for (let i = 0; i < 10; i++) {
|
||||||
|
const code = generateRandomString(8, alphabet("0-9", "A-Z", "a-z"));
|
||||||
|
codes.push(code);
|
||||||
|
}
|
||||||
|
return codes;
|
||||||
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue