2025-02-18 01:09:36 +01:00
|
|
|
const jwt = require('jsonwebtoken');
|
2025-03-08 21:28:27 +01:00
|
|
|
const {
|
|
|
|
|
verifyTOTP,
|
|
|
|
|
verifyBackupCode,
|
|
|
|
|
getTOTPSecret,
|
|
|
|
|
} = require('~/server/services/twoFactorService');
|
2025-02-18 01:09:36 +01:00
|
|
|
const { setAuthTokens } = require('~/server/services/AuthService');
|
|
|
|
|
const { getUserById } = require('~/models/userMethods');
|
|
|
|
|
const { logger } = require('~/config');
|
|
|
|
|
|
|
|
|
|
const verify2FA = async (req, res) => {
|
|
|
|
|
try {
|
|
|
|
|
const { tempToken, token, backupCode } = req.body;
|
|
|
|
|
if (!tempToken) {
|
|
|
|
|
return res.status(400).json({ message: 'Missing temporary token' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let payload;
|
|
|
|
|
try {
|
|
|
|
|
payload = jwt.verify(tempToken, process.env.JWT_SECRET);
|
|
|
|
|
} catch (err) {
|
|
|
|
|
return res.status(401).json({ message: 'Invalid or expired temporary token' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const user = await getUserById(payload.userId);
|
2025-03-08 21:28:27 +01:00
|
|
|
// Ensure that the user exists and has 2FA enabled
|
|
|
|
|
if (!user || !user.twoFactorEnabled) {
|
2025-02-18 01:09:36 +01:00
|
|
|
return res.status(400).json({ message: '2FA is not enabled for this user' });
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-08 21:28:27 +01:00
|
|
|
// Retrieve (and decrypt if necessary) the TOTP secret.
|
2025-02-19 19:33:29 +01:00
|
|
|
const secret = await getTOTPSecret(user.totpSecret);
|
2025-02-18 01:09:36 +01:00
|
|
|
|
2025-02-19 19:33:29 +01:00
|
|
|
let verified = false;
|
|
|
|
|
if (token && (await verifyTOTP(secret, token))) {
|
2025-02-18 01:09:36 +01:00
|
|
|
verified = true;
|
|
|
|
|
} else if (backupCode) {
|
|
|
|
|
verified = await verifyBackupCode({ user, backupCode });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!verified) {
|
|
|
|
|
return res.status(401).json({ message: 'Invalid 2FA code or backup code' });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Prepare user data for response.
|
|
|
|
|
const userData = user.toObject ? user.toObject() : { ...user };
|
|
|
|
|
delete userData.password;
|
|
|
|
|
delete userData.__v;
|
|
|
|
|
delete userData.totpSecret;
|
|
|
|
|
userData.id = user._id.toString();
|
|
|
|
|
|
|
|
|
|
const authToken = await setAuthTokens(user._id, res);
|
|
|
|
|
return res.status(200).json({ token: authToken, user: userData });
|
|
|
|
|
} catch (err) {
|
|
|
|
|
logger.error('[verify2FA]', err);
|
|
|
|
|
return res.status(500).json({ message: 'Something went wrong' });
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
module.exports = { verify2FA };
|