| 
									
										
										
										
											2022-03-22 15:22:20 +00:00
										 |  |  | import { IdentityProvider } from "@prisma/client"; | 
					
						
							| 
									
										
										
										
											2021-09-21 09:29:20 +00:00
										 |  |  | import { NextApiRequest, NextApiResponse } from "next"; | 
					
						
							|  |  |  | import { authenticator } from "otplib"; | 
					
						
							|  |  |  | import qrcode from "qrcode"; | 
					
						
							| 
									
										
										
										
											2021-09-22 19:52:38 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-03-23 22:00:30 +00:00
										 |  |  | import { symmetricEncrypt } from "@calcom/lib/crypto"; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-22 19:52:38 +00:00
										 |  |  | import { ErrorCode, getSession, verifyPassword } from "@lib/auth"; | 
					
						
							|  |  |  | import prisma from "@lib/prisma"; | 
					
						
							| 
									
										
										
										
											2021-09-21 09:29:20 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | export default async function handler(req: NextApiRequest, res: NextApiResponse) { | 
					
						
							|  |  |  |   if (req.method !== "POST") { | 
					
						
							|  |  |  |     return res.status(405).json({ message: "Method not allowed" }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   const session = await getSession({ req }); | 
					
						
							|  |  |  |   if (!session) { | 
					
						
							|  |  |  |     return res.status(401).json({ message: "Not authenticated" }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   if (!session.user?.id) { | 
					
						
							|  |  |  |     console.error("Session is missing a user id."); | 
					
						
							|  |  |  |     return res.status(500).json({ error: ErrorCode.InternalServerError }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   const user = await prisma.user.findUnique({ where: { id: session.user.id } }); | 
					
						
							|  |  |  |   if (!user) { | 
					
						
							|  |  |  |     console.error(`Session references user that no longer exists.`); | 
					
						
							|  |  |  |     return res.status(401).json({ message: "Not authenticated" }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-13 20:05:23 +00:00
										 |  |  |   if (user.identityProvider !== IdentityProvider.CAL) { | 
					
						
							|  |  |  |     return res.status(400).json({ error: ErrorCode.ThirdPartyIdentityProviderEnabled }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-21 09:29:20 +00:00
										 |  |  |   if (!user.password) { | 
					
						
							|  |  |  |     return res.status(400).json({ error: ErrorCode.UserMissingPassword }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   if (user.twoFactorEnabled) { | 
					
						
							|  |  |  |     return res.status(400).json({ error: ErrorCode.TwoFactorAlreadyEnabled }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   if (!process.env.CALENDSO_ENCRYPTION_KEY) { | 
					
						
							|  |  |  |     console.error("Missing encryption key; cannot proceed with two factor setup."); | 
					
						
							|  |  |  |     return res.status(500).json({ error: ErrorCode.InternalServerError }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   const isCorrectPassword = await verifyPassword(req.body.password, user.password); | 
					
						
							|  |  |  |   if (!isCorrectPassword) { | 
					
						
							|  |  |  |     return res.status(400).json({ error: ErrorCode.IncorrectPassword }); | 
					
						
							|  |  |  |   } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   // This generates a secret 32 characters in length. Do not modify the number of
 | 
					
						
							|  |  |  |   // bytes without updating the sanity checks in the enable and login endpoints.
 | 
					
						
							|  |  |  |   const secret = authenticator.generateSecret(20); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   await prisma.user.update({ | 
					
						
							|  |  |  |     where: { | 
					
						
							|  |  |  |       id: session.user.id, | 
					
						
							|  |  |  |     }, | 
					
						
							|  |  |  |     data: { | 
					
						
							|  |  |  |       twoFactorEnabled: false, | 
					
						
							|  |  |  |       twoFactorSecret: symmetricEncrypt(secret, process.env.CALENDSO_ENCRYPTION_KEY), | 
					
						
							|  |  |  |     }, | 
					
						
							|  |  |  |   }); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   const name = user.email || user.username || user.id.toString(); | 
					
						
							|  |  |  |   const keyUri = authenticator.keyuri(name, "Cal", secret); | 
					
						
							|  |  |  |   const dataUri = await qrcode.toDataURL(keyUri); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   return res.json({ secret, keyUri, dataUri }); | 
					
						
							|  |  |  | } |