UNPKG

2fa-plus

Version:

Implementation of two-factor authentication in Node, made simple.

114 lines (113 loc) 4.03 kB
"use strict"; var __create = Object.create; var __defProp = Object.defineProperty; var __getOwnPropDesc = Object.getOwnPropertyDescriptor; var __getOwnPropNames = Object.getOwnPropertyNames; var __getProtoOf = Object.getPrototypeOf; var __hasOwnProp = Object.prototype.hasOwnProperty; var __export = (target, all) => { for (var name in all) __defProp(target, name, { get: all[name], enumerable: true }); }; var __copyProps = (to, from, except, desc) => { if (from && typeof from === "object" || typeof from === "function") { for (let key of __getOwnPropNames(from)) if (!__hasOwnProp.call(to, key) && key !== except) __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable }); } return to; }; var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps( // If the importer is in node compatibility mode or this is not an ESM // file that has been converted to a CommonJS file using a Babel- // compatible transform (i.e. "__esModule" has not been set), then set // "default" to the CommonJS "module.exports" for node compatibility. isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target, mod )); var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod); var __async = (__this, __arguments, generator) => { return new Promise((resolve, reject) => { var fulfilled = (value) => { try { step(generator.next(value)); } catch (e) { reject(e); } }; var rejected = (value) => { try { step(generator.throw(value)); } catch (e) { reject(e); } }; var step = (x) => x.done ? resolve(x.value) : Promise.resolve(x.value).then(fulfilled, rejected); step((generator = generator.apply(__this, __arguments)).next()); }); }; // src/index.ts var src_exports = {}; __export(src_exports, { generateSecret: () => generateSecret, generateToken: () => generateToken, verifyToken: () => verifyToken }); module.exports = __toCommonJS(src_exports); var import_notp = __toESM(require("notp")); var import_crypto = __toESM(require("crypto")); var import_thirty_two = __toESM(require("thirty-two")); function generateSecret(name, account) { return __async(this, null, function* () { const bin = import_crypto.default.randomBytes(20); const base32 = import_thirty_two.default.encode(bin).toString("utf8").replace(/=/g, ""); const secret = base32.toLowerCase().replace(/(\w{4})/g, "$1 ").trim().split(" ").join("").toUpperCase(); const uri = `otpauth://totp/${name}:${account}?secret=${secret}&issuer=${name}`; const qrLib = require("qrcode"); const qr = yield new Promise((resolve, reject) => { qrLib.toDataURL(uri, function(err, url) { if (err) { reject(err); } else { resolve(url); } }); }); return { secret, uri, qr }; }); } function generateToken(secret) { return __async(this, null, function* () { if (!secret) return ""; const unformatted = secret.replace(/\W+/g, "").toUpperCase(); const bin = import_thirty_two.default.decode(unformatted); return import_notp.default.totp.gen(bin); }); } function verifyToken(secret, token) { return __async(this, null, function* () { if (!token || !secret) return false; const unformatted = secret.replace(/\W+/g, "").toUpperCase(); const bin = import_thirty_two.default.decode(unformatted); const verify = import_notp.default.totp.verify(token.replace(/\W+/g, ""), bin, { window: 4, time: 30 }); if (!verify) return false; if (verify.delta) return true; if (verify.delta === 0) return true; return false; }); } // Annotate the CommonJS export names for ESM import in node: 0 && (module.exports = { generateSecret, generateToken, verifyToken }); //# sourceMappingURL=index.js.map