From 9f1b241fb5f9144dc5c7487b77bceccecbb3d0a2 Mon Sep 17 00:00:00 2001 From: MillenniumEarl Date: Thu, 11 Mar 2021 14:35:57 +0100 Subject: [PATCH] Add support for different 2fa provider --- src/scripts/constants/css-selector.ts | 4 +++ src/scripts/network-helper.ts | 46 ++++++++++++++++++++++----- 2 files changed, 42 insertions(+), 8 deletions(-) diff --git a/src/scripts/constants/css-selector.ts b/src/scripts/constants/css-selector.ts index a82e486..f9cdfcf 100644 --- a/src/scripts/constants/css-selector.ts +++ b/src/scripts/constants/css-selector.ts @@ -13,6 +13,10 @@ export const GENERIC = { * Banner containing any error messages as text. */ ERROR_BANNER: "div.p-body-pageContent > div.blockMessage", + /** + * Provider that the platform expects to use to verify the code for two-factor authentication. + */ + EXPECTED_2FA_PROVIDER: 'input[name="provider"]', /** * Locate the token used for the session. */ diff --git a/src/scripts/network-helper.ts b/src/scripts/network-helper.ts index ac1a3ce..86293bf 100644 --- a/src/scripts/network-helper.ts +++ b/src/scripts/network-helper.ts @@ -32,6 +32,8 @@ type LookupMapCodeT = { message: string; }; +type ProviderT = "auto" | "totp" | "email"; + // Global variables const USER_AGENT = "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15) " + @@ -144,11 +146,13 @@ export async function authenticate( * Send an OTP code if the login procedure requires it. * @param code OTP code. * @param token Unique token for the session associated with the credentials in use. + * @param provider Provider used to generate the access code. * @param trustedDevice If the device in use is trusted, 2FA authentication is not required for 30 days. */ export async function send2faCode( code: number, token: string, + provider: ProviderT = "auto", trustedDevice: boolean = false ): Promise> { // Prepare the parameters to send via POST request @@ -160,20 +164,25 @@ export async function send2faCode( _xfWithData: "1", code: code.toString(), confirm: "1", - provider: "totp", + provider: provider, remember: "1", trust: trustedDevice ? "1" : "0" }; // Send 2FA params const response = await fetchPOSTResponse(urls.LOGIN_2FA, params); - return response.applyOnSuccess((r: AxiosResponse) => { - // r.data.status is 'ok' if the authentication is successful - const result = r.data.status === "ok"; - const message: string = result ? AUTH_SUCCESSFUL_MESSAGE : r.data.errors.join(","); - const code = messageToCode(message); - return new LoginResult(result, code, message); - }); + + // Check if the authentication is valid + const validAuth = response.applyOnSuccess((r) => manage2faResponse(r)); + + if (validAuth.isSuccess() && validAuth.value.isSuccess()) { + // Valid login + return success(validAuth.value.value); + } else if (validAuth.isSuccess() && validAuth.value.isFailure()) { + // Wrong provider, try with another + const expectedProvider = validAuth.value.value; + return await send2faCode(code, token, expectedProvider, trustedDevice); + } else failure(validAuth.value); } /** @@ -403,4 +412,25 @@ function messageToCode(message: string): number { return result ? result.code : LoginResult.UNKNOWN_ERROR; } +/** + * Manage the response given by the platform when the 2FA is required. + */ +function manage2faResponse(r: AxiosResponse): Result { + // The html property exists only if the provider is wrong + const rightProvider = !("html" in r.data); + + // Wrong provider! + if (!rightProvider) { + const $ = cheerio.load(r.data.html.content); + const expectedProvider = $(GENERIC.EXPECTED_2FA_PROVIDER).attr("value"); + return failure(expectedProvider as ProviderT); + } + + // r.data.status is 'ok' if the authentication is successful + const result = r.data.status === "ok"; + const message: string = result ? AUTH_SUCCESSFUL_MESSAGE : r.data.errors.join(","); + const loginCode = messageToCode(message); + return success(new LoginResult(result, loginCode, message)); +} + //#endregion