diff --git a/meshcentral.js b/meshcentral.js index b9a30b3b..2e5cc313 100644 --- a/meshcentral.js +++ b/meshcentral.js @@ -4270,7 +4270,7 @@ function mainStart() { if (config.settings.acebase != null) { modules.push('acebase@1.29.5'); } // Add AceBase, official driver. if (config.settings.sqlite3 != null) { modules.push('sqlite3@5.1.7'); } // Add sqlite3, official driver. if (config.settings.vault != null) { modules.push('node-vault@0.10.2'); } // Add official HashiCorp's Vault module. - if (config.settings.plugins != null) { modules.push('semver@7.5.4'); } // Required for version compat testing and update checks + if (config.settings.plugins != null) { modules.push('semver@7.7.1'); } // Required for version compat testing and update checks if ((config.settings.plugins != null) && (config.settings.plugins.proxy != null)) { modules.push('https-proxy-agent@7.0.2'); } // Required for HTTP/HTTPS proxy support else if (config.settings.xmongodb != null) { modules.push('mongojs@3.1.0'); } // Add MongoJS, old driver. if (nodemailer || ((config.smtp != null) && (config.smtp.name != 'console')) || (config.sendmail != null)) { modules.push('nodemailer@6.9.16'); } // Add SMTP support @@ -4299,7 +4299,7 @@ function mainStart() { if (config.settings.no2factorauth !== true) { // Setup YubiKey OTP if configured if (yubikey == true) { modules.push('yubikeyotp@0.2.0'); } // Add YubiKey OTP support - if (allsspi == false) { modules.push('otplib@10.2.3'); } // Google Authenticator support (v10 supports older NodeJS versions). + if (allsspi == false) { modules.push('otplib@12.0.1'); } // Google Authenticator support (v10 supports older NodeJS versions). } // Desktop multiplexor support diff --git a/meshuser.js b/meshuser.js index d6907144..eec5ba8d 100644 --- a/meshuser.js +++ b/meshuser.js @@ -3695,7 +3695,7 @@ module.exports.CreateMeshUser = function (parent, db, ws, req, args, domain, use } else if (domain.dns == null && domain.id != '') { domainName += "/" + domain.id; } - ws.send(JSON.stringify({ action: 'otpauth-request', secret: secret, url: otplib.authenticator.keyuri(encodeURIComponent(user.name), domainName, secret) })); + ws.send(JSON.stringify({ action: 'otpauth-request', secret: secret, url: otplib.authenticator.keyuri(user.name, domainName, secret) })); } break; }