Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v3 API URL 'https://api.2fa.directory/v3/tfa.json' returns 404 #8139

Closed
1 task done
joshuacant opened this issue Jul 29, 2024 · 4 comments
Closed
1 task done

v3 API URL 'https://api.2fa.directory/v3/tfa.json' returns 404 #8139

joshuacant opened this issue Jul 29, 2024 · 4 comments
Labels
bug Issue/PR highlights a bug.

Comments

@joshuacant
Copy link

Information about the bug:

Bug description:
The All 2FA-supporting sites 'https://api.2fa.directory/v3/tfa.json' v3 API url returns a github 404 error document instead of valid JSON

Bug reproduction:
Open https://api.2fa.directory/v3/tfa.json

Impacted devices:
All

Expected behavior:
https://api.2fa.directory/v3/tfa.json returns valid JSON

@joshuacant joshuacant added the bug Issue/PR highlights a bug. label Jul 29, 2024
@Carlgo11
Copy link
Member

Thanks for the bug report @joshuacant!
tfa.json and tfa.json.sig are now back.

Just out of curiosity, what's your use-case where you need to use tfa.json instead of a narrower output, like totp.json or u2f.json?

@joshuacant
Copy link
Author

Thanks for fixing this so fast!

The question about use-case would have to be answered by @Rookiestyle who develops the KeePassOTP plugin (https://github.com/Rookiestyle/KeePassOTP) for an application called KeePass. I am just an end user of that plugin. It showed me an error message today when using it. I did a little digging and found this 404 was the root cause, so I raised the issue here.

@Carlgo11
Copy link
Member

Oh, I didn't realize that you were an end-user 😅

@Rookiestyle I went through your code and I don't see any reason why it would need to fetch all 2FA-supporting sites instead of just those with TOTP support. Am I missing something?

@Rookiestyle
Copy link

@Carlgo11 This code is executed when a KeePass user opens the details of an entry. My plugin checks whether 2FA is possible and shows all the available options to the user.

Additionally, in the entry overview my plugin shows a column with the calculated OTP value or "Setup TFA" if this is possible - based on tfa.json.
Also it's possible for a user to define that he has "other 2FA" configured. Other being something different than TOTP. This way they can make the "Setup TFA" string go away if they e. g. have SMS active as second factor

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Issue/PR highlights a bug.
Projects
None yet
Development

No branches or pull requests

3 participants