aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorJoris2023-08-12 22:20:23 +0200
committerJoris2023-08-12 22:51:07 +0200
commit273bed103c37c81d477998a46873437733ffc16e (patch)
tree38476ed04c58d49207f5b4b61c651c1b72188a8a /src
parent8c689db1c8fa06ddb9119e626e7b1149f3493905 (diff)
Generate crypto random token instead of uuid
Diffstat (limited to 'src')
-rw-r--r--src/controller/login.rs7
-rw-r--r--src/utils/cookie.rs15
2 files changed, 14 insertions, 8 deletions
diff --git a/src/controller/login.rs b/src/controller/login.rs
index 9757c25..036e6fc 100644
--- a/src/controller/login.rs
+++ b/src/controller/login.rs
@@ -4,7 +4,6 @@ use hyper::{Body, Response};
use sqlx::sqlite::SqlitePool;
use std::collections::HashMap;
use tera::{Context, Tera};
-use uuid::Uuid;
use crate::controller::utils::with_headers;
use crate::controller::wallet::Wallet;
@@ -29,7 +28,6 @@ pub async fn page(
utils::template(assets, templates, "login.html", context)
}
-// TODO rewrite
pub async fn login(
config: &Config,
assets: &HashMap<String, String>,
@@ -43,8 +41,7 @@ pub async fn login(
{
Some(hash) => match bcrypt::verify(login.password, &hash) {
Ok(true) => {
- // TODO generate truly random instead of uuid
- let login_token = Uuid::new_v4();
+ let login_token = cookie::generate_token();
if db::users::set_login_token(
&pool,
@@ -53,7 +50,7 @@ pub async fn login(
)
.await
{
- match cookie::login(config, login_token) {
+ match cookie::login(config, &login_token) {
Ok(str) => with_headers(
utils::redirect("/"),
vec![(SET_COOKIE, &str)],
diff --git a/src/utils/cookie.rs b/src/utils/cookie.rs
index c716936..826efa9 100644
--- a/src/utils/cookie.rs
+++ b/src/utils/cookie.rs
@@ -1,10 +1,13 @@
-use uuid::Uuid;
+use hex;
+use rand_core::{OsRng, RngCore};
use crate::crypto::signed;
use crate::model::config::Config;
-pub fn login(config: &Config, token: Uuid) -> Result<String, String> {
- let signed_token = signed::sign(&config.auth_secret, &token.to_string())?;
+const TOKEN_BYTES: usize = 20;
+
+pub fn login(config: &Config, token: &str) -> Result<String, String> {
+ let signed_token = signed::sign(&config.auth_secret, token)?;
Ok(cookie(config, &signed_token, 24 * 60 * 60))
}
@@ -19,6 +22,12 @@ pub fn extract_token(config: &Config, cookie: &str) -> Result<String, String> {
signed::verify(&config.auth_secret, signed_cookie)
}
+pub fn generate_token() -> String {
+ let mut token = [0u8; TOKEN_BYTES];
+ OsRng.fill_bytes(&mut token);
+ hex::encode(token)
+}
+
fn cookie(config: &Config, token: &str, max_age_seconds: i32) -> String {
let mut xs = vec![
format!("TOKEN={token}"),