diff options
author | Joris | 2023-08-12 22:20:23 +0200 |
---|---|---|
committer | Joris | 2023-08-12 22:51:07 +0200 |
commit | 273bed103c37c81d477998a46873437733ffc16e (patch) | |
tree | 38476ed04c58d49207f5b4b61c651c1b72188a8a /src | |
parent | 8c689db1c8fa06ddb9119e626e7b1149f3493905 (diff) |
Generate crypto random token instead of uuid
Diffstat (limited to 'src')
-rw-r--r-- | src/controller/login.rs | 7 | ||||
-rw-r--r-- | src/utils/cookie.rs | 15 |
2 files changed, 14 insertions, 8 deletions
diff --git a/src/controller/login.rs b/src/controller/login.rs index 9757c25..036e6fc 100644 --- a/src/controller/login.rs +++ b/src/controller/login.rs @@ -4,7 +4,6 @@ use hyper::{Body, Response}; use sqlx::sqlite::SqlitePool; use std::collections::HashMap; use tera::{Context, Tera}; -use uuid::Uuid; use crate::controller::utils::with_headers; use crate::controller::wallet::Wallet; @@ -29,7 +28,6 @@ pub async fn page( utils::template(assets, templates, "login.html", context) } -// TODO rewrite pub async fn login( config: &Config, assets: &HashMap<String, String>, @@ -43,8 +41,7 @@ pub async fn login( { Some(hash) => match bcrypt::verify(login.password, &hash) { Ok(true) => { - // TODO generate truly random instead of uuid - let login_token = Uuid::new_v4(); + let login_token = cookie::generate_token(); if db::users::set_login_token( &pool, @@ -53,7 +50,7 @@ pub async fn login( ) .await { - match cookie::login(config, login_token) { + match cookie::login(config, &login_token) { Ok(str) => with_headers( utils::redirect("/"), vec![(SET_COOKIE, &str)], diff --git a/src/utils/cookie.rs b/src/utils/cookie.rs index c716936..826efa9 100644 --- a/src/utils/cookie.rs +++ b/src/utils/cookie.rs @@ -1,10 +1,13 @@ -use uuid::Uuid; +use hex; +use rand_core::{OsRng, RngCore}; use crate::crypto::signed; use crate::model::config::Config; -pub fn login(config: &Config, token: Uuid) -> Result<String, String> { - let signed_token = signed::sign(&config.auth_secret, &token.to_string())?; +const TOKEN_BYTES: usize = 20; + +pub fn login(config: &Config, token: &str) -> Result<String, String> { + let signed_token = signed::sign(&config.auth_secret, token)?; Ok(cookie(config, &signed_token, 24 * 60 * 60)) } @@ -19,6 +22,12 @@ pub fn extract_token(config: &Config, cookie: &str) -> Result<String, String> { signed::verify(&config.auth_secret, signed_cookie) } +pub fn generate_token() -> String { + let mut token = [0u8; TOKEN_BYTES]; + OsRng.fill_bytes(&mut token); + hex::encode(token) +} + fn cookie(config: &Config, token: &str, max_age_seconds: i32) -> String { let mut xs = vec![ format!("TOKEN={token}"), |