use crate::errors::RBError; use crate::models::{NewRefreshToken, NewUser, RefreshToken, User}; use crate::schema::refresh_tokens::dsl as refresh_tokens; use crate::schema::users::dsl as users; use argon2::verify_encoded; use chrono::Utc; use diesel::prelude::*; use diesel::{insert_into, PgConnection}; use hmac::{Hmac, NewMac}; use jwt::SignWithKey; use rand::{thread_rng, Rng}; use serde::{Deserialize, Serialize}; use sha2::Sha256; pub fn verify_user(conn: &PgConnection, username: &str, password: &str) -> crate::Result { // TODO handle non-"NotFound" Diesel errors accordingely let user = users::users .filter(users::username.eq(username)) .first::(conn) .map_err(|_| RBError::UnknownUser)?; // Check if a user is blocked if user.blocked { return Err(RBError::BlockedUser); } match verify_encoded(user.password.as_str(), password.as_bytes()) { Ok(true) => Ok(user), _ => Err(RBError::InvalidPassword), } } #[derive(Serialize)] #[serde(rename_all = "camelCase")] pub struct JWTResponse { token: String, refresh_token: String, } #[derive(Serialize, Deserialize)] pub struct Claims { pub id: uuid::Uuid, pub username: String, pub admin: bool, pub exp: i64, } pub fn generate_jwt_token(conn: &PgConnection, user: &User) -> crate::Result { let secret = std::env::var("JWT_KEY").map_err(|_| RBError::MissingJWTKey)?; let key: Hmac = Hmac::new_from_slice(secret.as_bytes()).map_err(|_| RBError::JWTCreationError)?; let current_time = Utc::now(); // Create the claims let claims = Claims { id: user.id, username: user.username.clone(), admin: user.admin, exp: current_time.timestamp() + crate::JWT_EXP_SECONDS, }; // Sign the claims into a new token let token = claims .sign_with_key(&key) .map_err(|_| RBError::JWTCreationError)?; // Generate a random refresh token let mut refresh_token = [0u8; crate::REFRESH_TOKEN_N_BYTES]; thread_rng().fill(&mut refresh_token[..]); let refresh_expire = (current_time + chrono::Duration::seconds(crate::REFRESH_TOKEN_EXP_SECONDS)).naive_utc(); // Store refresh token in database // TODO add expires_at here (it's what's causing the errors) insert_into(refresh_tokens::refresh_tokens) .values(NewRefreshToken { token: refresh_token.to_vec(), user_id: user.id, expires_at: refresh_expire, }) .execute(conn) .map_err(|_| RBError::JWTCreationError)?; Ok(JWTResponse { token, refresh_token: base64::encode(refresh_token), }) } pub fn hash_password(password: &str) -> crate::Result { // Generate a random salt let mut salt = [0u8; 64]; thread_rng().fill(&mut salt[..]); // Encode the actual password let config = argon2::Config::default(); argon2::hash_encoded(password.as_bytes(), &salt, &config).map_err(|_| RBError::PWSaltError) } pub fn create_admin_user( conn: &PgConnection, username: &str, password: &str, ) -> crate::Result { let pass_hashed = hash_password(password)?; let new_user = NewUser { username: username.to_string(), password: pass_hashed, admin: true, }; insert_into(users::users) .values(&new_user) .on_conflict(users::username) .do_update() .set(&new_user) .execute(conn) .map_err(|_| RBError::AdminCreationError)?; Ok(true) } pub fn refresh_token(conn: &PgConnection, refresh_token: &str) -> crate::Result { let token_bytes = base64::decode(refresh_token).map_err(|_| RBError::InvalidRefreshToken)?; // First, we request the token from the database to see if it's really a valid token let token_entry = refresh_tokens::refresh_tokens .filter(refresh_tokens::token.eq(token_bytes)) .first::(conn) .map_err(|_| RBError::InvalidRefreshToken)?; // If we see that the token has already been used before, we block the user. if token_entry.last_used_at.is_some() { let target = users::users.filter(users::id.eq(token_entry.user_id)); diesel::update(target) .set(users::blocked.eq(true)) .execute(conn) .map_err(|_| RBError::DBError)?; return Err(RBError::DuplicateRefreshToken); } // We update the last_used_at value for the refresh token let target = refresh_tokens::refresh_tokens.filter(refresh_tokens::token.eq(token_entry.token)); diesel::update(target) .set(refresh_tokens::last_used_at.eq(Utc::now().naive_utc())) .execute(conn) .map_err(|_| RBError::DBError)?; // Finally, we query the new user & generate a new token let user = users::users.filter(users::id.eq(token_entry.user_id)).first::(conn).map_err(|_| RBError::DBError)?; generate_jwt_token(conn, &user) }