use crate::errors::RBError; use crate::models::{User, NewRefreshToken}; use crate::schema::users::dsl as users; use crate::schema::refresh_tokens::dsl as refresh_tokens; use argon2::verify_encoded; use diesel::prelude::*; use diesel::{PgConnection, insert_into}; use hmac::{Hmac, NewMac}; use jwt::SignWithKey; use sha2::Sha256; use std::collections::HashMap; use chrono::Utc; use serde::Serialize; use rand::{thread_rng, Rng}; /// Expire time for the JWT tokens in seconds. const JWT_EXP_SECONDS: i64 = 900; /// Amount of bytes the refresh tokens should consist of const REFRESH_TOKEN_N_BYTES: usize = 64; pub fn verify_user(conn: &PgConnection, username: &str, password: &str) -> crate::Result { // TODO handle non-"NotFound" Diesel errors accordingely let user = users::users .filter(users::username.eq(username)) .first::(conn) .map_err(|_| RBError::UnknownUser)?; match verify_encoded(user.password.as_str(), password.as_bytes()) { Ok(true) => Ok(user), _ => Err(RBError::InvalidPassword), } } #[derive(Serialize)] #[serde(rename_all = "camelCase")] pub struct JWTResponse { token: String, refresh_token: String } pub fn generate_jwt_token(conn: &PgConnection, user: &User) -> crate::Result { // TODO actually use proper secret here let key: Hmac = Hmac::new_from_slice(b"some-secret").map_err(|_| RBError::JWTCreationError)?; // Create the claims let mut claims = HashMap::new(); claims.insert("id", user.id.to_string()); claims.insert("username", user.username.clone()); claims.insert("admin", user.admin.to_string()); claims.insert("exp", (Utc::now().timestamp() + JWT_EXP_SECONDS).to_string()); // Sign the claims into a new token let token = claims.sign_with_key(&key).map_err(|_| RBError::JWTCreationError)?; // Generate a random refresh token let mut refresh_token = [0u8; REFRESH_TOKEN_N_BYTES]; thread_rng().fill(&mut refresh_token[..]); // Store refresh token in database insert_into(refresh_tokens::refresh_tokens).values(NewRefreshToken { token: refresh_token.to_vec(), user_id: user.id }).execute(conn).map_err(|_| RBError::JWTCreationError)?; Ok(JWTResponse { token: token, refresh_token: base64::encode(refresh_token) }) }