Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 9 additions & 9 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ sha-1 = "0.9.8"

reqwest = { version = "0.11.4", features = [ "json" ] }

tokio = {version = "1.7", features = ["macros", "io-util", "net", "time", "rt-multi-thread", "fs", "sync", "signal"]}
tokio = {version = "1.13", features = ["macros", "io-util", "net", "time", "rt-multi-thread", "fs", "sync", "signal"]}

lettre = { version = "0.10.0-rc.3", features = ["builder", "tokio1", "tokio1-rustls-tls", "smtp-transport"]}
sailfish = "0.3.3"
1 change: 1 addition & 0 deletions src/auth.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ impl AuthorizationService {

// create JWT that expires in two weeks
let key = settings.auth.secret_key.as_bytes();
// TODO: create config option for setting the token validity in seconds
let exp_date = current_time() + 1_209_600; // two weeks from now

let claims = UserClaims {
Expand Down
50 changes: 46 additions & 4 deletions src/handlers/user.rs
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ use crate::config::EmailOnSignup;
use crate::models::response::OkResponse;
use crate::models::response::TokenResponse;
use crate::mailer::VerifyClaims;
use crate::utils::time::current_time;

pub fn init_routes(cfg: &mut web::ServiceConfig) {
cfg.service(
Expand All @@ -21,8 +22,12 @@ pub fn init_routes(cfg: &mut web::ServiceConfig) {
.route(web::post().to(login)))
.service(web::resource("/ban/{user}")
.route(web::delete().to(ban_user)))
.service(web::resource("/verify/{token}")
.route(web::get().to(verify_user)))
.service(web::resource("/token/verify")
.route(web::post().to(verify_token)))
.service(web::resource("/token/renew")
.route(web::post().to(renew_token)))
.service(web::resource("/email/verify/{token}")
.route(web::get().to(verify_email)))
);
}

Expand All @@ -40,6 +45,11 @@ pub struct Login {
pub password: String,
}

#[derive(Clone, Debug, Deserialize, Serialize)]
pub struct Token {
pub token: String,
}

pub async fn register(req: HttpRequest, mut payload: web::Json<Register>, app_data: WebAppData) -> ServiceResult<impl Responder> {
let settings = app_data.cfg.settings.read().await;

Expand Down Expand Up @@ -157,7 +167,39 @@ pub async fn login(payload: web::Json<Login>, app_data: WebAppData) -> ServiceRe
}))
}

pub async fn verify_user(req: HttpRequest, app_data: WebAppData) -> String {
pub async fn verify_token(payload: web::Json<Token>, app_data: WebAppData) -> ServiceResult<impl Responder> {
// verify if token is valid
let _claims = app_data.auth.verify_jwt(&payload.token).await?;

Ok(HttpResponse::Ok().json(OkResponse {
data: format!("Token is valid.")
}))
}

pub async fn renew_token(payload: web::Json<Token>, app_data: WebAppData) -> ServiceResult<impl Responder> {
// verify if token is valid
let claims = app_data.auth.verify_jwt(&payload.token).await?;

let user_compact = app_data.database.get_user_compact_from_id(claims.user.user_id).await?;

const ONE_WEEK_IN_SECONDS: u64 = 604_800;

// renew token if it is valid for less than one week
let token = match claims.exp - current_time() {
x if x < ONE_WEEK_IN_SECONDS => app_data.auth.sign_jwt(user_compact.clone()).await,
_ => payload.token.clone()
};

Ok(HttpResponse::Ok().json(OkResponse {
data: TokenResponse {
token,
username: user_compact.username,
admin: user_compact.administrator
}
}))
}

pub async fn verify_email(req: HttpRequest, app_data: WebAppData) -> String {
let settings = app_data.cfg.settings.read().await;
let token = req.match_info().get("token").unwrap();

Expand Down Expand Up @@ -185,7 +227,7 @@ pub async fn verify_user(req: HttpRequest, app_data: WebAppData) -> String {
String::from("Email verified, you can close this page.")
}

// todo: add reason and date_expiry parameters to request
// TODO: add reason and date_expiry parameters to request
pub async fn ban_user(req: HttpRequest, app_data: WebAppData) -> ServiceResult<impl Responder> {
let user = app_data.auth.get_user_compact_from_request(&req).await?;

Expand Down
2 changes: 1 addition & 1 deletion src/mailer.rs
Original file line number Diff line number Diff line change
Expand Up @@ -137,7 +137,7 @@ impl MailerService {
base_url = cfg_base_url;
}

format!("{}/user/verify/{}", base_url, token)
format!("{}/user/email/verify/{}", base_url, token)
}
}

Expand Down