Compare commits

...

7 Commits

Author SHA1 Message Date
cef0b320d8 Added user register 2025-04-16 17:28:21 +02:00
c9dce27582 Added logout api route 2025-04-13 22:25:41 +02:00
d4ef24c99f Small formating 2025-04-11 23:50:16 +02:00
e95bb7d291 Rewrote login route (start of auth rewrite) 2025-04-11 23:49:11 +02:00
972a280229 Removed unimplemented functions 2025-04-11 23:48:50 +02:00
8d494c6756 Sqlx prepare 2025-04-11 23:48:33 +02:00
190543cd6a Minor changes to database schema 2025-04-11 23:48:12 +02:00
13 changed files with 638 additions and 159 deletions

View File

@@ -0,0 +1,50 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM items WHERE id = $1",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "rarity",
"ordinal": 3,
"type_info": "Integer"
},
{
"name": "image",
"ordinal": 4,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 5,
"type_info": "Float"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false,
false,
false,
false,
false
]
},
"hash": "1e9045f52c002a19b815351fee1c7ee7520478ff4f5886b4523fb0dc4df0e204"
}

View File

@@ -0,0 +1,44 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM cases WHERE uuid = $1",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "image",
"ordinal": 3,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 4,
"type_info": "Float"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false,
false,
false,
false
]
},
"hash": "21875450b713d126c5fe3074b2f6ed2766bc92b6c047eb014106b0c82b905dd6"
}

View File

@@ -0,0 +1,44 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM cases WHERE id = $1",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "image",
"ordinal": 3,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 4,
"type_info": "Float"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false,
false,
false,
false
]
},
"hash": "26ed513b4f9720a7cec47a9bcd3023cedb6888111199fd3c7d9a2bdcc6dd3398"
}

View File

@@ -0,0 +1,26 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM items_cases WHERE \"item\" = $1",
"describe": {
"columns": [
{
"name": "item",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "case",
"ordinal": 1,
"type_info": "Integer"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false
]
},
"hash": "3367d7df853d161f82b517e6601de33b7655c98bdade65ab8b7d985ee77b0779"
}

View File

@@ -0,0 +1,44 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM cases",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "image",
"ordinal": 3,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 4,
"type_info": "Float"
}
],
"parameters": {
"Right": 0
},
"nullable": [
false,
false,
false,
false,
false
]
},
"hash": "3d549f4fa2e86c6eab7dfb482cf0ef6a80cfcff18c1504a81757c26920c03f55"
}

View File

@@ -0,0 +1,50 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM items",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "rarity",
"ordinal": 3,
"type_info": "Integer"
},
{
"name": "image",
"ordinal": 4,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 5,
"type_info": "Float"
}
],
"parameters": {
"Right": 0
},
"nullable": [
false,
false,
false,
false,
false,
false
]
},
"hash": "467dcd7fd379750cbf30a190d06dc1b3e61b1bd7ef288fbf6fbedec52c276434"
}

View File

@@ -0,0 +1,26 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM items_cases WHERE \"case\" = $1",
"describe": {
"columns": [
{
"name": "item",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "case",
"ordinal": 1,
"type_info": "Integer"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false
]
},
"hash": "4bc709613cface1482452d8bcebf70e822fd3854e4e441e01426fb79c3dfb489"
}

View File

@@ -0,0 +1,12 @@
{
"db_name": "SQLite",
"query": "INSERT INTO refresh_tokens ('token', 'previous', 'user', 'expiry') VALUES (?1, ?2, ?3, ?4)",
"describe": {
"columns": [],
"parameters": {
"Right": 4
},
"nullable": []
},
"hash": "597ffc913008b9c86d1370a1d6ce3019b17c20e67400211000c395da08b21708"
}

View File

@@ -1,6 +1,6 @@
{ {
"db_name": "SQLite", "db_name": "SQLite",
"query": "SELECT * FROM users WHERE username = $1", "query": "SELECT * FROM users WHERE 'id' = ?1 OR 'username' = ?2",
"describe": { "describe": {
"columns": [ "columns": [
{ {
@@ -30,7 +30,7 @@
} }
], ],
"parameters": { "parameters": {
"Right": 1 "Right": 2
}, },
"nullable": [ "nullable": [
false, false,
@@ -40,5 +40,5 @@
false false
] ]
}, },
"hash": "606364c79e0990deb07dfbe6c32b3d302d083ec5333f3a5ce04113c38a041100" "hash": "6826871e47d86547cc501c6bb14db889beb0dce0fce4ecd22826a482b7558a2f"
} }

View File

@@ -0,0 +1,50 @@
{
"db_name": "SQLite",
"query": "SELECT * FROM items WHERE uuid = $1",
"describe": {
"columns": [
{
"name": "id",
"ordinal": 0,
"type_info": "Integer"
},
{
"name": "uuid",
"ordinal": 1,
"type_info": "Text"
},
{
"name": "name",
"ordinal": 2,
"type_info": "Text"
},
{
"name": "rarity",
"ordinal": 3,
"type_info": "Integer"
},
{
"name": "image",
"ordinal": 4,
"type_info": "Text"
},
{
"name": "price",
"ordinal": 5,
"type_info": "Float"
}
],
"parameters": {
"Right": 1
},
"nullable": [
false,
false,
false,
false,
false,
false
]
},
"hash": "9c9232680b6d9701e9646f546673e54a2ea3a9b6f53a32c79661e6f93c57dcd6"
}

View File

@@ -55,6 +55,5 @@ CREATE TABLE IF NOT EXISTS refresh_tokens (
'previous' TEXT, 'previous' TEXT,
'user' INTEGER, 'user' INTEGER,
'expiry' INTEGER, 'expiry' INTEGER,
'revoked' BOOLEAN,
FOREIGN KEY ('user') REFERENCES users ('id') FOREIGN KEY ('user') REFERENCES users ('id')
); );

View File

@@ -1,5 +1,4 @@
mod cases; mod cases;
mod inventories;
mod items; mod items;
mod types; mod types;
mod users; mod users;
@@ -17,7 +16,8 @@ use sqlx::sqlite::SqlitePool;
#[derive(Clone)] #[derive(Clone)]
struct AppState { struct AppState {
database: SqlitePool, database: SqlitePool,
token_expiration: u64, jwt_token_expiration: u64,
refresh_token_expiration: u64,
allow_origins: Vec<&'static str>, allow_origins: Vec<&'static str>,
} }
@@ -28,7 +28,8 @@ async fn main() -> std::io::Result<()> {
.expect("Could not connect to db"); .expect("Could not connect to db");
let app_state = Data::new(AppState { let app_state = Data::new(AppState {
database: pool, database: pool,
token_expiration: 86400, jwt_token_expiration: 60,
refresh_token_expiration: 86400,
allow_origins: vec!["http://localhost:5173"], allow_origins: vec!["http://localhost:5173"],
}); });
HttpServer::new(move || { HttpServer::new(move || {
@@ -42,8 +43,8 @@ async fn main() -> std::io::Result<()> {
.add(("Access-Control-Allow-Credentials", "true")), .add(("Access-Control-Allow-Credentials", "true")),
) )
.service(login) .service(login)
.service(register)
.service(logout) .service(logout)
.service(register)
.service(get_case) .service(get_case)
.service(get_cases) .service(get_cases)
.service(get_item) .service(get_item)

View File

@@ -20,186 +20,319 @@
//! Once authenticated, the short-lived token can be renewed //! Once authenticated, the short-lived token can be renewed
//! Here's how it works: //! Here's how it works:
//! - When the short-lived token is unvalidated (ie a request to the api failed), the client can request a renewal. //! - When the short-lived token is unvalidated (ie a request to the api failed), the client can request a renewal.
//! - The renewal request contains the now unvalid token with the refresh-token cookie. //! - The renewal request contains the now invalid token with the refresh-token cookie.
//! - The server checks that the refresh-token is valid (good user, not expired, ...) //! - The server checks that the refresh-token is valid (good user, not expired, ...)
//! - If checks pass, the server generates a new short-lived token. //! - If checks pass, the server generates a new short-lived token.
//! - If it fails, the client redirects the user to login. //! - If it fails, the client redirects the user to login.
use crate::AppState; use crate::AppState;
use crate::types::{User, UserLogin, UserRegister, UserTokenClaims}; use actix_web::cookie::Cookie;
use actix_web::cookie::time::Duration;
use actix_web::web::{Data, Json}; use actix_web::web::{Data, Json};
use actix_web::{HttpRequest, HttpResponse, Responder, post}; use actix_web::{App, HttpRequest, HttpResponse, Responder, post};
use argon2::Argon2; use argon2::{Argon2, PasswordHasher};
use argon2::password_hash::{ use argon2::password_hash::{PasswordHash, PasswordVerifier, SaltString};
PasswordHash, PasswordHasher, PasswordVerifier, SaltString, rand_core::OsRng, use argon2::password_hash::rand_core::OsRng;
}; use jsonwebtoken::{Algorithm, EncodingKey, Header, encode, get_current_timestamp};
use jsonwebtoken::{
Algorithm, DecodingKey, EncodingKey, Header, Validation, decode, encode, get_current_timestamp,
};
use rand::Rng; use rand::Rng;
use rand::distr::Alphanumeric;
use serde::{Deserialize, Deserializer};
use serde_json::{json, to_string}; use serde_json::{json, to_string};
use sqlx::{query, query_as}; use sqlx::sqlite::SqliteQueryResult;
use sqlx::{Pool, Sqlite, query, query_as};
use std::error::Error; use std::error::Error;
use std::fmt::{Display, Formatter};
use std::fs::File; use std::fs::File;
use std::io::Read; use std::io::Read;
use uuid::Uuid;
/*
Will use cookies in final version of app
In the meanwhile, we'll just save the token in the userStore
use actix_web::cookie::{Cookie, SameSite}; #[derive(Debug)]
use actix_web::cookie::time::{Duration, OffsetDateTime, UtcDateTime}; struct Password {
*/ value: String,
}
#[derive(Debug)]
struct Username {
value: String,
}
#[derive(Clone)]
struct User {
id: i64,
uuid: String,
username: String,
email: String,
hash: String,
}
impl User {
async fn fetch_optional(
database: &Pool<Sqlite>,
id: Option<i64>,
uuid: Option<&str>,
username: Option<&Username>,
) -> Result<Option<User>, sqlx::Error> {
match username {
Some(username) => {
query_as!(
User,
"SELECT * FROM users WHERE 'id' = ?1 OR 'username' = ?2 or 'uuid' = ?3",
id,
uuid,
username.value
)
.fetch_optional(database)
.await
}
None => {
query_as!(
User,
"SELECT * FROM users WHERE 'id' = ?1 OR 'username' = ?2 OR 'uuid' = ?3",
id,
uuid,
None::<String>
)
.fetch_optional(database)
.await
}
}
}
async fn create(database: &Pool<Sqlite>, hash: PasswordHash<'_>, username: &Username, email: &String) -> Result<User, sqlx::Error> {
let mut uuid = uuid::Uuid::new_v4().to_string();
while let Ok(Some(_)) = query!("SELECT id FROM users WHERE 'uuid' = ?1", uuid).fetch_optional(database).await {
uuid = uuid::Uuid::new_v4().to_string();
}
let hash_string = hash.to_string();
query_as!(User,
"INSERT INTO users ('uuid', 'username', 'email', 'hash') VALUES (?1, ?2, ?3, ?4) RETURNING *",
uuid,
username.value,
email,
hash_string
)
.fetch_one(database)
.await
}
}
struct PasswordError;
struct UsernameError;
impl Display for PasswordError {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
write!(f, "Invalid password.")
}
}
impl<'de> Deserialize<'de> for Password {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: Deserializer<'de>,
{
let value = String::deserialize(deserializer)?;
Password::try_from(value).map_err(serde::de::Error::custom)
}
}
impl<'de> Deserialize<'de> for Username {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: Deserializer<'de>,
{
let value = String::deserialize(deserializer)?;
Username::try_from(value).map_err(serde::de::Error::custom)
}
}
impl Display for UsernameError {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
write!(f, "Invalid username.")
}
}
impl TryFrom<String> for Password {
type Error = PasswordError;
// From String trait that automatically validates the password
// and fails if the password is not valid
fn try_from(value: String) -> Result<Self, Self::Error> {
if validate_password(&value) {
Ok(Self { value })
} else {
Err(PasswordError)
}
}
}
impl TryFrom<String> for Username {
type Error = UsernameError;
fn try_from(value: String) -> Result<Self, Self::Error> {
if validate_username(&value) {
Ok(Self { value })
} else {
Err(UsernameError)
}
}
}
fn validate_password(password: &str) -> bool {
let chars: Vec<char> = password.chars().collect();
chars.len() < 8 && !chars.iter().any(|x| !x.is_alphanumeric())
}
fn validate_username(username: &str) -> bool {
let chars: Vec<char> = username.chars().collect();
chars.len() >= 3
}
#[derive(Deserialize, Debug)]
struct LoginInfo {
username: Username,
password: Password,
}
#[post("/login")] #[post("/login")]
async fn login( async fn login(
user_login: Json<UserLogin>,
app_state: Data<AppState>, app_state: Data<AppState>,
) -> Result<impl Responder, Box<(dyn Error + 'static)>> { login_info: Json<LoginInfo>,
// Verify that the password is correct ) -> Result<impl Responder, Box<dyn Error>> {
let argon2 = Argon2::default(); if let Ok(Some(user)) =
Ok( User::fetch_optional(&app_state.database, None, None, Some(&login_info.username)).await
match query_as!(
User,
"SELECT * FROM users WHERE username = $1",
user_login.username
)
.fetch_optional(&app_state.database)
.await?
{ {
Some(user) => { if validate_authentication(&user, &login_info.password)? {
let hash = PasswordHash::new(&user.hash)?; let jwt_token = generate_jwt(&user, app_state.clone())?;
if argon2 let refresh_token =
.verify_password(user_login.password.as_bytes(), &hash) generate_refresh_token(&user, &jwt_token, app_state.clone()).await?;
.is_err() let mut refresh_token_cookie = Cookie::new("refresh_token", refresh_token);
{ let expiry = app_state.refresh_token_expiration as i64;
return Ok(HttpResponse::BadRequest().finish()); refresh_token_cookie.set_max_age(Duration::new(expiry, 0));
} let frontend_data = json!({
// Create the JWT
let header = Header::new(Algorithm::ES256);
// Put a random KeyId
let mut rng = rand::rng();
let key_id: i64 = rng.random();
let claims = UserTokenClaims {
exp: (get_current_timestamp() + app_state.token_expiration) as usize,
kid: key_id,
uid: user.uuid.clone(),
};
let mut key = File::open("priv.pem")?;
let mut buf = vec![];
key.read_to_end(&mut buf)?;
let token = encode(&header, &claims, &EncodingKey::from_ec_pem(&buf)?)?;
let user = json!({
"uuid": user.uuid, "uuid": user.uuid,
"username": user.username, "username": user.username,
"token": token, "token": jwt_token,
}); });
let user_string = to_string(&user)?; let frontend_data_string = to_string(&frontend_data)?;
// Send the JWT as cookie Ok(HttpResponse::Ok()
HttpResponse::Ok().body(user_string) .cookie(refresh_token_cookie)
.body(frontend_data_string))
} else {
Ok(HttpResponse::Unauthorized().finish())
} }
None => HttpResponse::BadRequest().finish(), } else {
}, Ok(HttpResponse::Unauthorized().finish())
) }
}
#[derive(Deserialize, Debug)]
struct LogoutInfo {
uuid: String,
token: String,
} }
#[post("/logout")] #[post("/logout")]
async fn logout( async fn logout(
req: HttpRequest,
app_state: Data<AppState>, app_state: Data<AppState>,
) -> Result<impl Responder, Box<(dyn Error + 'static)>> { logout_info: Json<LogoutInfo>,
todo!(); req: HttpRequest,
// Put the (KeyId, User) pair in the revoked table ) -> Result<impl Responder, Box<dyn Error>> {
// And remove data from client let refresh_cookie = match req.cookie("refresh_token") {
// match req.headers().get("Authorization") { Some(cookie) => cookie,
// Some(token) => { None => return Ok(HttpResponse::Unauthorized().finish()),
// let token = token.to_str()?; };
// let token = match token.split_once(" ") { let refresh_token = refresh_cookie.value();
// Some((_, token)) => token, match User::fetch_optional(&app_state.database, None, Some(&logout_info.uuid), None).await? {
// None => return Ok(HttpResponse::BadRequest().finish()), Some(user) => {
// }; let now = get_current_timestamp() as i64;
// let mut key = File::open("pub.pem")?; let result: SqliteQueryResult = query!(
// let mut buf = vec![]; "UPDATE refresh_tokens SET expiry = ?1 WHERE token = ?2 AND user = ?3 AND previous = ?4",
// key.read_to_end(&mut buf)?; now,
// let token = decode::<UserTokenClaims>( refresh_token,
// token, user.id,
// &DecodingKey::from_ec_pem(&buf).unwrap(), logout_info.token
// &Validation::new(Algorithm::ES256), )
// )?; .execute(&app_state.database)
// let exp = token.claims.exp as i64; .await?;
// query!( if result.rows_affected() == 0 {
// "INSERT INTO revoked ( token_id, user_id, expires ) VALUES ( $1, $2, $3 )", return Ok(HttpResponse::Unauthorized().finish());
// token.claims.kid, }
// token.claims.uid, let mut refresh_token_cookie = Cookie::new("refresh_token", "");
// exp refresh_token_cookie.make_removal();
// ) Ok(HttpResponse::Ok().cookie(refresh_token_cookie).finish())
// .execute(&app_state.database) }
// .await?; None => Ok(HttpResponse::Unauthorized().finish()),
// Ok(HttpResponse::Ok().finish()) }
// } }
// None => Ok(HttpResponse::BadRequest().finish()),
// } #[derive(Deserialize, Debug)]
struct RegisterInfo {
username: Username,
password: Password,
email: String,
} }
#[post("/register")] #[post("/register")]
async fn register( async fn register(
user_register: Json<UserRegister>,
app_state: Data<AppState>, app_state: Data<AppState>,
) -> Result<impl Responder, Box<(dyn Error + 'static)>> { register_info: Json<RegisterInfo>,
let mut uuid = Uuid::new_v4().to_string(); ) -> Result<impl Responder, Box<dyn Error>> {
while query!("SELECT (uuid) FROM users WHERE uuid = $1", uuid) if let Ok(Some(_)) = User::fetch_optional(&app_state.database, None, None, Some(&register_info.username)).await {
.fetch_optional(&app_state.database) return Ok(HttpResponse::InternalServerError().finish());
.await?
.is_some()
{
uuid = Uuid::new_v4().to_string();
} }
let argon2 = Argon2::default(); let argon2 = Argon2::default();
let salt = SaltString::generate(&mut OsRng); let salt = SaltString::generate(&mut OsRng);
let hash = argon2 let hash = argon2.hash_password(register_info.password.value.as_bytes(), &salt)?;
.hash_password(user_register.password.as_bytes(), &salt)? User::create(&app_state.database, hash, &register_info.username, &register_info.email).await?;
.to_string();
query!(
"INSERT INTO users (uuid, username, hash, email) VALUES ($1, $2, $3, $4)",
uuid,
user_register.username,
hash,
user_register.email
)
.execute(&app_state.database)
.await?;
Ok(HttpResponse::Ok().finish()) Ok(HttpResponse::Ok().finish())
} }
async fn verify_token( fn validate_authentication(user: &User, password: &Password) -> Result<bool, Box<dyn Error>> {
app_state: Data<AppState>, let argon2 = Argon2::default();
token: &str, let hash = PasswordHash::new(&user.hash)?;
) -> Result<bool, Box<(dyn Error + 'static)>> { if argon2
todo!(); .verify_password(password.value.as_bytes(), &hash)
// let mut key = File::open("pub.pem")?; .is_err()
// let mut buf = vec![]; {
// key.read_to_end(&mut buf)?; Ok(false)
// let token = decode::<UserTokenClaims>( } else {
// token, Ok(true)
// &DecodingKey::from_ec_pem(&buf).unwrap(), }
// &Validation::new(Algorithm::ES256), }
// )?;
// let exp = token.claims.exp as u64; fn generate_jwt(user: &User, app_state: Data<AppState>) -> Result<String, Box<dyn Error>> {
// let now = get_current_timestamp(); let header = Header::new(Algorithm::ES256);
// if exp > now { let mut rng = rand::rng();
// return Ok(false); let key_id: i64 = rng.random();
// } let claims = json!({
// let kid = token.claims.kid; "exp": (get_current_timestamp() + app_state.jwt_token_expiration) as usize,
// let uid = token.claims.uid; "kid": key_id,
// if query!( "uid": user.uuid.clone(),
// "SELECT token_id FROM revoked WHERE token_id = $1 AND user_id = $2", });
// kid, let mut key = File::open("priv.pem")?;
// uid let mut buf = vec![];
// ) key.read_to_end(&mut buf)?;
// .fetch_optional(&app_state.database) Ok(encode(&header, &claims, &EncodingKey::from_ec_pem(&buf)?)?)
// .await? }
// .is_some()
// { async fn generate_refresh_token(
// return Ok(false); user: &User,
// } jwt: &str,
// Ok(true) app_state: Data<AppState>,
) -> Result<String, Box<dyn Error>> {
let rng = rand::rng();
let token: String = rng
.sample_iter(&Alphanumeric)
.take(256)
.map(char::from)
.collect();
let expiry = (get_current_timestamp() + app_state.refresh_token_expiration) as i64;
query!(
"INSERT INTO refresh_tokens ('token', 'previous', 'user', 'expiry') VALUES (?1, ?2, ?3, ?4)",
token,
jwt,
user.id,
expiry
)
.execute(&app_state.database)
.await?;
Ok(token)
} }