2023-2-05
Posted by
これは一応前回の続き的な位置づけです
その為前回のコードの続きを書いていきます、まだ見てない人は前回の最終的なコードを見てみてください
では早速作っていきましょう
その前に、今回は認証がメインの為dbの扱い方を省略します
一応見なくてもなんとなく分かると思いますが、詳しく知りたい場合はrustでdbを使うを見てください
ユーザーを作成できるようにする
ユーザーテーブルを作成する
まずはユーザーテーブルを作成します
1
2
3
+
4
+
5
+
6
+
7
+
8
+
9
+
10
+
11
+
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
#[actix_web::main]
async fn main() -> std::io::Result<()> {
let conn = Connection::open("app.db").unwrap();
conn.execute(
"CREATE TABLE IF NOT EXISTS user (
id INTEGER PRIMARY KEY AUTOINCREMENT,
username STRING UNIQUE NOT NULL,
password STRING NOT NULL
)",
()
).unwrap();
HttpServer::new(|| {
App::new()
.service(
web::scope("/token")
.service(create_token )
.service(refresh_token)
)
.service(
web::scope("/user")
)
.service(hello)
})
.bind(("127.0.0.1", 8080))?
.run()
.await
}
ユーザーを作成するapiを作る
そしてユーザーを作成するapiを作ります、一応ハッシュ化もしています
#[post("/register")]
async fn create_user(data: web::Json<CreateTokenRequest>) -> impl Responder {
let conn = Connection::open("app.db").unwrap();
let mut stmt = conn.prepare("INSERT INTO user ( username, password ) values ( ?1, ?2 )").unwrap();
let mut sha = Sha256::new();
sha.input_str(&data.password);
let _ = stmt.execute(&[&data.username, &sha.result_str()]).unwrap();
HttpResponse::Ok()
}
ユーザーがログインできるようにする
今はまだusername
がapple
, password
が42
の人しかログインできませんが作成したユーザーがログインできるようにしましょう
1
+
2
+
3
+
4
+
5
+
6
+
7
8
9
10
-
11
+
12
+
13
+
14
+
15
+
16
+
17
+
18
+
19
+
20
+
21
+
22
23
24
25
26
27
28
-
29
+
30
31
32
33
34
-
35
+
36
37
38
39
40
41
42
43
#[derive(Serialize)]
struct User {
id: i32,
username: String,
password: String,
}
#[post("/")]
async fn create_token(data: web::Json<CreateTokenRequest>) -> impl Responder {
if !(data.username == "apple" && data.password == "42") {
let conn = Connection::open("app.db").unwrap();
let u = conn.query_row("SELECT id, username, password FROM user WHERE username = ( ?1 )", [&data.username], |row| {
Ok(User {
id: row.get(0)?,
username: row.get(1)?,
password: row.get(2)?
})
}).unwrap();
let mut sha = Sha256::new();
sha.input_str(&data.password);
if !(data.username == u.username && sha.result_str() == u.password) {
return HttpResponse::BadRequest().body("user does not exist or password is wrong")
}
let token_key = HS256Key::from_bytes(b"secret");
let claims = Claims::with_custom_claims(TokenClaims {refresh: false}, Duration::from_mins(15))
.with_subject(1)
.with_subject(u.id)
.with_jwt_id(Uuid::new_v4().to_string());
let access = token_key.authenticate(claims).unwrap();
let claims = Claims::with_custom_claims(TokenClaims {refresh: true}, Duration::from_hours(24))
.with_subject(1)
.with_subject(u.id)
.with_jwt_id(Uuid::new_v4().to_string());
let refresh = token_key.authenticate(claims).unwrap();
HttpResponse::Ok().json(CreateTokenResponse {
token: access,
refresh_token: refresh,
})
}
ついでにリフレッシュ時に作成する新しいトークンのサブジェクトをリフレッシュトークンのサブジェクトと同じにしましょう
1
2
3
4
5
6
7
8
9
10
-
11
+
12
13
14
15
16
17
#[post("/refresh")]
async fn refresh_token(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if ! claims.custom.refresh {
return HttpResponse::BadRequest().body("Refresh tokens are not allowed")
}
let claims = Claims::with_custom_claims(TokenClaims {refresh: false}, Duration::from_mins(15))
.with_subject(1)
.with_subject(claims.subject.unwrap())
.with_jwt_id(Uuid::new_v4().to_string());
let token = token_key.authenticate(claims).unwrap();
HttpResponse::Ok().json(CreateRefreshTokenResponse {
token: token
})
}
ログアウトできるようにする
その前に、jwtでログアウトとはtokenを無効化する事ですが、それを実現するためにはtokenのブロックリストを実装するのが手っ取り早いでしょう、そのためにはテーブルを作成する必要があります、作成しましょう
1
2
3
4
5
6
7
8
9
10
11
12
+
13
+
14
+
15
+
16
+
17
+
18
+
19
+
20
+
21
+
22
23
24
25
26
#[actix_web::main]
async fn main() -> std::io::Result<()> {
let conn = Connection::open("app.db").unwrap();
conn.execute(
"CREATE TABLE IF NOT EXISTS user (
id INTEGER PRIMARY KEY AUTOINCREMENT,
username STRING UNIQUE NOT NULL,
password STRING NOT NULL
)",
()
).unwrap();
conn.execute(
"CREATE TABLE IF NOT EXISTS tokenblocklist (
id INTEGER PRIMARY KEY AUTOINCREMENT,
user INTEGER,
token STRING,
uuid STRING,
exp INTEGER
)",
()
).unwrap();
HttpServer::new(|| {
App::new()
.service(
web::scope("/token")
ではログアウトしましょう
トークンを作成するときに固有のidを与えたのを覚えていますか?
(正確には固有ではありませんが二つの値が一致するには期待値的には20京(2^61)回生成しなければいけないので(2回目で一致する確率も0ではありませんが))
.with_jwt_id(Uuid::new_v4().to_string());
これですね
これをブロックリストに追加し、認証時にブロックリストに追加されていた場合に弾く感じにしましょう
#[post("/logout")]
async fn logout_user(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if let Some(uuid) = claims.jwt_id {
let db_con = Connection::open("app.db").unwrap();
let mut stmt = db_con.prepare("INSERT INTO tokenblocklist ( uuid ) values ( ?1 )").unwrap();
let _ = stmt.execute([uuid]).unwrap();
return HttpResponse::Ok().body("Deleted")
}
HttpResponse::InternalServerError().body("??????")
}
弾くようにする
判定にはブロックリストに入っているトークンをエラーが出ずに見つけられたら入っているとします
fn blocked(uuid: String) -> bool {
let db_con = Connection::open("app.db").unwrap();
let _ = match db_con.query_row("SELECT uuid FROM tokenblocklist WHERE uuid = ( ?1 )", [&uuid], |_| {Ok(true)}) {
Ok(_) => return true,
Err(_) => return false
};
}
後は色々変更すると
1
2
3
4
5
6
7
8
+
9
+
10
+
11
12
13
14
15
16
17
18
19
#[post("/refresh")]
async fn refresh_token(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if ! claims.custom.refresh {
return HttpResponse::BadRequest().body("Refresh tokens are not allowed")
}
if blocked(claims.jwt_id.unwrap()) {
return HttpResponse::BadRequest().body("That token cannot be used for some reason")
}
let claims = Claims::with_custom_claims(TokenClaims {refresh: false}, Duration::from_mins(15))
.with_subject(claims.subject.unwrap())
.with_jwt_id(Uuid::new_v4().to_string());
let token = token_key.authenticate(claims).unwrap();
HttpResponse::Ok().json(CreateRefreshTokenResponse {
token: token
})
}
1
2
3
4
5
6
7
8
+
9
+
10
+
11
12
#[get("/hello")]
async fn hello(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if claims.custom.refresh {
return HttpResponse::BadRequest().body("Refresh tokens are not allowed")
}
if blocked(claims.jwt_id.unwrap()) {
return HttpResponse::BadRequest().body("That token cannot be used for some reason")
}
HttpResponse::Ok().body("Hello world!")
}
完成です
最終的なコード
use actix_web::{get, post, web, App, HttpServer, Responder, HttpResponse, HttpRequest};
use jwt_simple::prelude::*;
use serde::{Serialize, Deserialize};
use rusqlite::Connection;
use uuid::Uuid;
use crypto::sha2::Sha256;
use crypto::digest::Digest;
#[derive(Deserialize)]
struct CreateTokenRequest {
username: String,
password: String,
}
#[derive(Serialize)]
struct CreateTokenResponse {
token: String,
refresh_token: String,
}
#[derive(Serialize)]
struct CreateRefreshTokenResponse {
token: String,
}
#[derive(Serialize, Deserialize)]
struct TokenClaims {
refresh: bool,
}
#[derive(Serialize)]
struct User {
id: i32,
username: String,
password: String,
}
fn get_token(req: HttpRequest) -> String {
return req.headers().get("Authorization").unwrap().to_str().unwrap()[7..].to_string();
}
fn blocked(uuid: String) -> bool {
let db_con = Connection::open("app.db").unwrap();
let _ = match db_con.query_row("SELECT uuid FROM tokenblocklist WHERE uuid = ( ?1 )", [&uuid], |_| {Ok(true)}) {
Ok(_) => return true,
Err(_) => return false
};
}
#[post("/register")]
async fn create_user(data: web::Json<CreateTokenRequest>) -> impl Responder {
let conn = Connection::open("app.db").unwrap();
let mut stmt = conn.prepare("INSERT INTO user ( username, password ) values ( ?1, ?2 )").unwrap();
let mut sha = Sha256::new();
sha.input_str(&data.password);
let _ = stmt.execute(&[&data.username, &sha.result_str()]).unwrap();
HttpResponse::Ok()
}
#[post("/create")]
async fn create_token(data: web::Json<CreateTokenRequest>) -> impl Responder {
let conn = Connection::open("app.db").unwrap();
let u = conn.query_row("SELECT id, username, password FROM user WHERE username = ( ?1 )", [&data.username], |row| {
Ok(User {
id: row.get(0)?,
username: row.get(1)?,
password: row.get(2)?
})
}).unwrap();
let mut sha = Sha256::new();
sha.input_str(&data.password);
if !(data.username == u.username && sha.result_str() == u.password) {
return HttpResponse::BadRequest().body("user does not exist or password is wrong")
}
let token_key = HS256Key::from_bytes(b"secret");
let claims = Claims::with_custom_claims(TokenClaims {refresh: false}, Duration::from_mins(15))
.with_subject(u.id)
.with_jwt_id(Uuid::new_v4().to_string());
let access = token_key.authenticate(claims).unwrap();
let claims = Claims::with_custom_claims(TokenClaims {refresh: true}, Duration::from_hours(24))
.with_subject(u.id)
.with_jwt_id(Uuid::new_v4().to_string());
let refresh = token_key.authenticate(claims).unwrap();
HttpResponse::Ok().json(CreateTokenResponse {
token: access,
refresh_token: refresh,
})
}
#[post("/refresh")]
async fn refresh_token(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if ! claims.custom.refresh {
return HttpResponse::BadRequest().body("Access tokens are not allowed")
}
if blocked(claims.jwt_id.unwrap()) {
return HttpResponse::BadRequest().body("That token cannot be used for some reason")
}
let claims = Claims::with_custom_claims(TokenClaims {refresh: false}, Duration::from_mins(15))
.with_subject(claims.subject.unwrap())
.with_jwt_id(Uuid::new_v4().to_string());
let token = token_key.authenticate(claims).unwrap();
HttpResponse::Ok().json(CreateRefreshTokenResponse {
token: token
})
}
#[post("/logout")]
async fn logout_user(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if let Some(uuid) = claims.jwt_id {
let db_con = Connection::open("app.db").unwrap();
let mut stmt = db_con.prepare("INSERT INTO tokenblocklist ( uuid ) values ( ?1 )").unwrap();
let _ = stmt.execute([uuid]).unwrap();
return HttpResponse::Ok().body("Deleted")
}
HttpResponse::InternalServerError().body("??????")
}
#[get("/hello")]
async fn hello(req: HttpRequest) -> impl Responder {
let token_key = HS256Key::from_bytes(b"secret");
let claims = token_key.verify_token::<TokenClaims>(&get_token(req), None).unwrap();
if claims.custom.refresh {
return HttpResponse::BadRequest().body("Refresh tokens are not allowed")
}
if blocked(claims.jwt_id.unwrap()) {
return HttpResponse::BadRequest().body("That token cannot be used for some reason")
}
HttpResponse::Ok().body("Hello world!")
}
#[actix_web::main]
async fn main() -> std::io::Result<()> {
let conn = Connection::open("app.db").unwrap();
conn.execute(
"CREATE TABLE IF NOT EXISTS user (
id INTEGER PRIMARY KEY AUTOINCREMENT,
username STRING UNIQUE NOT NULL,
password STRING NOT NULL
)",
()
).unwrap();
conn.execute(
"CREATE TABLE IF NOT EXISTS tokenblocklist (
id INTEGER PRIMARY KEY AUTOINCREMENT,
user INTEGER,
token STRING,
uuid STRING,
exp INTEGER
)",
()
).unwrap();
HttpServer::new(|| {
App::new()
.service(
web::scope("/token")
.service(create_token)
.service(refresh_token)
)
.service(
web::scope("/user")
.service(create_user)
.service(logout_user)
)
.service(hello)
})
.bind(("127.0.0.1", 8080))?
.run()
.await
}
このドキュメントどう?