From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pbs-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id C634B1FF16B for <inbox@lore.proxmox.com>; Thu, 20 Mar 2025 14:58:28 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id C5B103ECA; Thu, 20 Mar 2025 14:58:28 +0100 (CET) From: Hannes Laimer <h.laimer@proxmox.com> To: pbs-devel@lists.proxmox.com Date: Thu, 20 Mar 2025 14:57:43 +0100 Message-Id: <20250320135748.205614-2-h.laimer@proxmox.com> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250320135748.205614-1-h.laimer@proxmox.com> References: <20250320135748.205614-1-h.laimer@proxmox.com> MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.025 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [user.rs] Subject: [pbs-devel] [PATCH proxmox-backup 1/6] pbs-config: move secret generation into token_shadow X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion <pbs-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pbs-devel/> List-Post: <mailto:pbs-devel@lists.proxmox.com> List-Help: <mailto:pbs-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox Backup Server development discussion <pbs-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pbs-devel-bounces@lists.proxmox.com Sender: "pbs-devel" <pbs-devel-bounces@lists.proxmox.com> so we have only one place where we generate secrets. Signed-off-by: Hannes Laimer <h.laimer@proxmox.com> --- pbs-config/Cargo.toml | 1 + pbs-config/src/token_shadow.rs | 10 +++++++++- src/api2/access/user.rs | 3 +-- 3 files changed, 11 insertions(+), 3 deletions(-) diff --git a/pbs-config/Cargo.toml b/pbs-config/Cargo.toml index 12d0eb3d..28414965 100644 --- a/pbs-config/Cargo.toml +++ b/pbs-config/Cargo.toml @@ -24,6 +24,7 @@ proxmox-section-config.workspace = true proxmox-shared-memory.workspace = true proxmox-sys = { workspace = true, features = [ "acl", "crypt", "timer" ] } proxmox-time.workspace = true +proxmox-uuid.workspace = true pbs-api-types.workspace = true pbs-buildcfg.workspace = true diff --git a/pbs-config/src/token_shadow.rs b/pbs-config/src/token_shadow.rs index 2efb187e..640fabbf 100644 --- a/pbs-config/src/token_shadow.rs +++ b/pbs-config/src/token_shadow.rs @@ -61,8 +61,16 @@ pub fn verify_secret(tokenid: &Authid, secret: &str) -> Result<(), Error> { } } +/// Generates a new secret for the given tokenid / API token, sets it then returns it. +/// The secret is stored as salted hash. +pub fn generate_and_set_secret(tokenid: &Authid) -> Result<String, Error> { + let secret = format!("{:x}", proxmox_uuid::Uuid::generate()); + set_secret(tokenid, &secret)?; + Ok(secret) +} + /// Adds a new entry for the given tokenid / API token secret. The secret is stored as salted hash. -pub fn set_secret(tokenid: &Authid, secret: &str) -> Result<(), Error> { +fn set_secret(tokenid: &Authid, secret: &str) -> Result<(), Error> { if !tokenid.is_token() { bail!("not an API token ID"); } diff --git a/src/api2/access/user.rs b/src/api2/access/user.rs index 4821551c..f3c3644a 100644 --- a/src/api2/access/user.rs +++ b/src/api2/access/user.rs @@ -495,8 +495,7 @@ pub fn generate_token( ); } - let secret = format!("{:x}", proxmox_uuid::Uuid::generate()); - token_shadow::set_secret(&tokenid, &secret)?; + let secret = token_shadow::generate_and_set_secret(&tokenid)?; let token = ApiToken { tokenid, -- 2.39.5 _______________________________________________ pbs-devel mailing list pbs-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel