src/server/rest.rs: improve logs for unauthorized request

This commit is contained in:
Dietmar Maurer 2019-02-17 17:18:44 +01:00
parent b1c1c468ee
commit fce8be6fe1
2 changed files with 13 additions and 5 deletions

View File

@ -1,7 +1,7 @@
use failure::*;
use serde_json::{json, Value};
use crate::api_schema::router::RpcEnvironment;
use crate::api_schema::router::{HttpError, RpcEnvironment};
use hyper::{Body, Response, StatusCode};
use hyper::header;
@ -52,11 +52,19 @@ fn json_format_result(data: Value, rpcenv: &RpcEnvironment) -> Response<Body> {
fn json_format_error(err: Error) -> Response<Body> {
let mut response = Response::new(Body::from(err.to_string()));
let mut response = if let Some(apierr) = err.downcast_ref::<HttpError>() {
let mut resp = Response::new(Body::from(apierr.message.clone()));
*resp.status_mut() = apierr.code;
resp
} else {
let mut resp = Response::new(Body::from(err.to_string()));
*resp.status_mut() = StatusCode::BAD_REQUEST;
resp
};
response.headers_mut().insert(
header::CONTENT_TYPE,
header::HeaderValue::from_static(JSON_CONTENT_TYPE));
*response.status_mut() = StatusCode::BAD_REQUEST;
response.extensions_mut().insert(ErrorMessageExtension(err.to_string()));

View File

@ -454,10 +454,10 @@ fn check_auth(method: &hyper::Method, ticket: Option<String>, token: Option<Stri
if method != hyper::Method::GET {
if let Some(token) = token {
println!("CSRF prev token: {:?}", token);
println!("CSRF prevention token: {:?}", token);
verify_csrf_prevention_token(csrf_secret(), &username, &token, -300, ticket_lifetime)?;
} else {
bail!("");
bail!("missing CSRF prevention token");
}
}