1
- use crate :: { async_trait, Result , Session , SessionStore } ;
1
+ use crate :: { async_trait, Session , SessionStore } ;
2
+ use base64:: { engine:: general_purpose:: STANDARD as BASE64 , Engine } ;
2
3
3
4
/// A session store that serializes the entire session into a Cookie.
4
5
///
5
6
/// # ***This is not recommended for most production deployments.***
6
7
///
7
- /// This implementation uses [`bincode `](::bincode ) to serialize the
8
- /// Session to decrease the size of the cookie. Note: There is a
9
- /// maximum of 4093 cookie bytes allowed _per domain_, so the cookie
10
- /// store is limited in capacity.
8
+ /// This implementation uses [`bincode_json `](::bincode_json ) to
9
+ /// serialize the Session to decrease the size of the cookie. Note:
10
+ /// There is a maximum of 4093 cookie bytes allowed _per domain_, so
11
+ /// the cookie store is limited in capacity.
11
12
///
12
13
/// **Note:** Currently, the data in the cookie is only signed, but *not
13
14
/// encrypted*. If the contained session data is sensitive and
@@ -29,24 +30,43 @@ impl CookieStore {
29
30
}
30
31
}
31
32
33
+ #[ derive( thiserror:: Error , Debug ) ]
34
+ #[ non_exhaustive]
35
+ /// All errors that can occur in the [`CookieStore`]
36
+ pub enum CookieStoreError {
37
+ /// A bincode_json error
38
+ #[ error( transparent) ]
39
+ Bincode ( #[ from] bincode_json:: Error ) ,
40
+
41
+ /// A base64 error
42
+ #[ error( transparent) ]
43
+ Base64 ( #[ from] base64:: DecodeError ) ,
44
+
45
+ /// A json error
46
+ #[ error( transparent) ]
47
+ Json ( #[ from] serde_json:: Error ) ,
48
+ }
49
+
32
50
#[ async_trait]
33
51
impl SessionStore for CookieStore {
34
- async fn load_session ( & self , cookie_value : String ) -> Result < Option < Session > > {
35
- let serialized = base64:: decode ( cookie_value) ?;
36
- let session: Session = bincode:: deserialize ( & serialized) ?;
52
+ type Error = CookieStoreError ;
53
+
54
+ async fn load_session ( & self , cookie_value : String ) -> Result < Option < Session > , Self :: Error > {
55
+ let serialized = BASE64 . decode ( cookie_value) ?;
56
+ let session: Session = bincode_json:: from_slice ( & serialized) ?;
37
57
Ok ( session. validate ( ) )
38
58
}
39
59
40
- async fn store_session ( & self , session : Session ) -> Result < Option < String > > {
41
- let serialized = bincode :: serialize ( & session) ?;
42
- Ok ( Some ( base64 :: encode ( serialized) ) )
60
+ async fn store_session ( & self , session : Session ) -> Result < Option < String > , Self :: Error > {
61
+ let serialized = bincode_json :: to_vec ( & session) ?;
62
+ Ok ( Some ( BASE64 . encode ( serialized) ) )
43
63
}
44
64
45
- async fn destroy_session ( & self , _session : Session ) -> Result {
65
+ async fn destroy_session ( & self , _session : Session ) -> Result < ( ) , Self :: Error > {
46
66
Ok ( ( ) )
47
67
}
48
68
49
- async fn clear_store ( & self ) -> Result {
69
+ async fn clear_store ( & self ) -> Result < ( ) , Self :: Error > {
50
70
Ok ( ( ) )
51
71
}
52
72
}
@@ -57,7 +77,7 @@ mod tests {
57
77
use async_std:: task;
58
78
use std:: time:: Duration ;
59
79
#[ async_std:: test]
60
- async fn creating_a_new_session_with_no_expiry ( ) -> Result {
80
+ async fn creating_a_new_session_with_no_expiry ( ) -> Result < ( ) , CookieStoreError > {
61
81
let store = CookieStore :: new ( ) ;
62
82
let mut session = Session :: new ( ) ;
63
83
session. insert ( "key" , "Hello" ) ?;
@@ -72,7 +92,7 @@ mod tests {
72
92
}
73
93
74
94
#[ async_std:: test]
75
- async fn updating_a_session ( ) -> Result {
95
+ async fn updating_a_session ( ) -> Result < ( ) , CookieStoreError > {
76
96
let store = CookieStore :: new ( ) ;
77
97
let mut session = Session :: new ( ) ;
78
98
@@ -90,18 +110,18 @@ mod tests {
90
110
}
91
111
92
112
#[ async_std:: test]
93
- async fn updating_a_session_extending_expiry ( ) -> Result {
113
+ async fn updating_a_session_extending_expiry ( ) -> Result < ( ) , CookieStoreError > {
94
114
let store = CookieStore :: new ( ) ;
95
115
let mut session = Session :: new ( ) ;
96
116
session. expire_in ( Duration :: from_secs ( 1 ) ) ;
97
- let original_expires = session. expiry ( ) . unwrap ( ) . clone ( ) ;
117
+ let original_expires = * session. expiry ( ) . unwrap ( ) ;
98
118
let cookie_value = store. store_session ( session) . await ?. unwrap ( ) ;
99
119
100
120
let mut session = store. load_session ( cookie_value. clone ( ) ) . await ?. unwrap ( ) ;
101
121
102
122
assert_eq ! ( session. expiry( ) . unwrap( ) , & original_expires) ;
103
123
session. expire_in ( Duration :: from_secs ( 3 ) ) ;
104
- let new_expires = session. expiry ( ) . unwrap ( ) . clone ( ) ;
124
+ let new_expires = * session. expiry ( ) . unwrap ( ) ;
105
125
let cookie_value = store. store_session ( session) . await ?. unwrap ( ) ;
106
126
107
127
let session = store. load_session ( cookie_value. clone ( ) ) . await ?. unwrap ( ) ;
@@ -114,7 +134,7 @@ mod tests {
114
134
}
115
135
116
136
#[ async_std:: test]
117
- async fn creating_a_new_session_with_expiry ( ) -> Result {
137
+ async fn creating_a_new_session_with_expiry ( ) -> Result < ( ) , CookieStoreError > {
118
138
let store = CookieStore :: new ( ) ;
119
139
let mut session = Session :: new ( ) ;
120
140
session. expire_in ( Duration :: from_secs ( 3 ) ) ;
0 commit comments