Skip to content

Commit c851ffb

Browse files
committed
Remove obsolete CaptureUserIdFromCookie middleware
1 parent 6587ea2 commit c851ffb

File tree

5 files changed

+8
-53
lines changed

5 files changed

+8
-53
lines changed

src/controllers/user/session.rs

-2
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ use oauth2::reqwest::http_client;
55
use oauth2::{AuthorizationCode, Scope, TokenResponse};
66

77
use crate::github::GithubUser;
8-
use crate::middleware::current_user::TrustedUserId;
98
use crate::models::{NewUser, User};
109
use crate::schema::users;
1110
use crate::util::errors::ReadOnlyMode;
@@ -108,7 +107,6 @@ pub fn authorize(req: &mut dyn RequestExt) -> EndpointResult {
108107
// Log in by setting a cookie and the middleware authentication
109108
req.session_mut()
110109
.insert("user_id".to_string(), user.id.to_string());
111-
req.mut_extensions().insert(TrustedUserId(user.id));
112110

113111
super::me::me(req)
114112
}

src/controllers/util.rs

+6-4
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
use chrono::Utc;
2+
use conduit_cookie::RequestSession;
23

34
use super::prelude::*;
45

5-
use crate::middleware::current_user::TrustedUserId;
66
use crate::middleware::log_request;
77
use crate::models::{ApiToken, User};
88
use crate::util::errors::{
@@ -62,9 +62,11 @@ fn verify_origin(req: &dyn RequestExt) -> AppResult<()> {
6262

6363
fn authenticate_user(req: &dyn RequestExt) -> AppResult<AuthenticatedUser> {
6464
let conn = req.db_conn()?;
65-
let (user_id, token_id) = if let Some(id) =
66-
req.extensions().find::<TrustedUserId>().map(|x| x.0)
67-
{
65+
66+
let session = req.session();
67+
let user_id_from_session = session.get("user_id").and_then(|s| s.parse::<i32>().ok());
68+
69+
let (user_id, token_id) = if let Some(id) = user_id_from_session {
6870
(id, None)
6971
} else {
7072
// Otherwise, look for an `Authorization` header on the request

src/middleware.rs

-5
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ mod prelude {
44
}
55

66
use self::app::AppMiddleware;
7-
use self::current_user::CaptureUserIdFromCookie;
87
use self::debug::*;
98
use self::ember_html::EmberHtml;
109
use self::head::Head;
@@ -14,7 +13,6 @@ use self::static_or_continue::StaticOrContinue;
1413
pub mod app;
1514
mod balance_capacity;
1615
mod block_traffic;
17-
pub mod current_user;
1816
mod debug;
1917
mod ember_html;
2018
mod ensure_well_formed_500;
@@ -70,9 +68,6 @@ pub fn build_middleware(app: Arc<App>, endpoints: R404) -> MiddlewareBuilder {
7068

7169
m.add(AppMiddleware::new(app));
7270

73-
// Parse and save the user_id from the session cookie as part of the authentication logic
74-
m.add(CaptureUserIdFromCookie);
75-
7671
// Note: The following `m.around()` middleware is run from bottom to top
7772

7873
// This is currently the final middleware to run. If a middleware layer requires a database

src/middleware/current_user.rs

-37
This file was deleted.

src/middleware/log_request.rs

+2-5
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
//! information that we care about like User-Agent
33
44
use super::prelude::*;
5-
use crate::middleware::current_user::TrustedUserId;
65
use crate::util::request_header;
76

87
use conduit::{header, Host, RequestExt, Scheme, StatusCode};
8+
use conduit_cookie::RequestSession;
99
use sentry::Level;
1010

1111
use std::fmt::{self, Display, Formatter};
@@ -86,10 +86,7 @@ fn report_to_sentry(req: &dyn RequestExt, res: &AfterResult, response_time: u64)
8686
let url = format!("{}://{}{}", scheme, host, path).parse().ok();
8787

8888
{
89-
let id = req
90-
.extensions()
91-
.find::<TrustedUserId>()
92-
.map(|x| x.0.to_string());
89+
let id = req.session().get("user_id").map(|str| str.to_string());
9390

9491
let user = sentry::User {
9592
id,

0 commit comments

Comments
 (0)