我正在构建一个基本的身份验证设置,类似于在Vapor的auth-template模板中使用它(从
here开始).我将所有内容设置为与模板中相同的方式.
static func create(_ req: Request,newUserRequest user: CreateUserRequest) throws -> Future<User.Public> { return User.query(on: req).filter(\.username == user.username).first().flatMap { existingUser in guard existingUser == nil else { throw Abort(.badRequest,reason: "A user with the given username already exists.") } guard user.password == user.passwordVerification else { throw Abort(.badRequest,reason: "Given passwords did not match.") } let count = 16 var pw_salt_data = Data(count: count) let _ = pw_salt_data.withUnsafeMutableBytes { mutableBytes in SecRandomCopyBytes(kSecRandomDefault,count,mutableBytes) } let pw_salt = try BCrypt.hash(pw_salt_data.base64EncodedString()) let pw_hash = try BCrypt.hash(pw_salt + user.password) return User(id: nil,username: user.username,pw_hash: pw_hash,pw_salt: pw_salt,email: user.email).save(on: req).toPublic() } }
但是在登录期间执行身份验证时无法检索该盐:
static func login(_ req: Request) throws -> Future<UserToken> { let user = try req.requireAuthenticated(User.self) let token = try UserToken.create(userID: user.requireID()) return token.save(on: req) }
我希望为每个用户随机生成salt,并将其作为与散列密码分开的列存储在数据库中,以便稍后在身份验证期间使用.
有没有一种标准化的方法来处理在Vapor 3中腌制密码哈希?