use Crypt::OpenSSL::Random;
use Crypt::OpenSSL::RSA;
use MIME::Base64;
-use MIME::Base32; #libmime-base32-perl
use Digest::SHA;
use Time::HiRes qw(gettimeofday);
-use PVE::Exception qw(raise_perm_exc);
+use PVE::Exception qw(raise);
Crypt::OpenSSL::RSA->import_random_seed();
+use constant HTTP_UNAUTHORIZED => 401;
+
sub assemble_csrf_prevention_token {
my ($secret, $username) = @_;
($age < $max_age);
}
- raise_perm_exc("Permission denied - invalid csrf token") if !$noerr;
+ raise("Permission denied - invalid csrf token\n", code => HTTP_UNAUTHORIZED)
+ if !$noerr;
return undef;
}
}
}
- raise_perm_exc("permission denied - invalid $prefix ticket") if !$noerr;
+ raise("permission denied - invalid $prefix ticket\n", code => HTTP_UNAUTHORIZED)
+ if !$noerr;
return undef;
}
# Note: data needs to be lower case only, because virt-viewer needs that
# Note: RSA signature are too long (>=256 charaters) and make problems with remote-viewer
- my $plain = "pvespiceproxy:$timestamp:$vmid:" . lc($node);
+ my $plain = "pvespiceproxy:${timestamp}:${vmid}:" . lc($node);
# produces 40 characters
my $sig = unpack("H*", Digest::SHA::sha1($plain, $secret));
#my $sig = unpack("H*", $rsa_priv->sign($plain)); # this produce too long strings (512)
- my $proxyticket = "$plain::$sig";
+ my $proxyticket = "${plain}::${sig}";
return ($ticket, $proxyticket);
}