Merge pull request #866 from pano9000/refactor_session_secret

refactor(session_secret): use existing randomSecureToken function
This commit is contained in:
Elian Doran 2025-01-01 21:27:14 +02:00 committed by GitHub
commit a8f052071e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -1,9 +1,9 @@
"use strict"; "use strict";
import fs from "fs"; import fs from "fs";
import crypto from "crypto";
import dataDir from "./data_dir.js"; import dataDir from "./data_dir.js";
import log from "./log.js"; import log from "./log.js";
import utils from "./utils.js"
const sessionSecretPath = `${dataDir.TRILIUM_DATA_DIR}/session_secret.txt`; const sessionSecretPath = `${dataDir.TRILIUM_DATA_DIR}/session_secret.txt`;
@ -11,14 +11,8 @@ let sessionSecret: string;
const ENCODING = "ascii"; const ENCODING = "ascii";
function randomValueHex(len: number) {
return crypto.randomBytes(Math.ceil(len / 2))
.toString('hex') // convert to hexadecimal format
.slice(0, len).toUpperCase(); // return required number of characters
}
if (!fs.existsSync(sessionSecretPath)) { if (!fs.existsSync(sessionSecretPath)) {
sessionSecret = randomValueHex(64); sessionSecret = utils.randomSecureToken(64).slice(0, 64);
log.info("Generated session secret"); log.info("Generated session secret");