chore: add app_auth_handlers

This commit is contained in:
Jesús Pérez Lorenzo 2021-09-01 19:30:10 +01:00
parent e9836e77ba
commit fc0a3684af
5 changed files with 268 additions and 0 deletions

10
app_auth_handlers/.gitignore vendored Normal file
View File

@ -0,0 +1,10 @@
/target
target
Cargo.lock
.cache
.temp
.env
*.log
.DS_Store
logs
tmp

View File

@ -0,0 +1,55 @@
[package]
name = "app_auth_handlers"
version = "0.1.0"
authors = ["JesusPerez <jpl@jesusperez.pro>"]
edition = "2018"
publish = false
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
anyhow = "1.0.40"
base64 = "0.13.0"
casbin = "2.0.7"
chrono = "0.4"
dotenv = "0.15.0"
envmnt = "0.9.0"
error-chain = "0.12.4"
glob = "0.3.0"
json = "0.12.4"
once_cell = "1.7.2"
parking_lot = "0.11.1"
rand = "0.8.3"
regex = "1.4.3"
serde = { version = "1.0", features = ["derive"] }
serde_derive = "1.0.125"
serde_json = "1.0.64"
serde_yaml = "0.8.17"
slab = "0.4.3"
tempfile = "3.2.0"
tera = "1.8.0"
thiserror = "1.0.24"
toml = "0.5.8"
yaml-rust = "0.4"
tokio = { version = "1.5.0", features = ["full"] }
uuid = { version = "0.8", features = ["serde", "v4"] }
url = "2.2.1"
warp = { version = "0.3", features = ["default","websocket","tls","compression"] }
app_tools = { version = "0.1.0", path = "../../utils/app_tools" }
app_env = { version = "0.1.0", path = "../../defs/app_env" }
app_auth = { version = "0.1.0", path = "../../defs/app_auth" }
reqtasks = { version = "0.1.0", path = "../reqtasks" }
[dev-dependencies]
pretty_env_logger = "0.4"
tracing-subscriber = "0.2.15"
tracing-log = "0.1"
serde_derive = "1.0.125"
handlebars = "3.0.0"
tokio = { version = "1.5.0", features = ["macros", "rt-multi-thread"] }
tokio-stream = { version = "0.1.5", features = ["net"] }
listenfd = "0.3"
envmnt = "0.9.0"
[build-dependencies]
envmnt = "0.9.0"

View File

@ -0,0 +1,13 @@
# App auth handlers library
Handlers for request for auth management using [warp](https://github.com/seanmonstar/warp)
## handlers
- member_handler
- admin_handler
- login_handler
- loginin_handler
- logout_handler

View File

@ -0,0 +1,4 @@
# App auth handlers library
- [ ] Review & test

View File

@ -0,0 +1,186 @@
use app_auth::{AppAuthDBs, AuthError, UserCtx, WebResult, LoginRequest, CheckinRequest };
// use uuid::Uuid;
use std::collections::HashMap;
use reqtasks::ReqTasks;
use app_env::profile::Profile;
use warp::{
http::{method::Method, HeaderMap, HeaderValue, StatusCode},
Reply, Rejection // , reject,
};
#[allow(clippy::missing_errors_doc)]
pub async fn member_handler(user_ctx: UserCtx) -> WebResult<impl Reply> {
Ok(format!("Member with id {}", user_ctx.user_id))
}
#[allow(clippy::missing_errors_doc)]
pub async fn admin_handler(user_ctx: UserCtx) -> WebResult<impl Reply> {
Ok(format!("Admin with id {}", user_ctx.user_id))
}
#[allow(clippy::missing_errors_doc)]
pub async fn login_handler (
header: HeaderMap<HeaderValue>,
method: Method,
db: AppAuthDBs
) -> Result<impl Reply, Rejection> {
let reqenv = ReqTasks::new(db.app, db.auth, header, method, "", "login_header", "auth",);
let lang = reqenv.lang();
let mut ctx = reqenv.ctx();
let req_module = "";
let app_module: &str;
if ! req_module.is_empty() && req_module != reqenv.config().default_module.as_str() {
app_module = req_module;
} else {
app_module = "";
}
let mut data_hash: HashMap<String, String> = HashMap::new();
data_hash.insert("lang".to_string(), lang.to_owned());
// let allow_origin = reqenv.config().allow_origin;
// let mut res = String::from("");
// let res = if let Some(name) = query.get("name") {
// submitted form
match reqenv
.render_page(
&mut ctx,
reqenv.config().templates_path.as_str(),
"login/index.html",
"index.html",
format!("login/{}.toml", lang.to_owned())
.to_owned()
.as_str(),
&mut data_hash,
app_module,
)
.await {
Ok(page) =>
Ok(warp::http::Response::builder()
.body(page)
.into_response()),
/*
Ok(warp::reply::with_header(
warp::http::Response::new(page),
// "Access-Control-Allow-Origin",
// &allow_origin)),
*/
Err(err) =>
Ok(warp::http::Response::builder()
.body(err.to_string())
.into_response()),
/*
Ok(warp::reply::with_header(
warp::http::Response::new(err.to_string()),
"Access-Control-Allow-Origin",
&allow_origin)),
*/
}
}
#[allow(clippy::missing_errors_doc)]
pub async fn loginin_handler(
body: LoginRequest,
header: HeaderMap<HeaderValue>,
method: Method,
db: AppAuthDBs,
) -> Result<impl Reply, Rejection> {
let reqenv = ReqTasks::new(db.app, db.auth, header, method, "/loginin", "loginin_header", "auth",);
let prfx = "ui";
// ) -> WebResult<impl Reply> {
// let name = body.name;
// println!("{}", &name);
// dbg!(&reqenv.auth_store.users.read().await);
// let allow_origin = reqenv.config().allow_origin;
match &reqenv.token_session(&body).await {
Ok(token) => // Ok(token.to_string()),o
match reqenv.check_authentication(token.to_owned()).await {
Ok(usrctx) => {
let mut path = format!("{}/profiles/{}/{}/defs.yaml",reqenv.config().resources_path,&body.mapkey,&usrctx.user_id);
if ! std::path::Path::new(&path).exists() {
path = format!("{}/profiles/{}/defs.yaml",reqenv.config().resources_path,&prfx);
}
let content = Profile::load_fs_content(path.into());
// let lang = opts.lang.unwrap_or_else(|| String::from("es"));
// let section = opts.section.unwrap_or_else(|| String::from(""));
// let lang_items = LangItems::new("langs/ta",&lang,"yaml");
// let result = lang_items.get_items_str(&section);
let res = Profile::to_yaml(content); // String::from("");
let str_defs = serde_json::to_string(&res).unwrap_or_else(|_| String::from(""));
Ok(warp::http::Response::builder()
// .header("Access-Control-Allow-Origin",&allow_origin)
.body(format!("{{ \"token\": \"{}\", \"defs\": {}}}",&token,&str_defs))
.into_response())
},
Err(_e) => {
Ok(warp::http::Response::builder()
.status(StatusCode::NOT_FOUND)
// .header("Access-Control-Allow-Origin",&allow_origin)
.body(AuthError::UserNotFoundError.to_string())
.into_response())
}
},
Err(_) =>
Ok(warp::http::Response::builder()
.status(StatusCode::NOT_FOUND)
// .header("Access-Control-Allow-Origin",&allow_origin)
.body(AuthError::UserNotFoundError.to_string())
.into_response())
// Err(reject::custom(AuthError::UserNotFoundError))
}
}
#[allow(clippy::missing_errors_doc)]
pub async fn checkin_handler(
body: CheckinRequest,
header: HeaderMap<HeaderValue>,
method: Method,
db: AppAuthDBs,
) -> Result<impl Reply, Rejection> {
let reqenv = ReqTasks::new(db.app, db.auth, header, method, "/checkin", "checkin_header", "auth",);
// ) -> WebResult<impl Reply> {
// let name = &body.data;
// println!("{}", &name);
//dbg!("{}", &body);
// dbg!(&reqenv.auth_store.users.read().await);
// let allow_origin = reqenv.config().allow_origin;
match &reqenv.check_authentication(body.data.to_owned()).await {
Ok(usrctx) => { // Ok(token.to_string()),
let mut path = format!("{}/profiles/{}/{}/defs.yaml",reqenv.config().resources_path,&body.mapkey,&usrctx.user_id);
if ! std::path::Path::new(&path).exists() {
path = format!("{}/profiles/{}/defs.yaml",reqenv.config().resources_path,&body.mapkey);
}
let content = Profile::load_fs_content(path.into());
let res = Profile::to_yaml(content);
let str_defs = serde_json::to_string(&res).unwrap_or_else(|_| String::from(""));
Ok(warp::http::Response::builder()
// .header("Access-Control-Allow-Origin",&allow_origin)
.body(format!("{{ \"token\": \"{}\", \"defs\": {}}}",&body.data,&str_defs))
.into_response())
},
Err(_) =>
Ok(warp::http::Response::builder()
.status(StatusCode::NOT_FOUND)
//.header("Access-Control-Allow-Origin",&allow_origin)
.body(AuthError::UserNotFoundError.to_string())
.into_response())
// Err(reject::custom(AuthError::UserNotFoundError))
}
}
#[allow(clippy::missing_errors_doc,clippy::unnecessary_operation)]
pub async fn logout_handler(
user_ctx: UserCtx,
header: HeaderMap<HeaderValue>,
method: Method,
db: AppAuthDBs,
) -> Result<impl Reply, Rejection> {
//-> WebResult<impl Reply> {
let reqenv = ReqTasks::new(db.app, db.auth, header, method, "", "logout_header", "auth",);
// let allow_origin = reqenv.config().allow_origin;
&reqenv.auth_store.sessions.write().await.remove(&user_ctx.token);
Ok(warp::http::Response::builder()
.status(StatusCode::OK)
//.header("Access-Control-Allow-Origin",&allow_origin)
.body("success".to_string())
.into_response())
}