factoriauth/src/server.rs
2024-02-20 21:57:03 +00:00

196 lines
5 KiB
Rust

use std::{net::SocketAddr, sync::Arc};
use axum::{
extract::{Query, State},
http::StatusCode,
response::IntoResponse,
routing::{get, post},
Form, Json, Router,
};
use color_eyre::eyre::Context;
use secrecy::ExposeSecret;
use serde::{Deserialize, Serialize};
use tracing::{event, instrument, Level};
use crate::auth::{
AuthenticationError, ServerPadlockGenerator, UserAuthenticator, UserServerKeyGenerator,
};
use crate::secrets::{Password, ServerHash, UserToken};
#[derive(Debug, Clone)]
struct AppState {
user_authenticator: Arc<UserAuthenticator>,
server_padlock_generator: Arc<ServerPadlockGenerator>,
user_server_key_generator: Arc<UserServerKeyGenerator>,
}
#[instrument]
pub async fn run(
listen: SocketAddr,
user_authenticator: Arc<UserAuthenticator>,
server_padlock_generator: Arc<ServerPadlockGenerator>,
user_server_key_generator: Arc<UserServerKeyGenerator>,
) -> color_eyre::Result<()> {
let app_state = AppState {
user_authenticator,
server_padlock_generator,
user_server_key_generator,
};
let app = Router::new()
.route("/tls-check/success", get(|| async { "OK" }))
.route("/api-login", post(api_login))
.route(
"/generate-user-server-key-2",
post(generate_user_server_key_2),
)
.route(
"/generate-server-padlock-2",
post(generate_server_padlock_2),
)
.with_state(app_state);
let listener = tokio::net::TcpListener::bind(listen)
.await
.context(format!("Failed to listen on {listen}"))?;
axum::serve(listener, app).await?;
Ok(())
}
#[derive(Debug, Clone, PartialEq, Eq, Serialize)]
struct ApiError {
#[serde(skip_serializing)]
status: StatusCode,
error: String,
message: String,
}
impl From<AuthenticationError> for ApiError {
fn from(err: AuthenticationError) -> Self {
Self {
status: StatusCode::UNAUTHORIZED,
error: "authentication-failed".to_owned(),
message: err.to_string(),
}
}
}
impl IntoResponse for ApiError {
fn into_response(self) -> axum::response::Response {
(self.status, Json(self)).into_response()
}
}
type ApiResult<T> = Result<T, ApiError>;
fn default_api_version() -> String {
"4".to_owned()
}
#[derive(Debug, Clone, PartialEq, Eq, Deserialize)]
struct ApiVersion {
#[serde(default = "default_api_version")]
api_version: String,
}
#[derive(Debug, Clone, Deserialize)]
struct LoginRequest {
username: String,
password: Password,
}
#[derive(Debug, Clone, Serialize)]
struct LoginResponse {
username: String,
token: String,
}
#[instrument]
async fn api_login(
State(AppState {
user_authenticator, ..
}): State<AppState>,
Query(ApiVersion { api_version }): Query<ApiVersion>,
Form(LoginRequest { username, password }): Form<LoginRequest>,
) -> ApiResult<Json<LoginResponse>> {
event!(Level::INFO, "Generating user key");
let (username, user_token) = user_authenticator
.get_user_token(&username, &password)
.await?;
Ok(Json(LoginResponse {
username,
token: user_token.0.expose_secret().to_owned(),
}))
}
#[derive(Debug, Clone, Deserialize)]
struct UserServerKeyRequest {
username: String,
token: UserToken,
server_hash: ServerHash,
}
#[derive(Debug, Clone, Serialize)]
struct UserServerKeyResponse {
server_key: String,
server_key_timestamp: String,
}
#[instrument]
async fn generate_user_server_key_2(
State(AppState {
user_server_key_generator,
..
}): State<AppState>,
Query(ApiVersion { api_version }): Query<ApiVersion>,
Form(UserServerKeyRequest {
username,
token,
server_hash,
}): Form<UserServerKeyRequest>,
) -> ApiResult<Json<UserServerKeyResponse>> {
event!(Level::INFO, "Creating user_server_key");
let (server_key, server_key_timestamp) = user_server_key_generator
.generate_user_server_key(&username, &token, &server_hash)
.await?;
Ok(Json(UserServerKeyResponse {
server_key: server_key.0.expose_secret().to_owned(),
server_key_timestamp,
}))
}
#[derive(Serialize)]
struct ServerPadlockResponse {
server_hash: ServerHash,
server_padlock: String,
}
#[instrument]
async fn generate_server_padlock_2(
State(AppState {
server_padlock_generator,
..
}): State<AppState>,
Query(ApiVersion { api_version }): Query<ApiVersion>,
) -> ApiResult<Json<ServerPadlockResponse>> {
event!(Level::INFO, "Creating server padlock");
let server_hash = server_padlock_generator
.generate_hash()
.await
.map_err(AuthenticationError::from)?;
let server_padlock = server_padlock_generator
.generate_padlock(&server_hash)
.await
.map_err(AuthenticationError::from)?;
Ok(Json(ServerPadlockResponse {
server_hash,
server_padlock: server_padlock.0.expose_secret().to_owned(),
}))
}