use std::char;
use std::collections::HashSet;
use std::fmt;
use std::str;
use std::cmp;
#[derive(Clone, PartialEq, Eq)]
pub struct Scope {
denied_tokens: HashSet<String>,
allowed_tokens: HashSet<String>,
}
impl Scope {
fn invalid_scope_char(ch: char) -> bool {
match ch {
'\x21' => false,
ch if ch >= '\x23' && ch <= '\x5b' => false,
ch if ch >= '\x5d' && ch <= '\x7e' => false,
' ' => false, _ => true,
}
}
#[must_use]
pub fn priviledged_to(&self, rhs: &Self) -> bool {
rhs <= self
}
#[must_use]
pub fn allow_access(&self, rhs: &Self) -> bool {
self <= rhs
}
}
pub trait IntoScope {
fn into_scope(&self) -> Result<Scope, ParseScopeErr>;
}
impl IntoScope for &str {
fn into_scope(&self) -> Result<Scope, ParseScopeErr> {
self.parse::<Scope>()
}
}
impl IntoScope for Scope {
fn into_scope(&self) -> Result<Scope, ParseScopeErr> {
Ok(self.clone())
}
}
#[derive(Debug)]
pub enum ParseScopeErr {
InvalidCharacter(char),
}
impl str::FromStr for Scope {
type Err = ParseScopeErr;
fn from_str(string: &str) -> Result<Self, ParseScopeErr> {
if let Some(ch) = string.chars().find(|&ch| Self::invalid_scope_char(ch)) {
return Err(ParseScopeErr::InvalidCharacter(ch));
}
let tokens = string.split(' ').filter(|s| !s.is_empty());
let denied_tokens: HashSet<String> = tokens
.clone()
.filter(|s| s.starts_with('!'))
.map(|s| str::to_string(&s[1..]))
.collect();
let allowed_tokens: HashSet<String> = tokens
.clone()
.filter(|s| !s.starts_with('!'))
.map(str::to_string)
.collect();
Ok(Self {
denied_tokens,
allowed_tokens,
})
}
}
impl fmt::Display for ParseScopeErr {
fn fmt(&self, fmt: &mut fmt::Formatter) -> Result<(), fmt::Error> {
match self {
Self::InvalidCharacter(chr) => {
write!(fmt, "Encountered invalid character in scope: {}", chr)
}
}
}
}
impl fmt::Debug for Scope {
fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
fmt.debug_tuple("Scope")
.field(&self.denied_tokens)
.field(&self.allowed_tokens)
.finish()
}
}
impl cmp::PartialOrd for Scope {
fn partial_cmp(&self, rhs: &Self) -> Option<cmp::Ordering> {
if !self.denied_tokens.is_empty() || !rhs.denied_tokens.is_empty() {
let lhs_denied_intersect_count =
self.denied_tokens.intersection(&rhs.allowed_tokens).count();
let rhs_denied_intersect_count =
rhs.denied_tokens.intersection(&self.allowed_tokens).count();
if lhs_denied_intersect_count > 0 || rhs_denied_intersect_count > 0 {
return None;
}
}
let intersect_count = self
.allowed_tokens
.intersection(&rhs.allowed_tokens)
.count();
if intersect_count == self.allowed_tokens.len()
&& intersect_count == rhs.allowed_tokens.len()
{
Some(cmp::Ordering::Equal)
} else if intersect_count == self.allowed_tokens.len() {
Some(cmp::Ordering::Less)
} else if intersect_count == rhs.allowed_tokens.len() {
Some(cmp::Ordering::Greater)
} else {
None
}
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn scope_can_be_parsed() {
let scope_base = "cap1 cap2".parse::<Scope>().unwrap();
let scope_less = "cap1".parse::<Scope>().unwrap();
let scope_uncmp = "cap1 cap3".parse::<Scope>().unwrap();
let user_scope = "user read:user".parse::<Scope>().unwrap();
let user_only = "user".parse::<Scope>().unwrap();
let guest_only = "guest".parse::<Scope>().unwrap();
let read_user = "read:user".parse::<Scope>().unwrap();
let not_admin = "!admin".parse::<Scope>().unwrap();
let admin = "admin".parse::<Scope>().unwrap();
let admin_read = "admin read:user".parse::<Scope>().unwrap();
assert_eq!(
scope_base.partial_cmp(&scope_less),
Some(cmp::Ordering::Greater)
);
assert_eq!(
scope_less.partial_cmp(&scope_base),
Some(cmp::Ordering::Less)
);
assert_eq!(scope_base.partial_cmp(&scope_uncmp), None);
assert_eq!(scope_uncmp.partial_cmp(&scope_base), None);
assert_eq!(
scope_base.partial_cmp(&scope_base),
Some(cmp::Ordering::Equal)
);
assert!(scope_base.priviledged_to(&scope_less));
assert!(scope_base.priviledged_to(&scope_base));
assert!(scope_less.allow_access(&scope_base));
assert!(scope_base.allow_access(&scope_base));
assert!(!scope_less.priviledged_to(&scope_base));
assert!(!scope_base.allow_access(&scope_less));
assert!(!scope_less.priviledged_to(&scope_uncmp));
assert!(!scope_base.priviledged_to(&scope_uncmp));
assert!(!scope_uncmp.allow_access(&scope_less));
assert!(!scope_uncmp.allow_access(&scope_base));
assert!(user_only.allow_access(&user_scope));
assert!(read_user.allow_access(&user_scope));
assert!(admin.allow_access(&admin));
assert!(not_admin.allow_access(&user_scope));
assert!(user_scope.priviledged_to(¬_admin));
assert!(!not_admin.allow_access(&admin));
assert!(not_admin.allow_access(&user_only));
assert!(!not_admin.allow_access(&admin_read));
assert!(!admin_read.priviledged_to(¬_admin));
}
}