use crate::{
common::config::get_default_cache_path,
manta_backend_dispatcher::StaticBackendDispatcher,
};
use crossterm::style::Stylize;
use dialoguer::{Input, Password};
use manta_backend_dispatcher::{error::Error, interfaces::authentication::AuthenticationTrait};
use std::{
fs::{File, create_dir_all},
io::{self, IsTerminal, Read, Write},
os::unix::fs::OpenOptionsExt,
};
const AUTH_TOKEN_ENV_VAR: &str = "MANTA_CSM_TOKEN";
const AUTH_CACHE_FILE_SUFFIX: &str = "_auth";
const MAX_LOGIN_ATTEMPTS: u32 = 3;
pub async fn get_api_token(
backend: &StaticBackendDispatcher,
site_name: &str,
) -> Result<String, Error> {
let auth_token_rslt = get_token_from_env(backend).await;
match auth_token_rslt {
Ok(token) => {
tracing::info!("Authentication successful using env var");
return Ok(token);
}
Err(err) => {
tracing::warn!(
"{:#?}. Falling back to next authentication method",
err.to_string()
);
}
}
let auth_token_rslt = get_token_from_local_file(site_name, backend).await;
match auth_token_rslt {
Ok(token) => {
tracing::info!("Authentication successful using local file");
return Ok(token);
}
Err(err) => {
tracing::warn!("{:#?}", err.to_string());
let stdin = io::stdin();
if !stdin.is_terminal() {
tracing::info!(
"Running in non-interactive method. Give up authentication."
);
return Err(err);
} else {
tracing::info!(
"Running in interactive mode. Falling back to next authentication method"
);
}
}
}
tracing::info!("Getting CSM authentication token interactively");
let shasta_token = get_token_interactively(backend).await?;
store_token_in_local_file(site_name, &shasta_token)?;
Ok(shasta_token)
}
async fn get_token_from_env(
backend: &StaticBackendDispatcher,
) -> Result<String, Error> {
let auth_token_env_name = AUTH_TOKEN_ENV_VAR;
tracing::info!(
"Looking for authentication token in env var '{}'",
auth_token_env_name
);
let shasta_token_rslt = std::env::var(auth_token_env_name);
if let Ok(shasta_token) = shasta_token_rslt {
tracing::info!(
"Authentication token found in env var '{}'. Check if it is valid",
auth_token_env_name
);
backend.validate_api_token(&shasta_token).await?;
Ok(shasta_token)
} else {
Err(Error::AuthenticationTokenNotFound(format!(
"env var '{}'",
auth_token_env_name
)))
}
}
async fn get_token_from_local_file(
site_name: &str,
backend: &StaticBackendDispatcher,
) -> Result<String, Error> {
let mut path = get_default_cache_path()?;
path.push(site_name.to_string() + AUTH_CACHE_FILE_SUFFIX);
tracing::info!(
"Looking for authentication token in filesystem file '{}'",
path.display()
);
let mut shasta_token = String::new();
File::open(&path)
.inspect_err(|e| {
tracing::debug!("Could not open token file '{}': {}", path.display(), e);
})
.map_err(|_| {
Error::AuthenticationTokenNotFound(format!("'{}'", path.display()))
})?
.read_to_string(&mut shasta_token)?;
tracing::info!(
"Authentication token found in filesystem. Check if it is still valid",
);
backend.validate_api_token(&shasta_token).await?;
Ok(shasta_token)
}
fn store_token_in_local_file(
site_name: &str,
shasta_token: &str,
) -> Result<(), Error> {
tracing::info!("Store authentication token in filesystem file");
let mut path = get_default_cache_path()?;
create_dir_all(&path)?;
path.push(site_name.to_string() + AUTH_CACHE_FILE_SUFFIX);
tracing::info!("Cache file: {:?}", path);
let mut file: File = File::options()
.write(true)
.create(true)
.truncate(true)
.mode(0o600)
.open(&path)?;
file.write_all(shasta_token.as_bytes())?;
Ok(())
}
#[cfg(test)]
mod tests {
use super::*;
use std::os::unix::fs::PermissionsExt;
#[test]
fn store_and_read_token_from_local_file() {
let tmp_dir = tempfile::tempdir().unwrap();
let site_name = "test_site";
let token = "my-secret-token-12345";
let mut path = tmp_dir.path().to_path_buf();
path.push(format!("{}{}", site_name, AUTH_CACHE_FILE_SUFFIX));
let mut file = File::options()
.write(true)
.create(true)
.truncate(true)
.mode(0o600)
.open(&path)
.unwrap();
file.write_all(token.as_bytes()).unwrap();
let mut content = String::new();
File::open(&path)
.unwrap()
.read_to_string(&mut content)
.unwrap();
assert_eq!(content, token);
let metadata = std::fs::metadata(&path).unwrap();
let mode = metadata.permissions().mode() & 0o777;
assert_eq!(mode, 0o600, "Token file should have 600 permissions");
}
#[test]
fn store_token_overwrites_existing() {
let tmp_dir = tempfile::tempdir().unwrap();
let mut path = tmp_dir.path().to_path_buf();
path.push("overwrite_test_auth");
let mut file = File::options()
.write(true)
.create(true)
.truncate(true)
.mode(0o600)
.open(&path)
.unwrap();
file.write_all(b"old-token").unwrap();
let mut file = File::options()
.write(true)
.create(true)
.truncate(true)
.mode(0o600)
.open(&path)
.unwrap();
file.write_all(b"new-token").unwrap();
let mut content = String::new();
File::open(&path)
.unwrap()
.read_to_string(&mut content)
.unwrap();
assert_eq!(content, "new-token");
}
#[test]
fn auth_token_env_var_name() {
assert_eq!(AUTH_TOKEN_ENV_VAR, "MANTA_CSM_TOKEN");
}
#[test]
fn auth_cache_file_suffix_value() {
assert_eq!(AUTH_CACHE_FILE_SUFFIX, "_auth");
}
#[test]
fn max_login_attempts_is_reasonable() {
assert!(MAX_LOGIN_ATTEMPTS >= 1 && MAX_LOGIN_ATTEMPTS <= 10);
}
}
async fn get_token_interactively(
backend: &StaticBackendDispatcher,
) -> Result<String, Error> {
println!("Please type your {}", "Keycloak credentials".green());
let username: String = Input::new()
.with_prompt("username")
.interact_text()?;
let password = Password::new().with_prompt("password").interact()?;
let mut shasta_token_rslt = backend.get_api_token(&username, &password).await;
let mut attempts = 0;
while shasta_token_rslt.is_err() && attempts < MAX_LOGIN_ATTEMPTS {
if let Err(ref err) = shasta_token_rslt {
tracing::info!(
"Authentication attempt {} failed. Reason: {}",
attempts + 1,
err
);
}
println!("Please type your {}", "Keycloak credentials".green());
let username: String = Input::new()
.with_prompt("username")
.interact_text()?;
let password = Password::new().with_prompt("password").interact()?;
shasta_token_rslt = backend.get_api_token(&username, &password).await;
attempts += 1;
}
Ok(shasta_token_rslt?)
}