use std::str::from_utf8;
use std::marker::PhantomData;
use code_grant::accesstoken::{
access_token,
Error as TokenError,
Extension,
Endpoint as TokenEndpoint,
Request as TokenRequest};
use super::*;
pub struct AccessTokenFlow<E, R> where E: Endpoint<R>, R: WebRequest {
endpoint: WrappedToken<E, R>,
allow_credentials_in_body: bool,
}
struct WrappedToken<E: Endpoint<R>, R: WebRequest> {
inner: E,
extension_fallback: (),
r_type: PhantomData<R>,
}
struct WrappedRequest<'a, R: WebRequest + 'a> {
request: PhantomData<R>,
body: Cow<'a, dyn QueryParameter + 'static>,
authorization: Option<Authorization>,
error: Option<FailParse<R::Error>>,
allow_credentials_in_body: bool,
}
struct Invalid;
enum FailParse<E> {
Invalid,
Err(E),
}
struct Authorization(String, Vec<u8>);
impl<E, R> AccessTokenFlow<E, R> where E: Endpoint<R>, R: WebRequest {
pub fn prepare(mut endpoint: E) -> Result<Self, E::Error> {
if endpoint.registrar().is_none() {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
if endpoint.authorizer_mut().is_none() {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
if endpoint.issuer_mut().is_none() {
return Err(endpoint.error(OAuthError::PrimitiveError));
}
Ok(AccessTokenFlow {
endpoint: WrappedToken {
inner: endpoint,
extension_fallback: (),
r_type: PhantomData
},
allow_credentials_in_body: false,
})
}
pub fn allow_credentials_in_body(&mut self, allow: bool) {
self.allow_credentials_in_body = allow;
}
pub fn execute(&mut self, mut request: R) -> Result<R::Response, E::Error> {
let issued = access_token(
&mut self.endpoint,
&WrappedRequest::new(&mut request, self.allow_credentials_in_body));
let token = match issued {
Err(error) => return token_error(&mut self.endpoint.inner, &mut request, error),
Ok(token) => token,
};
let mut response = self.endpoint.inner.response(&mut request, InnerTemplate::Ok.into())?;
response.body_json(&token.to_json())
.map_err(|err| self.endpoint.inner.web_error(err))?;
Ok(response)
}
}
fn token_error<E: Endpoint<R>, R: WebRequest>(endpoint: &mut E, request: &mut R, error: TokenError)
-> Result<R::Response, E::Error>
{
Ok(match error {
TokenError::Invalid(mut json) => {
let mut response = endpoint.response(request, InnerTemplate::BadRequest {
access_token_error: Some(json.description()),
}.into())?;
response.client_error()
.map_err(|err| endpoint.web_error(err))?;
response.body_json(&json.to_json())
.map_err(|err| endpoint.web_error(err))?;
response
},
TokenError::Unauthorized(mut json, scheme) =>{
let mut response = endpoint.response(request, InnerTemplate::Unauthorized {
error: None,
access_token_error: Some(json.description()),
}.into())?;
response.unauthorized(&scheme)
.map_err(|err| endpoint.web_error(err))?;
response.body_json(&json.to_json())
.map_err(|err| endpoint.web_error(err))?;
response
},
TokenError::Primitive(_) => {
return Err(endpoint.error(OAuthError::PrimitiveError))
},
})
}
impl<E: Endpoint<R>, R: WebRequest> TokenEndpoint for WrappedToken<E, R> {
fn registrar(&self) -> &dyn Registrar {
self.inner.registrar().unwrap()
}
fn authorizer(&mut self) -> &mut dyn Authorizer {
self.inner.authorizer_mut().unwrap()
}
fn issuer(&mut self) -> &mut dyn Issuer {
self.inner.issuer_mut().unwrap()
}
fn extension(&mut self) -> &mut dyn Extension {
self.inner.extension()
.and_then(super::Extension::access_token)
.unwrap_or(&mut self.extension_fallback)
}
}
impl<'a, R: WebRequest + 'a> WrappedRequest<'a, R> {
pub fn new(request: &'a mut R, credentials: bool) -> Self {
Self::new_or_fail(request, credentials)
.unwrap_or_else(Self::from_err)
}
fn new_or_fail(request: &'a mut R, credentials: bool)
-> Result<Self, FailParse<R::Error>>
{
let authorization = match request.authheader() {
Err(err) => return Err(FailParse::Err(err)),
Ok(Some(header)) => Self::parse_header(header).map(Some)?,
Ok(None) => None,
};
Ok(WrappedRequest {
request: PhantomData,
body: request.urlbody().map_err(FailParse::Err)?,
authorization,
error: None,
allow_credentials_in_body: credentials,
})
}
fn from_err(err: FailParse<R::Error>) -> Self {
WrappedRequest {
request: PhantomData,
body: Cow::Owned(Default::default()),
authorization: None,
error: Some(err),
allow_credentials_in_body: false,
}
}
fn parse_header(header: Cow<str>) -> Result<Authorization, Invalid> {
let authorization = {
if !header.starts_with("Basic ") {
return Err(Invalid)
}
let combined = match base64::decode(&header[6..]) {
Err(_) => return Err(Invalid),
Ok(vec) => vec,
};
let mut split = combined.splitn(2, |&c| c == b':');
let client_bin = match split.next() {
None => return Err(Invalid),
Some(client) => client,
};
let passwd = match split.next() {
None => return Err(Invalid),
Some(passwd64) => passwd64,
};
let client = match from_utf8(client_bin) {
Err(_) => return Err(Invalid),
Ok(client) => client,
};
Authorization(client.to_string(), passwd.to_vec())
};
Ok(authorization)
}
}
impl<'a, R: WebRequest> TokenRequest for WrappedRequest<'a, R> {
fn valid(&self) -> bool {
self.error.is_none()
}
fn code(&self) -> Option<Cow<str>> {
self.body.unique_value("code")
}
fn authorization(&self) -> Option<(Cow<str>, Cow<[u8]>)> {
self.authorization.as_ref()
.map(|auth| (auth.0.as_str().into(), auth.1.as_slice().into()))
}
fn client_id(&self) -> Option<Cow<str>> {
self.body.unique_value("client_id")
}
fn redirect_uri(&self) -> Option<Cow<str>> {
self.body.unique_value("redirect_uri")
}
fn grant_type(&self) -> Option<Cow<str>> {
self.body.unique_value("grant_type")
}
fn extension(&self, key: &str) -> Option<Cow<str>> {
self.body.unique_value(key)
}
fn allow_credentials_in_body(&self) -> bool {
self.allow_credentials_in_body
}
}
impl<E> From<Invalid> for FailParse<E> {
fn from(_: Invalid) -> Self {
FailParse::Invalid
}
}