#[allow(unused_imports, deprecated)]
use std::ascii::AsciiExt;
use std::borrow::Cow;
use std::fmt;
use std::str::FromStr;
use chrono::{DateTime, Utc};
use failure::Fail;
use serde::{Deserialize, Serialize};
use url::form_urlencoded;
use crate::dsn::Dsn;
use crate::protocol;
use crate::utils::{datetime_to_timestamp, timestamp_to_datetime};
#[derive(Debug, Fail, Copy, Clone, Eq, PartialEq)]
pub enum AuthParseError {
#[fail(display = "non sentry auth")]
NonSentryAuth,
#[fail(display = "invalid value for version")]
InvalidVersion,
#[fail(display = "missing public key in auth header")]
MissingPublicKey,
}
#[derive(Debug, Serialize, Deserialize, Clone)]
pub struct Auth {
#[serde(skip)]
timestamp: Option<DateTime<Utc>>,
#[serde(rename = "sentry_client")]
client: Option<String>,
#[serde(rename = "sentry_version")]
version: u16,
#[serde(rename = "sentry_key")]
key: String,
#[serde(rename = "sentry_secret")]
secret: Option<String>,
}
impl Auth {
pub fn from_pairs<'a, 'b, I: Iterator<Item = (Cow<'a, str>, Cow<'b, str>)>>(
pairs: I,
) -> Result<Auth, AuthParseError> {
let mut rv = Auth {
timestamp: None,
client: None,
version: protocol::LATEST,
key: "".into(),
secret: None,
};
for (key, value) in pairs {
let mut key = &key[..];
if key.starts_with("sentry_") {
key = &key[7..];
}
match key {
"timestamp" => {
let timestamp = value
.parse()
.ok()
.and_then(|ts| timestamp_to_datetime(ts).single())
.or_else(|| value.parse().ok());
rv.timestamp = timestamp;
}
"client" => {
rv.client = Some(value.into());
}
"version" => {
rv.version = value
.splitn(2, '.')
.next()
.and_then(|v| v.parse().ok())
.ok_or(AuthParseError::InvalidVersion)?;
}
"key" => {
rv.key = value.into();
}
"secret" => {
rv.secret = Some(value.into());
}
_ => {}
}
}
if rv.key.is_empty() {
return Err(AuthParseError::MissingPublicKey);
}
Ok(rv)
}
pub fn from_querystring(qs: &[u8]) -> Result<Auth, AuthParseError> {
Auth::from_pairs(form_urlencoded::parse(qs))
}
pub fn timestamp(&self) -> Option<DateTime<Utc>> {
self.timestamp
}
pub fn version(&self) -> u16 {
self.version
}
pub fn public_key(&self) -> &str {
&self.key
}
pub fn secret_key(&self) -> Option<&str> {
self.secret.as_ref().map(|x| x.as_str())
}
pub fn is_public(&self) -> bool {
self.secret.is_none()
}
pub fn client_agent(&self) -> Option<&str> {
self.client.as_ref().map(|x| x.as_str())
}
}
impl fmt::Display for Auth {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(
f,
"Sentry sentry_key={}, sentry_version={}",
self.key, self.version
)?;
if let Some(ts) = self.timestamp {
write!(f, ", sentry_timestamp={}", datetime_to_timestamp(&ts))?;
}
if let Some(ref client) = self.client {
write!(f, ", sentry_client={}", client)?;
}
if let Some(ref secret) = self.secret {
write!(f, ", sentry_secret={}", secret)?;
}
Ok(())
}
}
impl FromStr for Auth {
type Err = AuthParseError;
fn from_str(s: &str) -> Result<Auth, AuthParseError> {
let mut base_iter = s.splitn(2, ' ');
if !base_iter
.next()
.unwrap_or("")
.eq_ignore_ascii_case("sentry")
{
return Err(AuthParseError::NonSentryAuth);
}
let items = base_iter.next().unwrap_or("");
let rv = Self::from_pairs(items.split(',').filter_map(|item| {
let mut kviter = item.trim().split('=');
Some((Cow::Borrowed(kviter.next()?), Cow::Borrowed(kviter.next()?)))
}))?;
if rv.key.is_empty() {
return Err(AuthParseError::MissingPublicKey);
}
Ok(rv)
}
}
pub(crate) fn auth_from_dsn_and_client(dsn: &Dsn, client: Option<&str>) -> Auth {
Auth {
timestamp: Some(Utc::now()),
client: client.map(|x| x.to_string()),
version: protocol::LATEST,
key: dsn.public_key().to_string(),
secret: dsn.secret_key().map(|x| x.to_string()),
}
}