use std::sync::Arc;
use crate::actix_web::HttpResponse;
use crate::biome::credentials::rest_api::actix_web_1::config::BiomeCredentialsRestConfig;
use crate::biome::credentials::store::{CredentialsStore, CredentialsStoreError};
use crate::futures::{Future, IntoFuture};
use crate::rest_api::{
actix_web_1::{into_bytes, HandlerFunction, Method, ProtocolVersionRangeGuard, Resource},
ErrorResponse, SPLINTER_PROTOCOL_VERSION,
};
#[cfg(feature = "biome-key-management")]
use crate::biome::key_management::{
store::{KeyStore, KeyStoreError},
Key,
};
#[cfg(feature = "biome-key-management")]
use crate::biome::credentials::rest_api::resources::{
key_management::ResponseKey, user::ModifyUser,
};
#[cfg(feature = "authorization")]
use crate::biome::credentials::rest_api::{
BIOME_USER_READ_PERMISSION, BIOME_USER_WRITE_PERMISSION,
};
const BIOME_LIST_USERS_PROTOCOL_MIN: u32 = 1;
const BIOME_USER_PROTOCOL_MIN: u32 = 1;
pub fn make_list_route(credentials_store: Arc<dyn CredentialsStore>) -> Resource {
let resource = Resource::build("/biome/users").add_request_guard(
ProtocolVersionRangeGuard::new(BIOME_LIST_USERS_PROTOCOL_MIN, SPLINTER_PROTOCOL_VERSION),
);
#[cfg(feature = "authorization")]
{
resource.add_method(Method::Get, BIOME_USER_READ_PERMISSION, move |_, _| {
let credentials_store = credentials_store.clone();
Box::new(match credentials_store.list_usernames() {
Ok(users) => HttpResponse::Ok().json(users).into_future(),
Err(err) => {
debug!("Failed to get users from the database {}", err);
HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future()
}
})
})
}
#[cfg(not(feature = "authorization"))]
{
resource.add_method(Method::Get, move |_, _| {
let credentials_store = credentials_store.clone();
Box::new(match credentials_store.list_usernames() {
Ok(users) => HttpResponse::Ok().json(users).into_future(),
Err(err) => {
debug!("Failed to get users from the database {}", err);
HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future()
}
})
})
}
}
#[cfg(feature = "biome-key-management")]
pub fn make_user_routes(
rest_config: Arc<BiomeCredentialsRestConfig>,
credentials_store: Arc<dyn CredentialsStore>,
key_store: Arc<dyn KeyStore>,
) -> Resource {
let resource = Resource::build("/biome/users/{id}").add_request_guard(
ProtocolVersionRangeGuard::new(BIOME_USER_PROTOCOL_MIN, SPLINTER_PROTOCOL_VERSION),
);
#[cfg(feature = "authorization")]
{
resource
.add_method(
Method::Put,
BIOME_USER_WRITE_PERMISSION,
add_modify_user_method(credentials_store.clone(), rest_config, key_store),
)
.add_method(
Method::Get,
BIOME_USER_READ_PERMISSION,
add_fetch_user_method(credentials_store.clone()),
)
.add_method(
Method::Delete,
BIOME_USER_WRITE_PERMISSION,
add_delete_user_method(credentials_store),
)
}
#[cfg(not(feature = "authorization"))]
{
resource
.add_method(
Method::Put,
add_modify_user_method(credentials_store.clone(), rest_config, key_store),
)
.add_method(
Method::Get,
add_fetch_user_method(credentials_store.clone()),
)
.add_method(Method::Delete, add_delete_user_method(credentials_store))
}
}
fn add_fetch_user_method(credentials_store: Arc<dyn CredentialsStore>) -> HandlerFunction {
Box::new(move |request, _| {
let credentials_store = credentials_store.clone();
let user_id = if let Some(t) = request.match_info().get("id") {
t.to_string()
} else {
return Box::new(
HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(
"Failed to process request: no user id",
))
.into_future(),
);
};
Box::new(match credentials_store.fetch_username_by_id(&user_id) {
Ok(user) => HttpResponse::Ok().json(user).into_future(),
Err(err) => {
debug!("Failed to get user from the database {}", err);
match err {
CredentialsStoreError::NotFoundError(_) => HttpResponse::NotFound()
.json(ErrorResponse::not_found(&format!(
"User ID not found: {}",
&user_id
)))
.into_future(),
_ => HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future(),
}
}
})
})
}
#[cfg(feature = "biome-key-management")]
fn add_modify_user_method(
credentials_store: Arc<dyn CredentialsStore>,
rest_config: Arc<BiomeCredentialsRestConfig>,
key_store: Arc<dyn KeyStore>,
) -> HandlerFunction {
let encryption_cost = rest_config.password_encryption_cost();
Box::new(move |request, payload| {
let credentials_store = credentials_store.clone();
let key_store = key_store.clone();
let user = match request.match_info().get("id") {
Some(t) => t.to_string(),
None => {
return Box::new(
HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(
"Failed to process request: no user id",
))
.into_future(),
)
}
};
Box::new(into_bytes(payload).and_then(move |bytes| {
let modify_user = match serde_json::from_slice::<ModifyUser>(&bytes) {
Ok(val) => val,
Err(err) => {
debug!("Error parsing request body {}", err);
return HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(&format!(
"Failed to parse payload body: {}",
err
)))
.into_future();
}
};
let new_key_pairs: Vec<Key> = modify_user
.new_key_pairs
.iter()
.map(|new_key| {
Key::new(
&new_key.public_key,
&new_key.encrypted_private_key,
&user,
&new_key.display_name,
)
})
.collect::<Vec<Key>>();
let credentials =
match credentials_store.fetch_credential_by_username(&modify_user.username) {
Ok(credentials) => credentials,
Err(err) => {
debug!("Failed to fetch credentials {}", err);
match err {
CredentialsStoreError::NotFoundError(_) => {
return HttpResponse::NotFound()
.json(ErrorResponse::not_found(&format!(
"Username not found: {}",
modify_user.username
)))
.into_future();
}
_ => {
return HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future()
}
}
}
};
match credentials.verify_password(&modify_user.hashed_password) {
Ok(true) => {
let new_password = match modify_user.new_password {
Some(val) => val,
None => credentials.password,
};
let response_keys = new_key_pairs
.iter()
.map(ResponseKey::from)
.collect::<Vec<ResponseKey>>();
match key_store.update_keys_and_password(
&user,
&new_password,
encryption_cost,
&new_key_pairs,
) {
Ok(()) => HttpResponse::Ok()
.json(json!({
"message": "Credentials and key updated successfully",
"data": response_keys,
}))
.into_future(),
Err(err) => match err {
KeyStoreError::DuplicateKeyError(msg) => HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(&msg))
.into_future(),
KeyStoreError::UserDoesNotExistError(msg) => HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(&msg))
.into_future(),
_ => HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future(),
},
}
}
Ok(false) => HttpResponse::BadRequest()
.json(ErrorResponse::bad_request("Invalid password"))
.into_future(),
Err(err) => {
error!("Failed to verify password {}", err);
HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future()
}
}
}))
})
}
fn add_delete_user_method(credentials_store: Arc<dyn CredentialsStore>) -> HandlerFunction {
Box::new(move |request, _| {
let credentials_store = credentials_store.clone();
let user = match request.match_info().get("id") {
Some(t) => t.to_string(),
None => {
return Box::new(
HttpResponse::BadRequest()
.json(ErrorResponse::bad_request(
"Failed to process request: no user id",
))
.into_future(),
)
}
};
Box::new(match credentials_store.remove_credentials(&user) {
Ok(()) => HttpResponse::Ok()
.json(json!({ "message": "User deleted sucessfully" }))
.into_future(),
Err(err) => match err {
CredentialsStoreError::NotFoundError(msg) => {
debug!("User not found: {}", msg);
HttpResponse::NotFound()
.json(ErrorResponse::not_found(&format!(
"User ID not found: {}",
user
)))
.into_future()
}
_ => {
error!("Failed to delete user in database {}", err);
HttpResponse::InternalServerError()
.json(ErrorResponse::internal_error())
.into_future()
}
},
})
})
}