Skip to main content

ironflow_api/routes/
mod.rs

1//! Router assembly — one module per route.
2
3pub mod api_keys;
4pub mod approve_run;
5pub mod auth;
6pub mod cancel_run;
7pub mod create_run;
8pub mod events;
9pub mod get_run;
10pub mod get_stats;
11pub mod get_workflow;
12pub mod health_check;
13mod internal;
14pub mod list_runs;
15pub mod list_workflows;
16#[cfg(feature = "prometheus")]
17pub mod metrics;
18pub mod openapi_spec;
19pub mod retry_run;
20pub mod users;
21
22use std::path::PathBuf;
23
24use axum::Extension;
25use axum::Router;
26use axum::middleware as axum_mw;
27use axum::routing::{delete, get, patch, post, put};
28use tower_http::limit::RequestBodyLimitLayer;
29use tower_http::services::{ServeDir, ServeFile};
30
31use crate::middleware::{WorkerToken, security_headers, worker_token_auth};
32use crate::rate_limit::{per_minute, rate_limit};
33use crate::state::AppState;
34
35/// Maximum request body size: 2 MiB.
36const MAX_BODY_SIZE: usize = 2 * 1024 * 1024;
37
38/// Router-level configuration with sensible defaults.
39///
40/// Controls dashboard serving, rate limiting, and other router behaviors.
41/// Use [`Default::default()`] for production-ready defaults, then override
42/// individual fields as needed.
43///
44/// # Examples
45///
46/// ```
47/// use ironflow_api::routes::RouterConfig;
48///
49/// // All defaults: rate limiting enabled, no custom dashboard dir
50/// let config = RouterConfig::default();
51/// assert_eq!(config.rate_limit_auth, Some(10));
52///
53/// // Disable auth rate limiting, custom dashboard
54/// let config = RouterConfig {
55///     rate_limit_auth: None,
56///     ..RouterConfig::default()
57/// };
58/// ```
59#[derive(Debug, Clone)]
60pub struct RouterConfig {
61    /// Filesystem path to dashboard assets. When set, serves the SPA
62    /// from this directory instead of the embedded build.
63    pub dashboard_dir: Option<PathBuf>,
64    /// Rate limit for auth credential routes (sign-in, sign-up) in
65    /// requests per minute per IP. `None` disables the limiter.
66    pub rate_limit_auth: Option<u32>,
67    /// Rate limit for general public API routes in requests per minute
68    /// per IP. `None` disables the limiter.
69    pub rate_limit_general: Option<u32>,
70}
71
72impl Default for RouterConfig {
73    fn default() -> Self {
74        Self {
75            dashboard_dir: None,
76            rate_limit_auth: Some(10),
77            rate_limit_general: Some(60),
78        }
79    }
80}
81
82/// Handler that returns a JSON 404 when the `sign-up` feature is disabled.
83#[cfg(not(feature = "sign-up"))]
84async fn sign_up_disabled() -> impl axum::response::IntoResponse {
85    crate::error::ApiError::BadRequest("sign-up is disabled".to_string())
86}
87
88/// Create the main application router.
89///
90/// # Examples
91///
92/// ```no_run
93/// use ironflow_api::routes::{RouterConfig, create_router};
94/// use ironflow_api::state::AppState;
95/// use ironflow_auth::jwt::JwtConfig;
96/// use ironflow_store::prelude::*;
97/// use ironflow_store::api_key_store::ApiKeyStore;
98/// use ironflow_engine::engine::Engine;
99/// use ironflow_core::providers::claude::ClaudeCodeProvider;
100/// use std::sync::Arc;
101///
102/// # async fn example() {
103/// let store = Arc::new(InMemoryStore::new());
104/// let user_store: Arc<dyn UserStore> = Arc::new(InMemoryStore::new());
105/// let api_key_store: Arc<dyn ApiKeyStore> = Arc::new(InMemoryStore::new());
106/// let provider = Arc::new(ClaudeCodeProvider::new());
107/// let engine = Arc::new(Engine::new(store.clone(), provider));
108/// let jwt_config = Arc::new(JwtConfig {
109///     secret: "secret".to_string(),
110///     access_token_ttl_secs: 900,
111///     refresh_token_ttl_secs: 604800,
112///     cookie_domain: None,
113///     cookie_secure: false,
114/// });
115/// let broadcaster = ironflow_api::sse::SseBroadcaster::new();
116/// let state = AppState::new(store, user_store, api_key_store, engine, jwt_config, "token".to_string(), broadcaster.sender());
117/// let router = create_router(state, RouterConfig::default());
118/// # }
119/// ```
120pub fn create_router(state: AppState, config: RouterConfig) -> Router {
121    // Internal routes (worker-to-API, protected by WORKER_TOKEN)
122    let internal_routes = Router::new()
123        .route("/runs", post(internal::create_run::create_run))
124        .route("/runs/next", get(internal::pick_next_run::pick_next_run))
125        .route(
126            "/runs/{id}",
127            get(internal::get_run::get_run).put(internal::update_run::update_run),
128        )
129        .route(
130            "/runs/{id}/status",
131            put(internal::update_run_status::update_run_status),
132        )
133        .route("/steps", post(internal::create_step::create_step))
134        .route("/steps/{id}", put(internal::update_step::update_step))
135        .route(
136            "/step-dependencies",
137            post(internal::create_step_dependencies::create_step_dependencies),
138        )
139        .layer(axum_mw::from_fn(worker_token_auth))
140        .layer(Extension(WorkerToken(state.worker_token.clone())))
141        .with_state(state.clone());
142
143    // Auth credential routes (rate-limited when configured)
144    #[allow(unused_mut)]
145    let mut auth_credential_routes = Router::new();
146
147    #[cfg(feature = "sign-up")]
148    {
149        auth_credential_routes =
150            auth_credential_routes.route("/sign-up", post(auth::sign_up::sign_up));
151    }
152
153    #[cfg(not(feature = "sign-up"))]
154    {
155        auth_credential_routes = auth_credential_routes.route("/sign-up", post(sign_up_disabled));
156    }
157
158    let mut auth_credential_routes =
159        auth_credential_routes.route("/sign-in", post(auth::sign_in::sign_in));
160
161    if let Some(rpm) = config.rate_limit_auth {
162        auth_credential_routes = auth_credential_routes
163            .layer(axum_mw::from_fn(rate_limit))
164            .layer(Extension(per_minute(rpm)));
165    }
166
167    // Auth session routes (no strict rate limiting, covered by general limiter)
168    let auth_session_routes = Router::new()
169        .route("/refresh", post(auth::refresh::refresh))
170        .route("/sign-out", post(auth::sign_out::sign_out))
171        .route("/me", get(auth::me::me));
172
173    // Public + user-authenticated routes (rate-limited when configured)
174    #[allow(unused_mut)]
175    let mut api_v1 = Router::new()
176        .route("/health-check", get(health_check::health_check))
177        .route("/openapi.json", get(openapi_spec::openapi_spec))
178        .route(
179            "/runs",
180            get(list_runs::list_runs).post(create_run::create_run),
181        )
182        .route("/runs/{id}", get(get_run::get_run))
183        .route("/runs/{id}/cancel", post(cancel_run::cancel_run))
184        .route("/runs/{id}/approve", post(approve_run::approve_run))
185        .route("/runs/{id}/reject", post(approve_run::reject_run))
186        .route("/runs/{id}/retry", post(retry_run::retry_run))
187        .route("/workflows", get(list_workflows::list_workflows))
188        .route("/workflows/{name}", get(get_workflow::get_workflow))
189        .route("/stats", get(get_stats::get_stats))
190        .route("/events", get(events::events))
191        .route(
192            "/api-keys",
193            get(api_keys::list::list_api_keys).post(api_keys::create::create_api_key),
194        )
195        .route(
196            "/api-keys/scopes",
197            get(api_keys::available_scopes::available_scopes),
198        )
199        .route("/api-keys/{id}", delete(api_keys::delete::delete_api_key))
200        .route(
201            "/users",
202            get(users::list::list_users).post(users::create::create_user),
203        )
204        .route("/users/{id}", delete(users::delete::delete_user))
205        .route("/users/{id}/role", patch(users::update_role::update_role));
206
207    #[cfg(feature = "prometheus")]
208    {
209        api_v1 = api_v1.route("/metrics", get(metrics::metrics));
210    }
211
212    let mut api_v1 = api_v1
213        .nest("/auth", auth_credential_routes)
214        .nest("/auth", auth_session_routes);
215
216    if let Some(rpm) = config.rate_limit_general {
217        api_v1 = api_v1
218            .layer(axum_mw::from_fn(rate_limit))
219            .layer(Extension(per_minute(rpm)));
220    }
221
222    let api_v1 = api_v1.with_state(state.clone());
223
224    #[allow(unused_mut)]
225    let mut app = Router::new()
226        .nest("/api/v1/internal", internal_routes)
227        .nest("/api/v1", api_v1)
228        .with_state(state)
229        .layer(RequestBodyLimitLayer::new(MAX_BODY_SIZE))
230        .layer(axum_mw::from_fn(security_headers));
231
232    #[cfg(feature = "prometheus")]
233    {
234        app = app.layer(axum_mw::from_fn(crate::middleware::request_metrics));
235    }
236
237    match config.dashboard_dir {
238        Some(dir) => {
239            let index = dir.join("index.html");
240            let serve = ServeDir::new(dir).fallback(ServeFile::new(index));
241            app.fallback_service(serve)
242        }
243        #[cfg(feature = "dashboard")]
244        None => app.fallback_service(crate::dashboard::EmbeddedDashboard),
245        #[cfg(not(feature = "dashboard"))]
246        None => app,
247    }
248}
249
250#[cfg(test)]
251mod tests {
252    use super::*;
253    use axum::body::Body;
254    use axum::http::{Request, StatusCode};
255    use http_body_util::BodyExt;
256    use ironflow_core::providers::claude::ClaudeCodeProvider;
257    use ironflow_engine::engine::Engine;
258    use ironflow_engine::notify::Event;
259    use ironflow_store::api_key_store::ApiKeyStore;
260    use ironflow_store::memory::InMemoryStore;
261    use ironflow_store::user_store::UserStore;
262    use std::sync::Arc;
263    use tokio::sync::broadcast;
264    use tower::ServiceExt;
265    fn test_state() -> AppState {
266        let store = Arc::new(InMemoryStore::new());
267        let user_store: Arc<dyn UserStore> = Arc::new(InMemoryStore::new());
268        let api_key_store: Arc<dyn ApiKeyStore> = Arc::new(InMemoryStore::new());
269        let provider = Arc::new(ClaudeCodeProvider::new());
270        let engine = Arc::new(Engine::new(store.clone(), provider));
271        let jwt_config = Arc::new(ironflow_auth::jwt::JwtConfig {
272            secret: "test-secret".to_string(),
273            access_token_ttl_secs: 900,
274            refresh_token_ttl_secs: 604800,
275            cookie_domain: None,
276            cookie_secure: false,
277        });
278        let (event_sender, _) = broadcast::channel::<Event>(1);
279        AppState::new(
280            store,
281            user_store,
282            api_key_store,
283            engine,
284            jwt_config,
285            "test-worker-token".to_string(),
286            event_sender,
287        )
288    }
289
290    #[tokio::test]
291    async fn health_check_route() {
292        let state = test_state();
293        let app = create_router(state, RouterConfig::default());
294
295        let req = Request::builder()
296            .uri("/api/v1/health-check")
297            .body(Body::empty())
298            .unwrap();
299
300        let resp = app.oneshot(req).await.unwrap();
301        assert_eq!(resp.status(), StatusCode::OK);
302
303        let body = resp.into_body().collect().await.unwrap().to_bytes();
304        assert_eq!(&body[..], b"OK");
305    }
306
307    fn make_auth_header(state: &AppState) -> String {
308        use ironflow_auth::jwt::AccessToken;
309        use uuid::Uuid;
310
311        let user_id = Uuid::now_v7();
312        let token = AccessToken::for_user(user_id, "testuser", false, &state.jwt_config).unwrap();
313        format!("Bearer {}", token.0)
314    }
315
316    #[tokio::test]
317    async fn runs_route_exists() {
318        let state = test_state();
319        let app = create_router(state.clone(), RouterConfig::default());
320        let auth_header = make_auth_header(&state);
321
322        let req = Request::builder()
323            .uri("/api/v1/runs?page=1&per_page=20")
324            .header("authorization", auth_header)
325            .body(Body::empty())
326            .unwrap();
327
328        let resp = app.oneshot(req).await.unwrap();
329        assert_eq!(resp.status(), StatusCode::OK);
330    }
331
332    #[tokio::test]
333    async fn stats_route_exists() {
334        let state = test_state();
335        let app = create_router(state.clone(), RouterConfig::default());
336        let auth_header = make_auth_header(&state);
337
338        let req = Request::builder()
339            .uri("/api/v1/stats")
340            .header("authorization", auth_header)
341            .body(Body::empty())
342            .unwrap();
343
344        let resp = app.oneshot(req).await.unwrap();
345        assert_eq!(resp.status(), StatusCode::OK);
346    }
347
348    #[tokio::test]
349    async fn responses_include_security_headers() {
350        let state = test_state();
351        let app = create_router(state, RouterConfig::default());
352
353        let req = Request::builder()
354            .uri("/api/v1/health-check")
355            .body(Body::empty())
356            .unwrap();
357
358        let resp = app.oneshot(req).await.unwrap();
359
360        assert_eq!(
361            resp.headers().get("x-content-type-options").unwrap(),
362            "nosniff"
363        );
364        assert_eq!(resp.headers().get("x-frame-options").unwrap(), "DENY");
365        assert_eq!(
366            resp.headers().get("x-xss-protection").unwrap(),
367            "1; mode=block"
368        );
369        assert_eq!(
370            resp.headers().get("strict-transport-security").unwrap(),
371            "max-age=63072000; includeSubDomains"
372        );
373        assert!(
374            resp.headers()
375                .get("content-security-policy")
376                .unwrap()
377                .to_str()
378                .unwrap()
379                .contains("default-src 'self'")
380        );
381    }
382
383    #[tokio::test]
384    async fn body_size_limit_rejects_oversized_payload() {
385        let state = test_state();
386        let app = create_router(state.clone(), RouterConfig::default());
387        let auth_header = make_auth_header(&state);
388
389        // 3 MiB payload — exceeds the 2 MiB limit
390        let oversized = vec![0u8; 3 * 1024 * 1024];
391
392        let req = Request::builder()
393            .method("POST")
394            .uri("/api/v1/runs")
395            .header("content-type", "application/json")
396            .header("authorization", auth_header)
397            .body(Body::from(oversized))
398            .unwrap();
399
400        let resp = app.oneshot(req).await.unwrap();
401        assert_eq!(resp.status(), StatusCode::PAYLOAD_TOO_LARGE);
402    }
403}