1pub mod api_keys;
4pub mod approve_run;
5pub mod auth;
6pub mod cancel_run;
7pub mod create_run;
8pub mod events;
9pub mod get_run;
10pub mod get_stats;
11pub mod get_workflow;
12pub mod health_check;
13mod internal;
14pub mod list_runs;
15pub mod list_workflows;
16#[cfg(feature = "prometheus")]
17pub mod metrics;
18pub mod openapi_spec;
19pub mod retry_run;
20pub mod users;
21
22use std::path::PathBuf;
23
24use axum::Extension;
25use axum::Router;
26use axum::middleware as axum_mw;
27use axum::routing::{delete, get, patch, post, put};
28use tower_http::limit::RequestBodyLimitLayer;
29use tower_http::services::{ServeDir, ServeFile};
30
31use crate::middleware::{WorkerToken, security_headers, worker_token_auth};
32use crate::rate_limit::{per_minute, rate_limit};
33use crate::state::AppState;
34
35const MAX_BODY_SIZE: usize = 2 * 1024 * 1024;
37
38#[derive(Debug, Clone)]
60pub struct RouterConfig {
61 pub dashboard_dir: Option<PathBuf>,
64 pub rate_limit_auth: Option<u32>,
67 pub rate_limit_general: Option<u32>,
70}
71
72impl Default for RouterConfig {
73 fn default() -> Self {
74 Self {
75 dashboard_dir: None,
76 rate_limit_auth: Some(10),
77 rate_limit_general: Some(60),
78 }
79 }
80}
81
82#[cfg(not(feature = "sign-up"))]
84async fn sign_up_disabled() -> impl axum::response::IntoResponse {
85 crate::error::ApiError::BadRequest("sign-up is disabled".to_string())
86}
87
88pub fn create_router(state: AppState, config: RouterConfig) -> Router {
121 let internal_routes = Router::new()
123 .route("/runs", post(internal::create_run::create_run))
124 .route("/runs/next", get(internal::pick_next_run::pick_next_run))
125 .route(
126 "/runs/{id}",
127 get(internal::get_run::get_run).put(internal::update_run::update_run),
128 )
129 .route(
130 "/runs/{id}/status",
131 put(internal::update_run_status::update_run_status),
132 )
133 .route("/steps", post(internal::create_step::create_step))
134 .route("/steps/{id}", put(internal::update_step::update_step))
135 .route(
136 "/step-dependencies",
137 post(internal::create_step_dependencies::create_step_dependencies),
138 )
139 .layer(axum_mw::from_fn(worker_token_auth))
140 .layer(Extension(WorkerToken(state.worker_token.clone())))
141 .with_state(state.clone());
142
143 #[allow(unused_mut)]
145 let mut auth_credential_routes = Router::new();
146
147 #[cfg(feature = "sign-up")]
148 {
149 auth_credential_routes =
150 auth_credential_routes.route("/sign-up", post(auth::sign_up::sign_up));
151 }
152
153 #[cfg(not(feature = "sign-up"))]
154 {
155 auth_credential_routes = auth_credential_routes.route("/sign-up", post(sign_up_disabled));
156 }
157
158 let mut auth_credential_routes =
159 auth_credential_routes.route("/sign-in", post(auth::sign_in::sign_in));
160
161 if let Some(rpm) = config.rate_limit_auth {
162 auth_credential_routes = auth_credential_routes
163 .layer(axum_mw::from_fn(rate_limit))
164 .layer(Extension(per_minute(rpm)));
165 }
166
167 let auth_session_routes = Router::new()
169 .route("/refresh", post(auth::refresh::refresh))
170 .route("/sign-out", post(auth::sign_out::sign_out))
171 .route("/me", get(auth::me::me));
172
173 #[allow(unused_mut)]
175 let mut api_v1 = Router::new()
176 .route("/health-check", get(health_check::health_check))
177 .route("/openapi.json", get(openapi_spec::openapi_spec))
178 .route(
179 "/runs",
180 get(list_runs::list_runs).post(create_run::create_run),
181 )
182 .route("/runs/{id}", get(get_run::get_run))
183 .route("/runs/{id}/cancel", post(cancel_run::cancel_run))
184 .route("/runs/{id}/approve", post(approve_run::approve_run))
185 .route("/runs/{id}/reject", post(approve_run::reject_run))
186 .route("/runs/{id}/retry", post(retry_run::retry_run))
187 .route("/workflows", get(list_workflows::list_workflows))
188 .route("/workflows/{name}", get(get_workflow::get_workflow))
189 .route("/stats", get(get_stats::get_stats))
190 .route("/events", get(events::events))
191 .route(
192 "/api-keys",
193 get(api_keys::list::list_api_keys).post(api_keys::create::create_api_key),
194 )
195 .route(
196 "/api-keys/scopes",
197 get(api_keys::available_scopes::available_scopes),
198 )
199 .route("/api-keys/{id}", delete(api_keys::delete::delete_api_key))
200 .route(
201 "/users",
202 get(users::list::list_users).post(users::create::create_user),
203 )
204 .route("/users/{id}", delete(users::delete::delete_user))
205 .route("/users/{id}/role", patch(users::update_role::update_role));
206
207 #[cfg(feature = "prometheus")]
208 {
209 api_v1 = api_v1.route("/metrics", get(metrics::metrics));
210 }
211
212 let mut api_v1 = api_v1
213 .nest("/auth", auth_credential_routes)
214 .nest("/auth", auth_session_routes);
215
216 if let Some(rpm) = config.rate_limit_general {
217 api_v1 = api_v1
218 .layer(axum_mw::from_fn(rate_limit))
219 .layer(Extension(per_minute(rpm)));
220 }
221
222 let api_v1 = api_v1.with_state(state.clone());
223
224 #[allow(unused_mut)]
225 let mut app = Router::new()
226 .nest("/api/v1/internal", internal_routes)
227 .nest("/api/v1", api_v1)
228 .with_state(state)
229 .layer(RequestBodyLimitLayer::new(MAX_BODY_SIZE))
230 .layer(axum_mw::from_fn(security_headers));
231
232 #[cfg(feature = "prometheus")]
233 {
234 app = app.layer(axum_mw::from_fn(crate::middleware::request_metrics));
235 }
236
237 match config.dashboard_dir {
238 Some(dir) => {
239 let index = dir.join("index.html");
240 let serve = ServeDir::new(dir).fallback(ServeFile::new(index));
241 app.fallback_service(serve)
242 }
243 #[cfg(feature = "dashboard")]
244 None => app.fallback_service(crate::dashboard::EmbeddedDashboard),
245 #[cfg(not(feature = "dashboard"))]
246 None => app,
247 }
248}
249
250#[cfg(test)]
251mod tests {
252 use super::*;
253 use axum::body::Body;
254 use axum::http::{Request, StatusCode};
255 use http_body_util::BodyExt;
256 use ironflow_core::providers::claude::ClaudeCodeProvider;
257 use ironflow_engine::engine::Engine;
258 use ironflow_engine::notify::Event;
259 use ironflow_store::api_key_store::ApiKeyStore;
260 use ironflow_store::memory::InMemoryStore;
261 use ironflow_store::user_store::UserStore;
262 use std::sync::Arc;
263 use tokio::sync::broadcast;
264 use tower::ServiceExt;
265 fn test_state() -> AppState {
266 let store = Arc::new(InMemoryStore::new());
267 let user_store: Arc<dyn UserStore> = Arc::new(InMemoryStore::new());
268 let api_key_store: Arc<dyn ApiKeyStore> = Arc::new(InMemoryStore::new());
269 let provider = Arc::new(ClaudeCodeProvider::new());
270 let engine = Arc::new(Engine::new(store.clone(), provider));
271 let jwt_config = Arc::new(ironflow_auth::jwt::JwtConfig {
272 secret: "test-secret".to_string(),
273 access_token_ttl_secs: 900,
274 refresh_token_ttl_secs: 604800,
275 cookie_domain: None,
276 cookie_secure: false,
277 });
278 let (event_sender, _) = broadcast::channel::<Event>(1);
279 AppState::new(
280 store,
281 user_store,
282 api_key_store,
283 engine,
284 jwt_config,
285 "test-worker-token".to_string(),
286 event_sender,
287 )
288 }
289
290 #[tokio::test]
291 async fn health_check_route() {
292 let state = test_state();
293 let app = create_router(state, RouterConfig::default());
294
295 let req = Request::builder()
296 .uri("/api/v1/health-check")
297 .body(Body::empty())
298 .unwrap();
299
300 let resp = app.oneshot(req).await.unwrap();
301 assert_eq!(resp.status(), StatusCode::OK);
302
303 let body = resp.into_body().collect().await.unwrap().to_bytes();
304 assert_eq!(&body[..], b"OK");
305 }
306
307 fn make_auth_header(state: &AppState) -> String {
308 use ironflow_auth::jwt::AccessToken;
309 use uuid::Uuid;
310
311 let user_id = Uuid::now_v7();
312 let token = AccessToken::for_user(user_id, "testuser", false, &state.jwt_config).unwrap();
313 format!("Bearer {}", token.0)
314 }
315
316 #[tokio::test]
317 async fn runs_route_exists() {
318 let state = test_state();
319 let app = create_router(state.clone(), RouterConfig::default());
320 let auth_header = make_auth_header(&state);
321
322 let req = Request::builder()
323 .uri("/api/v1/runs?page=1&per_page=20")
324 .header("authorization", auth_header)
325 .body(Body::empty())
326 .unwrap();
327
328 let resp = app.oneshot(req).await.unwrap();
329 assert_eq!(resp.status(), StatusCode::OK);
330 }
331
332 #[tokio::test]
333 async fn stats_route_exists() {
334 let state = test_state();
335 let app = create_router(state.clone(), RouterConfig::default());
336 let auth_header = make_auth_header(&state);
337
338 let req = Request::builder()
339 .uri("/api/v1/stats")
340 .header("authorization", auth_header)
341 .body(Body::empty())
342 .unwrap();
343
344 let resp = app.oneshot(req).await.unwrap();
345 assert_eq!(resp.status(), StatusCode::OK);
346 }
347
348 #[tokio::test]
349 async fn responses_include_security_headers() {
350 let state = test_state();
351 let app = create_router(state, RouterConfig::default());
352
353 let req = Request::builder()
354 .uri("/api/v1/health-check")
355 .body(Body::empty())
356 .unwrap();
357
358 let resp = app.oneshot(req).await.unwrap();
359
360 assert_eq!(
361 resp.headers().get("x-content-type-options").unwrap(),
362 "nosniff"
363 );
364 assert_eq!(resp.headers().get("x-frame-options").unwrap(), "DENY");
365 assert_eq!(
366 resp.headers().get("x-xss-protection").unwrap(),
367 "1; mode=block"
368 );
369 assert_eq!(
370 resp.headers().get("strict-transport-security").unwrap(),
371 "max-age=63072000; includeSubDomains"
372 );
373 assert!(
374 resp.headers()
375 .get("content-security-policy")
376 .unwrap()
377 .to_str()
378 .unwrap()
379 .contains("default-src 'self'")
380 );
381 }
382
383 #[tokio::test]
384 async fn body_size_limit_rejects_oversized_payload() {
385 let state = test_state();
386 let app = create_router(state.clone(), RouterConfig::default());
387 let auth_header = make_auth_header(&state);
388
389 let oversized = vec![0u8; 3 * 1024 * 1024];
391
392 let req = Request::builder()
393 .method("POST")
394 .uri("/api/v1/runs")
395 .header("content-type", "application/json")
396 .header("authorization", auth_header)
397 .body(Body::from(oversized))
398 .unwrap();
399
400 let resp = app.oneshot(req).await.unwrap();
401 assert_eq!(resp.status(), StatusCode::PAYLOAD_TOO_LARGE);
402 }
403}