1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143
use rsb_derive::Builder; use crate::errors::*; use crate::listener::signature_verifier::SlackEventSignatureVerifier; use crate::listener::SlackClientEventsListener; use crate::{SlackClient, SlackClientHttpApi}; use futures::future::{BoxFuture, FutureExt, TryFutureExt}; use hyper::body::*; use hyper::{Method, Request, Response, StatusCode}; pub use slack_morphism_models::events::*; use std::collections::HashMap; use std::future::Future; use std::sync::Arc; #[derive(Debug, PartialEq, Clone, Builder)] pub struct SlackCommandEventsListenerConfig { pub events_signing_secret: String, #[default = "SlackCommandEventsListenerConfig::DEFAULT_EVENTS_URL_VALUE.into()"] pub events_path: String, } impl SlackCommandEventsListenerConfig { const DEFAULT_EVENTS_URL_VALUE: &'static str = "/command"; } impl SlackClientEventsListener { pub fn command_events_service_fn<'a, D, F, I, IF>( &self, config: Arc<SlackCommandEventsListenerConfig>, command_service_fn: I, ) -> impl Fn( Request<Body>, D, ) -> BoxFuture< 'a, Result<Response<Body>, Box<dyn std::error::Error + Send + Sync + 'a>>, > + 'a + Send + Clone where D: Fn(Request<Body>) -> F + 'a + Send + Sync + Clone, F: Future<Output = Result<Response<Body>, Box<dyn std::error::Error + Send + Sync + 'a>>> + 'a + Send, I: Fn(SlackCommandEvent, Arc<SlackClient>) -> IF + 'static + Send + Sync + Clone, IF: Future< Output = Result< SlackCommandEventResponse, Box<dyn std::error::Error + Send + Sync + 'static>, >, > + 'static + Send, { let signature_verifier: Arc<SlackEventSignatureVerifier> = Arc::new( SlackEventSignatureVerifier::new(&config.events_signing_secret), ); let client = self.client.clone(); let error_handler = self.error_handler.clone(); move |req: Request<Body>, chain: D| { let cfg = config.clone(); let serv = command_service_fn.clone(); let sign_verifier = signature_verifier.clone(); let sc = client.clone(); let thread_error_handler = error_handler.clone(); async move { match (req.method(), req.uri().path()) { (&Method::POST, url) if url == cfg.events_path => { SlackClientHttpApi::decode_signed_response(req, &sign_verifier) .map_ok(|body| { let body_params: HashMap<String, String> = url::form_urlencoded::parse(body.as_bytes()) .into_owned() .collect(); match ( body_params.get("team_id"), body_params.get("channel_id"), body_params.get("user_id"), body_params.get("command"), body_params.get("text"), body_params.get("response_url"), body_params.get("trigger_id"), ) { ( Some(team_id), Some(channel_id), Some(user_id), Some(command), text, Some(response_url), Some(trigger_id), ) => Ok(SlackCommandEvent::new( team_id.into(), channel_id.into(), user_id.into(), command.into(), response_url.clone(), trigger_id.into(), ) .opt_text(text.cloned())), _ => Err(SlackClientError::SystemError( SlackClientSystemError::new( "Absent payload in the request from Slack".into(), ), )) .map_err(|e| e.into()), } }) .and_then(|event| async move { match event { Ok(command_event) => match serv(command_event, sc).await { Ok(cresp) => Response::builder() .status(StatusCode::OK) .header( "content-type", "application/json; charset=utf-8", ) .body(serde_json::to_string(&cresp).unwrap().into()) .map_err(|e| e.into()), Err(_) => Response::builder() .status(StatusCode::BAD_REQUEST) .body(Body::empty()) .map_err(|e| e.into()), }, Err(command_event_err) => { thread_error_handler(command_event_err, sc); Ok(Response::new(Body::empty())) } } }) .await } _ => chain(req).await, } } .boxed() } } }