Optimized permissions

This commit is contained in:
xeovalyte 2025-02-14 15:59:11 +01:00
parent 701d430742
commit 349c1a24a4
Signed by: xeovalyte
SSH Key Fingerprint: SHA256:GWI1hq+MNKR2UOcvk7n9tekASXT8vyazK7vDF9Xyciw
7 changed files with 78 additions and 26 deletions

View File

@ -18,10 +18,7 @@ use crate::{
mod error;
pub async fn get_user_from_header(
pool: &PgPool,
headers: &HeaderMap,
) -> Result<(Roles, User), AuthError> {
pub async fn get_user_from_header(pool: &PgPool, headers: &HeaderMap) -> Result<User, AuthError> {
let bearer_value = headers.get(header::AUTHORIZATION);
let bearer_value = bearer_value
.ok_or(AuthError::InvalidToken)?
@ -44,11 +41,7 @@ pub async fn get_user_from_header(
Err(_) => return Err(AuthError::InvalidToken),
};
let roles = UserMember::get_roles(pool, &db_user.user_id)
.await
.unwrap_or(Roles::MEMBER);
Ok((roles, db_user.into()))
Ok(db_user.into())
}
pub fn get_token_from_bearer(bearer: &str) -> Result<String, AuthError> {

View File

@ -8,10 +8,12 @@ pub struct User {
pub admin: bool,
}
use crate::auth::AuthError;
use crate::database::model::User as DbUser;
use crate::database::model::UserMember as DbUserMember;
use crate::util::convert_vec;
use super::member::Roles;
use super::Member;
impl From<DbUser> for User {
fn from(db_user: DbUser) -> Self {
@ -40,4 +42,34 @@ impl User {
Ok(convert_vec(related_members))
}
pub async fn authorize(
&self,
pool: &PgPool,
required_roles: Option<Roles>,
requested_user_id: Option<String>,
) -> Result<(), AuthError> {
if let Some(user_id) = requested_user_id {
let user_uuid = uuid::Uuid::parse_str(&user_id).map_err(|_| AuthError::NoPermssions)?;
if self.id != user_uuid {
return Err(AuthError::NoPermssions);
}
return Ok(());
}
if let Some(roles) = required_roles {
let user_roles = DbUserMember::get_roles(pool, &self.id)
.await
.unwrap_or(Roles::MEMBER);
if !user_roles.contains(roles) {
return Err(AuthError::NoPermssions);
}
return Ok(());
}
Ok(())
}
}

View File

@ -18,7 +18,7 @@ async fn root(
State(state): State<AppState>,
headers: HeaderMap,
) -> Result<Json<User>, crate::Error> {
let (_roles, user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
Ok(Json(user))
}

View File

@ -26,7 +26,7 @@ pub struct LoginRequest {
password: String,
}
pub async fn login<'a>(
pub async fn login(
State(state): State<AppState>,
Json(login_request): Json<LoginRequest>,
) -> Result<String, crate::Error> {
@ -99,7 +99,7 @@ pub async fn change_password(
headers: HeaderMap,
Json(request): Json<ChangePasswordRequest>,
) -> Result<(), crate::Error> {
let (_, user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
// Verify that password is correct
let db_user: DbUser = user.into();
@ -138,7 +138,7 @@ pub async fn change_email(
headers: HeaderMap,
Json(request): Json<ChangeEmailRequest>,
) -> Result<(), crate::Error> {
let (_, user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
// Verify that password is correct
let db_user: DbUser = user.into();

View File

@ -20,7 +20,7 @@ pub async fn get_current_members(
State(state): State<AppState>,
headers: HeaderMap,
) -> Result<Json<Vec<Member>>, crate::Error> {
let (_roles, user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
let members = user.members(&state.pool).await?;

View File

@ -4,7 +4,7 @@ use axum::{extract::State, http::HeaderMap, Json};
use sqlx::PgPool;
use crate::{
auth::{get_user_from_header, AuthError},
auth::get_user_from_header,
database::model::Member as DbMember,
model::{
member::{Groups, Name, Roles},
@ -14,16 +14,15 @@ use crate::{
AppState,
};
pub async fn migrate_request<'a>(
pub async fn migrate_request(
State(state): State<AppState>,
headers: HeaderMap,
body: String,
) -> Result<Json<MigrationResponse>, crate::Error> {
let (roles, _user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
if !roles.contains(Roles::ADMIN) {
return Err(AuthError::NoPermssions.into());
}
user.authorize(&state.pool, Some(Roles::ADMIN), None)
.await?;
tracing::info!("Migration is requested");
@ -46,10 +45,15 @@ pub async fn migrate_request<'a>(
Ok(Json(MigrationResponse::from((count, members_diff))))
}
pub async fn migrate_confirm<'a>(
pub async fn migrate_confirm(
State(state): State<AppState>,
headers: HeaderMap,
body: String,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN), None)
.await?;
tracing::info!("Migration is confirmed");
let count = match body.trim().parse::<u32>() {

View File

@ -1,15 +1,38 @@
use axum::{extract::State, http::HeaderMap, routing::get, Json, Router};
use axum::{
extract::{Path, State},
http::HeaderMap,
routing::{get, post},
Json, Router,
};
use crate::{auth::get_user_from_header, model::User, AppState};
use crate::{
auth::get_user_from_header,
model::{member::Roles, User},
AppState,
};
pub fn routes() -> Router<AppState> {
Router::new().route("/user", get(get_current_user))
Router::new()
.route("/user", get(get_current_user))
.route("/user/{user_id}/members", post(members_insert))
}
pub async fn get_current_user<'a>(
pub async fn get_current_user(
State(state): State<AppState>,
headers: HeaderMap,
) -> Result<Json<User>, crate::Error> {
let (_roles, user) = get_user_from_header(&state.pool, &headers).await?;
let user = get_user_from_header(&state.pool, &headers).await?;
Ok(Json(user))
}
pub async fn members_insert(
State(state): State<AppState>,
Path(user_id): Path<String>,
headers: HeaderMap,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN), Some(user_id))
.await?;
Ok(())
}