Compare commits

...

18 Commits

33 changed files with 1171 additions and 166 deletions

View File

@@ -31,10 +31,31 @@
"type": "github" "type": "github"
} }
}, },
"git-hooks": {
"inputs": {
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1737465171,
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "9364dc02281ce2d37a1f55b6e51f7c0f65a75f17",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "git-hooks.nix",
"type": "github"
}
},
"gitignore": { "gitignore": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"pre-commit-hooks", "git-hooks",
"nixpkgs" "nixpkgs"
] ]
}, },
@@ -66,32 +87,14 @@
"type": "github" "type": "github"
} }
}, },
"pre-commit-hooks": {
"inputs": {
"flake-compat": "flake-compat",
"gitignore": "gitignore",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1735882644,
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"rev": "a5a961387e75ae44cc20f0a57ae463da5e959656",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"devenv": "devenv", "devenv": "devenv",
"git-hooks": "git-hooks",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"pre-commit-hooks": "pre-commit-hooks" "pre-commit-hooks": [
"git-hooks"
]
} }
} }
}, },

110
server/Cargo.lock generated
View File

@@ -47,6 +47,56 @@ dependencies = [
"libc", "libc",
] ]
[[package]]
name = "anstream"
version = "0.6.18"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "8acc5369981196006228e28809f761875c0327210a891e941f4c683b3a99529b"
dependencies = [
"anstyle",
"anstyle-parse",
"anstyle-query",
"anstyle-wincon",
"colorchoice",
"is_terminal_polyfill",
"utf8parse",
]
[[package]]
name = "anstyle"
version = "1.0.10"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "55cc3b69f167a1ef2e161439aa98aed94e6028e5f9a59be9a6ffb47aef1651f9"
[[package]]
name = "anstyle-parse"
version = "0.2.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "3b2d16507662817a6a20a9ea92df6652ee4f94f914589377d69f3b21bc5798a9"
dependencies = [
"utf8parse",
]
[[package]]
name = "anstyle-query"
version = "1.1.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "79947af37f4177cfead1110013d678905c37501914fba0efea834c3fe9a8d60c"
dependencies = [
"windows-sys 0.59.0",
]
[[package]]
name = "anstyle-wincon"
version = "3.0.7"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "ca3534e77181a9cc07539ad51f2141fe32f6c3ffd4df76db8ad92346b003ae4e"
dependencies = [
"anstyle",
"once_cell",
"windows-sys 0.59.0",
]
[[package]] [[package]]
name = "argon2" name = "argon2"
version = "0.5.3" version = "0.5.3"
@@ -266,10 +316,57 @@ dependencies = [
"iana-time-zone", "iana-time-zone",
"js-sys", "js-sys",
"num-traits", "num-traits",
"serde",
"wasm-bindgen", "wasm-bindgen",
"windows-targets 0.52.6", "windows-targets 0.52.6",
] ]
[[package]]
name = "clap"
version = "4.5.31"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "027bb0d98429ae334a8698531da7077bdf906419543a35a55c2cb1b66437d767"
dependencies = [
"clap_builder",
"clap_derive",
]
[[package]]
name = "clap_builder"
version = "4.5.31"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5589e0cba072e0f3d23791efac0fd8627b49c829c196a492e88168e6a669d863"
dependencies = [
"anstream",
"anstyle",
"clap_lex",
"strsim",
]
[[package]]
name = "clap_derive"
version = "4.5.28"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "bf4ced95c6f4a675af3da73304b9ac4ed991640c36374e4b46795c49e17cf1ed"
dependencies = [
"heck",
"proc-macro2",
"quote",
"syn",
]
[[package]]
name = "clap_lex"
version = "0.7.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f46ad14479a25103f283c0f10005961cf086d8dc42205bb44c46ac563475dca6"
[[package]]
name = "colorchoice"
version = "1.0.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5b63caa9aa9397e2d9480a9b13673856c78d8ac123288526c37d7839f2a86990"
[[package]] [[package]]
name = "concurrent-queue" name = "concurrent-queue"
version = "2.5.0" version = "2.5.0"
@@ -994,6 +1091,12 @@ dependencies = [
"hashbrown", "hashbrown",
] ]
[[package]]
name = "is_terminal_polyfill"
version = "1.70.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "7943c866cc5cd64cbc25b2e01621d07fa8eb2a1a23160ee81ce38704e97b8ecf"
[[package]] [[package]]
name = "itertools" name = "itertools"
version = "0.14.0" version = "0.14.0"
@@ -2195,6 +2298,12 @@ version = "1.0.4"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be"
[[package]]
name = "utf8parse"
version = "0.2.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821"
[[package]] [[package]]
name = "uuid" name = "uuid"
version = "1.12.0" version = "1.12.0"
@@ -2540,6 +2649,7 @@ dependencies = [
"axum-extra", "axum-extra",
"bitflags", "bitflags",
"chrono", "chrono",
"clap",
"csv", "csv",
"dotenvy", "dotenvy",
"itertools", "itertools",

View File

@@ -17,12 +17,13 @@ dotenvy = "0.15.7"
validator = { version = "0.19.0", features = [ "derive" ] } validator = { version = "0.19.0", features = [ "derive" ] }
argon2 = "0.5" argon2 = "0.5"
bitflags = { version = "2.8", features = [ "serde" ] } bitflags = { version = "2.8", features = [ "serde" ] }
clap = { version = "4.5.31", features = ["derive"] }
# Tertiary crates # Tertiary crates
tracing = "0.1" tracing = "0.1"
tracing-subscriber = "0.3" tracing-subscriber = "0.3"
chrono = "0.4" chrono = { version = "0.4", features = ["serde"] }
uuid = { version = "1.12", features = ["v4", "fast-rng", "serde"] } uuid = { version = "1.12", features = ["v4", "fast-rng", "serde"] }
serde_json = "1.0.137" serde_json = "1.0.137"
rand = "0.9" rand = "0.9"

View File

@@ -1,4 +1,4 @@
CREATE TABLE "members" ( CREATE TABLE IF NOT EXISTS "members" (
member_id varchar(7) NOT NULL PRIMARY KEY, member_id varchar(7) NOT NULL PRIMARY KEY,
first_name text NOT NULL, first_name text NOT NULL,
full_name text NOT NULL, full_name text NOT NULL,

View File

@@ -1,4 +1,4 @@
CREATE TABLE "users" ( CREATE TABLE IF NOT EXISTS "users" (
user_id uuid NOT NULL PRIMARY KEY, user_id uuid NOT NULL PRIMARY KEY,
email text NOT NULL UNIQUE, email text NOT NULL UNIQUE,
password text NOT NULL, password text NOT NULL,

View File

@@ -1,4 +1,4 @@
CREATE TABLE "sessions" ( CREATE TABLE IF NOT EXISTS "sessions" (
session_id uuid NOT NULL PRIMARY KEY, session_id uuid NOT NULL PRIMARY KEY,
user_id uuid NOT NULL REFERENCES users (user_id) ON UPDATE cascade ON DELETE cascade, user_id uuid NOT NULL REFERENCES users (user_id) ON UPDATE cascade ON DELETE cascade,
token text NOT NULL UNIQUE, token text NOT NULL UNIQUE,

View File

@@ -0,0 +1,2 @@
ALTER TABLE users_members
ADD UNIQUE (user_id, member_id);

View File

@@ -0,0 +1,20 @@
CREATE TYPE message_status AS ENUM ('pending', 'sent', 'canceled');
CREATE TABLE IF NOT EXISTS messages (
message_id uuid NOT NULL PRIMARY KEY,
created_at timestamptz NOT NULL,
scheduled_at timestamptz,
status message_status NOT NULL,
title text NOT NULL,
content text NOT NULL,
channel bigint NOT NULL,
thumbnail_url text
);
CREATE TABLE IF NOT EXISTS messages_users (
message_id uuid NOT NULL REFERENCES users (user_id) ON UPDATE cascade ON DELETE cascade,
user_id uuid NOT NULL REFERENCES users (user_id) ON UPDATE cascade ON DELETE cascade,
is_read boolean NOT NULL,
CONSTRAINT messages_users_pkey PRIMARY KEY (message_id, user_id)
);

View File

@@ -0,0 +1,3 @@
ALTER TABLE messages
ADD COLUMN member_groups bigint NOT NULL,
ADD COLUMN member_roles bigint NOT NULL;

View File

@@ -0,0 +1 @@
ALTER TYPE message_status ADD VALUE 'draft';

View File

@@ -11,26 +11,14 @@ use rand_chacha::ChaCha20Rng;
use sqlx::PgPool; use sqlx::PgPool;
use tokio::task; use tokio::task;
use crate::{ use crate::{database::model::Session, model::User};
database::model::{Session, UserMember},
model::{member::Roles, User},
};
mod error; mod error;
pub async fn get_user_from_header( pub async fn get_user_from_header(pool: &PgPool, headers: &HeaderMap) -> Result<User, AuthError> {
pool: &PgPool, let token = get_token_from_headers(headers)?;
headers: &HeaderMap,
) -> Result<(Roles, User), AuthError> {
let bearer_value = headers.get(header::AUTHORIZATION);
let bearer_value = bearer_value
.ok_or_else(|| AuthError::InvalidToken)?
.to_str()
.map_err(|_| AuthError::InvalidToken)?;
let token = get_token_from_bearer(bearer_value)?; let session = match Session::from_token(pool, &token).await {
let session = match Session::from_token(&pool, &token).await {
Ok(s) => s, Ok(s) => s,
Err(_) => return Err(AuthError::InvalidToken), Err(_) => return Err(AuthError::InvalidToken),
}; };
@@ -39,28 +27,28 @@ pub async fn get_user_from_header(
return Err(AuthError::InvalidToken); return Err(AuthError::InvalidToken);
} }
let db_user = match crate::database::model::User::get(&pool, session.user_id).await { let db_user = match crate::database::model::User::get(pool, session.user_id).await {
Ok(u) => u, Ok(u) => u,
Err(_) => return Err(AuthError::InvalidToken), Err(_) => return Err(AuthError::InvalidToken),
}; };
let roles = UserMember::get_roles(&pool, &db_user.user_id) Ok(db_user.into())
.await
.unwrap_or(Roles::MEMBER);
Ok((roles, db_user.into()))
} }
pub fn get_token_from_bearer(bearer: &str) -> Result<String, AuthError> { pub fn get_token_from_headers(headers: &HeaderMap) -> Result<String, AuthError> {
let bearer = headers.get(header::AUTHORIZATION);
let bearer = bearer
.ok_or(AuthError::InvalidToken)?
.to_str()
.map_err(|_| AuthError::InvalidToken)?;
match bearer.strip_prefix("Bearer ") { match bearer.strip_prefix("Bearer ") {
Some(token) => Ok(token.to_string()), Some(token) => Ok(token.to_string()),
None => return Err(AuthError::InvalidToken), None => Err(AuthError::InvalidToken),
} }
} }
pub async fn generate_password_hash( pub async fn generate_password_hash(password: String) -> Result<String, AuthError> {
password: String,
) -> Result<String, argon2::password_hash::Error> {
let password_hash: Result<String, argon2::password_hash::Error> = let password_hash: Result<String, argon2::password_hash::Error> =
task::spawn_blocking(move || { task::spawn_blocking(move || {
let salt = SaltString::generate(&mut OsRng); let salt = SaltString::generate(&mut OsRng);
@@ -76,25 +64,22 @@ pub async fn generate_password_hash(
.await .await
.unwrap(); .unwrap();
Ok(password_hash?) password_hash.map_err(|e| e.into())
} }
pub async fn verify_password_hash( pub async fn verify_password_hash(password: &str, hash: &str) -> Result<(), AuthError> {
password: &str,
hash: &str,
) -> Result<(), argon2::password_hash::Error> {
let parsed_hash = PasswordHash::new(hash)?; let parsed_hash = PasswordHash::new(hash)?;
Argon2::default().verify_password(password.as_bytes(), &parsed_hash)?; Argon2::default()
.verify_password(password.as_bytes(), &parsed_hash)
.map_err(|_| AuthError::InvalidPassword)?;
Ok(()) Ok(())
} }
pub fn generate_session_token() -> String { pub fn generate_session_token() -> String {
let session = ChaCha20Rng::from_os_rng() ChaCha20Rng::from_os_rng()
.sample_iter(&Alphanumeric) .sample_iter(&Alphanumeric)
.take(60) .take(60)
.map(char::from) .map(char::from)
.collect::<String>(); .collect::<String>()
session
} }

View File

@@ -7,18 +7,26 @@ pub enum AuthError {
Unexpected, Unexpected,
InvalidPassword, InvalidPassword,
Unauthorized, Unauthorized,
HashingFailed(String),
} }
impl Display for AuthError { impl Display for AuthError {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
match self { match self {
Self::NoPermssions => write!(f, "{}", "No permissions"), Self::NoPermssions => write!(f, "No permissions"),
Self::InvalidToken => write!(f, "{}", "Invalid token"), Self::InvalidToken => write!(f, "Invalid token"),
Self::Unexpected => write!(f, "{}", "Unexpected error"), Self::Unexpected => write!(f, "Unexpected error"),
Self::InvalidPassword => write!(f, "{}", "Password is incorrect"), Self::InvalidPassword => write!(f, "Password is incorrect"),
Self::Unauthorized => write!(f, "{}", "Authentication is required"), Self::Unauthorized => write!(f, "Authentication is required"),
Self::HashingFailed(msg) => write!(f, "Password hashing failed: {}", msg),
} }
} }
} }
impl std::error::Error for AuthError {} impl std::error::Error for AuthError {}
impl From<argon2::password_hash::Error> for AuthError {
fn from(value: argon2::password_hash::Error) -> Self {
AuthError::HashingFailed(value.to_string())
}
}

View File

@@ -1,8 +1,10 @@
pub mod member; pub mod member;
pub mod message;
pub mod session; pub mod session;
pub mod user; pub mod user;
pub use member::Member; pub use member::Member;
pub use message::Message;
pub use session::Session; pub use session::Session;
pub use user::User; pub use user::User;
pub use user::UserMember; pub use user::UserMember;

View File

@@ -32,10 +32,6 @@ impl Member {
Ok(members) Ok(members)
} }
pub async fn get_many(transaction: &PgPool, members: Vec<Self>) -> Result<(), sqlx::Error> {
Ok(())
}
pub async fn get_all(pool: &PgPool) -> Result<Vec<Self>, sqlx::Error> { pub async fn get_all(pool: &PgPool) -> Result<Vec<Self>, sqlx::Error> {
let members = sqlx::query_as!(Member, "SELECT * FROM members;",) let members = sqlx::query_as!(Member, "SELECT * FROM members;",)
.fetch_all(pool) .fetch_all(pool)
@@ -48,7 +44,7 @@ impl Member {
transaction: &mut sqlx::Transaction<'_, Postgres>, transaction: &mut sqlx::Transaction<'_, Postgres>,
members: Vec<Self>, members: Vec<Self>,
) -> Result<(), sqlx::Error> { ) -> Result<(), sqlx::Error> {
if members.len() == 0 { if members.is_empty() {
return Ok(()); return Ok(());
} }
@@ -78,7 +74,7 @@ impl Member {
transaction: &mut sqlx::Transaction<'_, Postgres>, transaction: &mut sqlx::Transaction<'_, Postgres>,
members: Vec<Self>, members: Vec<Self>,
) -> Result<(), sqlx::Error> { ) -> Result<(), sqlx::Error> {
if members.len() == 0 { if members.is_empty() {
return Ok(()); return Ok(());
} }

View File

@@ -0,0 +1,108 @@
use chrono::{DateTime, Utc};
use sqlx::{PgPool, Postgres};
use crate::model::{
member::{Groups, Roles},
message::{Channel, MessageStatus},
};
#[derive(Debug)]
pub struct Message {
pub message_id: uuid::Uuid,
pub created_at: DateTime<Utc>,
pub scheduled_at: Option<DateTime<Utc>>,
pub status: MessageStatus,
pub title: String,
pub content: String,
pub channel: Channel,
pub member_groups: Groups,
pub member_roles: Roles,
pub thumbnail_url: Option<String>,
}
impl Message {
pub async fn insert(
&self,
transaction: &mut sqlx::Transaction<'_, Postgres>,
) -> Result<(), sqlx::Error> {
sqlx::query!(
"
INSERT INTO messages (
message_id,
created_at, scheduled_at,
status,
title, content,
channel,
member_groups, member_roles,
thumbnail_url
) VALUES (
$1,
$2, $3,
$4,
$5, $6,
$7,
$8, $9,
$10
)
",
self.message_id,
self.created_at,
self.scheduled_at,
self.status as MessageStatus,
self.title,
self.content,
self.channel.bits() as i64,
self.member_groups.bits() as i64,
self.member_roles.bits() as i64,
self.thumbnail_url,
)
.execute(&mut **transaction)
.await?;
Ok(())
}
pub async fn get(
pool: &PgPool,
channel: Channel,
member_roles: Roles,
member_groups: Groups,
) -> Result<Vec<Self>, sqlx::Error> {
let messages = sqlx::query_as!(
Self,
"
SELECT message_id, created_at, scheduled_at, status as \"status:MessageStatus\", title, content, channel, member_groups, member_roles, thumbnail_url FROM messages
WHERE status = 'sent'
AND (channel & $1) > 0
AND ((member_roles & $2) > 0 AND (member_groups & $3) > 0);
",
channel.bits() as i64,
member_roles.bits() as i64,
member_groups.bits() as i64,
)
.fetch_all(pool)
.await?;
Ok(messages)
}
pub async fn update_status(
transaction: &mut sqlx::Transaction<'_, Postgres>,
message_id: &uuid::Uuid,
status: MessageStatus,
) -> Result<(), sqlx::Error> {
sqlx::query!(
"
UPDATE ONLY messages
SET status = $1
WHERE message_id = $2
",
status as MessageStatus,
message_id,
)
.execute(&mut **transaction)
.await?;
Ok(())
}
}

View File

@@ -36,11 +36,61 @@ impl Session {
Ok(()) Ok(())
} }
pub async fn from_token(transaction: &PgPool, token: &str) -> Result<Self, sqlx::Error> { pub async fn from_token(pool: &PgPool, token: &str) -> Result<Self, sqlx::Error> {
let session = sqlx::query_as!(Self, "SELECT * FROM sessions WHERE token = $1;", token) let session = sqlx::query_as!(Self, "SELECT * FROM sessions WHERE token = $1;", token)
.fetch_one(transaction) .fetch_one(pool)
.await?; .await?;
Ok(session) Ok(session)
} }
pub async fn remove_many(
session_ids: &[uuid::Uuid],
transaction: &mut sqlx::Transaction<'_, Postgres>,
) -> Result<(), sqlx::Error> {
let deleted_count = sqlx::query_scalar!(
"
WITH deleted AS (
DELETE FROM sessions
WHERE session_id = ANY($1)
RETURNING 1
)
SELECT COUNT(*) FROM deleted
",
session_ids
)
.fetch_one(&mut **transaction)
.await?;
if !deleted_count.is_some_and(|c| c >= 1) {
return Err(sqlx::Error::RowNotFound);
}
Ok(())
}
pub async fn remove_many_from_token(
transaction: &mut sqlx::Transaction<'_, Postgres>,
session_tokens: &[String],
) -> Result<(), sqlx::Error> {
let deleted_count = sqlx::query_scalar!(
"
WITH deleted AS (
DELETE FROM sessions
WHERE token = ANY($1)
RETURNING 1
)
SELECT COUNT(*) FROM deleted
",
session_tokens
)
.fetch_one(&mut **transaction)
.await?;
if !deleted_count.is_some_and(|c| c >= 1) {
return Err(sqlx::Error::RowNotFound);
}
Ok(())
}
} }

View File

@@ -1,16 +1,25 @@
use sqlx::{PgPool, Postgres}; use sqlx::{PgPool, Postgres};
use crate::model::member::Roles; use crate::model::member::{Groups, Roles};
use super::Member as DbMember;
#[derive(validator::Validate)] #[derive(validator::Validate)]
pub struct User { pub struct User {
pub user_id: uuid::Uuid, pub user_id: uuid::Uuid,
#[validate(email)] #[validate(email)]
pub email: String, pub email: String,
pub password: String, pub password: Option<String>,
pub admin: bool, pub admin: bool,
} }
#[derive(Debug)]
pub struct UpdateUser {
pub email: Option<String>,
pub password: Option<String>,
pub admin: Option<bool>,
}
impl User { impl User {
pub async fn insert( pub async fn insert(
transaction: &mut sqlx::Transaction<'_, Postgres>, transaction: &mut sqlx::Transaction<'_, Postgres>,
@@ -54,6 +63,41 @@ impl User {
Ok(user) Ok(user)
} }
pub async fn get_password(&self, pool: &PgPool) -> Result<String, sqlx::Error> {
let password = sqlx::query_scalar!(
"
SELECT password FROM users WHERE user_id = $1
",
self.user_id,
)
.fetch_one(pool)
.await?;
Ok(password)
}
pub async fn update(
&self,
transaction: &mut sqlx::Transaction<'_, Postgres>,
update_user: UpdateUser,
) -> Result<(), sqlx::Error> {
sqlx::query!(
"
UPDATE users
SET email = coalesce($1, email),
password = coalesce($2, password)
WHERE user_id = $3;
",
update_user.email,
update_user.password,
self.user_id
)
.execute(&mut **transaction)
.await?;
Ok(())
}
} }
#[derive(Debug)] #[derive(Debug)]
@@ -65,8 +109,8 @@ pub struct UserMember {
impl UserMember { impl UserMember {
pub async fn insert_many( pub async fn insert_many(
transaction: &mut sqlx::Transaction<'_, Postgres>, transaction: &mut sqlx::Transaction<'_, Postgres>,
user_ids: &Vec<uuid::Uuid>, user_ids: &[uuid::Uuid],
member_ids: &Vec<String>, member_ids: &[String],
) -> Result<(), sqlx::Error> { ) -> Result<(), sqlx::Error> {
sqlx::query!( sqlx::query!(
" "
@@ -99,4 +143,75 @@ impl UserMember {
Ok(roles) Ok(roles)
} }
pub async fn get_roles_groups(
pool: &PgPool,
user_id: &uuid::Uuid,
) -> Result<(Roles, Groups), sqlx::Error> {
struct RolesGroups {
roles: i64,
groups: i64,
}
let result = sqlx::query_as!(
RolesGroups,
"
SELECT roles, groups
FROM users_members
INNER JOIN members ON users_members.member_id = members.member_id
AND users_members.user_id = $1;
",
user_id,
)
.fetch_all(pool)
.await?;
let (roles, groups) = result.into_iter().fold(
(Roles::empty(), Groups::empty()),
|(acc_roles, acc_groups), r| (acc_roles | r.roles.into(), acc_groups | r.groups.into()),
);
Ok((roles, groups))
}
pub async fn get_members_from_user(
pool: &PgPool,
user_id: &uuid::Uuid,
) -> Result<Vec<DbMember>, sqlx::Error> {
let members = sqlx::query_as!(DbMember,
"
SELECT members.* FROM users_members INNER JOIN members ON users_members.member_id = members.member_id AND users_members.user_id = $1;
",
user_id
).fetch_all(pool).await?;
Ok(members)
}
pub async fn remove_many(
transaction: &mut sqlx::Transaction<'_, Postgres>,
user_ids: &[uuid::Uuid],
member_ids: &[String],
) -> Result<(), sqlx::Error> {
let deleted_count = sqlx::query_scalar!(
"
WITH deleted AS (
DELETE FROM users_members
WHERE user_id = ANY($1) AND member_id = ANY($2)
RETURNING 1
)
SELECT COUNT(*) FROM deleted
",
&user_ids[..],
&member_ids[..]
)
.fetch_one(&mut **transaction)
.await?;
if !deleted_count.is_some_and(|c| c >= 1) {
return Err(sqlx::Error::RowNotFound);
}
Ok(())
}
} }

View File

@@ -1,13 +1,7 @@
use std::sync::Arc;
use axum::Router;
use tokio::{net::TcpListener, sync::Mutex};
use tracing::Level; use tracing::Level;
use tracing_subscriber::FmtSubscriber; use tracing_subscriber::FmtSubscriber;
use wrbapp_server::routes::member::migrate::MigrationStore; use wrbapp_server::database;
use wrbapp_server::routes::routes;
use wrbapp_server::{database, AppState};
#[tokio::main] #[tokio::main]
async fn main() { async fn main() {
@@ -30,23 +24,5 @@ async fn main() {
.await .await
.expect("Database connection failed"); .expect("Database connection failed");
let migration_store = Arc::new(Mutex::new(MigrationStore::default())); wrbapp_server::util::cli::parse(pool).await;
let app_state = AppState {
pool,
migration_store,
};
// Serve app
let app = Router::new().nest("/v1", routes()).with_state(app_state);
let listener = TcpListener::bind("127.0.0.1:3000")
.await
.expect("Error while initializing listener");
tracing::info!("Listening on {}", listener.local_addr().unwrap());
axum::serve(listener, app)
.await
.expect("Error while serving axum application");
} }

View File

@@ -1,6 +1,8 @@
pub mod member; pub mod member;
pub mod message;
pub mod session; pub mod session;
pub mod user; pub mod user;
pub use member::Member; pub use member::Member;
pub use message::Message;
pub use user::User; pub use user::User;

View File

@@ -1,13 +1,13 @@
use bitflags::bitflags; use bitflags::bitflags;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
#[derive(Debug, Clone, Serialize)] #[derive(Debug, Clone, Serialize, Deserialize)]
pub struct Name { pub struct Name {
pub first: String, pub first: String,
pub full: String, pub full: String,
} }
#[derive(Debug, Clone, Serialize)] #[derive(Debug, Clone, Serialize, Deserialize)]
pub struct Member { pub struct Member {
pub id: String, pub id: String,
pub name: Name, pub name: Name,
@@ -25,6 +25,7 @@ bitflags! {
const ZWEMZAKEN = 1 << 2; const ZWEMZAKEN = 1 << 2;
const WEDSTRIJDEN = 1 << 3; const WEDSTRIJDEN = 1 << 3;
const ADMIN = 1 << 4; const ADMIN = 1 << 4;
const MESSAGES = 1 << 5;
} }
#[derive(Clone, Copy, Debug, Serialize, Deserialize)] #[derive(Clone, Copy, Debug, Serialize, Deserialize)]
@@ -83,9 +84,47 @@ impl From<i64> for Groups {
} }
} }
impl From<Option<Groups>> for Groups {
fn from(value: Option<Groups>) -> Self {
match value {
Some(groups) => groups,
None => Self::empty(),
}
}
}
impl Groups {
pub fn to_option(self) -> Option<Self> {
if self.is_empty() {
None
} else {
Some(self)
}
}
}
impl From<i64> for Roles { impl From<i64> for Roles {
fn from(value: i64) -> Self { fn from(value: i64) -> Self {
Self::from_bits(value as u64).unwrap_or(Roles::MEMBER) Self::from_bits(value as u64).unwrap_or(Roles::empty())
}
}
impl From<Option<Roles>> for Roles {
fn from(value: Option<Roles>) -> Self {
match value {
Some(roles) => roles,
None => Self::empty(),
}
}
}
impl Roles {
pub fn to_option(self) -> Option<Self> {
if self.is_empty() {
None
} else {
Some(self)
}
} }
} }

136
server/src/model/message.rs Normal file
View File

@@ -0,0 +1,136 @@
use bitflags::bitflags;
use chrono::{DateTime, Utc};
use serde::Serialize;
#[derive(Debug, Serialize)]
pub struct Message {
pub message_id: uuid::Uuid,
pub created_at: DateTime<Utc>,
pub scheduled_at: Option<DateTime<Utc>>,
pub status: MessageStatus,
pub title: String,
pub content: String,
pub channel: Channel,
pub member_groups: Groups,
pub member_roles: Roles,
pub thumbnail_url: Option<String>,
}
#[derive(Debug, Clone, Copy, sqlx::Type, Serialize)]
#[sqlx(type_name = "message_status", rename_all = "lowercase")]
pub enum MessageStatus {
Pending,
Sent,
Canceled,
Draft,
}
bitflags! {
#[derive(Clone, Copy, Debug, Serialize)]
pub struct Channel: u16 {
const ALGEMEEN = 1 << 0;
const BELANGRIJK = 1 << 1;
const WEDSTRIJDEN = 1 << 2;
}
}
impl From<i64> for Channel {
fn from(value: i64) -> Self {
Self::from_bits(value as u16).unwrap_or(Channel::empty())
}
}
pub struct MessageCreate {
pub scheduled_at: Option<DateTime<Utc>>,
pub title: String,
pub content: String,
pub channel: String,
pub member_groups: String,
pub member_roles: String,
pub thumbnail_url: Option<String>,
}
impl Message {
pub fn new(message_create: MessageCreate) -> Result<Self, crate::Error> {
let message_id = uuid::Uuid::new_v4();
let created_at = Utc::now();
let channel: Channel =
bitflags::parser::from_str_strict(&message_create.channel).map_err(|_| {
crate::Error::BadRequest {
expected: String::from("Error while parsing channel"),
}
})?;
let member_groups = if message_create.member_groups.is_empty() {
Ok(Groups::all())
} else {
bitflags::parser::from_str_strict(&message_create.member_groups).map_err(|_| {
crate::Error::BadRequest {
expected: "Error while parsing groups".to_string(),
}
})
}?;
let member_roles = if message_create.member_roles.is_empty() {
Ok(Roles::all())
} else {
bitflags::parser::from_str_strict(&message_create.member_roles).map_err(|_| {
crate::Error::BadRequest {
expected: "Error while parsing groups".to_string(),
}
})
}?;
Ok(Self {
message_id,
created_at,
scheduled_at: message_create.scheduled_at,
title: message_create.title,
content: message_create.content,
channel,
thumbnail_url: message_create.thumbnail_url,
member_groups,
member_roles,
status: MessageStatus::Draft,
})
}
}
use crate::database::model::Message as DbMessage;
use super::member::{Groups, Roles};
impl From<DbMessage> for Message {
fn from(value: DbMessage) -> Self {
Self {
message_id: value.message_id,
created_at: value.created_at,
scheduled_at: value.scheduled_at,
status: value.status,
title: value.title,
content: value.content,
channel: value.channel,
member_groups: value.member_groups,
member_roles: value.member_roles,
thumbnail_url: value.thumbnail_url,
}
}
}
impl From<Message> for DbMessage {
fn from(value: Message) -> Self {
Self {
message_id: value.message_id,
created_at: value.created_at,
scheduled_at: value.scheduled_at,
status: value.status,
title: value.title,
content: value.content,
channel: value.channel,
member_groups: value.member_groups,
member_roles: value.member_roles,
thumbnail_url: value.thumbnail_url,
}
}
}

View File

@@ -19,13 +19,13 @@ impl Session {
let created_at = Utc::now(); let created_at = Utc::now();
let expires_at = Utc::now() + Duration::days(7); let expires_at = Utc::now() + Duration::days(7);
return Self { Self {
session_id, session_id,
user_id, user_id,
token, token,
expires_at, expires_at,
created_at, created_at,
}; }
} }
} }

View File

@@ -1,4 +1,5 @@
use serde::Serialize; use serde::Serialize;
use sqlx::PgPool;
#[derive(Serialize)] #[derive(Serialize)]
pub struct User { pub struct User {
@@ -7,7 +8,14 @@ pub struct User {
pub admin: bool, pub admin: bool,
} }
use crate::auth::AuthError;
use crate::database::model::User as DbUser; use crate::database::model::User as DbUser;
use crate::database::model::UserMember as DbUserMember;
use crate::util::convert_vec;
use super::member::Groups;
use super::member::Roles;
use super::Member;
impl From<DbUser> for User { impl From<DbUser> for User {
fn from(db_user: DbUser) -> Self { fn from(db_user: DbUser) -> Self {
Self { Self {
@@ -17,3 +25,56 @@ impl From<DbUser> for User {
} }
} }
} }
impl From<User> for DbUser {
fn from(user: User) -> Self {
Self {
user_id: user.id,
email: user.email,
admin: user.admin,
password: None,
}
}
}
impl User {
pub async fn members(&self, pool: &PgPool) -> Result<Vec<Member>, sqlx::Error> {
let related_members = DbUserMember::get_members_from_user(pool, &self.id).await?;
Ok(convert_vec(related_members))
}
pub async fn authorize(
&self,
pool: &PgPool,
required_roles: Option<Roles>,
requested_user_id: Option<String>,
) -> Result<(), AuthError> {
if let Some(user_id) = requested_user_id {
let user_uuid = uuid::Uuid::parse_str(&user_id).map_err(|_| AuthError::NoPermssions)?;
if self.id != user_uuid {
return Err(AuthError::NoPermssions);
}
return Ok(());
}
if let Some(roles) = required_roles {
let user_roles = DbUserMember::get_roles(pool, &self.id)
.await
.unwrap_or(Roles::MEMBER);
if !user_roles.intersects(roles) {
return Err(AuthError::NoPermssions);
}
return Ok(());
}
Ok(())
}
pub async fn get_roles_groups(&self, pool: &PgPool) -> Result<(Roles, Groups), sqlx::Error> {
DbUserMember::get_roles_groups(pool, &self.id).await
}
}

View File

@@ -3,21 +3,23 @@ use axum::{extract::State, http::HeaderMap, routing::get, Json, Router};
pub mod auth; pub mod auth;
pub mod member; pub mod member;
pub mod message;
pub mod user; pub mod user;
pub fn routes() -> Router<AppState> { pub fn routes() -> Router<AppState> {
Router::new() Router::new()
.route("/", get(root)) .route("/", get(root))
// .route("/member/:id", get())
.merge(member::routes()) .merge(member::routes())
.merge(auth::routes()) .merge(auth::routes())
.merge(user::routes())
.merge(message::routes())
} }
async fn root( async fn root(
State(state): State<AppState>, State(state): State<AppState>,
headers: HeaderMap, headers: HeaderMap,
) -> Result<Json<User>, crate::Error> { ) -> Result<Json<User>, crate::Error> {
let (_roles, user) = get_user_from_header(&state.pool, &headers).await?; let user = get_user_from_header(&state.pool, &headers).await?;
Ok(Json(user)) Ok(Json(user))
} }

View File

@@ -1,6 +1,14 @@
use axum::{extract::State, routing::post, Json, Router}; use axum::http::HeaderMap;
use axum::{
extract::State,
routing::{get, post},
Json, Router,
};
use serde::Deserialize;
use crate::auth::verify_password_hash; use crate::auth::{get_token_from_headers, verify_password_hash};
use crate::auth::{get_user_from_header, AuthError};
use crate::database::model::user::UpdateUser;
use crate::database::model::Member as DbMember; use crate::database::model::Member as DbMember;
use crate::database::model::Session as DbSession; use crate::database::model::Session as DbSession;
use crate::database::model::User as DbUser; use crate::database::model::User as DbUser;
@@ -12,24 +20,28 @@ pub fn routes() -> Router<AppState> {
Router::new() Router::new()
.route("/auth/login", post(login)) .route("/auth/login", post(login))
.route("/auth/register", post(register)) .route("/auth/register", post(register))
.route("/auth/logout", get(logout))
.route("/auth/change_password", post(change_password))
.route("/auth/change_email", post(change_email))
} }
#[derive(serde::Deserialize)] #[derive(Deserialize)]
pub struct LoginRequest { pub struct LoginRequest {
email: String, email: String,
password: String, password: String,
} }
pub async fn login<'a>( pub async fn login(
State(state): State<AppState>, State(state): State<AppState>,
Json(login_request): Json<LoginRequest>, Json(login_request): Json<LoginRequest>,
) -> Result<String, crate::Error> { ) -> Result<String, crate::Error> {
let db_user = DbUser::get_from_email(&state.pool, login_request.email).await?; let db_user = DbUser::get_from_email(&state.pool, login_request.email).await?;
match verify_password_hash(&login_request.password, &db_user.password).await { if let Some(pass) = db_user.password {
Ok(_) => (), verify_password_hash(&login_request.password, &pass).await?;
Err(_err) => return Err(crate::Error::Auth(crate::auth::AuthError::InvalidPassword)), } else {
}; return Err(AuthError::Unexpected.into());
}
// Create session // Create session
let mut transaction = state.pool.begin().await?; let mut transaction = state.pool.begin().await?;
@@ -42,14 +54,14 @@ pub async fn login<'a>(
Ok(db_session.token) Ok(db_session.token)
} }
#[derive(serde::Deserialize)] #[derive(Deserialize)]
pub struct RegisterRequest { pub struct RegisterRequest {
email: String, email: String,
password: String, password: String,
registration_tokens: Vec<String>, registration_tokens: Vec<String>,
} }
pub async fn register<'a>( pub async fn register(
State(state): State<AppState>, State(state): State<AppState>,
Json(auth_request): Json<RegisterRequest>, Json(auth_request): Json<RegisterRequest>,
) -> Result<String, crate::Error> { ) -> Result<String, crate::Error> {
@@ -61,10 +73,7 @@ pub async fn register<'a>(
let member_ids: Vec<String> = members.into_iter().map(|m| m.member_id).collect(); let member_ids: Vec<String> = members.into_iter().map(|m| m.member_id).collect();
// Hash password // Hash password
let password_hash = match generate_password_hash(auth_request.password).await { let password_hash = generate_password_hash(auth_request.password).await?;
Ok(hash) => hash,
Err(_err) => return Err(crate::Error::Auth(crate::auth::AuthError::InvalidToken)),
};
let mut transaction = state.pool.begin().await?; let mut transaction = state.pool.begin().await?;
@@ -83,3 +92,90 @@ pub async fn register<'a>(
Ok(db_session.token) Ok(db_session.token)
} }
pub async fn logout(State(state): State<AppState>, headers: HeaderMap) -> Result<(), crate::Error> {
let registration_token = get_token_from_headers(&headers)?;
let mut transaction = state.pool.begin().await?;
DbSession::remove_many_from_token(&mut transaction, &[registration_token]).await?;
transaction.commit().await?;
Ok(())
}
#[derive(Debug, Deserialize)]
pub struct ChangePasswordRequest {
pub old_password: String,
pub new_password: String,
}
pub async fn change_password(
State(state): State<AppState>,
headers: HeaderMap,
Json(request): Json<ChangePasswordRequest>,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
// Verify that password is correct
let db_user: DbUser = user.into();
let old_password_hash = db_user.get_password(&state.pool).await?;
verify_password_hash(&request.old_password, &old_password_hash).await?;
// Generate password hash for new password
let new_password_hash = generate_password_hash(request.new_password).await?;
let mut transaction = state.pool.begin().await?;
db_user
.update(
&mut transaction,
UpdateUser {
email: None,
password: Some(new_password_hash),
admin: None,
},
)
.await?;
transaction.commit().await?;
Ok(())
}
#[derive(Debug, Deserialize)]
pub struct ChangeEmailRequest {
pub password: String,
pub new_email: String,
}
pub async fn change_email(
State(state): State<AppState>,
headers: HeaderMap,
Json(request): Json<ChangeEmailRequest>,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
// Verify that password is correct
let db_user: DbUser = user.into();
let password_hash = db_user.get_password(&state.pool).await?;
verify_password_hash(&request.password, &password_hash).await?;
let mut transaction = state.pool.begin().await?;
db_user
.update(
&mut transaction,
UpdateUser {
email: Some(request.new_email),
password: None,
admin: None,
},
)
.await?;
transaction.commit().await?;
Ok(())
}

View File

@@ -1,6 +1,11 @@
use axum::{extract::State, routing::post, Router}; use axum::{
extract::State,
http::HeaderMap,
routing::{get, post},
Json, Router,
};
use crate::AppState; use crate::{auth::get_user_from_header, model::Member, AppState};
pub mod migrate; pub mod migrate;
@@ -8,11 +13,16 @@ pub fn routes() -> Router<AppState> {
Router::new() Router::new()
.route("/members/migrate_request", post(migrate::migrate_request)) .route("/members/migrate_request", post(migrate::migrate_request))
.route("/members/migrate_confirm", post(migrate::migrate_confirm)) .route("/members/migrate_confirm", post(migrate::migrate_confirm))
.route("/member", get(get_current_members))
} }
pub async fn get_members<'a>( pub async fn get_current_members(
State(state): State<AppState>, State(state): State<AppState>,
body: String, headers: HeaderMap,
) -> Result<(), crate::Error> { ) -> Result<Json<Vec<Member>>, crate::Error> {
Ok(()) let user = get_user_from_header(&state.pool, &headers).await?;
let members = user.members(&state.pool).await?;
Ok(Json(members))
} }

View File

@@ -1,15 +1,10 @@
use std::collections::HashMap; use std::collections::HashMap;
use axum::{ use axum::{extract::State, http::HeaderMap, Json};
extract::{FromRef, State},
http::HeaderMap,
Json,
};
use itertools::Itertools;
use sqlx::PgPool; use sqlx::PgPool;
use crate::{ use crate::{
auth::{get_user_from_header, AuthError}, auth::get_user_from_header,
database::model::Member as DbMember, database::model::Member as DbMember,
model::{ model::{
member::{Groups, Name, Roles}, member::{Groups, Name, Roles},
@@ -19,16 +14,15 @@ use crate::{
AppState, AppState,
}; };
pub async fn migrate_request<'a>( pub async fn migrate_request(
State(state): State<AppState>, State(state): State<AppState>,
headers: HeaderMap, headers: HeaderMap,
body: String, body: String,
) -> Result<Json<MigrationResponse>, crate::Error> { ) -> Result<Json<MigrationResponse>, crate::Error> {
let (roles, _user) = get_user_from_header(&state.pool, &headers).await?; let user = get_user_from_header(&state.pool, &headers).await?;
if !roles.contains(Roles::ADMIN) { user.authorize(&state.pool, Some(Roles::ADMIN), None)
return Err(AuthError::NoPermssions.into()); .await?;
}
tracing::info!("Migration is requested"); tracing::info!("Migration is requested");
@@ -51,10 +45,15 @@ pub async fn migrate_request<'a>(
Ok(Json(MigrationResponse::from((count, members_diff)))) Ok(Json(MigrationResponse::from((count, members_diff))))
} }
pub async fn migrate_confirm<'a>( pub async fn migrate_confirm(
State(state): State<AppState>, State(state): State<AppState>,
headers: HeaderMap,
body: String, body: String,
) -> Result<(), crate::Error> { ) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN), None)
.await?;
tracing::info!("Migration is confirmed"); tracing::info!("Migration is confirmed");
let count = match body.trim().parse::<u32>() { let count = match body.trim().parse::<u32>() {
@@ -137,20 +136,12 @@ pub struct MigrationResponse {
remove: Vec<(String, Name)>, remove: Vec<(String, Name)>,
} }
#[derive(Default)]
pub struct MigrationStore { pub struct MigrationStore {
pub store: HashMap<u32, MembersDiff>, pub store: HashMap<u32, MembersDiff>,
pub count: u32, pub count: u32,
} }
impl Default for MigrationStore {
fn default() -> Self {
Self {
count: 0,
store: HashMap::new(),
}
}
}
impl Row { impl Row {
fn from_csv_many(input: &str) -> Result<Vec<Self>, csv::Error> { fn from_csv_many(input: &str) -> Result<Vec<Self>, csv::Error> {
let mut rdr = csv::ReaderBuilder::new() let mut rdr = csv::ReaderBuilder::new()
@@ -181,25 +172,25 @@ impl Row {
} }
} }
impl Into<Name> for Row { impl From<Row> for Name {
fn into(self) -> Name { fn from(val: Row) -> Self {
Name { Name {
first: self.first_name, first: val.first_name,
full: "Temporarely full name".to_string(), full: "Temporarely full name".to_string(),
} }
} }
} }
impl Into<Member> for Row { impl From<Row> for Member {
fn into(self) -> Member { fn from(val: Row) -> Self {
let name: Name = self.clone().into(); let name: Name = val.clone().into();
Member { Member {
id: self.id.clone(), id: val.id.clone(),
name, name,
registration_token: None, registration_token: None,
diploma: self.diploma.clone(), diploma: val.diploma.clone(),
groups: self.groups_parsed(), groups: val.groups_parsed(),
roles: Roles::MEMBER, roles: Roles::MEMBER,
} }
} }

View File

@@ -0,0 +1,87 @@
use axum::{
extract::{Path, State},
http::HeaderMap,
routing::post,
Json, Router,
};
use serde::Deserialize;
use crate::{
auth::get_user_from_header,
database::model::Message as DbMessage,
model::{
member::Roles,
message::{MessageCreate, MessageStatus},
Message,
},
AppState,
};
pub fn routes() -> Router<AppState> {
Router::new()
.route("/messages", post(message_create))
.route("/messages/{message_id}/send", post(message_send))
}
#[derive(Debug, Deserialize)]
pub struct MessageCreateRequest {
title: String,
content: String,
channel: String,
member_groups: String,
member_roles: String,
}
pub async fn message_create(
State(state): State<AppState>,
headers: HeaderMap,
Json(request): Json<MessageCreateRequest>,
) -> Result<String, crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN | Roles::MESSAGES), None)
.await?;
let db_message: DbMessage = Message::new(MessageCreate {
title: request.title,
content: request.content,
channel: request.channel,
member_groups: request.member_groups,
member_roles: request.member_roles,
scheduled_at: None,
thumbnail_url: None,
})?
.into();
let mut transaction = state.pool.begin().await?;
db_message.insert(&mut transaction).await?;
transaction.commit().await?;
Ok(db_message.message_id.to_string())
}
pub async fn message_send(
State(state): State<AppState>,
headers: HeaderMap,
Path(message_id): Path<String>,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN | Roles::MESSAGES), None)
.await?;
let message_id: uuid::Uuid =
uuid::Uuid::parse_str(&message_id).map_err(|_| crate::Error::BadRequest {
expected: "Could not convert message id to uuid".to_string(),
})?;
let mut transaction = state.pool.begin().await?;
DbMessage::update_status(&mut transaction, &message_id, MessageStatus::Sent).await?;
transaction.commit().await?;
Ok(())
}

View File

@@ -1 +1,91 @@
use axum::{
extract::{Path, State},
http::HeaderMap,
routing::{delete, get, post},
Json, Router,
};
use crate::{
auth::get_user_from_header,
database::model::{Member as DbMember, Message as DbMessage, UserMember as DbUserMember},
model::{member::Roles, message::Channel, Member, Message, User},
util::convert_vec,
AppState,
};
pub fn routes() -> Router<AppState> {
Router::new()
.route("/user", get(get_current_user))
.route("/user/{user_id}/members", post(members_insert))
.route("/user/{user_id}/members", delete(members_remove))
.route("/user/{user_id}/messages", get(get_messages))
}
pub async fn get_current_user(
State(state): State<AppState>,
headers: HeaderMap,
) -> Result<Json<User>, crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
Ok(Json(user))
}
pub async fn members_insert(
State(state): State<AppState>,
Path(user_id): Path<String>,
headers: HeaderMap,
Json(registration_tokens): Json<Vec<String>>,
) -> Result<Json<Vec<Member>>, crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN), Some(user_id))
.await?;
let members =
DbMember::get_many_from_registration_tokens(&state.pool, registration_tokens).await?;
let member_ids: Vec<String> = members.iter().map(|m| m.member_id.to_owned()).collect();
let mut transaction = state.pool.begin().await?;
// Link the user to the members
let user_ids: Vec<uuid::Uuid> = vec![user.id; member_ids.len()];
DbUserMember::insert_many(&mut transaction, &user_ids, &member_ids).await?;
transaction.commit().await?;
Ok(Json(convert_vec(members)))
}
pub async fn members_remove(
State(state): State<AppState>,
Path(user_id): Path<String>,
headers: HeaderMap,
Json(member_ids): Json<Vec<String>>,
) -> Result<(), crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, Some(Roles::ADMIN), Some(user_id))
.await?;
let mut transaction = state.pool.begin().await?;
// Link the user to the members
DbUserMember::remove_many(&mut transaction, &[user.id], &member_ids).await?;
transaction.commit().await?;
Ok(())
}
pub async fn get_messages(
State(state): State<AppState>,
Path(user_id): Path<String>,
headers: HeaderMap,
) -> Result<Json<Vec<Message>>, crate::Error> {
let user = get_user_from_header(&state.pool, &headers).await?;
user.authorize(&state.pool, None, Some(user_id)).await?;
let (roles, groups) = user.get_roles_groups(&state.pool).await?;
let messages = DbMessage::get(&state.pool, Channel::ALGEMEEN, roles, groups).await?;
Ok(Json(convert_vec(messages)))
}

View File

@@ -1,5 +1,7 @@
mod bitflags; mod bitflags;
pub mod cli;
pub mod error; pub mod error;
mod helpers; mod helpers;
pub mod serve;
pub use helpers::convert_vec; pub use helpers::convert_vec;

73
server/src/util/cli.rs Normal file
View File

@@ -0,0 +1,73 @@
use clap::{Parser, Subcommand};
use sqlx::{Acquire, PgPool};
use crate::model::member::{Groups, Roles};
#[derive(Parser)]
#[command(version, about, long_about = None)]
struct Cli {
#[command(subcommand)]
command: Option<Commands>,
}
#[derive(Subcommand)]
enum Commands {
Serve,
CreateAdminMember,
SetMemberAdmin { relatiecode: String },
}
pub async fn parse(pool: PgPool) {
let cli = Cli::parse();
match &cli.command {
Some(Commands::Serve) => {
crate::util::serve::serve(pool).await;
}
Some(Commands::CreateAdminMember) => {
create_admin_member(&pool).await.unwrap();
}
Some(Commands::SetMemberAdmin {
relatiecode: member_id,
}) => {
set_member_admin(&pool, member_id).await.unwrap();
}
None => {}
}
}
pub async fn create_admin_member(pool: &PgPool) -> Result<(), sqlx::Error> {
use crate::database::model::Member as DbMember;
let member = DbMember {
member_id: "D000000".to_string(),
first_name: "Admin".to_string(),
full_name: "Admin Admin".to_string(),
registration_token: None,
diploma: None,
groups: Groups::empty(),
roles: Roles::ADMIN,
};
let mut transaction = pool.begin().await?;
DbMember::insert_many(&mut transaction, vec![member]).await?;
transaction.commit().await?;
Ok(())
}
pub async fn set_member_admin(pool: &PgPool, id: &str) -> Result<(), sqlx::Error> {
sqlx::query!(
"
UPDATE ONLY members SET roles = $1 WHERE member_id = $2
",
Roles::ADMIN.bits() as i64,
id
)
.execute(pool)
.await?;
Ok(())
}

View File

@@ -1,4 +1,3 @@
use crate::auth::AuthError;
use axum::{ use axum::{
http::StatusCode, http::StatusCode,
response::{IntoResponse, Response}, response::{IntoResponse, Response},
@@ -40,6 +39,12 @@ impl IntoResponse for Error {
let (status_code, code) = match self { let (status_code, code) = match self {
Self::Sqlx(ref err_kind) => match err_kind { Self::Sqlx(ref err_kind) => match err_kind {
sqlx::Error::RowNotFound => (StatusCode::NOT_FOUND, "DATABASE_ROW_NOT_FOUND"), sqlx::Error::RowNotFound => (StatusCode::NOT_FOUND, "DATABASE_ROW_NOT_FOUND"),
sqlx::Error::Database(db_err) => match db_err.kind() {
sqlx::error::ErrorKind::UniqueViolation => {
(StatusCode::INTERNAL_SERVER_ERROR, "DATABASE_DUPLICATE")
}
_ => (StatusCode::INTERNAL_SERVER_ERROR, "DATABASE_ERROR"),
},
_ => (StatusCode::INTERNAL_SERVER_ERROR, "DATABASE_ERROR"), _ => (StatusCode::INTERNAL_SERVER_ERROR, "DATABASE_ERROR"),
}, },

31
server/src/util/serve.rs Normal file
View File

@@ -0,0 +1,31 @@
use std::sync::Arc;
use axum::Router;
use sqlx::PgPool;
use tokio::{net::TcpListener, sync::Mutex};
use crate::routes::member::migrate::MigrationStore;
use crate::routes::routes;
use crate::AppState;
pub async fn serve(pool: PgPool) {
let migration_store = Arc::new(Mutex::new(MigrationStore::default()));
let app_state = AppState {
pool,
migration_store,
};
// Serve app
let app = Router::new().nest("/v1", routes()).with_state(app_state);
let listener = TcpListener::bind("127.0.0.1:3000")
.await
.expect("Error while initializing listener");
tracing::info!("Listening on {}", listener.local_addr().unwrap());
axum::serve(listener, app)
.await
.expect("Error while serving axum application");
}