mirror of
https://github.com/moghtech/komodo.git
synced 2026-03-11 17:44:19 -05:00
* add "all permissions" feature on user and user group schema * prepare support for group all * implement user.all and user_group.all for broad base permissioning * clean up unused deps * sync support user group permissions regex * 1.11 * fix fe ? issue * this doesn't work * sync handle user group all set * retain above non earlier * remove permissions that already exist * update docs * add user group docs * minimize user group permissions for execute * sync toml * add sync name to slack alert title * add syncs to alerter white/blacklist * use \\ instead of $reg * share resource type base permissions api users and user groups * manage user / group base permissions ui * manage user / group base resource type permissions * update api permission handling * manage all resource permissions in table * user show group membership * update client to 1.11
136 lines
3.7 KiB
Rust
136 lines
3.7 KiB
Rust
use anyhow::{anyhow, Context};
|
|
use async_timing_util::unix_timestamp_ms;
|
|
use axum::{
|
|
extract::Query, response::Redirect, routing::get, Router,
|
|
};
|
|
use mongo_indexed::Document;
|
|
use monitor_client::entities::user::{User, UserConfig};
|
|
use mungos::mongodb::bson::doc;
|
|
use reqwest::StatusCode;
|
|
use serde::Deserialize;
|
|
use serror::AddStatusCode;
|
|
|
|
use crate::{
|
|
config::core_config,
|
|
state::{db_client, jwt_client},
|
|
};
|
|
|
|
use self::client::google_oauth_client;
|
|
|
|
use super::{RedirectQuery, STATE_PREFIX_LENGTH};
|
|
|
|
pub mod client;
|
|
|
|
pub fn router() -> Router {
|
|
Router::new()
|
|
.route(
|
|
"/login",
|
|
get(|Query(query): Query<RedirectQuery>| async move {
|
|
Redirect::to(
|
|
&google_oauth_client()
|
|
.as_ref()
|
|
// OK: its not mounted unless the client is populated
|
|
.unwrap()
|
|
.get_login_redirect_url(query.redirect)
|
|
.await,
|
|
)
|
|
}),
|
|
)
|
|
.route(
|
|
"/callback",
|
|
get(|query| async {
|
|
callback(query).await.status_code(StatusCode::UNAUTHORIZED)
|
|
}),
|
|
)
|
|
}
|
|
|
|
#[derive(Debug, Deserialize)]
|
|
struct CallbackQuery {
|
|
state: Option<String>,
|
|
code: Option<String>,
|
|
error: Option<String>,
|
|
}
|
|
|
|
#[instrument(name = "GoogleCallback", level = "debug")]
|
|
async fn callback(
|
|
Query(query): Query<CallbackQuery>,
|
|
) -> anyhow::Result<Redirect> {
|
|
// Safe: the method is only called after the client is_some
|
|
let client = google_oauth_client().as_ref().unwrap();
|
|
if let Some(error) = query.error {
|
|
return Err(anyhow!("auth error from google: {error}"));
|
|
}
|
|
let state = query
|
|
.state
|
|
.context("callback query does not contain state")?;
|
|
if !client.check_state(&state).await {
|
|
return Err(anyhow!("state mismatch"));
|
|
}
|
|
let token = client
|
|
.get_access_token(
|
|
&query.code.context("callback query does not contain code")?,
|
|
)
|
|
.await?;
|
|
let google_user = client.get_google_user(&token.id_token)?;
|
|
let google_id = google_user.id.to_string();
|
|
let db_client = db_client().await;
|
|
let user = db_client
|
|
.users
|
|
.find_one(doc! { "config.data.google_id": &google_id })
|
|
.await
|
|
.context("failed at find user query from mongo")?;
|
|
let jwt = match user {
|
|
Some(user) => jwt_client()
|
|
.generate(user.id)
|
|
.context("failed to generate jwt")?,
|
|
None => {
|
|
let ts = unix_timestamp_ms() as i64;
|
|
let no_users_exist =
|
|
db_client.users.find_one(Document::new()).await?.is_none();
|
|
let user = User {
|
|
id: Default::default(),
|
|
username: google_user
|
|
.email
|
|
.split('@')
|
|
.collect::<Vec<&str>>()
|
|
.first()
|
|
.unwrap()
|
|
.to_string(),
|
|
enabled: no_users_exist,
|
|
admin: no_users_exist,
|
|
create_server_permissions: no_users_exist,
|
|
create_build_permissions: no_users_exist,
|
|
updated_at: ts,
|
|
last_update_view: 0,
|
|
recents: Default::default(),
|
|
all: Default::default(),
|
|
config: UserConfig::Google {
|
|
google_id,
|
|
avatar: google_user.picture,
|
|
},
|
|
};
|
|
let user_id = db_client
|
|
.users
|
|
.insert_one(user)
|
|
.await
|
|
.context("failed to create user on mongo")?
|
|
.inserted_id
|
|
.as_object_id()
|
|
.context("inserted_id is not ObjectId")?
|
|
.to_string();
|
|
jwt_client()
|
|
.generate(user_id)
|
|
.context("failed to generate jwt")?
|
|
}
|
|
};
|
|
let exchange_token = jwt_client().create_exchange_token(jwt).await;
|
|
let redirect = &state[STATE_PREFIX_LENGTH..];
|
|
let redirect_url = if redirect.is_empty() {
|
|
format!("{}?token={exchange_token}", core_config().host)
|
|
} else {
|
|
let splitter = if redirect.contains('?') { '&' } else { '?' };
|
|
format!("{}{splitter}token={exchange_token}", redirect)
|
|
};
|
|
Ok(Redirect::to(&redirect_url))
|
|
}
|