sculptor/src/api/figura/auth.rs
shiroyashik d5433101f1 Release v0.3.1
See release body for more information
2024-09-12 08:00:22 +03:00

76 lines
No EOL
2.7 KiB
Rust

use axum::{debug_handler, extract::{Query, State}, response::{IntoResponse, Response}, routing::get, Router};
use reqwest::StatusCode;
use ring::digest::{self, digest};
use tracing::{error, info};
use crate::{auth::{has_joined, Userinfo}, utils::rand, AppState};
use super::types::auth::*;
pub fn router() -> Router<AppState> {
Router::new()
.route("/id", get(id))
.route("/verify", get(verify))
}
#[debug_handler]
async fn id(
// First stage of authentication
Query(query): Query<Id>,
State(state): State<AppState>,
) -> String {
let server_id =
hex::encode(&digest(&digest::SHA1_FOR_LEGACY_USE_ONLY, &rand()).as_ref()[0..20]);
let state = state.user_manager;
state.pending_insert(server_id.clone(), query.username);
server_id
}
#[debug_handler]
async fn verify(
// Second stage of authentication
Query(query): Query<Verify>,
State(state): State<AppState>,
) -> Response {
let server_id = query.id.clone();
let username = state.user_manager.pending_remove(&server_id).unwrap().1; // TODO: Add error check
let userinfo = match has_joined(
state.config.read().await.auth_providers.clone(),
&server_id,
&username
).await {
Ok(d) => d,
Err(_e) => {
// error!("[Authentication] {e}"); // In auth error log already defined
return (StatusCode::INTERNAL_SERVER_ERROR, "internal verify error".to_string()).into_response();
},
};
if let Some((uuid, auth_provider)) = userinfo {
let umanager = state.user_manager;
if umanager.is_banned(&uuid) {
info!("[Authentication] {username} tried to log in, but was banned");
return (StatusCode::BAD_REQUEST, "You're banned!".to_string()).into_response();
}
info!("[Authentication] {username} logged in using {}", auth_provider.name);
let userinfo = Userinfo {
username,
uuid,
token: Some(server_id.clone()),
auth_provider,
..Default::default()
};
match umanager.insert(uuid, server_id.clone(), userinfo.clone()) {
Ok(_) => {},
Err(_) => {
umanager.remove(&uuid);
if umanager.insert(uuid, server_id.clone(), userinfo).is_err() {
error!("Old token error after attempting to remove it! Unexpected behavior!");
return (StatusCode::BAD_REQUEST, "second session detected".to_string()).into_response();
};
}
}
(StatusCode::OK, server_id.to_string()).into_response()
} else {
info!("[Authentication] failed to verify {username}");
(StatusCode::BAD_REQUEST, "failed to verify".to_string()).into_response()
}
}