Sessions working

This commit is contained in:
2021-05-24 22:49:43 +02:00
parent 2fbb200dd2
commit 1427443caf
5 changed files with 120 additions and 28 deletions

View File

@ -19,3 +19,4 @@ ansi_term = "0.12"
rust-crypto = "^0.2"
base64 = "0.13.0"
base64-url = "1.4.10"
rand = "0.8.3"

View File

@ -89,6 +89,7 @@ CREATE TABLE members
CREATE TABLE sessions
(
session_id CHAR(43) NOT NULL,
account_id CHAR(43) NOT NULL,
session_nr INTEGER NOT NULL DEFAULT 1,
session_token VARCHAR(256) NOT NULL,
@ -100,8 +101,9 @@ CREATE TABLE sessions
last_used TIMESTAMP WITHOUT TIME ZONE NOT NULL DEFAULT (now() at time zone 'utc'),
last_used_tz INTEGER DEFAULT NULL,
CONSTRAINT pk_sessions PRIMARY KEY (account_id, session_nr),
CONSTRAINT sk_sessions UNIQUE (session_token),
CONSTRAINT pk_sessions PRIMARY KEY (session_id),
CONSTRAINT sk_sessions_1 UNIQUE (account_id, session_nr),
CONSTRAINT sk_sessions_2 UNIQUE (session_token),
CONSTRAINT fk_sessions_accounts FOREIGN KEY (account_id) REFERENCES accounts (account_id)
);

View File

@ -13,6 +13,7 @@ pub enum Kind {
UsimpProtocolError,
Utf8DecodeError,
AuthenticationError,
InvalidSessionError,
}
#[derive(Copy, Clone, Debug)]
@ -64,6 +65,7 @@ impl Error {
Kind::UsimpProtocolError => "USIMP protocol error",
Kind::Utf8DecodeError => "Unable to decode UTF-8 data",
Kind::AuthenticationError => "Unable to authenticate",
Kind::InvalidSessionError => "Invalid session",
},
}
}
@ -95,6 +97,7 @@ impl fmt::Display for Error {
Kind::UsimpProtocolError => "usimp protocol error",
Kind::Utf8DecodeError => "unable to decode utf-8 data",
Kind::AuthenticationError => "unable to authenticate",
Kind::InvalidSessionError => "invalid session",
}
.to_string();
if let Some(desc) = &self.desc {

View File

@ -197,16 +197,9 @@ fn endpoint_handler(
authorization = Some(auth.split(" ").skip(1).collect());
}
let mut from_domain;
let mut from_domain = None;
if let Some(from) = req.header.find_field("From-Domain") {
from_domain = from.to_string();
} else {
return error_handler(
client,
res,
Error::new(Kind::UsimpProtocolError, Class::ClientProtocolError)
.set_desc("Unable to find field 'From-Domain'".to_string())
);
from_domain = Some(from.to_string());
}
let mut to_domain;
@ -225,7 +218,7 @@ fn endpoint_handler(
endpoint: endpoint.to_string(),
from_domain,
to_domain,
authorization,
token: authorization,
data,
};
let buf = match usimp::endpoint(input) {

View File

@ -5,23 +5,79 @@ use crate::subscription;
use crate::database;
use crate::error::*;
use crypto::digest::Digest;
use rand;
use rand::Rng;
pub struct Envelope {
pub endpoint: String,
pub from_domain: String,
pub from_domain: Option<String>,
pub to_domain: String,
pub authorization: Option<String>,
pub token: Option<String>,
pub data: serde_json::Value,
}
pub struct Account {
id: String,
name: String,
domain: String,
}
pub struct Session {
id: String,
nr: i32,
account: Option<Account>,
}
impl Session {
pub fn from_token(token: &str) -> Result<Self, Error> {
let backend = database::client()?;
let mut session;
match backend {
database::Client::Postgres(mut client) => {
let res = client.query(
"SELECT session_id, session_nr, a.account_id, account_name, domain_id \
FROM accounts a JOIN sessions s ON a.account_id = s.account_id \
WHERE session_token = $1",
&[&token]
)?;
if res.len() == 0 {
return Err(Error::new(Kind::InvalidSessionError, Class::ClientError));
}
session = Session {
id: res[0].get(0),
nr: res[0].get(1),
account: Some(Account {
id: res[0].get(2),
name: res[0].get(3),
domain: res[0].get(4),
}),
};
}
}
Ok(session)
}
}
pub fn endpoint(envelope: Envelope) -> Result<serde_json::Value, Error> {
// TODO check authorization
// TODO check from/to domain
if envelope.from_domain != None {
// TODO
return Err(Error::new(Kind::NotImplementedError, Class::ServerError));
}
let mut session = None;
if let Some(token) = &envelope.token {
session = Some(Session::from_token(token)?);
}
let out = match envelope.endpoint.as_str() {
"echo" => serde_json::to_value(echo(serde_json::from_value(envelope.data)?)?)?,
"authenticate" => serde_json::to_value(authenticate(serde_json::from_value(envelope.data)?)?)?,
"subscribe" => serde_json::to_value(subscribe(serde_json::from_value(envelope.data)?)?)?,
"send_event" => serde_json::to_value(send_event(serde_json::from_value(envelope.data)?)?)?,
"echo" => serde_json::to_value(echo(session, serde_json::from_value(envelope.data)?)?)?,
"authenticate" => serde_json::to_value(authenticate(session, serde_json::from_value(envelope.data)?)?)?,
"subscribe" => serde_json::to_value(subscribe(session, serde_json::from_value(envelope.data)?)?)?,
"send_event" => serde_json::to_value(send_event(session, serde_json::from_value(envelope.data)?)?)?,
_ => return Err(Error::new(Kind::InvalidEndpointError, Class::ClientProtocolError)),
};
@ -55,7 +111,7 @@ pub struct EchoOutput {
database: Option<i32>,
}
pub fn echo(input: EchoInput) -> Result<EchoOutput, Error> {
pub fn echo(session: Option<Session>, input: EchoInput) -> Result<EchoOutput, Error> {
let backend = database::client()?;
let mut output = EchoOutput {
message: input.message,
@ -84,17 +140,43 @@ pub struct AuthenticateOutput {
token: String,
}
pub fn authenticate(input: AuthenticateInput) -> Result<AuthenticateOutput, Error> {
pub fn authenticate(session: Option<Session>, input: AuthenticateInput) -> Result<AuthenticateOutput, Error> {
let backend = database::client()?;
let mut token;
let mut token: String;
match backend {
database::Client::Postgres(mut client) => {
let res = client.query("SELECT account_id FROM accounts WHERE account_name = $1", &[&input.name])?;
let res = client.query(
"SELECT account_id FROM accounts WHERE account_name = $1",
&[&input.name]
)?;
if res.len() == 0 {
return Err(Error::new(Kind::AuthenticationError, Class::ClientError));
}
token = res.get(0).unwrap().get(0);
let account_id: String = res[0].get(0);
// TODO password check
if !input.password.eq("MichaelScott") {
return Err(Error::new(Kind::AuthenticationError, Class::ClientError));
}
token = rand::thread_rng()
.sample_iter(&rand::distributions::Alphanumeric)
.take(256)
.map(char::from)
.collect();
let session_id: String = rand::thread_rng()
.sample_iter(&rand::distributions::Alphanumeric)
.take(43)
.map(char::from)
.collect();
client.execute(
"INSERT INTO sessions (account_id, session_nr, session_id, session_token) \
VALUES ($1, COALESCE((SELECT MAX(session_nr) + 1 FROM sessions WHERE account_id = $1), 1), $2, $3)",
&[&account_id, &session_id, &token],
)?;
}
}
@ -112,14 +194,25 @@ pub struct SendEventOutput {
event_id: String,
}
pub fn send_event(input: SendEventInput) -> Result<SendEventOutput, Error> {
pub fn send_event(session: Option<Session>, input: SendEventInput) -> Result<SendEventOutput, Error> {
let backend = database::client()?;
let event_id = get_id("hermann"); // TODO fix id generation
let data = serde_json::to_string(&input.data)?;
let session = session.unwrap();
match backend {
database::Client::Postgres(mut client) => {
client.execute("INSERT INTO events (event_id, room_id, data) VALUES ($1, $2, to_jsonb($3::text))", &[&event_id, &input.room_id, &data])?;
let res = client.query(
"SELECT member_id FROM members \
WHERE (room_id, account_id) = ($1, $2)",
&[&input.room_id, &session.account.unwrap().id])?;
let member_id: String = res[0].get(0);
client.execute(
"INSERT INTO events (event_id, room_id, from_member_id, from_session_id, data) \
VALUES ($1, $2, $3, $4, to_jsonb($5::text))",
&[&event_id, &input.room_id, &member_id, &session.id, &data])?;
}
}
@ -140,7 +233,7 @@ pub struct SubscribeOutput {
event: subscription::Event,
}
pub fn subscribe(input: SubscribeInput) -> Result<SubscribeOutput, Error> {
pub fn subscribe(session: Option<Session>, input: SubscribeInput) -> Result<SubscribeOutput, Error> {
let rx = subscription::subscribe();
let event = rx.recv().unwrap();
subscription::unsubscribe(rx);