use chacha20poly1305::Key as ChaCha20Poly1305Key;
use chartered_fs::FileSystem;
use oauth2::{AuthUrl, ClientId, ClientSecret, RedirectUrl, TokenUrl};
use openid::DiscoveredClient;
use serde::{de::Error as SerdeDeError, Deserialize};
use std::collections::HashMap;
use std::net::SocketAddr;
use thiserror::Error;
use url::Url;
#[derive(Error, Debug)]
pub enum Error {
#[error("Error discovering OpenID provider: {0}")]
OpenId(#[from] openid::error::Error),
#[error("Failed to create file system handle: {0}")]
Fs(#[from] Box<chartered_fs::Error>),
#[error("Failed to build URL: {0}")]
Parse(#[from] url::ParseError),
}
#[derive(Deserialize, Debug)]
#[serde(deny_unknown_fields)]
pub struct Config {
pub bind_address: SocketAddr,
pub database_uri: String,
pub storage_uri: String,
pub frontend_base_uri: Url,
pub auth: AuthConfig,
#[serde(deserialize_with = "deserialize_encryption_key")]
pub encryption_key: ChaCha20Poly1305Key,
}
impl Config {
pub async fn get_file_system(&self) -> Result<FileSystem, Error> {
Ok(FileSystem::from_str(&self.storage_uri)
.await
.map_err(Box::new)?)
}
pub async fn create_oidc_clients(&self) -> Result<OidcClients, Error> {
let mut clients: OidcClients = futures::future::try_join_all(
self.auth
.oauth
.iter()
.filter(|(_, config)| config.enabled)
.map(|(name, config)| async move {
let redirect = self.frontend_base_uri.join("login/oauth")?;
let client = Box::new(
DiscoveredClient::discover(
config.client_id.to_string(),
config.client_secret.to_string(),
Some(redirect.to_string()),
config.discovery_uri.clone(),
)
.await?,
);
Ok::<_, Error>((name.to_string(), OidcClient::Discovered(client)))
}),
)
.await?
.into_iter()
.collect();
if let Some(github) = self.auth.github.clone() {
let redirect = self.frontend_base_uri.join("login/oauth")?;
let client = Box::new(
oauth2::basic::BasicClient::new(
github.client_id,
Some(github.client_secret),
AuthUrl::new("https://github.com/login/oauth/authorize".to_string())?,
Some(TokenUrl::new(
"https://github.com/login/oauth/access_token".to_string(),
)?),
)
.set_redirect_uri(RedirectUrl::from_url(redirect)),
);
clients.insert("github".to_string(), OidcClient::GitHub(client));
}
Ok(clients)
}
}
#[derive(Deserialize, Default, Debug)]
pub struct AuthConfig {
pub password: PasswordAuthConfig,
pub github: Option<GitHubConfig>,
#[serde(flatten)]
pub oauth: HashMap<String, OAuthConfig>,
}
#[derive(Deserialize, Default, Debug)]
#[serde(deny_unknown_fields)]
pub struct PasswordAuthConfig {
pub enabled: bool,
}
#[derive(Deserialize, Clone, Debug)]
#[serde(deny_unknown_fields)]
pub struct GitHubConfig {
pub enabled: bool,
pub client_id: ClientId,
pub client_secret: ClientSecret,
}
#[derive(Deserialize, Debug)]
pub struct OAuthConfig {
pub enabled: bool,
pub discovery_uri: Url,
pub client_id: String,
pub client_secret: String,
}
pub type OidcClients = HashMap<String, OidcClient>;
pub enum OidcClient {
Discovered(Box<DiscoveredClient>),
GitHub(Box<oauth2::basic::BasicClient>),
}
fn deserialize_encryption_key<'de, D: serde::Deserializer<'de>>(
deserializer: D,
) -> Result<ChaCha20Poly1305Key, D::Error> {
let key = String::deserialize(deserializer)?;
if key.as_bytes().len() != 32 {
return Err(D::Error::custom("encryption_key must be 32 bytes"));
}
Ok(ChaCha20Poly1305Key::clone_from_slice(key.as_bytes()))
}