aboutsummaryrefslogtreecommitdiff
path: root/src/login/static_provider.rs
diff options
context:
space:
mode:
authorAlex Auvolat <alex@adnab.me>2022-05-19 12:10:48 +0200
committerAlex Auvolat <alex@adnab.me>2022-05-19 12:10:48 +0200
commitc7f767b7d2877cdbbc06893c9cd0fae2c56b96f2 (patch)
tree0fe8afca226ff90dd0fd20985d8216fdb30c8146 /src/login/static_provider.rs
parent8bd59a8f836d39f89d7e064928949034bec093de (diff)
downloadaerogramme-c7f767b7d2877cdbbc06893c9cd0fae2c56b96f2.tar.gz
aerogramme-c7f767b7d2877cdbbc06893c9cd0fae2c56b96f2.zip
More construction of things
Diffstat (limited to 'src/login/static_provider.rs')
-rw-r--r--src/login/static_provider.rs61
1 files changed, 61 insertions, 0 deletions
diff --git a/src/login/static_provider.rs b/src/login/static_provider.rs
new file mode 100644
index 0000000..037948a
--- /dev/null
+++ b/src/login/static_provider.rs
@@ -0,0 +1,61 @@
+use std::collections::HashMap;
+
+use anyhow::{anyhow, bail, Result};
+use async_trait::async_trait;
+use rusoto_signature::Region;
+
+use crate::config::*;
+use crate::cryptoblob::Key;
+use crate::login::*;
+
+pub struct StaticLoginProvider {
+ default_bucket: Option<String>,
+ users: HashMap<String, LoginStaticUser>,
+ k2v_region: Region,
+}
+
+impl StaticLoginProvider {
+ pub fn new(config: LoginStaticConfig, k2v_region: Region) -> Result<Self> {
+ Ok(Self {
+ default_bucket: config.default_bucket,
+ users: config.users,
+ k2v_region,
+ })
+ }
+}
+
+#[async_trait]
+impl LoginProvider for StaticLoginProvider {
+ async fn login(&self, username: &str, password: &str) -> Result<Credentials> {
+ match self.users.get(username) {
+ None => bail!("User {} does not exist", username),
+ Some(u) => {
+ if u.password != password {
+ // TODO cryptographic password compare
+ bail!("Wrong password");
+ }
+ let bucket = u
+ .bucket
+ .clone()
+ .or_else(|| self.default_bucket.clone())
+ .ok_or(anyhow!(
+ "No bucket configured and no default bucket specieid"
+ ))?;
+
+ // TODO if master key is not specified, retrieve it from K2V key storage
+ let master_key_str = u.master_key.as_ref().ok_or(anyhow!(
+ "Master key must be specified in config file for now, this will change"
+ ))?;
+ let master_key = Key::from_slice(&base64::decode(master_key_str)?)
+ .ok_or(anyhow!("Invalid master key"))?;
+
+ Ok(Credentials {
+ aws_access_key_id: u.aws_access_key_id.clone(),
+ aws_secret_access_key: u.aws_secret_access_key.clone(),
+ bucket,
+ master_key,
+ })
+ }
+ }
+ }
+}