aboutsummaryrefslogtreecommitdiff
path: root/src/login
diff options
context:
space:
mode:
authorQuentin Dufour <quentin@deuxfleurs.fr>2023-12-16 11:13:32 +0100
committerQuentin Dufour <quentin@deuxfleurs.fr>2023-12-16 11:13:32 +0100
commit684f4de225c44464abcb6a9cb2ef6dcae90537a8 (patch)
treecbbc9ba773ed3d9f8f011637d58791af79672774 /src/login
parent1b5f2eb695d658c57ba9c4264e76ca13bd82a958 (diff)
downloadaerogramme-684f4de225c44464abcb6a9cb2ef6dcae90537a8.tar.gz
aerogramme-684f4de225c44464abcb6a9cb2ef6dcae90537a8.zip
new new new storage interface
Diffstat (limited to 'src/login')
-rw-r--r--src/login/ldap_provider.rs4
-rw-r--r--src/login/static_provider.rs27
2 files changed, 19 insertions, 12 deletions
diff --git a/src/login/ldap_provider.rs b/src/login/ldap_provider.rs
index 6e94061..4e3af3c 100644
--- a/src/login/ldap_provider.rs
+++ b/src/login/ldap_provider.rs
@@ -87,7 +87,9 @@ impl LdapLoginProvider {
fn storage_creds_from_ldap_user(&self, user: &SearchEntry) -> Result<Builders> {
let storage: Builders = match &self.storage_specific {
- StorageSpecific::InMemory => Box::new(storage::in_memory::FullMem {}),
+ StorageSpecific::InMemory => Box::new(storage::in_memory::FullMem::new(
+ &get_attr(user, &self.username_attr)?
+ )),
StorageSpecific::Garage { from_config, bucket_source } => {
let aws_access_key_id = get_attr(user, &from_config.aws_access_key_id_attr)?;
let aws_secret_access_key = get_attr(user, &from_config.aws_secret_access_key_attr)?;
diff --git a/src/login/static_provider.rs b/src/login/static_provider.rs
index 4a8d484..788a4c5 100644
--- a/src/login/static_provider.rs
+++ b/src/login/static_provider.rs
@@ -11,10 +11,15 @@ use crate::config::*;
use crate::login::*;
use crate::storage;
+pub struct ContextualUserEntry {
+ pub username: String,
+ pub config: UserEntry,
+}
+
#[derive(Default)]
pub struct UserDatabase {
- users: HashMap<String, Arc<UserEntry>>,
- users_by_email: HashMap<String, Arc<UserEntry>>,
+ users: HashMap<String, Arc<ContextualUserEntry>>,
+ users_by_email: HashMap<String, Arc<ContextualUserEntry>>,
}
pub struct StaticLoginProvider {
@@ -35,12 +40,12 @@ pub async fn update_user_list(config: PathBuf, up: watch::Sender<UserDatabase>)
let users = ulist
.into_iter()
- .map(|(k, v)| (k, Arc::new(v)))
+ .map(|(username, config)| (username.clone() , Arc::new(ContextualUserEntry { username, config })))
.collect::<HashMap<_, _>>();
let mut users_by_email = HashMap::new();
for (_, u) in users.iter() {
- for m in u.email_addresses.iter() {
+ for m in u.config.email_addresses.iter() {
if users_by_email.contains_key(m) {
tracing::warn!("Several users have the same email address: {}", m);
continue
@@ -78,13 +83,13 @@ impl LoginProvider for StaticLoginProvider {
};
tracing::debug!(user=%username, "verify password");
- if !verify_password(password, &user.password)? {
+ if !verify_password(password, &user.config.password)? {
bail!("Wrong password");
}
tracing::debug!(user=%username, "fetch keys");
- let storage: storage::Builders = match &user.storage {
- StaticStorage::InMemory => Box::new(storage::in_memory::FullMem {}),
+ let storage: storage::Builders = match &user.config.storage {
+ StaticStorage::InMemory => Box::new(storage::in_memory::FullMem::new(username)),
StaticStorage::Garage(grgconf) => Box::new(storage::garage::GrgCreds {
region: grgconf.aws_region.clone(),
k2v_endpoint: grgconf.k2v_endpoint.clone(),
@@ -95,7 +100,7 @@ impl LoginProvider for StaticLoginProvider {
}),
};
- let cr = CryptoRoot(user.crypto_root.clone());
+ let cr = CryptoRoot(user.config.crypto_root.clone());
let keys = cr.crypto_keys(password)?;
tracing::debug!(user=%username, "logged");
@@ -109,8 +114,8 @@ impl LoginProvider for StaticLoginProvider {
Some(u) => u,
};
- let storage: storage::Builders = match &user.storage {
- StaticStorage::InMemory => Box::new(storage::in_memory::FullMem {}),
+ let storage: storage::Builders = match &user.config.storage {
+ StaticStorage::InMemory => Box::new(storage::in_memory::FullMem::new(&user.username)),
StaticStorage::Garage(grgconf) => Box::new(storage::garage::GrgCreds {
region: grgconf.aws_region.clone(),
k2v_endpoint: grgconf.k2v_endpoint.clone(),
@@ -121,7 +126,7 @@ impl LoginProvider for StaticLoginProvider {
}),
};
- let cr = CryptoRoot(user.crypto_root.clone());
+ let cr = CryptoRoot(user.config.crypto_root.clone());
let public_key = cr.public_key()?;
Ok(PublicCredentials {