use std::convert::Infallible; use std::num::ParseIntError; use std::{fmt, str}; use actix_web::{web, HttpRequest, HttpResponse}; use deserr::{DeserializeError, IntoValue, MergeWithError, ValuePointerRef}; use meilisearch_auth::error::AuthControllerError; use meilisearch_auth::AuthController; use meilisearch_types::error::{unwrap_any, Code, ErrorCode, ResponseError}; use meilisearch_types::keys::{Action, Key}; use serde::{Deserialize, Serialize}; use serde_json::Value; use time::OffsetDateTime; use uuid::Uuid; use crate::extractors::authentication::policies::*; use crate::extractors::authentication::GuardedData; use crate::extractors::query_parameters::QueryParameter; use crate::extractors::sequential_extractor::SeqHandler; use crate::routes::Pagination; pub fn configure(cfg: &mut web::ServiceConfig) { cfg.service( web::resource("") .route(web::post().to(SeqHandler(create_api_key))) .route(web::get().to(SeqHandler(list_api_keys))), ) .service( web::resource("/{key}") .route(web::get().to(SeqHandler(get_api_key))) .route(web::patch().to(SeqHandler(patch_api_key))) .route(web::delete().to(SeqHandler(delete_api_key))), ); } pub async fn create_api_key( auth_controller: GuardedData, AuthController>, body: web::Json, _req: HttpRequest, ) -> Result { let v = body.into_inner(); let res = tokio::task::spawn_blocking(move || -> Result<_, AuthControllerError> { let key = auth_controller.create_key(v)?; Ok(KeyView::from_key(key, &auth_controller)) }) .await .map_err(|e| ResponseError::from_msg(e.to_string(), Code::Internal))??; Ok(HttpResponse::Created().json(res)) } #[derive(Debug)] pub struct PaginationDeserrError { error: String, code: Code, } impl std::fmt::Display for PaginationDeserrError { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { write!(f, "{}", self.error) } } impl std::error::Error for PaginationDeserrError {} impl ErrorCode for PaginationDeserrError { fn error_code(&self) -> Code { self.code } } impl MergeWithError for PaginationDeserrError { fn merge( _self_: Option, other: PaginationDeserrError, _merge_location: ValuePointerRef, ) -> Result { Err(other) } } impl DeserializeError for PaginationDeserrError { fn error( _self_: Option, error: deserr::ErrorKind, location: ValuePointerRef, ) -> Result { let error = unwrap_any(deserr::serde_json::JsonError::error(None, error, location)).0; let code = match location.last_field() { Some("offset") => Code::InvalidApiKeyLimit, Some("limit") => Code::InvalidApiKeyOffset, _ => Code::BadRequest, }; Err(PaginationDeserrError { error, code }) } } impl MergeWithError for PaginationDeserrError { fn merge( _self_: Option, other: ParseIntError, merge_location: ValuePointerRef, ) -> Result { PaginationDeserrError::error::( None, deserr::ErrorKind::Unexpected { msg: other.to_string() }, merge_location, ) } } pub async fn list_api_keys( auth_controller: GuardedData, AuthController>, paginate: QueryParameter, ) -> Result { let paginate = paginate.into_inner(); let page_view = tokio::task::spawn_blocking(move || -> Result<_, AuthControllerError> { let keys = auth_controller.list_keys()?; let page_view = paginate .auto_paginate_sized(keys.into_iter().map(|k| KeyView::from_key(k, &auth_controller))); Ok(page_view) }) .await .map_err(|e| ResponseError::from_msg(e.to_string(), Code::Internal))??; Ok(HttpResponse::Ok().json(page_view)) } pub async fn get_api_key( auth_controller: GuardedData, AuthController>, path: web::Path, ) -> Result { let key = path.into_inner().key; let res = tokio::task::spawn_blocking(move || -> Result<_, AuthControllerError> { let uid = Uuid::parse_str(&key).or_else(|_| auth_controller.get_uid_from_encoded_key(&key))?; let key = auth_controller.get_key(uid)?; Ok(KeyView::from_key(key, &auth_controller)) }) .await .map_err(|e| ResponseError::from_msg(e.to_string(), Code::Internal))??; Ok(HttpResponse::Ok().json(res)) } pub async fn patch_api_key( auth_controller: GuardedData, AuthController>, body: web::Json, path: web::Path, ) -> Result { let key = path.into_inner().key; let body = body.into_inner(); let res = tokio::task::spawn_blocking(move || -> Result<_, AuthControllerError> { let uid = Uuid::parse_str(&key).or_else(|_| auth_controller.get_uid_from_encoded_key(&key))?; let key = auth_controller.update_key(uid, body)?; Ok(KeyView::from_key(key, &auth_controller)) }) .await .map_err(|e| ResponseError::from_msg(e.to_string(), Code::Internal))??; Ok(HttpResponse::Ok().json(res)) } pub async fn delete_api_key( auth_controller: GuardedData, AuthController>, path: web::Path, ) -> Result { let key = path.into_inner().key; tokio::task::spawn_blocking(move || { let uid = Uuid::parse_str(&key).or_else(|_| auth_controller.get_uid_from_encoded_key(&key))?; auth_controller.delete_key(uid) }) .await .map_err(|e| ResponseError::from_msg(e.to_string(), Code::Internal))??; Ok(HttpResponse::NoContent().finish()) } #[derive(Deserialize)] pub struct AuthParam { key: String, } #[derive(Debug, Serialize)] #[serde(rename_all = "camelCase")] struct KeyView { name: Option, description: Option, key: String, uid: Uuid, actions: Vec, indexes: Vec, #[serde(serialize_with = "time::serde::rfc3339::option::serialize")] expires_at: Option, #[serde(serialize_with = "time::serde::rfc3339::serialize")] created_at: OffsetDateTime, #[serde(serialize_with = "time::serde::rfc3339::serialize")] updated_at: OffsetDateTime, } impl KeyView { fn from_key(key: Key, auth: &AuthController) -> Self { let generated_key = auth.generate_key(key.uid).unwrap_or_default(); KeyView { name: key.name, description: key.description, key: generated_key, uid: key.uid, actions: key.actions, indexes: key.indexes.into_iter().map(String::from).collect(), expires_at: key.expires_at, created_at: key.created_at, updated_at: key.updated_at, } } }