Plume/src/api/authorization.rs
Baptiste Gelez 31641b1ea1 New request guard: Authorization<Action, Scope>
Filter requests that don't have an API token authorized to read or write
a specific scope;
2018-10-30 18:13:49 +01:00

58 lines
1.3 KiB
Rust

use rocket::{
Outcome,
http::Status,
request::{self, FromRequest, Request}
};
use plume_models::{self, api_tokens::ApiToken};
// Actions
pub trait Action {
fn to_str() -> &'static str;
}
pub struct Read;
impl Action for Read {
fn to_str() -> &'static str {
"read"
}
}
pub struct Write;
impl Action for Write {
fn to_str() -> &'static str {
"write"
}
}
// Scopes
pub trait Scope {
fn to_str() -> &'static str;
}
impl Scope for plume_models::posts::Post {
fn to_str() -> &'static str {
"posts"
}
}
// We have to use A and S in the struct definition
// otherwise rustc complains they are useless
//
// A nicer solution is probably possible.
pub struct Authorization<A, S> (Option<A>, Option<S>);
impl<'a, 'r, A, S> FromRequest<'a, 'r> for Authorization<A, S>
where A: Action,
S: Scope
{
type Error = ();
fn from_request(request: &'a Request<'r>) -> request::Outcome<Authorization<A, S>, ()> {
request.guard::<ApiToken>()
.map_failure(|_| (Status::Unauthorized, ()))
.and_then(|token| if token.can(A::to_str(), S::to_str()) {
Outcome::Success(Authorization(None, None))
} else {
Outcome::Failure((Status::Unauthorized, ()))
})
}
}