0
0
Fork 0
mirror of https://git.verdigado.com/NB-Public/simple-wkd.git synced 2024-10-30 19:05:53 +01:00
simple-wkd/src/management.rs

141 lines
4.1 KiB
Rust
Raw Normal View History

2023-04-14 00:52:54 +02:00
use crate::pending_path;
use crate::settings::SETTINGS;
2023-04-14 19:30:38 +02:00
use crate::utils::{get_user_file_path, key_exists};
2023-04-14 18:55:17 +02:00
use crate::{errors::Error, utils::get_filename};
2023-04-13 18:56:32 +02:00
use chrono::Utc;
2023-04-15 23:51:13 +02:00
use log::{debug, error, warn};
2023-04-13 18:56:32 +02:00
use serde::{Deserialize, Serialize};
2023-04-14 12:18:49 +02:00
use std::{fmt::Display, fs, path::Path};
2023-04-13 18:56:32 +02:00
2023-04-14 18:55:17 +02:00
#[derive(Serialize, Deserialize, Debug, Clone, Copy)]
2023-04-13 18:56:32 +02:00
pub enum Action {
Add,
Delete,
}
2023-04-14 12:18:49 +02:00
impl Display for Action {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "{self:?}")
}
}
2023-04-13 18:56:32 +02:00
#[derive(Serialize, Deserialize, Debug)]
pub struct Pending {
action: Action,
data: String,
timestamp: i64,
}
impl Pending {
2023-04-13 22:00:33 +02:00
pub fn build_add(pem: String) -> Self {
2023-04-13 18:56:32 +02:00
let timestamp = Utc::now().timestamp();
2023-04-13 22:00:33 +02:00
Self {
2023-04-13 18:56:32 +02:00
action: Action::Add,
data: pem,
timestamp,
}
}
2023-04-13 22:00:33 +02:00
pub fn build_delete(email: String) -> Self {
2023-04-13 18:56:32 +02:00
let timestamp = Utc::now().timestamp();
2023-04-13 22:00:33 +02:00
Self {
2023-04-13 18:56:32 +02:00
action: Action::Delete,
data: email,
timestamp,
}
}
2023-04-13 22:00:33 +02:00
pub const fn action(&self) -> &Action {
2023-04-13 18:56:32 +02:00
&self.action
}
pub fn data(&self) -> &str {
&self.data
}
2023-04-13 22:00:33 +02:00
pub const fn timestamp(&self) -> i64 {
2023-04-13 18:56:32 +02:00
self.timestamp
}
}
2023-04-13 22:00:33 +02:00
fn store_pending(pending: &Pending, token: &str) -> Result<(), Error> {
2023-04-13 22:26:41 +02:00
let serialized = match serde_json::to_string(pending) {
Ok(serialized) => serialized,
Err(_) => return Err(Error::SerializeData),
};
match fs::write(pending_path!().join(token), serialized) {
Ok(_) => Ok(()),
Err(_) => Err(Error::Inaccessible),
2023-04-13 22:00:33 +02:00
}
2023-04-13 18:56:32 +02:00
}
2023-04-14 18:55:17 +02:00
pub fn store_pending_addition(pem: String, email: &str, token: &str) -> Result<(), Error> {
2023-04-13 22:26:41 +02:00
let pending = Pending::build_add(pem);
store_pending(&pending, token)?;
2023-04-14 18:55:17 +02:00
debug!("Stored submission from {} with token {}", email, token);
2023-04-13 22:00:33 +02:00
Ok(())
2023-04-13 18:56:32 +02:00
}
2023-04-13 22:00:33 +02:00
pub fn store_pending_deletion(email: String, token: &str) -> Result<(), Error> {
2023-04-15 23:51:13 +02:00
if let Err(error) = key_exists(&email) {
match error {
Error::PathGeneration => debug!("Error while generating path for user {}", email),
Error::MissingKey => debug!("There is no key for user {}", email),
_ => error!("An unexpected error occoured!"),
}
return Err(error);
2023-04-14 19:30:38 +02:00
}
2023-04-14 18:55:17 +02:00
let pending = Pending::build_delete(email.clone());
2023-04-13 22:26:41 +02:00
store_pending(&pending, token)?;
2023-04-14 18:55:17 +02:00
debug!(
"Stored deletion request from {} with token {}",
email, token
);
2023-04-13 22:00:33 +02:00
Ok(())
2023-04-13 18:56:32 +02:00
}
2023-04-14 18:55:17 +02:00
pub fn clean_stale(max_age: i64) {
2023-04-13 22:00:33 +02:00
for path in fs::read_dir(pending_path!()).unwrap().flatten() {
let file_path = path.path();
2023-04-13 22:55:05 +02:00
if file_path.is_file() {
2023-04-13 22:26:41 +02:00
let content = match fs::read_to_string(&file_path) {
Ok(content) => content,
2023-04-14 18:55:17 +02:00
Err(_) => {
warn!(
"Could not read contents of token {} to string",
get_filename(&file_path).unwrap()
);
continue;
}
2023-04-13 22:26:41 +02:00
};
let key = match serde_json::from_str::<Pending>(&content) {
Ok(key) => key,
2023-04-14 18:55:17 +02:00
Err(_) => {
warn!(
"Could not deserialize token {}",
get_filename(&file_path).unwrap()
);
continue;
}
2023-04-13 22:26:41 +02:00
};
let now = Utc::now().timestamp();
if now - key.timestamp() > max_age {
2023-04-14 18:55:17 +02:00
if fs::remove_file(&file_path).is_err() {
{
warn!(
"Could not delete stale token {}",
get_filename(&file_path).unwrap()
);
continue;
};
2023-04-13 22:26:41 +02:00
}
2023-04-14 18:55:17 +02:00
debug!("Deleted stale token {}", get_filename(&file_path).unwrap())
2023-04-13 22:00:33 +02:00
}
2023-04-13 18:56:32 +02:00
}
}
}
2023-04-13 22:00:33 +02:00
pub fn delete_key(email: &str) -> Result<(), Error> {
2023-04-14 12:18:49 +02:00
let path = Path::new(&SETTINGS.root_folder).join(get_user_file_path(email)?);
2023-04-13 22:00:33 +02:00
match fs::remove_file(path) {
Ok(_) => Ok(()),
Err(_) => Err(Error::Inaccessible),
}
2023-04-13 18:56:32 +02:00
}