1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
use std::{env, sync::Arc, collections::HashMap};
use axum::{
body::Body,
extract::{Extension, FromRequest, Query},
http::{request::Parts, Request},
routing::get,
Json, Router,
};
use openidconnect::{
core::{CoreClient, CoreProviderMetadata, CoreResponseType},
reqwest::async_http_client,
url::Url,
AccessTokenHash, AuthenticationFlow, AuthorizationCode, ClientId, ClientSecret, CsrfToken,
IssuerUrl, Nonce, OAuth2TokenResponse, PkceCodeChallenge, RedirectUrl, Scope, TokenResponse,
};
use protocol::UserInfo;
use tower_cookies::{Cookie, CookieManagerLayer, Cookies};
use tower_http::trace::TraceLayer;
use tracing::{info, trace};
use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt};
mod auth;
use crate::auth::Authenticator;
struct ServerContext {
pub app_url: String,
pub authenticator: Authenticator,
}
type ContextExtension = Extension<Arc<ServerContext>>;
async fn keycloak_client(
issuer_url: IssuerUrl,
client_id: ClientId,
client_secret: ClientSecret,
redirect_uri: RedirectUrl,
) -> CoreClient {
// // Use OpenID Connect Discovery to fetch the provider metadata.
let provider_metadata = CoreProviderMetadata::discover_async(issuer_url, async_http_client)
.await
.unwrap();
let client =
CoreClient::from_provider_metadata(provider_metadata, client_id, Some(client_secret))
// Set the URL the user will be redirected to after the authorization process.
.set_redirect_uri(redirect_uri);
client
}
#[tokio::main]
async fn main() {
dotenv::dotenv().ok();
tracing_subscriber::registry()
.with(tracing_subscriber::EnvFilter::new(
std::env::var("RUST_LOG").unwrap_or_else(|_| "".into()),
))
.with(tracing_subscriber::fmt::layer())
.init();
let bind_address = env::var("BIND_ADDRESS").unwrap();
info!("Starting server on {}", bind_address);
let app_url = env::var("APP_URL").unwrap();
let state = Arc::new(ServerContext {
app_url: app_url,
authenticator: Authenticator::from_env().await,
});
let app = Router::new()
.route("/api/user/info", get(user_info))
.route("/api/get_login_url", get(get_login_url))
.route(auth::LOGIN_CALLBACK, get(login_callback))
.layer(CookieManagerLayer::new())
.layer(Extension(state))
.layer(TraceLayer::new_for_http());
axum::Server::bind(&bind_address.parse().unwrap())
.serve(app.into_make_service())
.await
.unwrap();
}
async fn user_info() -> Json<Option<UserInfo>> {
Json(None)
}
async fn login_callback(
cookies: Cookies,
Query(params): Query<HashMap<String, String>>,
) -> () {
info!("{params:?}");
()
}
async fn get_login_url(cookies: Cookies, extension: ContextExtension) -> Json<Url> {
let (user_id, auth_url) = extension.authenticator.get_login_url().await;
trace!("Creating auth url for {user_id:?}");
cookies.add(Cookie::new(
"user-id",
serde_json::to_string(&user_id).unwrap(),
));
Json(auth_url)
}
|