- Scope all reading progress (books, series, stats) by user via Option<Extension<AuthUser>> — admin sees aggregate, read token sees own data - Fix duplicate book rows when admin views lists (IS NOT NULL guard on JOIN) - Add X-As-User header support: admin can impersonate any user from backoffice - UserSwitcher dropdown in nav header (persisted via as_user_id cookie) - Per-user filter pills on "Currently reading" and "Recently read" dashboard sections - Inline username editing (UsernameEdit component with optimistic update) - PATCH /admin/users/:id endpoint to rename a user - Unassigned read tokens row in users table - Komga sync now requires a user_id — reading progress attributed to selected user - Migration 0051: add user_id column to komga_sync_reports - Nav breakpoints: icons-only from md, labels from xl, hamburger until md Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
133 lines
4.1 KiB
Rust
133 lines
4.1 KiB
Rust
use argon2::{Argon2, PasswordHash, PasswordVerifier};
|
|
use axum::{
|
|
extract::{Request, State},
|
|
http::header::AUTHORIZATION,
|
|
middleware::Next,
|
|
response::Response,
|
|
};
|
|
use chrono::Utc;
|
|
use sqlx::Row;
|
|
|
|
use crate::{error::ApiError, state::AppState};
|
|
|
|
#[derive(Clone, Debug)]
|
|
pub struct AuthUser {
|
|
pub user_id: uuid::Uuid,
|
|
}
|
|
|
|
#[derive(Clone, Debug)]
|
|
pub enum Scope {
|
|
Admin,
|
|
Read { user_id: uuid::Uuid },
|
|
}
|
|
|
|
pub async fn require_admin(
|
|
State(state): State<AppState>,
|
|
mut req: Request,
|
|
next: Next,
|
|
) -> Result<Response, ApiError> {
|
|
let token = bearer_token(&req).ok_or_else(|| ApiError::unauthorized("missing bearer token"))?;
|
|
let scope = authenticate(&state, token).await?;
|
|
|
|
if !matches!(scope, Scope::Admin) {
|
|
return Err(ApiError::forbidden("admin scope required"));
|
|
}
|
|
|
|
req.extensions_mut().insert(scope);
|
|
Ok(next.run(req).await)
|
|
}
|
|
|
|
pub async fn require_read(
|
|
State(state): State<AppState>,
|
|
mut req: Request,
|
|
next: Next,
|
|
) -> Result<Response, ApiError> {
|
|
let token = bearer_token(&req).ok_or_else(|| ApiError::unauthorized("missing bearer token"))?;
|
|
let scope = authenticate(&state, token).await?;
|
|
|
|
if let Scope::Read { user_id } = &scope {
|
|
req.extensions_mut().insert(AuthUser { user_id: *user_id });
|
|
} else if matches!(scope, Scope::Admin) {
|
|
// Admin peut s'impersonifier via le header X-As-User
|
|
if let Some(as_user_id) = req
|
|
.headers()
|
|
.get("X-As-User")
|
|
.and_then(|v| v.to_str().ok())
|
|
.and_then(|v| uuid::Uuid::parse_str(v).ok())
|
|
{
|
|
req.extensions_mut().insert(AuthUser { user_id: as_user_id });
|
|
}
|
|
}
|
|
|
|
req.extensions_mut().insert(scope);
|
|
Ok(next.run(req).await)
|
|
}
|
|
|
|
fn bearer_token(req: &Request) -> Option<&str> {
|
|
req.headers()
|
|
.get(AUTHORIZATION)
|
|
.and_then(|value| value.to_str().ok())
|
|
.and_then(|value| value.strip_prefix("Bearer "))
|
|
}
|
|
|
|
async fn authenticate(state: &AppState, token: &str) -> Result<Scope, ApiError> {
|
|
if token == state.bootstrap_token.as_ref() {
|
|
return Ok(Scope::Admin);
|
|
}
|
|
|
|
let prefix = parse_prefix(token).ok_or_else(|| ApiError::unauthorized("invalid token format"))?;
|
|
|
|
let maybe_row = sqlx::query(
|
|
r#"
|
|
SELECT id, token_hash, scope, user_id FROM api_tokens
|
|
WHERE prefix = $1 AND revoked_at IS NULL AND (expires_at IS NULL OR expires_at > NOW())
|
|
"#,
|
|
)
|
|
.bind(prefix)
|
|
.fetch_optional(&state.pool)
|
|
.await?;
|
|
|
|
let row = maybe_row.ok_or_else(|| ApiError::unauthorized("invalid token"))?;
|
|
|
|
let token_hash: String = row.try_get("token_hash").map_err(|_| ApiError::unauthorized("invalid token"))?;
|
|
let parsed_hash = PasswordHash::new(&token_hash).map_err(|_| ApiError::unauthorized("invalid token"))?;
|
|
|
|
Argon2::default()
|
|
.verify_password(token.as_bytes(), &parsed_hash)
|
|
.map_err(|_| ApiError::unauthorized("invalid token"))?;
|
|
|
|
let token_id: uuid::Uuid = row.try_get("id").map_err(|_| ApiError::unauthorized("invalid token"))?;
|
|
sqlx::query("UPDATE api_tokens SET last_used_at = $1 WHERE id = $2")
|
|
.bind(Utc::now())
|
|
.bind(token_id)
|
|
.execute(&state.pool)
|
|
.await?;
|
|
|
|
let scope: String = row.try_get("scope").map_err(|_| ApiError::unauthorized("invalid token"))?;
|
|
match scope.as_str() {
|
|
"admin" => Ok(Scope::Admin),
|
|
"read" => {
|
|
let user_id: uuid::Uuid = row
|
|
.try_get("user_id")
|
|
.map_err(|_| ApiError::unauthorized("read token missing user_id"))?;
|
|
Ok(Scope::Read { user_id })
|
|
}
|
|
_ => Err(ApiError::unauthorized("invalid token scope")),
|
|
}
|
|
}
|
|
|
|
fn parse_prefix(token: &str) -> Option<&str> {
|
|
// Format: stl_{8-char prefix}_{secret}
|
|
// Base64 URL_SAFE peut contenir '_', donc on ne peut pas splitter aveuglément
|
|
let rest = token.strip_prefix("stl_")?;
|
|
if rest.len() < 10 {
|
|
// 8 (prefix) + 1 ('_') + 1 (secret min)
|
|
return None;
|
|
}
|
|
let prefix = &rest[..8];
|
|
if rest.as_bytes().get(8) != Some(&b'_') {
|
|
return None;
|
|
}
|
|
Some(prefix)
|
|
}
|