Skip to content

Commit 9edb933

Browse files
committed
Add HTTP User Detail extension
This adds functionality to unFTP that allows unFTP to obtain user detail over HTTP in addition to the already existing JSON file. It uses the extact same format as the JSON file functionality. The 'usr-http-url' command line arguments activate this feature. You pass it a base URL, unFTP appends a username to it and performs a GET request to the URL. The HTTP server should respond with a 200 OK and JSON body containing an array of users which should at least contain the requested user's details. Later on we can support diffent HTTP verbs and sending the username via an HTTP header instead of the URL path or Post body. For now I'm just keeping it simple.
1 parent 16a0b65 commit 9edb933

File tree

10 files changed

+243
-102
lines changed

10 files changed

+243
-102
lines changed

.github/workflows/rust.yml

+36-36
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ on:
2222
branches:
2323
- master
2424
release:
25-
types: [created]
25+
types: [ created ]
2626

2727
jobs:
2828

@@ -47,20 +47,20 @@ jobs:
4747
runs-on: ubuntu-latest
4848
if: ${{ github.ref != 'refs/heads/master' }}
4949
steps:
50-
- name: Checkout code
51-
uses: actions/checkout@v3
52-
- name: Install Rust toolchain
53-
uses: actions-rs/toolchain@v1
54-
with:
55-
toolchain: ${{ env.RUST_VERSION }}
56-
override: true
57-
default: true
58-
components: rustfmt
59-
- name: Check formatting
60-
uses: actions-rs/cargo@v1
61-
with:
62-
command: fmt
63-
args: --all -- --check
50+
- name: Checkout code
51+
uses: actions/checkout@v3
52+
- name: Install Rust toolchain
53+
uses: actions-rs/toolchain@v1
54+
with:
55+
toolchain: ${{ env.RUST_VERSION }}
56+
override: true
57+
default: true
58+
components: rustfmt
59+
- name: Check formatting
60+
uses: actions-rs/cargo@v1
61+
with:
62+
command: fmt
63+
args: --all -- --check
6464

6565
clippy:
6666
name: Run Clippy
@@ -84,24 +84,24 @@ jobs:
8484
args: --all-features --workspace -- -D warnings
8585

8686
test:
87-
name: Run Tests
88-
runs-on: ubuntu-latest
89-
steps:
90-
- name: Checkout sources
91-
uses: actions/checkout@v3
92-
- name: Install rust toolchain
93-
uses: actions-rs/toolchain@v1
94-
with:
95-
toolchain: ${{ env.RUST_VERSION }}
96-
override: true
97-
default: true
98-
components: clippy
99-
- name: Install build dependencies
100-
run: sudo apt-get update && sudo apt-get install -y libpam-dev
101-
- name: Run tests
102-
run: cargo test --verbose --workspace --all --all-features
103-
- name: Build Docs
104-
run: cargo doc --all-features --workspace --no-deps
87+
name: Run Tests
88+
runs-on: ubuntu-latest
89+
steps:
90+
- name: Checkout sources
91+
uses: actions/checkout@v3
92+
- name: Install rust toolchain
93+
uses: actions-rs/toolchain@v1
94+
with:
95+
toolchain: ${{ env.RUST_VERSION }}
96+
override: true
97+
default: true
98+
components: clippy
99+
- name: Install build dependencies
100+
run: sudo apt-get update && sudo apt-get install -y libpam-dev
101+
- name: Run tests
102+
run: cargo test --verbose --workspace --all --all-features
103+
- name: Build Docs
104+
run: cargo doc --all-features --workspace --no-deps
105105

106106
build-linux-gnu:
107107
runs-on: ubuntu-latest
@@ -244,7 +244,7 @@ jobs:
244244
target: ${{ env.target }}
245245
- name: Install Rosetta
246246
if: runner.os == 'macOS' && runner.arch == 'arm64'
247-
run: softwareupdate --install-rosetta
247+
run: softwareupdate --install-rosetta --agree-to-license
248248
- name: Build
249249
run: cargo build --release --target=${{ env.target }} --features rest_auth,jsonfile_auth,cloud_storage
250250
- name: Rename
@@ -255,7 +255,7 @@ jobs:
255255
name: unftp_${{ env.target }}
256256
path: target/${{ env.target }}/release/unftp_${{ env.target }}
257257

258-
upload-release-binaries:
258+
upload-release-binaries:
259259
if: ${{ github.event_name == 'release' }} # Testing: if: ${{ github.ref == 'refs/heads/hannes/upload' }}
260260
runs-on: ubuntu-latest
261261
strategy:
@@ -329,7 +329,7 @@ jobs:
329329
run: chmod +x ./x86_64-unknown-linux-musl/unftp_x86_64-unknown-linux-musl
330330

331331
- name: Build Docker image
332-
run: docker build -t bolcom/unftp:${{ env.BUILD_VERSION }}-scratch -f packaging/docker/scratch.Dockerfile.ci .
332+
run: docker build -t bolcom/unftp:${{ env.BUILD_VERSION }}-scratch -f packaging/docker/scratch.Dockerfile.ci .
333333

334334
- name: Save Docker image as tar
335335
run: docker save -o docker-image-scratch.tar bolcom/unftp:${{ env.BUILD_VERSION }}-scratch

Cargo.lock

+9-8
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

+1
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ unftp-auth-rest = { version = "0.2.4", optional = true }
5252
unftp-auth-jsonfile = { version = "0.3.3", optional = true }
5353
unftp-sbe-rooter = "0.2.0"
5454
unftp-sbe-restrict = "0.1.1"
55+
url = "2.5.0"
5556

5657
[target.'cfg(unix)'.dependencies]
5758
unftp-auth-pam = { version = "0.2.4", optional = true }

src/args.rs

+9
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ pub const REDIS_PORT: &str = "log-redis-port";
4242
pub const ROOT_DIR: &str = "root-dir";
4343
pub const STORAGE_BACKEND_TYPE: &str = "sbe-type";
4444
pub const USR_JSON_PATH: &str = "usr-json-path";
45+
pub const USR_HTTP_URL: &str = "usr-http-url";
4546
pub const VERBOSITY: &str = "verbosity";
4647

4748
#[derive(ArgEnum, Clone, Debug)]
@@ -502,6 +503,14 @@ pub(crate) fn clap_app(tmp_dir: &str) -> clap::Command {
502503
.env("UNFTP_USR_JSON_PATH")
503504
.takes_value(true),
504505
)
506+
.arg(
507+
Arg::new(USR_HTTP_URL)
508+
.long("usr-http-url")
509+
.value_name("URL")
510+
.help("The URL to fetch user details from via a GET request. The username will be appended to this path.")
511+
.env("UNFTP_USR_HTTP_URL")
512+
.takes_value(true),
513+
)
505514
.arg(
506515
Arg::new(PUBSUB_BASE_URL)
507516
.long("ntf-pubsub-base-url")

src/auth.rs

+8-8
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
use crate::domain::user::{User, UserDetailProvider};
1+
use crate::domain::user::{User, UserDetailError, UserDetailProvider};
22
use async_trait::async_trait;
33
use libunftp::auth::{AuthenticationError, Credentials, DefaultUser};
44

@@ -32,11 +32,10 @@ impl libunftp::auth::Authenticator<User> for LookupAuthenticator {
3232
) -> Result<User, AuthenticationError> {
3333
self.inner.authenticate(username, creds).await?;
3434
let user_provider = self.usr_detail.as_ref().unwrap();
35-
if let Some(user) = user_provider.provide_user_detail(username) {
36-
Ok(user)
37-
} else {
38-
Ok(User::with_defaults(username))
39-
}
35+
Ok(user_provider
36+
.provide_user_detail(username)
37+
.await
38+
.map_err(|e| AuthenticationError::with_source("error getting user detail", e))?)
4039
}
4140

4241
async fn cert_auth_sufficient(&self, username: &str) -> bool {
@@ -47,8 +46,9 @@ impl libunftp::auth::Authenticator<User> for LookupAuthenticator {
4746
#[derive(Debug)]
4847
pub struct DefaultUserProvider {}
4948

49+
#[async_trait]
5050
impl UserDetailProvider for DefaultUserProvider {
51-
fn provide_user_detail(&self, username: &str) -> Option<User> {
52-
Some(User::with_defaults(username))
51+
async fn provide_user_detail(&self, username: &str) -> Result<User, UserDetailError> {
52+
Ok(User::with_defaults(username))
5353
}
5454
}

src/domain/user.rs

+42-3
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
1+
//! Contains definitions pertaining to FTP User Detail
2+
use async_trait::async_trait;
13
use libunftp::auth::UserDetail;
2-
use std::fmt::{Debug, Display, Formatter};
3-
use std::path::PathBuf;
4+
use slog::error;
5+
use std::{
6+
fmt::{Debug, Display, Formatter},
7+
path::PathBuf,
8+
};
9+
use thiserror::Error;
410
use unftp_sbe_restrict::{UserWithPermissions, VfsOperations};
511
use unftp_sbe_rooter::UserWithRoot;
612

@@ -64,6 +70,39 @@ impl UserWithPermissions for User {
6470

6571
/// Implementation of UserDetailProvider can look up and provide FTP user account details from
6672
/// a source.
73+
#[async_trait]
6774
pub trait UserDetailProvider: Debug {
68-
fn provide_user_detail(&self, username: &str) -> Option<User>;
75+
/// This will do the lookup. An error is returned if the user was not found or something else
76+
/// went wrong.
77+
async fn provide_user_detail(&self, username: &str) -> Result<User, UserDetailError>;
78+
}
79+
80+
/// The error type returned by [`UserDetailProvider`]
81+
#[derive(Debug, Error)]
82+
pub enum UserDetailError {
83+
#[error("{0}")]
84+
Generic(String),
85+
#[error("user '{username:?}' not found")]
86+
UserNotFound { username: String },
87+
#[error("error getting user details: {0}: {1:?}")]
88+
ImplPropagated(
89+
String,
90+
#[source] Option<Box<dyn std::error::Error + Send + Sync + 'static>>,
91+
),
92+
}
93+
94+
impl UserDetailError {
95+
/// Creates a new domain specific error
96+
#[allow(dead_code)]
97+
pub fn new(s: impl Into<String>) -> Self {
98+
UserDetailError::ImplPropagated(s.into(), None)
99+
}
100+
101+
/// Creates a new domain specific error with the given source error.
102+
pub fn with_source<E>(s: impl Into<String>, source: E) -> Self
103+
where
104+
E: std::error::Error + Send + Sync + 'static,
105+
{
106+
UserDetailError::ImplPropagated(s.into(), Some(Box::new(source)))
107+
}
69108
}

src/infra/mod.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
//! Infra contains infrastructure specific implementations of things in the [`domain`](crate::domain)
22
//! module.
33
mod pubsub;
4-
mod workload_identity;
5-
4+
pub mod userdetail_http;
65
pub mod usrdetail_json;
6+
mod workload_identity;
77

88
pub use pubsub::PubsubEventDispatcher;

src/infra/userdetail_http.rs

+69
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
//! A libunftp [`UserDetail`](libunftp::auth::user::UserDetail) provider that obtains user detail
2+
//! over HTTP.
3+
4+
use crate::domain::user::{User, UserDetailError, UserDetailProvider};
5+
use crate::infra::usrdetail_json::JsonUserProvider;
6+
use async_trait::async_trait;
7+
use http::{Method, Request};
8+
use hyper::{Body, Client};
9+
use url::form_urlencoded;
10+
11+
/// A libunftp [`UserDetail`](libunftp::auth::user::UserDetail) provider that obtains user detail
12+
/// over HTTP.
13+
#[derive(Debug)]
14+
pub struct HTTPUserDetailProvider {
15+
url: String,
16+
#[allow(dead_code)]
17+
header_name: Option<String>,
18+
}
19+
20+
impl HTTPUserDetailProvider {
21+
/// Creates a provider that will obtain user detail from the specified URL.
22+
pub fn new(url: impl Into<String>) -> HTTPUserDetailProvider {
23+
HTTPUserDetailProvider {
24+
url: url.into(),
25+
header_name: None,
26+
}
27+
}
28+
}
29+
30+
impl Default for HTTPUserDetailProvider {
31+
fn default() -> Self {
32+
HTTPUserDetailProvider {
33+
url: "http://localhost:8080/users/".to_string(),
34+
header_name: None,
35+
}
36+
}
37+
}
38+
39+
#[async_trait]
40+
impl UserDetailProvider for HTTPUserDetailProvider {
41+
async fn provide_user_detail(&self, username: &str) -> Result<User, UserDetailError> {
42+
let _url_suffix: String = form_urlencoded::byte_serialize(username.as_bytes()).collect();
43+
let req = Request::builder()
44+
.method(Method::GET)
45+
.header("Content-type", "application/json")
46+
.uri(format!("{}{}", self.url, username))
47+
.body(Body::empty())
48+
.map_err(|e| UserDetailError::with_source("error creating request", e))?;
49+
50+
let client = Client::new();
51+
52+
let resp = client
53+
.request(req)
54+
.await
55+
.map_err(|e| UserDetailError::with_source("error doing HTTP request", e))?;
56+
57+
let body_bytes = hyper::body::to_bytes(resp.into_body())
58+
.await
59+
.map_err(|e| UserDetailError::with_source("error parsing body", e))?;
60+
61+
let json_str = std::str::from_utf8(body_bytes.as_ref())
62+
.map_err(|e| UserDetailError::with_source("body is not a valid UTF string", e))?;
63+
64+
let json_usr_provider =
65+
JsonUserProvider::from_json(json_str).map_err(UserDetailError::Generic)?;
66+
67+
json_usr_provider.provide_user_detail(username).await
68+
}
69+
}

0 commit comments

Comments
 (0)