use std::collections::HashMap; use std::sync::Arc; use hyper::{Body, Request, Response, StatusCode}; use serde::{Deserialize, Serialize}; use garage_table::*; use garage_model::garage::Garage; use garage_model::key_table::*; use crate::admin::error::*; use crate::helpers::{json_ok_response, parse_json_body}; pub async fn handle_list_keys(garage: &Arc) -> Result, Error> { let res = garage .key_table .get_range( &EmptyKey, None, Some(KeyFilter::Deleted(DeletedFilter::NotDeleted)), 10000, EnumerationOrder::Forward, ) .await? .iter() .map(|k| ListKeyResultItem { id: k.key_id.to_string(), name: k.params().unwrap().name.get().clone(), }) .collect::>(); Ok(json_ok_response(&res)?) } #[derive(Serialize)] #[serde(rename_all = "camelCase")] struct ListKeyResultItem { id: String, name: String, } pub async fn handle_get_key_info( garage: &Arc, id: Option, search: Option, ) -> Result, Error> { let key = if let Some(id) = id { garage.key_helper().get_existing_key(&id).await? } else if let Some(search) = search { garage .key_helper() .get_existing_matching_key(&search) .await? } else { unreachable!(); }; key_info_results(garage, key).await } pub async fn handle_create_key( garage: &Arc, req: Request, ) -> Result, Error> { let req = parse_json_body::(req).await?; let key = Key::new(&req.name); garage.key_table.insert(&key).await?; key_info_results(garage, key).await } #[derive(Deserialize)] #[serde(rename_all = "camelCase")] struct CreateKeyRequest { name: String, } pub async fn handle_import_key( garage: &Arc, req: Request, ) -> Result, Error> { let req = parse_json_body::(req).await?; let prev_key = garage.key_table.get(&EmptyKey, &req.access_key_id).await?; if prev_key.is_some() { return Err(Error::KeyAlreadyExists(req.access_key_id.to_string())); } let imported_key = Key::import(&req.access_key_id, &req.secret_access_key, &req.name); garage.key_table.insert(&imported_key).await?; key_info_results(garage, imported_key).await } #[derive(Deserialize)] #[serde(rename_all = "camelCase")] struct ImportKeyRequest { access_key_id: String, secret_access_key: String, name: String, } pub async fn handle_update_key( garage: &Arc, id: String, req: Request, ) -> Result, Error> { let req = parse_json_body::(req).await?; let mut key = garage.key_helper().get_existing_key(&id).await?; let key_state = key.state.as_option_mut().unwrap(); if let Some(new_name) = req.name { key_state.name.update(new_name); } if let Some(allow) = req.allow { if allow.create_bucket { key_state.allow_create_bucket.update(true); } } if let Some(deny) = req.deny { if deny.create_bucket { key_state.allow_create_bucket.update(false); } } garage.key_table.insert(&key).await?; key_info_results(garage, key).await } #[derive(Deserialize)] #[serde(rename_all = "camelCase")] struct UpdateKeyRequest { name: Option, allow: Option, deny: Option, } pub async fn handle_delete_key(garage: &Arc, id: String) -> Result, Error> { let mut key = garage.key_helper().get_existing_key(&id).await?; key.state.as_option().unwrap(); garage.key_helper().delete_key(&mut key).await?; Ok(Response::builder() .status(StatusCode::NO_CONTENT) .body(Body::empty())?) } async fn key_info_results(garage: &Arc, key: Key) -> Result, Error> { let mut relevant_buckets = HashMap::new(); let key_state = key.state.as_option().unwrap(); for id in key_state .authorized_buckets .items() .iter() .map(|(id, _)| id) .chain( key_state .local_aliases .items() .iter() .filter_map(|(_, _, v)| v.as_ref()), ) { if !relevant_buckets.contains_key(id) { if let Some(b) = garage.bucket_table.get(&EmptyKey, id).await? { if b.state.as_option().is_some() { relevant_buckets.insert(*id, b); } } } } let res = GetKeyInfoResult { name: key_state.name.get().clone(), access_key_id: key.key_id.clone(), secret_access_key: key_state.secret_key.clone(), permissions: KeyPerm { create_bucket: *key_state.allow_create_bucket.get(), }, buckets: relevant_buckets .into_values() .map(|bucket| { let state = bucket.state.as_option().unwrap(); KeyInfoBucketResult { id: hex::encode(bucket.id), global_aliases: state .aliases .items() .iter() .filter(|(_, _, a)| *a) .map(|(n, _, _)| n.to_string()) .collect::>(), local_aliases: state .local_aliases .items() .iter() .filter(|((k, _), _, a)| *a && *k == key.key_id) .map(|((_, n), _, _)| n.to_string()) .collect::>(), permissions: key_state .authorized_buckets .get(&bucket.id) .map(|p| ApiBucketKeyPerm { read: p.allow_read, write: p.allow_write, owner: p.allow_owner, }) .unwrap_or_default(), } }) .collect::>(), }; Ok(json_ok_response(&res)?) } #[derive(Serialize)] #[serde(rename_all = "camelCase")] struct GetKeyInfoResult { name: String, access_key_id: String, secret_access_key: String, permissions: KeyPerm, buckets: Vec, } #[derive(Serialize, Deserialize)] #[serde(rename_all = "camelCase")] struct KeyPerm { #[serde(default)] create_bucket: bool, } #[derive(Serialize)] #[serde(rename_all = "camelCase")] struct KeyInfoBucketResult { id: String, global_aliases: Vec, local_aliases: Vec, permissions: ApiBucketKeyPerm, } #[derive(Serialize, Deserialize, Default)] #[serde(rename_all = "camelCase")] pub(crate) struct ApiBucketKeyPerm { #[serde(default)] pub(crate) read: bool, #[serde(default)] pub(crate) write: bool, #[serde(default)] pub(crate) owner: bool, }