1
0
Fork 0
vaultwarden-test/src/api/core/mod.rs

214 Zeilen
5,2 KiB
Rust

2018-02-10 01:00:55 +01:00
mod accounts;
mod ciphers;
mod folders;
mod organizations;
pub(crate) mod two_factor;
2018-02-10 01:00:55 +01:00
use self::accounts::*;
use self::ciphers::*;
use self::folders::*;
use self::organizations::*;
2018-02-10 01:00:55 +01:00
use self::two_factor::*;
pub fn routes() -> Vec<Route> {
routes![
register,
profile,
post_profile,
get_public_keys,
2018-02-10 01:00:55 +01:00
post_keys,
post_password,
post_sstamp,
post_email_token,
2018-02-10 01:00:55 +01:00
post_email,
delete_account,
revision_date,
password_hint,
2018-02-10 01:00:55 +01:00
sync,
get_ciphers,
get_cipher,
get_cipher_admin,
get_cipher_details,
2018-02-10 01:00:55 +01:00
post_ciphers,
post_ciphers_admin,
2018-02-10 01:00:55 +01:00
post_ciphers_import,
post_attachment,
2018-07-14 08:09:20 +02:00
post_attachment_admin,
post_attachment_share,
delete_attachment_post,
2018-07-14 08:09:20 +02:00
delete_attachment_post_admin,
2018-02-10 01:00:55 +01:00
delete_attachment,
post_cipher_admin,
2018-05-14 17:13:59 +02:00
post_cipher_share,
put_cipher_share,
2018-02-10 01:00:55 +01:00
post_cipher,
put_cipher,
delete_cipher_post,
2018-07-01 13:43:11 +02:00
delete_cipher_post_admin,
delete_cipher,
delete_cipher_selected,
2018-08-03 16:01:01 +02:00
delete_cipher_selected_post,
2018-02-10 01:00:55 +01:00
delete_all,
2018-04-19 16:32:11 +02:00
move_cipher_selected,
move_cipher_selected_put,
2018-02-10 01:00:55 +01:00
get_folders,
get_folder,
post_folders,
post_folder,
put_folder,
delete_folder_post,
delete_folder,
get_twofactor,
get_recover,
recover,
disable_twofactor,
disable_twofactor_put,
2018-02-10 01:00:55 +01:00
generate_authenticator,
activate_authenticator,
activate_authenticator_put,
generate_u2f,
activate_u2f,
2018-02-10 01:00:55 +01:00
2018-04-20 18:35:11 +02:00
get_organization,
create_organization,
2018-04-25 00:34:40 +02:00
delete_organization,
leave_organization,
get_user_collections,
get_org_collections,
2018-04-20 18:35:11 +02:00
get_org_collection_detail,
2018-04-25 00:34:40 +02:00
get_collection_users,
2018-04-20 18:35:11 +02:00
post_organization,
post_organization_collections,
post_organization_collection_delete_user,
2018-04-20 18:35:11 +02:00
post_organization_collection_update,
2018-05-17 00:05:50 +02:00
post_organization_collection_delete,
post_collections_update,
2018-05-09 12:55:05 +02:00
post_collections_admin,
get_org_details,
get_org_users,
send_invite,
confirm_invite,
2018-04-25 00:34:40 +02:00
get_user,
edit_user,
delete_user,
2018-02-10 01:00:55 +01:00
clear_device_token,
put_device_token,
get_eq_domains,
2018-04-20 18:35:11 +02:00
post_eq_domains,
2018-02-10 01:00:55 +01:00
]
}
///
/// Move this somewhere else
///
use rocket::Route;
2018-06-01 15:08:03 +02:00
use rocket_contrib::{Json, Value};
2018-02-10 01:00:55 +01:00
use db::DbConn;
2018-06-01 15:08:03 +02:00
use db::models::*;
2018-02-10 01:00:55 +01:00
use api::{JsonResult, EmptyResult, JsonUpcase};
2018-02-10 01:00:55 +01:00
use auth::Headers;
2018-06-01 15:08:03 +02:00
#[put("/devices/identifier/<uuid>/clear-token", data = "<data>")]
fn clear_device_token(uuid: String, data: Json<Value>, headers: Headers, conn: DbConn) -> EmptyResult {
2018-07-04 14:27:47 +02:00
let _data: Value = data.into_inner();
2018-06-01 15:08:03 +02:00
let device = match Device::find_by_uuid(&uuid, &conn) {
Some(device) => device,
None => err!("Device not found")
};
if device.user_uuid != headers.user.uuid {
err!("Device not owned by user")
}
device.delete(&conn);
Ok(())
}
2018-02-10 01:00:55 +01:00
2018-06-01 15:08:03 +02:00
#[put("/devices/identifier/<uuid>/token", data = "<data>")]
fn put_device_token(uuid: String, data: Json<Value>, headers: Headers, conn: DbConn) -> JsonResult {
2018-07-04 14:27:47 +02:00
let _data: Value = data.into_inner();
2018-06-01 15:08:03 +02:00
let device = match Device::find_by_uuid(&uuid, &conn) {
Some(device) => device,
None => err!("Device not found")
};
if device.user_uuid != headers.user.uuid {
err!("Device not owned by user")
}
// TODO: What does this do?
err!("Not implemented")
}
2018-02-10 01:00:55 +01:00
2018-02-17 23:21:04 +01:00
#[derive(Serialize, Deserialize, Debug)]
#[allow(non_snake_case)]
struct GlobalDomain {
Type: i32,
Domains: Vec<String>,
Excluded: bool,
}
const GLOBAL_DOMAINS: &str = include_str!("global_domains.json");
2018-02-17 23:21:04 +01:00
2018-02-10 01:00:55 +01:00
#[get("/settings/domains")]
2018-02-20 14:09:00 +01:00
fn get_eq_domains(headers: Headers) -> JsonResult {
2018-02-17 23:21:04 +01:00
let user = headers.user;
use serde_json::from_str;
let equivalent_domains: Vec<Vec<String>> = from_str(&user.equivalent_domains).unwrap();
let excluded_globals: Vec<i32> = from_str(&user.excluded_globals).unwrap();
let mut globals: Vec<GlobalDomain> = from_str(GLOBAL_DOMAINS).unwrap();
for global in &mut globals {
global.Excluded = excluded_globals.contains(&global.Type);
}
Ok(Json(json!({
"EquivalentDomains": equivalent_domains,
2018-02-20 14:09:00 +01:00
"GlobalEquivalentDomains": globals,
"Object": "domains",
2018-02-17 23:21:04 +01:00
})))
2018-02-10 01:00:55 +01:00
}
#[derive(Deserialize, Debug)]
#[allow(non_snake_case)]
struct EquivDomainData {
ExcludedGlobalEquivalentDomains: Option<Vec<i32>>,
EquivalentDomains: Option<Vec<Vec<String>>>,
}
#[post("/settings/domains", data = "<data>")]
fn post_eq_domains(data: JsonUpcase<EquivDomainData>, headers: Headers, conn: DbConn) -> EmptyResult {
let data: EquivDomainData = data.into_inner().data;
let excluded_globals = data.ExcludedGlobalEquivalentDomains.unwrap_or_default();
let equivalent_domains = data.EquivalentDomains.unwrap_or_default();
2018-02-17 23:21:04 +01:00
let mut user = headers.user;
use serde_json::to_string;
2018-02-17 23:21:04 +01:00
user.excluded_globals = to_string(&excluded_globals).unwrap_or("[]".to_string());
user.equivalent_domains = to_string(&equivalent_domains).unwrap_or("[]".to_string());
user.save(&conn);
Ok(())
2018-02-10 01:00:55 +01:00
}