PluralKit/crates/api/src/middleware/auth.rs

63 lines
1.8 KiB
Rust
Raw Normal View History

use axum::{
extract::{Request, State},
2025-04-26 12:03:00 +00:00
http::StatusCode,
middleware::Next,
response::Response,
};
2025-05-17 20:39:29 +00:00
use tracing::error;
2025-05-17 20:39:29 +00:00
use crate::auth::AuthState;
2025-04-26 12:03:00 +00:00
use crate::{util::json_err, ApiContext};
2025-05-17 20:39:29 +00:00
pub async fn auth(State(ctx): State<ApiContext>, mut req: Request, next: Next) -> Response {
2025-04-26 12:03:00 +00:00
let mut authed_system_id: Option<i32> = None;
let mut authed_app_id: Option<i32> = None;
// fetch user authorization
2025-05-17 20:39:29 +00:00
if let Some(system_auth_header) = req
.headers()
.get("authorization")
.map(|h| h.to_str().ok())
2025-04-26 12:03:00 +00:00
.flatten()
&& let Some(system_id) =
match libpk::db::repository::legacy_token_auth(&ctx.db, system_auth_header).await {
Ok(val) => val,
Err(err) => {
error!(?err, "failed to query authorization token in postgres");
2025-04-26 12:03:00 +00:00
return json_err(
StatusCode::INTERNAL_SERVER_ERROR,
r#"{"message": "500: Internal Server Error", "code": 0}"#.to_string(),
);
}
}
2025-04-26 12:03:00 +00:00
{
authed_system_id = Some(system_id);
}
// fetch app authorization
// todo: actually fetch it from db
2025-05-17 20:39:29 +00:00
if let Some(app_auth_header) = req
.headers()
2025-04-26 12:03:00 +00:00
.get("x-pluralkit-app")
.map(|h| h.to_str().ok())
.flatten()
&& let Some(config_token2) = libpk::config
.api
.as_ref()
.expect("missing api config")
.temp_token2
.as_ref()
// this is NOT how you validate tokens
// but this is low abuse risk so we're keeping it for now
&& app_auth_header == config_token2
{
authed_app_id = Some(1);
}
2025-05-17 20:39:29 +00:00
req.extensions_mut()
.insert(AuthState::new(authed_system_id, authed_app_id));
2025-04-26 12:03:00 +00:00
2025-05-17 20:39:29 +00:00
next.run(req).await
}