1
use async_trait::async_trait;
2
use serde::{Deserialize, Serialize};
3

            
4
use crate::{
5
    admin::{group, role},
6
    connection::{Connection, SensitiveString},
7
    define_basic_unique_mapped_view,
8
    document::{CollectionDocument, Document, KeyId},
9
    permissions::Permissions,
10
    schema::{Collection, CollectionName, DefaultSerialization, NamedCollection, Schematic},
11
    Error, ENCRYPTION_ENABLED,
12
};
13

            
14
/// A user that can authenticate with `BonsaiDb`.
15
14697
#[derive(Debug, Serialize, Deserialize, Default)]
16
pub struct User {
17
    /// The name of the role. Must be unique.
18
    pub username: String,
19
    /// The IDs of the user groups this user belongs to.
20
    pub groups: Vec<u64>,
21
    /// The IDs of the roles this user has been assigned.
22
    pub roles: Vec<u64>,
23

            
24
    /// The user's stored password hash.
25
    ///
26
    /// This field is not feature gated to prevent losing stored passwords if
27
    /// the `password-hashing` feature is disabled and then re-enabled and user
28
    /// records are updated in the meantime.
29
    #[serde(default)]
30
    pub argon_hash: Option<SensitiveString>,
31
}
32

            
33
impl User {
34
    /// Returns a default user with the given username.
35
155
    pub fn default_with_username(username: impl Into<String>) -> Self {
36
155
        Self {
37
155
            username: username.into(),
38
155
            ..Self::default()
39
155
        }
40
155
    }
41

            
42
    /// Calculates the effective permissions based on the groups and roles this
43
    /// user is assigned.
44
5
    pub async fn effective_permissions<C: Connection>(
45
5
        &self,
46
5
        admin: &C,
47
5
    ) -> Result<Permissions, crate::Error> {
48
        // List all of the groups that this user belongs to because of role associations.
49
5
        let role_groups = if self.roles.is_empty() {
50
5
            Vec::default()
51
        } else {
52
            let roles = admin.get_multiple::<role::Role>(&self.groups).await?;
53
            let role_groups = roles
54
                .into_iter()
55
                .map(|doc| doc.contents::<role::Role>().map(|role| role.groups))
56
                .collect::<Result<Vec<Vec<u64>>, _>>()?;
57
            role_groups
58
                .into_iter()
59
                .flat_map(Vec::into_iter)
60
                .collect::<Vec<u64>>()
61
        };
62
        // Retrieve all of the groups.
63
5
        let groups = if role_groups.is_empty() {
64
5
            admin
65
5
                .get_multiple::<group::PermissionGroup>(&self.groups)
66
5
                .await?
67
        } else {
68
            let mut all_groups = role_groups;
69
            all_groups.extend(self.groups.iter().copied());
70
            all_groups.dedup();
71
            admin
72
                .get_multiple::<group::PermissionGroup>(&all_groups)
73
                .await?
74
        };
75

            
76
        // Combine the permissions from all the groups into one.
77
5
        let merged_permissions = Permissions::merged(
78
5
            groups
79
5
                .into_iter()
80
5
                .map(|group| {
81
2
                    group
82
2
                        .contents::<group::PermissionGroup>()
83
2
                        .map(|group| Permissions::from(group.statements))
84
5
                })
85
5
                .collect::<Result<Vec<_>, _>>()?
86
5
                .iter(),
87
5
        );
88
5

            
89
5
        Ok(merged_permissions)
90
5
    }
91
}
92

            
93
#[async_trait]
94
impl Collection for User {
95
40503
    fn encryption_key() -> Option<KeyId> {
96
40503
        if ENCRYPTION_ENABLED {
97
40503
            Some(KeyId::Master)
98
        } else {
99
            None
100
        }
101
40503
    }
102

            
103
130088
    fn collection_name() -> CollectionName {
104
130088
        CollectionName::new("khonsulabs", "user")
105
130088
    }
106

            
107
40503
    fn define_views(schema: &mut Schematic) -> Result<(), Error> {
108
40503
        schema.define_view(ByName)
109
40503
    }
110
}
111

            
112
impl DefaultSerialization for User {}
113

            
114
impl NamedCollection for User {
115
    type ByNameView = ByName;
116
}
117

            
118
define_basic_unique_mapped_view!(
119
    ByName,
120
    User,
121
    1,
122
    "by-name",
123
    String,
124
575
    |document: CollectionDocument<User>| { document.header.emit_key(document.contents.username) }
125
);