Merge branch 'backend-server'

This commit is contained in:
Ilion Beyst 2021-12-29 19:56:31 +01:00
commit 3eeaab6cec
27 changed files with 850 additions and 0 deletions

2
.gitignore vendored Normal file
View file

@ -0,0 +1,2 @@
target
Cargo.lock

View file

@ -3,4 +3,5 @@
members = [
"planetwars-rules",
"planetwars-cli",
"backend",
]

26
backend/Cargo.toml Normal file
View file

@ -0,0 +1,26 @@
[package]
name = "mozaic4-backend"
version = "0.0.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
tokio = { version = "1.15", features = ["full"] }
hyper = "0.14"
axum = { version = "0.4", features = ["json", "headers"] }
diesel = { version = "1.4.4", features = ["postgres", "chrono"] }
bb8 = "0.7"
bb8-diesel = "0.2"
dotenv = "0.15.0"
rust-argon2 = "0.8"
rand = "0.8.4"
serde = { version = "1.0", features = ["derive"] }
serde_bytes = "0.11"
chrono = { version = "0.4", features = ["serde"] }
serde_json = "1.0"
base64 = "0.13.0"
zip = "0.5"
[dev-dependencies]
parking_lot = "0.11"

2
backend/Rocket.toml Normal file
View file

@ -0,0 +1,2 @@
[debug.databases.postgresql_database]
url = "postgresql://planetwars:planetwars@localhost/planetwars"

5
backend/diesel.toml Normal file
View file

@ -0,0 +1,5 @@
# For documentation on how to configure this file,
# see diesel.rs/guides/configuring-diesel-cli
[print_schema]
file = "src/schema.rs"

View file

View file

@ -0,0 +1,6 @@
-- This file was automatically created by Diesel to setup helper functions
-- and other internal bookkeeping. This file is safe to edit, any future
-- changes will be added to existing projects as new migrations.
DROP FUNCTION IF EXISTS diesel_manage_updated_at(_tbl regclass);
DROP FUNCTION IF EXISTS diesel_set_updated_at();

View file

@ -0,0 +1,36 @@
-- This file was automatically created by Diesel to setup helper functions
-- and other internal bookkeeping. This file is safe to edit, any future
-- changes will be added to existing projects as new migrations.
-- Sets up a trigger for the given table to automatically set a column called
-- `updated_at` whenever the row is modified (unless `updated_at` was included
-- in the modified columns)
--
-- # Example
--
-- ```sql
-- CREATE TABLE users (id SERIAL PRIMARY KEY, updated_at TIMESTAMP NOT NULL DEFAULT NOW());
--
-- SELECT diesel_manage_updated_at('users');
-- ```
CREATE OR REPLACE FUNCTION diesel_manage_updated_at(_tbl regclass) RETURNS VOID AS $$
BEGIN
EXECUTE format('CREATE TRIGGER set_updated_at BEFORE UPDATE ON %s
FOR EACH ROW EXECUTE PROCEDURE diesel_set_updated_at()', _tbl);
END;
$$ LANGUAGE plpgsql;
CREATE OR REPLACE FUNCTION diesel_set_updated_at() RETURNS trigger AS $$
BEGIN
IF (
NEW IS DISTINCT FROM OLD AND
NEW.updated_at IS NOT DISTINCT FROM OLD.updated_at
) THEN
NEW.updated_at := current_timestamp;
END IF;
RETURN NEW;
END;
$$ LANGUAGE plpgsql;

View file

@ -0,0 +1,2 @@
DROP INDEX users_username_index
DROP TABLE users;

View file

@ -0,0 +1,8 @@
CREATE TABLE users(
id SERIAL PRIMARY KEY,
username VARCHAR(52) NOT NULL,
password_salt BYTEA NOT NULL,
password_hash BYTEA NOT NULL
);
CREATE UNIQUE INDEX users_username_index ON users(username);

View file

@ -0,0 +1 @@
DROP TABLE sessions;

View file

@ -0,0 +1,5 @@
CREATE TABLE sessions (
id serial PRIMARY KEY,
user_id integer REFERENCES users(id) NOT NULL,
token VARCHAR(255) NOT NULL UNIQUE
)

View file

@ -0,0 +1,3 @@
DROP TABLE code_bundles;
DROP INDEX bots_index;
DROP TABLE bots;

View file

@ -0,0 +1,14 @@
CREATE TABLE bots (
id serial PRIMARY KEY,
owner_id integer REFERENCES users(id) NOT NULL,
name text NOT NULL
);
CREATE UNIQUE INDEX bots_index ON bots(owner_id, name);
CREATE TABLE code_bundles (
id serial PRIMARY KEY,
bot_id integer REFERENCES bots(id) NOT NULL,
path text NOT NULL,
created_at timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP
);

53
backend/src/db/bots.rs Normal file
View file

@ -0,0 +1,53 @@
use diesel::prelude::*;
use serde::{Deserialize, Serialize};
use crate::schema::{bots, code_bundles};
use chrono;
#[derive(Insertable)]
#[table_name = "bots"]
pub struct NewBot<'a> {
pub owner_id: i32,
pub name: &'a str,
}
#[derive(Queryable, Debug, PartialEq, Serialize, Deserialize)]
pub struct Bot {
pub id: i32,
pub owner_id: i32,
pub name: String,
}
pub fn create_bot(new_bot: &NewBot, conn: &PgConnection) -> QueryResult<Bot> {
diesel::insert_into(bots::table)
.values(new_bot)
.get_result(conn)
}
pub fn find_bot(id: i32, conn: &PgConnection) -> QueryResult<Bot> {
bots::table.find(id).first(conn)
}
#[derive(Insertable)]
#[table_name = "code_bundles"]
pub struct NewCodeBundle<'a> {
pub bot_id: i32,
pub path: &'a str,
}
#[derive(Queryable, Serialize, Deserialize, Debug)]
pub struct CodeBundle {
pub id: i32,
pub bot_id: i32,
pub path: String,
pub created_at: chrono::NaiveDateTime,
}
pub fn create_code_bundle(
new_code_bundle: &NewCodeBundle,
conn: &PgConnection,
) -> QueryResult<CodeBundle> {
diesel::insert_into(code_bundles::table)
.values(new_code_bundle)
.get_result(conn)
}

3
backend/src/db/mod.rs Normal file
View file

@ -0,0 +1,3 @@
pub mod bots;
pub mod sessions;
pub mod users;

View file

@ -0,0 +1,46 @@
use super::users::User;
use crate::schema::{sessions, users};
use base64;
use diesel::PgConnection;
use diesel::{insert_into, prelude::*, Insertable, RunQueryDsl};
use rand::{self, Rng};
#[derive(Insertable)]
#[table_name = "sessions"]
struct NewSession {
token: String,
user_id: i32,
}
#[derive(Queryable, Debug, PartialEq)]
pub struct Session {
pub id: i32,
pub user_id: i32,
pub token: String,
}
pub fn create_session(user: &User, conn: &PgConnection) -> Session {
let new_session = NewSession {
token: gen_session_token(),
user_id: user.id,
};
let session = insert_into(sessions::table)
.values(&new_session)
.get_result::<Session>(conn)
.unwrap();
return session;
}
pub fn find_user_by_session(token: &str, conn: &PgConnection) -> QueryResult<(Session, User)> {
sessions::table
.inner_join(users::table)
.filter(sessions::token.eq(&token))
.first::<(Session, User)>(conn)
}
pub fn gen_session_token() -> String {
let mut rng = rand::thread_rng();
let token: [u8; 32] = rng.gen();
return base64::encode(&token);
}

108
backend/src/db/users.rs Normal file
View file

@ -0,0 +1,108 @@
use crate::schema::users;
use argon2;
use diesel::{prelude::*, PgConnection};
use rand::Rng;
use serde::{Deserialize, Serialize};
#[derive(Debug, Deserialize)]
pub struct Credentials<'a> {
pub username: &'a str,
pub password: &'a str,
}
#[derive(Insertable)]
#[table_name = "users"]
pub struct NewUser<'a> {
pub username: &'a str,
pub password_hash: &'a [u8],
pub password_salt: &'a [u8],
}
#[derive(Queryable, Debug)]
pub struct User {
pub id: i32,
pub username: String,
pub password_salt: Vec<u8>,
pub password_hash: Vec<u8>,
}
// TODO: make this configurable somewhere
fn argon2_config() -> argon2::Config<'static> {
argon2::Config {
variant: argon2::Variant::Argon2i,
version: argon2::Version::Version13,
mem_cost: 4096,
time_cost: 3,
lanes: 1,
thread_mode: argon2::ThreadMode::Sequential,
// TODO: set a secret
secret: &[],
ad: &[],
hash_length: 32,
}
}
pub fn create_user(credentials: &Credentials, conn: &PgConnection) -> QueryResult<User> {
let argon_config = argon2_config();
let salt: [u8; 32] = rand::thread_rng().gen();
let hash = argon2::hash_raw(credentials.password.as_bytes(), &salt, &argon_config).unwrap();
let new_user = NewUser {
username: &credentials.username,
password_salt: &salt,
password_hash: &hash,
};
diesel::insert_into(users::table)
.values(&new_user)
.get_result::<User>(conn)
}
pub fn authenticate_user(credentials: &Credentials, db_conn: &PgConnection) -> Option<User> {
users::table
.filter(users::username.eq(&credentials.username))
.first::<User>(db_conn)
.optional()
.unwrap()
.and_then(|user| {
let password_matches = argon2::verify_raw(
credentials.password.as_bytes(),
&user.password_salt,
&user.password_hash,
&argon2_config(),
)
.unwrap();
if password_matches {
return Some(user);
} else {
return None;
}
})
}
#[test]
fn test_argon() {
let credentials = Credentials {
username: "piepkonijn",
password: "geheim123",
};
let argon_config = argon2_config();
let salt: [u8; 32] = rand::thread_rng().gen();
let hash = argon2::hash_raw(credentials.password.as_bytes(), &salt, &argon_config).unwrap();
let new_user = NewUser {
username: &credentials.username,
password_hash: &hash,
password_salt: &salt,
};
let password_matches = argon2::verify_raw(
credentials.password.as_bytes(),
&new_user.password_salt,
&new_user.password_hash,
&argon2_config(),
)
.unwrap();
assert!(password_matches);
}

85
backend/src/lib.rs Normal file
View file

@ -0,0 +1,85 @@
#![feature(proc_macro_hygiene, decl_macro)]
#[macro_use]
extern crate diesel;
pub mod db;
pub mod routes;
pub mod schema;
use std::ops::Deref;
use axum;
use bb8::PooledConnection;
use bb8_diesel::{self, DieselConnectionManager};
use diesel::PgConnection;
use axum::{
async_trait,
extract::{Extension, FromRequest, RequestParts},
http::StatusCode,
routing::{get, post},
AddExtensionLayer, Router,
};
async fn index_handler() -> &'static str {
"Hello, world!"
}
type ConnectionPool = bb8::Pool<DieselConnectionManager<PgConnection>>;
pub async fn app() -> Router {
let database_url = "postgresql://planetwars:planetwars@localhost/planetwars";
let manager = DieselConnectionManager::<PgConnection>::new(database_url);
let pool = bb8::Pool::builder().build(manager).await.unwrap();
let app = Router::new()
.route("/", get(index_handler))
.route("/users/register", post(routes::users::register))
.route("/users/login", post(routes::users::login))
.route("/users/me", get(routes::users::current_user))
.route("/bots", post(routes::bots::create_bot))
.route("/bots/:bot_id", get(routes::bots::get_bot))
.route("/bots/:bot_id/upload", post(routes::bots::upload_bot_code))
.layer(AddExtensionLayer::new(pool));
app
}
// we can also write a custom extractor that grabs a connection from the pool
// which setup is appropriate depends on your application
pub struct DatabaseConnection(PooledConnection<'static, DieselConnectionManager<PgConnection>>);
impl Deref for DatabaseConnection {
type Target = PooledConnection<'static, DieselConnectionManager<PgConnection>>;
fn deref(&self) -> &Self::Target {
&self.0
}
}
#[async_trait]
impl<B> FromRequest<B> for DatabaseConnection
where
B: Send,
{
type Rejection = (StatusCode, String);
async fn from_request(req: &mut RequestParts<B>) -> Result<Self, Self::Rejection> {
let Extension(pool) = Extension::<ConnectionPool>::from_request(req)
.await
.map_err(internal_error)?;
let conn = pool.get_owned().await.map_err(internal_error)?;
Ok(Self(conn))
}
}
/// Utility function for mapping any error into a `500 Internal Server Error`
/// response.
fn internal_error<E>(err: E) -> (StatusCode, String)
where
E: std::error::Error,
{
(StatusCode::INTERNAL_SERVER_ERROR, err.to_string())
}

16
backend/src/main.rs Normal file
View file

@ -0,0 +1,16 @@
use std::net::SocketAddr;
extern crate mozaic4_backend;
extern crate tokio;
#[tokio::main]
async fn main() {
let app = mozaic4_backend::app().await;
let addr = SocketAddr::from(([127, 0, 0, 1], 9000));
axum::Server::bind(&addr)
.serve(app.into_make_service())
.await
.unwrap();
}

View file

@ -0,0 +1,75 @@
use axum::extract::{Path, RawBody};
use axum::http::StatusCode;
use axum::Json;
use rand::Rng;
use serde::{Deserialize, Serialize};
use std::io::Cursor;
use std::path;
use crate::db::bots::{self, CodeBundle};
use crate::db::users::User;
use crate::DatabaseConnection;
use bots::Bot;
#[derive(Serialize, Deserialize, Debug)]
pub struct BotParams {
name: String,
}
pub async fn create_bot(
conn: DatabaseConnection,
user: User,
params: Json<BotParams>,
) -> (StatusCode, Json<Bot>) {
let bot_params = bots::NewBot {
owner_id: user.id,
name: &params.name,
};
let bot = bots::create_bot(&bot_params, &conn).unwrap();
(StatusCode::CREATED, Json(bot))
}
// TODO: handle errors
pub async fn get_bot(conn: DatabaseConnection, Path(bot_id): Path<i32>) -> Json<Bot> {
let bot = bots::find_bot(bot_id, &conn).unwrap();
Json(bot)
}
// TODO: proper error handling
pub async fn upload_bot_code(
conn: DatabaseConnection,
user: User,
Path(bot_id): Path<i32>,
RawBody(body): RawBody,
) -> (StatusCode, Json<CodeBundle>) {
// TODO: put in config somewhere
let data_path = "./data/bots";
let bot = bots::find_bot(bot_id, &conn).expect("Bot not found");
assert_eq!(user.id, bot.owner_id);
// generate a random filename
let token: [u8; 16] = rand::thread_rng().gen();
let name = base64::encode(&token);
let path = path::Path::new(data_path).join(name);
// let capped_buf = data.open(10usize.megabytes()).into_bytes().await.unwrap();
// assert!(capped_buf.is_complete());
// let buf = capped_buf.into_inner();
let buf = hyper::body::to_bytes(body).await.unwrap();
zip::ZipArchive::new(Cursor::new(buf))
.unwrap()
.extract(&path)
.unwrap();
let bundle = bots::NewCodeBundle {
bot_id: bot.id,
path: path.to_str().unwrap(),
};
let code_bundle =
bots::create_code_bundle(&bundle, &conn).expect("Failed to create code bundle");
(StatusCode::CREATED, Json(code_bundle))
}

View file

@ -0,0 +1,2 @@
pub mod bots;
pub mod users;

View file

@ -0,0 +1,94 @@
use crate::db::users::{Credentials, User};
use crate::db::{sessions, users};
use crate::DatabaseConnection;
use axum::extract::{FromRequest, RequestParts, TypedHeader};
use axum::headers::authorization::Bearer;
use axum::headers::Authorization;
use axum::http::StatusCode;
use axum::{async_trait, Json};
use serde::{Deserialize, Serialize};
type AuthorizationHeader = TypedHeader<Authorization<Bearer>>;
#[async_trait]
impl<B> FromRequest<B> for User
where
B: Send,
{
type Rejection = (StatusCode, String);
async fn from_request(req: &mut RequestParts<B>) -> Result<Self, Self::Rejection> {
let conn = DatabaseConnection::from_request(req).await?;
let TypedHeader(Authorization(bearer)) = AuthorizationHeader::from_request(req)
.await
.map_err(|_| (StatusCode::UNAUTHORIZED, "".to_string()))?;
let (_session, user) = sessions::find_user_by_session(bearer.token(), &conn)
.map_err(|_| (StatusCode::UNAUTHORIZED, "".to_string()))?;
Ok(user)
}
}
#[derive(Serialize, Deserialize)]
pub struct UserData {
pub user_id: i32,
pub username: String,
}
impl From<User> for UserData {
fn from(user: User) -> Self {
UserData {
user_id: user.id,
username: user.username,
}
}
}
#[derive(Deserialize)]
pub struct RegistrationParams {
pub username: String,
pub password: String,
}
pub async fn register(
conn: DatabaseConnection,
params: Json<RegistrationParams>,
) -> Json<UserData> {
let credentials = Credentials {
username: &params.username,
password: &params.password,
};
let user = users::create_user(&credentials, &conn).unwrap();
Json(user.into())
}
#[derive(Deserialize)]
pub struct LoginParams {
pub username: String,
pub password: String,
}
pub async fn login(
conn: DatabaseConnection,
params: Json<LoginParams>,
) -> Result<String, StatusCode> {
let credentials = Credentials {
username: &params.username,
password: &params.password,
};
// TODO: handle failures
let authenticated = users::authenticate_user(&credentials, &conn);
match authenticated {
None => Err(StatusCode::FORBIDDEN),
Some(user) => {
let session = sessions::create_session(&user, &conn);
Ok(session.token)
}
}
}
pub async fn current_user(user: User) -> Json<UserData> {
Json(user.into())
}

39
backend/src/schema.rs Normal file
View file

@ -0,0 +1,39 @@
table! {
bots (id) {
id -> Int4,
owner_id -> Int4,
name -> Text,
}
}
table! {
code_bundles (id) {
id -> Int4,
bot_id -> Int4,
path -> Text,
created_at -> Timestamp,
}
}
table! {
sessions (id) {
id -> Int4,
user_id -> Int4,
token -> Varchar,
}
}
table! {
users (id) {
id -> Int4,
username -> Varchar,
password_salt -> Bytea,
password_hash -> Bytea,
}
}
joinable!(bots -> users (owner_id));
joinable!(code_bundles -> bots (bot_id));
joinable!(sessions -> users (user_id));
allow_tables_to_appear_in_same_query!(bots, code_bundles, sessions, users,);

98
backend/tests/bots.rs Normal file
View file

@ -0,0 +1,98 @@
#![feature(async_closure)]
extern crate mozaic4_backend;
extern crate zip;
use rocket::http::{ContentType, Status};
mod util;
use mozaic4_backend::db::{bots, sessions, users};
use mozaic4_backend::DbConn;
use sessions::Session;
use users::{Credentials, User};
use util::{run_test, BearerAuth};
async fn user_with_session(conn: &DbConn) -> (User, Session) {
conn.run(|conn| {
let credentials = Credentials {
username: "piepkonijn",
password: "geheim123",
};
let user = users::create_user(&credentials, conn).unwrap();
let session = sessions::create_session(&user, conn);
(user, session)
})
.await
}
#[rocket::async_test]
async fn test_bot_create() {
run_test(async move |client, conn| {
let (user, session) = user_with_session(&conn).await;
let response = client
.post("/bots")
.header(BearerAuth::new(session.token.clone()))
.header(ContentType::JSON)
.body(
r#"{
"name": "testbot"
}"#,
)
.dispatch()
.await;
assert_eq!(response.status(), Status::Created);
assert_eq!(response.content_type(), Some(ContentType::JSON));
let resp_text = response.into_string().await.unwrap();
let json: serde_json::Value = serde_json::from_str(&resp_text).unwrap();
assert_eq!(json["name"], "testbot");
assert_eq!(json["owner_id"], user.id);
})
.await
}
// create an example zipfile for bot upload
fn create_zip() -> std::io::Result<Vec<u8>> {
use std::io::Write;
use zip::write::FileOptions;
let cursor = std::io::Cursor::new(Vec::new());
let mut zip = zip::ZipWriter::new(cursor);
zip.start_file("test.txt", FileOptions::default())?;
zip.write_all(b"sup brudi")?;
let buf = zip.finish()?;
Ok(buf.into_inner())
}
#[rocket::async_test]
async fn test_bot_upload() {
run_test(async move |client, conn| {
let (user, session) = user_with_session(&conn).await;
let owner_id = user.id;
let bot = conn
.run(move |conn| {
let new_bot = bots::NewBot {
name: "testbot",
owner_id: owner_id,
};
bots::create_bot(&new_bot, conn).unwrap()
})
.await;
let zip_file = create_zip().unwrap();
let response = client
.post(format!("/bots/{}/upload", bot.id))
.header(BearerAuth::new(session.token.clone()))
.header(ContentType::JSON)
.body(zip_file)
.dispatch()
.await;
assert_eq!(response.status(), Status::Created);
})
.await
}

61
backend/tests/login.rs Normal file
View file

@ -0,0 +1,61 @@
#![feature(async_closure)]
extern crate mozaic4_backend;
use rocket::http::{ContentType, Status};
mod util;
use util::run_test;
#[rocket::async_test]
async fn test_registration() {
run_test(async move |client, _conn| {
let response = client
.post("/register")
.header(ContentType::JSON)
.body(r#"{"username": "piepkonijn", "password": "geheim123"}"#)
.dispatch()
.await;
assert_eq!(response.status(), Status::Ok);
assert_eq!(response.content_type(), Some(ContentType::JSON));
let response = client
.post("/login")
.header(ContentType::JSON)
.body(r#"{"username": "piepkonijn", "password": "geheim123"}"#)
.dispatch()
.await;
assert_eq!(response.status(), Status::Ok);
let token = response.into_string().await.unwrap();
let response = client
.get("/users/me")
.header(util::BearerAuth::new(token))
.dispatch()
.await;
assert_eq!(response.status(), Status::Ok);
assert_eq!(response.content_type(), Some(ContentType::JSON));
let resp = response.into_string().await.unwrap();
let json: serde_json::Value = serde_json::from_str(&resp).unwrap();
assert_eq!(json["username"], "piepkonijn");
})
.await
}
#[rocket::async_test]
async fn test_reject_invalid_credentials() {
run_test(async move |client, _conn| {
let response = client
.post("/login")
.header(ContentType::JSON)
.body(r#"{"username": "piepkonijn", "password": "letmeinplease"}"#)
.dispatch()
.await;
assert_eq!(response.status(), Status::Forbidden);
// assert_eq!(response.content_type(), Some(ContentType::JSON));
})
.await
}

59
backend/tests/util/mod.rs Normal file
View file

@ -0,0 +1,59 @@
use std::future::Future;
use diesel::RunQueryDsl;
use mozaic4_backend::DbConn;
use rocket::{http::Header, local::asynchronous::Client};
// We use a lock to synchronize between tests so DB operations don't collide.
// For now. In the future, we'll have a nice way to run each test in a DB
// transaction so we can regain concurrency.
static DB_LOCK: parking_lot::Mutex<()> = parking_lot::const_mutex(());
async fn reset_db(db: &DbConn) {
db.run(|conn| {
diesel::sql_query(
r#"
TRUNCATE TABLE users, sessions,
bots, code_bundles"#,
)
.execute(conn)
.expect("drop all tables");
})
.await
}
pub async fn run_test<F, R>(test_closure: F)
where
F: FnOnce(Client, DbConn) -> R,
R: Future<Output = ()>,
{
let _lock = DB_LOCK.lock();
let client = Client::untracked(mozaic4_backend::rocket())
.await
.expect("failed to create test client");
let db = mozaic4_backend::DbConn::get_one(client.rocket())
.await
.expect("failed to get db connection");
// make sure we start with a clean DB
reset_db(&db).await;
test_closure(client, db).await;
}
pub struct BearerAuth {
token: String,
}
impl BearerAuth {
pub fn new(token: String) -> Self {
Self { token }
}
}
impl<'a> Into<Header<'a>> for BearerAuth {
fn into(self) -> Header<'a> {
Header::new("Authorization", format!("Bearer {}", self.token))
}
}