2019-03-29 21:43:03 +01:00
|
|
|
#![allow(unused_imports)]
|
2018-12-09 16:55:36 +01:00
|
|
|
|
|
|
|
#[macro_use]
|
|
|
|
extern crate diesel;
|
|
|
|
#[macro_use]
|
|
|
|
extern crate serde_derive;
|
|
|
|
|
2019-03-29 21:43:03 +01:00
|
|
|
use actix::prelude::*;
|
|
|
|
use actix_files as fs;
|
2019-06-17 08:48:03 +02:00
|
|
|
use actix_identity::{CookieIdentityPolicy, IdentityService};
|
|
|
|
use actix_web::middleware::Logger;
|
2019-03-29 21:43:03 +01:00
|
|
|
use actix_web::{web, App, HttpServer};
|
|
|
|
use chrono::Duration;
|
|
|
|
use diesel::{r2d2::ConnectionManager, PgConnection};
|
|
|
|
use dotenv::dotenv;
|
|
|
|
|
2018-12-09 16:55:36 +01:00
|
|
|
mod auth_handler;
|
|
|
|
mod auth_routes;
|
2019-03-10 03:03:09 +01:00
|
|
|
mod email_service;
|
|
|
|
mod errors;
|
2018-12-09 16:55:36 +01:00
|
|
|
mod invitation_handler;
|
|
|
|
mod invitation_routes;
|
2019-03-10 03:03:09 +01:00
|
|
|
mod models;
|
2018-12-09 16:55:36 +01:00
|
|
|
mod register_handler;
|
|
|
|
mod register_routes;
|
2019-03-10 03:03:09 +01:00
|
|
|
mod schema;
|
2018-12-09 16:55:36 +01:00
|
|
|
mod utils;
|
|
|
|
|
2019-03-29 21:43:03 +01:00
|
|
|
use crate::models::DbExecutor;
|
2018-12-09 16:55:36 +01:00
|
|
|
|
2019-03-29 21:43:03 +01:00
|
|
|
fn main() -> std::io::Result<()> {
|
2018-12-09 16:55:36 +01:00
|
|
|
dotenv().ok();
|
2019-03-29 21:43:03 +01:00
|
|
|
std::env::set_var(
|
|
|
|
"RUST_LOG",
|
|
|
|
"simple-auth-server=debug,actix_web=info,actix_server=info",
|
|
|
|
);
|
2018-12-09 16:55:36 +01:00
|
|
|
env_logger::init();
|
2019-03-30 17:12:42 +01:00
|
|
|
let sys = actix_rt::System::new("example");
|
2019-03-29 21:43:03 +01:00
|
|
|
|
|
|
|
let database_url = std::env::var("DATABASE_URL").expect("DATABASE_URL must be set");
|
2018-12-09 16:55:36 +01:00
|
|
|
|
|
|
|
// create db connection pool
|
|
|
|
let manager = ConnectionManager::<PgConnection>::new(database_url);
|
|
|
|
let pool = r2d2::Pool::builder()
|
|
|
|
.build(manager)
|
|
|
|
.expect("Failed to create pool.");
|
|
|
|
|
2019-03-10 03:03:09 +01:00
|
|
|
let address: Addr<DbExecutor> =
|
|
|
|
SyncArbiter::start(4, move || DbExecutor(pool.clone()));
|
2018-12-09 16:55:36 +01:00
|
|
|
|
2019-03-29 21:43:03 +01:00
|
|
|
HttpServer::new(move || {
|
|
|
|
// secret is a random minimum 32 bytes long base 64 string
|
|
|
|
let secret: String =
|
|
|
|
std::env::var("SECRET_KEY").unwrap_or_else(|_| "0123".repeat(8));
|
|
|
|
let domain: String =
|
|
|
|
std::env::var("DOMAIN").unwrap_or_else(|_| "localhost".to_string());
|
2018-12-09 16:55:36 +01:00
|
|
|
|
2019-03-29 21:43:03 +01:00
|
|
|
App::new()
|
|
|
|
.data(address.clone())
|
|
|
|
.wrap(Logger::default())
|
|
|
|
.wrap(IdentityService::new(
|
|
|
|
CookieIdentityPolicy::new(secret.as_bytes())
|
|
|
|
.name("auth")
|
|
|
|
.path("/")
|
|
|
|
.domain(domain.as_str())
|
2019-04-21 18:37:29 +02:00
|
|
|
.max_age_time(Duration::days(1))
|
2019-03-29 21:43:03 +01:00
|
|
|
.secure(false), // this can only be true if you have https
|
|
|
|
))
|
|
|
|
// everything under '/api/' route
|
|
|
|
.service(
|
|
|
|
web::scope("/api")
|
|
|
|
// routes for authentication
|
|
|
|
.service(
|
|
|
|
web::resource("/auth")
|
|
|
|
.route(web::post().to_async(auth_routes::login))
|
|
|
|
.route(web::delete().to(auth_routes::logout))
|
|
|
|
.route(web::get().to_async(auth_routes::get_me)),
|
|
|
|
)
|
|
|
|
// routes to invitation
|
|
|
|
.service(
|
|
|
|
web::resource("/invitation").route(
|
|
|
|
web::post().to_async(invitation_routes::register_email),
|
|
|
|
),
|
|
|
|
)
|
|
|
|
// routes to register as a user after the
|
|
|
|
.service(
|
|
|
|
web::resource("/register/{invitation_id}")
|
|
|
|
.route(web::post().to_async(register_routes::register_user)),
|
|
|
|
),
|
|
|
|
)
|
|
|
|
// serve static files
|
|
|
|
.service(fs::Files::new("/", "./static/").index_file("index.html"))
|
|
|
|
})
|
|
|
|
.bind("127.0.0.1:3000")?
|
2019-03-30 17:12:42 +01:00
|
|
|
.start();
|
|
|
|
|
|
|
|
sys.run()
|
2018-12-09 16:55:36 +01:00
|
|
|
}
|