254 lines
7.6 KiB
Nim
254 lines
7.6 KiB
Nim
## Personal Time Keeping API Interface
|
|
## ===================================
|
|
|
|
import asyncdispatch, base64, bcrypt, cliutils, docopt, httpcore, jester, json, logging,
|
|
sequtils, strutils, os, tables, times, uuids
|
|
|
|
import nre except toSeq
|
|
|
|
import ./models
|
|
import ./util
|
|
import ./version
|
|
|
|
type
|
|
PtkUser* = object
|
|
username*, salt*, pwdhash*, timelinePath*: string
|
|
isAdmin*: bool
|
|
|
|
PtkApiCfg* = object
|
|
users*: seq[PtkUser]
|
|
port*: int
|
|
dataDir*: string
|
|
|
|
const TXT = "text/plain"
|
|
const JSON = "application/json"
|
|
|
|
proc parseUser(json: JsonNode): PtkUser =
|
|
result = Ptkuser(
|
|
username: json.getOrFail("username").getStr,
|
|
salt: json.getOrFail("salt").getStr,
|
|
pwdHash: json.getOrFail("pwdhash").getStr,
|
|
timelinePath: json.getOrFail("timelinePath").getStr,
|
|
isAdmin: json.getIfExists("isAdmin").getBool(false))
|
|
|
|
proc loadApiConfig*(json: JsonNode): PtkApiCfg =
|
|
result = PtkApiCfg(
|
|
port: parseInt(json.getIfExists("port").getStr("3280")),
|
|
dataDir: json.getOrFail("dataDir").getStr,
|
|
users: json.getIfExists("users").getElems(@[]).mapIt(parseUser(it)))
|
|
|
|
template halt(code: HttpCode,
|
|
headers: RawHeaders,
|
|
content: string) =
|
|
## Immediately replies with the specified request. This means any further
|
|
## code will not be executed after calling this template in the current
|
|
## route.
|
|
bind TCActionSend, newHttpHeaders
|
|
result[0] = CallbackAction.TCActionSend
|
|
result[1] = code
|
|
result[2] = some(headers)
|
|
result[3] = content
|
|
result.matched = true
|
|
break allRoutes
|
|
|
|
|
|
template checkAuth(cfg: PtkApiCfg) =
|
|
## Check this request for authentication and authorization information.
|
|
## If the request is not authorized, this template immediately returns a
|
|
## 401 Unauthotized response
|
|
|
|
var authed {.inject.} = false
|
|
var user {.inject.}: PtkUser = PtkUser()
|
|
|
|
try:
|
|
if not headers(request).hasKey("Authorization"):
|
|
raiseEx "No auth token."
|
|
|
|
let headerVal = headers(request)["Authorization"]
|
|
if not headerVal.startsWith("Basic "):
|
|
raiseEx "Invalid Authorization type (only 'Basic' is supported)."
|
|
|
|
let authVals = headerVal[6..^1].decode().split(":")
|
|
|
|
let candidates = cfg.users.filterIt(it.username.compare(authVals[0]))
|
|
if candidates.len != 1: raiseEx "Invalid Authorization: unknown username/password combination."
|
|
|
|
let foundUser: PtkUser = candidates[0]
|
|
if not compare(foundUser.pwdhash, hash(authVals[1], foundUser.salt)):
|
|
raiseEx "Invalid Authorization: unknown username/password combination."
|
|
|
|
user = foundUser
|
|
authed = true
|
|
|
|
except:
|
|
stderr.writeLine "Auth failed: " & getCurrentExceptionMsg()
|
|
halt(
|
|
Http401,
|
|
@{"Content-Type": TXT, "WWW_Authenticate": "Basic" },
|
|
getCurrentExceptionMsg())
|
|
|
|
proc parseAndRun(user: PtkUser, cmd: string, params: Table[string, string]): string =
|
|
|
|
var args = queryParamsToCliArgs(params)
|
|
args = @[cmd, "--file", user.timelinePath] & args
|
|
|
|
info "args: \n" & args.join(" ")
|
|
|
|
let execResult = execWithOutput("ptk", ".", args)
|
|
if execResult[2] != 0: raiseEx(stripAnsi($execResult[0] & "\n" & $execResult[1]))
|
|
else: return stripAnsi(execResult[0])
|
|
|
|
proc apiParseUser(json: JsonNode): PtkUser =
|
|
let salt = genSalt(12)
|
|
|
|
return PtkUser(
|
|
username: json.getOrFail("username").getStr,
|
|
pwdhash: json.getOrFail("password").getStr.hash(salt),
|
|
salt: salt,
|
|
timelinePath: json.getIfExists("timelinePath").getStr(""),
|
|
isAdmin: false)
|
|
|
|
proc apiParseMark(json: JsonNode): Mark =
|
|
|
|
if not json.hasKey("id"): json["id"] = %($genUUID())
|
|
if not json.hasKey("summary"): raiseEx "cannot parse mark: missing 'summary'"
|
|
if not json.hasKey("time"): json["time"] = %(getTime().local.format(ISO_TIME_FORMAT))
|
|
|
|
return parseMark(json)
|
|
|
|
proc patchMark(m: Mark, j: JsonNode): Mark =
|
|
result = m
|
|
|
|
if j.hasKey("summary"): result.summary = j["summary"].getStr
|
|
if j.hasKey("notes"): result.notes = j["notes"].getStr
|
|
if j.hasKey("tags"):
|
|
result.tags = j["tags"].getElems(@[]).map(proc (t: JsonNode): string = t.getStr())
|
|
if j.hasKey("time"): result.time = parse(j["time"].getStr(), ISO_TIME_FORMAT)
|
|
|
|
proc start_api*(cfg: PtkApiCfg) =
|
|
|
|
var stopFuture = newFuture[void]()
|
|
|
|
settings:
|
|
port = Port(cfg.port)
|
|
appName = "/api"
|
|
|
|
routes:
|
|
|
|
get "/version": resp("ptk v" & PTK_VERSION, TXT)
|
|
|
|
get "/marks":
|
|
checkAuth(cfg)
|
|
|
|
try: resp(parseAndRun(user, "list", request.params), TXT)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/continue":
|
|
checkAuth(cfg)
|
|
|
|
try: resp(parseAndRun(user, "continue", request.params), TXT)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/sum-time":
|
|
checkAuth(cfg)
|
|
|
|
try: resp(parseAndRun(user, "sum-time", request.params), TXT)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/mark":
|
|
checkAuth(cfg)
|
|
|
|
var newMark: Mark
|
|
try: newMark = apiParseMark(parseJson(request.body))
|
|
except: resp(Http400, getCurrentExceptionMsg(), TXT)
|
|
|
|
try:
|
|
var timeline = loadTimeline(user.timelinePath)
|
|
timeline.marks.add(newMark)
|
|
saveTimeline(timeline, user.timelinePath)
|
|
resp(Http201, "ok", TXT)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/stop":
|
|
checkAuth(cfg)
|
|
|
|
var newMark: Mark
|
|
try:
|
|
var json = parseJson(request.body)
|
|
json["summary"] = %STOP_MSG
|
|
json["id"] = %($genUUID())
|
|
newMark = apiParseMark(json)
|
|
except: resp(Http400, getCurrentExceptionMsg(), TXT)
|
|
|
|
try:
|
|
var timeline = loadTimeline(user.timelinePath)
|
|
timeline.marks.add(newMark)
|
|
saveTimeline(timeline, user.timelinePath)
|
|
resp(Http201, "ok", TXT)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/resume/@id":
|
|
checkAuth(cfg)
|
|
|
|
var timeline: Timeline
|
|
try: timeline = loadTimeline(user.timelinePath)
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
var newMark: Mark
|
|
try:
|
|
let origMarkIdx = timeline.marks.findById(@"id")
|
|
if origMarkIdx < 0: resp(Http404, "no mark for id: " & @"id", TXT)
|
|
let origMark = timeline.marks[origMarkIdx]
|
|
|
|
newMark = origMark
|
|
newMark.id = genUUID()
|
|
newMark.time = getTime().local
|
|
newMark = newMark.patchMark(parseJson(request.body))
|
|
except: resp(Http400, getCurrentExceptionMsg(), TXT)
|
|
|
|
try:
|
|
timeline.marks.add(newMark)
|
|
timeline.saveTimeline(user.timelinePath)
|
|
resp(Http201, "ok", TXT)
|
|
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/amend/@id":
|
|
checkAuth(cfg)
|
|
|
|
try:
|
|
var timeline = loadTimeline(user.timelinePath)
|
|
|
|
let idx = timeline.marks.findById(@"id")
|
|
if idx < 0: resp(Http404, "no mark for id: " & @"id", TXT)
|
|
|
|
timeline.marks[idx] = timeline.marks[idx].patchMark(parseJson(request.body))
|
|
|
|
timeline.saveTimeline(user.timelinePath)
|
|
resp(Http202, $(%timeline.marks[idx]), JSON)
|
|
|
|
except: resp(Http500, getCurrentExceptionMsg(), TXT)
|
|
|
|
post "/users":
|
|
checkAuth(cfg)
|
|
if not user.isAdmin: resp(Http403, "insufficient permission", TXT)
|
|
|
|
var newUser: PtkUser
|
|
try: newUser = apiParseUser(parseJson(request.body))
|
|
except: resp(Http400, getCurrentExceptionMsg(), TXT)
|
|
|
|
if cfg.users.anyIt(it.username == newUser.username):
|
|
resp(Http409, "user already exists", TXT)
|
|
|
|
newUser.timelinePath = cfg.dataDir / newUser.username & ".timeline.json"
|
|
|
|
try:
|
|
discard parseAndRun(newUser, "init", initTable[string,string]())
|
|
# TODO: save updated config!
|
|
# cfg.users.add(newUser)
|
|
resp(Http200, "ok", TXT)
|
|
|
|
except: resp(Http500, "could not init new user timeline", TXT)
|
|
|
|
waitFor(stopFuture)
|