админка

This commit is contained in:
arrelin
2025-12-09 16:31:26 +03:00
parent 9f86d8eeec
commit db32adf840
12 changed files with 936 additions and 434 deletions

983
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -5,12 +5,20 @@ edition = "2024"
[dependencies] [dependencies]
tokio = { version = "1.48.0", features = ["full"] } tokio = { version = "1.48.0", features = ["full"] }
sea-orm = { version = "2.0.0-rc.20", features = ["sqlx-postgres", "runtime-tokio-rustls", "macros"] } sea-orm = { version = "1.0", features = ["sqlx-postgres", "runtime-tokio-rustls", "macros"] }
sea-orm-migration = "2.0.0-rc.20" sea-orm-migration = { version = "1.0", default-features = false, features = ["sqlx-postgres", "runtime-tokio-rustls"] }
dotenvy = "0.15.7" dotenvy = "0.15.7"
axum = { version = "0.8.7", features = ["json"] } axum = { version = "0.7", features = ["json"] }
chrono = { version = "0.4.42", features = ["serde"] } chrono = { version = "0.4.42", features = ["serde"] }
serde = { version = "1.0.228", features = ["derive"] } serde = { version = "1.0.228", features = ["derive"] }
serde_json = "1.0" serde_json = "1.0"
utoipa = { version = "5.4.0", features = ["axum_extras", "chrono", "decimal_float"] } utoipa = { version = "5.4.0", features = ["axum_extras", "chrono", "decimal_float"] }
utoipa-swagger-ui = { version = "9.0.2", features = ["axum"] } utoipa-swagger-ui = { version = "8.0", features = ["axum"] }
axum-login = "0.15"
tower-sessions = "0.12"
tower-sessions-sqlx-store = { version = "0.12", features = ["postgres"] }
sqlx = { version = "0.7", features = ["postgres", "runtime-tokio-rustls"] }
argon2 = "0.5"
async-trait = "0.1"
thiserror = "2.0"
time = "0.3"

90
src/auth.rs Normal file
View File

@@ -0,0 +1,90 @@
use axum_login::{AuthUser, AuthnBackend, UserId};
use sea_orm::{DatabaseConnection, EntityTrait, ColumnTrait, QueryFilter};
use argon2::{
password_hash::{rand_core::OsRng, PasswordHash, PasswordHasher, PasswordVerifier, SaltString},
Argon2,
};
use crate::models::{user, User};
#[derive(Debug, Clone)]
pub struct AuthBackend {
pub db: DatabaseConnection,
}
impl AuthUser for user::Model {
type Id = i32;
fn id(&self) -> Self::Id {
self.id
}
fn session_auth_hash(&self) -> &[u8] {
self.password_hash.as_bytes()
}
}
#[derive(Debug, thiserror::Error)]
pub enum Error {
#[error("Database error: {0}")]
Database(#[from] sea_orm::DbErr),
#[error("Password hashing error")]
PasswordHash,
#[error("Invalid credentials")]
InvalidCredentials,
}
#[derive(Debug, Clone)]
pub struct Credentials {
pub username: String,
pub password: String,
}
#[async_trait::async_trait]
impl AuthnBackend for AuthBackend {
type User = user::Model;
type Credentials = Credentials;
type Error = Error;
async fn authenticate(
&self,
creds: Self::Credentials,
) -> Result<Option<Self::User>, Self::Error> {
let user = User::find()
.filter(user::Column::Username.eq(&creds.username))
.one(&self.db)
.await?;
if let Some(user) = user {
let parsed_hash = PasswordHash::new(&user.password_hash)
.map_err(|_| Error::PasswordHash)?;
let is_valid = Argon2::default()
.verify_password(creds.password.as_bytes(), &parsed_hash)
.is_ok();
if is_valid {
Ok(Some(user))
} else {
Err(Error::InvalidCredentials)
}
} else {
Err(Error::InvalidCredentials)
}
}
async fn get_user(&self, user_id: &UserId<Self>) -> Result<Option<Self::User>, Self::Error> {
let user = User::find_by_id(*user_id).one(&self.db).await?;
Ok(user)
}
}
pub fn hash_password(password: &str) -> Result<String, Error> {
let salt = SaltString::generate(&mut OsRng);
let argon2 = Argon2::default();
argon2
.hash_password(password.as_bytes(), &salt)
.map(|hash| hash.to_string())
.map_err(|_| Error::PasswordHash)
}

View File

@@ -1,21 +1,29 @@
use axum::{ use axum::{
routing::{get, post, put, delete}, routing::{get, post, put, delete},
Router, Router, middleware as axum_middleware,
}; };
use sea_orm::{Database, DatabaseConnection, DbErr}; use sea_orm::{Database, DatabaseConnection, DbErr};
use sea_orm_migration::prelude::*; use sea_orm_migration::prelude::*;
use std::net::SocketAddr; use std::net::SocketAddr;
use utoipa::OpenApi; use utoipa::OpenApi;
use utoipa_swagger_ui::SwaggerUi; use utoipa_swagger_ui::SwaggerUi;
use tower_sessions::{Expiry, SessionManagerLayer};
use tower_sessions_sqlx_store::PostgresStore;
use axum_login::AuthManagerLayerBuilder;
use time::Duration;
mod models; mod models;
mod services; mod services;
mod migration; mod migration;
mod routes; mod routes;
mod auth;
mod middleware;
#[derive(OpenApi)] #[derive(OpenApi)]
#[openapi( #[openapi(
paths( paths(
routes::auth::login,
routes::auth::logout,
routes::family::create_family, routes::family::create_family,
routes::family::get_family, routes::family::get_family,
routes::family::get_all_families, routes::family::get_all_families,
@@ -38,6 +46,8 @@ mod routes;
models::family::Model, models::family::Model,
models::category::Model, models::category::Model,
models::expense::Model, models::expense::Model,
routes::auth::LoginRequest,
routes::auth::LoginResponse,
routes::family::CreateFamilyRequest, routes::family::CreateFamilyRequest,
routes::family::UpdateFamilyRequest, routes::family::UpdateFamilyRequest,
routes::category::CreateCategoryRequest, routes::category::CreateCategoryRequest,
@@ -48,6 +58,7 @@ mod routes;
) )
), ),
tags( tags(
(name = "auth", description = "Authentication endpoints"),
(name = "families", description = "Family management endpoints"), (name = "families", description = "Family management endpoints"),
(name = "categories", description = "Category management endpoints"), (name = "categories", description = "Category management endpoints"),
(name = "expenses", description = "Expense management endpoints") (name = "expenses", description = "Expense management endpoints")
@@ -79,8 +90,34 @@ async fn main() -> Result<(), DbErr> {
crate::migration::Migrator::up(&db, None).await?; crate::migration::Migrator::up(&db, None).await?;
println!("Migrations completed!"); println!("Migrations completed!");
let api_routes = Router::new() let database_url = std::env::var("DATABASE_URL")
.expect("DATABASE_URL must be set in .env file");
let session_store = PostgresStore::new(
sqlx::PgPool::connect(&database_url)
.await
.expect("Failed to connect to database for sessions"),
);
session_store
.migrate()
.await
.expect("Failed to run session store migrations");
let session_layer = SessionManagerLayer::new(session_store)
.with_secure(false)
.with_expiry(Expiry::OnInactivity(Duration::days(1)));
let backend = auth::AuthBackend { db: db.clone() };
let auth_layer = AuthManagerLayerBuilder::new(backend, session_layer).build();
let protected_routes = Router::new()
.route("/families", post(routes::family::create_family)) .route("/families", post(routes::family::create_family))
.route_layer(axum_middleware::from_fn(middleware::require_admin));
let api_routes = Router::new()
.route("/login", post(routes::auth::login))
.route("/logout", post(routes::auth::logout))
.merge(protected_routes)
.route("/families", get(routes::family::get_all_families)) .route("/families", get(routes::family::get_all_families))
.route("/families/{id}", get(routes::family::get_family)) .route("/families/{id}", get(routes::family::get_family))
.route("/families/{id}", put(routes::family::update_family)) .route("/families/{id}", put(routes::family::update_family))
@@ -96,11 +133,13 @@ async fn main() -> Result<(), DbErr> {
.route("/families/{family_id}/categories/{category_id}/expenses/{expense_id}", put(routes::expense::update_expense)) .route("/families/{family_id}/categories/{category_id}/expenses/{expense_id}", put(routes::expense::update_expense))
.route("/families/{family_id}/categories/{category_id}/expenses/{expense_id}", delete(routes::expense::delete_expense)) .route("/families/{family_id}/categories/{category_id}/expenses/{expense_id}", delete(routes::expense::delete_expense))
.route("/families/{family_id}/categories/{category_id}/remaining", get(routes::expense::get_remaining_limit)) .route("/families/{family_id}/categories/{category_id}/remaining", get(routes::expense::get_remaining_limit))
.layer(auth_layer)
.with_state(db); .with_state(db);
let app = api_routes let swagger_ui = SwaggerUi::new("/swagger-ui")
.merge(SwaggerUi::new("/swagger-ui") .url("/api-docs/openapi.json", ApiDoc::openapi());
.url("/api-docs/openapi.json", ApiDoc::openapi()));
let app = api_routes.merge(swagger_ui);
let addr = SocketAddr::from(([0, 0, 0, 0], 8080)); let addr = SocketAddr::from(([0, 0, 0, 0], 8080));
println!("Server running on http://{}", addr); println!("Server running on http://{}", addr);

23
src/middleware.rs Normal file
View File

@@ -0,0 +1,23 @@
use axum::{
extract::Request,
http::StatusCode,
middleware::Next,
response::Response,
};
use axum_login::AuthSession;
use crate::auth::AuthBackend;
pub async fn require_admin(
auth_session: AuthSession<AuthBackend>,
request: Request,
next: Next,
) -> Result<Response, StatusCode> {
let user = auth_session.user.ok_or(StatusCode::UNAUTHORIZED)?;
if !user.is_admin {
return Err(StatusCode::FORBIDDEN);
}
Ok(next.run(request).await)
}

View File

@@ -0,0 +1,57 @@
use sea_orm_migration::prelude::*;
#[derive(DeriveMigrationName)]
pub struct Migration;
#[async_trait::async_trait]
impl MigrationTrait for Migration {
async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> {
manager
.create_table(
Table::create()
.table(User::Table)
.if_not_exists()
.col(
ColumnDef::new(User::Id)
.integer()
.not_null()
.auto_increment()
.primary_key(),
)
.col(
ColumnDef::new(User::Username)
.string()
.not_null()
.unique_key(),
)
.col(ColumnDef::new(User::PasswordHash).string().not_null())
.col(
ColumnDef::new(User::IsAdmin)
.boolean()
.not_null()
.default(false),
)
.to_owned(),
)
.await?;
Ok(())
}
async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> {
manager
.drop_table(Table::drop().table(User::Table).to_owned())
.await?;
Ok(())
}
}
#[derive(DeriveIden)]
enum User {
Table,
Id,
Username,
PasswordHash,
IsAdmin,
}

View File

@@ -0,0 +1,48 @@
use sea_orm_migration::prelude::*;
#[derive(DeriveMigrationName)]
pub struct Migration;
#[async_trait::async_trait]
impl MigrationTrait for Migration {
async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> {
use argon2::{
password_hash::{rand_core::OsRng, PasswordHasher, SaltString},
Argon2,
};
let salt = SaltString::generate(&mut OsRng);
let argon2 = Argon2::default();
let password_hash = argon2
.hash_password("2123".as_bytes(), &salt)
.map_err(|_| DbErr::Migration("Failed to hash password".to_string()))?
.to_string();
let insert = Query::insert()
.into_table(User::Table)
.columns([User::Username, User::PasswordHash, User::IsAdmin])
.values_panic(["admin".into(), password_hash.into(), true.into()])
.to_owned();
manager.exec_stmt(insert).await?;
Ok(())
}
async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> {
let delete = Query::delete()
.from_table(User::Table)
.and_where(Expr::col(User::Username).eq("admin"))
.to_owned();
manager.exec_stmt(delete).await?;
Ok(())
}
}
#[derive(DeriveIden)]
enum User {
Table,
Username,
PasswordHash,
IsAdmin,
}

View File

@@ -1,12 +1,18 @@
pub use sea_orm_migration::prelude::*; pub use sea_orm_migration::prelude::*;
mod m20241209_000001_create_tables; mod m20241209_000001_create_tables;
mod m20241209_000002_create_users;
mod m20241209_000003_seed_admin;
pub struct Migrator; pub struct Migrator;
#[async_trait::async_trait] #[async_trait::async_trait]
impl MigratorTrait for Migrator { impl MigratorTrait for Migrator {
fn migrations() -> Vec<Box<dyn MigrationTrait>> { fn migrations() -> Vec<Box<dyn MigrationTrait>> {
vec![Box::new(m20241209_000001_create_tables::Migration)] vec![
Box::new(m20241209_000001_create_tables::Migration),
Box::new(m20241209_000002_create_users::Migration),
Box::new(m20241209_000003_seed_admin::Migration),
]
} }
} }

View File

@@ -1,7 +1,9 @@
pub mod family; pub mod family;
pub mod category; pub mod category;
pub mod expense; pub mod expense;
pub mod user;
pub use family::Entity as Family; pub use family::Entity as Family;
pub use category::Entity as Category; pub use category::Entity as Category;
pub use expense::Entity as Expense; pub use expense::Entity as Expense;
pub use user::Entity as User;

18
src/models/user.rs Normal file
View File

@@ -0,0 +1,18 @@
use sea_orm::entity::prelude::*;
use serde::{Deserialize, Serialize};
#[derive(Clone, Debug, PartialEq, DeriveEntityModel, Serialize, Deserialize)]
#[sea_orm(table_name = "user")]
pub struct Model {
#[sea_orm(primary_key)]
pub id: i32,
#[sea_orm(unique)]
pub username: String,
pub password_hash: String,
pub is_admin: bool,
}
#[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)]
pub enum Relation {}
impl ActiveModelBehavior for ActiveModel {}

75
src/routes/auth.rs Normal file
View File

@@ -0,0 +1,75 @@
use axum::{
extract::State,
http::StatusCode,
Json,
};
use axum_login::AuthSession;
use serde::{Deserialize, Serialize};
use utoipa::ToSchema;
use crate::auth::{AuthBackend, Credentials};
#[derive(Debug, Deserialize, ToSchema)]
pub struct LoginRequest {
pub username: String,
pub password: String,
}
#[derive(Debug, Serialize, ToSchema)]
pub struct LoginResponse {
pub success: bool,
pub is_admin: bool,
}
#[utoipa::path(
post,
path = "/login",
tag = "auth",
request_body = LoginRequest,
responses(
(status = 200, description = "Login successful", body = LoginResponse),
(status = 401, description = "Invalid credentials")
)
)]
pub async fn login(
mut auth_session: AuthSession<AuthBackend>,
Json(payload): Json<LoginRequest>,
) -> Result<Json<LoginResponse>, StatusCode> {
let user = auth_session
.authenticate(Credentials {
username: payload.username,
password: payload.password,
})
.await
.map_err(|_| StatusCode::UNAUTHORIZED)?
.ok_or(StatusCode::UNAUTHORIZED)?;
auth_session
.login(&user)
.await
.map_err(|_| StatusCode::INTERNAL_SERVER_ERROR)?;
Ok(Json(LoginResponse {
success: true,
is_admin: user.is_admin,
}))
}
#[utoipa::path(
post,
path = "/logout",
tag = "auth",
responses(
(status = 200, description = "Logout successful")
)
)]
pub async fn logout(
mut auth_session: AuthSession<AuthBackend>,
) -> Result<StatusCode, StatusCode> {
auth_session
.logout()
.await
.map_err(|_| StatusCode::INTERNAL_SERVER_ERROR)?;
Ok(StatusCode::OK)
}

View File

@@ -1,3 +1,4 @@
pub mod family; pub mod family;
pub mod category; pub mod category;
pub mod expense; pub mod expense;
pub mod auth;