diff options
Diffstat (limited to 'server/src/helper/session.rs')
-rw-r--r-- | server/src/helper/session.rs | 71 |
1 files changed, 34 insertions, 37 deletions
diff --git a/server/src/helper/session.rs b/server/src/helper/session.rs index 7e23152..2ab87a0 100644 --- a/server/src/helper/session.rs +++ b/server/src/helper/session.rs @@ -3,6 +3,7 @@ which is licensed under the GNU Affero General Public License (version 3); see /COPYING. Copyright (C) 2025 metamuffin <metamuffin.org> */ +use super::A; use crate::ui::error::MyError; use anyhow::anyhow; use jellylogic::{ @@ -18,44 +19,40 @@ use rocket::{ Request, State, }; -use super::A; - -impl A<Session> { - async fn from_request_ut(req: &Request<'_>) -> Result<Self, MyError> { - let username; +pub(super) async fn session_from_request(req: &Request<'_>) -> Result<Session, MyError> { + let username; - #[cfg(not(feature = "bypass-auth"))] - { - let token = req - .query_value("session") - .map(|e| e.unwrap()) - .or_else(|| req.query_value("api_key").map(|e| e.unwrap())) - .or_else(|| req.headers().get_one("X-MediaBrowser-Token")) - .or_else(|| { - req.headers() - .get_one("Authorization") - .and_then(parse_jellyfin_auth) - }) // for jellyfin compat - .or(req.cookies().get("session").map(|cookie| cookie.value())) - .ok_or(anyhow!("not logged in"))?; + #[cfg(not(feature = "bypass-auth"))] + { + let token = req + .query_value("session") + .map(|e| e.unwrap()) + .or_else(|| req.query_value("api_key").map(|e| e.unwrap())) + .or_else(|| req.headers().get_one("X-MediaBrowser-Token")) + .or_else(|| { + req.headers() + .get_one("Authorization") + .and_then(parse_jellyfin_auth) + }) // for jellyfin compat + .or(req.cookies().get("session").map(|cookie| cookie.value())) + .ok_or(anyhow!("not logged in"))?; - // jellyfin urlescapes the token for *some* requests - let token = token.replace("%3D", "="); - username = validate(&token)?; - }; + // jellyfin urlescapes the token for *some* requests + let token = token.replace("%3D", "="); + username = validate(&token)?; + }; - #[cfg(feature = "bypass-auth")] - { - parse_jellyfin_auth("a"); // unused warning is annoying - username = "admin".to_string(); - } + #[cfg(feature = "bypass-auth")] + { + parse_jellyfin_auth("a"); // unused warning is annoying + username = "admin".to_string(); + } - let db = req.guard::<&State<Database>>().await.unwrap(); + let db = req.guard::<&State<Database>>().await.unwrap(); - let user = db.get_user(&username)?.ok_or(anyhow!("user not found"))?; + let user = db.get_user(&username)?.ok_or(anyhow!("user not found"))?; - Ok(A(Session { user })) - } + Ok(Session { user }) } fn parse_jellyfin_auth(h: &str) -> Option<&str> { @@ -75,8 +72,8 @@ impl<'r> FromRequest<'r> for A<Session> { async fn from_request<'life0>( request: &'r Request<'life0>, ) -> request::Outcome<Self, Self::Error> { - match A::<Session>::from_request_ut(request).await { - Ok(x) => Outcome::Success(x), + match session_from_request(request).await { + Ok(x) => Outcome::Success(A(x)), Err(e) => { warn!("authentificated route rejected: {e:?}"); Outcome::Forward(Status::Unauthorized) @@ -91,10 +88,10 @@ impl<'r> FromRequest<'r> for A<AdminSession> { async fn from_request<'life0>( request: &'r Request<'life0>, ) -> request::Outcome<Self, Self::Error> { - match A::<Session>::from_request_ut(request).await { + match session_from_request(request).await { Ok(x) => { - if x.0.user.admin { - Outcome::Success(A(AdminSession(x.0))) + if x.user.admin { + Outcome::Success(A(AdminSession(x))) } else { Outcome::Error(( Status::Unauthorized, |