web3-proxy/web3_proxy/src/frontend/users.rs

138 lines
4.6 KiB
Rust
Raw Normal View History

2022-07-14 00:49:57 +03:00
// So the API needs to show for any given user:
// - show balance in USD
// - show deposits history (currency, amounts, transaction id)
// - show number of requests used (so we can calculate average spending over a month, burn rate for a user etc, something like "Your balance will be depleted in xx days)
// - the email address of a user if he opted in to get contacted via email
// - all the monitoring and stats but that will come from someplace else if I understand corectly?
// I wonder how we handle payment
// probably have to do manual withdrawals
2022-08-17 00:43:39 +03:00
use super::{
errors::{anyhow_error_into_response, FrontendResult},
rate_limit::RateLimitResult,
};
2022-08-16 22:29:00 +03:00
use crate::app::Web3ProxyApp;
2022-08-11 04:53:27 +03:00
use axum::{
2022-08-17 00:43:39 +03:00
extract::Path,
response::{IntoResponse, Response},
2022-08-11 04:53:27 +03:00
Extension, Json,
};
2022-08-04 04:10:27 +03:00
use axum_client_ip::ClientIp;
2022-08-16 22:29:00 +03:00
use axum_macros::debug_handler;
2022-08-04 02:17:02 +03:00
use entities::user;
2022-08-04 04:10:27 +03:00
use ethers::{prelude::Address, types::Bytes};
2022-08-17 00:43:39 +03:00
use redis_rate_limit::redis::{pipe, AsyncCommands};
2022-08-11 04:53:27 +03:00
use reqwest::StatusCode;
2022-08-04 04:10:27 +03:00
use sea_orm::ActiveModelTrait;
use serde::Deserialize;
use std::sync::Arc;
2022-08-17 00:43:39 +03:00
use uuid::Uuid;
2022-08-04 02:17:02 +03:00
// TODO: how do we customize axum's error response? I think we probably want an enum that implements IntoResponse instead
2022-08-16 22:29:00 +03:00
#[debug_handler]
pub async fn get_login(
Extension(app): Extension<Arc<Web3ProxyApp>>,
2022-08-17 00:43:39 +03:00
ClientIp(ip): ClientIp,
// TODO: what does axum's error handling look like?
Path(user_address): Path<Address>,
) -> FrontendResult {
// TODO: refactor this to use the try operator
let _ip = match app.rate_limit_by_ip(ip).await {
Ok(x) => match x.try_into_response().await {
Ok(RateLimitResult::AllowedIp(x)) => x,
Err(err_response) => return Ok(err_response),
_ => unimplemented!(),
},
Err(err) => return Ok(anyhow_error_into_response(None, None, err)),
};
// at first i thought about checking that user_address is in our db
// but theres no need to separate the create_user and login flows
// its a better UX to just click "login with ethereum" and have the account created if it doesn't exist
// we can prompt for an email and and payment after they log in
let session_id = uuid::Uuid::new_v4();
// TODO: if no redis, store in local cache?
let redis_pool = app
.redis_pool
.as_ref()
.expect("login requires a redis server");
let mut redis_conn = redis_pool.get().await.unwrap();
// TODO: how many seconds? get from config?
let session_expiration_seconds = 300;
2022-08-10 05:37:34 +03:00
2022-08-17 00:43:39 +03:00
let reply: String = redis_conn
.set_ex(
session_id.to_string(),
user_address.to_string(),
session_expiration_seconds,
)
.await
.unwrap();
2022-08-16 22:29:00 +03:00
2022-08-17 00:43:39 +03:00
todo!("how should this work? probably keep stuff in redis")
2022-08-16 22:29:00 +03:00
}
2022-08-04 02:17:02 +03:00
#[debug_handler]
2022-07-14 00:49:57 +03:00
pub async fn create_user(
// this argument tells axum to parse the request body
// as JSON into a `CreateUser` type
Json(payload): Json<CreateUser>,
2022-08-04 04:10:27 +03:00
Extension(app): Extension<Arc<Web3ProxyApp>>,
ClientIp(ip): ClientIp,
2022-08-11 04:53:27 +03:00
) -> Response {
2022-08-16 22:29:00 +03:00
// TODO: return a Result instead
2022-08-11 04:53:27 +03:00
let _ip = match app.rate_limit_by_ip(ip).await {
Ok(x) => match x.try_into_response().await {
Ok(RateLimitResult::AllowedIp(x)) => x,
Err(err_response) => return err_response,
_ => unimplemented!(),
},
2022-08-16 22:29:00 +03:00
Err(err) => return anyhow_error_into_response(None, None, err),
2022-08-11 04:53:27 +03:00
};
2022-08-04 04:10:27 +03:00
2022-08-10 05:37:34 +03:00
// TODO: check invite_code against the app's config or database
2022-08-04 04:10:27 +03:00
if payload.invite_code != "llam4n0des!" {
todo!("proper error message")
}
// TODO: dont unwrap. proper error
let signature: [u8; 65] = payload.signature.as_ref().try_into().unwrap();
// TODO: calculate the expected message for the current user. include domain and a nonce. let timestamp be automatic
let message: siwe::Message = "abc123".parse().unwrap();
if let Err(e) = message.verify(signature, None, None, None) {
// message cannot be correctly authenticated
todo!("proper error message: {}", e)
}
2022-08-04 02:17:02 +03:00
let user = user::ActiveModel {
address: sea_orm::Set(payload.address.to_fixed_bytes().into()),
2022-08-04 04:10:27 +03:00
email: sea_orm::Set(payload.email),
2022-08-04 02:17:02 +03:00
..Default::default()
2022-07-14 00:49:57 +03:00
};
2022-08-10 08:56:09 +03:00
let db = app.db_conn.as_ref().unwrap();
2022-08-04 02:17:02 +03:00
2022-08-04 04:10:27 +03:00
// TODO: proper error message
let user = user.insert(db).await.unwrap();
2022-08-04 02:17:02 +03:00
2022-08-16 22:29:00 +03:00
// TODO: create
2022-08-16 20:47:04 +03:00
2022-08-11 04:53:27 +03:00
// TODO: do not expose user ids
(StatusCode::CREATED, Json(user)).into_response()
2022-07-14 00:49:57 +03:00
}
// the input to our `create_user` handler
#[derive(Deserialize)]
pub struct CreateUser {
2022-08-04 02:17:02 +03:00
address: Address,
// TODO: make sure the email address is valid
2022-07-14 00:49:57 +03:00
email: Option<String>,
signature: Bytes,
2022-08-04 02:17:02 +03:00
invite_code: String,
2022-07-14 00:49:57 +03:00
}