mirror of
https://github.com/zed-industries/zed.git
synced 2024-11-08 07:35:01 +03:00
Allow setting ZED_SERVER_URL to URL of a collab server
This commit is contained in:
parent
c410935c9c
commit
83e4e26989
@ -926,29 +926,34 @@ impl Client {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async fn get_rpc_url(http: Arc<dyn HttpClient>) -> Result<Url> {
|
async fn get_rpc_url(http: Arc<dyn HttpClient>) -> Result<Url> {
|
||||||
let rpc_response = http
|
let url = format!("{}/rpc", *ZED_SERVER_URL);
|
||||||
.get(
|
let response = http.get(&url, Default::default(), false).await?;
|
||||||
&(format!("{}/rpc", *ZED_SERVER_URL)),
|
|
||||||
Default::default(),
|
// Normally, ZED_SERVER_URL is set to the URL of zed.dev website.
|
||||||
false,
|
// The website's /rpc endpoint redirects to a collab server's /rpc endpoint,
|
||||||
)
|
// which requires authorization via an HTTP header.
|
||||||
.await?;
|
//
|
||||||
if !rpc_response.status().is_redirection() {
|
// For testing purposes, ZED_SERVER_URL can also set to the direct URL of
|
||||||
|
// of a collab server. In that case, a request to the /rpc endpoint will
|
||||||
|
// return an 'unauthorized' response.
|
||||||
|
let collab_url = if response.status().is_redirection() {
|
||||||
|
response
|
||||||
|
.headers()
|
||||||
|
.get("Location")
|
||||||
|
.ok_or_else(|| anyhow!("missing location header in /rpc response"))?
|
||||||
|
.to_str()
|
||||||
|
.map_err(EstablishConnectionError::other)?
|
||||||
|
.to_string()
|
||||||
|
} else if response.status() == StatusCode::UNAUTHORIZED {
|
||||||
|
url
|
||||||
|
} else {
|
||||||
Err(anyhow!(
|
Err(anyhow!(
|
||||||
"unexpected /rpc response status {}",
|
"unexpected /rpc response status {}",
|
||||||
rpc_response.status()
|
response.status()
|
||||||
))?
|
))?
|
||||||
}
|
};
|
||||||
|
|
||||||
let rpc_url = rpc_response
|
Url::parse(&collab_url).context("invalid rpc url")
|
||||||
.headers()
|
|
||||||
.get("Location")
|
|
||||||
.ok_or_else(|| anyhow!("missing location header in /rpc response"))?
|
|
||||||
.to_str()
|
|
||||||
.map_err(EstablishConnectionError::other)?
|
|
||||||
.to_string();
|
|
||||||
|
|
||||||
Url::parse(&rpc_url).context("invalid rpc url")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fn establish_websocket_connection(
|
fn establish_websocket_connection(
|
||||||
@ -1105,25 +1110,6 @@ impl Client {
|
|||||||
login: String,
|
login: String,
|
||||||
mut api_token: String,
|
mut api_token: String,
|
||||||
) -> Result<Credentials> {
|
) -> Result<Credentials> {
|
||||||
let mut url = Self::get_rpc_url(http.clone()).await?;
|
|
||||||
url.set_path("/user");
|
|
||||||
url.set_query(Some(&format!("github_login={login}")));
|
|
||||||
let request = Request::get(url.as_str())
|
|
||||||
.header("Authorization", format!("token {api_token}"))
|
|
||||||
.body("".into())?;
|
|
||||||
|
|
||||||
let mut response = http.send(request).await?;
|
|
||||||
let mut body = String::new();
|
|
||||||
response.body_mut().read_to_string(&mut body).await?;
|
|
||||||
|
|
||||||
if !response.status().is_success() {
|
|
||||||
Err(anyhow!(
|
|
||||||
"admin user request failed {} - {}",
|
|
||||||
response.status().as_u16(),
|
|
||||||
body,
|
|
||||||
))?;
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Deserialize)]
|
#[derive(Deserialize)]
|
||||||
struct AuthenticatedUserResponse {
|
struct AuthenticatedUserResponse {
|
||||||
user: User,
|
user: User,
|
||||||
@ -1134,8 +1120,28 @@ impl Client {
|
|||||||
id: u64,
|
id: u64,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Use the collab server's admin API to retrieve the id
|
||||||
|
// of the impersonated user.
|
||||||
|
let mut url = Self::get_rpc_url(http.clone()).await?;
|
||||||
|
url.set_path("/user");
|
||||||
|
url.set_query(Some(&format!("github_login={login}")));
|
||||||
|
let request = Request::get(url.as_str())
|
||||||
|
.header("Authorization", format!("token {api_token}"))
|
||||||
|
.body("".into())?;
|
||||||
|
|
||||||
|
let mut response = http.send(request).await?;
|
||||||
|
let mut body = String::new();
|
||||||
|
response.body_mut().read_to_string(&mut body).await?;
|
||||||
|
if !response.status().is_success() {
|
||||||
|
Err(anyhow!(
|
||||||
|
"admin user request failed {} - {}",
|
||||||
|
response.status().as_u16(),
|
||||||
|
body,
|
||||||
|
))?;
|
||||||
|
}
|
||||||
let response: AuthenticatedUserResponse = serde_json::from_str(&body)?;
|
let response: AuthenticatedUserResponse = serde_json::from_str(&body)?;
|
||||||
|
|
||||||
|
// Use the admin API token to authenticate as the impersonated user.
|
||||||
api_token.insert_str(0, "ADMIN_TOKEN:");
|
api_token.insert_str(0, "ADMIN_TOKEN:");
|
||||||
Ok(Credentials {
|
Ok(Credentials {
|
||||||
user_id: response.user.id,
|
user_id: response.user.id,
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
use std::sync::Arc;
|
use crate::{
|
||||||
|
db::{self, UserId},
|
||||||
use super::db::{self, UserId};
|
AppState, Error, Result,
|
||||||
use crate::{AppState, Error, Result};
|
};
|
||||||
use anyhow::{anyhow, Context};
|
use anyhow::{anyhow, Context};
|
||||||
use axum::{
|
use axum::{
|
||||||
http::{self, Request, StatusCode},
|
http::{self, Request, StatusCode},
|
||||||
@ -13,6 +13,7 @@ use scrypt::{
|
|||||||
password_hash::{PasswordHash, PasswordHasher, PasswordVerifier, SaltString},
|
password_hash::{PasswordHash, PasswordHasher, PasswordVerifier, SaltString},
|
||||||
Scrypt,
|
Scrypt,
|
||||||
};
|
};
|
||||||
|
use std::sync::Arc;
|
||||||
|
|
||||||
pub async fn validate_header<B>(mut req: Request<B>, next: Next<B>) -> impl IntoResponse {
|
pub async fn validate_header<B>(mut req: Request<B>, next: Next<B>) -> impl IntoResponse {
|
||||||
let mut auth_header = req
|
let mut auth_header = req
|
||||||
@ -21,7 +22,7 @@ pub async fn validate_header<B>(mut req: Request<B>, next: Next<B>) -> impl Into
|
|||||||
.and_then(|header| header.to_str().ok())
|
.and_then(|header| header.to_str().ok())
|
||||||
.ok_or_else(|| {
|
.ok_or_else(|| {
|
||||||
Error::Http(
|
Error::Http(
|
||||||
StatusCode::BAD_REQUEST,
|
StatusCode::UNAUTHORIZED,
|
||||||
"missing authorization header".to_string(),
|
"missing authorization header".to_string(),
|
||||||
)
|
)
|
||||||
})?
|
})?
|
||||||
|
Loading…
Reference in New Issue
Block a user