|
@@ -8,8 +8,11 @@ use clap::{Parser, Subcommand};
|
|
|
use microrm::{prelude::*, schema::Stored};
|
|
|
use microrm::cli::Autogenerate;
|
|
|
|
|
|
+mod client;
|
|
|
+mod group;
|
|
|
mod role;
|
|
|
mod user;
|
|
|
+mod scope;
|
|
|
|
|
|
impl microrm::cli::CLIError for UIDCError {
|
|
|
fn no_such_entity(ename: &'static str, keys: String) -> Self {
|
|
@@ -37,23 +40,41 @@ enum Command {
|
|
|
/// database initialization
|
|
|
Init,
|
|
|
/// OAuth2 client management
|
|
|
- Client(ClientArgs),
|
|
|
+ Client {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: Autogenerate<client::ClientInterface>,
|
|
|
+ },
|
|
|
/// general configuration
|
|
|
Config(ConfigArgs),
|
|
|
/// permissions grouping management
|
|
|
- Group(GroupArgs),
|
|
|
+ Group {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: Autogenerate<group::GroupInterface>,
|
|
|
+ },
|
|
|
/// key management
|
|
|
Key(KeyArgs),
|
|
|
/// scope management
|
|
|
- Scope(ScopeArgs),
|
|
|
+ Scope {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: Autogenerate<scope::ScopeInterface>,
|
|
|
+ },
|
|
|
/// run the actual OIDC server
|
|
|
Server(ServerArgs),
|
|
|
/// manual token generation and inspection
|
|
|
- Token(TokenArgs),
|
|
|
+ Token {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: TokenCommand,
|
|
|
+ },
|
|
|
/// role management
|
|
|
- Role(RoleArgs),
|
|
|
+ Role {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: Autogenerate<role::RoleInterface>,
|
|
|
+ },
|
|
|
/// user management
|
|
|
- User(UserArgs),
|
|
|
+ User {
|
|
|
+ #[clap(subcommand)]
|
|
|
+ cmd: Autogenerate<user::UserInterface>,
|
|
|
+ },
|
|
|
}
|
|
|
|
|
|
struct RunArgs {
|
|
@@ -85,13 +106,13 @@ impl RootArgs {
|
|
|
Command::Init => unreachable!(),
|
|
|
Command::Config(v) => v.run(ra).await,
|
|
|
Command::Key(v) => v.run(ra).await,
|
|
|
- Command::Client(v) => v.run(ra).await,
|
|
|
- Command::Scope(v) => v.run(ra).await,
|
|
|
- Command::Group(v) => v.run(ra).await,
|
|
|
+ Command::Client { cmd } => cmd.perform(&ra.realm, &ra.realm.clients),
|
|
|
+ Command::Scope { cmd } => cmd.perform(&ra.realm, &ra.realm.scopes),
|
|
|
+ Command::Group { cmd } => cmd.perform(&ra.realm, &ra.realm.groups),
|
|
|
Command::Server(v) => v.run(ra).await,
|
|
|
- Command::Token(v) => v.run(ra).await,
|
|
|
- Command::Role(v) => v.run(ra).await,
|
|
|
- Command::User(v) => v.run(ra).await,
|
|
|
+ Command::Token { cmd } => cmd.run(ra).await,
|
|
|
+ Command::Role { cmd } => cmd.perform(&ra.realm, &ra.realm.roles),
|
|
|
+ Command::User { cmd } => cmd.perform(&ra.realm, &ra.realm.users),
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -211,7 +232,7 @@ impl ConfigArgs {
|
|
|
match &self.command {
|
|
|
ConfigCommand::Dump => {
|
|
|
let config = config::Config::build_from(&args.db, None);
|
|
|
- println!("{:?}", config);
|
|
|
+ println!("{:#?}", config);
|
|
|
}
|
|
|
ConfigCommand::Set { key, value } => {
|
|
|
args.db.persistent_config.keyed(key).delete()?;
|
|
@@ -229,87 +250,6 @@ impl ConfigArgs {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-#[derive(Debug, Subcommand)]
|
|
|
-enum GroupCommand {
|
|
|
- Create {
|
|
|
- group_name: String,
|
|
|
- },
|
|
|
- Members {
|
|
|
- group_name: String,
|
|
|
- },
|
|
|
- Roles {
|
|
|
- group_name: String,
|
|
|
- },
|
|
|
- List,
|
|
|
- AttachRole {
|
|
|
- group_name: String,
|
|
|
- role_name: String,
|
|
|
- },
|
|
|
- DetachRole {
|
|
|
- group_name: String,
|
|
|
- role_name: String,
|
|
|
- },
|
|
|
- AttachUser {
|
|
|
- group_name: String,
|
|
|
- username: String,
|
|
|
- },
|
|
|
- DetachUser {
|
|
|
- group_name: String,
|
|
|
- username: String,
|
|
|
- },
|
|
|
-}
|
|
|
-
|
|
|
-#[derive(Debug, Parser)]
|
|
|
-struct GroupArgs {
|
|
|
- #[clap(subcommand)]
|
|
|
- command: GroupCommand,
|
|
|
-}
|
|
|
-
|
|
|
-impl GroupArgs {
|
|
|
- async fn run(self, args: RunArgs) -> Result<(), UIDCError> {
|
|
|
- todo!()
|
|
|
- /*match &self.command {
|
|
|
- GroupCommand::Create { group_name } => {
|
|
|
- group_management::create_group(&args.realm, group_name)?;
|
|
|
- }
|
|
|
- GroupCommand::Members { group_name } => {
|
|
|
- group_management::list_members(&args.realm, group_name)?;
|
|
|
- }
|
|
|
- GroupCommand::Roles { group_name } => {
|
|
|
- group_management::list_roles(&args.realm, group_name)?;
|
|
|
- }
|
|
|
- GroupCommand::List => {
|
|
|
- group_management::list_groups(&args.realm)?;
|
|
|
- }
|
|
|
- GroupCommand::AttachRole {
|
|
|
- group_name,
|
|
|
- role_name,
|
|
|
- } => {
|
|
|
- group_management::attach_role(&args.realm, group_name, role_name)?;
|
|
|
- }
|
|
|
- GroupCommand::DetachRole {
|
|
|
- group_name,
|
|
|
- role_name,
|
|
|
- } => {
|
|
|
- group_management::detach_role(&args.realm, group_name, role_name)?;
|
|
|
- }
|
|
|
- GroupCommand::AttachUser {
|
|
|
- group_name,
|
|
|
- username,
|
|
|
- } => {
|
|
|
- group_management::attach_user(&args.realm, group_name, username)?;
|
|
|
- }
|
|
|
- GroupCommand::DetachUser {
|
|
|
- group_name,
|
|
|
- username,
|
|
|
- } => {
|
|
|
- group_management::detach_user(&args.realm, group_name, username)?;
|
|
|
- }
|
|
|
- }*/
|
|
|
- // Ok(())
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
#[derive(Debug, Subcommand)]
|
|
|
enum ScopeCommand {
|
|
|
AttachRole {
|
|
@@ -393,16 +333,10 @@ enum TokenCommand {
|
|
|
},
|
|
|
}
|
|
|
|
|
|
-#[derive(Debug, Parser)]
|
|
|
-struct TokenArgs {
|
|
|
- #[clap(subcommand)]
|
|
|
- command: TokenCommand,
|
|
|
-}
|
|
|
-
|
|
|
-impl TokenArgs {
|
|
|
+impl TokenCommand {
|
|
|
async fn run(self, args: RunArgs) -> Result<(), UIDCError> {
|
|
|
let config = config::Config::build_from(&args.db, None);
|
|
|
- match &self.command {
|
|
|
+ match self {
|
|
|
TokenCommand::GenerateAuth {
|
|
|
client,
|
|
|
username,
|
|
@@ -411,9 +345,9 @@ impl TokenArgs {
|
|
|
let token = token_management::create_auth_token(
|
|
|
&args.realm,
|
|
|
&config,
|
|
|
- client,
|
|
|
- username,
|
|
|
- scopes,
|
|
|
+ &client,
|
|
|
+ &username,
|
|
|
+ &scopes,
|
|
|
)?;
|
|
|
println!("{}", token);
|
|
|
Ok(())
|
|
@@ -426,9 +360,9 @@ impl TokenArgs {
|
|
|
let token = token_management::create_refresh_token(
|
|
|
&args.realm,
|
|
|
&config,
|
|
|
- client,
|
|
|
- username,
|
|
|
- scopes,
|
|
|
+ &client,
|
|
|
+ &username,
|
|
|
+ &scopes,
|
|
|
)?;
|
|
|
println!("{}", token);
|
|
|
Ok(())
|
|
@@ -440,50 +374,6 @@ impl TokenArgs {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-#[derive(Debug, Subcommand)]
|
|
|
-enum RoleCommand {
|
|
|
- List,
|
|
|
- Create { name: String },
|
|
|
- Delete { name: String },
|
|
|
-}
|
|
|
-
|
|
|
-#[derive(Debug, Parser)]
|
|
|
-struct RoleArgs {
|
|
|
- #[clap(subcommand)]
|
|
|
- command: Autogenerate<role::RoleInterface>,
|
|
|
-}
|
|
|
-
|
|
|
-impl RoleArgs {
|
|
|
- async fn run(self, args: RunArgs) -> Result<(), UIDCError> {
|
|
|
- self.command.perform(&args.realm, &args.realm.roles, &args.realm.roles)
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-#[derive(Debug, Subcommand)]
|
|
|
-enum UserCommand {
|
|
|
- Auth {
|
|
|
- username: String,
|
|
|
-
|
|
|
- #[clap(short = 'p', long, action = clap::ArgAction::Count)]
|
|
|
- change_password: usize,
|
|
|
-
|
|
|
- #[clap(short = 't', long, action = clap::ArgAction::Count)]
|
|
|
- change_totp: usize,
|
|
|
- },
|
|
|
-}
|
|
|
-
|
|
|
-#[derive(Debug, Parser)]
|
|
|
-struct UserArgs {
|
|
|
- #[clap(subcommand)]
|
|
|
- command: Autogenerate<user::UserInterface>,
|
|
|
-}
|
|
|
-
|
|
|
-impl UserArgs {
|
|
|
- async fn run(self, args: RunArgs) -> Result<(), UIDCError> {
|
|
|
- self.command.perform(&args.realm, &args.realm.users, &args.realm.users)
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
pub fn invoked() {
|
|
|
let args = RootArgs::parse();
|
|
|
|