Skip to content

accesso-app/backend

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Readme

StackShare API Docker Image CI

Directories and crates

  • db — database schema, can be reused in different crates
  • core — main crate with business-logic of the accesso
  • api-private — crate with actix-web http2 routes, used only inside private network
  • api-internal — crate with http server, used only by accesso frontend
  • api-admin — crate with http server, used only by accesso admin frontend
  • api-public — crate with http server, used from outside

Local installation

First, install stable rust.

Install PostgreSQL:

brew install postgresql

Install sqlx_cli:

cargo install sqlx-cli --no-default-features --features postgres

Run postgresql service:

brew services start postgresql
# or run it just once
pg_ctl -D /usr/local/var/postgres start

Enter postgres database:

psql postgres

Create DB, user, grant all privileges and quit (line by line):

CREATE DATABASE accesso;
CREATE USER accesso WITH LOGIN ENCRYPTED PASSWORD 'accesso';
GRANT ALL PRIVILEGES ON DATABASE accesso TO accesso;
\q

Log in to accesso database:

psql accesso

Install uuid-ossp extension and quit:

CREATE EXTENSION "uuid-ossp";
\q

Create .env and .config.toml:

cp .env.sample .env
cp .config.toml.sample .config.toml

Migrate database:

sqlx migrate run

Finally, install just and run.

Development

  • Use just to run commands from justfile
  • just — to build and start api-internal crate (aliased to just internal)
  • just public — to build and run api-public

You shouldn't run migrations at CI, but you have to prepare sqlx-data file for deploy - after changing any sql query you need to run in root:

cargo sqlx prepare --merged

ENVs

  • ACCESSO_MODE ("development", "test", or "production") — changes environment for config loading
  • DATABASE_URL — Database connection URL (postgres://accesso:accesso@localhost:5432/accesso)
  • ACCESSO_SERVER__PORT — port to listen on
  • ACCESSO_SERVER__HOST — host to listen on
  • Each variable from config/default.toml can be set via environment variable using config

Note: each variable should be prefixed via "ACCESSO_", section name should be separated with __ Example: server.port -> ACCESSO_SERVER__PORT Example: database.pool_size -> ACCESSO_DATABASE__POOL_SIZE

Configuration

Each API can load configuration in toml, hjson, json, yaml, and ini. File config/default.toml is required.

Config loading formats: config/{API}-{ENV} and .config-{API}-{ENV}, API and ENV are optional.

After loading config/default.toml, server is trying to load environment configs and specific for API. For example, you have set ACCESSO_MODE=production and starting api-public:

  • config/default-production.toml
  • config/public.toml
  • config/public-production.toml
  • .config.toml
  • .config-production.toml
  • .config-public.toml
  • .config-public-production.toml

Configs in repository's root should be prefixed with dot (ex.: .config-production.json) and should NOT be committed. It is just local configs.

Glossary

It's implements simplified OAuth 2.0 flow (example)

  • Client — OAuth 2.0 Client App.
  • **User — the person who wants to be authenticated, to access protected information.
  • Accesso — Authorization server.
  • Registration Request — When User registers on Accesso, server send code of request to his email.
  • Authorization Code — When user authorizes in Client through OAuth 2.0 authorization code flow, he needs to exchange code to access token.
  • Access Token — Token that exchanged from authorization code, used to send requests from Client server to Accesso server on behalf of User.
  • Session Token — Token used to authenticate user on Accesso Frontend, it writes to cookies.

Authorization code flow

accesso.server is an alias for domain of an Accesso instance

  1. On the Client side, user presses "Login with Accesso" button.
  2. Client redirects to accesso.server/oauth/authorize with Client ID, redirect URI and state.
  3. Accesso Frontend shows pages and checks User authentication.
  4. If User not authenticated, redirect to login, then redirect back to /oauth/authorize with all parameters.
  5. Accesso Frontend sends oauthAuthorize to Accesso Internal API.
  6. Accesso Internal API validates Client ID and parameters.
  7. [?] Accesso Internal API checks if User already registered in the Client.
  8. [?] If User not registered in the Client, Accesso Internal API returns need_confirmation to Accesso Frontend.
  9. [?] Accesso Frontend shows a confirmation window to User.
  10. [?] When User clicks "Register" in the confirmation window, Accesso Frontend sends oauthRegister (?) to Accesso Internal API with all parameters.
  11. [?] Accesso Internal API creates Authorization Code and returns it to Accesso Frontend.
  12. Accesso Frontend redirects to redirect URI passed from Client with Authorization Code.
  13. Client Server send oauthToken to Accesso Public API with authorization code, Client ID and secret to exchange it to Access Token.
  14. Accesso Public API validates parameters and returns a new Accesso Token.
  15. Client Server send any request to Accesso Public API with Access Token.