use std::collections::HashMap; use chrono::Utc; use eyre::{bail, Result}; use reqwest::header::{HeaderMap, AUTHORIZATION, USER_AGENT}; use reqwest::{StatusCode, Url}; use sodiumoxide::crypto::secretbox; use atuin_common::api::{ AddHistoryRequest, CountResponse, LoginRequest, LoginResponse, RegisterResponse, SyncHistoryResponse, }; use atuin_common::utils::hash_str; use crate::encryption::{decode_key, decrypt}; use crate::history::History; static APP_USER_AGENT: &str = concat!("atuin/", env!("CARGO_PKG_VERSION"),); // TODO: remove all references to the encryption key from this // It should be handled *elsewhere* pub struct Client<'a> { sync_addr: &'a str, key: secretbox::Key, client: reqwest::Client, } pub async fn register( address: &str, username: &str, email: &str, password: &str, ) -> Result { let mut map = HashMap::new(); map.insert("username", username); map.insert("email", email); map.insert("password", password); let url = format!("{}/user/{}", address, username); let resp = reqwest::get(url).await?; if resp.status().is_success() { bail!("username already in use"); } let url = format!("{}/register", address); let client = reqwest::Client::new(); let resp = client .post(url) .header(USER_AGENT, APP_USER_AGENT) .json(&map) .send() .await?; if !resp.status().is_success() { bail!("failed to register user"); } let session = resp.json::().await?; Ok(session) } pub async fn login(address: &str, req: LoginRequest) -> Result { let url = format!("{}/login", address); let client = reqwest::Client::new(); let resp = client .post(url) .header(USER_AGENT, APP_USER_AGENT) .json(&req) .send() .await?; if resp.status() != reqwest::StatusCode::OK { bail!("invalid login details"); } let session = resp.json::().await?; Ok(session) } impl<'a> Client<'a> { pub fn new(sync_addr: &'a str, session_token: &'a str, key: String) -> Result { let mut headers = HeaderMap::new(); headers.insert(AUTHORIZATION, format!("Token {}", session_token).parse()?); Ok(Client { sync_addr, key: decode_key(key)?, client: reqwest::Client::builder() .user_agent(APP_USER_AGENT) .default_headers(headers) .build()?, }) } pub async fn count(&self) -> Result { let url = format!("{}/sync/count", self.sync_addr); let url = Url::parse(url.as_str())?; let resp = self.client.get(url).send().await?; if resp.status() != StatusCode::OK { bail!("failed to get count (are you logged in?)"); } let count = resp.json::().await?; Ok(count.count) } pub async fn get_history( &self, sync_ts: chrono::DateTime, history_ts: chrono::DateTime, host: Option, ) -> Result> { let host = match host { None => hash_str(&format!("{}:{}", whoami::hostname(), whoami::username())), Some(h) => h, }; let url = format!( "{}/sync/history?sync_ts={}&history_ts={}&host={}", self.sync_addr, urlencoding::encode(sync_ts.to_rfc3339().as_str()), urlencoding::encode(history_ts.to_rfc3339().as_str()), host, ); let resp = self.client.get(url).send().await?; let history = resp.json::().await?; let history = history .history .iter() .map(|h| serde_json::from_str(h).expect("invalid base64")) .map(|h| decrypt(&h, &self.key).expect("failed to decrypt history! check your key")) .collect(); Ok(history) } pub async fn post_history(&self, history: &[AddHistoryRequest]) -> Result<()> { let url = format!("{}/history", self.sync_addr); let url = Url::parse(url.as_str())?; self.client.post(url).json(history).send().await?; Ok(()) } }