summaryrefslogtreecommitdiff
path: root/src/persist.rs
blob: 2bca3867dfc2ee0b1f2747ea848e0429b8d63666 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
use std::time::SystemTime;
use serde_json::Value;
use crate::secure;


const PERSIST_TIME:         u64 = 60 * 3;
const PERSIST_PATH:         &str = "/var/run/crab";


/// Returns true or false if a user is currently persisted from
/// a prior authentication. If the persist file had been tampered
/// with, or not trusted, it will be ignored, and return false.
/// #### Arguments
/// * `user` - The user to check if is persisted
/// #### Returns
/// * `true` - If the user is persisted
/// * `false` - If the user is not persisted, or if the persist file is not trusted
pub fn get_persist(user: &str) -> bool {
    let json = match get_persist_config() {
        Some(data) => data,
        None => return false
    };
    let timestamp = match json[user].as_u64() {
        Some(data) => data,
        None => return false
    };
    return now() - timestamp < PERSIST_TIME && timestamp - 1 < now();
}


/// Updates a user in the current sessions persist file
/// #### Arguments
/// * `user` - The user to set persisted
pub fn set_persist(user: &str) {
    let mut json = match get_persist_config() {
        Some(data) => data,
        None => return
    };
    json[user] = Value::from(now());
    let session = match get_current_session() {
        Some(data) => data,
        None => return
    };
    match secure::write_file(PERSIST_PATH, &format!("{}", session), &json.to_string())  {
        Ok(_) => {},
        Err(_) => {
            eprintln!("crab: An internal error has occured");
        }
    };
}


/// Removes a user from the current sessions persist file
/// #### Arguments
/// * `user` - The user to set non-persisted
pub fn remove_persist(user: &str) {
    let mut json = match get_persist_config() {
        Some(data) => data,
        None => return
    };
    json[user] = Value::from(0);
    let session = match get_current_session() {
        Some(data) => data,
        None => return
    };
    match secure::write_file(PERSIST_PATH, &format!("{}", session), &json.to_string())  {
        Ok(_) => {},
        Err(_) => {
            eprintln!("crab: An internal error has occured");
        }
    };
}


/// Gets the current session that crab is running in
/// #### Returns
/// * `None` - If crab failed to get the current session
/// * `Some(i32)` - If the session is retrieved, returns the i32/pid_t session id
fn get_current_session() -> Option<i32> {
    let pid: i32 = match std::process::id().try_into() {
        Ok(data) => data,
        Err(_) => return None
    };
    let pid_stat = match procinfo::pid::stat(pid) {
        Ok(data) => data,
        Err(_) => return None
    };
    Some(pid_stat.session)
}


/// Gets the current persist file for the current session
/// #### Returns
/// * `None` - If the persist file is untrusted or doesnt exist
/// * `Some(Value)` - If the persist file is retrieved, returns the serde_json Value of the file
fn get_persist_config() -> Option<Value> {
    let session = match get_current_session() {
        Some(data) => data,
        None => return None
    };
    let data = match secure::read_file(PERSIST_PATH, &format!("{}", session)) {
        Some(data) => data,
        None => "{}".to_string()
    };
    let json: Value = match serde_json::from_str(&data) {
        Ok(data) => data,
        Err(_) => return None
    };
    Some(json)
}


// Gets the current time in seconds since the Unix Epoch
fn now() -> u64 {
    return SystemTime::now().duration_since(SystemTime::UNIX_EPOCH).unwrap().as_secs();
}