kanidm/kanidmd/idm/src/config.rs

236 lines
7.4 KiB
Rust
Raw Normal View History

2021-06-02 01:42:40 +02:00
//! The server configuration as processed from the startup wrapper. This controls a number of
//! variables that determine how our backends, query server, and frontends are configured.
//!
//! These components should be "per server". Any "per domain" config should be in the system
//! or domain entries that are able to be replicated.
2019-07-27 08:54:31 +02:00
use rand::prelude::*;
2021-12-31 00:11:20 +01:00
use serde::{Deserialize, Serialize};
use std::fmt;
use std::str::FromStr;
#[derive(Serialize, Deserialize, Debug)]
pub struct IntegrationTestConfig {
2021-04-25 03:35:56 +02:00
pub admin_user: String,
pub admin_password: String,
}
2021-07-31 09:13:46 +02:00
#[derive(Serialize, Deserialize, Debug)]
pub struct OnlineBackup {
pub path: String,
#[serde(default = "default_online_backup_schedule")]
pub schedule: String,
#[serde(default = "default_online_backup_versions")]
pub versions: usize,
}
fn default_online_backup_schedule() -> String {
"00 22 * * *".to_string()
}
fn default_online_backup_versions() -> usize {
7
}
#[derive(Serialize, Deserialize, Debug)]
pub struct TlsConfiguration {
pub chain: String,
pub key: String,
}
#[derive(Debug, Serialize, Deserialize, Clone, Copy)]
pub enum ServerRole {
WriteReplica,
WriteReplicaNoUI,
ReadOnlyReplica,
}
impl Default for ServerRole {
fn default() -> Self {
ServerRole::WriteReplica
}
}
impl ToString for ServerRole {
fn to_string(&self) -> String {
match self {
ServerRole::WriteReplica => "write replica".to_string(),
ServerRole::WriteReplicaNoUI => "write replica (no ui)".to_string(),
ServerRole::ReadOnlyReplica => "read only replica".to_string(),
}
}
}
impl FromStr for ServerRole {
type Err = &'static str;
fn from_str(s: &str) -> Result<Self, Self::Err> {
match s {
"write_replica" => Ok(ServerRole::WriteReplica),
"write_replica_no_ui" => Ok(ServerRole::WriteReplicaNoUI),
"read_only_replica" => Ok(ServerRole::ReadOnlyReplica),
_ => Err("Must be one of write_replica, write_replica_no_ui, read_only_replica"),
}
}
}
#[derive(Serialize, Deserialize, Debug, Default)]
2018-11-26 07:13:22 +01:00
pub struct Configuration {
pub address: String,
pub ldapaddress: Option<String>,
2018-11-26 07:13:22 +01:00
pub threads: usize,
2019-07-27 08:54:31 +02:00
// db type later
2018-11-26 07:13:22 +01:00
pub db_path: String,
2020-08-04 08:52:57 +02:00
pub db_fs_type: Option<String>,
pub db_arc_size: Option<usize>,
2018-11-26 07:13:22 +01:00
pub maximum_request: usize,
pub secure_cookies: bool,
pub tls_config: Option<TlsConfiguration>,
2019-07-27 08:54:31 +02:00
pub cookie_key: [u8; 32],
pub integration_test_config: Option<Box<IntegrationTestConfig>>,
pub log_level: Option<u32>,
2021-07-31 09:13:46 +02:00
pub online_backup: Option<OnlineBackup>,
pub domain: String,
pub origin: String,
pub role: ServerRole,
2018-11-26 07:13:22 +01:00
}
impl fmt::Display for Configuration {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
write!(f, "address: {}, ", self.address)
.and_then(|_| match &self.ldapaddress {
Some(la) => write!(f, "ldap address: {}, ", la),
None => write!(f, "ldap address: disabled, "),
})
.and_then(|_| write!(f, "thread count: {}, ", self.threads))
.and_then(|_| write!(f, "dbpath: {}, ", self.db_path))
.and_then(|_| match self.db_arc_size {
Some(v) => write!(f, "arcsize: {}, ", v),
None => write!(f, "arcsize: AUTO, "),
})
.and_then(|_| write!(f, "max request size: {}b, ", self.maximum_request))
.and_then(|_| write!(f, "secure cookies: {}, ", self.secure_cookies))
.and_then(|_| write!(f, "with TLS: {}, ", self.tls_config.is_some()))
.and_then(|_| match self.log_level {
Some(u) => write!(f, "with log_level: {:x}, ", u),
None => write!(f, "with log_level: default, "),
})
2021-07-31 09:13:46 +02:00
.and_then(|_| match &self.online_backup {
Some(_) => write!(f, "with online_backup: enabled, "),
None => write!(f, "with online_backup: disabled, "),
})
.and_then(|_| write!(f, "role: {}, ", self.role.to_string()))
.and_then(|_| {
write!(
f,
"integration mode: {}",
self.integration_test_config.is_some()
)
})
}
}
2018-11-26 07:13:22 +01:00
impl Configuration {
pub fn new() -> Self {
2019-07-27 08:54:31 +02:00
let mut c = Configuration {
2018-11-26 07:13:22 +01:00
address: String::from("127.0.0.1:8080"),
ldapaddress: None,
2022-03-07 00:22:35 +01:00
threads: std::thread::available_parallelism()
.map(|t| t.get())
.unwrap_or_else(|_e| {
eprintln!("WARNING: Unable to read number of available CPUs, defaulting to 1");
1
}),
2018-11-26 07:13:22 +01:00
db_path: String::from(""),
2020-08-04 08:52:57 +02:00
db_fs_type: None,
db_arc_size: None,
maximum_request: 262_144, // 256k
// log type
// log path
2019-07-27 08:54:31 +02:00
// TODO #63: default true in prd
secure_cookies: !cfg!(test),
tls_config: None,
2019-07-27 08:54:31 +02:00
cookie_key: [0; 32],
integration_test_config: None,
log_level: None,
2021-07-31 09:13:46 +02:00
online_backup: None,
domain: "idm.example.com".to_string(),
origin: "https://idm.example.com".to_string(),
role: ServerRole::WriteReplica,
2019-07-27 08:54:31 +02:00
};
let mut rng = StdRng::from_entropy();
rng.fill(&mut c.cookie_key);
c
2018-11-26 07:13:22 +01:00
}
pub fn update_log_level(&mut self, log_level: Option<u32>) {
self.log_level = log_level;
}
2021-07-31 09:13:46 +02:00
pub fn update_online_backup(&mut self, cfg: &Option<OnlineBackup>) {
match cfg {
None => {}
Some(cfg) => {
let path = cfg.path.to_string();
let schedule = cfg.schedule.to_string();
let versions = cfg.versions;
self.online_backup = Some(OnlineBackup {
path,
schedule,
versions,
})
}
}
}
pub fn update_db_path(&mut self, p: &str) {
self.db_path = p.to_string();
}
2020-08-04 08:52:57 +02:00
pub fn update_db_arc_size(&mut self, v: Option<usize>) {
self.db_arc_size = v
}
2020-08-04 08:52:57 +02:00
pub fn update_db_fs_type(&mut self, p: &Option<String>) {
self.db_fs_type = p.as_ref().map(|v| v.to_lowercase());
}
pub fn update_bind(&mut self, b: &Option<String>) {
self.address = b
.as_ref()
.cloned()
.unwrap_or_else(|| String::from("127.0.0.1:8080"));
}
pub fn update_ldapbind(&mut self, l: &Option<String>) {
self.ldapaddress = l.clone();
}
pub fn update_origin(&mut self, o: &str) {
self.origin = o.to_string();
}
pub fn update_domain(&mut self, d: &str) {
self.domain = d.to_string();
}
pub fn update_role(&mut self, r: ServerRole) {
self.role = r;
}
pub fn update_tls(&mut self, chain: &Option<String>, key: &Option<String>) {
match (chain, key) {
(None, None) => {}
(Some(chainp), Some(keyp)) => {
let chain = chainp.to_string();
let key = keyp.to_string();
self.tls_config = Some(TlsConfiguration { chain, key })
}
_ => {
eprintln!("ERROR: Invalid TLS configuration - must provide chain and key!");
std::process::exit(1);
}
}
}
2018-11-26 07:13:22 +01:00
}