commit 7ee71d4a95ec5ca5747aaf04e57eb1231f48f58d Author: Suya1671 Date: Sun Jun 8 21:12:07 2025 +0200 feat: initial commit diff --git a/.env.example b/.env.example new file mode 100755 index 0000000..3794d76 --- /dev/null +++ b/.env.example @@ -0,0 +1,9 @@ +SLACK_APP_TOKEN= +SLACK_BOT_TOKEN= +SLACK_CLIENT_ID= +SLACK_CLIENT_SECRET= +SLACK_SIGNING_SECRET= +# make sure to enable encryption in the feature flags to use this! +# highly recommened for production +# ENCRYPTION_KEY= +DATABASE_URL=sqlite://slackbot.db diff --git a/.gitignore b/.gitignore new file mode 100755 index 0000000..3283d5b --- /dev/null +++ b/.gitignore @@ -0,0 +1,18 @@ +/target +result* +.envrc +.env +!.env.example + +# Devenv +.devenv* +devenv.local.nix + +# direnv +.direnv + +# pre-commit +.pre-commit-config.yaml + +# sqlite dev files +*.db diff --git a/Cargo.lock b/Cargo.lock new file mode 100755 index 0000000..e467251 --- /dev/null +++ b/Cargo.lock @@ -0,0 +1,3719 @@ +# This file is automatically @generated by Cargo. +# It is not intended for manual editing. +version = 4 + +[[package]] +name = "addr2line" +version = "0.24.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dfbe277e56a376000877090da837660b4427aad530e3028d44e0bffe4f89a1c1" +dependencies = [ + "gimli", +] + +[[package]] +name = "adler2" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "512761e0bb2578dd7380c6baaa0f4ce03e84f95e960231d1dec8bf4d7d6e2627" + +[[package]] +name = "aho-corasick" +version = "1.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e60d3430d3a69478ad0993f19238d2df97c507009a52b3c10addcd7f6bcb916" +dependencies = [ + "memchr", +] + +[[package]] +name = "allocator-api2" +version = "0.2.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "683d7910e743518b0e34f1186f92494becacb047c7b6bf616c96772180fef923" + +[[package]] +name = "android-tzdata" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e999941b234f3131b00bc13c22d06e8c5ff726d1b6318ac7eb276997bbb4fef0" + +[[package]] +name = "android_system_properties" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "819e7219dbd41043ac279b19830f2efc897156490d7fd6ea916720117ee66311" +dependencies = [ + "libc", +] + +[[package]] +name = "anstream" +version = "0.6.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "301af1932e46185686725e0fad2f8f2aa7da69dd70bf6ecc44d6b703844a3933" +dependencies = [ + "anstyle", + "anstyle-parse", + "anstyle-query", + "anstyle-wincon", + "colorchoice", + "is_terminal_polyfill", + "utf8parse", +] + +[[package]] +name = "anstyle" +version = "1.0.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "862ed96ca487e809f1c8e5a8447f6ee2cf102f846893800b20cebdf541fc6bbd" + +[[package]] +name = "anstyle-parse" +version = "0.2.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4e7644824f0aa2c7b9384579234ef10eb7efb6a0deb83f9630a49594dd9c15c2" +dependencies = [ + "utf8parse", +] + +[[package]] +name = "anstyle-query" +version = "1.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6c8bdeb6047d8983be085bab0ba1472e6dc604e7041dbf6fcd5e71523014fae9" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "anstyle-wincon" +version = "3.0.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "403f75924867bb1033c59fbf0797484329750cfbe3c4325cd33127941fabc882" +dependencies = [ + "anstyle", + "once_cell_polyfill", + "windows-sys 0.59.0", +] + +[[package]] +name = "anyhow" +version = "1.0.98" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e16d2d3311acee920a9eb8d33b8cbc1787ce4a264e85f964c2404b969bdcd487" + +[[package]] +name = "async-recursion" +version = "1.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3b43422f69d8ff38f95f1b2bb76517c91589a924d1559a0e935d7c8ce0274c11" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "async-trait" +version = "0.1.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e539d3fca749fcee5236ab05e93a52867dd549cc157c8cb7f99595f3cedffdb5" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "atoi" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f28d99ec8bfea296261ca1af174f24225171fea9664ba9003cbebee704810528" +dependencies = [ + "num-traits", +] + +[[package]] +name = "atomic-waker" +version = "1.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1505bd5d3d116872e7271a6d4e16d81d0c8570876c8de68093a09ac269d8aac0" + +[[package]] +name = "autocfg" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ace50bade8e6234aa140d9a2f552bbee1db4d353f69b8217bc503490fc1a9f26" + +[[package]] +name = "aws-lc-rs" +version = "1.13.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "93fcc8f365936c834db5514fc45aee5b1202d677e6b40e48468aaaa8183ca8c7" +dependencies = [ + "aws-lc-sys", + "zeroize", +] + +[[package]] +name = "aws-lc-sys" +version = "0.29.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "61b1d86e7705efe1be1b569bab41d4fa1e14e220b60a160f78de2db687add079" +dependencies = [ + "bindgen", + "cc", + "cmake", + "dunce", + "fs_extra", +] + +[[package]] +name = "axum" +version = "0.8.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "021e862c184ae977658b36c4500f7feac3221ca5da43e3f25bd04ab6c79a29b5" +dependencies = [ + "axum-core", + "bytes", + "form_urlencoded", + "futures-util", + "http", + "http-body", + "http-body-util", + "hyper", + "hyper-util", + "itoa", + "matchit", + "memchr", + "mime", + "percent-encoding", + "pin-project-lite", + "rustversion", + "serde", + "serde_json", + "serde_path_to_error", + "serde_urlencoded", + "sync_wrapper", + "tokio", + "tower", + "tower-layer", + "tower-service", + "tracing", +] + +[[package]] +name = "axum-core" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "68464cd0412f486726fb3373129ef5d2993f90c34bc2bc1c1e9943b2f4fc7ca6" +dependencies = [ + "bytes", + "futures-core", + "http", + "http-body", + "http-body-util", + "mime", + "pin-project-lite", + "rustversion", + "sync_wrapper", + "tower-layer", + "tower-service", + "tracing", +] + +[[package]] +name = "backtrace" +version = "0.3.75" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6806a6321ec58106fea15becdad98371e28d92ccbc7c8f1b3b6dd724fe8f1002" +dependencies = [ + "addr2line", + "cfg-if", + "libc", + "miniz_oxide", + "object", + "rustc-demangle", + "windows-targets 0.52.6", +] + +[[package]] +name = "base64" +version = "0.22.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6" + +[[package]] +name = "base64ct" +version = "1.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "55248b47b0caf0546f7988906588779981c43bb1bc9d0c44087278f80cdb44ba" + +[[package]] +name = "bindgen" +version = "0.69.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "271383c67ccabffb7381723dea0672a673f292304fcb45c01cc648c7a8d58088" +dependencies = [ + "bitflags", + "cexpr", + "clang-sys", + "itertools", + "lazy_static", + "lazycell", + "log", + "prettyplease", + "proc-macro2", + "quote", + "regex", + "rustc-hash 1.1.0", + "shlex", + "syn 2.0.101", + "which", +] + +[[package]] +name = "bitflags" +version = "2.9.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b8e56985ec62d17e9c1001dc89c88ecd7dc08e47eba5ec7c29c7b5eeecde967" +dependencies = [ + "serde", +] + +[[package]] +name = "block-buffer" +version = "0.10.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3078c7629b62d3f0439517fa394996acacc5cbc91c5a20d8c658e77abd503a71" +dependencies = [ + "generic-array", +] + +[[package]] +name = "bumpalo" +version = "3.18.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "793db76d6187cd04dff33004d8e6c9cc4e05cd330500379d2394209271b4aeee" + +[[package]] +name = "byteorder" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" + +[[package]] +name = "bytes" +version = "1.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d71b6127be86fdcfddb610f7182ac57211d4b18a3e9c82eb2d17662f2227ad6a" + +[[package]] +name = "cc" +version = "1.2.26" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "956a5e21988b87f372569b66183b78babf23ebc2e744b733e4350a752c4dafac" +dependencies = [ + "jobserver", + "libc", + "shlex", +] + +[[package]] +name = "cexpr" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6fac387a98bb7c37292057cffc56d62ecb629900026402633ae9160df93a8766" +dependencies = [ + "nom", +] + +[[package]] +name = "cfg-if" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" + +[[package]] +name = "cfg_aliases" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "613afe47fcd5fac7ccf1db93babcb082c5994d996f20b8b159f2ad1658eb5724" + +[[package]] +name = "chrono" +version = "0.4.41" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c469d952047f47f91b68d1cba3f10d63c11d73e4636f24f08daf0278abf01c4d" +dependencies = [ + "android-tzdata", + "iana-time-zone", + "js-sys", + "num-traits", + "serde", + "wasm-bindgen", + "windows-link", +] + +[[package]] +name = "clang-sys" +version = "1.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b023947811758c97c59bf9d1c188fd619ad4718dcaa767947df1cadb14f39f4" +dependencies = [ + "glob", + "libc", + "libloading", +] + +[[package]] +name = "clap" +version = "4.5.39" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fd60e63e9be68e5fb56422e397cf9baddded06dae1d2e523401542383bc72a9f" +dependencies = [ + "clap_builder", + "clap_derive", +] + +[[package]] +name = "clap_builder" +version = "4.5.39" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "89cc6392a1f72bbeb820d71f32108f61fdaf18bc526e1d23954168a67759ef51" +dependencies = [ + "anstream", + "anstyle", + "clap_lex", + "strsim", +] + +[[package]] +name = "clap_derive" +version = "4.5.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09176aae279615badda0765c0c0b3f6ed53f4709118af73cf4655d85d1530cd7" +dependencies = [ + "heck", + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "clap_lex" +version = "0.7.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f46ad14479a25103f283c0f10005961cf086d8dc42205bb44c46ac563475dca6" + +[[package]] +name = "cmake" +version = "0.1.54" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e7caa3f9de89ddbe2c607f4101924c5abec803763ae9534e4f4d7d8f84aa81f0" +dependencies = [ + "cc", +] + +[[package]] +name = "colorchoice" +version = "1.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b05b61dc5112cbb17e4b6cd61790d9845d13888356391624cbe7e41efeac1e75" + +[[package]] +name = "concurrent-queue" +version = "2.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4ca0197aee26d1ae37445ee532fefce43251d24cc7c166799f4d46817f1d3973" +dependencies = [ + "crossbeam-utils", +] + +[[package]] +name = "const-oid" +version = "0.9.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c2459377285ad874054d797f3ccebf984978aa39129f6eafde5cdc8315b612f8" + +[[package]] +name = "core-foundation" +version = "0.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2a6cd9ae233e7f62ba4e9353e81a88df7fc8a5987b8d445b4d90c879bd156f6" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "core-foundation-sys" +version = "0.8.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "773648b94d0e5d620f64f280777445740e61fe701025087ec8b57f45c791888b" + +[[package]] +name = "cpufeatures" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59ed5838eebb26a2bb2e58f6d5b5316989ae9d08bab10e0e6d103e656d1b0280" +dependencies = [ + "libc", +] + +[[package]] +name = "crc" +version = "3.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9710d3b3739c2e349eb44fe848ad0b7c8cb1e42bd87ee49371df2f7acaf3e675" +dependencies = [ + "crc-catalog", +] + +[[package]] +name = "crc-catalog" +version = "2.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "19d374276b40fb8bbdee95aef7c7fa6b5316ec764510eb64b8dd0e2ed0d7e7f5" + +[[package]] +name = "crossbeam-queue" +version = "0.3.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0f58bbc28f91df819d0aa2a2c00cd19754769c2fad90579b3592b1c9ba7a3115" +dependencies = [ + "crossbeam-utils", +] + +[[package]] +name = "crossbeam-utils" +version = "0.8.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0a5c400df2834b80a4c3327b3aad3a4c4cd4de0629063962b03235697506a28" + +[[package]] +name = "crypto-common" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1bfb12502f3fc46cca1bb51ac28df9d618d813cdc3d2f25b9fe775a34af26bb3" +dependencies = [ + "generic-array", + "typenum", +] + +[[package]] +name = "ctrlc" +version = "3.4.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "46f93780a459b7d656ef7f071fe699c4d3d2cb201c4b24d085b6ddc505276e73" +dependencies = [ + "nix", + "windows-sys 0.59.0", +] + +[[package]] +name = "darling" +version = "0.20.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fc7f46116c46ff9ab3eb1597a45688b6715c6e628b5c133e288e709a29bcb4ee" +dependencies = [ + "darling_core", + "darling_macro", +] + +[[package]] +name = "darling_core" +version = "0.20.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0d00b9596d185e565c2207a0b01f8bd1a135483d02d9b7b0a54b11da8d53412e" +dependencies = [ + "fnv", + "ident_case", + "proc-macro2", + "quote", + "strsim", + "syn 2.0.101", +] + +[[package]] +name = "darling_macro" +version = "0.20.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fc34b93ccb385b40dc71c6fceac4b2ad23662c7eeb248cf10d529b7e055b6ead" +dependencies = [ + "darling_core", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "data-encoding" +version = "2.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2a2330da5de22e8a3cb63252ce2abb30116bf5265e89c0e01bc17015ce30a476" + +[[package]] +name = "der" +version = "0.7.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e7c1832837b905bbfb5101e07cc24c8deddf52f93225eee6ead5f4d63d53ddcb" +dependencies = [ + "const-oid", + "pem-rfc7468", + "zeroize", +] + +[[package]] +name = "deranged" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c9e6a11ca8224451684bc0d7d5a7adbf8f2fd6887261a1cfc3c0432f9d4068e" +dependencies = [ + "powerfmt", + "serde", +] + +[[package]] +name = "digest" +version = "0.10.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" +dependencies = [ + "block-buffer", + "const-oid", + "crypto-common", + "subtle", +] + +[[package]] +name = "displaydoc" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "97369cbbc041bc366949bc74d34658d6cda5621039731c6310521892a3a20ae0" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "dotenvy" +version = "0.15.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1aaf95b3e5c8f23aa320147307562d361db0ae0d51242340f558153b4eb2439b" + +[[package]] +name = "dotenvy" +version = "0.15.7" +source = "git+https://github.com/allan2/dotenvy#86c0d6dd2938e615135813df9e3274bf8f42c455" +dependencies = [ + "dotenvy-macros", +] + +[[package]] +name = "dotenvy-macros" +version = "0.15.7" +source = "git+https://github.com/allan2/dotenvy#86c0d6dd2938e615135813df9e3274bf8f42c455" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "dunce" +version = "1.0.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "92773504d58c093f6de2459af4af33faa518c13451eb8f2b5698ed3d36e7c813" + +[[package]] +name = "either" +version = "1.15.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "48c757948c5ede0e46177b7add2e67155f70e33c07fea8284df6576da70b3719" +dependencies = [ + "serde", +] + +[[package]] +name = "equivalent" +version = "1.0.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "877a4ace8713b0bcf2a4e7eec82529c029f1d0619886d18145fea96c3ffe5c0f" + +[[package]] +name = "errno" +version = "0.3.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cea14ef9355e3beab063703aa9dab15afd25f0667c341310c1e5274bb1d0da18" +dependencies = [ + "libc", + "windows-sys 0.59.0", +] + +[[package]] +name = "error-stack" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fe413319145d1063f080f27556fd30b1d70b01e2ba10c2a6e40d4be982ffc5d1" +dependencies = [ + "anyhow", + "eyre", + "rustc_version", + "serde", + "spin", + "tracing-error", +] + +[[package]] +name = "etcetera" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "136d1b5283a1ab77bd9257427ffd09d8667ced0570b6f938942bc7568ed5b943" +dependencies = [ + "cfg-if", + "home", + "windows-sys 0.48.0", +] + +[[package]] +name = "event-listener" +version = "5.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3492acde4c3fc54c845eaab3eed8bd00c7a7d881f78bfc801e43a93dec1331ae" +dependencies = [ + "concurrent-queue", + "parking", + "pin-project-lite", +] + +[[package]] +name = "eyre" +version = "0.6.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7cd915d99f24784cdc19fd37ef22b97e3ff0ae756c7e492e9fbfe897d61e2aec" +dependencies = [ + "indenter", + "once_cell", +] + +[[package]] +name = "flume" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "da0e4dd2a88388a1f4ccc7c9ce104604dab68d9f408dc34cd45823d5a9069095" +dependencies = [ + "futures-core", + "futures-sink", + "spin", +] + +[[package]] +name = "fnv" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" + +[[package]] +name = "foldhash" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d9c4f5dac5e15c24eb999c26181a6ca40b39fe946cbe4c263c7209467bc83af2" + +[[package]] +name = "form_urlencoded" +version = "1.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e13624c2627564efccf4934284bdd98cbaa14e79b0b5a141218e507b3a823456" +dependencies = [ + "percent-encoding", +] + +[[package]] +name = "fs_extra" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "42703706b716c37f96a77aea830392ad231f44c9e9a67872fa5548707e11b11c" + +[[package]] +name = "futures" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "65bc07b1a8bc7c85c5f2e110c476c7389b4554ba72af57d8445ea63a576b0876" +dependencies = [ + "futures-channel", + "futures-core", + "futures-executor", + "futures-io", + "futures-sink", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-channel" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2dff15bf788c671c1934e366d07e30c1814a8ef514e1af724a602e8a2fbe1b10" +dependencies = [ + "futures-core", + "futures-sink", +] + +[[package]] +name = "futures-core" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "05f29059c0c2090612e8d742178b0580d2dc940c837851ad723096f87af6663e" + +[[package]] +name = "futures-executor" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e28d1d997f585e54aebc3f97d39e72338912123a67330d723fdbb564d646c9f" +dependencies = [ + "futures-core", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-intrusive" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1d930c203dd0b6ff06e0201a4a2fe9149b43c684fd4420555b26d21b1a02956f" +dependencies = [ + "futures-core", + "lock_api", + "parking_lot", +] + +[[package]] +name = "futures-io" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9e5c1b78ca4aae1ac06c48a526a655760685149f0d465d21f37abfe57ce075c6" + +[[package]] +name = "futures-locks" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "45ec6fe3675af967e67c5536c0b9d44e34e6c52f86bedc4ea49c5317b8e94d06" +dependencies = [ + "futures-channel", + "futures-task", + "tokio", +] + +[[package]] +name = "futures-macro" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "162ee34ebcb7c64a8abebc059ce0fee27c2262618d7b60ed8faf72fef13c3650" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "futures-sink" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e575fab7d1e0dcb8d0c7bcf9a63ee213816ab51902e6d244a95819acacf1d4f7" + +[[package]] +name = "futures-task" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f90f7dce0722e95104fcb095585910c0977252f286e354b5e3bd38902cd99988" + +[[package]] +name = "futures-util" +version = "0.3.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9fa08315bb612088cc391249efdc3bc77536f16c91f6cf495e6fbe85b20a4a81" +dependencies = [ + "futures-channel", + "futures-core", + "futures-io", + "futures-macro", + "futures-sink", + "futures-task", + "memchr", + "pin-project-lite", + "pin-utils", + "slab", +] + +[[package]] +name = "generic-array" +version = "0.14.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85649ca51fd72272d7821adaf274ad91c288277713d9c18820d8499a7ff69e9a" +dependencies = [ + "typenum", + "version_check", +] + +[[package]] +name = "getrandom" +version = "0.2.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "335ff9f135e4384c8150d6f27c6daed433577f86b4750418338c01a1a2528592" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "wasi 0.11.0+wasi-snapshot-preview1", + "wasm-bindgen", +] + +[[package]] +name = "getrandom" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "26145e563e54f2cadc477553f1ec5ee650b00862f0a58bcd12cbdc5f0ea2d2f4" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "r-efi", + "wasi 0.14.2+wasi-0.2.4", + "wasm-bindgen", +] + +[[package]] +name = "gimli" +version = "0.31.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07e28edb80900c19c28f1072f2e8aeca7fa06b23cd4169cefe1af5aa3260783f" + +[[package]] +name = "glob" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a8d1add55171497b4705a648c6b583acafb01d58050a51727785f0b2c8e0a2b2" + +[[package]] +name = "h2" +version = "0.4.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a9421a676d1b147b16b82c9225157dc629087ef8ec4d5e2960f9437a90dac0a5" +dependencies = [ + "atomic-waker", + "bytes", + "fnv", + "futures-core", + "futures-sink", + "http", + "indexmap 2.9.0", + "slab", + "tokio", + "tokio-util", + "tracing", +] + +[[package]] +name = "hashbrown" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8a9ee70c43aaf417c914396645a0fa852624801b24ebb7ae78fe8272889ac888" + +[[package]] +name = "hashbrown" +version = "0.15.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "84b26c544d002229e640969970a2e74021aadf6e2f96372b9c58eff97de08eb3" +dependencies = [ + "allocator-api2", + "equivalent", + "foldhash", +] + +[[package]] +name = "hashlink" +version = "0.10.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7382cf6263419f2d8df38c55d7da83da5c18aef87fc7a7fc1fb1e344edfe14c1" +dependencies = [ + "hashbrown 0.15.3", +] + +[[package]] +name = "heck" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2304e00983f87ffb38b55b444b5e3b60a884b5d30c0fca7d82fe33449bbe55ea" + +[[package]] +name = "hex" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70" + +[[package]] +name = "hkdf" +version = "0.12.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7b5f8eb2ad728638ea2c7d47a21db23b7b58a72ed6a38256b8a1849f15fbbdf7" +dependencies = [ + "hmac", +] + +[[package]] +name = "hmac" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6c49c37c09c17a53d937dfbb742eb3a961d65a994e6bcdcf37e7399d0cc8ab5e" +dependencies = [ + "digest", +] + +[[package]] +name = "home" +version = "0.5.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589533453244b0995c858700322199b2becb13b627df2851f64a2775d024abcf" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "http" +version = "1.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4a85d31aea989eead29a3aaf9e1115a180df8282431156e533de47660892565" +dependencies = [ + "bytes", + "fnv", + "itoa", +] + +[[package]] +name = "http-body" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1efedce1fb8e6913f23e0c92de8e62cd5b772a67e7b3946df930a62566c93184" +dependencies = [ + "bytes", + "http", +] + +[[package]] +name = "http-body-util" +version = "0.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b021d93e26becf5dc7e1b75b1bed1fd93124b374ceb73f43d4d4eafec896a64a" +dependencies = [ + "bytes", + "futures-core", + "http", + "http-body", + "pin-project-lite", +] + +[[package]] +name = "httparse" +version = "1.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6dbf3de79e51f3d586ab4cb9d5c3e2c14aa28ed23d180cf89b4df0454a69cc87" + +[[package]] +name = "httpdate" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df3b46402a9d5adb4c86a0cf463f42e19994e3ee891101b1841f30a545cb49a9" + +[[package]] +name = "hyper" +version = "1.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cc2b571658e38e0c01b1fdca3bbbe93c00d3d71693ff2770043f8c29bc7d6f80" +dependencies = [ + "bytes", + "futures-channel", + "futures-util", + "h2", + "http", + "http-body", + "httparse", + "httpdate", + "itoa", + "pin-project-lite", + "smallvec", + "tokio", + "want", +] + +[[package]] +name = "hyper-rustls" +version = "0.27.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3c93eb611681b207e1fe55d5a71ecf91572ec8a6705cdb6857f7d8d5242cf58" +dependencies = [ + "http", + "hyper", + "hyper-util", + "log", + "rustls", + "rustls-native-certs", + "rustls-pki-types", + "tokio", + "tokio-rustls", + "tower-service", + "webpki-roots", +] + +[[package]] +name = "hyper-util" +version = "0.1.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc2fdfdbff08affe55bb779f33b053aa1fe5dd5b54c257343c17edfa55711bdb" +dependencies = [ + "base64", + "bytes", + "futures-channel", + "futures-core", + "futures-util", + "http", + "http-body", + "hyper", + "ipnet", + "libc", + "percent-encoding", + "pin-project-lite", + "socket2", + "tokio", + "tower-service", + "tracing", +] + +[[package]] +name = "iana-time-zone" +version = "0.1.63" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b0c919e5debc312ad217002b8048a17b7d83f80703865bbfcfebb0458b0b27d8" +dependencies = [ + "android_system_properties", + "core-foundation-sys", + "iana-time-zone-haiku", + "js-sys", + "log", + "wasm-bindgen", + "windows-core", +] + +[[package]] +name = "iana-time-zone-haiku" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f31827a206f56af32e590ba56d5d2d085f558508192593743f16b2306495269f" +dependencies = [ + "cc", +] + +[[package]] +name = "icu_collections" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "200072f5d0e3614556f94a9930d5dc3e0662a652823904c3a75dc3b0af7fee47" +dependencies = [ + "displaydoc", + "potential_utf", + "yoke", + "zerofrom", + "zerovec", +] + +[[package]] +name = "icu_locale_core" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0cde2700ccaed3872079a65fb1a78f6c0a36c91570f28755dda67bc8f7d9f00a" +dependencies = [ + "displaydoc", + "litemap", + "tinystr", + "writeable", + "zerovec", +] + +[[package]] +name = "icu_normalizer" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "436880e8e18df4d7bbc06d58432329d6458cc84531f7ac5f024e93deadb37979" +dependencies = [ + "displaydoc", + "icu_collections", + "icu_normalizer_data", + "icu_properties", + "icu_provider", + "smallvec", + "zerovec", +] + +[[package]] +name = "icu_normalizer_data" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "00210d6893afc98edb752b664b8890f0ef174c8adbb8d0be9710fa66fbbf72d3" + +[[package]] +name = "icu_properties" +version = "2.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "016c619c1eeb94efb86809b015c58f479963de65bdb6253345c1a1276f22e32b" +dependencies = [ + "displaydoc", + "icu_collections", + "icu_locale_core", + "icu_properties_data", + "icu_provider", + "potential_utf", + "zerotrie", + "zerovec", +] + +[[package]] +name = "icu_properties_data" +version = "2.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "298459143998310acd25ffe6810ed544932242d3f07083eee1084d83a71bd632" + +[[package]] +name = "icu_provider" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "03c80da27b5f4187909049ee2d72f276f0d9f99a42c306bd0131ecfe04d8e5af" +dependencies = [ + "displaydoc", + "icu_locale_core", + "stable_deref_trait", + "tinystr", + "writeable", + "yoke", + "zerofrom", + "zerotrie", + "zerovec", +] + +[[package]] +name = "ident_case" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9e0384b61958566e926dc50660321d12159025e767c18e043daf26b70104c39" + +[[package]] +name = "idna" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "686f825264d630750a544639377bae737628043f20d38bbc029e8f29ea968a7e" +dependencies = [ + "idna_adapter", + "smallvec", + "utf8_iter", +] + +[[package]] +name = "idna_adapter" +version = "1.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3acae9609540aa318d1bc588455225fb2085b9ed0c4f6bd0d9d5bcd86f1a0344" +dependencies = [ + "icu_normalizer", + "icu_properties", +] + +[[package]] +name = "indenter" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ce23b50ad8242c51a442f3ff322d56b02f08852c77e4c0b4d3fd684abc89c683" + +[[package]] +name = "indexmap" +version = "1.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bd070e393353796e801d209ad339e89596eb4c8d430d18ede6a1cced8fafbd99" +dependencies = [ + "autocfg", + "hashbrown 0.12.3", + "serde", +] + +[[package]] +name = "indexmap" +version = "2.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cea70ddb795996207ad57735b50c5982d8844f38ba9ee5f1aedcfb708a2aa11e" +dependencies = [ + "equivalent", + "hashbrown 0.15.3", + "serde", +] + +[[package]] +name = "ipnet" +version = "2.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "469fb0b9cefa57e3ef31275ee7cacb78f2fdca44e4765491884a2b119d4eb130" + +[[package]] +name = "iri-string" +version = "0.7.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dbc5ebe9c3a1a7a5127f920a418f7585e9e758e911d0466ed004f393b0e380b2" +dependencies = [ + "memchr", + "serde", +] + +[[package]] +name = "is_terminal_polyfill" +version = "1.70.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7943c866cc5cd64cbc25b2e01621d07fa8eb2a1a23160ee81ce38704e97b8ecf" + +[[package]] +name = "itertools" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ba291022dbbd398a455acf126c1e341954079855bc60dfdda641363bd6922569" +dependencies = [ + "either", +] + +[[package]] +name = "itoa" +version = "1.0.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4a5f13b858c8d314ee3e8f639011f7ccefe71f97f96e50151fb991f267928e2c" + +[[package]] +name = "jobserver" +version = "0.1.33" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "38f262f097c174adebe41eb73d66ae9c06b2844fb0da69969647bbddd9b0538a" +dependencies = [ + "getrandom 0.3.3", + "libc", +] + +[[package]] +name = "js-sys" +version = "0.3.77" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1cfaf33c695fc6e08064efbc1f72ec937429614f25eef83af942d0e227c3a28f" +dependencies = [ + "once_cell", + "wasm-bindgen", +] + +[[package]] +name = "lazy_static" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe" +dependencies = [ + "spin", +] + +[[package]] +name = "lazycell" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "830d08ce1d1d941e6b30645f1a0eb5643013d835ce3779a5fc208261dbe10f55" + +[[package]] +name = "libc" +version = "0.2.172" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d750af042f7ef4f724306de029d18836c26c1765a54a6a3f094cbd23a7267ffa" + +[[package]] +name = "libloading" +version = "0.8.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07033963ba89ebaf1584d767badaa2e8fcec21aedea6b8c0346d487d49c28667" +dependencies = [ + "cfg-if", + "windows-targets 0.53.0", +] + +[[package]] +name = "libm" +version = "0.2.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f9fbbcab51052fe104eb5e5d351cf728d30a5be1fe14d9be8a3b097481fb97de" + +[[package]] +name = "libsqlite3-sys" +version = "0.30.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2e99fb7a497b1e3339bc746195567ed8d3e24945ecd636e3619d20b9de9e9149" +dependencies = [ + "bindgen", + "cc", + "pkg-config", + "vcpkg", +] + +[[package]] +name = "linux-raw-sys" +version = "0.4.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d26c52dbd32dccf2d10cac7725f8eae5296885fb5703b261f7d0a0739ec807ab" + +[[package]] +name = "litemap" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "241eaef5fd12c88705a01fc1066c48c4b36e0dd4377dcdc7ec3942cea7a69956" + +[[package]] +name = "lock_api" +version = "0.4.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "96936507f153605bddfcda068dd804796c84324ed2510809e5b2a624c81da765" +dependencies = [ + "autocfg", + "scopeguard", +] + +[[package]] +name = "log" +version = "0.4.27" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13dc2df351e3202783a1fe0d44375f7295ffb4049267b0f3018346dc122a1d94" + +[[package]] +name = "lru-slab" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "112b39cec0b298b6c1999fee3e31427f74f676e4cb9879ed1a121b43661a4154" + +[[package]] +name = "matchers" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8263075bb86c5a1b1427b5ae862e8889656f126e9f77c484496e8b47cf5c5558" +dependencies = [ + "regex-automata 0.1.10", +] + +[[package]] +name = "matchit" +version = "0.8.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "47e1ffaa40ddd1f3ed91f717a33c8c0ee23fff369e3aa8772b9605cc1d22f4c3" + +[[package]] +name = "md-5" +version = "0.10.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d89e7ee0cfbedfc4da3340218492196241d89eefb6dab27de5df917a6d2e78cf" +dependencies = [ + "cfg-if", + "digest", +] + +[[package]] +name = "memchr" +version = "2.7.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78ca9ab1a0babb1e7d5695e3530886289c18cf2f87ec19a575a0abdce112e3a3" + +[[package]] +name = "menv" +version = "0.2.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec049f8395cf822c890b7e7b9857ca19fe105496ff8a307fe312cc8b65d408e6" +dependencies = [ + "menv_proc_macro", +] + +[[package]] +name = "menv_proc_macro" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eb172c957fa8ede0322de8e758e2b2fc7eaf8d70280f3abc983c9ee7b7ec6c05" + +[[package]] +name = "mime" +version = "0.3.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6877bb514081ee2a7ff5ef9de3281f14a4dd4bceac4c09388074a6b5df8a139a" + +[[package]] +name = "mime_guess" +version = "2.0.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f7c44f8e672c00fe5308fa235f821cb4198414e1c77935c1ab6948d3fd78550e" +dependencies = [ + "mime", + "unicase", +] + +[[package]] +name = "minimal-lexical" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "68354c5c6bd36d73ff3feceb05efa59b6acb7626617f4962be322a825e61f79a" + +[[package]] +name = "miniz_oxide" +version = "0.8.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3be647b768db090acb35d5ec5db2b0e1f1de11133ca123b9eacf5137868f892a" +dependencies = [ + "adler2", +] + +[[package]] +name = "mio" +version = "1.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78bed444cc8a2160f01cbcf811ef18cac863ad68ae8ca62092e8db51d51c761c" +dependencies = [ + "libc", + "wasi 0.11.0+wasi-snapshot-preview1", + "windows-sys 0.59.0", +] + +[[package]] +name = "nix" +version = "0.30.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "74523f3a35e05aba87a1d978330aef40f67b0304ac79c1c00b294c9830543db6" +dependencies = [ + "bitflags", + "cfg-if", + "cfg_aliases", + "libc", +] + +[[package]] +name = "nom" +version = "7.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d273983c5a657a70a3e8f2a01329822f3b8c8172b73826411a55751e404a0a4a" +dependencies = [ + "memchr", + "minimal-lexical", +] + +[[package]] +name = "nu-ansi-term" +version = "0.46.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77a8165726e8236064dbb45459242600304b42a5ea24ee2948e18e023bf7ba84" +dependencies = [ + "overload", + "winapi", +] + +[[package]] +name = "num-bigint-dig" +version = "0.8.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc84195820f291c7697304f3cbdadd1cb7199c0efc917ff5eafd71225c136151" +dependencies = [ + "byteorder", + "lazy_static", + "libm", + "num-integer", + "num-iter", + "num-traits", + "rand 0.8.5", + "smallvec", + "zeroize", +] + +[[package]] +name = "num-conv" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "51d515d32fb182ee37cda2ccdcb92950d6a3c2893aa280e540671c2cd0f3b1d9" + +[[package]] +name = "num-integer" +version = "0.1.46" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7969661fd2958a5cb096e56c8e1ad0444ac2bbcd0061bd28660485a44879858f" +dependencies = [ + "num-traits", +] + +[[package]] +name = "num-iter" +version = "0.1.45" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1429034a0490724d0075ebb2bc9e875d6503c3cf69e235a8941aa757d83ef5bf" +dependencies = [ + "autocfg", + "num-integer", + "num-traits", +] + +[[package]] +name = "num-traits" +version = "0.2.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841" +dependencies = [ + "autocfg", + "libm", +] + +[[package]] +name = "oauth2" +version = "5.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "51e219e79014df21a225b1860a479e2dcd7cbd9130f4defd4bd0e191ea31d67d" +dependencies = [ + "base64", + "chrono", + "getrandom 0.2.16", + "http", + "rand 0.8.5", + "reqwest", + "serde", + "serde_json", + "serde_path_to_error", + "sha2", + "thiserror 1.0.69", + "url", +] + +[[package]] +name = "object" +version = "0.36.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "62948e14d923ea95ea2c7c86c71013138b66525b86bdc08d2dcc262bdb497b87" +dependencies = [ + "memchr", +] + +[[package]] +name = "once_cell" +version = "1.21.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "42f5e15c9953c5e4ccceeb2e7382a716482c34515315f7b03532b8b4e8393d2d" + +[[package]] +name = "once_cell_polyfill" +version = "1.70.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4895175b425cb1f87721b59f0f286c2092bd4af812243672510e1ac53e2e0ad" + +[[package]] +name = "openssl-probe" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d05e27ee213611ffe7d6348b942e8f942b37114c00cc03cec254295a4a17852e" + +[[package]] +name = "overload" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b15813163c1d831bf4a13c3610c05c0d03b39feb07f7e09fa234dac9b15aaf39" + +[[package]] +name = "parking" +version = "2.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f38d5652c16fde515bb1ecef450ab0f6a219d619a7274976324d5e377f7dceba" + +[[package]] +name = "parking_lot" +version = "0.12.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "70d58bf43669b5795d1576d0641cfb6fbb2057bf629506267a92807158584a13" +dependencies = [ + "lock_api", + "parking_lot_core", +] + +[[package]] +name = "parking_lot_core" +version = "0.9.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bc838d2a56b5b1a6c25f55575dfc605fabb63bb2365f6c2353ef9159aa69e4a5" +dependencies = [ + "cfg-if", + "libc", + "redox_syscall", + "smallvec", + "windows-targets 0.52.6", +] + +[[package]] +name = "pem-rfc7468" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "88b39c9bfcfc231068454382784bb460aae594343fb030d46e9f50a645418412" +dependencies = [ + "base64ct", +] + +[[package]] +name = "percent-encoding" +version = "2.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3148f5046208a5d56bcfc03053e3ca6334e51da8dfb19b6cdc8b306fae3283e" + +[[package]] +name = "pin-project-lite" +version = "0.2.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3b3cff922bd51709b605d9ead9aa71031d81447142d828eb4a6eba76fe619f9b" + +[[package]] +name = "pin-utils" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184" + +[[package]] +name = "pkcs1" +version = "0.7.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c8ffb9f10fa047879315e6625af03c164b16962a5368d724ed16323b68ace47f" +dependencies = [ + "der", + "pkcs8", + "spki", +] + +[[package]] +name = "pkcs8" +version = "0.10.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f950b2377845cebe5cf8b5165cb3cc1a5e0fa5cfa3e1f7f55707d8fd82e0a7b7" +dependencies = [ + "der", + "spki", +] + +[[package]] +name = "pkg-config" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7edddbd0b52d732b21ad9a5fab5c704c14cd949e5e9a1ec5929a24fded1b904c" + +[[package]] +name = "potential_utf" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e5a7c30837279ca13e7c867e9e40053bc68740f988cb07f7ca6df43cc734b585" +dependencies = [ + "zerovec", +] + +[[package]] +name = "powerfmt" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "439ee305def115ba05938db6eb1644ff94165c5ab5e9420d1c1bcedbba909391" + +[[package]] +name = "ppv-lite86" +version = "0.2.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85eae3c4ed2f50dcfe72643da4befc30deadb458a9b590d720cde2f2b1e97da9" +dependencies = [ + "zerocopy", +] + +[[package]] +name = "prettyplease" +version = "0.2.33" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9dee91521343f4c5c6a63edd65e54f31f5c92fe8978c40a4282f8372194c6a7d" +dependencies = [ + "proc-macro2", + "syn 2.0.101", +] + +[[package]] +name = "proc-macro2" +version = "1.0.95" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "02b3e5e68a3a1a02aad3ec490a98007cbc13c37cbe84a3cd7b8e406d76e7f778" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "quinn" +version = "0.11.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "626214629cda6781b6dc1d316ba307189c85ba657213ce642d9c77670f8202c8" +dependencies = [ + "bytes", + "cfg_aliases", + "pin-project-lite", + "quinn-proto", + "quinn-udp", + "rustc-hash 2.1.1", + "rustls", + "socket2", + "thiserror 2.0.12", + "tokio", + "tracing", + "web-time", +] + +[[package]] +name = "quinn-proto" +version = "0.11.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49df843a9161c85bb8aae55f101bc0bac8bcafd637a620d9122fd7e0b2f7422e" +dependencies = [ + "bytes", + "getrandom 0.3.3", + "lru-slab", + "rand 0.9.1", + "ring", + "rustc-hash 2.1.1", + "rustls", + "rustls-pki-types", + "slab", + "thiserror 2.0.12", + "tinyvec", + "tracing", + "web-time", +] + +[[package]] +name = "quinn-udp" +version = "0.5.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee4e529991f949c5e25755532370b8af5d114acae52326361d68d47af64aa842" +dependencies = [ + "cfg_aliases", + "libc", + "once_cell", + "socket2", + "tracing", + "windows-sys 0.59.0", +] + +[[package]] +name = "quote" +version = "1.0.40" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1885c039570dc00dcb4ff087a89e185fd56bae234ddc7f056a945bf36467248d" +dependencies = [ + "proc-macro2", +] + +[[package]] +name = "r-efi" +version = "5.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "74765f6d916ee2faa39bc8e68e4f3ed8949b48cccdac59983d287a7cb71ce9c5" + +[[package]] +name = "rand" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" +dependencies = [ + "libc", + "rand_chacha 0.3.1", + "rand_core 0.6.4", +] + +[[package]] +name = "rand" +version = "0.9.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9fbfd9d094a40bf3ae768db9361049ace4c0e04a4fd6b359518bd7b73a73dd97" +dependencies = [ + "rand_chacha 0.9.0", + "rand_core 0.9.3", +] + +[[package]] +name = "rand_chacha" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e6c10a63a0fa32252be49d21e7709d4d4baf8d231c2dbce1eaa8141b9b127d88" +dependencies = [ + "ppv-lite86", + "rand_core 0.6.4", +] + +[[package]] +name = "rand_chacha" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3022b5f1df60f26e1ffddd6c66e8aa15de382ae63b3a0c1bfc0e4d3e3f325cb" +dependencies = [ + "ppv-lite86", + "rand_core 0.9.3", +] + +[[package]] +name = "rand_core" +version = "0.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec0be4795e2f6a28069bec0b5ff3e2ac9bafc99e6a9a7dc3547996c5c816922c" +dependencies = [ + "getrandom 0.2.16", +] + +[[package]] +name = "rand_core" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "99d9a13982dcf210057a8a78572b2217b667c3beacbf3a0d8b454f6f82837d38" +dependencies = [ + "getrandom 0.3.3", +] + +[[package]] +name = "redact" +version = "0.1.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0020ec469b096d56edb1ed0f0f141d957863302170f8d9c4bfda1a12969e5969" + +[[package]] +name = "redox_syscall" +version = "0.5.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "928fca9cf2aa042393a8325b9ead81d2f0df4cb12e1e24cef072922ccd99c5af" +dependencies = [ + "bitflags", +] + +[[package]] +name = "regex" +version = "1.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b544ef1b4eac5dc2db33ea63606ae9ffcfac26c1416a2806ae0bf5f56b201191" +dependencies = [ + "aho-corasick", + "memchr", + "regex-automata 0.4.9", + "regex-syntax 0.8.5", +] + +[[package]] +name = "regex-automata" +version = "0.1.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6c230d73fb8d8c1b9c0b3135c5142a8acee3a0558fb8db5cf1cb65f8d7862132" +dependencies = [ + "regex-syntax 0.6.29", +] + +[[package]] +name = "regex-automata" +version = "0.4.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "809e8dc61f6de73b46c85f4c96486310fe304c434cfa43669d7b40f711150908" +dependencies = [ + "aho-corasick", + "memchr", + "regex-syntax 0.8.5", +] + +[[package]] +name = "regex-syntax" +version = "0.6.29" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f162c6dd7b008981e4d40210aca20b4bd0f9b60ca9271061b07f78537722f2e1" + +[[package]] +name = "regex-syntax" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b15c43186be67a4fd63bee50d0303afffcef381492ebe2c5d87f324e1b8815c" + +[[package]] +name = "reqwest" +version = "0.12.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a2f8e5513d63f2e5b386eb5106dc67eaf3f84e95258e210489136b8b92ad6119" +dependencies = [ + "base64", + "bytes", + "futures-core", + "http", + "http-body", + "http-body-util", + "hyper", + "hyper-rustls", + "hyper-util", + "ipnet", + "js-sys", + "log", + "mime", + "once_cell", + "percent-encoding", + "pin-project-lite", + "quinn", + "rustls", + "rustls-pki-types", + "serde", + "serde_json", + "serde_urlencoded", + "sync_wrapper", + "tokio", + "tokio-rustls", + "tower", + "tower-http", + "tower-service", + "url", + "wasm-bindgen", + "wasm-bindgen-futures", + "web-sys", + "webpki-roots", +] + +[[package]] +name = "ring" +version = "0.17.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4689e6c2294d81e88dc6261c768b63bc4fcdb852be6d1352498b114f61383b7" +dependencies = [ + "cc", + "cfg-if", + "getrandom 0.2.16", + "libc", + "untrusted", + "windows-sys 0.52.0", +] + +[[package]] +name = "rsa" +version = "0.9.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78928ac1ed176a5ca1d17e578a1825f3d81ca54cf41053a592584b020cfd691b" +dependencies = [ + "const-oid", + "digest", + "num-bigint-dig", + "num-integer", + "num-traits", + "pkcs1", + "pkcs8", + "rand_core 0.6.4", + "signature", + "spki", + "subtle", + "zeroize", +] + +[[package]] +name = "rsb_derive" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2c53e42fccdc5f1172e099785fe78f89bc0c1e657d0c2ef591efbfac427e9a4" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "rustc-demangle" +version = "0.1.24" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "719b953e2095829ee67db738b3bfa9fa368c94900df327b3f07fe6e794d2fe1f" + +[[package]] +name = "rustc-hash" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "08d43f7aa6b08d49f382cde6a7982047c3426db949b1424bc4b7ec9ae12c6ce2" + +[[package]] +name = "rustc-hash" +version = "2.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "357703d41365b4b27c590e3ed91eabb1b663f07c4c084095e60cbed4362dff0d" + +[[package]] +name = "rustc_version" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cfcb3a22ef46e85b45de6ee7e79d063319ebb6594faafcf1c225ea92ab6e9b92" +dependencies = [ + "semver", +] + +[[package]] +name = "rustix" +version = "0.38.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fdb5bc1ae2baa591800df16c9ca78619bf65c0488b41b96ccec5d11220d8c154" +dependencies = [ + "bitflags", + "errno", + "libc", + "linux-raw-sys", + "windows-sys 0.59.0", +] + +[[package]] +name = "rustls" +version = "0.23.27" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "730944ca083c1c233a75c09f199e973ca499344a2b7ba9e755c457e86fb4a321" +dependencies = [ + "aws-lc-rs", + "log", + "once_cell", + "ring", + "rustls-pki-types", + "rustls-webpki", + "subtle", + "zeroize", +] + +[[package]] +name = "rustls-native-certs" +version = "0.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7fcff2dd52b58a8d98a70243663a0d234c4e2b79235637849d15913394a247d3" +dependencies = [ + "openssl-probe", + "rustls-pki-types", + "schannel", + "security-framework", +] + +[[package]] +name = "rustls-pki-types" +version = "1.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "229a4a4c221013e7e1f1a043678c5cc39fe5171437c88fb47151a21e6f5b5c79" +dependencies = [ + "web-time", + "zeroize", +] + +[[package]] +name = "rustls-webpki" +version = "0.103.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e4a72fe2bcf7a6ac6fd7d0b9e5cb68aeb7d4c0a0271730218b3e92d43b4eb435" +dependencies = [ + "aws-lc-rs", + "ring", + "rustls-pki-types", + "untrusted", +] + +[[package]] +name = "rustversion" +version = "1.0.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8a0d197bd2c9dc6e53b84da9556a69ba4cdfab8619eb41a8bd1cc2027a0f6b1d" + +[[package]] +name = "rvs_derive" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e1fa12378eb54f3d4f2db8dcdbe33af610b7e7d001961c1055858282ecef2a5" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "rvstruct" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5107860ec34506b64cf3680458074eac5c2c564f7ccc140918bbcd1714fd8d5d" +dependencies = [ + "rvs_derive", +] + +[[package]] +name = "ryu" +version = "1.0.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "28d3b2b1366ec20994f1fd18c3c594f05c5dd4bc44d8bb0c1c632c8d6829481f" + +[[package]] +name = "schannel" +version = "0.1.27" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f29ebaa345f945cec9fbbc532eb307f0fdad8161f281b6369539c8d84876b3d" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "scopeguard" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49" + +[[package]] +name = "security-framework" +version = "3.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "271720403f46ca04f7ba6f55d438f8bd878d6b8ca0a1046e8228c4145bcbb316" +dependencies = [ + "bitflags", + "core-foundation", + "core-foundation-sys", + "libc", + "security-framework-sys", +] + +[[package]] +name = "security-framework-sys" +version = "2.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49db231d56a190491cb4aeda9527f1ad45345af50b0851622a7adb8c03b01c32" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "semver" +version = "1.0.26" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "56e6fa9c48d24d85fb3de5ad847117517440f6beceb7798af16b4a87d616b8d0" + +[[package]] +name = "serde" +version = "1.0.219" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5f0e2c6ed6606019b4e29e69dbaba95b11854410e5347d525002456dbbb786b6" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_derive" +version = "1.0.219" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b0276cf7f2c73365f7157c8123c21cd9a50fbbd844757af28ca1f5925fc2a00" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "serde_json" +version = "1.0.140" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "20068b6e96dc6c9bd23e01df8827e6c7e1f2fddd43c21810382803c136b99373" +dependencies = [ + "itoa", + "memchr", + "ryu", + "serde", +] + +[[package]] +name = "serde_path_to_error" +version = "0.1.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59fab13f937fa393d08645bf3a84bdfe86e296747b506ada67bb15f10f218b2a" +dependencies = [ + "itoa", + "serde", +] + +[[package]] +name = "serde_urlencoded" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3491c14715ca2294c4d6a88f15e84739788c1d030eed8c110436aafdaa2f3fd" +dependencies = [ + "form_urlencoded", + "itoa", + "ryu", + "serde", +] + +[[package]] +name = "serde_with" +version = "3.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d6b6f7f2fcb69f747921f79f3926bd1e203fce4fef62c268dd3abfb6d86029aa" +dependencies = [ + "base64", + "chrono", + "hex", + "indexmap 1.9.3", + "indexmap 2.9.0", + "serde", + "serde_derive", + "serde_json", + "serde_with_macros", + "time", +] + +[[package]] +name = "serde_with_macros" +version = "3.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8d00caa5193a3c8362ac2b73be6b9e768aa5a4b2f721d8f4b339600c3cb51f8e" +dependencies = [ + "darling", + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "sha1" +version = "0.10.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3bf829a2d51ab4a5ddf1352d8470c140cadc8301b2ae1789db023f01cedd6ba" +dependencies = [ + "cfg-if", + "cpufeatures", + "digest", +] + +[[package]] +name = "sha2" +version = "0.10.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a7507d819769d01a365ab707794a4084392c824f54a7a6a7862f8c3d0892b283" +dependencies = [ + "cfg-if", + "cpufeatures", + "digest", +] + +[[package]] +name = "sharded-slab" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f40ca3c46823713e0d4209592e8d6e826aa57e928f09752619fc696c499637f6" +dependencies = [ + "lazy_static", +] + +[[package]] +name = "shlex" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64" + +[[package]] +name = "signal-hook" +version = "0.3.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d881a16cf4426aa584979d30bd82cb33429027e42122b169753d6ef1085ed6e2" +dependencies = [ + "cc", + "libc", + "signal-hook-registry", +] + +[[package]] +name = "signal-hook-registry" +version = "1.4.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9203b8055f63a2a00e2f593bb0510367fe707d7ff1e5c872de2f537b339e5410" +dependencies = [ + "libc", +] + +[[package]] +name = "signal-hook-tokio" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "213241f76fb1e37e27de3b6aa1b068a2c333233b59cca6634f634b80a27ecf1e" +dependencies = [ + "futures-core", + "libc", + "signal-hook", + "tokio", +] + +[[package]] +name = "signature" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77549399552de45a898a580c1b41d445bf730df867cc44e6c0233bbc4b8329de" +dependencies = [ + "digest", + "rand_core 0.6.4", +] + +[[package]] +name = "slab" +version = "0.4.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f92a496fb766b417c996b9c5e57daf2f7ad3b0bebe1ccfca4856390e3d3bb67" +dependencies = [ + "autocfg", +] + +[[package]] +name = "slack-morphism" +version = "2.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "af98d6c3b7001a94fdd1a753d593c5cdd3d3c9daaf919e7a8da87ef804dba9a4" +dependencies = [ + "async-recursion", + "async-trait", + "axum", + "base64", + "bytes", + "chrono", + "ctrlc", + "futures", + "futures-locks", + "futures-util", + "hex", + "hmac", + "http", + "http-body-util", + "hyper", + "hyper-rustls", + "hyper-util", + "lazy_static", + "mime", + "mime_guess", + "rand 0.9.1", + "rsb_derive", + "rvstruct", + "serde", + "serde_json", + "serde_with", + "sha2", + "signal-hook", + "signal-hook-tokio", + "subtle", + "tokio", + "tokio-stream", + "tokio-tungstenite", + "tower", + "tracing", + "url", +] + +[[package]] +name = "slack-system-bot" +version = "0.1.0" +dependencies = [ + "axum", + "clap", + "displaydoc", + "dotenvy 0.15.7 (git+https://github.com/allan2/dotenvy)", + "error-stack", + "eyre", + "http-body-util", + "libsqlite3-sys", + "menv", + "oauth2", + "redact", + "rustls", + "serde", + "serde_json", + "slack-morphism", + "sqlx", + "thiserror 2.0.12", + "time", + "tokio", + "tracing", + "tracing-error", + "tracing-subscriber", + "url", +] + +[[package]] +name = "smallvec" +version = "1.15.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67b1b7a3b5fe4f1376887184045fcf45c69e92af734b7aaddc05fb777b6fbd03" +dependencies = [ + "serde", +] + +[[package]] +name = "socket2" +version = "0.5.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e22376abed350d73dd1cd119b57ffccad95b4e585a7cda43e286245ce23c0678" +dependencies = [ + "libc", + "windows-sys 0.52.0", +] + +[[package]] +name = "spin" +version = "0.9.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6980e8d7511241f8acf4aebddbb1ff938df5eebe98691418c4468d0b72a96a67" +dependencies = [ + "lock_api", +] + +[[package]] +name = "spki" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d91ed6c858b01f942cd56b37a94b3e0a1798290327d1236e4d9cf4eaca44d29d" +dependencies = [ + "base64ct", + "der", +] + +[[package]] +name = "sqlx" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1fefb893899429669dcdd979aff487bd78f4064e5e7907e4269081e0ef7d97dc" +dependencies = [ + "sqlx-core", + "sqlx-macros", + "sqlx-mysql", + "sqlx-postgres", + "sqlx-sqlite", +] + +[[package]] +name = "sqlx-core" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee6798b1838b6a0f69c007c133b8df5866302197e404e8b6ee8ed3e3a5e68dc6" +dependencies = [ + "base64", + "bytes", + "crc", + "crossbeam-queue", + "either", + "event-listener", + "futures-core", + "futures-intrusive", + "futures-io", + "futures-util", + "hashbrown 0.15.3", + "hashlink", + "indexmap 2.9.0", + "log", + "memchr", + "once_cell", + "percent-encoding", + "serde", + "serde_json", + "sha2", + "smallvec", + "thiserror 2.0.12", + "time", + "tokio", + "tokio-stream", + "tracing", + "url", +] + +[[package]] +name = "sqlx-macros" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a2d452988ccaacfbf5e0bdbc348fb91d7c8af5bee192173ac3636b5fb6e6715d" +dependencies = [ + "proc-macro2", + "quote", + "sqlx-core", + "sqlx-macros-core", + "syn 2.0.101", +] + +[[package]] +name = "sqlx-macros-core" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "19a9c1841124ac5a61741f96e1d9e2ec77424bf323962dd894bdb93f37d5219b" +dependencies = [ + "dotenvy 0.15.7 (registry+https://github.com/rust-lang/crates.io-index)", + "either", + "heck", + "hex", + "once_cell", + "proc-macro2", + "quote", + "serde", + "serde_json", + "sha2", + "sqlx-core", + "sqlx-mysql", + "sqlx-postgres", + "sqlx-sqlite", + "syn 2.0.101", + "tokio", + "url", +] + +[[package]] +name = "sqlx-mysql" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aa003f0038df784eb8fecbbac13affe3da23b45194bd57dba231c8f48199c526" +dependencies = [ + "atoi", + "base64", + "bitflags", + "byteorder", + "bytes", + "crc", + "digest", + "dotenvy 0.15.7 (registry+https://github.com/rust-lang/crates.io-index)", + "either", + "futures-channel", + "futures-core", + "futures-io", + "futures-util", + "generic-array", + "hex", + "hkdf", + "hmac", + "itoa", + "log", + "md-5", + "memchr", + "once_cell", + "percent-encoding", + "rand 0.8.5", + "rsa", + "serde", + "sha1", + "sha2", + "smallvec", + "sqlx-core", + "stringprep", + "thiserror 2.0.12", + "time", + "tracing", + "whoami", +] + +[[package]] +name = "sqlx-postgres" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "db58fcd5a53cf07c184b154801ff91347e4c30d17a3562a635ff028ad5deda46" +dependencies = [ + "atoi", + "base64", + "bitflags", + "byteorder", + "crc", + "dotenvy 0.15.7 (registry+https://github.com/rust-lang/crates.io-index)", + "etcetera", + "futures-channel", + "futures-core", + "futures-util", + "hex", + "hkdf", + "hmac", + "home", + "itoa", + "log", + "md-5", + "memchr", + "once_cell", + "rand 0.8.5", + "serde", + "serde_json", + "sha2", + "smallvec", + "sqlx-core", + "stringprep", + "thiserror 2.0.12", + "time", + "tracing", + "whoami", +] + +[[package]] +name = "sqlx-sqlite" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c2d12fe70b2c1b4401038055f90f151b78208de1f9f89a7dbfd41587a10c3eea" +dependencies = [ + "atoi", + "flume", + "futures-channel", + "futures-core", + "futures-executor", + "futures-intrusive", + "futures-util", + "libsqlite3-sys", + "log", + "percent-encoding", + "serde", + "serde_urlencoded", + "sqlx-core", + "thiserror 2.0.12", + "time", + "tracing", + "url", +] + +[[package]] +name = "stable_deref_trait" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a8f112729512f8e442d81f95a8a7ddf2b7c6b8a1a6f509a95864142b30cab2d3" + +[[package]] +name = "stringprep" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7b4df3d392d81bd458a8a621b8bffbd2302a12ffe288a9d931670948749463b1" +dependencies = [ + "unicode-bidi", + "unicode-normalization", + "unicode-properties", +] + +[[package]] +name = "strsim" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7da8b5736845d9f2fcb837ea5d9e2628564b3b043a70948a3f0b778838c5fb4f" + +[[package]] +name = "subtle" +version = "2.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13c2bddecc57b384dee18652358fb23172facb8a2c51ccc10d74c157bdea3292" + +[[package]] +name = "syn" +version = "1.0.109" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "72b64191b275b66ffe2469e8af2c1cfe3bafa67b529ead792a6d0160888b4237" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "syn" +version = "2.0.101" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ce2b7fc941b3a24138a0a7cf8e858bfc6a992e7978a068a5c760deb0ed43caf" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "sync_wrapper" +version = "1.0.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0bf256ce5efdfa370213c1dabab5935a12e49f2c58d15e9eac2870d3b4f27263" +dependencies = [ + "futures-core", +] + +[[package]] +name = "synstructure" +version = "0.13.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "728a70f3dbaf5bab7f0c4b1ac8d7ae5ea60a4b5549c8a5914361c99147a709d2" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "thiserror" +version = "1.0.69" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b6aaf5339b578ea85b50e080feb250a3e8ae8cfcdff9a461c9ec2904bc923f52" +dependencies = [ + "thiserror-impl 1.0.69", +] + +[[package]] +name = "thiserror" +version = "2.0.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "567b8a2dae586314f7be2a752ec7474332959c6460e02bde30d702a66d488708" +dependencies = [ + "thiserror-impl 2.0.12", +] + +[[package]] +name = "thiserror-impl" +version = "1.0.69" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4fee6c4efc90059e10f81e6d42c60a18f76588c3d74cb83a0b242a2b6c7504c1" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "thiserror-impl" +version = "2.0.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f7cf42b4507d8ea322120659672cf1b9dbb93f8f2d4ecfd6e51350ff5b17a1d" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "thread_local" +version = "1.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b9ef9bad013ada3808854ceac7b46812a6465ba368859a37e2100283d2d719c" +dependencies = [ + "cfg-if", + "once_cell", +] + +[[package]] +name = "time" +version = "0.3.41" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8a7619e19bc266e0f9c5e6686659d394bc57973859340060a69221e57dbc0c40" +dependencies = [ + "deranged", + "itoa", + "num-conv", + "powerfmt", + "serde", + "time-core", + "time-macros", +] + +[[package]] +name = "time-core" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c9e9a38711f559d9e3ce1cdb06dd7c5b8ea546bc90052da6d06bb76da74bb07c" + +[[package]] +name = "time-macros" +version = "0.2.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3526739392ec93fd8b359c8e98514cb3e8e021beb4e5f597b00a0221f8ed8a49" +dependencies = [ + "num-conv", + "time-core", +] + +[[package]] +name = "tinystr" +version = "0.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5d4f6d1145dcb577acf783d4e601bc1d76a13337bb54e6233add580b07344c8b" +dependencies = [ + "displaydoc", + "zerovec", +] + +[[package]] +name = "tinyvec" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09b3661f17e86524eccd4371ab0429194e0d7c008abb45f7a7495b1719463c71" +dependencies = [ + "tinyvec_macros", +] + +[[package]] +name = "tinyvec_macros" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" + +[[package]] +name = "tokio" +version = "1.45.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "75ef51a33ef1da925cea3e4eb122833cb377c61439ca401b770f54902b806779" +dependencies = [ + "backtrace", + "bytes", + "libc", + "mio", + "pin-project-lite", + "signal-hook-registry", + "socket2", + "tokio-macros", + "tracing", + "windows-sys 0.52.0", +] + +[[package]] +name = "tokio-macros" +version = "2.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e06d43f1345a3bcd39f6a56dbb7dcab2ba47e68e8ac134855e7e2bdbaf8cab8" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "tokio-rustls" +version = "0.26.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e727b36a1a0e8b74c376ac2211e40c2c8af09fb4013c60d910495810f008e9b" +dependencies = [ + "rustls", + "tokio", +] + +[[package]] +name = "tokio-stream" +version = "0.1.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eca58d7bba4a75707817a2c44174253f9236b2d5fbd055602e9d5c07c139a047" +dependencies = [ + "futures-core", + "pin-project-lite", + "tokio", +] + +[[package]] +name = "tokio-tungstenite" +version = "0.26.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7a9daff607c6d2bf6c16fd681ccb7eecc83e4e2cdc1ca067ffaadfca5de7f084" +dependencies = [ + "futures-util", + "log", + "rustls", + "rustls-native-certs", + "rustls-pki-types", + "tokio", + "tokio-rustls", + "tungstenite", +] + +[[package]] +name = "tokio-util" +version = "0.7.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "66a539a9ad6d5d281510d5bd368c973d636c02dbf8a67300bfb6b950696ad7df" +dependencies = [ + "bytes", + "futures-core", + "futures-sink", + "pin-project-lite", + "tokio", +] + +[[package]] +name = "tower" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d039ad9159c98b70ecfd540b2573b97f7f52c3e8d9f8ad57a24b916a536975f9" +dependencies = [ + "futures-core", + "futures-util", + "pin-project-lite", + "sync_wrapper", + "tokio", + "tower-layer", + "tower-service", + "tracing", +] + +[[package]] +name = "tower-http" +version = "0.6.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "adc82fd73de2a9722ac5da747f12383d2bfdb93591ee6c58486e0097890f05f2" +dependencies = [ + "bitflags", + "bytes", + "futures-util", + "http", + "http-body", + "iri-string", + "pin-project-lite", + "tower", + "tower-layer", + "tower-service", +] + +[[package]] +name = "tower-layer" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "121c2a6cda46980bb0fcd1647ffaf6cd3fc79a013de288782836f6df9c48780e" + +[[package]] +name = "tower-service" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8df9b6e13f2d32c91b9bd719c00d1958837bc7dec474d94952798cc8e69eeec3" + +[[package]] +name = "tracing" +version = "0.1.41" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "784e0ac535deb450455cbfa28a6f0df145ea1bb7ae51b821cf5e7927fdcfbdd0" +dependencies = [ + "log", + "pin-project-lite", + "tracing-attributes", + "tracing-core", +] + +[[package]] +name = "tracing-attributes" +version = "0.1.29" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b1ffbcf9c6f6b99d386e7444eb608ba646ae452a36b39737deb9663b610f662" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "tracing-core" +version = "0.1.34" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9d12581f227e93f094d3af2ae690a574abb8a2b9b7a96e7cfe9647b2b617678" +dependencies = [ + "once_cell", + "valuable", +] + +[[package]] +name = "tracing-error" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b1581020d7a273442f5b45074a6a57d5757ad0a47dac0e9f0bd57b81936f3db" +dependencies = [ + "tracing", + "tracing-subscriber", +] + +[[package]] +name = "tracing-log" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee855f1f400bd0e5c02d150ae5de3840039a3f54b025156404e34c23c03f47c3" +dependencies = [ + "log", + "once_cell", + "tracing-core", +] + +[[package]] +name = "tracing-subscriber" +version = "0.3.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e8189decb5ac0fa7bc8b96b7cb9b2701d60d48805aca84a238004d665fcc4008" +dependencies = [ + "matchers", + "nu-ansi-term", + "once_cell", + "regex", + "sharded-slab", + "smallvec", + "thread_local", + "tracing", + "tracing-core", + "tracing-log", +] + +[[package]] +name = "try-lock" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e421abadd41a4225275504ea4d6566923418b7f05506fbc9c0fe86ba7396114b" + +[[package]] +name = "tungstenite" +version = "0.26.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4793cb5e56680ecbb1d843515b23b6de9a75eb04b66643e256a396d43be33c13" +dependencies = [ + "bytes", + "data-encoding", + "http", + "httparse", + "log", + "rand 0.9.1", + "rustls", + "rustls-pki-types", + "sha1", + "thiserror 2.0.12", + "utf-8", +] + +[[package]] +name = "typenum" +version = "1.18.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1dccffe3ce07af9386bfd29e80c0ab1a8205a2fc34e4bcd40364df902cfa8f3f" + +[[package]] +name = "unicase" +version = "2.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "75b844d17643ee918803943289730bec8aac480150456169e647ed0b576ba539" + +[[package]] +name = "unicode-bidi" +version = "0.3.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c1cb5db39152898a79168971543b1cb5020dff7fe43c8dc468b0885f5e29df5" + +[[package]] +name = "unicode-ident" +version = "1.0.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a5f39404a5da50712a4c1eecf25e90dd62b613502b7e925fd4e4d19b5c96512" + +[[package]] +name = "unicode-normalization" +version = "0.1.24" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5033c97c4262335cded6d6fc3e5c18ab755e1a3dc96376350f3d8e9f009ad956" +dependencies = [ + "tinyvec", +] + +[[package]] +name = "unicode-properties" +version = "0.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e70f2a8b45122e719eb623c01822704c4e0907e7e426a05927e1a1cfff5b75d0" + +[[package]] +name = "untrusted" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ecb6da28b8a351d773b68d5825ac39017e680750f980f3a1a85cd8dd28a47c1" + +[[package]] +name = "url" +version = "2.5.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32f8b686cadd1473f4bd0117a5d28d36b1ade384ea9b5069a1c40aefed7fda60" +dependencies = [ + "form_urlencoded", + "idna", + "percent-encoding", + "serde", +] + +[[package]] +name = "utf-8" +version = "0.7.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09cc8ee72d2a9becf2f2febe0205bbed8fc6615b7cb429ad062dc7b7ddd036a9" + +[[package]] +name = "utf8_iter" +version = "1.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" + +[[package]] +name = "utf8parse" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821" + +[[package]] +name = "valuable" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ba73ea9cf16a25df0c8caa16c51acb937d5712a8429db78a3ee29d5dcacd3a65" + +[[package]] +name = "vcpkg" +version = "0.2.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "accd4ea62f7bb7a82fe23066fb0957d48ef677f6eeb8215f372f52e48bb32426" + +[[package]] +name = "version_check" +version = "0.9.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b928f33d975fc6ad9f86c8f283853ad26bdd5b10b7f1542aa2fa15e2289105a" + +[[package]] +name = "want" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bfa7760aed19e106de2c7c0b581b509f2f25d3dacaf737cb82ac61bc6d760b0e" +dependencies = [ + "try-lock", +] + +[[package]] +name = "wasi" +version = "0.11.0+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" + +[[package]] +name = "wasi" +version = "0.14.2+wasi-0.2.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9683f9a5a998d873c0d21fcbe3c083009670149a8fab228644b8bd36b2c48cb3" +dependencies = [ + "wit-bindgen-rt", +] + +[[package]] +name = "wasite" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b8dad83b4f25e74f184f64c43b150b91efe7647395b42289f38e50566d82855b" + +[[package]] +name = "wasm-bindgen" +version = "0.2.100" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1edc8929d7499fc4e8f0be2262a241556cfc54a0bea223790e71446f2aab1ef5" +dependencies = [ + "cfg-if", + "once_cell", + "rustversion", + "wasm-bindgen-macro", +] + +[[package]] +name = "wasm-bindgen-backend" +version = "0.2.100" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2f0a0651a5c2bc21487bde11ee802ccaf4c51935d0d3d42a6101f98161700bc6" +dependencies = [ + "bumpalo", + "log", + "proc-macro2", + "quote", + "syn 2.0.101", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-futures" +version = "0.4.50" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "555d470ec0bc3bb57890405e5d4322cc9ea83cebb085523ced7be4144dac1e61" +dependencies = [ + "cfg-if", + "js-sys", + "once_cell", + "wasm-bindgen", + "web-sys", +] + +[[package]] +name = "wasm-bindgen-macro" +version = "0.2.100" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7fe63fc6d09ed3792bd0897b314f53de8e16568c2b3f7982f468c0bf9bd0b407" +dependencies = [ + "quote", + "wasm-bindgen-macro-support", +] + +[[package]] +name = "wasm-bindgen-macro-support" +version = "0.2.100" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ae87ea40c9f689fc23f209965b6fb8a99ad69aeeb0231408be24920604395de" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", + "wasm-bindgen-backend", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-shared" +version = "0.2.100" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1a05d73b933a847d6cccdda8f838a22ff101ad9bf93e33684f39c1f5f0eece3d" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "web-sys" +version = "0.3.77" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "33b6dd2ef9186f1f2072e409e99cd22a975331a6b3591b12c764e0e55c60d5d2" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "web-time" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a6580f308b1fad9207618087a65c04e7a10bc77e02c8e84e9b00dd4b12fa0bb" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "webpki-roots" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2853738d1cc4f2da3a225c18ec6c3721abb31961096e9dbf5ab35fa88b19cfdb" +dependencies = [ + "rustls-pki-types", +] + +[[package]] +name = "which" +version = "4.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "87ba24419a2078cd2b0f2ede2691b6c66d8e47836da3b6db8265ebad47afbfc7" +dependencies = [ + "either", + "home", + "once_cell", + "rustix", +] + +[[package]] +name = "whoami" +version = "1.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6994d13118ab492c3c80c1f81928718159254c53c472bf9ce36f8dae4add02a7" +dependencies = [ + "redox_syscall", + "wasite", +] + +[[package]] +name = "winapi" +version = "0.3.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419" +dependencies = [ + "winapi-i686-pc-windows-gnu", + "winapi-x86_64-pc-windows-gnu", +] + +[[package]] +name = "winapi-i686-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" + +[[package]] +name = "winapi-x86_64-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" + +[[package]] +name = "windows-core" +version = "0.61.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c0fdd3ddb90610c7638aa2b3a3ab2904fb9e5cdbecc643ddb3647212781c4ae3" +dependencies = [ + "windows-implement", + "windows-interface", + "windows-link", + "windows-result", + "windows-strings", +] + +[[package]] +name = "windows-implement" +version = "0.60.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a47fddd13af08290e67f4acabf4b459f647552718f683a7b415d290ac744a836" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "windows-interface" +version = "0.59.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bd9211b69f8dcdfa817bfd14bf1c97c9188afa36f4750130fcdf3f400eca9fa8" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "windows-link" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "76840935b766e1b0a05c0066835fb9ec80071d4c09a16f6bd5f7e655e3c14c38" + +[[package]] +name = "windows-result" +version = "0.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "56f42bd332cc6c8eac5af113fc0c1fd6a8fd2aa08a0119358686e5160d0586c6" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows-strings" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "56e6c93f3a0c3b36176cb1327a4958a0353d5d166c2a35cb268ace15e91d3b57" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows-sys" +version = "0.48.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "677d2418bec65e3338edb076e806bc1ec15693c5d0104683f2efe857f61056a9" +dependencies = [ + "windows-targets 0.48.5", +] + +[[package]] +name = "windows-sys" +version = "0.52.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" +dependencies = [ + "windows-targets 0.52.6", +] + +[[package]] +name = "windows-sys" +version = "0.59.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" +dependencies = [ + "windows-targets 0.52.6", +] + +[[package]] +name = "windows-targets" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9a2fa6e2155d7247be68c096456083145c183cbbbc2764150dda45a87197940c" +dependencies = [ + "windows_aarch64_gnullvm 0.48.5", + "windows_aarch64_msvc 0.48.5", + "windows_i686_gnu 0.48.5", + "windows_i686_msvc 0.48.5", + "windows_x86_64_gnu 0.48.5", + "windows_x86_64_gnullvm 0.48.5", + "windows_x86_64_msvc 0.48.5", +] + +[[package]] +name = "windows-targets" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" +dependencies = [ + "windows_aarch64_gnullvm 0.52.6", + "windows_aarch64_msvc 0.52.6", + "windows_i686_gnu 0.52.6", + "windows_i686_gnullvm 0.52.6", + "windows_i686_msvc 0.52.6", + "windows_x86_64_gnu 0.52.6", + "windows_x86_64_gnullvm 0.52.6", + "windows_x86_64_msvc 0.52.6", +] + +[[package]] +name = "windows-targets" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b1e4c7e8ceaaf9cb7d7507c974735728ab453b67ef8f18febdd7c11fe59dca8b" +dependencies = [ + "windows_aarch64_gnullvm 0.53.0", + "windows_aarch64_msvc 0.53.0", + "windows_i686_gnu 0.53.0", + "windows_i686_gnullvm 0.53.0", + "windows_i686_msvc 0.53.0", + "windows_x86_64_gnu 0.53.0", + "windows_x86_64_gnullvm 0.53.0", + "windows_x86_64_msvc 0.53.0", +] + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b38e32f0abccf9987a4e3079dfb67dcd799fb61361e53e2882c3cbaf0d905d8" + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "86b8d5f90ddd19cb4a147a5fa63ca848db3df085e25fee3cc10b39b6eebae764" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc35310971f3b2dbbf3f0690a219f40e2d9afcf64f9ab7cc1be722937c26b4bc" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c7651a1f62a11b8cbd5e0d42526e55f2c99886c77e007179efff86c2b137e66c" + +[[package]] +name = "windows_i686_gnu" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a75915e7def60c94dcef72200b9a8e58e5091744960da64ec734a6c6e9b3743e" + +[[package]] +name = "windows_i686_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e9b5ad5ab802e97eb8e295ac6720e509ee4c243f69d781394014ebfe8bbfa0b" + +[[package]] +name = "windows_i686_gnu" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c1dc67659d35f387f5f6c479dc4e28f1d4bb90ddd1a5d3da2e5d97b42d6272c3" + +[[package]] +name = "windows_i686_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0eee52d38c090b3caa76c563b86c3a4bd71ef1a819287c19d586d7334ae8ed66" + +[[package]] +name = "windows_i686_gnullvm" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ce6ccbdedbf6d6354471319e781c0dfef054c81fbc7cf83f338a4296c0cae11" + +[[package]] +name = "windows_i686_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f55c233f70c4b27f66c523580f78f1004e8b5a8b659e05a4eb49d4166cca406" + +[[package]] +name = "windows_i686_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" + +[[package]] +name = "windows_i686_msvc" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "581fee95406bb13382d2f65cd4a908ca7b1e4c2f1917f143ba16efe98a589b5d" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "53d40abd2583d23e4718fddf1ebec84dbff8381c07cae67ff7768bbf19c6718e" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2e55b5ac9ea33f2fc1716d1742db15574fd6fc8dadc51caab1c16a3d3b4190ba" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b7b52767868a23d5bab768e390dc5f5c55825b6d30b86c844ff2dc7414044cc" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0a6e035dd0599267ce1ee132e51c27dd29437f63325753051e71dd9e42406c57" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ed94fce61571a4006852b7389a063ab983c02eb1bb37b47f8272ce92d06d9538" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.53.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "271414315aff87387382ec3d271b52d7ae78726f5d44ac98b4f4030c91880486" + +[[package]] +name = "wit-bindgen-rt" +version = "0.39.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6f42320e61fe2cfd34354ecb597f86f413484a798ba44a8ca1165c58d42da6c1" +dependencies = [ + "bitflags", +] + +[[package]] +name = "writeable" +version = "0.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ea2f10b9bb0928dfb1b42b65e1f9e36f7f54dbdf08457afefb38afcdec4fa2bb" + +[[package]] +name = "yoke" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5f41bb01b8226ef4bfd589436a297c53d118f65921786300e427be8d487695cc" +dependencies = [ + "serde", + "stable_deref_trait", + "yoke-derive", + "zerofrom", +] + +[[package]] +name = "yoke-derive" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "38da3c9736e16c5d3c8c597a9aaa5d1fa565d0532ae05e27c24aa62fb32c0ab6" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", + "synstructure", +] + +[[package]] +name = "zerocopy" +version = "0.8.25" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a1702d9583232ddb9174e01bb7c15a2ab8fb1bc6f227aa1233858c351a3ba0cb" +dependencies = [ + "zerocopy-derive", +] + +[[package]] +name = "zerocopy-derive" +version = "0.8.25" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "28a6e20d751156648aa063f3800b706ee209a32c0b4d9f24be3d980b01be55ef" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] + +[[package]] +name = "zerofrom" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "50cc42e0333e05660c3587f3bf9d0478688e15d870fab3346451ce7f8c9fbea5" +dependencies = [ + "zerofrom-derive", +] + +[[package]] +name = "zerofrom-derive" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d71e5d6e06ab090c67b5e44993ec16b72dcbaabc526db883a360057678b48502" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", + "synstructure", +] + +[[package]] +name = "zeroize" +version = "1.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ced3678a2879b30306d323f4542626697a464a97c0a07c9aebf7ebca65cd4dde" + +[[package]] +name = "zerotrie" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "36f0bbd478583f79edad978b407914f61b2972f5af6fa089686016be8f9af595" +dependencies = [ + "displaydoc", + "yoke", + "zerofrom", +] + +[[package]] +name = "zerovec" +version = "0.11.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4a05eb080e015ba39cc9e23bbe5e7fb04d5fb040350f99f34e338d5fdd294428" +dependencies = [ + "yoke", + "zerofrom", + "zerovec-derive", +] + +[[package]] +name = "zerovec-derive" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b96237efa0c878c64bd89c436f661be4e46b2f3eff1ebb976f7ef2321d2f58f" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.101", +] diff --git a/Cargo.toml b/Cargo.toml new file mode 100755 index 0000000..2ce7cde --- /dev/null +++ b/Cargo.toml @@ -0,0 +1,45 @@ +[package] +name = "slack-system-bot" +version = "0.1.0" +edition = "2024" + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[dependencies] +axum = "0.8.4" +clap = { version = "4.5.39", features = ["derive"] } +displaydoc = "0.2.5" +error-stack = { version = "0.5.0", features = [ + "eyre", + "hooks", + "serde", + "spantrace", +] } +eyre = "0.6.12" +http-body-util = "0.1.3" +menv = "0.2.7" +oauth2 = "5.0.0" +redact = "0.1.10" +rustls = "0.23.27" +serde = { version = "1.0.219", features = ["derive"] } +slack-morphism = { version = "2.12.0", features = ["axum"] } +sqlx = { version = "0.8.6", features = [ + "runtime-tokio", + "sqlite", + "sqlite-preupdate-hook", + "migrate", + "time", +] } +libsqlite3-sys = { version = "0.30.1" } +thiserror = "2.0.12" +time = "0.3.41" +tokio = { version = "1.45.1", features = ["rt", "macros", "rt-multi-thread"] } +tracing = "0.1.41" +tracing-error = "0.2.1" +tracing-subscriber = { version = "0.3.19", features = ["env-filter"] } +dotenvy = { git = "https://github.com/allan2/dotenvy", features = ["macros"] } +url = "2.5.4" +serde_json = "1.0.140" + +[features] +encrypt = ["libsqlite3-sys/bundled-sqlcipher"] diff --git a/README.md b/README.md new file mode 100755 index 0000000..20defab --- /dev/null +++ b/README.md @@ -0,0 +1,2 @@ +# slack-system-bot +A bot of all time for plural folks :D diff --git a/build.rs b/build.rs new file mode 100755 index 0000000..d506869 --- /dev/null +++ b/build.rs @@ -0,0 +1,5 @@ +// generated by `sqlx migrate build-script` +fn main() { + // trigger recompilation when a new migration is added + println!("cargo:rerun-if-changed=migrations"); +} diff --git a/migrations/20241217133534_init_systems.sql b/migrations/20241217133534_init_systems.sql new file mode 100755 index 0000000..494039a --- /dev/null +++ b/migrations/20241217133534_init_systems.sql @@ -0,0 +1,9 @@ +-- Add migration script here +CREATE TABLE systems ( + id INTEGER NOT NULL PRIMARY KEY, + owner_id TEXT UNIQUE NOT NULL, + name TEXT NOT NULL, + slack_oauth_token TEXT NOT NULL, + -- unix timestamp + created_at INTEGER DEFAULT CURRENT_TIMESTAMP NOT NULL +); diff --git a/migrations/20241217163630_init_members.sql b/migrations/20241217163630_init_members.sql new file mode 100755 index 0000000..8b6eb84 --- /dev/null +++ b/migrations/20241217163630_init_members.sql @@ -0,0 +1,22 @@ +-- Add migration script here +CREATE TABLE members ( + id INTEGER NOT NULL PRIMARY KEY, + -- shown in extended info + full_name TEXT NOT NULL, + -- shown on messages + display_name TEXT NOT NULL, + -- shown on messages + profile_picture_url TEXT, + -- shown in extended info + title TEXT, + -- shown in extended info + pronouns TEXT, + -- shown in extended info + name_pronunciation TEXT, + -- shown in extended info + name_recording_url TEXT, + system_id INTEGER NOT NULL, + -- unix timestamp + created_at INTEGER DEFAULT CURRENT_TIMESTAMP NOT NULL, + FOREIGN KEY (system_id) REFERENCES systems (id) +); diff --git a/migrations/20250109093158_switch_triggers.sql b/migrations/20250109093158_switch_triggers.sql new file mode 100755 index 0000000..7c78d00 --- /dev/null +++ b/migrations/20250109093158_switch_triggers.sql @@ -0,0 +1,71 @@ +-- Add migration script here +-- The current fronting member. If null, no member we have is fronting and the raw account messages are used +ALTER TABLE systems +ADD COLUMN active_member_id INTEGER REFERENCES members (id); + +-- If a trigger is used, should the active member be changed to the new member? +ALTER TABLE systems +ADD COLUMN trigger_changes_active_member BOOLEAN DEFAULT FALSE NOT NULL; + +-- note: prefix and suffix can both happen on the same trigger. It means either will trigger the switch +CREATE TABLE triggers ( + id INTEGER NOT NULL PRIMARY KEY, + -- The member that will front + member_id INTEGER NOT NULL REFERENCES members (id), + -- The prefix that will trigger this member + prefix TEXT, + -- The suffix that will trigger this member + suffix TEXT, + system_id INTEGER NOT NULL, + -- Create unique constraints using the system_id from the member table + CONSTRAINT unique_prefix UNIQUE (system_id, prefix), + CONSTRAINT unique_suffix UNIQUE (system_id, suffix) +); + +-- ensure system id is the same as the system id on member +CREATE TRIGGER ensure_system_id BEFORE INSERT ON triggers FOR EACH ROW BEGIN +SELECT + RAISE ( + ABORT, + 'system_id must be the same as the system_id on member' + ) +WHERE + NEW.system_id != ( + SELECT + system_id + FROM + members + WHERE + id = NEW.member_id + ); + +END; + +CREATE TRIGGER ensure_system_id_update BEFORE +UPDATE ON triggers FOR EACH ROW BEGIN +SELECT + RAISE ( + ABORT, + 'system_id must be the same as the system_id on member' + ) +WHERE + NEW.system_id != ( + SELECT + system_id + FROM + members + WHERE + id = NEW.member_id + ); + +END; + +CREATE TRIGGER ensure_system_id_update_members_table BEFORE +UPDATE ON members FOR EACH ROW BEGIN +UPDATE triggers +SET + system_id = NEW.system_id +WHERE + member_id = NEW.id; + +END; diff --git a/migrations/20250110153933_systems_owner_index.sql b/migrations/20250110153933_systems_owner_index.sql new file mode 100755 index 0000000..5693b32 --- /dev/null +++ b/migrations/20250110153933_systems_owner_index.sql @@ -0,0 +1,3 @@ +-- Add migration script here +-- Adds an index on systems.owner_id (which also means 1 system per owner. Probably fine) +CREATE UNIQUE INDEX systems_owner_index ON systems (owner_id); diff --git a/migrations/20250112134655_system_oauth_process.sql b/migrations/20250112134655_system_oauth_process.sql new file mode 100755 index 0000000..4b21b10 --- /dev/null +++ b/migrations/20250112134655_system_oauth_process.sql @@ -0,0 +1,7 @@ +-- Add migration script here +CREATE TABLE system_oauth_process ( + id INTEGER NOT NULL PRIMARY KEY, + owner_id TEXT UNIQUE NOT NULL, + name TEXT NOT NULL, + csrf TEXT NOT NULL +); diff --git a/migrations/20250608185643_merge_trigger_fields.sql b/migrations/20250608185643_merge_trigger_fields.sql new file mode 100644 index 0000000..2329f2c --- /dev/null +++ b/migrations/20250608185643_merge_trigger_fields.sql @@ -0,0 +1,100 @@ +-- Add migration script here +-- Consolidate prefix and suffix into a single trigger field with a boolean to indicate type +-- First, drop the trigger that references the triggers table +DROP TRIGGER IF EXISTS ensure_system_id_update_members_table; + +-- Create a new table with the updated schema +CREATE TABLE triggers_new ( + id INTEGER NOT NULL PRIMARY KEY, + -- The member that will front + member_id INTEGER NOT NULL REFERENCES members (id), + -- The trigger text. This will be the prefix or suffix depending on the is_prefix flag + trigger_text TEXT NOT NULL, + -- True if this is a prefix trigger, false if suffix + is_prefix BOOLEAN NOT NULL, + system_id INTEGER NOT NULL, + -- Create unique constraints using the system_id and trigger type + CONSTRAINT unique_trigger UNIQUE (system_id, trigger_text, is_prefix) +); + +-- Migrate existing data from the old table +INSERT INTO + triggers_new (member_id, trigger_text, is_prefix, system_id) +SELECT + member_id, + prefix, + TRUE, + system_id +FROM + triggers +WHERE + prefix IS NOT NULL; + +INSERT INTO + triggers_new (member_id, trigger_text, is_prefix, system_id) +SELECT + member_id, + suffix, + FALSE, + system_id +FROM + triggers +WHERE + suffix IS NOT NULL; + +-- Recreate original state/names +DROP TRIGGER IF EXISTS ensure_system_id; + +DROP TRIGGER IF EXISTS ensure_system_id_update; + +DROP TABLE triggers; + +ALTER TABLE triggers_new +RENAME TO triggers; + +CREATE TRIGGER ensure_system_id BEFORE INSERT ON triggers FOR EACH ROW BEGIN +SELECT + RAISE ( + ABORT, + 'system_id must be the same as the system_id on member' + ) +WHERE + NEW.system_id != ( + SELECT + system_id + FROM + members + WHERE + id = NEW.member_id + ); + +END; + +CREATE TRIGGER ensure_system_id_update BEFORE +UPDATE ON triggers FOR EACH ROW BEGIN +SELECT + RAISE ( + ABORT, + 'system_id must be the same as the system_id on member' + ) +WHERE + NEW.system_id != ( + SELECT + system_id + FROM + members + WHERE + id = NEW.member_id + ); + +END; + +CREATE TRIGGER ensure_system_id_update_members_table BEFORE +UPDATE ON members FOR EACH ROW BEGIN +UPDATE triggers +SET + system_id = NEW.system_id +WHERE + member_id = NEW.id; + +END; diff --git a/migrations/20250608190743_rename_trigger_text.sql b/migrations/20250608190743_rename_trigger_text.sql new file mode 100644 index 0000000..c2d1fdd --- /dev/null +++ b/migrations/20250608190743_rename_trigger_text.sql @@ -0,0 +1,3 @@ +-- Add migration script here +ALTER TABLE triggers +RENAME COLUMN trigger_text TO text; diff --git a/rust-toolchain.toml b/rust-toolchain.toml new file mode 100755 index 0000000..28c5ef5 --- /dev/null +++ b/rust-toolchain.toml @@ -0,0 +1,3 @@ +[toolchain] +channel = "stable" +components = ["rustfmt", "rust-src", "rust-analyzer"] diff --git a/src/commands/members.rs b/src/commands/members.rs new file mode 100755 index 0000000..05b467e --- /dev/null +++ b/src/commands/members.rs @@ -0,0 +1,342 @@ +use std::sync::Arc; + +use error_stack::{Result, ResultExt, report}; +use slack_morphism::prelude::*; +use tracing::{debug, info}; + +use crate::{ + BOT_TOKEN, + commands::members, + models::{ + member::{self, Member, View}, + system::{ChangeActiveMemberError, System}, + user, + }, +}; + +#[derive(clap::Subcommand, Debug)] +pub enum Members { + /// Adds a new member to your system. Expect a popup to fill in the member info! + Add, + /// Deletes a member from your system. Use the member id from /member list + Delete { + /// The member to delete + member: i64, + }, + /// Gets info about a member + Info { + /// The member to get info about. Use the member id from /member list + member_id: i64, + }, + /// Lists all members in a system + List { + /// The system to list members from. If left blank, defaults to your system. + system: Option, + }, + /// Edits a member's info + Edit { + /// The member to edit. Use the member id from /member list. Expect a popup to edit the info! + member_id: i64, + }, + /// Switch to a different member + #[group(required = true)] + Switch { + /// The member to switch to. Use the member id from /member list + #[clap(group = "member")] + member_id: Option, + /// Don't switch to another member, just message with the base account + #[clap(long, short, action, group = "member", alias = "none")] + base: bool, + }, +} + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum CommandError { + /// Error while calling the Slack API + Slack, + /// Error while calling the database + Sqlx, +} + +impl Members { + pub async fn run( + self, + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, + ) -> Result { + match self { + Self::Add => { + let token = &BOT_TOKEN; + let session = client.open_session(token); + Self::create_member(event, session).await + } + Self::Delete { member } => { + info!("Deleting member {member}"); + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("Working on it".into()), + )) + } + Self::Info { member_id } => Self::member_info(event, &state, member_id).await, + Self::Edit { member_id } => { + Self::edit_member(event, client.open_session(&BOT_TOKEN), &state, member_id).await + } + Self::List { system } => Self::list_members(event, state, system).await, + Self::Switch { member_id, base } => { + Self::switch_member(event, state, member_id, base).await + } + } + } + + async fn switch_member( + event: SlackCommandEvent, + state: SlackClientEventsUserState, + member_id: Option, + base: bool, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + let Some(mut system) = System::fetch_by_user_id(&user_state.db, &event.user_id.into()) + .await + .change_context(CommandError::Sqlx)? + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("You don't have a system yet!".into()), + )); + }; + + let new_active_member_id = if base { + None + } else { + member::Id::new( + member_id.expect("member_id to be Some, as the clap rules require it to be."), + ) + .validate_by_system(system.id, &user_state.db) + .await + .ok() + }; + + let new_member = system + .change_active_member(new_active_member_id, &user_state.db) + .await; + + let response = match new_member { + Ok(Some(member)) => format!("Switch to member {}", member.full_name), + Ok(None) => "Switched to base account".into(), + Err(ChangeActiveMemberError::MemberNotFound) => { + "The member you gave doesn't exist!".into() + } + Err(ChangeActiveMemberError::Sqlx(err)) => { + return Err(report!(err).change_context(CommandError::Sqlx)); + } + }; + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text(response), + )) + } + + async fn list_members( + event: SlackCommandEvent, + state: SlackClientEventsUserState, + system: Option, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + // If the input exists, parse it into a user ID + // If it doesn't exist, use the user ID of the event. + // If the user ID is invalid, return an error. + // Theres probably a better way to write this behaviour but I'm not sure how. + let Some((user_id, is_author)) = system.map_or_else( + || Some((user::Id::new(event.user_id), true)), + |u| user::parse_slack_user_id(&u).map(|id| (id, false)), + ) else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("Invalid user ID".into()), + )); + }; + + let Some(system) = System::fetch_by_user_id(&user_state.db, &user_id) + .await + .change_context(CommandError::Sqlx)? + else { + return if is_author { + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("You don't have a system yet!".into()), + )) + } else { + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("This user doesn't have a system!".into()), + )) + }; + }; + + let members = system + .get_members(&user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + let member_blocks = members + .into_iter() + .map(|member| { + let fields = [ + Some(md!("Display Name: {}", member.display_name)), + Some(md!("Member ID: {}", member.id)), + member.title.as_ref().map(|title| md!("Title: {}", title)), + member + .pronouns + .as_ref() + .map(|pronouns| md!("Pronouns: {}", pronouns)), + member + .name_pronunciation + .as_ref() + .map(|name_pronunciation| { + md!("Name Pronunciation: {}", name_pronunciation) + }), + Some(md!("Created At: {}", member.created_at)), + ] + .into_iter() + .flatten() + .collect(); + + SlackSectionBlock::new() + .with_text(md!("Name: {}", member.full_name)) + .with_fields(fields) + }) + .map(Into::into) + .collect(); + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(member_blocks), + )) + } + + async fn member_info( + event: SlackCommandEvent, + state: &SlackClientEventsUserState, + member_id: i64, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + let member_id = member::Id::new(member_id); + + let Some(system_id) = System::fetch_by_user_id(&user_state.db, &event.user_id.into()) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + let Some(member) = Member::fetch_by_and_trust_id(system_id, member_id, &user_state.db) + .await + .change_context(CommandError::Sqlx)? + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Member not found. Make sure you used the correct ID".into()), + )); + }; + + let fields = [ + Some(md!("Display Name: {}", member.display_name)), + Some(md!("Member ID: {}", member.id)), + member.title.as_ref().map(|title| md!("Title: {}", title)), + member + .pronouns + .as_ref() + .map(|pronouns| md!("Pronouns: {}", pronouns)), + member + .name_pronunciation + .as_ref() + .map(|name_pronunciation| md!("Name Pronunciation: {}", name_pronunciation)), + ] + .into_iter() + .flatten() + .collect(); + + let block = SlackSectionBlock::new() + .with_text(md!("Name: {}", member.full_name)) + .with_fields(fields); + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(vec![block.into()]), + )) + } + + async fn create_member( + event: SlackCommandEvent, + session: SlackClientSession<'_, SlackClientHyperHttpsConnector>, + ) -> Result { + let view = View::create_add_view(); + + let view = session + .views_open(&SlackApiViewsOpenRequest::new(event.trigger_id, view)) + .await + .attach_printable("Error opening view") + .change_context(CommandError::Slack)?; + + debug!("Opened view: {:#?}", view); + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("View opened!".into()), + )) + } + + async fn edit_member( + event: SlackCommandEvent, + session: SlackClientSession<'_, SlackClientHyperHttpsConnector>, + state: &SlackClientEventsUserState, + member_id: i64, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + let user_id = user::Id::new(event.user_id); + let member_id = member::Id::new(member_id); + + let Some(system_id) = System::fetch_by_user_id(&user_state.db, &user_id) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + let Some(member) = Member::fetch_by_and_trust_id(system_id, member_id, &user_state.db) + .await + .change_context(CommandError::Sqlx)? + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Member not found. Make sure you used the correct ID".into()), + )); + }; + + let member_id = member.id; + + let view = members::View::from(member).create_edit_view(member_id); + + let view = session + .views_open(&SlackApiViewsOpenRequest::new( + event.trigger_id.clone(), + view, + )) + .await + .attach_printable("Error opening view") + .change_context(CommandError::Slack)?; + + debug!("Opened view: {:#?}", view); + + Ok(SlackCommandEventResponse::new(SlackMessageContent::new())) + } +} diff --git a/src/commands/mod.rs b/src/commands/mod.rs new file mode 100755 index 0000000..a2783b6 --- /dev/null +++ b/src/commands/mod.rs @@ -0,0 +1,125 @@ +use std::sync::Arc; + +mod members; +mod system; +mod triggers; +use axum::{Extension, Json}; +use clap::Parser; +use error_stack::ResultExt; +use members::Members; + +use slack_morphism::prelude::*; +use system::System; +use tracing::{debug, error}; +use triggers::Triggers; + +#[derive(clap::Parser, Debug)] +#[command(color(clap::ColorChoice::Never))] +enum Command { + #[clap(subcommand)] + Members(Members), + #[clap(subcommand)] + System(System), + #[clap(subcommand)] + Triggers(Triggers), +} + +impl Command { + pub async fn run( + self, + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, + ) -> error_stack::Result { + match self { + Self::Members(members) => members + .run(event, client, state) + .await + .attach_printable("Failed to run members command") + .change_context(CommandError::Command), + Self::System(system) => system + .run(event, client, state) + .await + .attach_printable("Failed to run system command") + .change_context(CommandError::Command), + Self::Triggers(triggers) => triggers + .run(event, client, state) + .await + .attach_printable("Failed to run triggers command") + .change_context(CommandError::Command), + } + } +} + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +enum CommandError { + /// Error running the command + Command, +} + +// TODO: figure out error handling +#[tracing::instrument(skip(environment, event))] +pub async fn process_command_event( + Extension(environment): Extension>, + Extension(event): Extension, +) -> Json { + let client = environment.client.clone(); + let state = environment.user_state.clone(); + + match command_event_callback(event, client, state).await { + Ok(response) => Json(response), + Err(e) => { + error!("Error processing command event: {:#?}", e); + Json(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Error processing command! Logged to developers".into()), + )) + } + } +} + +async fn command_event_callback( + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, +) -> Result { + debug!("Received command: {:?}", event.command); + + let formatted_command = event.command.0.trim_start_matches('/'); + let formatted = event.text.as_ref().map_or_else( + || format!("slack-system-bot {formatted_command}"), + |text| format!("slack-system-bot {formatted_command} {text}"), + ); + + debug!("Formatted command: {formatted}"); + + let parser = Command::try_parse_from(formatted.split_whitespace()); + + match parser { + Ok(parser) => { + debug!("Parsed command: {:?}", parser); + let result = parser.run(event, client, state).await; + match result { + Ok(res) => { + debug!("Command {} executed successfully", formatted); + Ok(res) + } + Err(e) => { + error!("Error running command {formatted}"); + error!("{e:?}"); + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "Error running command! TODO: show error info on slack".into(), + ), + )) + } + } + } + Err(error) => { + let formatted = error.render(); + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text(formatted.to_string()), + )) + } + } +} diff --git a/src/commands/system.rs b/src/commands/system.rs new file mode 100755 index 0000000..5fc9e03 --- /dev/null +++ b/src/commands/system.rs @@ -0,0 +1,216 @@ +use std::sync::Arc; + +use error_stack::{Result, ResultExt}; +use oauth2::CsrfToken; +use slack_morphism::prelude::*; +use tokio::runtime::Handle; +use tracing::debug; + +use crate::{ + models::{system, user}, + oauth::create_oauth_client, +}; + +#[derive(clap::Subcommand, Debug)] +pub enum System { + /// Creates a system for your profile + Create { + /// The name of your system + name: String, + }, + /// Edits your system name + Rename { + /// Your system's new name + name: String, + }, + /// Reauthenticates your system with Slack + Reauth, + /// Get info about your or another user's system + Info { + /// The user to get info about (if left blank, defaults to you) + user: Option, + }, +} + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum CommandError { + /// Error while calling the database + Sqlx, +} + +impl System { + pub async fn run( + self, + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, + ) -> Result { + match self { + Self::Create { name } => Self::create_system(event, state, name).await, + Self::Rename { name } => Self::edit_system_name(event, state, name).await, + Self::Info { user } => Self::get_system_info(event, client, state, user).await, + Self::Reauth => Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("TODO: reauth".into()), + )), + } + } + + async fn get_system_info( + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, + user: Option, + ) -> Result { + debug!("Getting system info"); + + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + // If the input exists, parse it into a user ID. + // If it doesn't exist, use the user ID of the event. + // There's probably a better way to write this behaviour but I'm not sure how. + let Some(user_id) = user.map_or_else( + || Some(event.user_id.clone().into()), + |u| { + user::parse_slack_user_id(&u).and_then(|id| { + Handle::current().block_on(async { id.trust(&client).await.ok() }) + }) + }, + ) else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("Invalid user ID".into()), + )); + }; + + let system = system::System::fetch_by_user_id(&user_state.db, &user_id) + .await + .change_context(CommandError::Sqlx)?; + + if let Some(system) = system { + let fronting_member = system + .active_member(&user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(slack_blocks![ + some_into( + SlackSectionBlock::new() + .with_text(md!(format!("System name: {}", system.name))) + ), + some_into(SlackSectionBlock::new().with_text(md!(format!( + "Fronting member: {}", + fronting_member.map_or_else( + || "No fronting member".to_string(), + |m| m.display_name + ) + )))) + ]), + )) + } else { + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(slack_blocks![some_into( + SlackSectionBlock::new().with_text(md!("This user doesn't have a system!")) + )]), + )) + } + } + + async fn edit_system_name( + event: SlackCommandEvent, + state: SlackClientEventsUserState, + name: String, + ) -> Result { + debug!("Editing system name {name}"); + + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + let Some(system_id) = + system::System::fetch_by_user_id(&user_state.db, &event.user_id.into()) + .await + .change_context(CommandError::Sqlx)? + .map(|s| s.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(slack_blocks![some_into( + SlackSectionBlock::new().with_text(md!( + "You don't have a system to edit! Create one with `/system create`" + )) + )]), + )); + }; + + sqlx::query!( + r#" + UPDATE systems + SET name = $1 + WHERE id = $2 + "#, + name, + system_id + ) + .execute(&user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("Successfully updated system name!".into()), + )) + } + + async fn create_system( + event: SlackCommandEvent, + state: SlackClientEventsUserState, + name: String, + ) -> Result { + debug!("Creating system {name}"); + + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + // todo: somehow remove this clone with cleaner code in the future` + if system::System::fetch_by_user_id(&user_state.db, &user::Id::new(event.user_id.clone())) + .await + .change_context(CommandError::Sqlx)? + .is_some() + { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("You already have a system! If you need to reauthenticate, run /system reauth. If you need to change your system name, run /system rename".into()), + )); + } + + let oauth_client = create_oauth_client(); + + // note: we aren't doing PKCE since this is only ran on a trusted server + + let (auth_url, csrf_token) = oauth_client + .authorize_url(CsrfToken::new_random) + // so we get a regular token as well. Required by oauth2 for some reason + .add_extra_param("scope", "commands") + .add_extra_param("user_scope", "users.profile:read,chat:write") + .url(); + + let secret = csrf_token.secret(); + + sqlx::query!( + r#" + INSERT INTO system_oauth_process (name, owner_id, csrf) + VALUES ($1, $2, $3) + "#, + name, + event.user_id.0, + secret + ) + .execute(&user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(slack_blocks![some_into( + SlackSectionBlock::new() + .with_text(md!("<{}|Finish creating your system>", auth_url)) + )]), + )) + } +} diff --git a/src/commands/triggers.rs b/src/commands/triggers.rs new file mode 100755 index 0000000..145f445 --- /dev/null +++ b/src/commands/triggers.rs @@ -0,0 +1,306 @@ +use std::sync::Arc; + +use error_stack::{Result, ResultExt}; +use slack_morphism::prelude::*; +use tracing::debug; + +use crate::{ + BOT_TOKEN, + models::{ + member::{self, Member}, + system::System, + trigger, user, + }, +}; + +#[derive(clap::Subcommand, Debug)] +pub enum Triggers { + /// Adds a new trigger for a member. Expect a popup to fill in the info! + Add { + /// The member to add the trigger for. Use the member id from /member list + member: i64, + }, + /// Deletes a trigger + Delete { + /// The trigger to delete. Use the trigger id from /trigger list + id: i64, + }, + /// Lists all of your triggers + List { + /// If specified, lists the triggers for the given member. Use the member id from /member list + member: Option, + }, + /// Edit a trigger + Edit { + /// The trigger to edit. Use the trigger id from /trigger list + id: i64, + }, +} + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum CommandError { + /// Error while calling the Slack API + Slack, + /// Error while calling the database + Sqlx, +} + +impl Triggers { + pub async fn run( + self, + event: SlackCommandEvent, + client: Arc, + state: SlackClientEventsUserState, + ) -> Result { + match self { + Self::Add { member } => { + let token = &BOT_TOKEN; + let session = client.open_session(token); + Self::create_trigger(event, &state, session, member).await + } + Self::Delete { id } => Self::delete_trigger(event, &state, id).await, + Self::List { member } => Self::list_triggers(event, &state, member).await, + Self::Edit { id } => { + let token = &BOT_TOKEN; + let session = client.open_session(token); + Self::edit_trigger(event, &state, session, id).await + } + } + } + + async fn create_trigger( + event: SlackCommandEvent, + state: &SlackClientEventsUserState, + session: SlackClientSession<'_, SlackClientHyperHttpsConnector>, + member_id: i64, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + let member_id = member::Id::new(member_id); + + let Some(system_id) = + System::fetch_by_user_id(&user_state.db, &user::Id::new(event.user_id)) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + let Some(member_id) = Member::fetch_by_and_trust_id(system_id, member_id, &user_state.db) + .await + .change_context(CommandError::Sqlx)? + .map(|member| member.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Member not found. Make sure you used the correct ID".into()), + )); + }; + + let view = trigger::View::new(String::new(), true).create_add_view(member_id); + let view = session + .views_open(&SlackApiViewsOpenRequest::new( + event.trigger_id.clone(), + view, + )) + .await + .attach_printable("Error opening view") + .change_context(CommandError::Slack)?; + + debug!("Opened view: {:#?}", view); + + Ok(SlackCommandEventResponse::new(SlackMessageContent::new())) + } + + pub async fn delete_trigger( + event: SlackCommandEvent, + state: &SlackClientEventsUserState, + trigger_id: i64, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + let trigger_id = trigger::Id::new(trigger_id); + + let Some(system_id) = + System::fetch_by_user_id(&user_state.db, &user::Id::new(event.user_id)) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + // Validate the trigger belongs to the user's system + let Ok(trigger_id) = trigger_id + .validate_by_system(system_id, &user_state.db) + .await + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Trigger not found. Make sure you used the correct ID".into()), + )); + }; + + // Fetch the trigger to delete it + trigger_id + .delete(&user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("Successfully deleted trigger!".into()), + )) + } + + pub async fn list_triggers( + event: SlackCommandEvent, + state: &SlackClientEventsUserState, + member_id: Option, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + let Some(system_id) = + System::fetch_by_user_id(&user_state.db, &user::Id::new(event.user_id)) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + let triggers = if let Some(member_id) = member_id { + let member_id = member::Id::new(member_id); + + // Validate the member belongs to the user's system + let Ok(member_id) = member_id + .validate_by_system(system_id, &user_state.db) + .await + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Member not found. Make sure you used the correct ID".into()), + )); + }; + + member_id + .fetch_triggers(&user_state.db) + .await + .change_context(CommandError::Sqlx)? + } else { + system_id + .list_triggers(&user_state.db) + .await + .change_context(CommandError::Sqlx)? + }; + + if triggers.is_empty() { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text("No triggers found.".into()), + )); + } + + let trigger_blocks = triggers + .into_iter() + .map(|trigger| { + let fields = vec![ + md!("Trigger ID: {}", trigger.id), + md!("Member ID: {}", trigger.member_id), + md!( + "{}: {}", + if trigger.is_prefix { + "Prefix" + } else { + "Suffix" + }, + trigger.text + ), + ]; + + SlackSectionBlock::new() + .with_text(md!("**Trigger {}**", trigger.id)) + .with_fields(fields) + }) + .map(Into::into) + .collect(); + + Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_blocks(trigger_blocks), + )) + } + + pub async fn edit_trigger( + event: SlackCommandEvent, + state: &SlackClientEventsUserState, + session: SlackClientSession<'_, SlackClientHyperHttpsConnector>, + trigger_id: i64, + ) -> Result { + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + let trigger_id = trigger::Id::new(trigger_id); + + let Some(system_id) = + System::fetch_by_user_id(&user_state.db, &user::Id::new(event.user_id)) + .await + .change_context(CommandError::Sqlx)? + .map(|system| system.id) + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new().with_text( + "You don't have a system yet! Make one with `/system create `".into(), + ), + )); + }; + + // Validate the trigger belongs to the user's system + let Ok(trigger_id) = trigger_id + .validate_by_system(system_id, &user_state.db) + .await + else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Trigger not found. Make sure you used the correct ID".into()), + )); + }; + + // Fetch the trigger to edit + let trigger = trigger::Trigger::fetch_by_id(trigger_id, &user_state.db) + .await + .change_context(CommandError::Sqlx)?; + + let Some(trigger) = trigger else { + return Ok(SlackCommandEventResponse::new( + SlackMessageContent::new() + .with_text("Trigger not found. Make sure you used the correct ID".into()), + )); + }; + + let view = trigger::View::from(trigger).create_edit_view(trigger_id); + + let view = session + .views_open(&SlackApiViewsOpenRequest::new( + event.trigger_id.clone(), + view, + )) + .await + .attach_printable("Error opening view") + .change_context(CommandError::Slack)?; + + debug!("Opened view: {:#?}", view); + + Ok(SlackCommandEventResponse::new(SlackMessageContent::new())) + } +} diff --git a/src/env.rs b/src/env.rs new file mode 100755 index 0000000..5ec1b37 --- /dev/null +++ b/src/env.rs @@ -0,0 +1,26 @@ +use menv::require_envs; + +require_envs! { + (assert_env_vars, any_set, gen_help); + + slack_app_token, "SLACK_APP_TOKEN", String, + "SLACK_APP_TOKEN should be set to the bot's app token"; + + slack_bot_token, "SLACK_BOT_TOKEN", String, + "SLACK_BOT_TOKEN should be set to the bot's user token"; + + slack_client_id, "SLACK_CLIENT_ID", String, + "SLACK_CLIENT_ID should be set to the client ID for oauth"; + + slack_client_secret, "SLACK_CLIENT_SECRET", String, + "SLACK_CLIENT_SECRET should be set to the client secret for oauth"; + + slack_signing_secret, "SLACK_SIGNING_SECRET", String, + "SLACK_SIGNING_SECRET should be set to the signing secret for verifying slack requests"; + + database_url, "DATABASE_URL", String, + "DATABASE_URL should be set to a postgres database connection string"; + + encryption_key?, "ENCRYPTION_KEY", String, + "ENCRYPTION_KEY can be optionally set to a key for encrypting and decrypting the database"; +} diff --git a/src/events/mod.rs b/src/events/mod.rs new file mode 100755 index 0000000..1216805 --- /dev/null +++ b/src/events/mod.rs @@ -0,0 +1,291 @@ +use std::{convert::Infallible, sync::Arc}; + +use axum::{Extension, body::Bytes, http::Response}; +use error_stack::ResultExt; +use http_body_util::{BodyExt, Empty, Full, combinators::BoxBody}; +use slack_morphism::prelude::*; +// use sqlx::SqlitePool; +use tracing::{debug, error, trace}; + +use crate::{ + BOT_TOKEN, + models::{ + member::{Member, TriggeredMember}, + system::System, + user, + }, +}; + +#[tracing::instrument(skip(environment, event))] +pub async fn process_push_event( + Extension(environment): Extension>, + Extension(event): Extension, +) -> Response> { + debug!("Received push event!"); + + match event { + SlackPushEvent::UrlVerification(url_verification) => { + Response::new(Full::new(url_verification.challenge.into()).boxed()) + } + SlackPushEvent::EventCallback(event) => { + let client = environment.client.clone(); + let state = environment.user_state.clone(); + if let Err(e) = push_event_callback(event, client, state).await { + error!("Error processing push event: {:#?}", e); + } + + Response::new(Empty::new().boxed()) + } + SlackPushEvent::AppRateLimited(rate_limited) => { + trace!("Rate limited event: {:#?}", rate_limited); + Response::new(Empty::new().boxed()) + } + } +} + +async fn push_event_callback( + event: SlackPushEventCallback, + client: Arc, + state: SlackClientEventsUserState, +) -> Result<(), Box> { + match event.event { + SlackEventCallbackBody::Message(message_event) => { + debug!("Received message event!"); + trace!("Message: {:?}", message_event); + + let states = state.read().await; + let user_state = states.get_user_state::().unwrap(); + + if message_event + .subtype + .as_ref() + .is_some_and(|subtype| *subtype == SlackMessageEventType::MessageDeleted) + { + return Ok(()); + } + + let Some(user_id) = message_event.sender.user else { + return Ok(()); + }; + + let Some(mut system) = + System::fetch_by_user_id(&user_state.db, &user::Id::new(user_id)).await? + else { + return Ok(()); + }; + + let Some(ref channel_id) = message_event.origin.channel else { + return Ok(()); + }; + + let Some(content) = message_event.content else { + return Ok(()); + }; + + if let Some(ref message_content) = content.text { + let Some(member) = system + .fetch_triggered_member(&user_state.db, message_content) + .await? + else { + return Ok(()); + }; + + debug!("Triggered member: {:#?}", member); + + if system.trigger_changes_active_member { + system + .change_active_member(Some(member.id), &user_state.db) + .await?; + } + + rewrite_message( + &client, + channel_id, + message_event.origin.ts, + content, + member, + &system, + // &user_state.db, + ) + .await?; + + return Ok(()); + } + + // No triggers ran, so check if there's any actively fronting member + if let Some(member_id) = system.active_member_id { + let Some(member) = Member::fetch_by_id(member_id, &user_state.db).await? else { + error!("Active member not found. This should not happen."); + return Ok(()); + }; + + rewrite_message( + &client, + channel_id, + message_event.origin.ts, + content, + member.into(), + &system, + // &user_state.db, + ) + .await?; + } + + Ok(()) + } + _ => Ok(()), + } +} + +async fn rewrite_message( + client: &SlackHyperClient, + channel_id: &SlackChannelId, + message_id: SlackTs, + mut content: SlackMessageContent, + member: TriggeredMember, + system: &System, + // TODO: log this message in the db for future reference + // db: &SqlitePool, +) -> Result<(), Box> { + let token = SlackApiToken::new(system.slack_oauth_token.expose().into()) + .with_token_type(SlackApiTokenType::User); + let user_session = client.open_session(&token); + let bot_session = client.open_session(&BOT_TOKEN); + + rewrite_content(&mut content, &member); + + let mut custom_image_blocks = Vec::new(); + + if let Some(files) = content.files.take() { + #[derive(serde::Serialize)] + struct CustomSlackFile { + id: String, + } + + #[derive(serde::Serialize)] + struct CustomSlackImageBlock { + #[serde(rename = "type")] + typ: String, + slack_file: CustomSlackFile, + alt_text: String, + } + + // update files to blocks + let blocks = files + .into_iter() + .filter_map(|file| match file.filetype.map(|f| f.0).as_deref() { + Some("png" | "jpg" | "jpeg" | "gif" | "webp") => { + // https://github.com/abdolence/slack-morphism-rust/issues/320 + // Some(SlackImageBlock::new(file.permalink?, String::new()).into()) + + custom_image_blocks.push(CustomSlackImageBlock { + typ: "image".to_string(), + slack_file: CustomSlackFile { + id: file.id.0, + }, + alt_text: String::new(), + }); + None + } + Some("mp4" | "mpg" | "mpeg" | "mkv" | "avi" | "mov" | "ogv" | "wmv") => { + debug!("user uploaded a video. Can't really embed this.... Attaching to message as a rich content and calling it a day"); + Some(SlackMarkdownBlock::new(format!("Video: [{}]({})", file.name?, file.permalink?)).into()) + } + Some(typ) => { + debug!("unknown filetype {}. Don't know how to embed. Attaching to message as a rich content", typ); + Some(SlackMarkdownBlock::new(format!("File attachment: [{}]({})", file.name?, file.permalink?)).into()) + } + None => None, + }); + + if let Some(slack_blocks) = content.blocks.as_mut() { + slack_blocks.extend(blocks); + } else { + content.blocks = Some(blocks.collect()); + } + } + + let message_request = SlackApiChatPostMessageRequest::new(channel_id.clone(), content) + .with_username(member.display_name.clone()) + .opt_icon_url(member.profile_picture_url.clone()); + + let mut request = serde_json::to_value(message_request).unwrap(); + + let blocks = request.get_mut("blocks").unwrap().as_array_mut().unwrap(); + let custom_image_blocks = custom_image_blocks + .into_iter() + .map(serde_json::to_value) + .collect::, serde_json::Error>>()?; + + blocks.extend(custom_image_blocks); + + let _res: SlackApiChatPostMessageResponse = bot_session + .http_session_api + .http_post( + "chat.postMessage", + &request, + Some(&CHAT_POST_MESSAGE_SPECIAL_LIMIT_RATE_CTL), + ) + .await + .attach_printable("Error rewriting message")?; + + user_session + .chat_delete( + &SlackApiChatDeleteRequest::new(channel_id.clone(), message_id).with_as_user(true), + ) + .await + .attach_printable("Error deleting message")?; + + Ok(()) +} + +fn rewrite_content(content: &mut SlackMessageContent, member: &TriggeredMember) { + debug!("Rewriting message content"); + + if let Some(text) = &mut content.text { + if member.is_prefix { + if let Some(new_text) = text.strip_prefix(&member.trigger_text) { + *text = new_text.to_string(); + } + } else if let Some(new_text) = text.strip_suffix(&member.trigger_text) { + *text = new_text.to_string(); + } + } + + if let Some(blocks) = &mut content.blocks { + for block in blocks { + if let SlackBlock::RichText(richtext) = block { + let elements = richtext["elements"].as_array_mut().unwrap(); + let len = elements.len(); + // the first and last elements would have the prefix and suffix respectively, so we can filter them + let first = elements.get_mut(0).unwrap(); + + if let Some(first_text) = first.pointer_mut("/elements/0/text") { + if member.is_prefix { + if let Some(new_text) = first_text + .as_str() + .and_then(|text| text.strip_prefix(&member.trigger_text)) + .map(ToString::to_string) + { + *first_text = serde_json::Value::String(new_text); + } + } + } + + let last = elements.get_mut(len - 1).unwrap(); + + if let Some(last_text) = last.pointer_mut("/elements/0/text") { + if !member.is_prefix { + if let Some(new_text) = last_text + .as_str() + .and_then(|text| text.strip_suffix(&member.trigger_text)) + .map(ToString::to_string) + { + *last_text = serde_json::Value::String(new_text); + } + } + } + } + } + } +} diff --git a/src/interactions/member.rs b/src/interactions/member.rs new file mode 100755 index 0000000..9e4cae3 --- /dev/null +++ b/src/interactions/member.rs @@ -0,0 +1,107 @@ +use error_stack::{bail, Result, ResultExt}; +use slack_morphism::prelude::*; + +use crate::{ + models::{ + member, + system::System, + user::{self, State}, + Trusted, + }, + BOT_TOKEN, +}; + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum Error { + /// Error while calling the database + Sqlx, + /// Error while calling the Slack API + Slack, + /// Unable to parse view + ParsingView, + /// No system found for the user + NoSystem, +} + +pub async fn create_member( + view_state: SlackViewState, + client: &SlackHyperClient, + user_state: &State, + user_id: user::Id, +) -> Result<(), Error> { + let data = member::View::try_from(view_state).change_context(Error::ParsingView)?; + + let Some(system_id) = System::fetch_by_user_id(&user_state.db, &user_id) + .await + .attach_printable("Error checking if system exists") + .change_context(Error::Sqlx)? + .map(|system| system.id) + else { + bail!(Error::NoSystem); + }; + + let id = data + .add(system_id, &user_state.db) + .await + .change_context(Error::Sqlx)?; + + let session = client.open_session(&BOT_TOKEN); + let user: SlackUserId = user_id.into(); + + let conversation = session + .conversations_open(&SlackApiConversationsOpenRequest::new().with_users(vec![user.clone()])) + .await + .change_context(Error::Slack)? + .channel; + + session + .chat_post_ephemeral(&SlackApiChatPostEphemeralRequest::new( + conversation.id, + user, + SlackMessageContent::new().with_text(format!( + "Successfully added {}! Their ID is {}", + data.display_name, id + )), + )) + .await + .change_context(Error::Slack)?; + + Ok(()) +} + +pub async fn edit_member( + view_state: SlackViewState, + client: &SlackHyperClient, + user_state: &State, + user_id: user::Id, + member_id: member::Id, +) -> Result<(), Error> { + let data = member::View::try_from(view_state).change_context(Error::ParsingView)?; + + data.update(member_id, &user_state.db) + .await + .change_context(Error::Sqlx)?; + + let session = client.open_session(&BOT_TOKEN); + let user: SlackUserId = user_id.into(); + + let conversation = session + .conversations_open(&SlackApiConversationsOpenRequest::new().with_users(vec![user.clone()])) + .await + .change_context(Error::Slack)? + .channel; + + session + .chat_post_ephemeral(&SlackApiChatPostEphemeralRequest::new( + conversation.id, + user, + SlackMessageContent::new().with_text(format!( + "Successfully edited {} (ID {})", + data.display_name, member_id + )), + )) + .await + .change_context(Error::Slack)?; + + Ok(()) +} diff --git a/src/interactions/mod.rs b/src/interactions/mod.rs new file mode 100755 index 0000000..703f5e5 --- /dev/null +++ b/src/interactions/mod.rs @@ -0,0 +1,189 @@ +mod member; +mod trigger; +use std::error::Error; +use std::sync::Arc; + +use axum::Extension; +use member::{create_member, edit_member}; +use slack_morphism::prelude::*; +use tracing::{debug, error}; +use trigger::{create_trigger, edit_trigger}; + +use crate::models::system::System; +use crate::models::{self, Trusted, user}; + +#[tracing::instrument(skip(event, environment))] +pub async fn process_interaction_event( + Extension(environment): Extension>, + Extension(event): Extension, +) { + let client = environment.client.clone(); + let states = environment.user_state.clone(); + + if let Err(err) = interaction_event(client, event, states).await { + error!("Error processing interaction event: {:#?}", err); + } +} + +async fn interaction_event( + client: Arc, + event: SlackInteractionEvent, + states: SlackClientEventsUserState, +) -> Result<(), Box> { + match event { + SlackInteractionEvent::ViewSubmission(slack_interaction_view_submission_event) => { + match slack_interaction_view_submission_event.view.view { + SlackView::Home(view) => { + debug!("Received home view: {:#?}", view); + Ok(()) + } + SlackView::Modal(ref view) => { + debug!("Received modal view: {:#?}", view); + + let user_id: user::Id = + slack_interaction_view_submission_event.user.id.into(); + let states = states.read().await; + let user_state = states.get_user_state::().unwrap(); + + let Some(view_state) = slack_interaction_view_submission_event + .view + .state_params + .state + else { + error!("No state found in view submission"); + return Ok(()); + }; + + handle_modal_view( + client, + view_state, + user_state, + user_id, + view.external_id.as_deref(), + ) + .await + } + } + } + event => { + debug!("Received interaction event: {:#?}", event); + Ok(()) + } + } +} + +#[tracing::instrument(skip(client, view_state, user_state))] +async fn handle_modal_view( + client: Arc, + view_state: SlackViewState, + user_state: &user::State, + user_id: user::Id, + external_id: Option<&str>, +) -> Result<(), Box> { + match external_id { + None => { + error!( + "No external id found in modal view. To the person that created the modal: How do you expect the bot to figure out what to do?" + ); + Ok(()) + } + Some("create_member") => { + debug!("Received create member modal view"); + + create_member(view_state, &client, user_state, user_id).await?; + + Ok(()) + } + Some(id) if id.starts_with("edit_member_") => { + debug!("Received edit member modal view"); + + let Ok(member_id) = id + .strip_prefix("edit_member_") + .expect("id starts with edit_member_") + .parse::() + .map(models::member::Id::new) + else { + error!( + "Failed to parse member id from external id {}. Bailing in case this was a malicious call", + id + ); + return Ok(()); + }; + + let Ok(trusted_member_id) = member_id.validate_by_user(&user_id, &user_state.db).await + else { + error!( + "Failed to validate member id from external id {}. Bailing in case this was a malicious call", + id + ); + return Ok(()); + }; + + edit_member(view_state, &client, user_state, user_id, trusted_member_id).await?; + + Ok(()) + } + Some(id) if id.starts_with("create_trigger_") => { + debug!("Creating trigger"); + + let member_id = id + .strip_prefix("create_trigger_") + .expect("Failed to parse member id from external id") + .parse::() + .map(models::member::Id::new) + .expect("Failed to parse member id from external id"); + + let Ok(trusted_member_id) = member_id.validate_by_user(&user_id, &user_state.db).await + else { + error!( + "Failed to validate member id from external id {}. Bailing in case this was a malicious call", + id + ); + return Ok(()); + }; + + create_trigger(view_state, &client, user_state, user_id, trusted_member_id).await?; + Ok(()) + } + Some(id) if id.starts_with("edit_trigger_") => { + debug!("Editing trigger"); + + let trigger_id = id + .strip_prefix("edit_trigger_") + .expect("Failed to parse member id from external id") + .parse::() + .map(models::trigger::Id::new) + .expect("Failed to parse member id from external id"); + + let Some(system) = System::fetch_by_user_id(&user_state.db, &user_id) + .await + .ok() + .flatten() + else { + error!( + "Failed to fetch system id for user id {}. Bailing in case this was a malicious call", + user_id + ); + return Ok(()); + }; + + let Ok(trusted_trigger_id) = trigger_id + .validate_by_system(system.id, &user_state.db) + .await + else { + error!( + "Failed to validate member id from external id {}. Bailing in case this was a malicious call", + id + ); + return Ok(()); + }; + + edit_trigger(view_state, &client, user_state, user_id, trusted_trigger_id).await?; + Ok(()) + } + Some(id) => { + error!("receieved unknown external id: {id}"); + Ok(()) + } + } +} diff --git a/src/interactions/trigger.rs b/src/interactions/trigger.rs new file mode 100644 index 0000000..d65c3f0 --- /dev/null +++ b/src/interactions/trigger.rs @@ -0,0 +1,101 @@ +use error_stack::{Result, ResultExt, bail}; +use slack_morphism::prelude::*; + +use crate::{ + BOT_TOKEN, + models::{ + Trusted, member, + system::System, + trigger, + user::{self, State}, + }, +}; + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum Error { + /// Error while calling the database + Sqlx, + /// Error while calling the Slack API + Slack, + /// No system found for the user + NoSystem, +} + +pub async fn create_trigger( + view_state: SlackViewState, + client: &SlackHyperClient, + user_state: &State, + user_id: user::Id, + member_id: member::Id, +) -> Result<(), Error> { + let data = trigger::View::from(view_state); + + let Some(system_id) = System::fetch_by_user_id(&user_state.db, &user_id) + .await + .attach_printable("Error checking if system exists") + .change_context(Error::Sqlx)? + .map(|system| system.id) + else { + bail!(Error::NoSystem); + }; + + let _id = data + .add(system_id, member_id, &user_state.db) + .await + .change_context(Error::Sqlx)?; + + let session = client.open_session(&BOT_TOKEN); + let user: SlackUserId = user_id.into(); + + let conversation = session + .conversations_open(&SlackApiConversationsOpenRequest::new().with_users(vec![user.clone()])) + .await + .change_context(Error::Slack)? + .channel; + + session + .chat_post_ephemeral(&SlackApiChatPostEphemeralRequest::new( + conversation.id, + user, + SlackMessageContent::new().with_text("Successfully added trigger!".into()), + )) + .await + .change_context(Error::Slack)?; + + Ok(()) +} + +pub async fn edit_trigger( + view_state: SlackViewState, + client: &SlackHyperClient, + user_state: &State, + user_id: user::Id, + trigger_id: trigger::Id, +) -> Result<(), Error> { + let trigger_view = trigger::View::from(view_state); + + trigger_view + .update(trigger_id, &user_state.db) + .await + .change_context(Error::Sqlx)?; + + let session = client.open_session(&BOT_TOKEN); + let user: SlackUserId = user_id.into(); + + let conversation = session + .conversations_open(&SlackApiConversationsOpenRequest::new().with_users(vec![user.clone()])) + .await + .change_context(Error::Slack)? + .channel; + + session + .chat_post_ephemeral(&SlackApiChatPostEphemeralRequest::new( + conversation.id, + user, + SlackMessageContent::new().with_text("Successfully edited trigger!".into()), + )) + .await + .change_context(Error::Slack)?; + + Ok(()) +} diff --git a/src/main.rs b/src/main.rs new file mode 100755 index 0000000..e2c305c --- /dev/null +++ b/src/main.rs @@ -0,0 +1,168 @@ +#![doc = include_str!("../README.md")] +#![warn(clippy::pedantic, clippy::nursery, missing_docs)] + +mod commands; +mod env; +mod events; +mod interactions; +mod models; +mod oauth; + +use crate::models::Trusted; +use std::str::FromStr; +use std::sync::LazyLock; +use std::{process::ExitCode, sync::Arc}; + +use commands::process_command_event; +use error_stack::{report, ResultExt}; +use events::process_push_event; +use interactions::process_interaction_event; +use models::{system, user}; +use oauth::oauth_handler; +use slack_morphism::prelude::*; +use sqlx::sqlite::SqliteConnectOptions; +use sqlx::SqlitePool; +use tracing::debug; +use tracing::{info, level_filters::LevelFilter}; +use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt, EnvFilter}; + +/// The slack app token. Used for socket mode if we ever decide to use it. +pub static APP_TOKEN: LazyLock = + LazyLock::new(|| SlackApiToken::new(env::slack_app_token().into())); + +/// The slack bot token. Used for most interactions +pub static BOT_TOKEN: LazyLock = + LazyLock::new(|| SlackApiToken::new(env::slack_bot_token().into())); + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +enum Error { + /// Error initializing environment variables + Env, + /// Error during slack client initialization + Initialization, +} + +#[dotenvy::load] +#[tokio::main] +#[tracing::instrument] +async fn main() -> error_stack::Result { + let console_subscriber = tracing_subscriber::fmt::layer().pretty(); + let error_subscriber = tracing_error::ErrorLayer::default(); + let env_subscriber = EnvFilter::builder() + .with_default_directive(LevelFilter::INFO.into()) + .from_env_lossy(); + + tracing_subscriber::registry() + .with(console_subscriber) + .with(error_subscriber) + .with(env_subscriber) + .init(); + + if env::any_set() { + env::assert_env_vars(); + } else { + return Err(report!(Error::Env) + .attach_printable("No environment variables are set. See help message below:") + .attach_printable(env::gen_help())); + } + + rustls::crypto::ring::default_provider() + .install_default() + .map_err(|_| report!(Error::Initialization)) + .attach_printable("Error installing default ring crypto provider")?; + + let mut options = SqliteConnectOptions::from_str(&env::database_url()) + .unwrap() + .optimize_on_close(true, None) + .create_if_missing(true); + + if let Some(key) = env::encryption_key() { + options = options.pragma("key", key); + } + + let pool = SqlitePool::connect_with(options) + .await + .attach_printable("Error connecting to database") + .change_context(Error::Initialization)?; + + sqlx::migrate!() + .run(&pool) + .await + .attach_printable("Error running database migrations") + .change_context(Error::Initialization)?; + + // Test query to make sure stuff works before we start the bot + debug!("Testing database connection"); + sqlx::query!( + r#" + SELECT + id as "id: system::Id" + FROM + systems + "# + ) + .fetch_all(&pool) + .await + .attach_printable("Error fetching systems from database") + .change_context(Error::Initialization)?; + + let client = Arc::new(SlackClient::new( + SlackClientHyperConnector::new() + .attach_printable("Error creating Slack hyper connector") + .change_context(Error::Initialization)?, + )); + + let state = user::State { db: pool.clone() }; + + let listener_environment: Arc = Arc::new( + SlackClientEventsListenerEnvironment::new(client.clone()).with_user_state(state.clone()), + ); + + let signing_secret: SlackSigningSecret = env::slack_signing_secret().into(); + + let listener: SlackEventsAxumListener = + SlackEventsAxumListener::new(listener_environment.clone()); + + let app = axum::routing::Router::new() + // Note: I do not use the slack-morphism oauth thing because it's a bit too much for me + .route("/auth", axum::routing::get(oauth_handler)) + .with_state(state.clone()) + .route( + "/push", + axum::routing::post(process_push_event).layer( + listener + .events_layer(&signing_secret) + .with_event_extractor(SlackEventsExtractors::push_event()), + ), + ) + .route( + "/command", + axum::routing::post(process_command_event).layer( + listener + .events_layer(&signing_secret) + .with_event_extractor(SlackEventsExtractors::command_event()), + ), + ) + .route( + "/interaction", + axum::routing::post(process_interaction_event).layer( + listener + .events_layer(&signing_secret) + .with_event_extractor(SlackEventsExtractors::interaction_event()), + ), + ); + + info!("Slack bot is running"); + + let listener = tokio::net::TcpListener::bind("0.0.0.0:8080") + .await + .attach_printable("Failed to bind to address") + .change_context(Error::Initialization)?; + + axum::serve(listener, app) + .await + .attach_printable("Failed to start server") + .change_context(Error::Initialization)?; + + Ok(ExitCode::SUCCESS) +} diff --git a/src/models/member.rs b/src/models/member.rs new file mode 100755 index 0000000..a14fdbc --- /dev/null +++ b/src/models/member.rs @@ -0,0 +1,422 @@ +use error_stack::ResultExt; +use slack_morphism::prelude::*; +use sqlx::{SqlitePool, prelude::*, sqlite::SqliteQueryResult}; +use tracing::{debug, warn}; + +use crate::id; + +use super::{ + Trusted, Untrusted, system, + trigger::{self, Trigger}, + user, +}; + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum Error { + /// Error while calling the database + Sqlx, + /// A field was missing from the view + MissingField(String), +} + +id!( + /// For an ID to be trusted, it must + /// + /// - Be a valid ID in the database + /// - Be associated with a trusted system + => Member +); + +impl Id { + pub const fn new(id: i64) -> Self { + Self { + id, + trusted: std::marker::PhantomData, + } + } + + pub async fn validate_by_system( + self, + system_id: system::Id, + db: &SqlitePool, + ) -> Result, Self> { + let exists = sqlx::query!( + "SELECT EXISTS(SELECT 1 FROM members WHERE id = $1 AND system_id = $2) AS 'exists: bool'", + self.id, + system_id.id + ) + .fetch_one(db) + .await + .ok() + .is_some_and(|record| record.exists); + + if exists { + Ok(Id { + id: self.id, + trusted: std::marker::PhantomData, + }) + } else { + Err(self) + } + } + + pub async fn validate_by_user( + self, + user_id: &user::Id, + db: &SqlitePool, + ) -> Result, Self> { + let exists = sqlx::query!( + "SELECT EXISTS( + SELECT 1 + FROM members + JOIN systems ON members.system_id = systems.id + WHERE members.id = $1 AND systems.owner_id = $2 + ) AS 'exists: bool'", + self.id, + user_id + ) + .fetch_one(db) + .await + .ok() + .is_some_and(|record| record.exists); + + if exists { + Ok(Id { + id: self.id, + trusted: std::marker::PhantomData, + }) + } else { + Err(self) + } + } +} + +impl Id { + pub async fn fetch_triggers( + self, + db: &SqlitePool, + ) -> error_stack::Result, trigger::Error> { + Trigger::fetch_by_member_id(db, self).await + } +} + +// TODO: move sql to rust struct +#[derive(FromRow, Debug)] +pub struct Member { + /// The ID of the member + pub id: Id, + pub system_id: system::Id, + /// The display name of the member + pub display_name: String, + /// The full name of the member + pub full_name: String, + /// Profile picture to use on messages + pub profile_picture_url: Option, + pub title: Option, + pub pronouns: Option, + pub name_pronunciation: Option, + pub name_recording_url: Option, + pub created_at: time::PrimitiveDateTime, +} + +impl Member { + pub async fn fetch_by_and_trust_id( + system_id: system::Id, + member_id: Id, + db: &SqlitePool, + ) -> Result, sqlx::Error> { + sqlx::query_as!( + Member, + r#" + SELECT + id as "id: Id", + system_id as "system_id: system::Id", + full_name, + display_name, + profile_picture_url, + title, + pronouns, + name_pronunciation, + name_recording_url, + created_at as "created_at: time::PrimitiveDateTime" + FROM members + WHERE system_id = $1 AND id = $2 + "#, + system_id, + // safe because this query also checks if the ID is trusted + member_id.id + ) + .fetch_optional(db) + .await + } + + /// Fetch a member by their id + pub async fn fetch_by_id( + member_id: Id, + db: &SqlitePool, + ) -> Result, sqlx::Error> { + sqlx::query_as!( + Member, + r#" + SELECT + id as "id: Id", + system_id as "system_id: system::Id", + full_name, + display_name, + profile_picture_url, + title, + pronouns, + name_pronunciation, + name_recording_url, + created_at as "created_at: time::PrimitiveDateTime" + FROM members + WHERE id = $2 + "#, + member_id + ) + .fetch_optional(db) + .await + } +} + +/// all information required to display a member +#[derive(FromRow, Debug)] +pub struct TriggeredMember { + /// The ID of the member + pub id: Id, + /// The display name of the member + pub display_name: String, + /// Profile picture to use on messages + pub profile_picture_url: Option, + /// The trigger text that was matched + pub trigger_text: String, + /// Whether this was a prefix trigger (true) or suffix trigger (false) + pub is_prefix: bool, +} + +impl From for TriggeredMember { + fn from(value: Member) -> Self { + Self { + id: value.id, + display_name: value.display_name, + profile_picture_url: value.profile_picture_url, + trigger_text: String::new(), + is_prefix: true, + } + } +} + +#[derive(Default, Clone)] +pub struct View { + pub full_name: String, + pub display_name: String, + pub profile_picture_url: Option, + pub title: Option, + pub pronouns: Option, + pub name_pronunciation: Option, + pub name_recording_url: Option, +} + +impl View { + /// Due to the way the slack blocks are created, all fields are moved. + /// Clone the whole struct if you need to keep the original. + pub fn create_blocks(self) -> Vec { + slack_blocks![ + // display info + some_into( + SlackHeaderBlock::new("Display info".into()).with_block_id("display_info".into()) + ), + some_into(SlackInputBlock::new( + "Display name".into(), + SlackBlockPlainTextInputElement::new("display_name".into()) + .with_initial_value(self.display_name) + .into(), + )), + some_into( + SlackInputBlock::new( + "Profile picture URL".into(), + SlackBlockPlainTextInputElement::new("profile_picture_url".into()) + .with_initial_value(self.profile_picture_url.unwrap_or_default()) + .into(), + ) + .with_optional(true) + ), + // personal info + some_into(SlackDividerBlock::new()), + some_into( + SlackHeaderBlock::new("Personal info".into()).with_block_id("personal_info".into()) + ), + some_into(SlackInputBlock::new( + "Full name".into(), + SlackBlockPlainTextInputElement::new("full_name".into()) + .with_initial_value(self.full_name) + .into(), + )), + some_into( + SlackInputBlock::new( + "Pronouns".into(), + SlackBlockPlainTextInputElement::new("pronouns".into()) + .with_initial_value(self.pronouns.unwrap_or_default()) + .into(), + ) + .with_optional(true) + ), + some_into( + SlackInputBlock::new( + "Title".into(), + SlackBlockPlainTextInputElement::new("title".into()) + .with_initial_value(self.title.unwrap_or_default()) + .into(), + ) + .with_optional(true) + ), + some_into( + SlackInputBlock::new( + "Name pronunciation".into(), + SlackBlockPlainTextInputElement::new("name_pronunciation".into()) + .with_initial_value(self.name_pronunciation.unwrap_or_default()) + .into(), + ) + .with_optional(true) + ), + some_into( + SlackInputBlock::new( + "Name recording URL".into(), + SlackBlockPlainTextInputElement::new("name_recording_url".into()) + .with_initial_value(self.name_recording_url.unwrap_or_default()) + .into(), + ) + .with_optional(true) + ) + ] + } + + pub fn create_add_view() -> SlackView { + SlackView::Modal( + SlackModalView::new("Add a new member".into(), Self::default().create_blocks()) + .with_submit("Add".into()) + .with_external_id("create_member".into()), + ) + } + + pub fn create_edit_view(self, member_id: Id) -> SlackView { + SlackView::Modal( + SlackModalView::new("Edit member".into(), self.create_blocks()) + .with_submit("Edit".into()) + .with_external_id(format!("edit_member_{}", member_id.id)), + ) + } + + /// Add a member to the database + /// + /// Returns the id of the new member + pub async fn add( + &self, + system_id: system::Id, + db: &SqlitePool, + ) -> error_stack::Result { + debug!("Adding member {} to database", self.display_name); + sqlx::query!(" + INSERT INTO members (full_name, display_name, profile_picture_url, title, pronouns, name_pronunciation, name_recording_url, system_id) + VALUES ($1, $2, $3, $4, $5, $6, $7, $8) + RETURNING id + ", + self.full_name, + self.display_name, + self.profile_picture_url, + self.title, + self.pronouns, + self.name_pronunciation, + self.name_recording_url, + system_id.id, + ) + .fetch_one(db) + .await + .attach_printable("Error adding member to database") + .change_context(Error::Sqlx) + .map(|row| row.id) + } + + /// Update a member in the database to match this view + /// + /// Returns None if the member does not exist + pub async fn update( + &self, + member_id: Id, + db: &SqlitePool, + ) -> error_stack::Result, Error> { + sqlx::query!(" + UPDATE members + SET full_name = $1, display_name = $2, profile_picture_url = $3, title = $4, pronouns = $5, name_pronunciation = $6, name_recording_url = $7 + WHERE id = $8 + ", + self.full_name, + self.display_name, + self.profile_picture_url, + self.title, + self.pronouns, + self.name_pronunciation, + self.name_recording_url, + member_id, + ).execute(db).await + .attach_printable("Error editing member in database") + .change_context(Error::Sqlx) + .map(Some) + } +} + +impl TryFrom for View { + type Error = Error; + + fn try_from(value: SlackViewState) -> Result { + let mut view = Self::default(); + for (_id, values) in value.values { + for (id, content) in values { + match &*id.0 { + "full_name" => { + view.full_name = content + .value + .ok_or_else(|| Error::MissingField("display_name".to_string()))?; + } + "display_name" => { + view.display_name = content + .value + .ok_or_else(|| Error::MissingField("display_name".to_string()))?; + } + "profile_picture_url" => view.profile_picture_url = content.value, + "title" => view.title = content.value, + "pronouns" => view.pronouns = content.value, + "name_pronunciation" => view.name_pronunciation = content.value, + "name_recording_url" => view.name_recording_url = content.value, + other => { + warn!("Unknown field in view when parsing a member::View: {other}"); + } + } + } + } + + if view.full_name.is_empty() { + return Err(Error::MissingField("full_name".to_string())); + } + + if view.display_name.is_empty() { + return Err(Error::MissingField("display_name".to_string())); + } + + Ok(view) + } +} + +impl From for View { + fn from(value: Member) -> Self { + Self { + full_name: value.full_name, + display_name: value.display_name, + profile_picture_url: value.profile_picture_url, + title: value.title, + pronouns: value.pronouns, + name_pronunciation: value.name_pronunciation, + name_recording_url: value.name_recording_url, + } + } +} diff --git a/src/models/mod.rs b/src/models/mod.rs new file mode 100755 index 0000000..437ce2d --- /dev/null +++ b/src/models/mod.rs @@ -0,0 +1,87 @@ +pub mod member; +pub mod system; +pub mod trigger; +pub mod user; + +pub trait Trustability: Send + Sync {} + +/// A trusted/valid ID +#[derive(Debug, Clone, Copy)] +pub struct Trusted; + +impl Trustability for Trusted {} + +/// An untrusted ID +#[derive(Debug, Clone, Copy)] +pub struct Untrusted; + +impl Trustability for Untrusted {} + +#[macro_export] +/// Creates a new ID wrapper for a database ID that can be trusted or untrusted +macro_rules! id { + ($(#[$attr:meta])* => $name:ident) => { + #[derive(::sqlx::Type, Debug, PartialEq, Eq, Clone, Copy)] + $(#[$attr])* + pub struct Id { + pub id: i64, + trusted: ::std::marker::PhantomData, + } + + impl<'q, DB> Encode<'q, DB> for Id<$crate::models::Trusted> + where + DB: ::sqlx::Database, + i64: ::sqlx::Encode<'q, DB>, + { + fn encode_by_ref( + &self, + buf: &mut ::ArgumentBuffer<'q>, + ) -> Result<::sqlx::encode::IsNull, ::sqlx::error::BoxDynError> { + >::encode_by_ref(&self.id, buf) + } + + fn produces(&self) -> Option<::TypeInfo> { + >::produces(&self.id) + } + } + + impl<'q, DB> Decode<'q, DB> for Id<$crate::models::Trusted> + where + DB: ::sqlx::Database, + i64: ::sqlx::Decode<'q, DB>, + { + fn decode( + value: ::ValueRef<'q>, + ) -> Result { + let id = >::decode(value)?; + Ok(Id { + id, + trusted: std::marker::PhantomData, + }) + } + } + + + impl ::sqlx::Type for Id + where + DB: ::sqlx::Database, + i64: ::sqlx::Type, + { + fn type_info() -> ::TypeInfo { + >::type_info() + } + } + + impl ::std::fmt::Display for Id<$crate::models::Trusted> { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!(f, "{}", self.id) + } + } + + impl ::std::fmt::Display for Id<$crate::models::Untrusted> { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!(f, "{}", self.id) + } + } + }; +} diff --git a/src/models/system.rs b/src/models/system.rs new file mode 100755 index 0000000..452478d --- /dev/null +++ b/src/models/system.rs @@ -0,0 +1,192 @@ +use crate::{ + id, + models::member::{Member, TriggeredMember}, +}; + +use super::{ + Trustability, Trusted, + member::{self}, + trigger::Trigger, + user, +}; +use redact::Secret; +use sqlx::{SqlitePool, prelude::*}; +use tracing::debug; + +id!( + /// For an ID to be trusted, it must + /// + /// - Be a valid ID in the database + /// - Be associated with a valid user + => System +); + +impl Id { + pub async fn list_triggers(self, db: &SqlitePool) -> Result, sqlx::Error> { + Trigger::fetch_by_system_id(db, self).await + } +} + +#[derive(Debug, FromRow, PartialEq, Eq, Clone)] +#[sqlx(transparent)] +pub struct SlackOauthToken(Secret); + +impl SlackOauthToken { + pub fn expose(&self) -> &str { + self.0.expose_secret() + } +} + +impl From for SlackOauthToken { + fn from(value: String) -> Self { + Self(Secret::new(value)) + } +} + +#[derive(FromRow, Debug)] +pub struct System { + #[sqlx(flatten)] + pub id: Id, + pub owner_id: user::Id, + pub active_member_id: Option>, + pub trigger_changes_active_member: bool, + pub name: String, + pub slack_oauth_token: SlackOauthToken, + pub created_at: time::PrimitiveDateTime, +} + +#[derive(Debug, thiserror::Error, displaydoc::Display)] +/// Error while changing the active member +pub enum ChangeActiveMemberError { + /// Error while calling the database + Sqlx(#[from] sqlx::Error), + /// The member is not part of the system + MemberNotFound, +} + +impl System { + pub async fn fetch_by_user_id( + db: &SqlitePool, + user_id: &user::Id, + ) -> Result, sqlx::Error> + where + T: Trustability, + { + sqlx::query_as!( + System, + r#" + SELECT + id as "id: Id", + owner_id as "owner_id: user::Id", + active_member_id as "active_member_id: member::Id", + trigger_changes_active_member, + slack_oauth_token, + name, + created_at as "created_at: time::PrimitiveDateTime" + FROM + systems + WHERE owner_id = $1 + "#, + // This is safe, as this function effectively checks if the user is trusted before fetching the system + user_id.id + ) + .fetch_optional(db) + .await + } + + pub async fn active_member(&self, db: &SqlitePool) -> Result, sqlx::Error> { + match self.active_member_id { + Some(id) => Member::fetch_by_id(id, db).await, + None => Ok(None), + } + } + + #[tracing::instrument(skip(db))] + pub async fn change_active_member( + &mut self, + new_active_member_id: Option>, + db: &SqlitePool, + ) -> Result, ChangeActiveMemberError> { + debug!( + "Changing active member for {} to {:?}", + self.id, new_active_member_id + ); + let mut new_active_member = None; + + if let Some(new_active_member_id) = new_active_member_id { + let Some(member) = Member::fetch_by_id(new_active_member_id, db).await? else { + return Err(ChangeActiveMemberError::MemberNotFound); + }; + + new_active_member = Some(member); + } + + sqlx::query!( + r#" + UPDATE systems + SET active_member_id = $1 + WHERE id = $2 + "#, + new_active_member_id, + self.id + ) + .execute(db) + .await?; + + self.active_member_id = new_active_member_id; + Ok(new_active_member) + } + + pub async fn get_members(&self, db: &SqlitePool) -> Result, sqlx::Error> { + sqlx::query_as!( + Member, + r#" + SELECT + id as "id: member::Id", + system_id as "system_id: Id", + full_name, + display_name, + profile_picture_url, + title, + pronouns, + name_pronunciation, + name_recording_url, + created_at as "created_at: time::PrimitiveDateTime" + FROM + members + WHERE system_id = $1 + "#, + self.id + ) + .fetch_all(db) + .await + } + + pub async fn fetch_triggered_member( + &self, + db: &SqlitePool, + message: &str, + ) -> Result, sqlx::Error> { + sqlx::query_as!( + TriggeredMember, + r#" + SELECT + members.id as "id: member::Id", + display_name, + profile_picture_url, + triggers.text as trigger_text, + triggers.is_prefix + FROM + members + JOIN + triggers ON members.id = triggers.member_id + WHERE + (triggers.is_prefix = TRUE AND ?1 LIKE triggers.text || '%') OR + (triggers.is_prefix = FALSE AND ?1 LIKE '%' || triggers.text) + "#, + message + ) + .fetch_optional(db) + .await + } +} diff --git a/src/models/trigger.rs b/src/models/trigger.rs new file mode 100755 index 0000000..0a30844 --- /dev/null +++ b/src/models/trigger.rs @@ -0,0 +1,325 @@ +use crate::id; + +use super::{Trustability, Trusted, Untrusted, member, system}; +use error_stack::ResultExt; +use slack_morphism::prelude::*; +use sqlx::{SqlitePool, prelude::*}; +use tracing::{debug, warn}; + +id!( + /// For an ID to be trusted, it must + /// + /// - Be a valid ID in the database + /// - Be associated with a valid member or system + => Trigger +); + +impl Id { + pub const fn new(id: i64) -> Self { + Self { + id, + trusted: std::marker::PhantomData, + } + } + + pub async fn validate_by_system( + self, + system_id: system::Id, + db: &SqlitePool, + ) -> Result, Self> { + let exists = sqlx::query!( + "SELECT EXISTS(SELECT 1 FROM triggers WHERE id = $1 AND system_id = $2) AS 'exists: bool'", + self.id, + system_id.id + ) + .fetch_one(db) + .await + .ok() + .is_some_and(|record| record.exists); + + if exists { + Ok(Id { + id: self.id, + trusted: std::marker::PhantomData, + }) + } else { + Err(self) + } + } +} + +impl Id { + pub async fn delete(self, db_pool: &SqlitePool) -> Result<(), sqlx::Error> { + sqlx::query!( + r#" + DELETE FROM triggers + WHERE id = $1 + "#, + self.id + ) + .execute(db_pool) + .await + .map(|_| ()) + } +} + +#[derive(thiserror::Error, displaydoc::Display, Debug)] +pub enum Error { + /// Error while calling the database + Sqlx, +} + +#[derive(FromRow, Debug)] +pub struct Trigger { + pub id: Id, + pub member_id: member::Id, + pub system_id: system::Id, + pub text: String, + pub is_prefix: bool, +} + +impl Trigger { + pub async fn fetch_by_id(id: Id, db: &SqlitePool) -> Result, sqlx::Error> + where + T: Trustability, + { + sqlx::query_as!( + Trigger, + r#" + SELECT + id as "id: Id", + member_id as "member_id: member::Id", + system_id as "system_id: system::Id", + text, + is_prefix + FROM + triggers + WHERE id = $1 + "#, + id.id, + ) + .fetch_optional(db) + .await + } + + pub async fn fetch_by_system_id( + db: &SqlitePool, + system_id: system::Id, + ) -> Result, sqlx::Error> { + sqlx::query_as!( + Trigger, + r#" + SELECT + triggers.id as "id: Id", + triggers.member_id as "member_id: member::Id", + triggers.system_id as "system_id: system::Id", + triggers.text, + triggers.is_prefix + FROM + triggers + WHERE + system_id = $1 + "#, + system_id + ) + .fetch_all(db) + .await + } + + pub async fn fetch_by_member_id( + db: &SqlitePool, + member_id: member::Id, + ) -> error_stack::Result, Error> { + sqlx::query_as!( + Trigger, + r#" + SELECT + id as "id: Id", + member_id as "member_id: member::Id", + system_id as "system_id: system::Id", + text, + is_prefix + FROM + triggers + WHERE member_id = $1 + "#, + member_id, + ) + .fetch_all(db) + .await + .change_context(Error::Sqlx) + } +} + +#[derive(Debug)] +pub struct View { + pub text: String, + pub is_prefix: bool, +} + +impl Default for View { + fn default() -> Self { + Self { + text: String::new(), + is_prefix: true, + } + } +} + +impl View { + pub fn create_blocks(self) -> Vec { + let prefix_choice = + SlackBlockChoiceItem::new(SlackBlockText::Plain("prefix".into()), "prefix".into()); + let suffix_choice = + SlackBlockChoiceItem::new(SlackBlockText::Plain("suffix".into()), "suffix".into()); + + slack_blocks!( + some_into( + SlackHeaderBlock::new("Trigger settings".into()) + .with_block_id("trigger_settings".into()) + ), + some_into( + SlackInputBlock::new( + "Trigger Text".into(), + SlackBlockPlainTextInputElement::new("trigger_text".into()) + .with_initial_value(self.text) + .into(), + ) + .with_optional(false) + ), + some_into( + SlackInputBlock::new( + "Trigger Type".into(), + SlackBlockRadioButtonsElement::new( + "is_prefix".into(), + vec![prefix_choice.clone(), suffix_choice.clone()] + ) + .with_initial_option(if self.is_prefix { + prefix_choice + } else { + suffix_choice + }) + .into(), + ) + .with_optional(false) + ) + ) + } + + /// Add a trigger to the database + /// + /// Returns the id of the new trigger + pub async fn add( + &self, + system_id: system::Id, + member_id: member::Id, + db_pool: &SqlitePool, + ) -> error_stack::Result, Error> { + debug!( + "Adding trigger for {} (Member ID {}) to database", + system_id, member_id + ); + + sqlx::query!( + r#" + INSERT INTO triggers (system_id, member_id, text, is_prefix) + VALUES ($1, $2, $3, $4) + RETURNING id + "#, + system_id.id, + member_id.id, + self.text, + self.is_prefix + ) + .fetch_one(db_pool) + .await + .attach_printable("Error adding trigger to database") + .change_context(Error::Sqlx) + .map(|row| Id { + id: row.id, + trusted: std::marker::PhantomData, + }) + } + + /// Update a trigger in the database to match this view + pub async fn update( + &self, + trigger_id: Id, + db: &SqlitePool, + ) -> error_stack::Result<(), Error> { + sqlx::query!( + r#" + UPDATE triggers + SET text = $1, is_prefix = $2 + WHERE id = $3 + "#, + self.text, + self.is_prefix, + trigger_id.id, + ) + .execute(db) + .await + .attach_printable("Error updating trigger in database") + .change_context(Error::Sqlx) + .map(|_| ()) + } + + pub const fn new(trigger_text: String, is_prefix: bool) -> Self { + Self { + text: trigger_text, + is_prefix, + } + } + + pub fn create_add_view(self, member_id: member::Id) -> SlackView { + SlackView::Modal( + SlackModalView::new("Add a new trigger".into(), self.create_blocks()) + .with_submit("Add".into()) + .with_external_id(format!("create_trigger_{}", member_id.id)), + ) + } + + pub fn create_edit_view(self, trigger_id: Id) -> SlackView { + SlackView::Modal( + SlackModalView::new("Edit trigger".into(), self.create_blocks()) + .with_submit("Save".into()) + .with_external_id(format!("edit_trigger_{}", trigger_id.id)), + ) + } +} + +impl From for View { + fn from(value: SlackViewState) -> Self { + let mut view = Self::default(); + for (_id, values) in value.values { + for (id, content) in values { + match &*id.0 { + "trigger_text" => { + if let Some(text) = content.value { + view.text = text; + } + } + "is_prefix" => { + if let Some(option) = content.selected_option { + view.is_prefix = option.value == "prefix"; + } + } + other => { + warn!("Unknown field in view when parsing a trigger::View: {other}"); + } + } + } + } + + view + } +} + +impl From for View { + fn from(trigger: Trigger) -> Self { + Self { + text: trigger.text, + is_prefix: trigger.is_prefix, + } + } +} diff --git a/src/models/user.rs b/src/models/user.rs new file mode 100755 index 0000000..2bc0ead --- /dev/null +++ b/src/models/user.rs @@ -0,0 +1,151 @@ +use std::{fmt::Display, marker::PhantomData}; + +use slack_morphism::{errors::SlackClientError, prelude::*}; +use sqlx::{prelude::*, types::Text, Database, SqlitePool}; + +use crate::BOT_TOKEN; + +use super::{Trusted, Untrusted}; + +#[derive(Type, Debug, PartialEq, Eq, Clone)] +pub struct Id { + pub id: Text, + trusted: PhantomData, +} + +impl<'q, DB> Encode<'q, DB> for Id +where + DB: Database, + Text: Encode<'q, DB>, +{ + fn encode_by_ref( + &self, + buf: &mut ::ArgumentBuffer<'q>, + ) -> Result { + as Encode<'_, DB>>::encode_by_ref(&self.id, buf) + } + + fn produces(&self) -> Option<::TypeInfo> { + as sqlx::Encode<'_, DB>>::produces(&self.id) + } +} + +impl<'q, DB> Decode<'q, DB> for Id +where + DB: sqlx::Database, + Text: sqlx::Decode<'q, DB>, +{ + fn decode( + value: ::ValueRef<'q>, + ) -> Result { + let id = as sqlx::Decode<'_, DB>>::decode(value)?; + Ok(Self { + id, + trusted: PhantomData, + }) + } +} + +impl ::sqlx::Type for Id +where + DB: Database, + Text: sqlx::Type, +{ + fn type_info() -> ::TypeInfo { + as sqlx::Type>::type_info() + } +} + +impl Display for Id { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!(f, "User(ID: {}. Trusted)", self.id.0) + } +} + +impl Display for Id { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!(f, "User(ID: {}. Untrusted)", self.id.0) + } +} + +impl Id { + /// Transforms <@U1234|user> into an Id with the value U1234 + pub fn from_slack_escaped(escaped: &str) -> Option { + parse_slack_user_id(escaped) + } + + pub const fn new(id: SlackUserId) -> Self { + Self { + id: Text(id), + trusted: PhantomData, + } + } +} + +impl Id { + /// Trusts a user ID by verifying it exists + pub async fn trust( + self, + client: &SlackClient, + ) -> Result, SlackClientError> + where + SCHC: SlackClientHttpConnector + Send + Sync, + { + let session = client.open_session(&BOT_TOKEN); + + let response = session + .users_profile_get(&SlackApiUsersProfileGetRequest::new().with_user(self.id.0)) + .await?; + + Ok(Id { + id: Text(response.profile.id.expect("Profile ID to exist")), + trusted: PhantomData, + }) + } +} + +pub fn parse_slack_user_id(escaped: &str) -> Option> { + escaped + .strip_prefix("<@") + .and_then(|s| s.strip_suffix('>')) + .and_then(|s| s.split('|').next()) + .filter(|s| !s.is_empty()) + .filter(|s| s.starts_with('U')) + .map(|s| SlackUserId::new(s.to_string())) + .map(|s| Id { + id: Text(s), + trusted: PhantomData, + }) +} + +impl From> for SlackUserId { + fn from(value: Id) -> Self { + value.id.0 + } +} + +impl From for Id { + fn from(value: SlackUserId) -> Self { + Self { + id: Text(value), + trusted: PhantomData, + } + } +} + +impl PartialEq for Id { + fn eq(&self, other: &SlackUserId) -> bool { + self.id.0 == *other + } +} + +impl PartialEq> for SlackUserId { + fn eq(&self, other: &Id) -> bool { + *self == *other.id + } +} + +#[derive(Debug, Clone)] +pub struct State { + pub db: SqlitePool, +} diff --git a/src/oauth.rs b/src/oauth.rs new file mode 100755 index 0000000..315c0d2 --- /dev/null +++ b/src/oauth.rs @@ -0,0 +1,193 @@ +use axum::{ + extract::{FromRequestParts, Query, State}, + http::{StatusCode, request::Parts}, +}; +use oauth2::{ + AuthUrl, AuthorizationCode, ClientId, ClientSecret, EndpointNotSet, EndpointSet, RedirectUrl, + TokenUrl, reqwest, +}; +use serde::{Deserialize, Serialize}; +use slack_morphism::{SlackClient, SlackUserId, prelude::*}; +use tracing::error; + +use crate::{ + env, + models::{Trusted, user}, +}; + +#[derive(Serialize, Deserialize, Debug)] +pub struct SlackAuthedUser { + pub id: String, + pub scope: String, + pub access_token: String, + pub token_type: String, +} + +#[derive(Serialize, Deserialize, Debug)] +pub struct SlackTokenFields { + pub authed_user: SlackAuthedUser, +} +impl oauth2::ExtraTokenFields for SlackTokenFields {} + +pub type SlackOauthClient< + HasAuthUrl = EndpointSet, + HasDeviceAuthUrl = EndpointNotSet, + HasIntrospectionUrl = EndpointNotSet, + HasRevocationUrl = EndpointNotSet, + HasTokenUrl = EndpointSet, +> = oauth2::Client< + oauth2::StandardErrorResponse, + oauth2::StandardTokenResponse, + oauth2::basic::BasicTokenIntrospectionResponse, + oauth2::StandardRevocableToken, + oauth2::basic::BasicRevocationErrorResponse, + HasAuthUrl, + HasDeviceAuthUrl, + HasIntrospectionUrl, + HasRevocationUrl, + HasTokenUrl, +>; + +pub fn create_oauth_client() -> SlackOauthClient { + SlackOauthClient::new(ClientId::new(env::slack_client_id())) + .set_client_secret(ClientSecret::new(env::slack_client_secret())) + .set_auth_uri(AuthUrl::new("https://slack.com/oauth/v2/authorize".to_owned()).unwrap()) + .set_token_uri(TokenUrl::new("https://slack.com/api/oauth.v2.access".to_owned()).unwrap()) + .set_redirect_uri( + RedirectUrl::new("https://slack-system-bot.wobbl.in/auth".to_owned()).unwrap(), + ) +} + +#[derive(Deserialize)] +pub struct OauthCode { + pub code: String, + pub state: String, +} + +pub struct Url(url::Url); + +impl FromRequestParts for Url +where + S: Send + Sync, +{ + type Rejection = (StatusCode, &'static str); + + async fn from_request_parts(parts: &mut Parts, _state: &S) -> Result { + let url = url::Url::parse(&parts.uri.to_string()) + .map_err(|_| (StatusCode::BAD_REQUEST, "Invalid URL"))?; + Ok(Self(url)) + } +} + +pub async fn oauth_handler( + Query(code): Query, + State(state): State, + Url(url): Url, +) -> String { + let db = &state.db; + + // Retrieve the csrf token and pkce verifier + let csrf = sqlx::query!( + r#" + SELECT + owner_id as "owner_id: user::Id", + name + FROM + system_oauth_process + WHERE csrf = $1 + "#, + code.state + ) + .fetch_optional(db) + .await; + + match csrf { + Ok(Some(record)) => { + let client = create_oauth_client(); + let slack_client = SlackClient::new(SlackClientHyperConnector::new().unwrap()); + + let response = client + .exchange_code(AuthorizationCode::new(code.code)) + .request_async(&reqwest::Client::new()) + .await + .unwrap(); + + let user_token = response.extra_fields().authed_user.access_token.clone(); + let user_id = response.extra_fields().authed_user.id.clone(); + let user_id: SlackUserId = user_id.into(); + + if user_id != record.owner_id { + return "CSRF token doesn't match the user".to_owned(); + } + + let user = sqlx::query!( + r#" + INSERT INTO systems (name, owner_id, slack_oauth_token) + VALUES ($1, $2, $3) + RETURNING name + "#, + record.name, + record.owner_id.id, + user_token, + ) + .fetch_one(db) + .await; + + match user { + Ok(user) => { + sqlx::query!( + r#" + DELETE FROM system_oauth_process + WHERE csrf = $1 + "#, + code.state + ) + .execute(db) + .await + .unwrap(); + + let response = format!("System {} created!", user.name); + + if let Err(e) = slack_client + .post_webhook_message( + &url, + &SlackApiPostWebhookMessageRequest::new( + SlackMessageContent::new() + .with_text(response.clone()), + ), + ) + .await { + error!("Error sending Slack message: {:#?}", e); + } + + response + } + Err(e) => { + let response = format!("Error creating system: {e:#?}"); + + if let Err(e) = slack_client + .post_webhook_message( + &url, + &SlackApiPostWebhookMessageRequest::new( + SlackMessageContent::new() + .with_text(response.clone()), + ), + ) + .await { + error!("Error sending Slack message: {:#?}", e); + } + + error!("{response}"); + response + } + } + } + Ok(None) => { + "CSRF couldn't be linked to a user. Theres a middleman attack at play or I didn't save the token properly".to_owned() + } + Err(e) => { + error!("Error fetching CSRF token: {:#?}", e); + "Error fetching CSRF token".to_owned() + } + } +}