bitwarden_core/platform/
get_user_api_key.rsuse std::sync::Arc;
use bitwarden_api_api::{
apis::accounts_api::accounts_api_key_post,
models::{ApiKeyResponseModel, SecretVerificationRequestModel},
};
use bitwarden_crypto::{HashPurpose, MasterKey};
use log::{debug, info};
use schemars::JsonSchema;
use serde::{Deserialize, Serialize};
use thiserror::Error;
use super::SecretVerificationRequest;
use crate::{
client::{LoginMethod, UserLoginMethod},
require, ApiError, Client, MissingFieldError, NotAuthenticatedError,
};
#[derive(Debug, Error)]
pub enum UserApiKeyError {
#[error(transparent)]
Api(#[from] ApiError),
#[error(transparent)]
Crypto(#[from] bitwarden_crypto::CryptoError),
#[error(transparent)]
NotAuthenticated(#[from] NotAuthenticatedError),
#[error(transparent)]
MissingField(#[from] MissingFieldError),
#[error("Unsupported login method")]
UnsupportedLoginMethod,
}
pub(crate) async fn get_user_api_key(
client: &Client,
input: &SecretVerificationRequest,
) -> Result<UserApiKeyResponse, UserApiKeyError> {
info!("Getting Api Key");
debug!("{:?}", input);
let auth_settings = get_login_method(client)?;
let config = client.internal.get_api_configurations().await;
let request = build_secret_verification_request(&auth_settings, input)?;
let response = accounts_api_key_post(&config.api, Some(request))
.await
.map_err(ApiError::from)?;
UserApiKeyResponse::process_response(response)
}
fn get_login_method(client: &Client) -> Result<Arc<LoginMethod>, NotAuthenticatedError> {
if client.internal.is_authed() {
client
.internal
.get_login_method()
.ok_or(NotAuthenticatedError)
} else {
Err(NotAuthenticatedError)
}
}
fn build_secret_verification_request(
login_method: &LoginMethod,
input: &SecretVerificationRequest,
) -> Result<SecretVerificationRequestModel, UserApiKeyError> {
if let LoginMethod::User(UserLoginMethod::Username { email, kdf, .. }) = login_method {
let master_password_hash = input
.master_password
.as_ref()
.map(|p| {
let master_key = MasterKey::derive(p, email, kdf)?;
master_key.derive_master_key_hash(p.as_bytes(), HashPurpose::ServerAuthorization)
})
.transpose()?;
Ok(SecretVerificationRequestModel {
master_password_hash,
otp: input.otp.as_ref().cloned(),
secret: None,
auth_request_access_code: None,
})
} else {
Err(UserApiKeyError::UnsupportedLoginMethod)
}
}
#[derive(Serialize, Deserialize, Debug, JsonSchema)]
#[serde(rename_all = "camelCase", deny_unknown_fields)]
pub struct UserApiKeyResponse {
api_key: String,
}
impl UserApiKeyResponse {
pub(crate) fn process_response(
response: ApiKeyResponseModel,
) -> Result<UserApiKeyResponse, UserApiKeyError> {
let api_key = require!(response.api_key);
Ok(UserApiKeyResponse { api_key })
}
}