summaryrefslogtreecommitdiffstats
path: root/server/src/db/user.rs
diff options
context:
space:
mode:
authorDessalines <tyhou13@gmx.com>2019-05-02 18:34:21 -0700
committerDessalines <tyhou13@gmx.com>2019-05-02 18:34:21 -0700
commitcbec13eeccd7fe1b18ca6f1f2c6c77c54c96a55f (patch)
treef73a65b9212769e7b29ee84f97ffac91f17d809a /server/src/db/user.rs
parent9903e3d508537e6912e38f61739971af1949f25e (diff)
Reorganizing files before splitting out API
Diffstat (limited to 'server/src/db/user.rs')
-rw-r--r--server/src/db/user.rs167
1 files changed, 167 insertions, 0 deletions
diff --git a/server/src/db/user.rs b/server/src/db/user.rs
new file mode 100644
index 00000000..9c9e0a52
--- /dev/null
+++ b/server/src/db/user.rs
@@ -0,0 +1,167 @@
+use schema::user_;
+use diesel::*;
+use diesel::result::Error;
+use schema::user_::dsl::*;
+use serde::{Serialize, Deserialize};
+use {Crud,is_email_regex, Settings};
+use jsonwebtoken::{encode, decode, Header, Validation, TokenData};
+use bcrypt::{DEFAULT_COST, hash};
+
+#[derive(Queryable, Identifiable, PartialEq, Debug)]
+#[table_name="user_"]
+pub struct User_ {
+ pub id: i32,
+ pub name: String,
+ pub fedi_name: String,
+ pub preferred_username: Option<String>,
+ pub password_encrypted: String,
+ pub email: Option<String>,
+ pub icon: Option<Vec<u8>>,
+ pub admin: bool,
+ pub banned: bool,
+ pub published: chrono::NaiveDateTime,
+ pub updated: Option<chrono::NaiveDateTime>
+}
+
+#[derive(Insertable, AsChangeset, Clone)]
+#[table_name="user_"]
+pub struct UserForm {
+ pub name: String,
+ pub fedi_name: String,
+ pub preferred_username: Option<String>,
+ pub password_encrypted: String,
+ pub admin: bool,
+ pub banned: bool,
+ pub email: Option<String>,
+ pub updated: Option<chrono::NaiveDateTime>
+}
+
+impl Crud<UserForm> for User_ {
+ fn read(conn: &PgConnection, user_id: i32) -> Result<Self, Error> {
+ user_.find(user_id)
+ .first::<Self>(conn)
+ }
+ fn delete(conn: &PgConnection, user_id: i32) -> Result<usize, Error> {
+ diesel::delete(user_.find(user_id))
+ .execute(conn)
+ }
+ fn create(conn: &PgConnection, form: &UserForm) -> Result<Self, Error> {
+ insert_into(user_)
+ .values(form)
+ .get_result::<Self>(conn)
+ }
+ fn update(conn: &PgConnection, user_id: i32, form: &UserForm) -> Result<Self, Error> {
+ diesel::update(user_.find(user_id))
+ .set(form)
+ .get_result::<Self>(conn)
+ }
+}
+
+impl User_ {
+ pub fn register(conn: &PgConnection, form: &UserForm) -> Result<Self, Error> {
+ let mut edited_user = form.clone();
+ let password_hash = hash(&form.password_encrypted, DEFAULT_COST)
+ .expect("Couldn't hash password");
+ edited_user.password_encrypted = password_hash;
+
+ Self::create(&conn, &edited_user)
+
+ }
+ pub fn read_from_name(conn: &PgConnection, from_user_name: String) -> Result<Self, Error> {
+ user_.filter(name.eq(from_user_name))
+ .first::<Self>(conn)
+ }
+}
+
+#[derive(Debug, Serialize, Deserialize)]
+pub struct Claims {
+ pub id: i32,
+ pub username: String,
+ pub iss: String,
+}
+
+impl Claims {
+ pub fn decode(jwt: &str) -> Result<TokenData<Claims>, jsonwebtoken::errors::Error> {
+ let v = Validation {
+ validate_exp: false,
+ ..Validation::default()
+ };
+ decode::<Claims>(&jwt, Settings::get().jwt_secret.as_ref(), &v)
+ }
+}
+
+type Jwt = String;
+impl User_ {
+ pub fn jwt(&self) -> Jwt {
+ let my_claims = Claims {
+ id: self.id,
+ username: self.name.to_owned(),
+ iss: self.fedi_name.to_owned(),
+ };
+ encode(&Header::default(), &my_claims, Settings::get().jwt_secret.as_ref()).unwrap()
+ }
+
+ pub fn find_by_email_or_username(conn: &PgConnection, username_or_email: &str) -> Result<Self, Error> {
+ if is_email_regex(username_or_email) {
+ user_.filter(email.eq(username_or_email))
+ .first::<User_>(conn)
+ } else {
+ user_.filter(name.eq(username_or_email))
+ .first::<User_>(conn)
+ }
+ }
+
+ pub fn find_by_jwt(conn: &PgConnection, jwt: &str) -> Result<Self, Error> {
+ let claims: Claims = Claims::decode(&jwt).expect("Invalid token").claims;
+ Self::read(&conn, claims.id)
+ }
+
+}
+
+
+#[cfg(test)]
+mod tests {
+ use establish_connection;
+ use super::{User_, UserForm};
+ use Crud;
+ #[test]
+ fn test_crud() {
+ let conn = establish_connection();
+
+ let new_user = UserForm {
+ name: "thommy".into(),
+ fedi_name: "rrf".into(),
+ preferred_username: None,
+ password_encrypted: "nope".into(),
+ email: None,
+ admin: false,
+ banned: false,
+ updated: None
+ };
+
+ let inserted_user = User_::create(&conn, &new_user).unwrap();
+
+ let expected_user = User_ {
+ id: inserted_user.id,
+ name: "thommy".into(),
+ fedi_name: "rrf".into(),
+ preferred_username: None,
+ password_encrypted: "nope".into(),
+ email: None,
+ icon: None,
+ admin: false,
+ banned: false,
+ published: inserted_user.published,
+ updated: None
+ };
+
+ let read_user = User_::read(&conn, inserted_user.id).unwrap();
+ let updated_user = User_::update(&conn, inserted_user.id, &new_user).unwrap();
+ let num_deleted = User_::delete(&conn, inserted_user.id).unwrap();
+
+ assert_eq!(expected_user, read_user);
+ assert_eq!(expected_user, inserted_user);
+ assert_eq!(expected_user, updated_user);
+ assert_eq!(1, num_deleted);
+ }
+}