lemmy/crates/db_queries/src/source/password_reset_request.rs

133 lines
3.9 KiB
Rust
Raw Normal View History

use crate::Crud;
use diesel::{dsl::*, result::Error, PgConnection, *};
use lemmy_db_schema::{schema::password_reset_request::dsl::*, source::password_reset_request::*};
2019-12-26 19:48:13 +00:00
use sha2::{Digest, Sha256};
impl Crud<PasswordResetRequestForm> for PasswordResetRequest {
fn read(conn: &PgConnection, password_reset_request_id: i32) -> Result<Self, Error> {
2019-11-02 06:43:21 +00:00
password_reset_request
.find(password_reset_request_id)
.first::<Self>(conn)
}
fn create(conn: &PgConnection, form: &PasswordResetRequestForm) -> Result<Self, Error> {
2019-11-02 06:43:21 +00:00
insert_into(password_reset_request)
.values(form)
.get_result::<Self>(conn)
}
2019-11-02 06:43:21 +00:00
fn update(
conn: &PgConnection,
password_reset_request_id: i32,
form: &PasswordResetRequestForm,
) -> Result<Self, Error> {
diesel::update(password_reset_request.find(password_reset_request_id))
.set(form)
.get_result::<Self>(conn)
}
}
pub trait PasswordResetRequest_ {
fn create_token(
conn: &PgConnection,
2021-02-26 13:49:58 +00:00
from_local_user_id: i32,
token: &str,
) -> Result<PasswordResetRequest, Error>;
fn read_from_token(conn: &PgConnection, token: &str) -> Result<PasswordResetRequest, Error>;
}
impl PasswordResetRequest_ for PasswordResetRequest {
fn create_token(
conn: &PgConnection,
2021-02-26 13:49:58 +00:00
from_local_user_id: i32,
token: &str,
) -> Result<PasswordResetRequest, Error> {
2019-11-02 06:41:57 +00:00
let mut hasher = Sha256::new();
hasher.update(token);
let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
let form = PasswordResetRequestForm {
2021-02-26 13:49:58 +00:00
local_user_id: from_local_user_id,
token_encrypted: token_hash,
};
Self::create(&conn, &form)
}
fn read_from_token(conn: &PgConnection, token: &str) -> Result<PasswordResetRequest, Error> {
2019-11-02 06:41:57 +00:00
let mut hasher = Sha256::new();
hasher.update(token);
let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
2019-11-02 06:41:57 +00:00
password_reset_request
.filter(token_encrypted.eq(token_hash))
.filter(published.gt(now - 1.days()))
.first::<Self>(conn)
}
}
fn bytes_to_hex(bytes: Vec<u8>) -> String {
let mut str = String::new();
for byte in bytes {
str = format!("{}{:02x}", str, byte);
}
str
}
#[cfg(test)]
mod tests {
use crate::{
establish_unpooled_connection,
source::password_reset_request::PasswordResetRequest_,
Crud,
};
2021-02-26 13:49:58 +00:00
use lemmy_db_schema::source::{password_reset_request::PasswordResetRequest, person::*};
use serial_test::serial;
#[test]
#[serial]
fn test_crud() {
let conn = establish_unpooled_connection();
2021-02-26 13:49:58 +00:00
let new_person = PersonForm {
name: "thommy prw".into(),
preferred_username: None,
avatar: None,
banner: None,
2021-03-10 22:33:55 +00:00
banned: None,
deleted: None,
published: None,
updated: None,
actor_id: None,
bio: None,
2021-03-10 22:33:55 +00:00
local: None,
private_key: None,
public_key: None,
last_refreshed_at: None,
inbox_url: None,
shared_inbox_url: None,
};
2021-02-26 13:49:58 +00:00
let inserted_person = Person::create(&conn, &new_person).unwrap();
let token = "nope";
let token_encrypted_ = "ca3704aa0b06f5954c79ee837faa152d84d6b2d42838f0637a15eda8337dbdce";
2019-11-02 06:43:21 +00:00
let inserted_password_reset_request =
2021-02-26 13:49:58 +00:00
PasswordResetRequest::create_token(&conn, inserted_person.id, token).unwrap();
let expected_password_reset_request = PasswordResetRequest {
id: inserted_password_reset_request.id,
2021-02-26 13:49:58 +00:00
local_user_id: inserted_person.id,
token_encrypted: token_encrypted_.to_string(),
published: inserted_password_reset_request.published,
};
let read_password_reset_request = PasswordResetRequest::read_from_token(&conn, token).unwrap();
2021-02-26 13:49:58 +00:00
let num_deleted = Person::delete(&conn, inserted_person.id).unwrap();
assert_eq!(expected_password_reset_request, read_password_reset_request);
2019-11-02 06:43:21 +00:00
assert_eq!(
expected_password_reset_request,
inserted_password_reset_request
);
assert_eq!(1, num_deleted);
}
}