fedimovies/mitra-models/src/users/types.rs
2023-04-24 17:35:32 +02:00

203 lines
5.1 KiB
Rust

use std::collections::HashMap;
use chrono::{DateTime, Utc};
use postgres_types::FromSql;
use serde::Deserialize;
use serde_json::Value as JsonValue;
use uuid::Uuid;
use mitra_utils::{currencies::Currency, did::Did};
use crate::database::{
int_enum::{int_enum_from_sql, int_enum_to_sql},
json_macro::json_from_sql,
DatabaseTypeError,
};
use crate::profiles::types::DbActorProfile;
#[allow(dead_code)]
#[derive(FromSql)]
#[postgres(name = "user_invite_code")]
pub struct DbInviteCode {
pub code: String,
used: bool,
pub note: Option<String>,
created_at: DateTime<Utc>,
}
#[derive(PartialEq)]
pub enum Permission {
CreateFollowRequest,
CreatePost,
DeleteAnyPost,
DeleteAnyProfile,
ManageSubscriptionOptions,
}
#[derive(Clone, Debug, PartialEq)]
pub enum Role {
Guest,
NormalUser,
Admin,
ReadOnlyUser,
}
impl Default for Role {
fn default() -> Self {
Self::NormalUser
}
}
impl Role {
pub fn get_permissions(&self) -> Vec<Permission> {
match self {
Self::Guest => vec![],
Self::NormalUser => vec![
Permission::CreateFollowRequest,
Permission::CreatePost,
Permission::ManageSubscriptionOptions,
],
Self::Admin => vec![
Permission::CreateFollowRequest,
Permission::CreatePost,
Permission::DeleteAnyPost,
Permission::DeleteAnyProfile,
Permission::ManageSubscriptionOptions,
],
Self::ReadOnlyUser => vec![Permission::CreateFollowRequest],
}
}
pub fn has_permission(&self, permission: Permission) -> bool {
self.get_permissions().contains(&permission)
}
}
impl From<&Role> for i16 {
fn from(value: &Role) -> i16 {
match value {
Role::Guest => 0,
Role::NormalUser => 1,
Role::Admin => 2,
Role::ReadOnlyUser => 3,
}
}
}
impl TryFrom<i16> for Role {
type Error = DatabaseTypeError;
fn try_from(value: i16) -> Result<Self, Self::Error> {
let role = match value {
0 => Self::Guest,
1 => Self::NormalUser,
2 => Self::Admin,
3 => Self::ReadOnlyUser,
_ => return Err(DatabaseTypeError),
};
Ok(role)
}
}
int_enum_from_sql!(Role);
int_enum_to_sql!(Role);
pub type ClientConfig = HashMap<String, JsonValue>;
#[derive(Deserialize)]
pub struct DbClientConfig(ClientConfig);
impl DbClientConfig {
pub fn into_inner(self) -> ClientConfig {
let Self(client_config) = self;
client_config
}
}
json_from_sql!(DbClientConfig);
#[allow(dead_code)]
#[derive(FromSql)]
#[postgres(name = "user_account")]
pub struct DbUser {
id: Uuid,
wallet_address: Option<String>,
password_hash: Option<String>,
private_key: String,
invite_code: Option<String>,
user_role: Role,
client_config: DbClientConfig,
created_at: DateTime<Utc>,
}
// Represents local user
#[derive(Clone)]
#[cfg_attr(feature = "test-utils", derive(Default))]
pub struct User {
pub id: Uuid,
pub wallet_address: Option<String>, // login address
pub password_hash: Option<String>,
pub private_key: String,
pub role: Role,
pub client_config: ClientConfig,
pub profile: DbActorProfile,
}
impl User {
pub fn new(db_user: DbUser, db_profile: DbActorProfile) -> Self {
assert_eq!(db_user.id, db_profile.id);
Self {
id: db_user.id,
wallet_address: db_user.wallet_address,
password_hash: db_user.password_hash,
private_key: db_user.private_key,
role: db_user.user_role,
client_config: db_user.client_config.into_inner(),
profile: db_profile,
}
}
/// Returns wallet address if it is verified
pub fn public_wallet_address(&self, currency: &Currency) -> Option<String> {
for proof in self.profile.identity_proofs.clone().into_inner() {
let did_pkh = match proof.issuer {
Did::Pkh(did_pkh) => did_pkh,
_ => continue,
};
// Return the first matching address, because only
// one proof per currency is allowed.
if let Some(ref address_currency) = did_pkh.currency() {
if address_currency == currency {
return Some(did_pkh.address);
};
};
}
None
}
}
#[cfg_attr(feature = "test-utils", derive(Default))]
pub struct UserCreateData {
pub username: String,
pub password_hash: Option<String>,
pub private_key_pem: String,
pub wallet_address: Option<String>,
pub invite_code: Option<String>,
pub role: Role,
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_public_wallet_address_login_address_not_exposed() {
let user = User {
wallet_address: Some("0x1234".to_string()),
..Default::default()
};
let ethereum = Currency::Ethereum;
assert_eq!(user.public_wallet_address(&ethereum), None);
}
}