lemmy/crates/api/src/local_user/login.rs

75 lines
2.1 KiB
Rust
Raw Normal View History

use crate::check_totp_2fa_valid;
use actix_web::web::{Data, Json};
2022-04-13 18:12:25 +00:00
use bcrypt::verify;
use lemmy_api_common::{
context::LemmyContext,
2022-04-13 18:12:25 +00:00
person::{Login, LoginResponse},
2022-11-09 10:05:00 +00:00
utils::{check_registration_application, check_user_valid},
2022-04-13 18:12:25 +00:00
};
use lemmy_db_views::structs::{LocalUserView, SiteView};
use lemmy_utils::{
claims::Claims,
error::{LemmyError, LemmyErrorExt, LemmyErrorType},
};
2022-04-13 18:12:25 +00:00
#[tracing::instrument(skip(context))]
pub async fn login(
data: Json<Login>,
context: Data<LemmyContext>,
) -> Result<Json<LoginResponse>, LemmyError> {
let site_view = SiteView::read_local(&mut context.pool()).await?;
2022-04-13 18:12:25 +00:00
// Fetch that username / email
let username_or_email = data.username_or_email.clone();
let local_user_view =
LocalUserView::find_by_email_or_name(&mut context.pool(), &username_or_email)
.await
.with_lemmy_type(LemmyErrorType::IncorrectLogin)?;
2022-04-13 18:12:25 +00:00
// Verify the password
let valid: bool = verify(
&data.password,
&local_user_view.local_user.password_encrypted,
)
.unwrap_or(false);
if !valid {
Err(LemmyErrorType::IncorrectLogin)?
}
check_user_valid(
local_user_view.person.banned,
local_user_view.person.ban_expires,
local_user_view.person.deleted,
)?;
2022-04-13 18:12:25 +00:00
// Check if the user's email is verified if email verification is turned on
// However, skip checking verification if the user is an admin
if !local_user_view.local_user.admin
&& site_view.local_site.require_email_verification
&& !local_user_view.local_user.email_verified
{
Err(LemmyErrorType::EmailNotVerified)?
}
2022-04-13 18:12:25 +00:00
check_registration_application(&local_user_view, &site_view.local_site, &mut context.pool())
.await?;
// Check the totp if enabled
if local_user_view.local_user.totp_2fa_enabled {
check_totp_2fa_valid(&local_user_view, &data.totp_2fa_token, &site_view.site.name)?;
}
2022-04-13 18:12:25 +00:00
// Return the jwt
Ok(Json(LoginResponse {
jwt: Some(
Claims::jwt(
local_user_view.local_user.id.0,
&context.secret().jwt_secret,
&context.settings().hostname,
)?
.into(),
),
verify_email_sent: false,
registration_created: false,
}))
2022-04-13 18:12:25 +00:00
}