mirror of
https://github.com/LemmyNet/lemmy.git
synced 2024-09-22 11:30:03 +00:00
93225e5ddf
* Create error type enum * Replace magic string slices with LemmyErrorTypes * Remove unused enum * Add rename snake case to error enum * Rename functions * clippy * Fix merge errors * Serialize in PascalCase instead of snake_case * Revert src/lib * Add serialization tests * Update translations * Fix compilation error in test * Fix another compilation error * Add code for generating typescript types * Various fixes to avoid breaking api * impl From<LemmyErrorType> for LemmyError * with_lemmy_type * trigger ci --------- Co-authored-by: SleeplessOne1917 <abias1122@gmail.com>
80 lines
2.3 KiB
Rust
80 lines
2.3 KiB
Rust
use crate::Perform;
|
|
use actix_web::web::Data;
|
|
use bcrypt::verify;
|
|
use lemmy_api_common::{
|
|
context::LemmyContext,
|
|
person::{Login, LoginResponse},
|
|
utils::{check_registration_application, check_user_valid},
|
|
};
|
|
use lemmy_db_views::structs::{LocalUserView, SiteView};
|
|
use lemmy_utils::{
|
|
claims::Claims,
|
|
error::{LemmyError, LemmyErrorExt, LemmyErrorType},
|
|
utils::validation::check_totp_2fa_valid,
|
|
};
|
|
|
|
#[async_trait::async_trait(?Send)]
|
|
impl Perform for Login {
|
|
type Response = LoginResponse;
|
|
|
|
#[tracing::instrument(skip(context))]
|
|
async fn perform(&self, context: &Data<LemmyContext>) -> Result<LoginResponse, LemmyError> {
|
|
let data: &Login = self;
|
|
|
|
let site_view = SiteView::read_local(context.pool()).await?;
|
|
|
|
// Fetch that username / email
|
|
let username_or_email = data.username_or_email.clone();
|
|
let local_user_view = LocalUserView::find_by_email_or_name(context.pool(), &username_or_email)
|
|
.await
|
|
.with_lemmy_type(LemmyErrorType::IncorrectLogin)?;
|
|
|
|
// Verify the password
|
|
let valid: bool = verify(
|
|
&data.password,
|
|
&local_user_view.local_user.password_encrypted,
|
|
)
|
|
.unwrap_or(false);
|
|
if !valid {
|
|
return Err(LemmyErrorType::IncorrectLogin)?;
|
|
}
|
|
check_user_valid(
|
|
local_user_view.person.banned,
|
|
local_user_view.person.ban_expires,
|
|
local_user_view.person.deleted,
|
|
)?;
|
|
|
|
// Check if the user's email is verified if email verification is turned on
|
|
// However, skip checking verification if the user is an admin
|
|
if !local_user_view.person.admin
|
|
&& site_view.local_site.require_email_verification
|
|
&& !local_user_view.local_user.email_verified
|
|
{
|
|
return Err(LemmyErrorType::EmailNotVerified)?;
|
|
}
|
|
|
|
check_registration_application(&local_user_view, &site_view.local_site, context.pool()).await?;
|
|
|
|
// Check the totp
|
|
check_totp_2fa_valid(
|
|
&local_user_view.local_user.totp_2fa_secret,
|
|
&data.totp_2fa_token,
|
|
&site_view.site.name,
|
|
&local_user_view.person.name,
|
|
)?;
|
|
|
|
// Return the jwt
|
|
Ok(LoginResponse {
|
|
jwt: Some(
|
|
Claims::jwt(
|
|
local_user_view.local_user.id.0,
|
|
&context.secret().jwt_secret,
|
|
&context.settings().hostname,
|
|
)?
|
|
.into(),
|
|
),
|
|
verify_email_sent: false,
|
|
registration_created: false,
|
|
})
|
|
}
|
|
}
|