mirror of
https://github.com/LemmyNet/lemmy.git
synced 2024-05-17 01:12:39 +00:00
dc327652a5
* wip * stuff * fmt * fmt 2 * fmt 3 * fix default feature * use Authorization header * store ip and user agent for each login * add list_logins endpoint * serde(skip) for token * fix api tests * A few suggestions for login_token (#3991) * A few suggestions. * Fixing SQL format. * review * review * rename cookie --------- Co-authored-by: Dessalines <dessalines@users.noreply.github.com>
46 lines
1.3 KiB
Rust
46 lines
1.3 KiB
Rust
use actix_web::web::{Data, Json};
|
|
use lemmy_api_common::{
|
|
context::LemmyContext,
|
|
person::{LoginResponse, PasswordChangeAfterReset},
|
|
utils::password_length_check,
|
|
};
|
|
use lemmy_db_schema::source::{
|
|
local_user::LocalUser,
|
|
login_token::LoginToken,
|
|
password_reset_request::PasswordResetRequest,
|
|
};
|
|
use lemmy_utils::error::{LemmyError, LemmyErrorExt, LemmyErrorType};
|
|
|
|
#[tracing::instrument(skip(context))]
|
|
pub async fn change_password_after_reset(
|
|
data: Json<PasswordChangeAfterReset>,
|
|
context: Data<LemmyContext>,
|
|
) -> Result<Json<LoginResponse>, LemmyError> {
|
|
// Fetch the user_id from the token
|
|
let token = data.token.clone();
|
|
let local_user_id = PasswordResetRequest::read_from_token(&mut context.pool(), &token)
|
|
.await
|
|
.map(|p| p.local_user_id)?;
|
|
|
|
password_length_check(&data.password)?;
|
|
|
|
// Make sure passwords match
|
|
if data.password != data.password_verify {
|
|
Err(LemmyErrorType::PasswordsDoNotMatch)?
|
|
}
|
|
|
|
// Update the user with the new password
|
|
let password = data.password.clone();
|
|
LocalUser::update_password(&mut context.pool(), local_user_id, &password)
|
|
.await
|
|
.with_lemmy_type(LemmyErrorType::CouldntUpdateUser)?;
|
|
|
|
LoginToken::invalidate_all(&mut context.pool(), local_user_id).await?;
|
|
|
|
Ok(Json(LoginResponse {
|
|
jwt: None,
|
|
verify_email_sent: false,
|
|
registration_created: false,
|
|
}))
|
|
}
|