2020-12-18 16:17:21 +00:00
|
|
|
use crate::Crud;
|
2020-09-01 13:20:22 +00:00
|
|
|
use diesel::{dsl::*, result::Error, PgConnection, *};
|
2021-03-18 20:25:21 +00:00
|
|
|
use lemmy_db_schema::{
|
|
|
|
schema::password_reset_request::dsl::*,
|
|
|
|
source::password_reset_request::*,
|
|
|
|
LocalUserId,
|
|
|
|
};
|
2019-12-26 19:48:13 +00:00
|
|
|
use sha2::{Digest, Sha256};
|
2019-10-30 03:35:39 +00:00
|
|
|
|
2021-03-18 20:25:21 +00:00
|
|
|
impl Crud<PasswordResetRequestForm, i32> for PasswordResetRequest {
|
2019-10-30 03:35:39 +00:00
|
|
|
fn read(conn: &PgConnection, password_reset_request_id: i32) -> Result<Self, Error> {
|
2019-11-02 06:43:21 +00:00
|
|
|
password_reset_request
|
|
|
|
.find(password_reset_request_id)
|
|
|
|
.first::<Self>(conn)
|
2019-10-30 03:35:39 +00:00
|
|
|
}
|
|
|
|
fn create(conn: &PgConnection, form: &PasswordResetRequestForm) -> Result<Self, Error> {
|
2019-11-02 06:43:21 +00:00
|
|
|
insert_into(password_reset_request)
|
|
|
|
.values(form)
|
|
|
|
.get_result::<Self>(conn)
|
2019-10-30 03:35:39 +00:00
|
|
|
}
|
2019-11-02 06:43:21 +00:00
|
|
|
fn update(
|
|
|
|
conn: &PgConnection,
|
|
|
|
password_reset_request_id: i32,
|
|
|
|
form: &PasswordResetRequestForm,
|
|
|
|
) -> Result<Self, Error> {
|
2019-10-30 03:35:39 +00:00
|
|
|
diesel::update(password_reset_request.find(password_reset_request_id))
|
|
|
|
.set(form)
|
|
|
|
.get_result::<Self>(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-21 13:38:34 +00:00
|
|
|
pub trait PasswordResetRequest_ {
|
|
|
|
fn create_token(
|
|
|
|
conn: &PgConnection,
|
2021-03-18 20:25:21 +00:00
|
|
|
from_local_user_id: LocalUserId,
|
2020-12-21 13:38:34 +00:00
|
|
|
token: &str,
|
|
|
|
) -> Result<PasswordResetRequest, Error>;
|
|
|
|
fn read_from_token(conn: &PgConnection, token: &str) -> Result<PasswordResetRequest, Error>;
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PasswordResetRequest_ for PasswordResetRequest {
|
|
|
|
fn create_token(
|
|
|
|
conn: &PgConnection,
|
2021-03-18 20:25:21 +00:00
|
|
|
from_local_user_id: LocalUserId,
|
2020-12-21 13:38:34 +00:00
|
|
|
token: &str,
|
|
|
|
) -> Result<PasswordResetRequest, Error> {
|
2019-11-02 06:41:57 +00:00
|
|
|
let mut hasher = Sha256::new();
|
2020-07-01 12:54:29 +00:00
|
|
|
hasher.update(token);
|
2020-12-21 13:38:34 +00:00
|
|
|
let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
|
2019-10-30 03:35:39 +00:00
|
|
|
|
|
|
|
let form = PasswordResetRequestForm {
|
2021-02-26 13:49:58 +00:00
|
|
|
local_user_id: from_local_user_id,
|
2019-10-30 03:35:39 +00:00
|
|
|
token_encrypted: token_hash,
|
|
|
|
};
|
|
|
|
|
|
|
|
Self::create(&conn, &form)
|
|
|
|
}
|
2020-12-21 13:38:34 +00:00
|
|
|
fn read_from_token(conn: &PgConnection, token: &str) -> Result<PasswordResetRequest, Error> {
|
2019-11-02 06:41:57 +00:00
|
|
|
let mut hasher = Sha256::new();
|
2020-07-01 12:54:29 +00:00
|
|
|
hasher.update(token);
|
2020-12-21 13:38:34 +00:00
|
|
|
let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
|
2019-11-02 06:41:57 +00:00
|
|
|
password_reset_request
|
|
|
|
.filter(token_encrypted.eq(token_hash))
|
|
|
|
.filter(published.gt(now - 1.days()))
|
|
|
|
.first::<Self>(conn)
|
2019-10-30 03:35:39 +00:00
|
|
|
}
|
2020-12-21 13:38:34 +00:00
|
|
|
}
|
2019-12-22 16:08:03 +00:00
|
|
|
|
2020-12-21 13:38:34 +00:00
|
|
|
fn bytes_to_hex(bytes: Vec<u8>) -> String {
|
|
|
|
let mut str = String::new();
|
|
|
|
for byte in bytes {
|
|
|
|
str = format!("{}{:02x}", str, byte);
|
2019-12-22 16:08:03 +00:00
|
|
|
}
|
2020-12-21 13:38:34 +00:00
|
|
|
str
|
2019-10-30 03:35:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2020-12-21 16:30:34 +00:00
|
|
|
use crate::{
|
|
|
|
establish_unpooled_connection,
|
|
|
|
source::password_reset_request::PasswordResetRequest_,
|
|
|
|
Crud,
|
|
|
|
};
|
2021-03-11 16:41:04 +00:00
|
|
|
use lemmy_db_schema::source::{
|
|
|
|
local_user::{LocalUser, LocalUserForm},
|
|
|
|
password_reset_request::PasswordResetRequest,
|
|
|
|
person::*,
|
|
|
|
};
|
2021-02-25 19:43:39 +00:00
|
|
|
use serial_test::serial;
|
2019-10-30 03:35:39 +00:00
|
|
|
|
|
|
|
#[test]
|
2021-02-25 19:43:39 +00:00
|
|
|
#[serial]
|
2019-10-30 03:35:39 +00:00
|
|
|
fn test_crud() {
|
2020-01-12 15:31:51 +00:00
|
|
|
let conn = establish_unpooled_connection();
|
2019-10-30 03:35:39 +00:00
|
|
|
|
2021-02-26 13:49:58 +00:00
|
|
|
let new_person = PersonForm {
|
2019-10-30 03:35:39 +00:00
|
|
|
name: "thommy prw".into(),
|
|
|
|
preferred_username: None,
|
2019-12-29 20:39:48 +00:00
|
|
|
avatar: None,
|
2020-08-05 16:03:46 +00:00
|
|
|
banner: None,
|
2021-03-10 22:33:55 +00:00
|
|
|
banned: None,
|
|
|
|
deleted: None,
|
2020-09-18 11:04:12 +00:00
|
|
|
published: None,
|
2019-10-30 03:35:39 +00:00
|
|
|
updated: None,
|
2020-08-31 13:48:02 +00:00
|
|
|
actor_id: None,
|
2020-04-03 04:12:05 +00:00
|
|
|
bio: None,
|
2021-03-10 22:33:55 +00:00
|
|
|
local: None,
|
2020-04-03 04:12:05 +00:00
|
|
|
private_key: None,
|
|
|
|
public_key: None,
|
|
|
|
last_refreshed_at: None,
|
2021-02-04 16:34:58 +00:00
|
|
|
inbox_url: None,
|
|
|
|
shared_inbox_url: None,
|
2021-03-20 19:21:51 +00:00
|
|
|
matrix_user_id: None,
|
2019-10-30 03:35:39 +00:00
|
|
|
};
|
|
|
|
|
2021-02-26 13:49:58 +00:00
|
|
|
let inserted_person = Person::create(&conn, &new_person).unwrap();
|
2019-10-30 03:35:39 +00:00
|
|
|
|
2021-03-11 16:41:04 +00:00
|
|
|
let new_local_user = LocalUserForm {
|
|
|
|
person_id: inserted_person.id,
|
|
|
|
password_encrypted: "pass".to_string(),
|
|
|
|
email: None,
|
|
|
|
admin: None,
|
|
|
|
show_nsfw: None,
|
|
|
|
theme: None,
|
|
|
|
default_sort_type: None,
|
|
|
|
default_listing_type: None,
|
|
|
|
lang: None,
|
|
|
|
show_avatars: None,
|
|
|
|
send_notifications_to_email: None,
|
|
|
|
};
|
|
|
|
|
|
|
|
let inserted_local_user = LocalUser::create(&conn, &new_local_user).unwrap();
|
|
|
|
|
2019-12-28 21:06:37 +00:00
|
|
|
let token = "nope";
|
|
|
|
let token_encrypted_ = "ca3704aa0b06f5954c79ee837faa152d84d6b2d42838f0637a15eda8337dbdce";
|
2019-11-02 06:43:21 +00:00
|
|
|
|
|
|
|
let inserted_password_reset_request =
|
2021-03-11 16:41:04 +00:00
|
|
|
PasswordResetRequest::create_token(&conn, inserted_local_user.id, token).unwrap();
|
2019-10-30 03:35:39 +00:00
|
|
|
|
|
|
|
let expected_password_reset_request = PasswordResetRequest {
|
|
|
|
id: inserted_password_reset_request.id,
|
2021-03-11 16:41:04 +00:00
|
|
|
local_user_id: inserted_local_user.id,
|
2019-12-28 21:06:37 +00:00
|
|
|
token_encrypted: token_encrypted_.to_string(),
|
2019-10-30 03:35:39 +00:00
|
|
|
published: inserted_password_reset_request.published,
|
|
|
|
};
|
|
|
|
|
2019-12-28 21:06:37 +00:00
|
|
|
let read_password_reset_request = PasswordResetRequest::read_from_token(&conn, token).unwrap();
|
2021-02-26 13:49:58 +00:00
|
|
|
let num_deleted = Person::delete(&conn, inserted_person.id).unwrap();
|
2019-10-30 03:35:39 +00:00
|
|
|
|
|
|
|
assert_eq!(expected_password_reset_request, read_password_reset_request);
|
2019-11-02 06:43:21 +00:00
|
|
|
assert_eq!(
|
|
|
|
expected_password_reset_request,
|
|
|
|
inserted_password_reset_request
|
|
|
|
);
|
2019-10-30 03:35:39 +00:00
|
|
|
assert_eq!(1, num_deleted);
|
|
|
|
}
|
|
|
|
}
|