2020-06-29 15:53:39 +02:00
|
|
|
use crate::api_data::current_user_id::CurrentUserID;
|
2020-05-24 13:09:50 +02:00
|
|
|
use crate::api_data::login_success::LoginSuccess;
|
2020-07-13 13:00:02 +02:00
|
|
|
use crate::api_data::res_check_email_exists::ResCheckEmailExists;
|
2020-07-13 13:15:26 +02:00
|
|
|
use crate::api_data::res_check_security_questions_exists::ResCheckSecurityQuestionsExists;
|
2020-07-13 13:23:37 +02:00
|
|
|
use crate::api_data::res_get_security_questions::ResGetSecurityQuestions;
|
2020-05-21 15:43:53 +02:00
|
|
|
use crate::controllers::routes::RequestResult;
|
2020-07-13 13:07:50 +02:00
|
|
|
use crate::data::error::ResultBoxError;
|
2020-05-24 13:09:50 +02:00
|
|
|
use crate::data::http_request_handler::HttpRequestHandler;
|
2020-07-13 13:35:25 +02:00
|
|
|
use crate::data::new_account::NewAccount;
|
2020-07-13 13:07:50 +02:00
|
|
|
use crate::data::user::User;
|
|
|
|
use crate::helpers::{account_helper, user_helper};
|
2020-05-21 15:43:53 +02:00
|
|
|
|
|
|
|
/// Account controller
|
|
|
|
///
|
|
|
|
/// @author Pierre Hubert
|
|
|
|
|
2020-07-13 13:07:50 +02:00
|
|
|
impl HttpRequestHandler {
|
|
|
|
/// Get information about a user based on its email address specified in the request
|
|
|
|
pub fn post_user_info_from_email(&mut self, field: &str) -> ResultBoxError<User> {
|
|
|
|
let email = self.post_email(field)?;
|
|
|
|
|
|
|
|
self.ok_or_not_found(
|
|
|
|
user_helper::find_user_by_email(&email),
|
|
|
|
format!("Requested user in '{}' not found!", email).as_str(),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-13 13:35:25 +02:00
|
|
|
/// Create a new account
|
|
|
|
pub fn create(r: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
// TODO : limit request
|
|
|
|
|
|
|
|
// Get & check email
|
|
|
|
let email = r.post_email("emailAddress")?;
|
|
|
|
if account_helper::exists_mail(&email)? {
|
|
|
|
r.conflict("This email address already belongs to an account!".to_string())?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let new_account = NewAccount {
|
|
|
|
first_name: r.post_content("firstName", 3, true)?,
|
|
|
|
last_name: r.post_content("lastName", 3, true)?,
|
|
|
|
email,
|
|
|
|
password: r.post_string_opt("password", 3, true)?,
|
|
|
|
};
|
|
|
|
|
|
|
|
account_helper::create(&new_account)?;
|
|
|
|
|
|
|
|
// TODO : limit request
|
|
|
|
|
|
|
|
r.success("Account created!")
|
|
|
|
}
|
|
|
|
|
2020-05-21 15:43:53 +02:00
|
|
|
/// Sign in user
|
2020-05-23 17:09:28 +02:00
|
|
|
pub fn login_user(request: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
let email = request.post_email("userMail")?;
|
|
|
|
let password = request.post_string_opt("userPassword", 3, true)?;
|
|
|
|
|
|
|
|
// TODO : limit request
|
|
|
|
|
|
|
|
// Authenticate user
|
2020-05-23 19:17:48 +02:00
|
|
|
let token = account_helper::login_user(
|
|
|
|
&email, &password, request.api_client());
|
2020-05-23 17:09:28 +02:00
|
|
|
|
2020-05-23 19:17:48 +02:00
|
|
|
match token {
|
|
|
|
Ok(t) => {
|
2020-05-24 13:09:50 +02:00
|
|
|
request.set_response(LoginSuccess::new(&t))
|
|
|
|
}
|
2020-05-23 19:17:48 +02:00
|
|
|
Err(e) => {
|
|
|
|
// TODO : limit request
|
|
|
|
println!("Error on login: {}", e);
|
|
|
|
request.forbidden("Invalid email address / password!".to_string())
|
2020-05-24 13:09:50 +02:00
|
|
|
}
|
2020-05-23 19:17:48 +02:00
|
|
|
}
|
2020-05-24 17:57:47 +02:00
|
|
|
}
|
|
|
|
|
2020-05-24 19:19:07 +02:00
|
|
|
/// Sign out user
|
|
|
|
pub fn logout_user(request: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
account_helper::destroy_login_tokens(
|
2020-06-25 10:08:34 +02:00
|
|
|
&request.user_id()?,
|
2020-06-29 15:53:39 +02:00
|
|
|
request.api_client(),
|
2020-05-24 19:19:07 +02:00
|
|
|
)?;
|
|
|
|
|
|
|
|
request.success("User disconnected.")
|
|
|
|
}
|
|
|
|
|
2020-07-13 11:56:49 +02:00
|
|
|
/// Disconnect a user from all his devices
|
|
|
|
pub fn disconnect_all_devices(r: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
account_helper::destroy_all_user_tokens(r.user_id_ref()?)?;
|
|
|
|
|
|
|
|
r.success("Successfully disconnected!")
|
|
|
|
}
|
|
|
|
|
2020-05-24 17:57:47 +02:00
|
|
|
/// Get current user ID
|
|
|
|
pub fn user_id(request: &mut HttpRequestHandler) -> RequestResult {
|
2020-06-25 10:08:34 +02:00
|
|
|
request.set_response(CurrentUserID::new(&request.user_id()?))
|
2020-07-13 13:00:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Check out whether an email address exists or not
|
|
|
|
pub fn exists_mail(r: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
let email = r.post_email("email")?;
|
|
|
|
|
|
|
|
r.set_response(ResCheckEmailExists::new(account_helper::exists_mail(&email)?))
|
2020-07-13 13:07:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Check out whether a given user has set security questions or not
|
|
|
|
pub fn has_security_questions(r: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
let user = r.post_user_info_from_email("email")?;
|
|
|
|
|
2020-07-13 13:15:26 +02:00
|
|
|
r.set_response(ResCheckSecurityQuestionsExists::new(user.has_security_questions()))
|
2020-07-13 13:23:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Get the security questions of a user
|
|
|
|
pub fn get_security_questions(r: &mut HttpRequestHandler) -> RequestResult {
|
|
|
|
let user = r.post_user_info_from_email("email")?;
|
|
|
|
|
|
|
|
if !user.has_security_questions() {
|
|
|
|
r.forbidden("Specified user has not defined security questions!".to_string())?;
|
|
|
|
}
|
|
|
|
|
|
|
|
r.set_response(ResGetSecurityQuestions::new(&user))
|
2020-05-21 15:43:53 +02:00
|
|
|
}
|