use crate::actors::users_actor::UsersBackend; use crate::data::entity_manager::EntityManager; use crate::data::user::{TwoFactor, User, UserID}; use crate::utils::err::Res; use crate::utils::time::time; use std::net::IpAddr; impl EntityManager { /// Update user information fn update_user(&mut self, id: &UserID, update: F) -> bool where F: FnOnce(User) -> User, { let user = match self.find_by_user_id(id) { None => return false, Some(user) => user, }; if let Err(e) = self.replace_entries(|u| u.uid.eq(id), &update(user)) { log::error!("Failed to update user information! {:?}", e); return false; } true } } fn hash_password>(pwd: P) -> Res { Ok(bcrypt::hash(pwd, bcrypt::DEFAULT_COST)?) } fn verify_password>(pwd: P, hash: &str) -> bool { match bcrypt::verify(pwd, hash) { Ok(r) => r, Err(e) => { log::warn!("Failed to verify password! {:?}", e); false } } } impl UsersBackend for EntityManager { fn find_by_username_or_email(&self, u: &str) -> Option { for entry in self.iter() { if entry.username.eq(u) || entry.email.eq(u) { return Some(entry.clone()); } } None } fn find_by_user_id(&self, id: &UserID) -> Option { for entry in self.iter() { if entry.uid.eq(id) { return Some(entry.clone()); } } None } fn get_entire_users_list(&self) -> Vec { self.cloned() } fn change_user_password(&mut self, id: &UserID, password: &str, temporary: bool) -> bool { let new_hash = match hash_password(password) { Ok(h) => h, Err(e) => { log::error!("Failed to hash user password! {}", e); return false; } }; self.update_user(id, |mut user| { user.password = new_hash; user.need_reset_password = temporary; user.two_factor_exemption_after_successful_login = Default::default(); user }) } fn verify_user_password(&self, user: &UserID, password: &str) -> bool { self.find_by_user_id(user) .map(|u| verify_password(password, &u.password)) .unwrap_or(false) } fn add_2fa_factor(&mut self, id: &UserID, factor: TwoFactor) -> bool { self.update_user(id, |mut user| { user.two_factor.push(factor); user }) } fn save_new_successful_2fa_authentication(&mut self, id: &UserID, ip: IpAddr) -> bool { self.update_user(id, |mut user| { user.last_successful_2fa.insert(ip, time()); // Remove outdated successful attempts user.remove_outdated_successful_2fa_attempts(); user }) } fn clear_2fa_login_history(&mut self, id: &UserID) -> bool { self.update_user(id, |mut user| { user.last_successful_2fa = Default::default(); user }) } fn delete_account(&mut self, id: &UserID) -> bool { let user = match self.find_by_user_id(id) { None => { log::warn!( "Could not delete account {:?} because it was not found!", id ); return false; } Some(s) => s, }; match self.remove(&user) { Ok(_) => true, Err(e) => { log::error!("Failed to update delete account! {:?}", e); false } } } fn update_or_insert_user(&mut self, user: User) -> Res { self.update_or_push(user) } }