summaryrefslogtreecommitdiff
path: root/src/login/handlers/password/mod.rs
blob: 8b826057d5e7b4ff15164fc7a7743a73335eef87 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
use axum::{
    extract::{Json, State},
    http::StatusCode,
    response::{IntoResponse, Response},
};

use crate::{
    clock::RequestedAt,
    empty::Empty,
    error::Internal,
    login::{app, app::Logins},
    password::Password,
    token::extract::{Identity, IdentityCookie},
};

#[cfg(test)]
mod test;

pub async fn handler(
    State(logins): State<Logins>,
    RequestedAt(now): RequestedAt,
    identity: Identity,
    cookie: IdentityCookie,
    Json(request): Json<Request>,
) -> Result<(IdentityCookie, Empty), Error> {
    let secret = logins
        .change_password(&identity.login, &request.password, &request.to, &now)
        .await
        .map_err(Error)?;
    let cookie = cookie.set(secret);
    Ok((cookie, Empty))
}

#[derive(serde::Deserialize)]
pub struct Request {
    pub password: Password,
    pub to: Password,
}

#[derive(Debug, thiserror::Error)]
#[error(transparent)]
pub struct Error(#[from] pub app::LoginError);

impl IntoResponse for Error {
    fn into_response(self) -> Response {
        let Self(error) = self;
        match error {
            app::LoginError::Rejected => {
                (StatusCode::BAD_REQUEST, "invalid name or password").into_response()
            }
            other => Internal::from(other).into_response(),
        }
    }
}