summaryrefslogtreecommitdiff
path: root/src/user/handlers/login/mod.rs
blob: e80377e340cdcc9ec13ba20fddf455254c9d966f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
use axum::{
    extract::{Json, State},
    http::StatusCode,
    response::{IntoResponse, Response},
};

use crate::{
    app::App,
    clock::RequestedAt,
    error::Internal,
    name::Name,
    token::{app, extract::IdentityCookie},
    user::{Password, User},
};

#[cfg(test)]
mod test;

pub async fn handler(
    State(app): State<App>,
    RequestedAt(now): RequestedAt,
    identity: IdentityCookie,
    Json(request): Json<Request>,
) -> Result<(IdentityCookie, Json<User>), Error> {
    let (user, secret) = app
        .tokens()
        .login(&request.name, &request.password, &now)
        .await
        .map_err(Error)?;
    let identity = identity.set(secret);
    Ok((identity, Json(user)))
}

#[derive(serde::Deserialize)]
pub struct Request {
    pub name: Name,
    pub password: Password,
}

#[derive(Debug, thiserror::Error)]
#[error(transparent)]
pub struct Error(#[from] pub app::LoginError);

impl IntoResponse for Error {
    fn into_response(self) -> Response {
        let Self(error) = self;
        match error {
            app::LoginError::Rejected => {
                // not error::Unauthorized due to differing messaging
                (StatusCode::UNAUTHORIZED, "invalid name or password").into_response()
            }
            other => Internal::from(other).into_response(),
        }
    }
}