lyrs/src/state.rs

60 lines
1.4 KiB
Rust
Raw Normal View History

2024-07-14 20:15:40 -05:00
use crate::{db::Data, prelude::*, user::User};
use axum::async_trait;
use axum_login::{AuthnBackend, UserId};
use redact::Secret;
use serde::Deserialize;
2024-05-14 12:28:27 -05:00
#[derive(Clone)]
pub struct State {
2024-05-20 11:35:39 -05:00
pub db: Data,
2024-05-14 12:28:27 -05:00
}
impl State {
2024-07-14 20:15:40 -05:00
pub async fn try_new() -> AnyResult<Self> {
2024-05-17 12:00:37 -05:00
Ok(Self {
2024-05-20 11:35:39 -05:00
db: Data::try_new()?,
2024-05-17 12:00:37 -05:00
})
2024-05-14 12:28:27 -05:00
}
}
2024-05-15 16:48:23 -05:00
#[derive(Deserialize, Debug, Clone)]
pub struct Creds {
pub username: String,
pub password: Secret<String>,
}
2024-07-14 20:15:40 -05:00
#[derive(thiserror::Error, Debug)]
pub enum AuthnError {
#[error("{0}")]
Eyre(#[from] Error),
}
#[async_trait]
impl AuthnBackend for State {
type User = User;
type Credentials = Creds;
2024-07-14 20:15:40 -05:00
type Error = AuthnError;
async fn authenticate(
&self,
Creds { username, password }: Self::Credentials,
) -> Result<Option<Self::User>, Self::Error> {
if let Some(user) = self.db.get::<String, User>(User::tree(), username)? {
if let Err(err) = user.verify(password.expose_secret()) {
Err(err.into())
} else {
Ok(Some(user))
}
} else {
Ok(None)
}
}
async fn get_user(&self, username: &UserId<Self>) -> Result<Option<Self::User>, Self::Error> {
match self.db.get::<&str, User>(User::tree(), username)? {
Some(user) => Ok(Some(user)),
None => Ok(None),
}
}
}