3 schema::password_reset_request::dsl::{
5 password_reset_request,
9 source::password_reset_request::{PasswordResetRequest, PasswordResetRequestForm},
11 utils::{get_conn, DbPool},
14 dsl::{insert_into, now, IntervalDsl},
19 use diesel_async::RunQueryDsl;
20 use sha2::{Digest, Sha256};
23 impl Crud for PasswordResetRequest {
24 type InsertForm = PasswordResetRequestForm;
25 type UpdateForm = PasswordResetRequestForm;
27 async fn read(pool: &mut DbPool<'_>, password_reset_request_id: i32) -> Result<Self, Error> {
28 let conn = &mut get_conn(pool).await?;
29 password_reset_request
30 .find(password_reset_request_id)
34 async fn create(pool: &mut DbPool<'_>, form: &PasswordResetRequestForm) -> Result<Self, Error> {
35 let conn = &mut get_conn(pool).await?;
36 insert_into(password_reset_request)
38 .get_result::<Self>(conn)
42 pool: &mut DbPool<'_>,
43 password_reset_request_id: i32,
44 form: &PasswordResetRequestForm,
45 ) -> Result<Self, Error> {
46 let conn = &mut get_conn(pool).await?;
47 diesel::update(password_reset_request.find(password_reset_request_id))
49 .get_result::<Self>(conn)
54 impl PasswordResetRequest {
55 pub async fn create_token(
56 pool: &mut DbPool<'_>,
57 from_local_user_id: LocalUserId,
59 ) -> Result<PasswordResetRequest, Error> {
60 let mut hasher = Sha256::new();
62 let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
64 let form = PasswordResetRequestForm {
65 local_user_id: from_local_user_id,
66 token_encrypted: token_hash,
69 Self::create(pool, &form).await
71 pub async fn read_from_token(
72 pool: &mut DbPool<'_>,
74 ) -> Result<PasswordResetRequest, Error> {
75 let conn = &mut get_conn(pool).await?;
76 let mut hasher = Sha256::new();
78 let token_hash: String = bytes_to_hex(hasher.finalize().to_vec());
79 password_reset_request
80 .filter(token_encrypted.eq(token_hash))
81 .filter(published.gt(now - 1.days()))
86 pub async fn get_recent_password_resets_count(
87 pool: &mut DbPool<'_>,
89 ) -> Result<i64, Error> {
90 let conn = &mut get_conn(pool).await?;
91 password_reset_request
92 .filter(local_user_id.eq(user_id))
93 .filter(published.gt(now - 1.days()))
100 fn bytes_to_hex(bytes: Vec<u8>) -> String {
101 let mut str = String::new();
103 str = format!("{str}{byte:02x}");
113 local_user::{LocalUser, LocalUserInsertForm},
114 password_reset_request::PasswordResetRequest,
115 person::{Person, PersonInsertForm},
118 utils::build_db_pool_for_tests,
120 use serial_test::serial;
124 async fn test_crud() {
125 let pool = &build_db_pool_for_tests().await;
126 let pool = &mut pool.into();
128 let inserted_instance = Instance::read_or_create(pool, "my_domain.tld".to_string())
132 let new_person = PersonInsertForm::builder()
133 .name("thommy prw".into())
134 .public_key("pubkey".to_string())
135 .instance_id(inserted_instance.id)
138 let inserted_person = Person::create(pool, &new_person).await.unwrap();
140 let new_local_user = LocalUserInsertForm::builder()
141 .person_id(inserted_person.id)
142 .password_encrypted("pass".to_string())
145 let inserted_local_user = LocalUser::create(pool, &new_local_user).await.unwrap();
148 let token_encrypted_ = "ca3704aa0b06f5954c79ee837faa152d84d6b2d42838f0637a15eda8337dbdce";
150 let inserted_password_reset_request =
151 PasswordResetRequest::create_token(pool, inserted_local_user.id, token)
155 let expected_password_reset_request = PasswordResetRequest {
156 id: inserted_password_reset_request.id,
157 local_user_id: inserted_local_user.id,
158 token_encrypted: token_encrypted_.to_string(),
159 published: inserted_password_reset_request.published,
162 let read_password_reset_request = PasswordResetRequest::read_from_token(pool, token)
165 let num_deleted = Person::delete(pool, inserted_person.id).await.unwrap();
166 Instance::delete(pool, inserted_instance.id).await.unwrap();
168 assert_eq!(expected_password_reset_request, read_password_reset_request);
170 expected_password_reset_request,
171 inserted_password_reset_request
173 assert_eq!(1, num_deleted);