summaryrefslogtreecommitdiff
path: root/src/types/session.rs
blob: a9073aa10cc986abfc738cc716a9a1b5435fb2c7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
use rand::{distributions::Alphanumeric, Rng};
use serde::Serialize;
use tracing::instrument;

use crate::database;
use crate::types::http::{ResponseCode, Result};

#[derive(Serialize)]
pub struct Session {
    pub user_id: u64,
    pub token: String,
}

impl Session {
    #[instrument()]
    pub fn from_token(token: &str) -> Result<Self> {
        let Ok(Some(session)) = database::sessions::get_session(token) else {
            return Err(ResponseCode::BadRequest.text("Invalid auth token"));
        };

        Ok(session)
    }

    #[instrument()]
    pub fn reterieve_all() -> Result<Vec<Self>> {
        let Ok(sessions) = database::sessions::get_all_sessions() else {
            return Err(ResponseCode::InternalServerError.text("Failed to fetch sessions"))
        };
        Ok(sessions)
    }

    #[instrument()]
    pub fn new(user_id: u64) -> Result<Self> {
        let token: String = rand::thread_rng()
            .sample_iter(&Alphanumeric)
            .take(32)
            .map(char::from)
            .collect();
        match database::sessions::set_session(user_id, &token) {
            Err(_) => Err(ResponseCode::BadRequest.text("Failed to create session")),
            Ok(_) => Ok(Self { user_id, token }),
        }
    }

    #[instrument()]
    pub fn delete(user_id: u64) -> Result<()> {
        if database::sessions::delete_session(user_id).is_err() {
            tracing::error!("Failed to logout user");
            return Err(ResponseCode::InternalServerError.text("Failed to logout"));
        };
        Ok(())
    }
}