summaryrefslogtreecommitdiff
path: root/src/types/session.rs
blob: 27c5c66c4caa051b9853f91790edf99a42043e4b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
use rand::{distributions::Alphanumeric, Rng};
use serde::Serialize;
use tracing::instrument;

use crate::database::Database;
use crate::types::http::{ResponseCode, Result};

#[derive(Serialize)]
pub struct Session {
    pub user_id: u64,
    pub token: String,
}

impl Session {
    #[instrument(skip(db))]
    pub fn from_token(db: &Database, token: &str) -> Result<Self> {
        let Ok(Some(session)) = db.get_session(token) else {
            return Err(ResponseCode::BadRequest.text("Invalid auth token"));
        };

        Ok(session)
    }

    #[instrument(skip(db))]
    pub fn reterieve_all(db: &Database) -> Result<Vec<Self>> {
        let Ok(sessions) = db.get_all_sessions() else {
            return Err(ResponseCode::InternalServerError.text("Failed to fetch sessions"))
        };
        Ok(sessions)
    }

    #[instrument(skip(db))]
    pub fn new(db: &Database, user_id: u64) -> Result<Self> {
        let token: String = rand::thread_rng()
            .sample_iter(&Alphanumeric)
            .take(32)
            .map(char::from)
            .collect();
        match db.set_session(user_id, &token) {
            Err(_) => Err(ResponseCode::BadRequest.text("Failed to create session")),
            Ok(_) => Ok(Self { user_id, token }),
        }
    }

    #[instrument(skip(db))]
    pub fn delete(db: &Database, user_id: u64) -> Result<()> {
        if db.delete_session(user_id).is_err() {
            tracing::error!("Failed to logout user");
            return Err(ResponseCode::InternalServerError.text("Failed to logout"));
        };
        Ok(())
    }
}