use std::convert::Infallible;
use postgres_native_tls::MakeTlsConnector;
use bb8::Pool;
use bb8_postgres::PostgresConnectionManager;
use hyper::Body;
use hyper::Response;
use serde::Deserialize;
use serde::Serialize;
use argon2::hash_encoded as argon_hash_encoded;
use argon2::Config as argon_config;
use kafka_threadpool::kafka_publisher::KafkaPublisher;
use crate::core::core_config::CoreConfig;
use crate::kafka::publish_msg::publish_msg;
use crate::requests::auth::create_user_token::create_user_token;
use crate::requests::user::is_verification_required::is_verification_required;
#[derive(Serialize, Deserialize, Clone)]
pub struct ApiReqUserLogin {
pub email: String,
pub password: String,
}
#[derive(Serialize, Deserialize, Clone)]
pub struct ApiResUserLogin {
pub user_id: i32,
pub email: String,
pub state: i32,
pub verified: i32,
pub role: String,
pub token: String,
pub msg: String,
}
pub async fn login_user(
tracking_label: &str,
config: &CoreConfig,
db_pool: &Pool<PostgresConnectionManager<MakeTlsConnector>>,
kafka_pool: &KafkaPublisher,
bytes: &[u8],
) -> std::result::Result<Response<Body>, Infallible> {
let user_object: ApiReqUserLogin = match serde_json::from_slice(bytes) {
Ok(uo) => uo,
Err(_) => {
let response = Response::builder()
.status(400)
.body(Body::from(
serde_json::to_string(&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: ("Login failed - please ensure \
email and password \
were set correctly in the request")
.to_string(),
})
.unwrap(),
))
.unwrap();
return Ok(response);
}
};
let argon_config = argon_config::default();
let hash = argon_hash_encoded(
user_object.password.as_bytes(),
&config.server_password_salt,
&argon_config,
)
.unwrap();
let query = format!(
"SELECT \
users.id, \
users.email, \
users.password, \
users.state, \
users.verified, \
users.role \
FROM \
users \
WHERE \
users.email = '{}' \
AND \
users.state = 0 \
LIMIT 1;",
&user_object.email
);
let conn = db_pool.get().await.unwrap();
let stmt = conn.prepare(&query).await.unwrap();
let query_result = match conn.query(&stmt, &[]).await {
Ok(query_result) => query_result,
Err(e) => {
let err_msg = format!("{e}");
let response = Response::builder()
.status(500)
.body(Body::from(
serde_json::to_string(
&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: format!("User login failed for email={} with err='{err_msg}'",
user_object.email)
}
).unwrap()))
.unwrap();
return Ok(response);
}
};
let mut row_list: Vec<(i32, String, String, i32, i32, String)> =
Vec::with_capacity(1);
for row in query_result.iter() {
let id: i32 = row.try_get("id").unwrap();
let email: String = row.try_get("email").unwrap();
let password: String = row.try_get("password").unwrap();
if password != hash {
let response = Response::builder()
.status(400)
.body(Body::from(
serde_json::to_string(&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: "User login failed - invalid password".to_string(),
})
.unwrap(),
))
.unwrap();
return Ok(response);
}
let user_state: i32 = row.try_get("state").unwrap();
let user_verified: i32 = row.try_get("verified").unwrap();
if is_verification_required() && user_verified != 1 {
let err_msg = format!(
"User login rejected - the email address: {email} \
is not verified"
);
error!("{tracking_label} - {err_msg}");
let response = Response::builder()
.status(401)
.body(Body::from(
serde_json::to_string(&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: err_msg,
})
.unwrap(),
))
.unwrap();
return Ok(response);
}
let role: String = row.try_get("role").unwrap();
row_list.push((id, email, password, user_state, user_verified, role))
}
if row_list.is_empty() {
let response = Response::builder()
.status(400)
.body(Body::from(
serde_json::to_string(&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: format!(
"User login failed - user does not exist with email={}",
user_object.email
),
})
.unwrap(),
))
.unwrap();
Ok(response)
} else {
let user_id = row_list[0].0;
let user_email = row_list[0].1.to_string();
let user_token = match create_user_token(
tracking_label,
config,
&conn,
&user_email,
user_id,
)
.await
{
Ok(user_token) => user_token,
Err(_) => {
let response = Response::builder()
.status(400)
.body(Body::from(
serde_json::to_string(
&ApiResUserLogin {
user_id: -1,
email: String::from(""),
state: -1,
verified: -1,
role: String::from(""),
token: String::from(""),
msg: format!("User login failed - unable to create user token for user_id={user_id} email={}",
user_object.email)
}
).unwrap()))
.unwrap();
return Ok(response);
}
};
if config.kafka_publish_events {
publish_msg(
kafka_pool,
"user.events",
&format!("user-{}", user_id),
None,
&format!("LOGIN user={user_id} email={user_email}"),
)
.await;
}
let response = Response::builder()
.status(201)
.body(Body::from(
serde_json::to_string(&ApiResUserLogin {
user_id,
email: user_email,
state: row_list[0].3,
verified: row_list[0].4,
role: row_list[0].5.to_string(),
token: user_token,
msg: "success".to_string(),
})
.unwrap(),
))
.unwrap();
Ok(response)
}
}