lemmy/crates/api/src/local_user/change_password.rs

58 lines
1.7 KiB
Rust
Raw Normal View History

2022-04-13 18:12:25 +00:00
use crate::Perform;
use actix_web::web::Data;
use bcrypt::verify;
use lemmy_api_common::{
context::LemmyContext,
2022-04-13 18:12:25 +00:00
person::{ChangePassword, LoginResponse},
utils::{local_user_view_from_jwt, password_length_check},
2022-04-13 18:12:25 +00:00
};
use lemmy_db_schema::source::local_user::LocalUser;
use lemmy_utils::{claims::Claims, error::LemmyError};
2022-04-13 18:12:25 +00:00
#[async_trait::async_trait(?Send)]
impl Perform for ChangePassword {
type Response = LoginResponse;
#[tracing::instrument(skip(self, context))]
async fn perform(&self, context: &Data<LemmyContext>) -> Result<LoginResponse, LemmyError> {
2022-04-13 18:12:25 +00:00
let data: &ChangePassword = self;
let local_user_view = local_user_view_from_jwt(data.auth.as_ref(), context).await?;
2022-04-13 18:12:25 +00:00
password_length_check(&data.new_password)?;
// Make sure passwords match
if data.new_password != data.new_password_verify {
return Err(LemmyError::from_message("passwords_dont_match"));
}
// Check the old password
let valid: bool = verify(
&data.old_password,
&local_user_view.local_user.password_encrypted,
)
.unwrap_or(false);
if !valid {
return Err(LemmyError::from_message("password_incorrect"));
}
let local_user_id = local_user_view.local_user.id;
let new_password = data.new_password.clone();
2022-11-09 10:05:00 +00:00
let updated_local_user =
LocalUser::update_password(context.pool(), local_user_id, &new_password).await?;
2022-04-13 18:12:25 +00:00
// Return the jwt
Ok(LoginResponse {
jwt: Some(
Claims::jwt(
updated_local_user.id.0,
&context.secret().jwt_secret,
&context.settings().hostname,
)?
.into(),
),
verify_email_sent: false,
registration_created: false,
})
}
}