aboutsummaryrefslogtreecommitdiff
path: root/planetwars-server/src/routes/users.rs
diff options
context:
space:
mode:
authorIlion Beyst <ilion.beyst@gmail.com>2022-04-09 10:04:12 +0200
committerIlion Beyst <ilion.beyst@gmail.com>2022-04-09 10:04:12 +0200
commitcc7014b04bc4714cb2de7af39e62ff9762827489 (patch)
tree6c8b6de746a8551639090b745b848573a471a2b4 /planetwars-server/src/routes/users.rs
parent0e3ff9201e8479935f928c05ed6b11ae1c086e00 (diff)
downloadplanetwars.dev-cc7014b04bc4714cb2de7af39e62ff9762827489.tar.xz
planetwars.dev-cc7014b04bc4714cb2de7af39e62ff9762827489.zip
add validation to user registration
Diffstat (limited to 'planetwars-server/src/routes/users.rs')
-rw-r--r--planetwars-server/src/routes/users.rs85
1 files changed, 82 insertions, 3 deletions
diff --git a/planetwars-server/src/routes/users.rs b/planetwars-server/src/routes/users.rs
index 967710e..54ddd09 100644
--- a/planetwars-server/src/routes/users.rs
+++ b/planetwars-server/src/routes/users.rs
@@ -8,6 +8,8 @@ use axum::http::StatusCode;
use axum::response::{Headers, IntoResponse, Response};
use axum::{async_trait, Json};
use serde::{Deserialize, Serialize};
+use serde_json::json;
+use thiserror::Error;
type AuthorizationHeader = TypedHeader<Authorization<Bearer>>;
@@ -53,16 +55,93 @@ pub struct RegistrationParams {
pub password: String,
}
+#[derive(Debug, Error)]
+pub enum RegistrationError {
+ #[error("database error")]
+ DatabaseError(#[from] diesel::result::Error),
+ #[error("validation failed")]
+ ValidationFailed(Vec<String>),
+}
+
+impl RegistrationParams {
+ fn validate(&self, conn: &DatabaseConnection) -> Result<(), RegistrationError> {
+ let mut errors = Vec::new();
+
+ // TODO: do we want to support cased usernames?
+ // this could be done by allowing casing in names, but requiring case-insensitive uniqueness
+ if !self
+ .username
+ .chars()
+ .all(|c| c.is_ascii_alphanumeric() && !c.is_uppercase())
+ {
+ errors.push("username must be alphanumeric and lowercase".to_string());
+ }
+
+ if self.username.len() < 3 {
+ errors.push("username must be at least 3 characters".to_string());
+ }
+
+ if self.username.len() > 32 {
+ errors.push("username must be at most 32 characters".to_string());
+ }
+
+ if self.password.len() < 8 {
+ errors.push("password must be at least 8 characters".to_string());
+ }
+
+ if users::find_user(&self.username, &conn).is_ok() {
+ errors.push("username is already taken".to_string());
+ }
+
+ if errors.is_empty() {
+ Ok(())
+ } else {
+ Err(RegistrationError::ValidationFailed(errors))
+ }
+ }
+}
+
+impl IntoResponse for RegistrationError {
+ fn into_response(self) -> Response {
+ let (status, json_body) = match self {
+ RegistrationError::DatabaseError(_e) => {
+ // TODO: create an error response struct
+ (
+ StatusCode::INTERNAL_SERVER_ERROR,
+ json!({
+ "error": {
+ "type": "internal_server_error",
+ }
+ }),
+ )
+ }
+ RegistrationError::ValidationFailed(errors) => (
+ StatusCode::UNPROCESSABLE_ENTITY,
+ json!({
+ "error": {
+ "type": "validation_failed",
+ "validation_errors": errors,
+ }
+ }),
+ ),
+ };
+
+ (status, Json(json_body)).into_response()
+ }
+}
+
pub async fn register(
conn: DatabaseConnection,
params: Json<RegistrationParams>,
-) -> Json<UserData> {
+) -> Result<Json<UserData>, RegistrationError> {
+ params.validate(&conn)?;
+
let credentials = Credentials {
username: &params.username,
password: &params.password,
};
- let user = users::create_user(&credentials, &conn).unwrap();
- Json(user.into())
+ let user = users::create_user(&credentials, &conn)?;
+ Ok(Json(user.into()))
}
#[derive(Deserialize)]