use chrono::{NaiveDateTime, Utc}; use serde_json::Value as JsonValue; use uuid::Uuid; use crypto; use CONFIG; #[derive(Debug, Identifiable, Queryable, Insertable)] #[table_name = "users"] #[primary_key(uuid)] pub struct User { pub uuid: String, pub created_at: NaiveDateTime, pub updated_at: NaiveDateTime, pub email: String, pub name: String, pub password_hash: Vec, pub salt: Vec, pub password_iterations: i32, pub password_hint: Option, pub key: String, pub private_key: Option, pub public_key: Option, #[column_name = "totp_secret"] _totp_secret: Option, pub totp_recover: Option, pub security_stamp: String, pub equivalent_domains: String, pub excluded_globals: String, } /// Local methods impl User { pub fn new(mail: String, key: String, password: String) -> Self { let now = Utc::now().naive_utc(); let email = mail.to_lowercase(); let iterations = CONFIG.password_iterations; let salt = crypto::get_random_64(); let password_hash = crypto::hash_password(password.as_bytes(), &salt, iterations as u32); Self { uuid: Uuid::new_v4().to_string(), created_at: now, updated_at: now, name: email.clone(), email, key, password_hash, salt, password_iterations: iterations, security_stamp: Uuid::new_v4().to_string(), password_hint: None, private_key: None, public_key: None, _totp_secret: None, totp_recover: None, equivalent_domains: "[]".to_string(), excluded_globals: "[]".to_string(), } } pub fn check_valid_password(&self, password: &str) -> bool { crypto::verify_password_hash(password.as_bytes(), &self.salt, &self.password_hash, self.password_iterations as u32) } pub fn check_valid_recovery_code(&self, recovery_code: &str) -> bool { if let Some(ref totp_recover) = self.totp_recover { recovery_code == totp_recover.to_lowercase() } else { false } } pub fn set_password(&mut self, password: &str) { self.password_hash = crypto::hash_password(password.as_bytes(), &self.salt, self.password_iterations as u32); self.reset_security_stamp(); } pub fn reset_security_stamp(&mut self) { self.security_stamp = Uuid::new_v4().to_string(); } } use diesel; use diesel::prelude::*; use db::DbConn; use db::schema::users; /// Database methods impl User { pub fn to_json(&self, conn: &DbConn) -> JsonValue { use super::UserOrganization; use super::TwoFactor; let orgs = UserOrganization::find_by_user(&self.uuid, conn); let orgs_json: Vec = orgs.iter().map(|c| c.to_json(&conn)).collect(); let twofactor_enabled = TwoFactor::find_by_user(&self.uuid, conn).len() > 0; json!({ "Id": self.uuid, "Name": self.name, "Email": self.email, "EmailVerified": true, "Premium": true, "MasterPasswordHint": self.password_hint, "Culture": "en-US", "TwoFactorEnabled": twofactor_enabled, "Key": self.key, "PrivateKey": self.private_key, "SecurityStamp": self.security_stamp, "Organizations": orgs_json, "Object": "profile" }) } pub fn save(&mut self, conn: &DbConn) -> bool { self.updated_at = Utc::now().naive_utc(); match diesel::replace_into(users::table) // Insert or update .values(&*self) .execute(&**conn) { Ok(1) => true, // One row inserted _ => false, } } pub fn delete(self, conn: &DbConn) -> bool { match diesel::delete(users::table.filter( users::uuid.eq(self.uuid))) .execute(&**conn) { Ok(1) => true, // One row deleted _ => false, } } pub fn find_by_mail(mail: &str, conn: &DbConn) -> Option { let lower_mail = mail.to_lowercase(); users::table .filter(users::email.eq(lower_mail)) .first::(&**conn).ok() } pub fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option { users::table .filter(users::uuid.eq(uuid)) .first::(&**conn).ok() } }