54 lines
1.3 KiB
Rust
54 lines
1.3 KiB
Rust
use crate::*;
|
|
use sqlx::query;
|
|
|
|
use argon2::{
|
|
password_hash::{rand_core::OsRng, PasswordHasher, SaltString},
|
|
Argon2,
|
|
};
|
|
|
|
use jwt::SignWithKey;
|
|
use util::auth::JWTClaims;
|
|
|
|
#[derive(Serialize, Deserialize, ToSchema)]
|
|
pub struct SignupBody {
|
|
real_name: String,
|
|
username: String,
|
|
email: String,
|
|
password: String,
|
|
}
|
|
|
|
/// Sign up
|
|
#[utoipa::path(post, path = "/signup", responses((status = OK, body = String)), tag = super::AUTH_TAG)]
|
|
pub async fn signup(
|
|
State(state): State<AppState>,
|
|
Json(body): Json<SignupBody>,
|
|
) -> Result<String, AppError> {
|
|
let salt = SaltString::generate(&mut OsRng);
|
|
let argon2 = Argon2::default();
|
|
|
|
let hash = argon2
|
|
.hash_password(body.password.as_bytes(), &salt)
|
|
.expect("Password hashing failed")
|
|
.to_string();
|
|
|
|
let user = query!(
|
|
"INSERT INTO users (real_name, username, email, password_hash)
|
|
VALUES ($1, $2, $3, $4)
|
|
RETURNING id, real_name, username, email, password_hash, is_admin, created_at",
|
|
body.real_name,
|
|
body.username,
|
|
body.email,
|
|
hash
|
|
)
|
|
.fetch_one(&*state.db)
|
|
.await?;
|
|
|
|
let claims = JWTClaims::new(user.id, user.username, user.real_name, user.email);
|
|
|
|
let token_str = claims
|
|
.sign_with_key(&state.jwt_key)
|
|
.context("Failed to sign JWT")?;
|
|
|
|
Ok(token_str)
|
|
}
|