X-Git-Url: http://git.euphorik.ch/?a=blobdiff_plain;f=backend%2Fsrc%2Fdata%2Fdb.rs;h=036d044139cda1c56bd86e4b4a7f6a9998cb25c7;hb=3f8d940c14a1cfe10e4b923b9c6ce7bff0913e7a;hp=0014f7f2bf51b16e26ec81a1212d6870d6e7f8a0;hpb=d28e765e39e70ad2ab9a42885c786d5d8ba9ba40;p=recipes.git diff --git a/backend/src/data/db.rs b/backend/src/data/db.rs index 0014f7f..036d044 100644 --- a/backend/src/data/db.rs +++ b/backend/src/data/db.rs @@ -1,16 +1,22 @@ -use std::{fmt, fs::{self, File}, path::Path, io::Read}; +use std::{ + fmt, + fs::{self, File}, + io::Read, + path::Path, +}; -use itertools::Itertools; use chrono::{prelude::*, Duration}; -use rusqlite::{named_params, OptionalExtension, params, Params}; -use r2d2::Pool; +use itertools::Itertools; +use r2d2::{Pool, PooledConnection}; use r2d2_sqlite::SqliteConnectionManager; use rand::distributions::{Alphanumeric, DistString}; +use rusqlite::{named_params, params, OptionalExtension, Params}; -use crate::{consts, user}; -use crate::hash::{hash, verify_password}; -use crate::model; -use crate::user::*; +use crate::{ + consts, + hash::{hash, verify_password}, + model, +}; const CURRENT_DB_VERSION: u32 = 1; @@ -28,15 +34,15 @@ impl fmt::Display for DBError { } } -impl std::error::Error for DBError { } +impl std::error::Error for DBError {} -impl From for DBError { +impl From for DBError { fn from(error: rusqlite::Error) -> Self { DBError::SqliteError(error) } } -impl From for DBError { +impl From for DBError { fn from(error: r2d2::Error) -> Self { DBError::R2d2Error(error) } @@ -60,7 +66,7 @@ pub enum SignUpResult { pub enum ValidationResult { UnknownUser, ValidationExpired, - Ok(String, i32), // Returns token and user id. + Ok(String, i64), // Returns token and user id. } #[derive(Debug)] @@ -68,19 +74,18 @@ pub enum SignInResult { UserNotFound, WrongPassword, AccountNotValidated, - Ok(String, i32), // Returns token and user id. + Ok(String, i64), // Returns token and user id. } #[derive(Debug)] pub enum AuthenticationResult { NotValidToken, - Ok(i32), // Returns user id. + Ok(i64), // Returns user id. } #[derive(Clone)] pub struct Connection { - //con: rusqlite::Connection - pool: Pool + pool: Pool, } impl Connection { @@ -106,26 +111,40 @@ impl Connection { fn create_connection(manager: SqliteConnectionManager) -> Result { let pool = r2d2::Pool::new(manager).unwrap(); let connection = Connection { pool }; - connection.create_or_update()?; + connection.create_or_update_db()?; Ok(connection) } + fn get(&self) -> Result> { + let con = self.pool.get()?; + con.pragma_update(None, "synchronous", "NORMAL")?; + Ok(con) + } + /// Called after the connection has been established for creating or updating the database. /// The 'Version' table tracks the current state of the database. - fn create_or_update(&self) -> Result<()> { + fn create_or_update_db(&self) -> Result<()> { // Check the Database version. - let mut con = self.pool.get()?; + let mut con = self.get()?; + con.pragma_update(None, "journal_mode", "WAL")?; + let tx = con.transaction()?; // Version 0 corresponds to an empty database. let mut version = { match tx.query_row( - "SELECT [name] FROM [sqlite_master] WHERE [type] = 'table' AND [name] = 'Version'", + "SELECT [name] FROM [sqlite_master] WHERE [type] = 'table' AND [name] = 'Version'", + [], + |row| row.get::(0), + ) { + Ok(_) => tx + .query_row( + "SELECT [version] FROM [Version] ORDER BY [id] DESC", [], - |row| row.get::(0) - ) { - Ok(_) => tx.query_row("SELECT [version] FROM [Version] ORDER BY [id] DESC", [], |row| row.get(0)).unwrap_or_default(), - Err(_) => 0 + |row| row.get(0), + ) + .unwrap_or_default(), + Err(_) => 0, } }; @@ -146,7 +165,12 @@ impl Connection { } fn update_version(to_version: u32, tx: &rusqlite::Transaction) -> Result<()> { - tx.execute("INSERT INTO [Version] ([version], [datetime]) VALUES (?1, datetime('now'))", [to_version]).map(|_| ()).map_err(DBError::from) + tx.execute( + "INSERT INTO [Version] ([version], [datetime]) VALUES (?1, datetime('now'))", + [to_version], + ) + .map(|_| ()) + .map_err(DBError::from) } fn ok(updated: bool) -> Result { @@ -166,30 +190,27 @@ impl Connection { } // Version 1 doesn't exist yet. - 2 => - ok(false), + 2 => ok(false), - v => - Err(DBError::UnsupportedVersion(v)), + v => Err(DBError::UnsupportedVersion(v)), } } - pub fn get_all_recipe_titles(&self) -> Result> { - let con = self.pool.get()?; + pub fn get_all_recipe_titles(&self) -> Result> { + let con = self.get()?; let mut stmt = con.prepare("SELECT [id], [title] FROM [Recipe] ORDER BY [title]")?; - let titles: std::result::Result, rusqlite::Error> = - stmt.query_map([], |row| { - Ok((row.get("id")?, row.get("title")?)) - })?.collect(); + let titles: std::result::Result, rusqlite::Error> = stmt + .query_map([], |row| Ok((row.get("id")?, row.get("title")?)))? + .collect(); titles.map_err(DBError::from) } /* Not used for the moment. pub fn get_all_recipes(&self) -> Result> { - let con = self.pool.get()?; + let con = self.get()?; let mut stmt = con.prepare("SELECT [id], [title] FROM [Recipe] ORDER BY [title]")?; let recipes = stmt.query_map([], |row| { @@ -198,17 +219,27 @@ impl Connection { Ok(recipes) } */ - pub fn get_recipe(&self, id: i32) -> Result { - let con = self.pool.get()?; - con.query_row("SELECT [id], [title], [description] FROM [Recipe] WHERE [id] = ?1", [id], |row| { - Ok(model::Recipe::new(row.get("id")?, row.get("title")?, row.get("description")?)) - }).map_err(DBError::from) + pub fn get_recipe(&self, id: i64) -> Result { + let con = self.get()?; + con.query_row( + "SELECT [id], [user_id], [title], [description] FROM [Recipe] WHERE [id] = ?1", + [id], + |row| { + Ok(model::Recipe::new( + row.get("id")?, + row.get("user_id")?, + row.get("title")?, + row.get("description")?, + )) + }, + ) + .map_err(DBError::from) } - pub fn get_user_login_info(&self, token: &str) -> Result { - let con = self.pool.get()?; + pub fn get_user_login_info(&self, token: &str) -> Result { + let con = self.get()?; con.query_row("SELECT [last_login_datetime], [ip], [user_agent] FROM [UserLoginToken] WHERE [token] = ?1", [token], |r| { - Ok(UserLoginInfo { + Ok(model::UserLoginInfo { last_login_datetime: r.get("last_login_datetime")?, ip: r.get("ip")?, user_agent: r.get("user_agent")?, @@ -216,126 +247,259 @@ impl Connection { }).map_err(DBError::from) } - pub fn load_user(&self, user_id: i32) -> Result { - let con = self.pool.get()?; - con.query_row("SELECT [email] FROM [User] WHERE [id] = ?1", [user_id], |r| { - Ok(User { - email: r.get("email")?, - }) - }).map_err(DBError::from) + pub fn load_user(&self, user_id: i64) -> Result { + let con = self.get()?; + con.query_row( + "SELECT [email] FROM [User] WHERE [id] = ?1", + [user_id], + |r| { + Ok(model::User { + id: user_id, + email: r.get("email")?, + }) + }, + ) + .map_err(DBError::from) } pub fn sign_up(&self, email: &str, password: &str) -> Result { self.sign_up_with_given_time(email, password, Utc::now()) } - fn sign_up_with_given_time(&self, email: &str, password: &str, datetime: DateTime) -> Result { - let mut con = self.pool.get()?; + fn sign_up_with_given_time( + &self, + email: &str, + password: &str, + datetime: DateTime, + ) -> Result { + let mut con = self.get()?; let tx = con.transaction()?; - let token = - match tx.query_row("SELECT [id], [validation_token] FROM [User] WHERE [email] = ?1", [email], |r| { - Ok((r.get::<&str, i32>("id")?, r.get::<&str, Option>("validation_token")?)) - }).optional()? { - Some((id, validation_token)) => { - if validation_token.is_none() { - return Ok(SignUpResult::UserAlreadyExists) - } - let token = generate_token(); - let hashed_password = hash(password).map_err(|e| DBError::from_dyn_error(e))?; - tx.execute("UPDATE [User] SET [validation_token] = ?2, [creation_datetime] = ?3, [password] = ?4 WHERE [id] = ?1", params![id, token, datetime, hashed_password])?; - token - }, - None => { - let token = generate_token(); - let hashed_password = hash(password).map_err(|e| DBError::from_dyn_error(e))?; - tx.execute("INSERT INTO [User] ([email], [validation_token], [creation_datetime], [password]) VALUES (?1, ?2, ?3, ?4)", params![email, token, datetime, hashed_password])?; - token + let token = match tx + .query_row( + "SELECT [id], [validation_token] FROM [User] WHERE [email] = ?1", + [email], + |r| { + Ok(( + r.get::<&str, i64>("id")?, + r.get::<&str, Option>("validation_token")?, + )) }, - }; + ) + .optional()? + { + Some((id, validation_token)) => { + if validation_token.is_none() { + return Ok(SignUpResult::UserAlreadyExists); + } + let token = generate_token(); + let hashed_password = hash(password).map_err(|e| DBError::from_dyn_error(e))?; + tx.execute( + "UPDATE [User] + SET [validation_token] = ?2, [creation_datetime] = ?3, [password] = ?4 + WHERE [id] = ?1", + params![id, token, datetime, hashed_password], + )?; + token + } + None => { + let token = generate_token(); + let hashed_password = hash(password).map_err(|e| DBError::from_dyn_error(e))?; + tx.execute( + "INSERT INTO [User] + ([email], [validation_token], [creation_datetime], [password]) + VALUES (?1, ?2, ?3, ?4)", + params![email, token, datetime, hashed_password], + )?; + token + } + }; tx.commit()?; Ok(SignUpResult::UserCreatedWaitingForValidation(token)) } - pub fn validation(&self, token: &str, validation_time: Duration, ip: &str, user_agent: &str) -> Result { - let mut con = self.pool.get()?; + pub fn validation( + &self, + token: &str, + validation_time: Duration, + ip: &str, + user_agent: &str, + ) -> Result { + let mut con = self.get()?; let tx = con.transaction()?; - let user_id = - match tx.query_row("SELECT [id], [creation_datetime] FROM [User] WHERE [validation_token] = ?1", [token], |r| { - Ok((r.get::<&str, i32>("id")?, r.get::<&str, DateTime>("creation_datetime")?)) - }).optional()? { - Some((id, creation_datetime)) => { - if Utc::now() - creation_datetime > validation_time { - return Ok(ValidationResult::ValidationExpired) - } - tx.execute("UPDATE [User] SET [validation_token] = NULL WHERE [id] = ?1", [id])?; - id - }, - None => { - return Ok(ValidationResult::UnknownUser) + let user_id = match tx + .query_row( + "SELECT [id], [creation_datetime] FROM [User] WHERE [validation_token] = ?1", + [token], + |r| { + Ok(( + r.get::<&str, i64>("id")?, + r.get::<&str, DateTime>("creation_datetime")?, + )) }, - }; + ) + .optional()? + { + Some((id, creation_datetime)) => { + if Utc::now() - creation_datetime > validation_time { + return Ok(ValidationResult::ValidationExpired); + } + tx.execute( + "UPDATE [User] SET [validation_token] = NULL WHERE [id] = ?1", + [id], + )?; + id + } + None => return Ok(ValidationResult::UnknownUser), + }; let token = Connection::create_login_token(&tx, user_id, ip, user_agent)?; tx.commit()?; Ok(ValidationResult::Ok(token, user_id)) } - pub fn sign_in(&self, email: &str, password: &str, ip: &str, user_agent: &str) -> Result { - let mut con = self.pool.get()?; + pub fn sign_in( + &self, + email: &str, + password: &str, + ip: &str, + user_agent: &str, + ) -> Result { + let mut con = self.get()?; let tx = con.transaction()?; - match tx.query_row("SELECT [id], [password], [validation_token] FROM [User] WHERE [email] = ?1", [email], |r| { - Ok((r.get::<&str, i32>("id")?, r.get::<&str, String>("password")?, r.get::<&str, Option>("validation_token")?)) - }).optional()? { + match tx + .query_row( + "SELECT [id], [password], [validation_token] FROM [User] WHERE [email] = ?1", + [email], + |r| { + Ok(( + r.get::<&str, i64>("id")?, + r.get::<&str, String>("password")?, + r.get::<&str, Option>("validation_token")?, + )) + }, + ) + .optional()? + { Some((id, stored_password, validation_token)) => { if validation_token.is_some() { Ok(SignInResult::AccountNotValidated) - } else if verify_password(password, &stored_password).map_err(DBError::from_dyn_error)? { + } else if verify_password(password, &stored_password) + .map_err(DBError::from_dyn_error)? + { let token = Connection::create_login_token(&tx, id, ip, user_agent)?; tx.commit()?; Ok(SignInResult::Ok(token, id)) } else { Ok(SignInResult::WrongPassword) } - }, - None => { - Ok(SignInResult::UserNotFound) - }, + } + None => Ok(SignInResult::UserNotFound), } } - pub fn authentication(&self, token: &str, ip: &str, user_agent: &str) -> Result { - let mut con = self.pool.get()?; + pub fn authentication( + &self, + token: &str, + ip: &str, + user_agent: &str, + ) -> Result { + let mut con = self.get()?; let tx = con.transaction()?; - match tx.query_row("SELECT [id], [user_id] FROM [UserLoginToken] WHERE [token] = ?1", [token], |r| { - Ok((r.get::<&str, i32>("id")?, r.get::<&str, i32>("user_id")?)) - }).optional()? { + match tx + .query_row( + "SELECT [id], [user_id] FROM [UserLoginToken] WHERE [token] = ?1", + [token], + |r| Ok((r.get::<&str, i64>("id")?, r.get::<&str, i64>("user_id")?)), + ) + .optional()? + { Some((login_id, user_id)) => { - tx.execute("UPDATE [UserLoginToken] SET [last_login_datetime] = ?2, [ip] = ?3, [user_agent] = ?4 WHERE [id] = ?1", params![login_id, Utc::now(), ip, user_agent])?; + tx.execute( + "UPDATE [UserLoginToken] + SET [last_login_datetime] = ?2, [ip] = ?3, [user_agent] = ?4 + WHERE [id] = ?1", + params![login_id, Utc::now(), ip, user_agent], + )?; tx.commit()?; Ok(AuthenticationResult::Ok(user_id)) - }, - None => - Ok(AuthenticationResult::NotValidToken) + } + None => Ok(AuthenticationResult::NotValidToken), } } pub fn sign_out(&self, token: &str) -> Result<()> { - let mut con = self.pool.get()?; + let mut con = self.get()?; let tx = con.transaction()?; - match tx.query_row("SELECT [id] FROM [UserLoginToken] WHERE [token] = ?1", [token], |r| { - Ok(r.get::<&str, i32>("id")?) - }).optional()? { + match tx + .query_row( + "SELECT [id] FROM [UserLoginToken] WHERE [token] = ?1", + [token], + |r| Ok(r.get::<&str, i64>("id")?), + ) + .optional()? + { Some(login_id) => { - tx.execute("DELETE FROM [UserLoginToken] WHERE [id] = ?1", params![login_id])?; + tx.execute( + "DELETE FROM [UserLoginToken] WHERE [id] = ?1", + params![login_id], + )?; tx.commit()? - }, + } None => (), } Ok(()) } + pub fn create_recipe(&self, user_id: i64) -> Result { + let con = self.get()?; + + // Verify if an empty recipe already exists. Returns its id if one exists. + match con + .query_row( + "SELECT [Recipe].[id] FROM [Recipe] + INNER JOIN [Image] ON [Image].[recipe_id] = [Recipe].[id] + INNER JOIN [Group] ON [Group].[recipe_id] = [Recipe].[id] + WHERE [Recipe].[user_id] = ?1 + AND [Recipe].[estimate_time] = NULL + AND [Recipe].[description] = NULL", + [user_id], + |r| Ok(r.get::<&str, i64>("id")?), + ) + .optional()? + { + Some(recipe_id) => Ok(recipe_id), + None => { + con.execute( + "INSERT INTO [Recipe] ([user_id], [title]) VALUES (?1, '')", + [user_id], + )?; + Ok(con.last_insert_rowid()) + } + } + } + + pub fn set_recipe_title(&self, recipe_id: i64, title: &str) -> Result<()> { + let con = self.get()?; + con.execute( + "UPDATE [Recipe] SET [title] = ?2 WHERE [id] = ?1", + params![recipe_id, title], + ) + .map(|_n| ()) + .map_err(DBError::from) + } + + pub fn set_recipe_description(&self, recipe_id: i64, description: &str) -> Result<()> { + let con = self.get()?; + con.execute( + "UPDATE [Recipe] SET [description] = ?2 WHERE [id] = ?1", + params![recipe_id, description], + ) + .map(|_n| ()) + .map_err(DBError::from) + } + /// Execute a given SQL file. pub fn execute_file + fmt::Display>(&self, file: P) -> Result<()> { - let con = self.pool.get()?; + let con = self.get()?; let sql = load_sql_file(file)?; con.execute_batch(&sql).map_err(DBError::from) } @@ -343,22 +507,44 @@ impl Connection { /// Execute any SQL statement. /// Mainly used for testing. pub fn execute_sql(&self, sql: &str, params: P) -> Result { - let con = self.pool.get()?; + let con = self.get()?; con.execute(sql, params).map_err(DBError::from) } // Return the token. - fn create_login_token(tx: &rusqlite::Transaction, user_id: i32, ip: &str, user_agent: &str) -> Result { + fn create_login_token( + tx: &rusqlite::Transaction, + user_id: i64, + ip: &str, + user_agent: &str, + ) -> Result { let token = generate_token(); - tx.execute("INSERT INTO [UserLoginToken] ([user_id], [last_login_datetime], [token], [ip], [user_agent]) VALUES (?1, ?2, ?3, ?4, ?5)", params![user_id, Utc::now(), token, ip, user_agent])?; + tx.execute( + "INSERT INTO [UserLoginToken] + ([user_id], [last_login_datetime], [token], [ip], [user_agent]) + VALUES (?1, ?2, ?3, ?4, ?5)", + params![user_id, Utc::now(), token, ip, user_agent], + )?; Ok(token) } } fn load_sql_file + fmt::Display>(sql_file: P) -> Result { - let mut file = File::open(&sql_file).map_err(|err| DBError::Other(format!("Cannot open SQL file ({}): {}", &sql_file, err.to_string())))?; + let mut file = File::open(&sql_file).map_err(|err| { + DBError::Other(format!( + "Cannot open SQL file ({}): {}", + &sql_file, + err.to_string() + )) + })?; let mut sql = String::new(); - file.read_to_string(&mut sql).map_err(|err| DBError::Other(format!("Cannot read SQL file ({}) : {}", &sql_file, err.to_string())))?; + file.read_to_string(&mut sql).map_err(|err| { + DBError::Other(format!( + "Cannot read SQL file ({}) : {}", + &sql_file, + err.to_string() + )) + })?; Ok(sql) } @@ -369,11 +555,12 @@ fn generate_token() -> String { #[cfg(test)] mod tests { use super::*; + use rusqlite::{ffi, types::Value, Error, ErrorCode}; #[test] fn sign_up() -> Result<()> { let connection = Connection::new_in_memory()?; - match connection.sign_up("paul@test.org", "12345")? { + match connection.sign_up("paul@atreides.com", "12345")? { SignUpResult::UserCreatedWaitingForValidation(_) => (), // Nominal case. other => panic!("{:?}", other), } @@ -384,16 +571,17 @@ mod tests { fn sign_up_to_an_already_existing_user() -> Result<()> { let connection = Connection::new_in_memory()?; connection.execute_sql(" - INSERT INTO [User] ([id], [email], [name], [password], [creation_datetime], [validation_token]) + INSERT INTO + [User] ([id], [email], [name], [password], [creation_datetime], [validation_token]) VALUES ( 1, - 'paul@test.org', + 'paul@atreides.com', 'paul', '$argon2id$v=19$m=4096,t=3,p=1$1vtXcacYjUHZxMrN6b2Xng$wW8Z59MIoMcsIljnjHmxn3EBcc5ymEySZPUVXHlRxcY', 0, NULL );", [])?; - match connection.sign_up("paul@test.org", "12345")? { + match connection.sign_up("paul@atreides.com", "12345")? { SignUpResult::UserAlreadyExists => (), // Nominal case. other => panic!("{:?}", other), } @@ -404,7 +592,7 @@ mod tests { fn sign_up_and_sign_in_without_validation() -> Result<()> { let connection = Connection::new_in_memory()?; - let email = "paul@test.org"; + let email = "paul@atreides.com"; let password = "12345"; match connection.sign_up(email, password)? { @@ -425,16 +613,17 @@ mod tests { let connection = Connection::new_in_memory()?; let token = generate_token(); connection.execute_sql(" - INSERT INTO [User] ([id], [email], [name], [password], [creation_datetime], [validation_token]) + INSERT INTO + [User] ([id], [email], [name], [password], [creation_datetime], [validation_token]) VALUES ( 1, - 'paul@test.org', + 'paul@atreides.com', 'paul', '$argon2id$v=19$m=4096,t=3,p=1$1vtXcacYjUHZxMrN6b2Xng$wW8Z59MIoMcsIljnjHmxn3EBcc5ymEySZPUVXHlRxcY', 0, :token );", named_params! { ":token": token })?; - match connection.sign_up("paul@test.org", "12345")? { + match connection.sign_up("paul@atreides.com", "12345")? { SignUpResult::UserCreatedWaitingForValidation(_) => (), // Nominal case. other => panic!("{:?}", other), } @@ -444,12 +633,16 @@ mod tests { #[test] fn sign_up_then_send_validation_at_time() -> Result<()> { let connection = Connection::new_in_memory()?; - let validation_token = - match connection.sign_up("paul@test.org", "12345")? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; - match connection.validation(&validation_token, Duration::hours(1), "127.0.0.1", "Mozilla/5.0")? { + let validation_token = match connection.sign_up("paul@atreides.com", "12345")? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; + match connection.validation( + &validation_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla/5.0", + )? { ValidationResult::Ok(_, _) => (), // Nominal case. other => panic!("{:?}", other), } @@ -459,12 +652,20 @@ mod tests { #[test] fn sign_up_then_send_validation_too_late() -> Result<()> { let connection = Connection::new_in_memory()?; - let validation_token = - match connection.sign_up_with_given_time("paul@test.org", "12345", Utc::now() - Duration::days(1))? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; - match connection.validation(&validation_token, Duration::hours(1), "127.0.0.1", "Mozilla/5.0")? { + let validation_token = match connection.sign_up_with_given_time( + "paul@atreides.com", + "12345", + Utc::now() - Duration::days(1), + )? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; + match connection.validation( + &validation_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla/5.0", + )? { ValidationResult::ValidationExpired => (), // Nominal case. other => panic!("{:?}", other), } @@ -474,13 +675,17 @@ mod tests { #[test] fn sign_up_then_send_validation_with_bad_token() -> Result<()> { let connection = Connection::new_in_memory()?; - let _validation_token = - match connection.sign_up("paul@test.org", "12345")? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; + let _validation_token = match connection.sign_up("paul@atreides.com", "12345")? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; let random_token = generate_token(); - match connection.validation(&random_token, Duration::hours(1), "127.0.0.1", "Mozilla/5.0")? { + match connection.validation( + &random_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla/5.0", + )? { ValidationResult::UnknownUser => (), // Nominal case. other => panic!("{:?}", other), } @@ -491,18 +696,22 @@ mod tests { fn sign_up_then_send_validation_then_sign_in() -> Result<()> { let connection = Connection::new_in_memory()?; - let email = "paul@test.org"; + let email = "paul@atreides.com"; let password = "12345"; // Sign up. - let validation_token = - match connection.sign_up(email, password)? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; + let validation_token = match connection.sign_up(email, password)? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; // Validation. - match connection.validation(&validation_token, Duration::hours(1), "127.0.0.1", "Mozilla/5.0")? { + match connection.validation( + &validation_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla/5.0", + )? { ValidationResult::Ok(_, _) => (), other => panic!("{:?}", other), }; @@ -520,18 +729,22 @@ mod tests { fn sign_up_then_send_validation_then_authentication() -> Result<()> { let connection = Connection::new_in_memory()?; - let email = "paul@test.org"; + let email = "paul@atreides.com"; let password = "12345"; // Sign up. - let validation_token = - match connection.sign_up(email, password)? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; + let validation_token = match connection.sign_up(email, password)? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; // Validation. - let (authentication_token, user_id) = match connection.validation(&validation_token, Duration::hours(1), "127.0.0.1", "Mozilla")? { + let (authentication_token, user_id) = match connection.validation( + &validation_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla", + )? { ValidationResult::Ok(token, user_id) => (token, user_id), other => panic!("{:?}", other), }; @@ -560,22 +773,25 @@ mod tests { fn sign_up_then_send_validation_then_sign_out_then_sign_in() -> Result<()> { let connection = Connection::new_in_memory()?; - let email = "paul@test.org"; + let email = "paul@atreides.com"; let password = "12345"; // Sign up. - let validation_token = - match connection.sign_up(email, password)? { - SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. - other => panic!("{:?}", other), - }; + let validation_token = match connection.sign_up(email, password)? { + SignUpResult::UserCreatedWaitingForValidation(token) => token, // Nominal case. + other => panic!("{:?}", other), + }; // Validation. - let (authentication_token_1, user_id_1) = - match connection.validation(&validation_token, Duration::hours(1), "127.0.0.1", "Mozilla")? { - ValidationResult::Ok(token, user_id) => (token, user_id), - other => panic!("{:?}", other), - }; + let (authentication_token_1, user_id_1) = match connection.validation( + &validation_token, + Duration::hours(1), + "127.0.0.1", + "Mozilla", + )? { + ValidationResult::Ok(token, user_id) => (token, user_id), + other => panic!("{:?}", other), + }; // Check user login information. let user_login_info_1 = connection.get_user_login_info(&authentication_token_1)?; @@ -603,4 +819,47 @@ mod tests { Ok(()) } + + #[test] + fn create_a_new_recipe_then_update_its_title() -> Result<()> { + let connection = Connection::new_in_memory()?; + + connection.execute_sql( + "INSERT INTO [User] + ([id], [email], [name], [password], [creation_datetime], [validation_token]) + VALUES (?1, ?2, ?3, ?4, ?5, ?6)", + params![ + 1, + "paul@atreides.com", + "paul", + "$argon2id$v=19$m=4096,t=3,p=1$G4fjepS05MkRbTqEImUdYg$GGziE8uVQe1L1oFHk37lBno10g4VISnVqynSkLCH3Lc", + "2022-11-29 22:05:04.121407300+00:00", + Value::Null, + ] + )?; + + match connection.create_recipe(2) { + Err(DBError::SqliteError(Error::SqliteFailure( + ffi::Error { + code: ErrorCode::ConstraintViolation, + extended_code: _, + }, + Some(_), + ))) => (), // Nominal case. + other => panic!( + "Creating a recipe with an inexistant user must fail: {:?}", + other + ), + } + + let recipe_id = connection.create_recipe(1)?; + assert_eq!(recipe_id, 1); + + connection.set_recipe_title(recipe_id, "Crêpe")?; + + let recipe = connection.get_recipe(recipe_id)?; + assert_eq!(recipe.title, "Crêpe".to_string()); + + Ok(()) + } }