summaryrefslogtreecommitdiffstats
path: root/src/error.rs
blob: 16e341f662346c31103e8842d7d88b30fc49d626 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
use axum::http::StatusCode;

pub type Result<T, E = Error> = std::result::Result<T, E>;

#[derive(thiserror::Error, Debug)]
pub enum Error {
    #[error("IO error: {0}")]
    IO(#[from] std::io::Error),

    #[error("Config file error: {0}")]
    Toml(#[from] toml::de::Error),

    #[error("Config error: {0}")]
    Config(String),

    #[error("Axum error: {0}")]
    Axum(#[from] axum::Error),

    #[error("Http error: {0}")]
    Http(#[from] axum::http::Error),

    #[error("Header error: {0}")]
    Header(#[from] axum::http::header::InvalidHeaderValue),

    #[error("Json error: {0}")]
    Json(#[from] serde_json::Error),

    #[error("Time error: {0}")]
    Time(#[from] time::error::ComponentRange),

    #[error("JSON web token error: {0}")]
    Jwt(#[from] jsonwebtoken::errors::Error),

    #[error("Token error: {0}")]
    Token(#[from] axum_extra::headers::authorization::InvalidBearerToken),

    #[error("Database error: {0}")]
    Sqlx(#[from] sqlx::Error),

    #[error("Migration error: {0}")]
    Migration(#[from] sqlx::migrate::MigrateError),

    #[error("Failed to hash password: {0}")]
    PasswordHash(#[source] argon2::password_hash::Error),

    #[error("User not found")]
    UserNotFound,

    #[error("User with that email already exists")]
    EmailExists,

    #[error("Invalid email: {0}")]
    EmailInvalid(#[from] email_address::Error),

    #[error("Invalid email or password")]
    Authorization(#[from] AuthError),

    #[error("{0}")]
    Other(String),
}

impl From<argon2::password_hash::Error> for Error {
    fn from(value: argon2::password_hash::Error) -> Self {
        match value {
            argon2::password_hash::Error::Password => Self::Authorization(AuthError::LoginInvalid),
            _ => Self::PasswordHash(value),
        }
    }
}

impl axum::response::IntoResponse for Error {
    fn into_response(self) -> axum::response::Response {
        // TODO: implement [rfc7807](https://www.rfc-editor.org/rfc/rfc7807.html)

        let status = match &self {
            Self::UserNotFound => StatusCode::NOT_FOUND,
            Self::EmailExists => StatusCode::CONFLICT,
            Self::EmailInvalid(_) => StatusCode::UNPROCESSABLE_ENTITY,
            Self::Authorization(_) => StatusCode::UNAUTHORIZED,
            _ => StatusCode::INTERNAL_SERVER_ERROR,
        };

        (status, self.to_string()).into_response()
    }
}

#[derive(thiserror::Error, Debug)]
pub enum AuthError {
    #[error("Invalid email or password")]
    LoginInvalid,

    #[error("Authorization token not found")]
    JwtNotFound,

    #[error("The user belonging to this token no longer exists")]
    UserNotFound,

    #[error("Invalid authorization token")]
    JwtValidation(#[from] jsonwebtoken::errors::Error),

    #[error("Invalid refresh token")]
    RefreshTokenNotFound,
}

impl axum::response::IntoResponse for AuthError {
    fn into_response(self) -> axum::response::Response {
        StatusCode::UNAUTHORIZED.into_response()
    }
}