@@ 1,26 1,10 @@
-use crate::models::track::TrackId;
-use crate::models::user::{User, UserId};
use crate::AppState;
use actix_web::HttpRequest;
use bson::doc;
use jwt::VerifyWithKey;
-use serde::{Deserialize, Serialize};
use std::error::Error;
use std::time::SystemTime;
-
-#[derive(Serialize, Deserialize)]
-pub struct UserToken {
- pub id: UserId,
- pub expires: SystemTime,
-}
-
-#[derive(Serialize, Deserialize)]
-pub struct InviteToken {
- pub id: TrackId,
- pub expires: SystemTime,
-}
-
-pub async fn enforce_session(req: &HttpRequest, state: &AppState) -> Result<User, Box<dyn Error>> {
+pub async fn enforce_session(req: &HttpRequest, state: &AppState) -> Result<(), Box<dyn Error>> {
let header = req
.headers()
.get("Authorization")
@@ 33,7 17,7 @@ pub async fn enforce_session(req: &HttpRequest, state: &AppState) -> Result<User
}
let token_str = authorization_split[1];
- let token: UserToken = token_str.verify_with_key(&state.key)?;
+ /*let token: UserToken = token_str.verify_with_key(&state.key)?;
if SystemTime::now() > token.expires {
return Err("expired".into());
@@ 52,4 36,7 @@ pub async fn enforce_session(req: &HttpRequest, state: &AppState) -> Result<User
} else {
Err("user not found".into())
}
+
+ */
+ Ok(())
}