aboutsummaryrefslogtreecommitdiffstats
path: root/crates/api-auth/src/error.rs
blob: 86da20cfc59480f7cb4895267a1e2fc6b1de72cc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
use async_session::base64;
use thiserror::Error;

#[derive(Debug, Error)]
pub enum AuthClientError {
    #[error("missing field: {0}")]
    MissingField(&'static str),
    #[error("invalid auth url: {0}")]
    InvalidAuthUrl(#[from] oauth2::url::ParseError),
    #[error("invalid token url: {0}")]
    InvalidTokenUrl(#[source] oauth2::url::ParseError),
    #[error("invalid redirect url: {0}")]
    InvalidRedirectUrl(#[source] oauth2::url::ParseError),
}

#[derive(Debug, Error)]
pub enum AuthError {
    #[error("missing field: {0}")]
    MissingField(&'static str),
    #[error("invalid auth url: {0}")]
    InvalidAuthUrl(#[from] oauth2::url::ParseError),
    #[error("invalid token url: {0}")]
    InvalidTokenUrl(#[source] oauth2::url::ParseError),
    #[error("invalid redirect url: {0}")]
    InvalidRedirectUrl(#[source] oauth2::url::ParseError),
    #[error("cache")]
    Cache(#[from] redis::RedisError),
    #[error("missing session")]
    MissingSession,
    #[error("invalid session")]
    InvalidSession,
    #[error("invalid session")]
    CorruptedCookie(#[from] base64::DecodeError),
    #[error("CSRF token mismatch")]
    TokenMismatch,
    #[error("CSRF token missing")]
    NoCSRFToken,
    #[error("No email available for this user")]
    MissingEmail,
    #[error("Email is not verified")]
    EmailNotVerified,
    #[error("oauth token for user")]
    UserToken,
    #[error("could not get user through http")]
    UserRetrieval,
    #[error("remote user mismatch")]
    UserDeserialisation,
}