1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
use async_session::base64;
use thiserror::Error;
#[derive(Debug, Error)]
pub enum AuthClientError {
#[error("missing field: {0}")]
MissingField(&'static str),
#[error("invalid auth url: {0}")]
InvalidAuthUrl(#[from] oauth2::url::ParseError),
#[error("invalid token url: {0}")]
InvalidTokenUrl(#[source] oauth2::url::ParseError),
#[error("invalid redirect url: {0}")]
InvalidRedirectUrl(#[source] oauth2::url::ParseError),
}
#[derive(Debug, Error)]
pub enum AuthError {
#[error("missing field: {0}")]
MissingField(&'static str),
#[error("invalid auth url: {0}")]
InvalidAuthUrl(#[from] oauth2::url::ParseError),
#[error("invalid token url: {0}")]
InvalidTokenUrl(#[source] oauth2::url::ParseError),
#[error("invalid redirect url: {0}")]
InvalidRedirectUrl(#[source] oauth2::url::ParseError),
#[error("cache")]
Cache(#[from] redis::RedisError),
#[error("missing session")]
MissingSession,
#[error("invalid session")]
InvalidSession,
#[error("invalid session")]
CorruptedCookie(#[from] base64::DecodeError),
#[error("CSRF token mismatch")]
TokenMismatch,
#[error("CSRF token missing")]
NoCSRFToken,
#[error("No email available for this user")]
MissingEmail,
#[error("Email is not verified")]
EmailNotVerified,
#[error("oauth token for user")]
UserToken,
#[error("could not get user through http")]
UserRetrieval,
#[error("remote user mismatch")]
UserDeserialisation,
}
|