gitdataai/libs/api/auth/totp.rs
ZhenYi 63c75ad453
Some checks are pending
CI / Rust Lint & Check (push) Waiting to run
CI / Rust Tests (push) Waiting to run
CI / Frontend Lint & Type Check (push) Waiting to run
CI / Frontend Build (push) Blocked by required conditions
feat(room): add category creation and drag-to-assign for channels
- Rewrite DiscordChannelSidebar with @dnd-kit drag-and-drop:
  rooms are sortable within categories; dragging onto a different
  category header assigns the room to that category
- Add inline 'Add Category' button: Enter/Esc to confirm/cancel
- Wire category create/move handlers in room.tsx via RoomContext
- Fix onAiStreamChunk to accumulate content properly and avoid
  redundant re-renders during AI streaming (dedup guard)
- No backend changes needed: category CRUD and room category update
  endpoints were already wired
2026-04-19 16:44:31 +08:00

97 lines
3.3 KiB
XML

// 2FA disabled {
// use crate::{ApiResponse, error::ApiError};
// use actix_web::{HttpResponse, Result, web};
// use service::AppService;
// use service::auth::totp::{
// Disable2FAParams, Enable2FAResponse, Get2FAStatusResponse, Verify2FAParams,
// };
// use session::Session;
//
// #[utoipa::path(
// post,
// path = "/api/auth/2fa/enable",
// responses(
// (status = 200, description = "2FA setup initiated", body = Enable2FAResponse),
// (status = 401, description = "Unauthorized"),
// (status = 409, description = "2FA already enabled"),
// (status = 500, description = "Internal server error"),
// (status = 404, description = "Not found", body = ApiResponse<ApiError>),
// ),
// tag = "Auth"
// )]
// pub async fn api_2fa_enable(
// service: web::Data<AppService>,
// session: Session,
// ) -> Result<HttpResponse, ApiError> {
// let resp = service.auth_2fa_enable(&session).await?;
// Ok(ApiResponse::ok(resp).to_response())
// }
//
// #[utoipa::path(
// post,
// path = "/api/auth/2fa/verify",
// request_body = Verify2FAParams,
// responses(
// (status = 200, description = "2FA verified and enabled"),
// (status = 401, description = "Unauthorized or invalid code"),
// (status = 400, description = "2FA not set up"),
// (status = 500, description = "Internal server error"),
// (status = 404, description = "Not found", body = ApiResponse<ApiError>),
// ),
// tag = "Auth"
// )]
// pub async fn api_2fa_verify(
// service: web::Data<AppService>,
// session: Session,
// params: web::Json<Verify2FAParams>,
// ) -> Result<HttpResponse, ApiError> {
// service
// .auth_2fa_verify_and_enable(&session, params.into_inner())
// .await?;
// Ok(crate::api_success())
// }
//
// #[utoipa::path(
// post,
// path = "/api/auth/2fa/disable",
// request_body = Disable2FAParams,
// responses(
// (status = 200, description = "2FA disabled"),
// (status = 401, description = "Unauthorized"),
// (status = 400, description = "2FA not enabled or invalid code/password"),
// (status = 500, description = "Internal server error"),
// (status = 404, description = "Not found", body = ApiResponse<ApiError>),
// ),
// tag = "Auth"
// )]
// pub async fn api_2fa_disable(
// service: web::Data<AppService>,
// session: Session,
// params: web::Json<Disable2FAParams>,
// ) -> Result<HttpResponse, ApiError> {
// service
// .auth_2fa_disable(&session, params.into_inner())
// .await?;
// Ok(crate::api_success())
// }
//
// #[utoipa::path(
// post,
// path = "/api/auth/2fa/status",
// responses(
// (status = 200, description = "2FA status", body = Get2FAStatusResponse),
// (status = 401, description = "Unauthorized"),
// (status = 500, description = "Internal server error"),
// (status = 404, description = "Not found", body = ApiResponse<ApiError>),
// ),
// tag = "Auth"
// )]
// pub async fn api_2fa_status(
// service: web::Data<AppService>,
// session: Session,
// ) -> Result<HttpResponse, ApiError> {
// let resp = service.auth_2fa_status(&session).await?;
// Ok(ApiResponse::ok(resp).to_response())
// }
// }