2023-05-09 15:45:31 -07:00
|
|
|
package user
|
|
|
|
|
|
|
|
import (
|
2023-09-06 16:43:05 -07:00
|
|
|
"context"
|
2023-05-09 15:45:31 -07:00
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
|
2023-06-03 07:18:47 -07:00
|
|
|
"codeberg.org/pronounscc/pronouns.cc/backend/common"
|
|
|
|
"codeberg.org/pronounscc/pronouns.cc/backend/db"
|
|
|
|
"codeberg.org/pronounscc/pronouns.cc/backend/log"
|
|
|
|
"codeberg.org/pronounscc/pronouns.cc/backend/server"
|
2023-05-09 15:45:31 -07:00
|
|
|
"emperror.dev/errors"
|
2023-05-26 06:22:27 -07:00
|
|
|
"github.com/go-chi/chi/v5"
|
2023-05-09 15:45:31 -07:00
|
|
|
"github.com/go-chi/render"
|
2023-12-29 19:27:08 -08:00
|
|
|
"github.com/jackc/pgx/v5"
|
2023-05-26 06:22:27 -07:00
|
|
|
"github.com/rs/xid"
|
2023-05-09 15:45:31 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
func (s *Server) getUserFlags(w http.ResponseWriter, r *http.Request) error {
|
|
|
|
ctx := r.Context()
|
|
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
|
|
|
|
flags, err := s.DB.AccountFlags(ctx, claims.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "getting flags for account %v", claims.UserID)
|
|
|
|
}
|
|
|
|
|
|
|
|
render.JSON(w, r, flags)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type postUserFlagRequest struct {
|
|
|
|
Flag string `json:"flag"`
|
|
|
|
Name string `json:"name"`
|
|
|
|
Description string `json:"description"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) postUserFlag(w http.ResponseWriter, r *http.Request) error {
|
|
|
|
ctx := r.Context()
|
|
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
|
|
|
|
if !claims.TokenWrite {
|
|
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This token is read-only"}
|
|
|
|
}
|
|
|
|
|
|
|
|
flags, err := s.DB.AccountFlags(ctx, claims.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "getting current user flags")
|
|
|
|
}
|
|
|
|
if len(flags) >= db.MaxPrideFlags {
|
|
|
|
return server.APIError{
|
|
|
|
Code: server.ErrFlagLimitReached,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var req postUserFlagRequest
|
|
|
|
err = render.Decode(r, &req)
|
|
|
|
if err != nil {
|
|
|
|
return server.APIError{Code: server.ErrBadRequest}
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove whitespace from all fields
|
|
|
|
req.Name = strings.TrimSpace(req.Name)
|
|
|
|
req.Description = strings.TrimSpace(req.Description)
|
|
|
|
|
|
|
|
if s := common.StringLength(&req.Name); s > db.MaxPrideFlagTitleLength {
|
|
|
|
return server.APIError{
|
|
|
|
Code: server.ErrBadRequest,
|
|
|
|
Details: fmt.Sprintf("name too long, must be %v characters or less, is %v", db.MaxPrideFlagTitleLength, s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if s := common.StringLength(&req.Description); s > db.MaxPrideFlagDescLength {
|
|
|
|
return server.APIError{
|
|
|
|
Code: server.ErrBadRequest,
|
|
|
|
Details: fmt.Sprintf("description too long, must be %v characters or less, is %v", db.MaxPrideFlagDescLength, s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tx, err := s.DB.Begin(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "starting transaction")
|
|
|
|
}
|
2023-12-29 19:27:08 -08:00
|
|
|
defer func() {
|
|
|
|
err := tx.Rollback(ctx)
|
|
|
|
if err != nil && !errors.Is(err, pgx.ErrTxClosed) {
|
|
|
|
log.Error("rolling back transaction:", err)
|
|
|
|
}
|
|
|
|
}()
|
2023-05-09 15:45:31 -07:00
|
|
|
|
|
|
|
flag, err := s.DB.CreateFlag(ctx, tx, claims.UserID, req.Name, req.Description)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("creating flag: %v", err)
|
|
|
|
return errors.Wrap(err, "creating flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
webp, err := s.DB.ConvertFlag(req.Flag)
|
|
|
|
if err != nil {
|
|
|
|
if err == db.ErrInvalidDataURI {
|
|
|
|
return server.APIError{Code: server.ErrBadRequest, Message: "invalid data URI"}
|
2023-05-28 15:18:02 -07:00
|
|
|
} else if err == db.ErrFileTooLarge {
|
|
|
|
return server.APIError{Code: server.ErrBadRequest, Message: "data URI exceeds 512 KB"}
|
2023-05-09 15:45:31 -07:00
|
|
|
}
|
|
|
|
return errors.Wrap(err, "converting flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
hash, err := s.DB.WriteFlag(ctx, flag.ID, webp)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "writing flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
flag, err = s.DB.EditFlag(ctx, tx, flag.ID, nil, nil, &hash)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "setting hash for flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
err = tx.Commit(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "committing transaction")
|
|
|
|
}
|
|
|
|
|
|
|
|
render.JSON(w, r, flag)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-05-26 06:22:27 -07:00
|
|
|
type patchUserFlagRequest struct {
|
|
|
|
Name *string `json:"name"`
|
|
|
|
Description *string `json:"description"`
|
|
|
|
}
|
|
|
|
|
2023-09-06 16:43:05 -07:00
|
|
|
func (s *Server) parseFlag(ctx context.Context, flags []db.PrideFlag, flagRef string) (db.PrideFlag, bool) {
|
|
|
|
if id, err := xid.FromString(flagRef); err == nil {
|
|
|
|
for _, f := range flags {
|
|
|
|
if f.ID == id {
|
|
|
|
return f, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if id, err := common.ParseSnowflake(flagRef); err == nil {
|
|
|
|
for _, f := range flags {
|
|
|
|
if f.SnowflakeID == common.FlagID(id) {
|
|
|
|
return f, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return db.PrideFlag{}, false
|
|
|
|
}
|
|
|
|
|
2023-05-09 15:45:31 -07:00
|
|
|
func (s *Server) patchUserFlag(w http.ResponseWriter, r *http.Request) error {
|
2023-05-26 06:22:27 -07:00
|
|
|
ctx := r.Context()
|
|
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
|
|
|
|
if !claims.TokenWrite {
|
|
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This token is read-only"}
|
|
|
|
}
|
|
|
|
|
|
|
|
flags, err := s.DB.AccountFlags(ctx, claims.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "getting current user flags")
|
|
|
|
}
|
2023-09-06 16:43:05 -07:00
|
|
|
|
|
|
|
flag, ok := s.parseFlag(ctx, flags, chi.URLParam(r, "flagID"))
|
|
|
|
if !ok {
|
2023-05-26 06:22:27 -07:00
|
|
|
return server.APIError{Code: server.ErrNotFound, Details: "No flag with that ID found"}
|
|
|
|
}
|
|
|
|
|
|
|
|
var req patchUserFlagRequest
|
|
|
|
err = render.Decode(r, &req)
|
|
|
|
if err != nil {
|
|
|
|
return server.APIError{Code: server.ErrBadRequest}
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Name != nil {
|
|
|
|
*req.Name = strings.TrimSpace(*req.Name)
|
|
|
|
}
|
|
|
|
if req.Description != nil {
|
|
|
|
*req.Description = strings.TrimSpace(*req.Description)
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Name == nil && req.Description == nil {
|
|
|
|
return server.APIError{Code: server.ErrBadRequest, Details: "Request cannot be empty"}
|
|
|
|
}
|
|
|
|
|
|
|
|
if s := common.StringLength(req.Name); s > db.MaxPrideFlagTitleLength {
|
|
|
|
return server.APIError{
|
|
|
|
Code: server.ErrBadRequest,
|
|
|
|
Details: fmt.Sprintf("name too long, must be %v characters or less, is %v", db.MaxPrideFlagTitleLength, s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if s := common.StringLength(req.Description); s > db.MaxPrideFlagDescLength {
|
|
|
|
return server.APIError{
|
|
|
|
Code: server.ErrBadRequest,
|
|
|
|
Details: fmt.Sprintf("description too long, must be %v characters or less, is %v", db.MaxPrideFlagDescLength, s),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tx, err := s.DB.Begin(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "beginning transaction")
|
|
|
|
}
|
2023-12-29 19:27:08 -08:00
|
|
|
defer func() {
|
|
|
|
err := tx.Rollback(ctx)
|
|
|
|
if err != nil && !errors.Is(err, pgx.ErrTxClosed) {
|
|
|
|
log.Error("rolling back transaction:", err)
|
|
|
|
}
|
|
|
|
}()
|
2023-05-26 06:22:27 -07:00
|
|
|
|
2023-09-06 16:43:05 -07:00
|
|
|
flag, err = s.DB.EditFlag(ctx, tx, flag.ID, req.Name, req.Description, nil)
|
2023-05-26 06:22:27 -07:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "updating flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
err = tx.Commit(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "committing transaction")
|
|
|
|
}
|
|
|
|
|
|
|
|
render.JSON(w, r, flag)
|
2023-05-09 15:45:31 -07:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) deleteUserFlag(w http.ResponseWriter, r *http.Request) error {
|
2023-05-28 07:19:42 -07:00
|
|
|
ctx := r.Context()
|
|
|
|
claims, _ := server.ClaimsFromContext(ctx)
|
|
|
|
|
|
|
|
if !claims.TokenWrite {
|
|
|
|
return server.APIError{Code: server.ErrMissingPermissions, Details: "This token is read-only"}
|
|
|
|
}
|
|
|
|
|
2023-09-06 16:43:05 -07:00
|
|
|
flags, err := s.DB.AccountFlags(ctx, claims.UserID)
|
2023-05-28 07:19:42 -07:00
|
|
|
if err != nil {
|
2023-09-06 16:43:05 -07:00
|
|
|
return errors.Wrap(err, "getting current user flags")
|
2023-05-28 07:19:42 -07:00
|
|
|
}
|
|
|
|
|
2023-09-06 16:43:05 -07:00
|
|
|
flag, ok := s.parseFlag(ctx, flags, chi.URLParam(r, "flagID"))
|
|
|
|
if !ok {
|
|
|
|
return server.APIError{Code: server.ErrNotFound, Details: "No flag with that ID found"}
|
2023-05-28 07:19:42 -07:00
|
|
|
}
|
2023-09-06 16:43:05 -07:00
|
|
|
|
2023-05-28 07:19:42 -07:00
|
|
|
if flag.UserID != claims.UserID {
|
|
|
|
return server.APIError{Code: server.ErrNotFound, Details: "Flag not found"}
|
|
|
|
}
|
|
|
|
|
|
|
|
err = s.DB.DeleteFlag(ctx, flag.ID, flag.Hash)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "deleting flag")
|
|
|
|
}
|
|
|
|
|
|
|
|
render.NoContent(w, r)
|
2023-05-09 15:45:31 -07:00
|
|
|
return nil
|
|
|
|
}
|