use crate::auth::get_user_from_headers; use crate::database::models::User; use crate::file_hosting::FileHost; use crate::models::ids::ModId; use crate::models::mods::ModStatus; use crate::models::notifications::Notification; use crate::models::users::{Role, UserId}; use crate::routes::notifications::convert_notification; use crate::routes::ApiError; use actix_web::{delete, get, patch, web, HttpRequest, HttpResponse}; use futures::StreamExt; use serde::{Deserialize, Serialize}; use sqlx::PgPool; use std::sync::Arc; #[get("user")] pub async fn user_auth_get( req: HttpRequest, pool: web::Data, ) -> Result { Ok(HttpResponse::Ok().json( get_user_from_headers( req.headers(), &mut *pool .acquire() .await .map_err(|e| ApiError::DatabaseError(e.into()))?, ) .await?, )) } #[derive(Serialize, Deserialize)] pub struct UserIds { pub ids: String, } #[get("users")] pub async fn users_get( web::Query(ids): web::Query, pool: web::Data, ) -> Result { let user_ids = serde_json::from_str::>(&*ids.ids)? .into_iter() .map(|x| x.into()) .collect(); let users_data = User::get_many(user_ids, &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; let users: Vec = users_data.into_iter().map(convert_user).collect(); Ok(HttpResponse::Ok().json(users)) } #[get("@{id}")] pub async fn user_username_get( info: web::Path<(String,)>, pool: web::Data, ) -> Result { let id = info.into_inner().0; let user_data = User::get_from_username(id, &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; if let Some(data) = user_data { let response = convert_user(data); Ok(HttpResponse::Ok().json(response)) } else { Ok(HttpResponse::NotFound().body("")) } } #[get("{id}")] pub async fn user_get( info: web::Path<(String,)>, pool: web::Data, ) -> Result { let string = info.into_inner().0; let id_option: Option = serde_json::from_str(&*format!("\"{}\"", string)).ok(); let mut user_data; if let Some(id) = id_option { user_data = User::get(id.into(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; if user_data.is_none() { user_data = User::get_from_username(string, &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } } else { user_data = User::get_from_username(string, &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } if let Some(data) = user_data { let response = convert_user(data); Ok(HttpResponse::Ok().json(response)) } else { Ok(HttpResponse::NotFound().body("")) } } fn convert_user(data: crate::database::models::user_item::User) -> crate::models::users::User { crate::models::users::User { id: data.id.into(), github_id: data.github_id.map(|i| i as u64), username: data.username, name: data.name, email: None, avatar_url: data.avatar_url, bio: data.bio, created: data.created, role: Role::from_string(&*data.role), } } #[get("{user_id}/mods")] pub async fn mods_list( info: web::Path<(UserId,)>, pool: web::Data, ) -> Result { let id = info.into_inner().0.into(); let user_exists = sqlx::query!( "SELECT EXISTS(SELECT 1 FROM users WHERE id = $1)", id as crate::database::models::UserId, ) .fetch_one(&**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))? .exists; if user_exists.unwrap_or(false) { let mod_data = User::get_mods(id, ModStatus::Approved.as_str(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; let response = mod_data .into_iter() .map(|v| v.into()) .collect::>(); Ok(HttpResponse::Ok().json(response)) } else { Ok(HttpResponse::NotFound().body("")) } } #[derive(Serialize, Deserialize)] pub struct EditUser { pub username: Option, #[serde( default, skip_serializing_if = "Option::is_none", with = "::serde_with::rust::double_option" )] pub name: Option>, #[serde( default, skip_serializing_if = "Option::is_none", with = "::serde_with::rust::double_option" )] pub email: Option>, #[serde( default, skip_serializing_if = "Option::is_none", with = "::serde_with::rust::double_option" )] pub bio: Option>, pub role: Option, } #[patch("{id}")] pub async fn user_edit( req: HttpRequest, info: web::Path<(UserId,)>, pool: web::Data, new_user: web::Json, ) -> Result { let user = get_user_from_headers(req.headers(), &**pool).await?; let user_id = info.into_inner().0; let id: crate::database::models::ids::UserId = user_id.into(); if user.id == user_id || user.role.is_mod() { let mut transaction = pool .begin() .await .map_err(|e| ApiError::DatabaseError(e.into()))?; if let Some(username) = &new_user.username { sqlx::query!( " UPDATE users SET username = $1 WHERE (id = $2) ", username, id as crate::database::models::ids::UserId, ) .execute(&mut *transaction) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } if let Some(name) = &new_user.name { sqlx::query!( " UPDATE users SET name = $1 WHERE (id = $2) ", name.as_deref(), id as crate::database::models::ids::UserId, ) .execute(&mut *transaction) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } if let Some(bio) = &new_user.bio { sqlx::query!( " UPDATE users SET bio = $1 WHERE (id = $2) ", bio.as_deref(), id as crate::database::models::ids::UserId, ) .execute(&mut *transaction) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } if let Some(email) = &new_user.email { sqlx::query!( " UPDATE users SET email = $1 WHERE (id = $2) ", email.as_deref(), id as crate::database::models::ids::UserId, ) .execute(&mut *transaction) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } if let Some(role) = &new_user.role { if !user.role.is_mod() { return Err(ApiError::CustomAuthenticationError( "You do not have the permissions to edit the role of this user!".to_string(), )); } let role = Role::from_string(role).to_string(); sqlx::query!( " UPDATE users SET role = $1 WHERE (id = $2) ", role, id as crate::database::models::ids::UserId, ) .execute(&mut *transaction) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } transaction .commit() .await .map_err(|e| ApiError::DatabaseError(e.into()))?; Ok(HttpResponse::Ok().body("")) } else { Err(ApiError::CustomAuthenticationError( "You do not have permission to edit this user!".to_string(), )) } } #[derive(Serialize, Deserialize)] pub struct Extension { pub ext: String, } #[patch("{id}/icon")] pub async fn user_icon_edit( web::Query(ext): web::Query, req: HttpRequest, info: web::Path<(UserId,)>, pool: web::Data, file_host: web::Data>, mut payload: web::Payload, ) -> Result { if let Some(content_type) = super::mod_creation::get_image_content_type(&*ext.ext) { let cdn_url = dotenv::var("CDN_URL")?; let user = get_user_from_headers(req.headers(), &**pool).await?; let id = info.into_inner().0; if user.id != id && !user.role.is_mod() { return Err(ApiError::CustomAuthenticationError( "You don't have permission to edit this user's icon.".to_string(), )); } let mut icon_url = user.avatar_url; if user.id != id { let new_user = User::get(id.into(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; if let Some(new) = new_user { icon_url = new.avatar_url; } else { return Ok(HttpResponse::NotFound().body("")); } } if let Some(icon) = icon_url { if icon.starts_with(&cdn_url) { let name = icon.split('/').next(); if let Some(icon_path) = name { file_host.delete_file_version("", icon_path).await?; } } } let mut bytes = web::BytesMut::new(); while let Some(item) = payload.next().await { bytes.extend_from_slice(&item.map_err(|_| { ApiError::InvalidInputError("Unable to parse bytes in payload sent!".to_string()) })?); } if bytes.len() >= 262144 { return Err(ApiError::InvalidInputError(String::from( "Icons must be smaller than 256KiB", ))); } let upload_data = file_host .upload_file( content_type, &format!("user/{}/icon.{}", id, ext.ext), bytes.to_vec(), ) .await?; let mod_id: crate::database::models::ids::UserId = id.into(); sqlx::query!( " UPDATE users SET avatar_url = $1 WHERE (id = $2) ", format!("{}/{}", cdn_url, upload_data.file_name), mod_id as crate::database::models::ids::UserId, ) .execute(&**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; Ok(HttpResponse::Ok().body("")) } else { Err(ApiError::InvalidInputError(format!( "Invalid format for user icon: {}", ext.ext ))) } } #[derive(Deserialize)] pub struct RemovalType { #[serde(default = "default_removal")] removal_type: String, } fn default_removal() -> String { "partial".into() } #[delete("{id}")] pub async fn user_delete( req: HttpRequest, info: web::Path<(UserId,)>, pool: web::Data, removal_type: web::Query, ) -> Result { let user = get_user_from_headers(req.headers(), &**pool).await?; let id = info.into_inner().0; if !user.role.is_mod() && user.id != id { return Err(ApiError::CustomAuthenticationError( "You do not have permission to delete this user!".to_string(), )); } let result; if &*removal_type.removal_type == "full" { result = crate::database::models::User::remove_full(id.into(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; } else { result = crate::database::models::User::remove(id.into(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))?; }; if result.is_some() { Ok(HttpResponse::Ok().body("")) } else { Ok(HttpResponse::NotFound().body("")) } } #[get("{id}/follows")] pub async fn user_follows( req: HttpRequest, info: web::Path<(UserId,)>, pool: web::Data, ) -> Result { let user = get_user_from_headers(req.headers(), &**pool).await?; let id = info.into_inner().0; if !user.role.is_mod() && user.id != id { return Err(ApiError::CustomAuthenticationError( "You do not have permission to see the mods this user follows!".to_string(), )); } use futures::TryStreamExt; let user_id: crate::database::models::UserId = id.into(); let mods: Vec = sqlx::query!( " SELECT mf.mod_id FROM mod_follows mf WHERE mf.follower_id = $1 ", user_id as crate::database::models::ids::UserId, ) .fetch_many(&**pool) .try_filter_map(|e| async { Ok(e.right().map(|m| ModId(m.mod_id as u64))) }) .try_collect::>() .await .map_err(|e| ApiError::DatabaseError(e.into()))?; Ok(HttpResponse::Ok().json(mods)) } #[get("{id}/notifications")] pub async fn user_notifications( req: HttpRequest, info: web::Path<(UserId,)>, pool: web::Data, ) -> Result { let user = get_user_from_headers(req.headers(), &**pool).await?; let id = info.into_inner().0; if !user.role.is_mod() && user.id != id { return Err(ApiError::CustomAuthenticationError( "You do not have permission to see the mods this user follows!".to_string(), )); } let notifications: Vec = crate::database::models::notification_item::Notification::get_many_user(id.into(), &**pool) .await .map_err(|e| ApiError::DatabaseError(e.into()))? .into_iter() .map(convert_notification) .collect(); Ok(HttpResponse::Ok().json(notifications)) }