2022-11-18 21:25:40 +01:00
|
|
|
package handler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"blackforestbytes.com/simplecloudnotifier/api/apierr"
|
|
|
|
"blackforestbytes.com/simplecloudnotifier/common/ginresp"
|
2022-11-19 15:13:47 +01:00
|
|
|
"blackforestbytes.com/simplecloudnotifier/db"
|
2022-11-18 21:25:40 +01:00
|
|
|
"blackforestbytes.com/simplecloudnotifier/logic"
|
2022-11-19 15:13:47 +01:00
|
|
|
"blackforestbytes.com/simplecloudnotifier/models"
|
2022-11-18 23:12:37 +01:00
|
|
|
"database/sql"
|
2022-11-18 21:25:40 +01:00
|
|
|
"github.com/gin-gonic/gin"
|
2022-11-18 23:28:37 +01:00
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/langext"
|
2022-11-18 21:25:40 +01:00
|
|
|
"net/http"
|
|
|
|
)
|
|
|
|
|
|
|
|
type APIHandler struct {
|
2022-11-19 15:13:47 +01:00
|
|
|
app *logic.Application
|
|
|
|
database *db.Database
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewAPIHandler(app *logic.Application) APIHandler {
|
|
|
|
return APIHandler{
|
|
|
|
app: app,
|
|
|
|
database: app.Database,
|
|
|
|
}
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// CreateUser swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Create a new user
|
|
|
|
// @ID api-user-create
|
|
|
|
//
|
2022-11-18 23:28:37 +01:00
|
|
|
// @Param post_body body handler.CreateUser.body false " "
|
2022-11-18 21:25:40 +01:00
|
|
|
//
|
2022-11-18 23:28:37 +01:00
|
|
|
// @Success 200 {object} models.UserJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
2022-11-18 21:25:40 +01:00
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/ [POST]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) CreateUser(g *gin.Context) ginresp.HTTPResponse {
|
|
|
|
type body struct {
|
2022-11-18 23:28:37 +01:00
|
|
|
FCMToken string `json:"fcm_token"`
|
|
|
|
ProToken *string `json:"pro_token"`
|
|
|
|
Username *string `json:"username"`
|
|
|
|
AgentModel string `json:"agent_model"`
|
|
|
|
AgentVersion string `json:"agent_version"`
|
|
|
|
ClientType string `json:"client_type"`
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
var b body
|
2022-11-18 23:12:37 +01:00
|
|
|
ctx, errResp := h.app.StartRequest(g, nil, nil, &b)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
2022-11-18 23:12:37 +01:00
|
|
|
defer ctx.Cancel()
|
2022-11-18 21:25:40 +01:00
|
|
|
|
|
|
|
var clientType models.ClientType
|
|
|
|
if b.ClientType == string(models.ClientTypeAndroid) {
|
|
|
|
clientType = models.ClientTypeAndroid
|
|
|
|
} else if b.ClientType == string(models.ClientTypeIOS) {
|
|
|
|
clientType = models.ClientTypeIOS
|
|
|
|
} else {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(400, apierr.INVALID_CLIENTTYPE, "Invalid ClientType", nil)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if b.ProToken != nil {
|
|
|
|
ptok, err := h.app.VerifyProToken(*b.ProToken)
|
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.FAILED_VERIFY_PRO_TOKEN, "Failed to query purchase status", err)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if !ptok {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(400, apierr.INVALID_PRO_TOKEN, "Purchase token could not be verified", nil)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
readKey := h.app.GenerateRandomAuthKey()
|
|
|
|
sendKey := h.app.GenerateRandomAuthKey()
|
|
|
|
adminKey := h.app.GenerateRandomAuthKey()
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
err := h.database.ClearFCMTokens(ctx, b.FCMToken)
|
2022-11-18 21:25:40 +01:00
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to clear existing fcm tokens", err)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if b.ProToken != nil {
|
2022-11-19 15:13:47 +01:00
|
|
|
err := h.database.ClearProTokens(ctx, *b.ProToken)
|
2022-11-18 21:25:40 +01:00
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to clear existing fcm tokens", err)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
username := b.Username
|
|
|
|
if username != nil {
|
|
|
|
username = langext.Ptr(h.app.NormalizeUsername(*username))
|
|
|
|
}
|
|
|
|
|
|
|
|
userobj, err := h.database.CreateUser(ctx, readKey, sendKey, adminKey, b.ProToken, username)
|
2022-11-18 21:25:40 +01:00
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to create user in db", err)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
_, err = h.database.CreateClient(ctx, userobj.UserID, clientType, b.FCMToken, b.AgentModel, b.AgentVersion)
|
2022-11-18 21:25:40 +01:00
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to create user in db", err)
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, userobj.JSON()))
|
|
|
|
}
|
|
|
|
|
2022-11-18 23:12:37 +01:00
|
|
|
// GetUser swaggerdoc
|
|
|
|
//
|
2022-11-19 12:47:23 +01:00
|
|
|
// @Summary Get a user
|
2022-11-18 23:28:37 +01:00
|
|
|
// @ID api-user-get
|
2022-11-18 23:12:37 +01:00
|
|
|
//
|
2022-11-18 23:28:37 +01:00
|
|
|
// @Param uid path int true "UserID"
|
2022-11-18 23:12:37 +01:00
|
|
|
//
|
|
|
|
// @Success 200 {object} models.UserJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid} [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) GetUser(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-18 23:12:37 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
user, err := h.database.GetUser(ctx, u.UserID)
|
2022-11-18 23:12:37 +01:00
|
|
|
if err == sql.ErrNoRows {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(404, apierr.USER_NOT_FOUND, "User not found", err)
|
2022-11-18 23:12:37 +01:00
|
|
|
}
|
|
|
|
if err != nil {
|
2022-11-18 23:28:37 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query user", err)
|
2022-11-18 23:12:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, user.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-18 23:28:37 +01:00
|
|
|
// UpdateUser swaggerdoc
|
|
|
|
//
|
2022-11-19 12:47:23 +01:00
|
|
|
// @Summary (Partially) update a user
|
2022-11-18 23:28:37 +01:00
|
|
|
// @Description The body-values are optional, only send the ones you want to update
|
|
|
|
// @ID api-user-update
|
|
|
|
//
|
|
|
|
// @Param post_body body handler.UpdateUser.body false " "
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.UserJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid} [PATCH]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) UpdateUser(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-18 23:28:37 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
type body struct {
|
|
|
|
Username *string `json:"username"`
|
|
|
|
ProToken *string `json:"pro_token"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
var b body
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, &b)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Username != nil {
|
2022-11-19 23:16:54 +01:00
|
|
|
username := langext.Ptr(h.app.NormalizeUsername(*b.Username))
|
2022-11-18 23:28:37 +01:00
|
|
|
if *username == "" {
|
|
|
|
username = nil
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
err := h.database.UpdateUserUsername(ctx, u.UserID, b.Username)
|
2022-11-18 23:28:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to update user", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.ProToken != nil {
|
|
|
|
ptok, err := h.app.VerifyProToken(*b.ProToken)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.FAILED_VERIFY_PRO_TOKEN, "Failed to query purchase status", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ptok {
|
|
|
|
return ginresp.InternAPIError(400, apierr.INVALID_PRO_TOKEN, "Purchase token could not be verified", nil)
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
err = h.database.ClearProTokens(ctx, *b.ProToken)
|
2022-11-18 23:28:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to clear existing fcm tokens", err)
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
err = h.database.UpdateUserProToken(ctx, u.UserID, b.ProToken)
|
2022-11-18 23:28:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to update user", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
user, err := h.database.GetUser(ctx, u.UserID)
|
2022-11-18 23:28:37 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query (updated) user", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, user.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 12:47:23 +01:00
|
|
|
// ListClients swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary List all clients
|
|
|
|
// @ID api-clients-list
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Success 200 {object} handler.ListClients.response
|
2022-11-19 12:47:23 +01:00
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid}/clients [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) ListClients(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 12:47:23 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
2022-11-19 17:07:30 +01:00
|
|
|
type response struct {
|
2022-11-19 12:47:23 +01:00
|
|
|
Clients []models.ClientJSON `json:"clients"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
clients, err := h.database.ListClients(ctx, u.UserID)
|
2022-11-19 12:47:23 +01:00
|
|
|
if err != nil {
|
2022-11-19 12:50:41 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query clients", err)
|
2022-11-19 12:47:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
res := langext.ArrMap(clients, func(v models.Client) models.ClientJSON { return v.JSON() })
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, response{Clients: res}))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 12:50:41 +01:00
|
|
|
// GetClient swaggerdoc
|
|
|
|
//
|
2022-11-19 12:59:25 +01:00
|
|
|
// @Summary Get a single clients
|
2022-11-19 12:50:41 +01:00
|
|
|
// @ID api-clients-get
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param cid path int true "ClientID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.ClientJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid}/clients/{cid} [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) GetClient(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 12:50:41 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
ClientID int64 `uri:"cid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
client, err := h.database.GetClient(ctx, u.UserID, u.ClientID)
|
2022-11-19 12:50:41 +01:00
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.CLIENT_NOT_FOUND, "Client not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query client", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, client.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 12:56:44 +01:00
|
|
|
// AddClient swaggerdoc
|
|
|
|
//
|
2022-11-19 12:59:25 +01:00
|
|
|
// @Summary Add a new clients
|
|
|
|
// @ID api-clients-create
|
2022-11-19 12:56:44 +01:00
|
|
|
//
|
2022-11-19 12:59:25 +01:00
|
|
|
// @Param uid path int true "UserID"
|
2022-11-19 12:56:44 +01:00
|
|
|
//
|
|
|
|
// @Param post_body body handler.AddClient.body false " "
|
|
|
|
//
|
2022-11-19 12:59:25 +01:00
|
|
|
// @Success 200 {object} models.ClientJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
2022-11-19 12:56:44 +01:00
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid}/clients [POST]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) AddClient(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 12:56:44 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
type body struct {
|
|
|
|
FCMToken string `json:"fcm_token"`
|
|
|
|
AgentModel string `json:"agent_model"`
|
|
|
|
AgentVersion string `json:"agent_version"`
|
|
|
|
ClientType string `json:"client_type"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
var b body
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, &b)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
var clientType models.ClientType
|
|
|
|
if b.ClientType == string(models.ClientTypeAndroid) {
|
|
|
|
clientType = models.ClientTypeAndroid
|
|
|
|
} else if b.ClientType == string(models.ClientTypeIOS) {
|
|
|
|
clientType = models.ClientTypeIOS
|
|
|
|
} else {
|
|
|
|
return ginresp.InternAPIError(400, apierr.INVALID_CLIENTTYPE, "Invalid ClientType", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
client, err := h.database.CreateClient(ctx, u.UserID, clientType, b.FCMToken, b.AgentModel, b.AgentVersion)
|
2022-11-19 12:56:44 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to create user in db", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, client.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 12:59:25 +01:00
|
|
|
// DeleteClient swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Delete a client
|
|
|
|
// @ID api-clients-delete
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param cid path int true "ClientID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.ClientJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
2022-11-19 17:07:30 +01:00
|
|
|
// @Router /api-v2/users/{uid}/clients [POST]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) DeleteClient(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 12:59:25 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
ClientID int64 `uri:"cid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
client, err := h.database.GetClient(ctx, u.UserID, u.ClientID)
|
2022-11-19 12:59:25 +01:00
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.CLIENT_NOT_FOUND, "Client not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query client", err)
|
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
err = h.database.DeleteClient(ctx, u.ClientID)
|
2022-11-19 12:59:25 +01:00
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to delete client", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, client.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// ListChannels swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary List all channels of a user
|
|
|
|
// @ID api-channels-list
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} handler.ListChannels.response
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/channels [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) ListChannels(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
type response struct {
|
|
|
|
Channels []models.ChannelJSON `json:"channels"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
clients, err := h.database.ListChannels(ctx, u.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channels", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
res := langext.ArrMap(clients, func(v models.Channel) models.ChannelJSON { return v.JSON() })
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, response{Channels: res}))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// GetChannel swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary List all channels of a user
|
|
|
|
// @ID api-channels-get
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param cid path int true "ChannelID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.ChannelJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/channels/{cid} [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) GetChannel(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
ChannelID int64 `uri:"cid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
channel, err := h.database.GetChannel(ctx, u.UserID, u.ChannelID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.CLIENT_NOT_FOUND, "Channel not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channel", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, channel.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (h APIHandler) GetChannelMessages(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:09:23 +01:00
|
|
|
return ginresp.NotImplemented() //TODO
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// ListUserSubscriptions swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary List all channels of a user
|
|
|
|
// @ID api-user-subscriptions-list
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} handler.ListUserSubscriptions.response
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/subscriptions [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) ListUserSubscriptions(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
type response struct {
|
|
|
|
Subscriptions []models.SubscriptionJSON `json:"subscriptions"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
clients, err := h.database.ListSubscriptionsByOwner(ctx, u.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channels", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
res := langext.ArrMap(clients, func(v models.Subscription) models.SubscriptionJSON { return v.JSON() })
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, response{Subscriptions: res}))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// ListChannelSubscriptions swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary List all subscriptions of a channel
|
|
|
|
// @ID api-chan-subscriptions-list
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param cid path int true "ChannelID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} handler.ListChannelSubscriptions.response
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/channels/{cid}/subscriptions [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) ListChannelSubscriptions(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
ChannelID int64 `uri:"cid"`
|
|
|
|
}
|
|
|
|
type response struct {
|
|
|
|
Subscriptions []models.SubscriptionJSON `json:"subscriptions"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err := h.database.GetChannel(ctx, u.UserID, u.ChannelID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.CHANNEL_NOT_FOUND, "Channel not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channels", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
clients, err := h.database.ListSubscriptionsByChannel(ctx, u.ChannelID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channels", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
res := langext.ArrMap(clients, func(v models.Subscription) models.SubscriptionJSON { return v.JSON() })
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, response{Subscriptions: res}))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// GetSubscription swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Get a single subscription
|
|
|
|
// @ID api-subscriptions-get
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param sid path int true "SubscriptionID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.SubscriptionJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/subscriptions/{sid} [GET]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) GetSubscription(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
SubscriptionID int64 `uri:"sid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserRead(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
subscription, err := h.database.GetSubscription(ctx, u.SubscriptionID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.SUBSCRIPTION_NOT_FOUND, "Subscription not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
2022-11-19 23:16:54 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query subscription", err)
|
2022-11-19 17:07:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if subscription.SubscriberUserID != u.UserID {
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, subscription.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 17:07:30 +01:00
|
|
|
// CancelSubscription swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Cancel (delete) subscription
|
|
|
|
// @ID api-subscriptions-delete
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param sid path int true "SubscriptionID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.SubscriptionJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/subscriptions/{sid} [DELETE]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) CancelSubscription(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:07:30 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
SubscriptionID int64 `uri:"sid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
2022-11-19 17:07:30 +01:00
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
subscription, err := h.database.GetSubscription(ctx, u.SubscriptionID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.SUBSCRIPTION_NOT_FOUND, "Subscription not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
2022-11-19 23:16:54 +01:00
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query subscription", err)
|
2022-11-19 17:07:30 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
if subscription.SubscriberUserID != u.UserID && subscription.ChannelOwnerUserID != u.UserID {
|
2022-11-19 17:07:30 +01:00
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = h.database.DeleteSubscription(ctx, u.SubscriptionID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to delete subscription", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, subscription.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
// CreateSubscription swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Creare/Request a subscription
|
|
|
|
// @ID api-subscriptions-create
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param query_data query handler.CreateSubscription.query false " "
|
|
|
|
// @Param post_data body handler.CreateSubscription.body false " "
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.SubscriptionJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/subscriptions [POST]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) CreateSubscription(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 23:16:54 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
}
|
|
|
|
type body struct {
|
|
|
|
ChannelOwnerUserID int64 `form:"channel_owner_user_id"`
|
|
|
|
Channel string `form:"channel_name"`
|
|
|
|
}
|
|
|
|
type query struct {
|
|
|
|
ChanSubscribeKey *string `form:"chan_subscribe_key"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
var q query
|
|
|
|
var b body
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, &q, &b)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
channel, err := h.database.GetChannelByName(ctx, b.ChannelOwnerUserID, h.app.NormalizeChannelName(b.Channel))
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query channel", err)
|
|
|
|
}
|
|
|
|
if channel == nil {
|
|
|
|
return ginresp.InternAPIError(400, apierr.CHANNEL_NOT_FOUND, "Channel not found", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sub, err := h.database.CreateSubscription(ctx, u.UserID, *channel, channel.OwnerUserID == u.UserID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to create subscription", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, sub.JSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
// UpdateSubscription swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Update a subscription (e.g. confirm)
|
|
|
|
// @ID api-subscriptions-update
|
|
|
|
//
|
|
|
|
// @Param uid path int true "UserID"
|
|
|
|
// @Param sid path int true "SubscriptionID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.SubscriptionJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/users/{uid}/subscriptions/{sid} [PATCH]
|
2022-11-19 17:07:30 +01:00
|
|
|
func (h APIHandler) UpdateSubscription(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 23:16:54 +01:00
|
|
|
type uri struct {
|
|
|
|
UserID int64 `uri:"uid"`
|
|
|
|
SubscriptionID int64 `uri:"sid"`
|
|
|
|
}
|
|
|
|
type body struct {
|
|
|
|
Confirmed *bool `form:"confirmed"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
var b body
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, &b)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionUserAdmin(u.UserID); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
subscription, err := h.database.GetSubscription(ctx, u.SubscriptionID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.SUBSCRIPTION_NOT_FOUND, "Subscription not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query subscription", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if subscription.ChannelOwnerUserID != u.UserID {
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
if b.Confirmed != nil {
|
|
|
|
err = h.database.UpdateSubscriptionConfirmed(ctx, u.SubscriptionID, *b.Confirmed)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to update subscription", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
subscription, err = h.database.GetSubscription(ctx, u.SubscriptionID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query subscription", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, subscription.JSON()))
|
2022-11-19 17:07:30 +01:00
|
|
|
}
|
|
|
|
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) ListMessages(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 23:16:54 +01:00
|
|
|
//also update last_read
|
2022-11-19 17:09:23 +01:00
|
|
|
return ginresp.NotImplemented() //TODO
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
// GetMessage swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Get a single message (untrimmed)
|
|
|
|
// @Description The user must either own the message and request the resource with the READ or ADMIN Key
|
|
|
|
// @Description Or the user must subscribe to the corresponding channel (and be confirmed) and request the resource with the READ or ADMIN Key
|
|
|
|
// @Description The returned message is never trimmed
|
|
|
|
// @ID api-message-get
|
|
|
|
//
|
|
|
|
// @Param mid path int true "SCNMessageID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.MessageJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/messages/{mid} [PATCH]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) GetMessage(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 23:16:54 +01:00
|
|
|
type uri struct {
|
|
|
|
MessageID int64 `uri:"mid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionAny(); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
msg, err := h.database.GetMessage(ctx, u.MessageID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.MESSAGE_NOT_FOUND, "message not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query message", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ctx.CheckPermissionMessageReadDirect(msg) {
|
|
|
|
|
|
|
|
// either we have direct read permissions (it is our message + read/admin key)
|
|
|
|
// or we subscribe (+confirmed) to the channel and have read/admin key
|
|
|
|
|
|
|
|
if uid := ctx.GetPermissionUserID(); uid != nil && ctx.IsPermissionUserRead() {
|
|
|
|
sub, err := h.database.GetSubscriptionBySubscriber(ctx, *uid, msg.ChannelID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query subscription", err)
|
|
|
|
}
|
|
|
|
if sub == nil {
|
|
|
|
// not subbed
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
if !sub.Confirmed {
|
|
|
|
// sub not confirmed
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
// => perm okay
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// auth-key is not set or not a user:x variant
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, msg.FullJSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 23:16:54 +01:00
|
|
|
// DeleteMessage swaggerdoc
|
|
|
|
//
|
|
|
|
// @Summary Delete a single message
|
|
|
|
// @Description The user must own the message and request the resource with the ADMIN Key
|
|
|
|
// @ID api-message-delete
|
|
|
|
//
|
|
|
|
// @Param mid path int true "SCNMessageID"
|
|
|
|
//
|
|
|
|
// @Success 200 {object} models.MessageJSON
|
|
|
|
// @Failure 400 {object} ginresp.apiError
|
|
|
|
// @Failure 401 {object} ginresp.apiError
|
|
|
|
// @Failure 404 {object} ginresp.apiError
|
|
|
|
// @Failure 500 {object} ginresp.apiError
|
|
|
|
//
|
|
|
|
// @Router /api-v2/messages/{mid} [PATCH]
|
2022-11-18 21:25:40 +01:00
|
|
|
func (h APIHandler) DeleteMessage(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 23:16:54 +01:00
|
|
|
type uri struct {
|
|
|
|
MessageID int64 `uri:"mid"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var u uri
|
|
|
|
ctx, errResp := h.app.StartRequest(g, &u, nil, nil)
|
|
|
|
if errResp != nil {
|
|
|
|
return *errResp
|
|
|
|
}
|
|
|
|
defer ctx.Cancel()
|
|
|
|
|
|
|
|
if permResp := ctx.CheckPermissionAny(); permResp != nil {
|
|
|
|
return *permResp
|
|
|
|
}
|
|
|
|
|
|
|
|
msg, err := h.database.GetMessage(ctx, u.MessageID)
|
|
|
|
if err == sql.ErrNoRows {
|
|
|
|
return ginresp.InternAPIError(404, apierr.MESSAGE_NOT_FOUND, "message not found", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to query message", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ctx.CheckPermissionMessageReadDirect(msg) {
|
|
|
|
return ginresp.InternAPIError(401, apierr.USER_AUTH_FAILED, "You are not authorized for this action", nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = h.database.DeleteMessage(ctx, msg.SCNMessageID)
|
|
|
|
if err != nil {
|
|
|
|
return ginresp.InternAPIError(500, apierr.DATABASE_ERROR, "Failed to delete message", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ctx.FinishSuccess(ginresp.JSON(http.StatusOK, msg.FullJSON()))
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|
|
|
|
|
2022-11-19 15:13:47 +01:00
|
|
|
func (h APIHandler) SendMessage(g *gin.Context) ginresp.HTTPResponse {
|
2022-11-19 17:09:23 +01:00
|
|
|
return ginresp.NotImplemented() //TODO
|
2022-11-18 21:25:40 +01:00
|
|
|
}
|