Compare commits

..

57 commits

Author SHA1 Message Date
447c577a2a style: cargo clippy & fmt
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
2025-08-05 03:28:35 +02:00
5b24d0052b feat: return member with messages 2025-08-05 03:28:24 +02:00
8a7711cabc feat: Make me optional in Member::fetch_one() 2025-08-05 03:28:02 +02:00
4cb89645fe Merge pull request 'Member Improvements' (#44) from wip/member-improvements into main
All checks were successful
ci/woodpecker/push/publish-docs Pipeline was successful
ci/woodpecker/push/build-and-publish Pipeline was successful
Reviewed-on: #44
2025-08-05 00:09:19 +02:00
ac1678bfa8 fix: use dedicated function for member count
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-08-05 00:02:30 +02:00
642dbe5270 fix: remove order_by on single fetches 2025-08-05 00:02:21 +02:00
8d91ec78a6 refactor: rename fetch_one_with_member
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
Renamed to fetch_one_with_uuid
2025-08-04 22:55:48 +02:00
e9cc2a3f0e feat: faster member fetching and pagination 2025-08-04 22:55:22 +02:00
946085a18f Merge pull request 'Online status' (#43) from wip/status into main
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
Reviewed-on: #43
2025-08-04 19:22:59 +00:00
53451e67c7 fix: 4 is always bigger than 0
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-08-04 20:52:19 +02:00
027649a060 feat: added online status
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-08-04 20:46:49 +02:00
314b9ee011 feat: added online_status column to users table
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
2025-08-04 20:07:46 +02:00
3816af56e3 feat: return role with member
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
2025-07-31 16:01:10 +02:00
5cb6b1d495 Merge pull request 'Improve database access' (#41) from improve-database-access into main
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
Reviewed-on: #41
Reviewed-by: baaboe <baaboe@gorb.app>
2025-07-30 13:57:36 +00:00
3a28a8d34a Merge branch 'main' into improve-database-access
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-07-30 15:26:30 +02:00
d64dc92b99 Merge branch 'wip/ban'
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
2025-07-25 00:31:34 +02:00
4a2f98a180 style: cargo clippy --fix && cargo fmt
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-07-25 00:21:51 +02:00
b38b5360f6 style: style 2025-07-25 00:21:20 +02:00
b28d5b840f style: cargo clippy --fix && cargo fmt 2025-07-24 02:30:52 +02:00
0e0c590e4d feat: added unband endpoint
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-24 02:14:29 +02:00
ba2442e786 style: updated to use the new ban object 2025-07-24 02:13:53 +02:00
c2b5f6568f style: renaming parameter, ban_time -> banned_since
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-24 01:58:10 +02:00
26f528819e style: cargo clippy --fix && cargo fmt
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 19:10:17 +02:00
7e10086753 feat: retrive all banned users in a guild 2025-07-23 19:08:54 +02:00
3ad73f28fa feat: added ban time 2025-07-23 16:30:38 +02:00
bb8927840d style: formatting
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 15:04:02 +02:00
475e008105 fix: move owner check to correct function 2025-07-23 15:03:56 +02:00
a1857a1939 Merge pull request 'Check if you are trying to kick owner' (#38) from wip/kick into main
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
Reviewed-on: #38
Reviewed-by: Radical <radical@radical.fun>
2025-07-23 12:59:34 +00:00
bf5cc600b9 Merge branch 'main' into wip/kick
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-07-23 09:10:40 +00:00
BAaboe
ac5ca90974 fix: self not member
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 02:03:06 +02:00
BAaboe
e074ca89f9 feat: idiot proofing
Some checks failed
ci/woodpecker/push/build-and-publish Pipeline failed
ci/woodpecker/pr/build-and-publish Pipeline failed
2025-07-23 01:50:55 +02:00
BAaboe
cbdf6f79e2 feat: idiot(goin) proofing
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:48:31 +02:00
BAaboe
ceaa37cbe2 fix: plural fix thing
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:37:35 +02:00
BAaboe
c725d13ca8 feat: kick permission
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:35:28 +02:00
BAaboe
5fe5186142 feat: ban permission
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:31:28 +02:00
BAaboe
2bc702f8d2 fix: baner :)
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:18:08 +02:00
BAaboe
9e5d2daeab fix: fixed error error
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:07:41 +02:00
BAaboe
6999b4120e fix: Updated error message when banning owner
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 01:00:17 +02:00
BAaboe
71d44f6c21 fix: Can not kick owner
Some checks failed
ci/woodpecker/push/build-and-publish Pipeline failed
2025-07-23 00:58:51 +02:00
BAaboe
8e31dc7aca style: cargo clippy --fix && cargo fmt
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-23 00:52:19 +02:00
BAaboe
ad24215fef feat: added endpoint for banning 2025-07-23 00:50:50 +02:00
BAaboe
f175c19325 fix: let you pass None to fetch_one_with_member for me 2025-07-22 23:18:21 +02:00
BAaboe
ade45780fa fix: forgot to add the change on schema 2025-07-22 22:04:48 +02:00
BAaboe
af71937506 fix: fixed the ban table names 2025-07-22 22:01:48 +02:00
BAaboe
b2e6d3f553 feat: added ban table to the database 2025-07-22 21:58:14 +02:00
2996c6f108 Merge pull request 'wip/kick' (#36) from wip/kick into main
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/push/publish-docs Pipeline was successful
Reviewed-on: #36
2025-07-22 16:56:36 +00:00
45978bb41a ci: only run on push
Some checks are pending
ci/woodpecker/push/build-and-publish Pipeline is pending
ci/woodpecker/push/publish-docs Pipeline is pending
prevents duplicate CIs from running at the same time
2025-07-22 18:55:26 +02:00
BAaboe
c26ec49e05 fix: cargo clippy --fix && cargo fmt
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
ci/woodpecker/pull_request_closed/build-and-publish Pipeline was successful
2025-07-22 18:50:17 +02:00
BAaboe
a3c460a611 fix: Only people in a server should see its members list
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-22 18:33:41 +02:00
BAaboe
6dd8ddb0df fix: members in router_with_auth
Some checks failed
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline failed
2025-07-22 18:27:36 +02:00
BAaboe
31596c6bfe fix: memebrs not member as endpoint 2025-07-22 18:26:04 +02:00
BAaboe
ea33230e58 fix: reduced numder of function calls to get conn 2025-07-22 18:10:37 +02:00
BAaboe
0468d1adca fix: Unecessary merge of routers 2025-07-22 18:05:19 +02:00
BAaboe
228bc68327 more path name fix
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
ci/woodpecker/pr/build-and-publish Pipeline was successful
2025-07-22 17:38:04 +02:00
BAaboe
4ec36c1cda path name fix
Some checks failed
ci/woodpecker/push/build-and-publish Pipeline failed
2025-07-22 17:35:02 +02:00
BAaboe
82f4388dab New endpoint 'members' with get and delete
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
2025-07-22 17:29:55 +02:00
fa52412b43 feat: make database access more uniform and stop locking as many pool connections
All checks were successful
ci/woodpecker/push/build-and-publish Pipeline was successful
2025-07-21 04:15:04 +02:00
46 changed files with 1137 additions and 458 deletions

View file

@ -5,7 +5,6 @@ steps:
- cargo build --release
when:
- event: push
- event: pull_request
- name: build-arm64
image: rust:1.88-bookworm
@ -20,7 +19,6 @@ steps:
PKG_CONFIG_PATH: /usr/aarch64-linux-gnu/lib/pkgconfig
when:
- event: push
- event: pull_request
- name: container-build-and-publish
image: docker

View file

@ -1,2 +0,0 @@
-- Your SQL goes here
ALTER TABLE messages ADD COLUMN is_edited BOOLEAN NOT NULL DEFAULT FALSE;

View file

@ -1,2 +1,2 @@
-- This file should undo anything in `up.sql`
ALTER TABLE messages DROP COLUMN is_edited;
DROP TABLE guild_bans;

View file

@ -0,0 +1,8 @@
-- Your SQL goes here
CREATE TABLE guild_bans (
guild_uuid uuid NOT NULL REFERENCES guilds(uuid) ON DELETE CASCADE,
user_uuid uuid NOT NULL REFERENCES users(uuid),
reason VARCHAR(200) DEFAULT NULL,
banned_since TIMESTAMPTZ NOT NULL DEFAULT NOW(),
PRIMARY KEY (user_uuid, guild_uuid)
);

View file

@ -0,0 +1,5 @@
-- This file should undo anything in `up.sql`
DROP INDEX roles_guuid_uuid;
ALTER TABLE roles DROP CONSTRAINT roles_pkey;
CREATE UNIQUE INDEX roles_pkey ON roles (uuid, guild_uuid);
ALTER TABLE roles ADD PRIMARY KEY USING INDEX roles_pkey;

View file

@ -0,0 +1,5 @@
-- Your SQL goes here
ALTER TABLE roles DROP CONSTRAINT roles_pkey;
CREATE UNIQUE INDEX roles_pkey ON roles (uuid);
ALTER TABLE roles ADD PRIMARY KEY USING INDEX roles_pkey;
CREATE UNIQUE INDEX roles_guuid_uuid ON roles (uuid, guild_uuid);

View file

@ -0,0 +1,2 @@
-- This file should undo anything in `up.sql`
ALTER TABLE users DROP COLUMN online_status;

View file

@ -0,0 +1,2 @@
-- Your SQL goes here
ALTER TABLE users ADD COLUMN online_status INT2 NOT NULL DEFAULT 0;

View file

@ -159,7 +159,7 @@ pub async fn post(
.await?;
if let Some(initial_guild) = app_state.config.instance.initial_guild {
Member::new(&app_state, uuid, initial_guild).await?;
Member::new(&mut conn, &app_state.cache_pool, uuid, initial_guild).await?;
}
let mut response = (

View file

@ -38,11 +38,17 @@ pub async fn get(
State(app_state): State<Arc<AppState>>,
query: Query<QueryParams>,
) -> Result<impl IntoResponse, Error> {
if let Ok(password_reset_token) =
PasswordResetToken::get_with_identifier(&app_state, query.identifier.clone()).await
let mut conn = app_state.pool.get().await?;
if let Ok(password_reset_token) = PasswordResetToken::get_with_identifier(
&mut conn,
&app_state.cache_pool,
query.identifier.clone(),
)
.await
{
if Utc::now().signed_duration_since(password_reset_token.created_at) > Duration::hours(1) {
password_reset_token.delete(&app_state).await?;
password_reset_token.delete(&app_state.cache_pool).await?;
} else {
return Err(Error::TooManyRequests(
"Please allow 1 hour before sending a new email".to_string(),
@ -50,7 +56,7 @@ pub async fn get(
}
}
PasswordResetToken::new(&app_state, query.identifier.clone()).await?;
PasswordResetToken::new(&mut conn, &app_state, query.identifier.clone()).await?;
Ok(StatusCode::OK)
}
@ -87,10 +93,14 @@ pub async fn post(
reset_password: Json<ResetPassword>,
) -> Result<impl IntoResponse, Error> {
let password_reset_token =
PasswordResetToken::get(&app_state, reset_password.token.clone()).await?;
PasswordResetToken::get(&app_state.cache_pool, reset_password.token.clone()).await?;
password_reset_token
.set_password(&app_state, reset_password.password.clone())
.set_password(
&mut app_state.pool.get().await?,
&app_state,
reset_password.password.clone(),
)
.await?;
Ok(StatusCode::OK)

View file

@ -55,7 +55,7 @@ pub async fn get(
return Ok(StatusCode::NO_CONTENT);
}
let email_token = EmailToken::get(&app_state, me.uuid).await?;
let email_token = EmailToken::get(&app_state.cache_pool, me.uuid).await?;
if query.token != email_token.token {
return Ok(StatusCode::UNAUTHORIZED);
@ -63,7 +63,7 @@ pub async fn get(
me.verify_email(&mut conn).await?;
email_token.delete(&app_state).await?;
email_token.delete(&app_state.cache_pool).await?;
Ok(StatusCode::OK)
}
@ -91,9 +91,9 @@ pub async fn post(
return Ok(StatusCode::NO_CONTENT);
}
if let Ok(email_token) = EmailToken::get(&app_state, me.uuid).await {
if let Ok(email_token) = EmailToken::get(&app_state.cache_pool, me.uuid).await {
if Utc::now().signed_duration_since(email_token.created_at) > Duration::hours(1) {
email_token.delete(&app_state).await?;
email_token.delete(&app_state.cache_pool).await?;
} else {
return Err(Error::TooManyRequests(
"Please allow 1 hour before sending a new email".to_string(),

View file

@ -60,14 +60,21 @@ pub async fn get(
Query(message_request): Query<MessageRequest>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let channel = Channel::fetch_one(&app_state, channel_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut app_state.pool.get().await?, uuid, channel.guild_uuid).await?;
let channel = Channel::fetch_one(&mut conn, &app_state.cache_pool, channel_uuid).await?;
Member::check_membership(&mut conn, uuid, channel.guild_uuid).await?;
let messages = channel
.fetch_messages(&app_state, message_request.amount, message_request.offset)
.fetch_messages(
&mut conn,
&app_state.cache_pool,
message_request.amount,
message_request.offset,
)
.await?;
Ok((StatusCode::OK, Json(messages)))

View file

@ -27,11 +27,13 @@ pub async fn get(
Path(channel_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let channel = Channel::fetch_one(&app_state, channel_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut app_state.pool.get().await?, uuid, channel.guild_uuid).await?;
let channel = Channel::fetch_one(&mut conn, &app_state.cache_pool, channel_uuid).await?;
Member::check_membership(&mut conn, uuid, channel.guild_uuid).await?;
Ok((StatusCode::OK, Json(channel)))
}
@ -41,19 +43,19 @@ pub async fn delete(
Path(channel_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let channel = Channel::fetch_one(&app_state, channel_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member =
Member::check_membership(&mut app_state.pool.get().await?, uuid, channel.guild_uuid)
.await?;
let channel = Channel::fetch_one(&mut conn, &app_state.cache_pool, channel_uuid).await?;
let member = Member::check_membership(&mut conn, uuid, channel.guild_uuid).await?;
member
.check_permission(&app_state, Permissions::ManageChannel)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::ManageChannel)
.await?;
channel.delete(&app_state).await?;
channel.delete(&mut conn, &app_state.cache_pool).await?;
Ok(StatusCode::OK)
}
@ -102,31 +104,37 @@ pub async fn patch(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(new_info): Json<NewInfo>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let mut channel = Channel::fetch_one(&app_state, channel_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member =
Member::check_membership(&mut app_state.pool.get().await?, uuid, channel.guild_uuid)
.await?;
let mut channel = Channel::fetch_one(&mut conn, &app_state.cache_pool, channel_uuid).await?;
let member = Member::check_membership(&mut conn, uuid, channel.guild_uuid).await?;
member
.check_permission(&app_state, Permissions::ManageChannel)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::ManageChannel)
.await?;
if let Some(new_name) = &new_info.name {
channel.set_name(&app_state, new_name.to_string()).await?;
channel
.set_name(&mut conn, &app_state.cache_pool, new_name.to_string())
.await?;
}
if let Some(new_description) = &new_info.description {
channel
.set_description(&app_state, new_description.to_string())
.set_description(
&mut conn,
&app_state.cache_pool,
new_description.to_string(),
)
.await?;
}
if let Some(new_is_above) = &new_info.is_above {
channel
.set_description(&app_state, new_is_above.to_string())
.set_description(&mut conn, &app_state.cache_pool, new_is_above.to_string())
.await?;
}

View file

@ -71,9 +71,9 @@ pub async fn ws(
// Authorize client using auth header
let uuid = check_access_token(auth_header, &mut conn).await?;
global_checks(&app_state, uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let channel = Channel::fetch_one(&app_state, channel_uuid).await?;
let channel = Channel::fetch_one(&mut conn, &app_state.cache_pool, channel_uuid).await?;
Member::check_membership(&mut conn, uuid, channel.guild_uuid).await?;
@ -103,7 +103,8 @@ pub async fn ws(
let message = channel
.new_message(
&app_state,
&mut conn,
&app_state.cache_pool,
uuid,
message_body.message,
message_body.reply_to,

View file

@ -128,9 +128,11 @@ pub async fn get_guilds(
let start = request_query.start.unwrap_or(0);
let amount = request_query.amount.unwrap_or(10);
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let guilds = Guild::fetch_amount(&app_state.pool, start, amount).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let guilds = Guild::fetch_amount(&mut conn, start, amount).await?;
Ok((StatusCode::OK, Json(guilds)))
}

View file

@ -0,0 +1,57 @@
use std::sync::Arc;
use axum::{
Extension, Json,
extract::{Path, State},
http::StatusCode,
response::IntoResponse,
};
use uuid::Uuid;
use crate::{
AppState,
api::v1::auth::CurrentUser,
error::Error,
objects::{GuildBan, Member, Permissions},
utils::global_checks,
};
pub async fn get(
State(app_state): State<Arc<AppState>>,
Path(guild_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let caller = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
caller
.check_permission(&mut conn, &app_state.cache_pool, Permissions::BanMember)
.await?;
let all_guild_bans = GuildBan::fetch_all(&mut conn, guild_uuid).await?;
Ok((StatusCode::OK, Json(all_guild_bans)))
}
pub async fn unban(
State(app_state): State<Arc<AppState>>,
Path((guild_uuid, user_uuid)): Path<(Uuid, Uuid)>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let caller = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
caller
.check_permission(&mut conn, &app_state.cache_pool, Permissions::BanMember)
.await?;
let ban = GuildBan::fetch_one(&mut conn, guild_uuid, user_uuid).await?;
ban.unban(&mut conn).await?;
Ok(StatusCode::OK)
}

View file

@ -14,7 +14,7 @@ use crate::{
api::v1::auth::CurrentUser,
error::Error,
objects::{Channel, Member, Permissions},
utils::{global_checks, order_by_is_above},
utils::{CacheFns, global_checks, order_by_is_above},
};
#[derive(Deserialize)]
@ -28,23 +28,26 @@ pub async fn get(
Path(guild_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
Member::check_membership(&mut app_state.pool.get().await?, uuid, guild_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
if let Ok(cache_hit) = app_state
.get_cache_key(format!("{guild_uuid}_channels"))
.cache_pool
.get_cache_key::<Vec<Channel>>(format!("{guild_uuid}_channels"))
.await
&& let Ok(channels) = serde_json::from_str::<Vec<Channel>>(&cache_hit)
{
return Ok((StatusCode::OK, Json(channels)).into_response());
return Ok((StatusCode::OK, Json(cache_hit)).into_response());
}
let channels = Channel::fetch_all(&app_state.pool, guild_uuid).await?;
let channels = Channel::fetch_all(&mut conn, guild_uuid).await?;
let channels_ordered = order_by_is_above(channels).await?;
app_state
.cache_pool
.set_cache_key(
format!("{guild_uuid}_channels"),
channels_ordered.clone(),
@ -61,17 +64,19 @@ pub async fn create(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(channel_info): Json<ChannelInfo>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let member =
Member::check_membership(&mut app_state.pool.get().await?, uuid, guild_uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
member
.check_permission(&app_state, Permissions::ManageChannel)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::ManageChannel)
.await?;
let channel = Channel::new(
&app_state,
&mut conn,
&app_state.cache_pool,
guild_uuid,
channel_info.name.clone(),
channel_info.description.clone(),

View file

@ -27,10 +27,10 @@ pub async fn get(
Path(guild_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
let guild = Guild::fetch_one(&mut conn, guild_uuid).await?;
@ -46,14 +46,14 @@ pub async fn create(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(invite_request): Json<InviteRequest>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
member
.check_permission(&app_state, Permissions::CreateInvite)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::CreateInvite)
.await?;
let guild = Guild::fetch_one(&mut conn, guild_uuid).await?;

View file

@ -3,7 +3,7 @@ use std::sync::Arc;
use ::uuid::Uuid;
use axum::{
Extension, Json,
extract::{Path, State},
extract::{Path, Query, State},
http::StatusCode,
response::IntoResponse,
};
@ -12,24 +12,32 @@ use crate::{
AppState,
api::v1::auth::CurrentUser,
error::Error,
objects::{Me, Member},
objects::{Me, Member, PaginationRequest},
utils::global_checks,
};
pub async fn get(
State(app_state): State<Arc<AppState>>,
Path(guild_uuid): Path<Uuid>,
Query(pagination): Query<PaginationRequest>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let members = Member::fetch_all(&app_state, &me, guild_uuid).await?;
let members = Member::fetch_page(
&mut conn,
&app_state.cache_pool,
&me,
guild_uuid,
pagination,
)
.await?;
Ok((StatusCode::OK, Json(members)))
}

View file

@ -7,11 +7,12 @@ use axum::{
extract::{Multipart, Path, State},
http::StatusCode,
response::IntoResponse,
routing::{get, patch, post},
routing::{delete, get, patch, post},
};
use bytes::Bytes;
use uuid::Uuid;
mod bans;
mod channels;
mod invites;
mod members;
@ -42,6 +43,9 @@ pub fn router() -> Router<Arc<AppState>> {
.route("/invites", post(invites::create))
// Members
.route("/members", get(members::get))
// Bans
.route("/bans", get(bans::get))
.route("/bans/{uuid}", delete(bans::unban))
}
/// `GET /api/v1/guilds/{uuid}` DESCRIPTION
@ -82,10 +86,10 @@ pub async fn get_guild(
Path(guild_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
let guild = Guild::fetch_one(&mut conn, guild_uuid).await?;
@ -102,14 +106,14 @@ pub async fn edit(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
mut multipart: Multipart,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
member
.check_permission(&app_state, Permissions::ManageGuild)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::ManageGuild)
.await?;
let mut guild = Guild::fetch_one(&mut conn, guild_uuid).await?;
@ -127,14 +131,7 @@ pub async fn edit(
}
if let Some(icon) = icon {
guild
.set_icon(
&app_state.bunny_storage,
&mut conn,
app_state.config.bunny.cdn_url.clone(),
icon,
)
.await?;
guild.set_icon(&mut conn, &app_state, icon).await?;
}
Ok(StatusCode::OK)

View file

@ -14,7 +14,7 @@ use crate::{
api::v1::auth::CurrentUser,
error::Error,
objects::{Member, Permissions, Role},
utils::{global_checks, order_by_is_above},
utils::{CacheFns, global_checks, order_by_is_above},
};
pub mod uuid;
@ -29,16 +29,18 @@ pub async fn get(
Path(guild_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
if let Ok(cache_hit) = app_state.get_cache_key(format!("{guild_uuid}_roles")).await
&& let Ok(roles) = serde_json::from_str::<Vec<Role>>(&cache_hit)
if let Ok(cache_hit) = app_state
.cache_pool
.get_cache_key::<Vec<Role>>(format!("{guild_uuid}_roles"))
.await
{
return Ok((StatusCode::OK, Json(roles)).into_response());
return Ok((StatusCode::OK, Json(cache_hit)).into_response());
}
let roles = Role::fetch_all(&mut conn, guild_uuid).await?;
@ -46,6 +48,7 @@ pub async fn get(
let roles_ordered = order_by_is_above(roles).await?;
app_state
.cache_pool
.set_cache_key(format!("{guild_uuid}_roles"), roles_ordered.clone(), 1800)
.await?;
@ -58,14 +61,14 @@ pub async fn create(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(role_info): Json<RoleInfo>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member = Member::check_membership(&mut conn, uuid, guild_uuid).await?;
member
.check_permission(&app_state, Permissions::ManageRole)
.check_permission(&mut conn, &app_state.cache_pool, Permissions::ManageRole)
.await?;
let role = Role::new(&mut conn, guild_uuid, role_info.name.clone()).await?;

View file

@ -13,7 +13,7 @@ use crate::{
api::v1::auth::CurrentUser,
error::Error,
objects::{Member, Role},
utils::global_checks,
utils::{CacheFns, global_checks},
};
pub async fn get(
@ -21,21 +21,24 @@ pub async fn get(
Path((guild_uuid, role_uuid)): Path<(Uuid, Uuid)>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
Member::check_membership(&mut conn, uuid, guild_uuid).await?;
if let Ok(cache_hit) = app_state.get_cache_key(format!("{role_uuid}")).await
&& let Ok(role) = serde_json::from_str::<Role>(&cache_hit)
if let Ok(cache_hit) = app_state
.cache_pool
.get_cache_key::<Role>(format!("{role_uuid}"))
.await
{
return Ok((StatusCode::OK, Json(role)).into_response());
return Ok((StatusCode::OK, Json(cache_hit)).into_response());
}
let role = Role::fetch_one(&mut conn, role_uuid).await?;
app_state
.cache_pool
.set_cache_key(format!("{role_uuid}"), role.clone(), 60)
.await?;

View file

@ -34,15 +34,15 @@ pub async fn join(
Path(invite_id): Path<String>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let invite = Invite::fetch_one(&mut conn, invite_id).await?;
let guild = Guild::fetch_one(&mut conn, invite.guild_uuid).await?;
Member::new(&app_state, uuid, guild.uuid).await?;
Member::new(&mut conn, &app_state.cache_pool, uuid, guild.uuid).await?;
Ok((StatusCode::OK, Json(guild)))
}

View file

@ -19,11 +19,13 @@ pub async fn get(
State(app_state): State<Arc<AppState>>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let me = Me::get(&mut app_state.pool.get().await?, uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let friends = me.get_friends(&app_state).await?;
let me = Me::get(&mut conn, uuid).await?;
let friends = me.get_friends(&mut conn, &app_state.cache_pool).await?;
Ok((StatusCode::OK, Json(friends)))
}
@ -57,10 +59,10 @@ pub async fn post(
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(user_request): Json<UserReq>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let target_uuid = user_uuid_from_username(&mut conn, &user_request.username).await?;

View file

@ -17,10 +17,10 @@ pub async fn delete(
Path(friend_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
me.remove_friend(&mut conn, friend_uuid).await?;

View file

@ -58,10 +58,10 @@ pub async fn get(
State(app_state): State<Arc<AppState>>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let memberships = me.fetch_memberships(&mut conn).await?;

View file

@ -49,6 +49,7 @@ struct NewInfo {
email: Option<String>,
pronouns: Option<String>,
about: Option<String>,
online_status: Option<i16>,
}
pub async fn update(
@ -73,36 +74,46 @@ pub async fn update(
let json = json_raw.unwrap_or_default();
let mut conn = app_state.pool.get().await?;
if avatar.is_some() || json.username.is_some() || json.display_name.is_some() {
global_checks(&app_state, uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
}
let mut me = Me::get(&mut app_state.pool.get().await?, uuid).await?;
let mut me = Me::get(&mut conn, uuid).await?;
if let Some(avatar) = avatar {
me.set_avatar(&app_state, app_state.config.bunny.cdn_url.clone(), avatar)
.await?;
me.set_avatar(&mut conn, &app_state, avatar).await?;
}
if let Some(username) = &json.username {
me.set_username(&app_state, username.clone()).await?;
me.set_username(&mut conn, &app_state.cache_pool, username.clone())
.await?;
}
if let Some(display_name) = &json.display_name {
me.set_display_name(&app_state, display_name.clone())
me.set_display_name(&mut conn, &app_state.cache_pool, display_name.clone())
.await?;
}
if let Some(email) = &json.email {
me.set_email(&app_state, email.clone()).await?;
me.set_email(&mut conn, &app_state.cache_pool, email.clone())
.await?;
}
if let Some(pronouns) = &json.pronouns {
me.set_pronouns(&app_state, pronouns.clone()).await?;
me.set_pronouns(&mut conn, &app_state.cache_pool, pronouns.clone())
.await?;
}
if let Some(about) = &json.about {
me.set_about(&app_state, about.clone()).await?;
me.set_about(&mut conn, &app_state.cache_pool, about.clone())
.await?;
}
if let Some(online_status) = &json.online_status {
me.set_online_status(&mut conn, &app_state.cache_pool, *online_status)
.await?;
}
Ok(StatusCode::OK)

17
src/api/v1/members/mod.rs Normal file
View file

@ -0,0 +1,17 @@
use std::sync::Arc;
use axum::{
Router,
routing::{delete, get, post},
};
use crate::AppState;
mod uuid;
pub fn router() -> Router<Arc<AppState>> {
Router::new()
.route("/{uuid}", get(uuid::get))
.route("/{uuid}", delete(uuid::delete))
.route("/{uuid}/ban", post(uuid::ban::post))
}

View file

@ -0,0 +1,48 @@
use std::sync::Arc;
use axum::{
Extension,
extract::{Json, Path, State},
http::StatusCode,
response::IntoResponse,
};
use serde::Deserialize;
use crate::{
AppState,
api::v1::auth::CurrentUser,
error::Error,
objects::{Member, Permissions},
utils::global_checks,
};
use uuid::Uuid;
#[derive(Deserialize)]
pub struct RequstBody {
reason: String,
}
pub async fn post(
State(app_state): State<Arc<AppState>>,
Path(member_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
Json(payload): Json<RequstBody>,
) -> Result<impl IntoResponse, Error> {
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let member =
Member::fetch_one_with_uuid(&mut conn, &app_state.cache_pool, None, member_uuid).await?;
let caller = Member::check_membership(&mut conn, uuid, member.guild_uuid).await?;
caller
.check_permission(&mut conn, &app_state.cache_pool, Permissions::BanMember)
.await?;
member.ban(&mut conn, &payload.reason).await?;
Ok(StatusCode::OK)
}

View file

@ -0,0 +1,66 @@
//! `/api/v1/members/{uuid}` Member specific endpoints
pub mod ban;
use std::sync::Arc;
use crate::{
AppState,
api::v1::auth::CurrentUser,
error::Error,
objects::{Me, Member, Permissions},
utils::global_checks,
};
use axum::{
Extension, Json,
extract::{Path, State},
http::StatusCode,
response::IntoResponse,
};
use uuid::Uuid;
pub async fn get(
State(app_state): State<Arc<AppState>>,
Path(member_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let member =
Member::fetch_one_with_uuid(&mut conn, &app_state.cache_pool, Some(&me), member_uuid)
.await?;
Member::check_membership(&mut conn, uuid, member.guild_uuid).await?;
Ok((StatusCode::OK, Json(member)))
}
pub async fn delete(
State(app_state): State<Arc<AppState>>,
Path(member_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
let mut conn = app_state.pool.get().await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let member =
Member::fetch_one_with_uuid(&mut conn, &app_state.cache_pool, Some(&me), member_uuid)
.await?;
let deleter = Member::check_membership(&mut conn, uuid, member.guild_uuid).await?;
deleter
.check_permission(&mut conn, &app_state.cache_pool, Permissions::KickMember)
.await?;
member.delete(&mut conn).await?;
Ok(StatusCode::OK)
}

View file

@ -11,6 +11,7 @@ mod channels;
mod guilds;
mod invites;
mod me;
mod members;
mod stats;
mod users;
@ -19,6 +20,7 @@ pub fn router(app_state: Arc<AppState>) -> Router<Arc<AppState>> {
.nest("/users", users::router())
.nest("/guilds", guilds::router())
.nest("/invites", invites::router())
.nest("/members", members::router())
.nest("/me", me::router())
.layer(from_fn_with_state(
app_state.clone(),

View file

@ -70,9 +70,11 @@ pub async fn users(
return Ok(StatusCode::BAD_REQUEST.into_response());
}
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let users = User::fetch_amount(&mut app_state.pool.get().await?, start, amount).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let users = User::fetch_amount(&mut conn, start, amount).await?;
Ok((StatusCode::OK, Json(users)).into_response())
}

View file

@ -39,11 +39,14 @@ pub async fn get(
Path(user_uuid): Path<Uuid>,
Extension(CurrentUser(uuid)): Extension<CurrentUser<Uuid>>,
) -> Result<impl IntoResponse, Error> {
global_checks(&app_state, uuid).await?;
let mut conn = app_state.pool.get().await?;
let me = Me::get(&mut app_state.pool.get().await?, uuid).await?;
global_checks(&mut conn, &app_state.config, uuid).await?;
let user = User::fetch_one_with_friendship(&app_state, &me, user_uuid).await?;
let me = Me::get(&mut conn, uuid).await?;
let user =
User::fetch_one_with_friendship(&mut conn, &app_state.cache_pool, &me, user_uuid).await?;
Ok((StatusCode::OK, Json(user)))
}

57
src/objects/bans.rs Normal file
View file

@ -0,0 +1,57 @@
use diesel::{ExpressionMethods, QueryDsl, Queryable, Selectable, SelectableHelper};
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use diesel_async::RunQueryDsl;
use crate::{Conn, error::Error, objects::load_or_empty, schema::guild_bans};
#[derive(Selectable, Queryable, Serialize, Deserialize)]
#[diesel(table_name = guild_bans)]
#[diesel(check_for_backend(diesel::pg::Pg))]
pub struct GuildBan {
pub guild_uuid: Uuid,
pub user_uuid: Uuid,
pub reason: Option<String>,
pub banned_since: chrono::DateTime<chrono::Utc>,
}
impl GuildBan {
pub async fn fetch_one(
conn: &mut Conn,
guild_uuid: Uuid,
user_uuid: Uuid,
) -> Result<GuildBan, Error> {
use guild_bans::dsl;
let guild_ban = dsl::guild_bans
.filter(dsl::guild_uuid.eq(guild_uuid))
.filter(dsl::user_uuid.eq(user_uuid))
.select(GuildBan::as_select())
.get_result(conn)
.await?;
Ok(guild_ban)
}
pub async fn fetch_all(conn: &mut Conn, guild_uuid: Uuid) -> Result<Vec<Self>, Error> {
use guild_bans::dsl;
let all_guild_bans = load_or_empty(
dsl::guild_bans
.filter(dsl::guild_uuid.eq(guild_uuid))
.load(conn)
.await,
)?;
Ok(all_guild_bans)
}
pub async fn unban(self, conn: &mut Conn) -> Result<(), Error> {
use guild_bans::dsl;
diesel::delete(guild_bans::table)
.filter(dsl::guild_uuid.eq(self.guild_uuid))
.filter(dsl::user_uuid.eq(self.user_uuid))
.execute(conn)
.await?;
Ok(())
}
}

View file

@ -2,15 +2,15 @@ use diesel::{
ExpressionMethods, Insertable, QueryDsl, Queryable, Selectable, SelectableHelper, delete,
insert_into, update,
};
use diesel_async::{RunQueryDsl, pooled_connection::AsyncDieselConnectionManager};
use diesel_async::RunQueryDsl;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{
AppState, Conn,
Conn,
error::Error,
schema::{channel_permissions, channels, messages},
utils::{CHANNEL_REGEX, order_by_is_above},
utils::{CHANNEL_REGEX, CacheFns, order_by_is_above},
};
use super::{HasIsAbove, HasUuid, Message, load_or_empty, message::MessageBuilder};
@ -79,49 +79,44 @@ impl HasIsAbove for Channel {
}
impl Channel {
pub async fn fetch_all(
pool: &deadpool::managed::Pool<
AsyncDieselConnectionManager<diesel_async::AsyncPgConnection>,
Conn,
>,
guild_uuid: Uuid,
) -> Result<Vec<Self>, Error> {
let mut conn = pool.get().await?;
pub async fn fetch_all(conn: &mut Conn, guild_uuid: Uuid) -> Result<Vec<Self>, Error> {
use channels::dsl;
let channel_builders: Vec<ChannelBuilder> = load_or_empty(
dsl::channels
.filter(dsl::guild_uuid.eq(guild_uuid))
.select(ChannelBuilder::as_select())
.load(&mut conn)
.load(conn)
.await,
)?;
let channel_futures = channel_builders.iter().map(async move |c| {
let mut conn = pool.get().await?;
c.clone().build(&mut conn).await
});
let mut channels = vec![];
futures_util::future::try_join_all(channel_futures).await
for builder in channel_builders {
channels.push(builder.build(conn).await?);
}
pub async fn fetch_one(app_state: &AppState, channel_uuid: Uuid) -> Result<Self, Error> {
if let Ok(cache_hit) = app_state.get_cache_key(channel_uuid.to_string()).await {
return Ok(serde_json::from_str(&cache_hit)?);
Ok(channels)
}
let mut conn = app_state.pool.get().await?;
pub async fn fetch_one(
conn: &mut Conn,
cache_pool: &redis::Client,
channel_uuid: Uuid,
) -> Result<Self, Error> {
if let Ok(cache_hit) = cache_pool.get_cache_key(channel_uuid.to_string()).await {
return Ok(cache_hit);
}
use channels::dsl;
let channel_builder: ChannelBuilder = dsl::channels
.filter(dsl::uuid.eq(channel_uuid))
.select(ChannelBuilder::as_select())
.get_result(&mut conn)
.get_result(conn)
.await?;
let channel = channel_builder.build(&mut conn).await?;
let channel = channel_builder.build(conn).await?;
app_state
cache_pool
.set_cache_key(channel_uuid.to_string(), channel.clone(), 60)
.await?;
@ -129,7 +124,8 @@ impl Channel {
}
pub async fn new(
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
guild_uuid: Uuid,
name: String,
description: Option<String>,
@ -138,11 +134,9 @@ impl Channel {
return Err(Error::BadRequest("Channel name is invalid".to_string()));
}
let mut conn = app_state.pool.get().await?;
let channel_uuid = Uuid::now_v7();
let channels = Self::fetch_all(&app_state.pool, guild_uuid).await?;
let channels = Self::fetch_all(conn, guild_uuid).await?;
let channels_ordered = order_by_is_above(channels).await?;
@ -158,7 +152,7 @@ impl Channel {
insert_into(channels::table)
.values(new_channel.clone())
.execute(&mut conn)
.execute(conn)
.await?;
if let Some(old_last_channel) = last_channel {
@ -166,7 +160,7 @@ impl Channel {
update(channels::table)
.filter(dsl::uuid.eq(old_last_channel.uuid))
.set(dsl::is_above.eq(new_channel.uuid))
.execute(&mut conn)
.execute(conn)
.await?;
}
@ -180,16 +174,16 @@ impl Channel {
permissions: vec![],
};
app_state
cache_pool
.set_cache_key(channel_uuid.to_string(), channel.clone(), 1800)
.await?;
if app_state
.get_cache_key(format!("{guild_uuid}_channels"))
if cache_pool
.get_cache_key::<Vec<Channel>>(format!("{guild_uuid}_channels"))
.await
.is_ok()
{
app_state
cache_pool
.del_cache_key(format!("{guild_uuid}_channels"))
.await?;
}
@ -197,14 +191,12 @@ impl Channel {
Ok(channel)
}
pub async fn delete(self, app_state: &AppState) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
pub async fn delete(self, conn: &mut Conn, cache_pool: &redis::Client) -> Result<(), Error> {
use channels::dsl;
match update(channels::table)
.filter(dsl::is_above.eq(self.uuid))
.set(dsl::is_above.eq(None::<Uuid>))
.execute(&mut conn)
.execute(conn)
.await
{
Ok(r) => Ok(r),
@ -214,13 +206,13 @@ impl Channel {
delete(channels::table)
.filter(dsl::uuid.eq(self.uuid))
.execute(&mut conn)
.execute(conn)
.await?;
match update(channels::table)
.filter(dsl::is_above.eq(self.uuid))
.set(dsl::is_above.eq(self.is_above))
.execute(&mut conn)
.execute(conn)
.await
{
Ok(r) => Ok(r),
@ -228,16 +220,20 @@ impl Channel {
Err(e) => Err(e),
}?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?;
}
if app_state
.get_cache_key(format!("{}_channels", self.guild_uuid))
if cache_pool
.get_cache_key::<Channel>(self.uuid.to_string())
.await
.is_ok()
{
app_state
cache_pool.del_cache_key(self.uuid.to_string()).await?;
}
if cache_pool
.get_cache_key::<Vec<Channel>>(format!("{}_channels", self.guild_uuid))
.await
.is_ok()
{
cache_pool
.del_cache_key(format!("{}_channels", self.guild_uuid))
.await?;
}
@ -247,32 +243,36 @@ impl Channel {
pub async fn fetch_messages(
&self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
amount: i64,
offset: i64,
) -> Result<Vec<Message>, Error> {
let mut conn = app_state.pool.get().await?;
use messages::dsl;
let messages: Vec<MessageBuilder> = load_or_empty(
let message_builders: Vec<MessageBuilder> = load_or_empty(
dsl::messages
.filter(dsl::channel_uuid.eq(self.uuid))
.select(MessageBuilder::as_select())
.order(dsl::uuid.desc())
.limit(amount)
.offset(offset)
.load(&mut conn)
.load(conn)
.await,
)?;
let message_futures = messages.iter().map(async move |b| b.build(app_state).await);
let mut messages = vec![];
futures_util::future::try_join_all(message_futures).await
for builder in message_builders {
messages.push(builder.build(conn, cache_pool).await?);
}
Ok(messages)
}
pub async fn new_message(
&self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
user_uuid: Uuid,
message: String,
reply_to: Option<Uuid>,
@ -285,85 +285,103 @@ impl Channel {
user_uuid,
message,
reply_to,
is_edited: false,
};
let mut conn = app_state.pool.get().await?;
insert_into(messages::table)
.values(message.clone())
.execute(&mut conn)
.execute(conn)
.await?;
message.build(app_state).await
message.build(conn, cache_pool).await
}
pub async fn edit_message(&self, app_state: &AppState, user_uuid: Uuid, message_uuid: Uuid, message: String) -> Result<Message, Error> {
use messages::dsl;
let mut conn = app_state.pool.get().await?;
let message: MessageBuilder = update(messages::table)
.filter(dsl::user_uuid.eq(user_uuid))
.filter(dsl::uuid.eq(message_uuid))
.set((dsl::is_edited.eq(true), dsl::message.eq(message)))
.returning(MessageBuilder::as_select())
.get_result(&mut conn)
.await?;
message.build(app_state).await
}
pub async fn set_name(&mut self, app_state: &AppState, new_name: String) -> Result<(), Error> {
pub async fn set_name(
&mut self,
conn: &mut Conn,
cache_pool: &redis::Client,
new_name: String,
) -> Result<(), Error> {
if !CHANNEL_REGEX.is_match(&new_name) {
return Err(Error::BadRequest("Channel name is invalid".to_string()));
}
let mut conn = app_state.pool.get().await?;
use channels::dsl;
update(channels::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::name.eq(&new_name))
.execute(&mut conn)
.execute(conn)
.await?;
self.name = new_name;
if cache_pool
.get_cache_key::<Channel>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?;
}
if cache_pool
.get_cache_key::<Vec<Channel>>(format!("{}_channels", self.guild_uuid))
.await
.is_ok()
{
cache_pool
.del_cache_key(format!("{}_channels", self.guild_uuid))
.await?;
}
Ok(())
}
pub async fn set_description(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_description: String,
) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
use channels::dsl;
update(channels::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::description.eq(&new_description))
.execute(&mut conn)
.execute(conn)
.await?;
self.description = Some(new_description);
if cache_pool
.get_cache_key::<Channel>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?;
}
if cache_pool
.get_cache_key::<Vec<Channel>>(format!("{}_channels", self.guild_uuid))
.await
.is_ok()
{
cache_pool
.del_cache_key(format!("{}_channels", self.guild_uuid))
.await?;
}
Ok(())
}
pub async fn move_channel(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_is_above: Uuid,
) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
use channels::dsl;
let old_above_uuid: Option<Uuid> = match dsl::channels
.filter(dsl::is_above.eq(self.uuid))
.select(dsl::uuid)
.get_result(&mut conn)
.get_result(conn)
.await
{
Ok(r) => Ok(Some(r)),
@ -375,14 +393,14 @@ impl Channel {
update(channels::table)
.filter(dsl::uuid.eq(uuid))
.set(dsl::is_above.eq(None::<Uuid>))
.execute(&mut conn)
.execute(conn)
.await?;
}
match update(channels::table)
.filter(dsl::is_above.eq(new_is_above))
.set(dsl::is_above.eq(self.uuid))
.execute(&mut conn)
.execute(conn)
.await
{
Ok(r) => Ok(r),
@ -393,19 +411,37 @@ impl Channel {
update(channels::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::is_above.eq(new_is_above))
.execute(&mut conn)
.execute(conn)
.await?;
if let Some(uuid) = old_above_uuid {
update(channels::table)
.filter(dsl::uuid.eq(uuid))
.set(dsl::is_above.eq(self.is_above))
.execute(&mut conn)
.execute(conn)
.await?;
}
self.is_above = Some(new_is_above);
if cache_pool
.get_cache_key::<Channel>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?;
}
if cache_pool
.get_cache_key::<Vec<Channel>>(format!("{}_channels", self.guild_uuid))
.await
.is_ok()
{
cache_pool
.del_cache_key(format!("{}_channels", self.guild_uuid))
.await?;
}
Ok(())
}
}

View file

@ -3,7 +3,11 @@ use lettre::message::MultiPart;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{AppState, error::Error, utils::generate_token};
use crate::{
AppState,
error::Error,
utils::{CacheFns, generate_token},
};
use super::Me;
@ -15,12 +19,10 @@ pub struct EmailToken {
}
impl EmailToken {
pub async fn get(app_state: &AppState, user_uuid: Uuid) -> Result<EmailToken, Error> {
let email_token = serde_json::from_str(
&app_state
pub async fn get(cache_pool: &redis::Client, user_uuid: Uuid) -> Result<EmailToken, Error> {
let email_token = cache_pool
.get_cache_key(format!("{user_uuid}_email_verify"))
.await?,
)?;
.await?;
Ok(email_token)
}
@ -37,6 +39,7 @@ impl EmailToken {
};
app_state
.cache_pool
.set_cache_key(format!("{}_email_verify", me.uuid), email_token, 86400)
.await?;
@ -59,8 +62,8 @@ impl EmailToken {
Ok(())
}
pub async fn delete(&self, app_state: &AppState) -> Result<(), Error> {
app_state
pub async fn delete(&self, cache_pool: &redis::Client) -> Result<(), Error> {
cache_pool
.del_cache_key(format!("{}_email_verify", self.user_uuid))
.await?;

View file

@ -3,14 +3,14 @@ use diesel::{
ExpressionMethods, Insertable, QueryDsl, Queryable, Selectable, SelectableHelper, insert_into,
update,
};
use diesel_async::{RunQueryDsl, pooled_connection::AsyncDieselConnectionManager};
use diesel_async::RunQueryDsl;
use serde::Serialize;
use tokio::task;
use url::Url;
use uuid::Uuid;
use crate::{
Conn,
AppState, Conn,
error::Error,
schema::{guild_members, guilds, invites},
utils::image_check,
@ -68,16 +68,11 @@ impl Guild {
}
pub async fn fetch_amount(
pool: &deadpool::managed::Pool<
AsyncDieselConnectionManager<diesel_async::AsyncPgConnection>,
Conn,
>,
conn: &mut Conn,
offset: i64,
amount: i64,
) -> Result<Vec<Self>, Error> {
// Fetch guild data from database
let mut conn = pool.get().await?;
use guilds::dsl;
let guild_builders: Vec<GuildBuilder> = load_or_empty(
dsl::guilds
@ -85,18 +80,17 @@ impl Guild {
.order_by(dsl::uuid)
.offset(offset)
.limit(amount)
.load(&mut conn)
.load(conn)
.await,
)?;
// Process each guild concurrently
let guild_futures = guild_builders.iter().map(async move |g| {
let mut conn = pool.get().await?;
g.clone().build(&mut conn).await
});
let mut guilds = vec![];
// Execute all futures concurrently and collect results
futures_util::future::try_join_all(guild_futures).await
for builder in guild_builders {
guilds.push(builder.build(conn).await?);
}
Ok(guilds)
}
pub async fn new(conn: &mut Conn, name: String, owner_uuid: Uuid) -> Result<Self, Error> {
@ -188,9 +182,8 @@ impl Guild {
// FIXME: Horrible security
pub async fn set_icon(
&mut self,
bunny_storage: &bunny_api_tokio::EdgeStorageClient,
conn: &mut Conn,
cdn_url: Url,
app_state: &AppState,
icon: Bytes,
) -> Result<(), Error> {
let icon_clone = icon.clone();
@ -199,14 +192,14 @@ impl Guild {
if let Some(icon) = &self.icon {
let relative_url = icon.path().trim_start_matches('/');
bunny_storage.delete(relative_url).await?;
app_state.bunny_storage.delete(relative_url).await?;
}
let path = format!("icons/{}/{}.{}", self.uuid, Uuid::now_v7(), image_type);
bunny_storage.upload(path.clone(), icon).await?;
app_state.bunny_storage.upload(path.clone(), icon).await?;
let icon_url = cdn_url.join(&path)?;
let icon_url = app_state.config.bunny.cdn_url.join(&path)?;
use guilds::dsl;
update(guilds::table)

View file

@ -14,7 +14,7 @@ use crate::{
error::Error,
objects::{Friend, FriendRequest, User},
schema::{friend_requests, friends, guild_members, guilds, users},
utils::{EMAIL_REGEX, USERNAME_REGEX, image_check},
utils::{CacheFns, EMAIL_REGEX, USERNAME_REGEX, image_check},
};
use super::{Guild, guild::GuildBuilder, load_or_empty, member::MemberBuilder};
@ -29,6 +29,7 @@ pub struct Me {
avatar: Option<String>,
pronouns: Option<String>,
about: Option<String>,
online_status: i16,
pub email: String,
pub email_verified: bool,
}
@ -75,15 +76,13 @@ impl Me {
pub async fn set_avatar(
&mut self,
conn: &mut Conn,
app_state: &AppState,
cdn_url: Url,
avatar: Bytes,
) -> Result<(), Error> {
let avatar_clone = avatar.clone();
let image_type = task::spawn_blocking(move || image_check(avatar_clone)).await??;
let mut conn = app_state.pool.get().await?;
if let Some(avatar) = &self.avatar {
let avatar_url: Url = avatar.parse()?;
@ -96,17 +95,25 @@ impl Me {
app_state.bunny_storage.upload(path.clone(), avatar).await?;
let avatar_url = cdn_url.join(&path)?;
let avatar_url = app_state.config.bunny.cdn_url.join(&path)?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::avatar.eq(avatar_url.as_str()))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if app_state
.cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
app_state
.cache_pool
.del_cache_key(self.uuid.to_string())
.await?
}
self.avatar = Some(avatar_url.to_string());
@ -127,7 +134,8 @@ impl Me {
pub async fn set_username(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_username: String,
) -> Result<(), Error> {
if !USERNAME_REGEX.is_match(&new_username)
@ -137,17 +145,19 @@ impl Me {
return Err(Error::BadRequest("Invalid username".to_string()));
}
let mut conn = app_state.pool.get().await?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::username.eq(new_username.as_str()))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
self.username = new_username;
@ -157,11 +167,10 @@ impl Me {
pub async fn set_display_name(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_display_name: String,
) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
let new_display_name_option = if new_display_name.is_empty() {
None
} else {
@ -172,11 +181,15 @@ impl Me {
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::display_name.eq(&new_display_name_option))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
self.display_name = new_display_name_option;
@ -186,15 +199,14 @@ impl Me {
pub async fn set_email(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_email: String,
) -> Result<(), Error> {
if !EMAIL_REGEX.is_match(&new_email) {
return Err(Error::BadRequest("Invalid username".to_string()));
}
let mut conn = app_state.pool.get().await?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
@ -202,11 +214,15 @@ impl Me {
dsl::email.eq(new_email.as_str()),
dsl::email_verified.eq(false),
))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
self.email = new_email;
@ -216,20 +232,23 @@ impl Me {
pub async fn set_pronouns(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_pronouns: String,
) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set((dsl::pronouns.eq(new_pronouns.as_str()),))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
Ok(())
@ -237,20 +256,52 @@ impl Me {
pub async fn set_about(
&mut self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
new_about: String,
) -> Result<(), Error> {
let mut conn = app_state.pool.get().await?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set((dsl::about.eq(new_about.as_str()),))
.execute(&mut conn)
.execute(conn)
.await?;
if app_state.get_cache_key(self.uuid.to_string()).await.is_ok() {
app_state.del_cache_key(self.uuid.to_string()).await?
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
Ok(())
}
pub async fn set_online_status(
&mut self,
conn: &mut Conn,
cache_pool: &redis::Client,
new_status: i16,
) -> Result<(), Error> {
if !(0..=4).contains(&new_status) {
return Err(Error::BadRequest("Invalid status code".to_string()));
}
self.online_status = new_status;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.uuid))
.set(dsl::online_status.eq(new_status))
.execute(conn)
.await?;
if cache_pool
.get_cache_key::<User>(self.uuid.to_string())
.await
.is_ok()
{
cache_pool.del_cache_key(self.uuid.to_string()).await?
}
Ok(())
@ -366,16 +417,18 @@ impl Me {
Ok(())
}
pub async fn get_friends(&self, app_state: &AppState) -> Result<Vec<User>, Error> {
pub async fn get_friends(
&self,
conn: &mut Conn,
cache_pool: &redis::Client,
) -> Result<Vec<User>, Error> {
use friends::dsl;
let mut conn = app_state.pool.get().await?;
let friends1 = load_or_empty(
dsl::friends
.filter(dsl::uuid1.eq(self.uuid))
.select(Friend::as_select())
.load(&mut conn)
.load(conn)
.await,
)?;
@ -383,21 +436,21 @@ impl Me {
dsl::friends
.filter(dsl::uuid2.eq(self.uuid))
.select(Friend::as_select())
.load(&mut conn)
.load(conn)
.await,
)?;
let friend_futures = friends1.iter().map(async move |friend| {
User::fetch_one_with_friendship(app_state, self, friend.uuid2).await
});
let mut friends = vec![];
let mut friends = futures_util::future::try_join_all(friend_futures).await?;
for friend in friends1 {
friends
.push(User::fetch_one_with_friendship(conn, cache_pool, self, friend.uuid2).await?);
}
let friend_futures = friends2.iter().map(async move |friend| {
User::fetch_one_with_friendship(app_state, self, friend.uuid1).await
});
friends.append(&mut futures_util::future::try_join_all(friend_futures).await?);
for friend in friends2 {
friends
.push(User::fetch_one_with_friendship(conn, cache_pool, self, friend.uuid1).await?);
}
Ok(friends)
}

View file

@ -1,21 +1,31 @@
use diesel::{
ExpressionMethods, Insertable, QueryDsl, Queryable, Selectable, SelectableHelper, insert_into,
Associations, BoolExpressionMethods, ExpressionMethods, Identifiable, Insertable, JoinOnDsl,
QueryDsl, Queryable, Selectable, SelectableHelper, define_sql_function, delete, insert_into,
sql_types::{Nullable, VarChar},
};
use diesel_async::RunQueryDsl;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{
AppState, Conn,
Conn,
error::Error,
objects::{Me, Permissions, Role},
schema::guild_members,
objects::PaginationRequest,
schema::{friends, guild_bans, guild_members, users},
};
use super::{User, load_or_empty};
use super::{
Friend, Guild, GuildBan, Me, Pagination, Permissions, Role, User, load_or_empty,
user::UserBuilder,
};
#[derive(Serialize, Queryable, Selectable, Insertable)]
define_sql_function! { fn coalesce(x: Nullable<VarChar>, y: Nullable<VarChar>, z: VarChar) -> Text; }
#[derive(Serialize, Queryable, Identifiable, Selectable, Insertable, Associations)]
#[diesel(table_name = guild_members)]
#[diesel(belongs_to(UserBuilder, foreign_key = user_uuid))]
#[diesel(belongs_to(Guild, foreign_key = guild_uuid))]
#[diesel(primary_key(uuid))]
#[diesel(check_for_backend(diesel::pg::Pg))]
pub struct MemberBuilder {
pub uuid: Uuid,
@ -26,15 +36,22 @@ pub struct MemberBuilder {
}
impl MemberBuilder {
pub async fn build(&self, app_state: &AppState, me: Option<&Me>) -> Result<Member, Error> {
pub async fn build(
&self,
conn: &mut Conn,
cache_pool: &redis::Client,
me: Option<&Me>,
) -> Result<Member, Error> {
let user;
if let Some(me) = me {
user = User::fetch_one_with_friendship(app_state, me, self.user_uuid).await?;
user = User::fetch_one_with_friendship(conn, cache_pool, me, self.user_uuid).await?;
} else {
user = User::fetch_one(app_state, self.user_uuid).await?;
user = User::fetch_one(conn, cache_pool, self.user_uuid).await?;
}
let roles = Role::fetch_from_member(conn, cache_pool, self).await?;
Ok(Member {
uuid: self.uuid,
nickname: self.nickname.clone(),
@ -42,16 +59,44 @@ impl MemberBuilder {
guild_uuid: self.guild_uuid,
is_owner: self.is_owner,
user,
roles,
})
}
async fn build_with_parts(
&self,
conn: &mut Conn,
cache_pool: &redis::Client,
user_builder: UserBuilder,
friend: Option<Friend>,
) -> Result<Member, Error> {
let mut user = user_builder.build();
if let Some(friend) = friend {
user.friends_since = Some(friend.accepted_at);
}
let roles = Role::fetch_from_member(conn, cache_pool, self).await?;
Ok(Member {
uuid: self.uuid,
nickname: self.nickname.clone(),
user_uuid: self.user_uuid,
guild_uuid: self.guild_uuid,
is_owner: self.is_owner,
user,
roles,
})
}
pub async fn check_permission(
&self,
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
permission: Permissions,
) -> Result<(), Error> {
if !self.is_owner {
let roles = Role::fetch_from_member(app_state, self.uuid).await?;
let roles = Role::fetch_from_member(conn, cache_pool, self).await?;
let allowed = roles.iter().any(|r| r.permissions & permission as i64 != 0);
if !allowed {
return Err(Error::Forbidden("Not allowed".to_string()));
@ -62,14 +107,16 @@ impl MemberBuilder {
}
}
#[derive(Serialize, Deserialize)]
#[derive(Serialize, Deserialize, Clone)]
pub struct Member {
pub uuid: Uuid,
pub nickname: Option<String>,
#[serde(skip)]
pub user_uuid: Uuid,
pub guild_uuid: Uuid,
pub is_owner: bool,
user: User,
roles: Vec<Role>,
}
impl Member {
@ -101,55 +148,173 @@ impl Member {
}
pub async fn fetch_one(
app_state: &AppState,
me: &Me,
conn: &mut Conn,
cache_pool: &redis::Client,
me: Option<&Me>,
user_uuid: Uuid,
guild_uuid: Uuid,
) -> Result<Self, Error> {
let mut conn = app_state.pool.get().await?;
let member: MemberBuilder;
let user: UserBuilder;
let friend: Option<Friend>;
use friends::dsl as fdsl;
use guild_members::dsl;
let member: MemberBuilder = dsl::guild_members
.filter(dsl::user_uuid.eq(user_uuid))
if let Some(me) = me {
(member, user, friend) = dsl::guild_members
.filter(dsl::guild_uuid.eq(guild_uuid))
.select(MemberBuilder::as_select())
.get_result(&mut conn)
.filter(dsl::user_uuid.eq(user_uuid))
.inner_join(users::table)
.left_join(
fdsl::friends.on(fdsl::uuid1
.eq(me.uuid)
.and(fdsl::uuid2.eq(users::uuid))
.or(fdsl::uuid2.eq(me.uuid).and(fdsl::uuid1.eq(users::uuid)))),
)
.select((
MemberBuilder::as_select(),
UserBuilder::as_select(),
Option::<Friend>::as_select(),
))
.get_result(conn)
.await?;
} else {
(member, user) = dsl::guild_members
.filter(dsl::guild_uuid.eq(guild_uuid))
.filter(dsl::user_uuid.eq(user_uuid))
.inner_join(users::table)
.select((MemberBuilder::as_select(), UserBuilder::as_select()))
.get_result(conn)
.await?;
member.build(app_state, Some(me)).await
friend = None;
}
pub async fn fetch_all(
app_state: &AppState,
member
.build_with_parts(conn, cache_pool, user, friend)
.await
}
pub async fn fetch_one_with_uuid(
conn: &mut Conn,
cache_pool: &redis::Client,
me: Option<&Me>,
uuid: Uuid,
) -> Result<Self, Error> {
let member: MemberBuilder;
let user: UserBuilder;
let friend: Option<Friend>;
use friends::dsl as fdsl;
use guild_members::dsl;
if let Some(me) = me {
(member, user, friend) = dsl::guild_members
.filter(dsl::uuid.eq(uuid))
.inner_join(users::table)
.left_join(
fdsl::friends.on(fdsl::uuid1
.eq(me.uuid)
.and(fdsl::uuid2.eq(users::uuid))
.or(fdsl::uuid2.eq(me.uuid).and(fdsl::uuid1.eq(users::uuid)))),
)
.select((
MemberBuilder::as_select(),
UserBuilder::as_select(),
Option::<Friend>::as_select(),
))
.get_result(conn)
.await?;
} else {
(member, user) = dsl::guild_members
.filter(dsl::uuid.eq(uuid))
.inner_join(users::table)
.select((MemberBuilder::as_select(), UserBuilder::as_select()))
.get_result(conn)
.await?;
friend = None;
}
member
.build_with_parts(conn, cache_pool, user, friend)
.await
}
pub async fn fetch_page(
conn: &mut Conn,
cache_pool: &redis::Client,
me: &Me,
guild_uuid: Uuid,
) -> Result<Vec<Self>, Error> {
let mut conn = app_state.pool.get().await?;
pagination: PaginationRequest,
) -> Result<Pagination<Self>, Error> {
let per_page = pagination.per_page.unwrap_or(50);
let page_multiplier: i64 = ((pagination.page - 1) * per_page).into();
if !(10..=100).contains(&per_page) {
return Err(Error::BadRequest(
"Invalid amount per page requested".to_string(),
));
}
use friends::dsl as fdsl;
use guild_members::dsl;
let member_builders: Vec<MemberBuilder> = load_or_empty(
let member_builders: Vec<(MemberBuilder, UserBuilder, Option<Friend>)> = load_or_empty(
dsl::guild_members
.filter(dsl::guild_uuid.eq(guild_uuid))
.select(MemberBuilder::as_select())
.load(&mut conn)
.inner_join(users::table)
.left_join(
fdsl::friends.on(fdsl::uuid1
.eq(me.uuid)
.and(fdsl::uuid2.eq(users::uuid))
.or(fdsl::uuid2.eq(me.uuid).and(fdsl::uuid1.eq(users::uuid)))),
)
.limit(per_page.into())
.offset(page_multiplier)
.order_by(coalesce(
dsl::nickname,
users::display_name,
users::username,
))
.select((
MemberBuilder::as_select(),
UserBuilder::as_select(),
Option::<Friend>::as_select(),
))
.load(conn)
.await,
)?;
let mut members = vec![];
let pages = Member::count(conn, guild_uuid).await? as f32 / per_page as f32;
for builder in member_builders {
members.push(builder.build(app_state, Some(me)).await?);
let mut members = Pagination::<Member> {
objects: Vec::with_capacity(member_builders.len()),
amount: member_builders.len() as i32,
pages: pages.ceil() as i32,
page: pagination.page,
};
for (member, user, friend) in member_builders {
members.objects.push(
member
.build_with_parts(conn, cache_pool, user, friend)
.await?,
);
}
Ok(members)
}
pub async fn new(
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
user_uuid: Uuid,
guild_uuid: Uuid,
) -> Result<Self, Error> {
let mut conn = app_state.pool.get().await?;
let banned = GuildBan::fetch_one(conn, guild_uuid, user_uuid).await;
match banned {
Ok(_) => Err(Error::Forbidden("User banned".to_string())),
Err(Error::SqlError(diesel::result::Error::NotFound)) => Ok(()),
Err(e) => Err(e),
}?;
let member_uuid = Uuid::now_v7();
@ -163,9 +328,51 @@ impl Member {
insert_into(guild_members::table)
.values(&member)
.execute(&mut conn)
.execute(conn)
.await?;
member.build(app_state, None).await
member.build(conn, cache_pool, None).await
}
pub async fn delete(self, conn: &mut Conn) -> Result<(), Error> {
if self.is_owner {
return Err(Error::Forbidden("Can not kick owner".to_string()));
}
delete(guild_members::table)
.filter(guild_members::uuid.eq(self.uuid))
.execute(conn)
.await?;
Ok(())
}
pub async fn ban(self, conn: &mut Conn, reason: &String) -> Result<(), Error> {
if self.is_owner {
return Err(Error::Forbidden("Can not ban owner".to_string()));
}
use guild_bans::dsl;
insert_into(guild_bans::table)
.values((
dsl::guild_uuid.eq(self.guild_uuid),
dsl::user_uuid.eq(self.user_uuid),
dsl::reason.eq(reason),
))
.execute(conn)
.await?;
self.delete(conn).await?;
Ok(())
}
pub fn to_builder(&self) -> MemberBuilder {
MemberBuilder {
uuid: self.uuid,
nickname: self.nickname.clone(),
user_uuid: self.user_uuid,
guild_uuid: self.guild_uuid,
is_owner: self.is_owner,
}
}
}

View file

@ -1,10 +1,15 @@
use diesel::{Insertable, Queryable, Selectable};
use diesel::{ExpressionMethods, Insertable, QueryDsl, Queryable, Selectable};
use diesel_async::RunQueryDsl;
use serde::Serialize;
use uuid::Uuid;
use crate::{AppState, error::Error, schema::messages};
use crate::{
Conn,
error::Error,
schema::{channels, guilds, messages},
};
use super::User;
use super::Member;
#[derive(Clone, Queryable, Selectable, Insertable)]
#[diesel(table_name = messages)]
@ -15,12 +20,24 @@ pub struct MessageBuilder {
pub user_uuid: Uuid,
pub message: String,
pub reply_to: Option<Uuid>,
pub is_edited: bool,
}
impl MessageBuilder {
pub async fn build(&self, app_state: &AppState) -> Result<Message, Error> {
let user = User::fetch_one(app_state, self.user_uuid).await?;
pub async fn build(
&self,
conn: &mut Conn,
cache_pool: &redis::Client,
) -> Result<Message, Error> {
use channels::dsl;
let guild_uuid = dsl::channels
.filter(dsl::uuid.eq(self.channel_uuid))
.inner_join(guilds::table)
.select(guilds::uuid)
.get_result(conn)
.await?;
let member = Member::fetch_one(conn, cache_pool, None, self.user_uuid, guild_uuid).await?;
Ok(Message {
uuid: self.uuid,
@ -28,8 +45,7 @@ impl MessageBuilder {
user_uuid: self.user_uuid,
message: self.message.clone(),
reply_to: self.reply_to,
is_edited: self.is_edited,
user,
member,
})
}
}
@ -41,6 +57,5 @@ pub struct Message {
user_uuid: Uuid,
message: String,
reply_to: Option<Uuid>,
is_edited: bool,
user: User,
member: Member,
}

View file

@ -4,9 +4,10 @@ use lettre::{
transport::smtp::authentication::Credentials,
};
use log::debug;
use serde::Deserialize;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
mod bans;
mod channel;
mod email_token;
mod friends;
@ -19,6 +20,7 @@ mod password_reset_token;
mod role;
mod user;
pub use bans::GuildBan;
pub use channel::Channel;
pub use email_token::EmailToken;
pub use friends::Friend;
@ -74,6 +76,20 @@ impl Cookies for Request<Body> {
}
*/
#[derive(Serialize)]
pub struct Pagination<T> {
objects: Vec<T>,
amount: i32,
pages: i32,
page: i32,
}
#[derive(Deserialize)]
pub struct PaginationRequest {
pub page: i32,
pub per_page: Option<i32>,
}
fn load_or_empty<T>(
query_result: Result<Vec<T>, diesel::result::Error>,
) -> Result<Vec<T>, diesel::result::Error> {

View file

@ -10,10 +10,10 @@ use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{
AppState,
AppState, Conn,
error::Error,
schema::users,
utils::{PASSWORD_REGEX, generate_token, global_checks, user_uuid_from_identifier},
utils::{CacheFns, PASSWORD_REGEX, generate_token, global_checks, user_uuid_from_identifier},
};
#[derive(Serialize, Deserialize)]
@ -24,50 +24,49 @@ pub struct PasswordResetToken {
}
impl PasswordResetToken {
pub async fn get(app_state: &AppState, token: String) -> Result<PasswordResetToken, Error> {
let user_uuid: Uuid =
serde_json::from_str(&app_state.get_cache_key(token.to_string()).await?)?;
let password_reset_token = serde_json::from_str(
&app_state
pub async fn get(
cache_pool: &redis::Client,
token: String,
) -> Result<PasswordResetToken, Error> {
let user_uuid: Uuid = cache_pool.get_cache_key(token.to_string()).await?;
let password_reset_token = cache_pool
.get_cache_key(format!("{user_uuid}_password_reset"))
.await?,
)?;
.await?;
Ok(password_reset_token)
}
pub async fn get_with_identifier(
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
identifier: String,
) -> Result<PasswordResetToken, Error> {
let mut conn = app_state.pool.get().await?;
let user_uuid = user_uuid_from_identifier(conn, &identifier).await?;
let user_uuid = user_uuid_from_identifier(&mut conn, &identifier).await?;
let password_reset_token = serde_json::from_str(
&app_state
let password_reset_token = cache_pool
.get_cache_key(format!("{user_uuid}_password_reset"))
.await?,
)?;
.await?;
Ok(password_reset_token)
}
#[allow(clippy::new_ret_no_self)]
pub async fn new(app_state: &AppState, identifier: String) -> Result<(), Error> {
pub async fn new(
conn: &mut Conn,
app_state: &AppState,
identifier: String,
) -> Result<(), Error> {
let token = generate_token::<32>()?;
let mut conn = app_state.pool.get().await?;
let user_uuid = user_uuid_from_identifier(conn, &identifier).await?;
let user_uuid = user_uuid_from_identifier(&mut conn, &identifier).await?;
global_checks(app_state, user_uuid).await?;
global_checks(conn, &app_state.config, user_uuid).await?;
use users::dsl as udsl;
let (username, email_address): (String, String) = udsl::users
.filter(udsl::uuid.eq(user_uuid))
.select((udsl::username, udsl::email))
.get_result(&mut conn)
.get_result(conn)
.await?;
let password_reset_token = PasswordResetToken {
@ -77,6 +76,7 @@ impl PasswordResetToken {
};
app_state
.cache_pool
.set_cache_key(
format!("{user_uuid}_password_reset"),
password_reset_token,
@ -84,6 +84,7 @@ impl PasswordResetToken {
)
.await?;
app_state
.cache_pool
.set_cache_key(token.clone(), user_uuid, 86400)
.await?;
@ -106,7 +107,12 @@ impl PasswordResetToken {
Ok(())
}
pub async fn set_password(&self, app_state: &AppState, password: String) -> Result<(), Error> {
pub async fn set_password(
&self,
conn: &mut Conn,
app_state: &AppState,
password: String,
) -> Result<(), Error> {
if !PASSWORD_REGEX.is_match(&password) {
return Err(Error::BadRequest(
"Please provide a valid password".to_string(),
@ -120,19 +126,17 @@ impl PasswordResetToken {
.hash_password(password.as_bytes(), &salt)
.map_err(|e| Error::PasswordHashError(e.to_string()))?;
let mut conn = app_state.pool.get().await?;
use users::dsl;
update(users::table)
.filter(dsl::uuid.eq(self.user_uuid))
.set(dsl::password.eq(hashed_password.to_string()))
.execute(&mut conn)
.execute(conn)
.await?;
let (username, email_address): (String, String) = dsl::users
.filter(dsl::uuid.eq(self.user_uuid))
.select((dsl::username, dsl::email))
.get_result(&mut conn)
.get_result(conn)
.await?;
let login_page = app_state.config.web.frontend_url.join("login")?;
@ -149,14 +153,14 @@ impl PasswordResetToken {
app_state.mail_client.send_mail(email).await?;
self.delete(app_state).await
self.delete(&app_state.cache_pool).await
}
pub async fn delete(&self, app_state: &AppState) -> Result<(), Error> {
app_state
pub async fn delete(&self, cache_pool: &redis::Client) -> Result<(), Error> {
cache_pool
.del_cache_key(format!("{}_password_reset", &self.user_uuid))
.await?;
app_state.del_cache_key(self.token.to_string()).await?;
cache_pool.del_cache_key(self.token.to_string()).await?;
Ok(())
}

View file

@ -1,22 +1,24 @@
use diesel::query_dsl::BelongingToDsl;
use diesel::{
ExpressionMethods, Insertable, QueryDsl, Queryable, Selectable, SelectableHelper, insert_into,
update,
Associations, ExpressionMethods, Identifiable, Insertable, QueryDsl, Queryable, Selectable,
SelectableHelper, insert_into, update,
};
use diesel_async::RunQueryDsl;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{
AppState, Conn,
Conn,
error::Error,
schema::{role_members, roles},
utils::order_by_is_above,
utils::{CacheFns, order_by_is_above},
};
use super::{HasIsAbove, HasUuid, load_or_empty};
use super::{HasIsAbove, HasUuid, load_or_empty, member::MemberBuilder};
#[derive(Deserialize, Serialize, Clone, Queryable, Selectable, Insertable)]
#[derive(Deserialize, Serialize, Clone, Identifiable, Queryable, Selectable, Insertable)]
#[diesel(table_name = roles)]
#[diesel(primary_key(uuid))]
#[diesel(check_for_backend(diesel::pg::Pg))]
pub struct Role {
uuid: Uuid,
@ -27,27 +29,17 @@ pub struct Role {
pub permissions: i64,
}
#[derive(Serialize, Clone, Queryable, Selectable, Insertable)]
#[derive(Serialize, Clone, Identifiable, Queryable, Selectable, Insertable, Associations)]
#[diesel(table_name = role_members)]
#[diesel(belongs_to(MemberBuilder, foreign_key = member_uuid))]
#[diesel(belongs_to(Role, foreign_key = role_uuid))]
#[diesel(primary_key(role_uuid, member_uuid))]
#[diesel(check_for_backend(diesel::pg::Pg))]
pub struct RoleMember {
role_uuid: Uuid,
member_uuid: Uuid,
}
impl RoleMember {
async fn fetch_role(&self, conn: &mut Conn) -> Result<Role, Error> {
use roles::dsl;
let role: Role = dsl::roles
.filter(dsl::uuid.eq(self.role_uuid))
.select(Role::as_select())
.get_result(conn)
.await?;
Ok(role)
}
}
impl HasUuid for Role {
fn uuid(&self) -> &Uuid {
self.uuid.as_ref()
@ -75,35 +67,27 @@ impl Role {
}
pub async fn fetch_from_member(
app_state: &AppState,
member_uuid: Uuid,
conn: &mut Conn,
cache_pool: &redis::Client,
member: &MemberBuilder,
) -> Result<Vec<Self>, Error> {
if let Ok(roles) = app_state
.get_cache_key(format!("{member_uuid}_roles"))
if let Ok(roles) = cache_pool
.get_cache_key(format!("{}_roles", member.uuid))
.await
{
return Ok(serde_json::from_str(&roles)?);
return Ok(roles);
}
let mut conn = app_state.pool.get().await?;
use role_members::dsl;
let role_memberships: Vec<RoleMember> = load_or_empty(
dsl::role_members
.filter(dsl::member_uuid.eq(member_uuid))
.select(RoleMember::as_select())
.load(&mut conn)
let roles: Vec<Role> = load_or_empty(
RoleMember::belonging_to(member)
.inner_join(roles::table)
.select(Role::as_select())
.load(conn)
.await,
)?;
let mut roles = vec![];
for membership in role_memberships {
roles.push(membership.fetch_role(&mut conn).await?);
}
app_state
.set_cache_key(format!("{member_uuid}_roles"), roles.clone(), 300)
cache_pool
.set_cache_key(format!("{}_roles", member.uuid), roles.clone(), 300)
.await?;
Ok(roles)
@ -176,6 +160,10 @@ pub enum Permissions {
ManageGuild = 32,
/// Lets users change member settings (nickname, etc)
ManageMember = 64,
/// Lets users ban members
BanMember = 128,
/// Lets users kick members
KickMember = 256,
}
impl Permissions {
@ -188,6 +176,8 @@ impl Permissions {
Self::ManageInvite,
Self::ManageGuild,
Self::ManageMember,
Self::BanMember,
Self::KickMember,
];
all_perms

View file

@ -4,7 +4,7 @@ use diesel_async::RunQueryDsl;
use serde::{Deserialize, Serialize};
use uuid::Uuid;
use crate::{AppState, Conn, error::Error, objects::Me, schema::users};
use crate::{Conn, error::Error, objects::Me, schema::users, utils::CacheFns};
use super::load_or_empty;
@ -18,10 +18,11 @@ pub struct UserBuilder {
avatar: Option<String>,
pronouns: Option<String>,
about: Option<String>,
online_status: i16,
}
impl UserBuilder {
fn build(self) -> User {
pub fn build(self) -> User {
User {
uuid: self.uuid,
username: self.username,
@ -29,6 +30,7 @@ impl UserBuilder {
avatar: self.avatar,
pronouns: self.pronouns,
about: self.about,
online_status: self.online_status,
friends_since: None,
}
}
@ -36,33 +38,36 @@ impl UserBuilder {
#[derive(Deserialize, Serialize, Clone)]
pub struct User {
uuid: Uuid,
pub uuid: Uuid,
username: String,
display_name: Option<String>,
avatar: Option<String>,
pronouns: Option<String>,
about: Option<String>,
friends_since: Option<DateTime<Utc>>,
online_status: i16,
pub friends_since: Option<DateTime<Utc>>,
}
impl User {
pub async fn fetch_one(app_state: &AppState, user_uuid: Uuid) -> Result<Self, Error> {
let mut conn = app_state.pool.get().await?;
if let Ok(cache_hit) = app_state.get_cache_key(user_uuid.to_string()).await {
return Ok(serde_json::from_str(&cache_hit)?);
pub async fn fetch_one(
conn: &mut Conn,
cache_pool: &redis::Client,
user_uuid: Uuid,
) -> Result<Self, Error> {
if let Ok(cache_hit) = cache_pool.get_cache_key(user_uuid.to_string()).await {
return Ok(cache_hit);
}
use users::dsl;
let user_builder: UserBuilder = dsl::users
.filter(dsl::uuid.eq(user_uuid))
.select(UserBuilder::as_select())
.get_result(&mut conn)
.get_result(conn)
.await?;
let user = user_builder.build();
app_state
cache_pool
.set_cache_key(user_uuid.to_string(), user.clone(), 1800)
.await?;
@ -70,15 +75,14 @@ impl User {
}
pub async fn fetch_one_with_friendship(
app_state: &AppState,
conn: &mut Conn,
cache_pool: &redis::Client,
me: &Me,
user_uuid: Uuid,
) -> Result<Self, Error> {
let mut conn = app_state.pool.get().await?;
let mut user = Self::fetch_one(conn, cache_pool, user_uuid).await?;
let mut user = Self::fetch_one(app_state, user_uuid).await?;
if let Some(friend) = me.friends_with(&mut conn, user_uuid).await? {
if let Some(friend) = me.friends_with(conn, user_uuid).await? {
user.friends_since = Some(friend.accepted_at);
}

View file

@ -47,6 +47,16 @@ diesel::table! {
}
}
diesel::table! {
guild_bans (user_uuid, guild_uuid) {
guild_uuid -> Uuid,
user_uuid -> Uuid,
#[max_length = 200]
reason -> Nullable<Varchar>,
banned_since -> Timestamptz,
}
}
diesel::table! {
guild_members (uuid) {
uuid -> Uuid,
@ -94,7 +104,6 @@ diesel::table! {
#[max_length = 4000]
message -> Varchar,
reply_to -> Nullable<Uuid>,
is_edited -> Bool,
}
}
@ -117,7 +126,7 @@ diesel::table! {
}
diesel::table! {
roles (uuid, guild_uuid) {
roles (uuid) {
uuid -> Uuid,
guild_uuid -> Uuid,
#[max_length = 50]
@ -148,13 +157,17 @@ diesel::table! {
pronouns -> Nullable<Varchar>,
#[max_length = 200]
about -> Nullable<Varchar>,
online_status -> Int2,
}
}
diesel::joinable!(access_tokens -> refresh_tokens (refresh_token));
diesel::joinable!(access_tokens -> users (uuid));
diesel::joinable!(channel_permissions -> channels (channel_uuid));
diesel::joinable!(channel_permissions -> roles (role_uuid));
diesel::joinable!(channels -> guilds (guild_uuid));
diesel::joinable!(guild_bans -> guilds (guild_uuid));
diesel::joinable!(guild_bans -> users (user_uuid));
diesel::joinable!(guild_members -> guilds (guild_uuid));
diesel::joinable!(guild_members -> users (user_uuid));
diesel::joinable!(instance_permissions -> users (uuid));
@ -164,6 +177,7 @@ diesel::joinable!(messages -> channels (channel_uuid));
diesel::joinable!(messages -> users (user_uuid));
diesel::joinable!(refresh_tokens -> users (uuid));
diesel::joinable!(role_members -> guild_members (member_uuid));
diesel::joinable!(role_members -> roles (role_uuid));
diesel::joinable!(roles -> guilds (guild_uuid));
diesel::allow_tables_to_appear_in_same_query!(
@ -172,6 +186,7 @@ diesel::allow_tables_to_appear_in_same_query!(
channels,
friend_requests,
friends,
guild_bans,
guild_members,
guilds,
instance_permissions,

View file

@ -8,14 +8,13 @@ use diesel::{ExpressionMethods, QueryDsl};
use diesel_async::RunQueryDsl;
use getrandom::fill;
use hex::encode;
use redis::RedisError;
use regex::Regex;
use serde::Serialize;
use serde::{Serialize, de::DeserializeOwned};
use time::Duration;
use uuid::Uuid;
use crate::{
AppState, Conn,
Conn,
config::Config,
error::Error,
objects::{HasIsAbove, HasUuid},
@ -115,15 +114,13 @@ pub async fn user_uuid_from_username(conn: &mut Conn, username: &String) -> Resu
}
}
pub async fn global_checks(app_state: &AppState, user_uuid: Uuid) -> Result<(), Error> {
if app_state.config.instance.require_email_verification {
let mut conn = app_state.pool.get().await?;
pub async fn global_checks(conn: &mut Conn, config: &Config, user_uuid: Uuid) -> Result<(), Error> {
if config.instance.require_email_verification {
use users::dsl;
let email_verified: bool = dsl::users
.filter(dsl::uuid.eq(user_uuid))
.select(dsl::email_verified)
.get_result(&mut conn)
.get_result(conn)
.await?;
if !email_verified {
@ -161,14 +158,28 @@ where
Ok(ordered)
}
impl AppState {
pub async fn set_cache_key(
#[allow(async_fn_in_trait)]
pub trait CacheFns {
async fn set_cache_key(
&self,
key: String,
value: impl Serialize,
expire: u32,
) -> Result<(), Error>;
async fn get_cache_key<T>(&self, key: String) -> Result<T, Error>
where
T: DeserializeOwned;
async fn del_cache_key(&self, key: String) -> Result<(), Error>;
}
impl CacheFns for redis::Client {
async fn set_cache_key(
&self,
key: String,
value: impl Serialize,
expire: u32,
) -> Result<(), Error> {
let mut conn = self.cache_pool.get_multiplexed_tokio_connection().await?;
let mut conn = self.get_multiplexed_tokio_connection().await?;
let key_encoded = encode(key);
@ -187,26 +198,31 @@ impl AppState {
Ok(())
}
pub async fn get_cache_key(&self, key: String) -> Result<String, RedisError> {
let mut conn = self.cache_pool.get_multiplexed_tokio_connection().await?;
async fn get_cache_key<T>(&self, key: String) -> Result<T, Error>
where
T: DeserializeOwned,
{
let mut conn = self.get_multiplexed_tokio_connection().await?;
let key_encoded = encode(key);
redis::cmd("GET")
let res: String = redis::cmd("GET")
.arg(key_encoded)
.query_async(&mut conn)
.await
.await?;
Ok(serde_json::from_str(&res)?)
}
pub async fn del_cache_key(&self, key: String) -> Result<(), RedisError> {
let mut conn = self.cache_pool.get_multiplexed_tokio_connection().await?;
async fn del_cache_key(&self, key: String) -> Result<(), Error> {
let mut conn = self.get_multiplexed_tokio_connection().await?;
let key_encoded = encode(key);
redis::cmd("DEL")
Ok(redis::cmd("DEL")
.arg(key_encoded)
.query_async(&mut conn)
.await
.await?)
}
}