tetratto/crates/app/src/routes/api/v1/communities/posts.rs

384 lines
10 KiB
Rust
Raw Normal View History

use axum::{
extract::Path,
http::{HeaderMap, HeaderValue},
response::IntoResponse,
Extension, Json,
};
use axum_extra::extract::CookieJar;
2025-05-11 14:27:55 -04:00
use tetratto_core::model::{
addr::RemoteAddr,
communities::{Poll, PollVote, Post},
2025-05-11 14:27:55 -04:00
permissions::FinePermission,
uploads::{MediaType, MediaUpload},
ApiReturn, Error,
};
use crate::{
2025-04-10 18:16:52 -04:00
get_user_from_token,
2025-05-17 11:28:58 -04:00
image::{save_webp_buffer, JsonMultipart},
routes::api::v1::{CreatePost, CreateRepost, UpdatePostContent, UpdatePostContext, VoteInPoll},
2025-04-10 18:16:52 -04:00
State,
};
2025-05-11 14:27:55 -04:00
// maximum file dimensions: 2048x2048px (4 MiB)
2025-05-11 15:20:15 -04:00
pub const MAXIMUM_FILE_SIZE: usize = 4194304;
2025-05-11 14:27:55 -04:00
pub async fn create_request(
jar: CookieJar,
headers: HeaderMap,
Extension(data): Extension<State>,
2025-05-11 14:27:55 -04:00
JsonMultipart(images, req): JsonMultipart<CreatePost>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
2025-05-11 14:27:55 -04:00
if !user.permissions.check(FinePermission::SUPPORTER) {
if images.len() > 0 {
// this is currently supporter only until it's been tested better...
// after it's fully release, file limit will be raised to 8 MiB for supporters,
// and left at 4 for non-supporters
return Json(Error::RequiresSupporter.into());
}
}
2025-05-11 14:43:09 -04:00
if images.len() > 4 {
return Json(
Error::MiscError("Too many uploads. Please use a maximum of 4".to_string()).into(),
);
}
// get real ip
let real_ip = headers
2025-06-08 14:15:42 -04:00
.get(data.0.0.security.real_ip_header.to_owned())
.unwrap_or(&HeaderValue::from_static(""))
.to_str()
.unwrap_or("")
.to_string();
// check for ip ban
if data
.get_ipban_by_addr(RemoteAddr::from(real_ip.as_str()))
.await
.is_ok()
{
return Json(Error::NotAllowed.into());
}
// create poll
let poll_id = if let Some(p) = req.poll {
match data
.create_poll(Poll::new(
user.id,
if let Some(expires) = p.expires {
expires
} else {
86400000
},
p.option_a,
p.option_b,
p.option_c,
p.option_d,
))
.await
{
Ok(p) => p,
Err(e) => return Json(e.into()),
}
} else {
0
};
// ...
2025-04-12 22:25:54 -04:00
let mut props = Post::new(
req.content,
match req.community.parse::<usize>() {
Ok(x) => x,
Err(e) => return Json(Error::MiscError(e.to_string()).into()),
},
if let Some(rt) = req.replying_to {
match rt.parse::<usize>() {
Ok(x) => Some(x),
Err(e) => return Json(Error::MiscError(e.to_string()).into()),
2025-04-12 22:25:54 -04:00
}
} else {
None
},
user.id,
poll_id,
2025-04-12 22:25:54 -04:00
);
if !req.answering.is_empty() {
// we're answering a question!
props.context.answering = match req.answering.parse::<usize>() {
Ok(x) => x,
Err(e) => return Json(Error::MiscError(e.to_string()).into()),
};
}
2025-05-11 14:27:55 -04:00
// check sizes
for img in &images {
2025-05-11 15:20:15 -04:00
if img.len() > MAXIMUM_FILE_SIZE {
2025-05-11 14:27:55 -04:00
return Json(Error::DataTooLong("image".to_string()).into());
}
}
// create uploads
for _ in 0..images.len() {
props.uploads.push(
match data
.create_upload(MediaUpload::new(MediaType::Webp, props.owner))
.await
{
Ok(u) => u.id,
Err(e) => return Json(e.into()),
},
);
}
// ...
match data.create_post(props.clone()).await {
Ok(id) => {
// write to uploads
for (i, upload_id) in props.uploads.iter().enumerate() {
let image = match images.get(i) {
Some(img) => img,
None => {
if let Err(e) = data.delete_upload(*upload_id).await {
return Json(e.into());
}
continue;
}
};
let upload = match data.get_upload_by_id(*upload_id).await {
Ok(u) => u,
Err(e) => return Json(e.into()),
};
if let Err(e) =
2025-06-08 14:15:42 -04:00
save_webp_buffer(&upload.path(&data.0.0).to_string(), image.to_vec(), None)
2025-05-17 11:28:58 -04:00
{
2025-05-11 14:27:55 -04:00
return Json(Error::MiscError(e.to_string()).into());
}
}
// return
Json(ApiReturn {
ok: true,
message: "Post created".to_string(),
payload: Some(id.to_string()),
})
}
Err(e) => Json(e.into()),
}
}
2025-04-10 18:16:52 -04:00
pub async fn create_repost_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
Json(req): Json<CreateRepost>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
match data
.create_post(Post::repost(
req.content,
match req.community.parse::<usize>() {
Ok(x) => x,
Err(e) => return Json(Error::MiscError(e.to_string()).into()),
},
user.id,
id,
))
.await
{
Ok(id) => Json(ApiReturn {
ok: true,
message: "Post reposted".to_string(),
payload: Some(id.to_string()),
}),
Err(e) => Json(e.into()),
}
}
pub async fn delete_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
match data.fake_delete_post(id, user, true).await {
Ok(_) => Json(ApiReturn {
ok: true,
message: "Post deleted".to_string(),
payload: (),
}),
Err(e) => Json(e.into()),
}
}
2025-05-16 16:20:24 -04:00
pub async fn purge_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
if !user.permissions.check(FinePermission::MANAGE_POSTS) {
return Json(Error::NotAllowed.into());
}
match data.delete_post(id, user).await {
Ok(_) => Json(ApiReturn {
ok: true,
message: "Post deleted".to_string(),
payload: (),
}),
Err(e) => Json(e.into()),
}
}
2025-05-16 16:20:24 -04:00
pub async fn restore_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
if !user.permissions.check(FinePermission::MANAGE_POSTS) {
return Json(Error::NotAllowed.into());
}
match data.fake_delete_post(id, user, false).await {
Ok(_) => Json(ApiReturn {
ok: true,
message: "Post restored".to_string(),
payload: (),
}),
Err(e) => Json(e.into()),
}
}
pub async fn update_content_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
Json(req): Json<UpdatePostContent>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
match data.update_post_content(id, user, req.content).await {
Ok(_) => Json(ApiReturn {
ok: true,
message: "Post updated".to_string(),
payload: (),
}),
Err(e) => Json(e.into()),
}
}
2025-03-24 20:23:52 -04:00
pub async fn update_context_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
Json(req): Json<UpdatePostContext>,
2025-03-24 20:23:52 -04:00
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
// check lengths
if req.context.tags.len() > 512 {
return Json(Error::DataTooLong("tags".to_string()).into());
}
if req.context.content_warning.len() > 512 {
return Json(Error::DataTooLong("warning".to_string()).into());
}
// ...
match data.update_post_context(id, user, req.context).await {
2025-03-24 20:23:52 -04:00
Ok(_) => Json(ApiReturn {
ok: true,
message: "Post updated".to_string(),
2025-03-24 20:23:52 -04:00
payload: (),
}),
Err(e) => Json(e.into()),
2025-03-24 20:23:52 -04:00
}
}
pub async fn vote_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
Json(req): Json<VoteInPoll>,
) -> impl IntoResponse {
let data = &(data.read().await).0;
let user = match get_user_from_token!(jar, data) {
Some(ua) => ua,
None => return Json(Error::NotAllowed.into()),
};
let post = match data.get_post_by_id(id).await {
Ok(p) => p,
Err(e) => return Json(e.into()),
};
let poll = match data.get_poll_by_id(post.poll_id).await {
Ok(p) => p,
Err(e) => return Json(e.into()),
};
// check associated accounts for prior votes
for id in user.associated {
if data.get_pollvote_by_owner_poll(id, poll.id).await.is_ok() {
return Json(
Error::MiscError(
"You've already voted on this poll on a different account".to_string(),
)
.into(),
);
}
}
// ...
match data
.create_pollvote(PollVote::new(user.id, poll.id, req.option))
.await
{
Ok(_) => Json(ApiReturn {
ok: true,
message: "Vote cast".to_string(),
payload: (),
}),
Err(e) => Json(e.into()),
}
}