Merge pull request #300 from fosscord/typeorm

This commit is contained in:
Flam3rboy 2021-09-01 10:47:00 +02:00 committed by GitHub
commit df1d633c4b
167 changed files with 20488 additions and 5009 deletions

5
api/.gitignore vendored
View File

@ -109,4 +109,7 @@ src/ready.json
# Docker # Docker
.docker/config/* .docker/config/*
!.docker/config/.keep !.docker/config/.keep
# fosscord
*.db

View File

@ -1 +0,0 @@
it("works", () => {});

View File

@ -1,192 +0,0 @@
/*
* For a detailed explanation regarding each configuration property and type check, visit:
* https://jestjs.io/docs/en/configuration.html
*/
export default {
// All imported modules in your tests should be mocked automatically
// automock: false,
// Stop running tests after `n` failures
// bail: 0,
// The directory where Jest should store its cached dependency information
// cacheDirectory: "/private/var/folders/yw/1x3cqgtd4wvg2m2w4pjv5ctm0000gn/T/jest_dx",
// Automatically clear mock calls and instances between every test
// clearMocks: false,
// Indicates whether the coverage information should be collected while executing the test
// collectCoverage: false,
// An array of glob patterns indicating a set of files for which coverage information should be collected
// collectCoverageFrom: undefined,
// The directory where Jest should output its coverage files
coverageDirectory: "coverage",
// An array of regexp pattern strings used to skip coverage collection
coveragePathIgnorePatterns: ["/node_modules/"],
// Indicates which provider should be used to instrument code for coverage
coverageProvider: "v8",
// A list of reporter names that Jest uses when writing coverage reports
// coverageReporters: [
// "json",
// "text",
// "lcov",
// "clover"
// ],
// An object that configures minimum threshold enforcement for coverage results
// coverageThreshold: undefined,
// A path to a custom dependency extractor
// dependencyExtractor: undefined,
// Make calling deprecated APIs throw helpful error messages
// errorOnDeprecated: false,
// Force coverage collection from ignored files using an array of glob patterns
// forceCoverageMatch: [],
// A path to a module which exports an async function that is triggered once before all test suites
// globalSetup: undefined,
// A path to a module which exports an async function that is triggered once after all test suites
// globalTeardown: undefined,
// A set of global variables that need to be available in all test environments
// globals: {},
// The maximum amount of workers used to run your tests. Can be specified as % or a number. E.g. maxWorkers: 10% will use 10% of your CPU amount + 1 as the maximum worker number. maxWorkers: 2 will use a maximum of 2 workers.
// maxWorkers: "50%",
// An array of directory names to be searched recursively up from the requiring module's location
// moduleDirectories: [
// "node_modules"
// ],
// An array of file extensions your modules use
// moduleFileExtensions: [
// "js",
// "json",
// "jsx",
// "ts",
// "tsx",
// "node"
// ],
// A map from regular expressions to module names or to arrays of module names that allow to stub out resources with a single module
// moduleNameMapper: {},
// An array of regexp pattern strings, matched against all module paths before considered 'visible' to the module loader
// modulePathIgnorePatterns: [],
// Activates notifications for test results
// notify: false,
// An enum that specifies notification mode. Requires { notify: true }
// notifyMode: "failure-change",
// A preset that is used as a base for Jest's configuration
// preset: undefined,
// Run tests from one or more projects
// projects: undefined,
// Use this configuration option to add custom reporters to Jest
// reporters: undefined,
// Automatically reset mock state between every test
// resetMocks: false,
// Reset the module registry before running each individual test
// resetModules: false,
// A path to a custom resolver
// resolver: undefined,
// Automatically restore mock state between every test
// restoreMocks: false,
// The root directory that Jest should scan for tests and modules within
// rootDir: undefined,
// A list of paths to directories that Jest should use to search for files in
// roots: [
// "<rootDir>"
// ],
// Allows you to use a custom runner instead of Jest's default test runner
// runner: "jest-runner",
// The paths to modules that run some code to configure or set up the testing environment before each test
// setupFiles: [],
// A list of paths to modules that run some code to configure or set up the testing framework before each test
// setupFilesAfterEnv: [],
// The number of seconds after which a test is considered as slow and reported as such in the results.
// slowTestThreshold: 5,
// A list of paths to snapshot serializer modules Jest should use for snapshot testing
// snapshotSerializers: [],
// The test environment that will be used for testing
testEnvironment: "node",
// Options that will be passed to the testEnvironment
// testEnvironmentOptions: {},
// Adds a location field to test results
// testLocationInResults: false,
// The glob patterns Jest uses to detect test files
testMatch: [
"**/__tests__/**/*.[jt]s?(x)",
// "**/?(*.)+(spec|test).[tj]s?(x)"
],
// An array of regexp pattern strings that are matched against all test paths, matched tests are skipped
// testPathIgnorePatterns: [
// "/node_modules/"
// ],
// The regexp pattern or array of patterns that Jest uses to detect test files
// testRegex: [],
// This option allows the use of a custom results processor
// testResultsProcessor: undefined,
// This option allows use of a custom test runner
// testRunner: "jasmine2",
// This option sets the URL for the jsdom environment. It is reflected in properties such as location.href
// testURL: "http://localhost",
// Setting this value to "fake" allows the use of fake timers for functions such as "setTimeout"
// timers: "real",
// A map from regular expressions to paths to transformers
// transform: undefined,
// An array of regexp pattern strings that are matched against all source file paths, matched files will skip transformation
// transformIgnorePatterns: [
// "/node_modules/",
// "\\.pnp\\.[^\\/]+$"
// ],
// An array of regexp pattern strings that are matched against all modules before the module loader will automatically return a mock for them
// unmockedModulePathPatterns: undefined,
// Indicates whether each individual test should be reported during the run
// verbose: undefined,
// An array of regexp patterns that are matched against all source file paths before re-running tests in watch mode
// watchPathIgnorePatterns: [],
// Whether to use watchman for file crawling
// watchman: true,
};

2
api/jest/setup.js Normal file
View File

@ -0,0 +1,2 @@
jest.spyOn(global.console, "log").mockImplementation(() => jest.fn());
jest.spyOn(global.console, "info").mockImplementation(() => jest.fn());

1440
api/package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@ -5,7 +5,7 @@
"main": "dist/Server.js", "main": "dist/Server.js",
"types": "dist/Server.d.ts", "types": "dist/Server.d.ts",
"scripts": { "scripts": {
"test": "jest", "test": "npm run build && jest --coverage --verbose ./tests",
"test:watch": "jest --watch", "test:watch": "jest --watch",
"start": "npm run build && node dist/start", "start": "npm run build && node dist/start",
"build": "npx tsc -b .", "build": "npx tsc -b .",
@ -35,6 +35,7 @@
"@types/bcrypt": "^5.0.0", "@types/bcrypt": "^5.0.0",
"@types/express": "^4.17.9", "@types/express": "^4.17.9",
"@types/i18next-node-fs-backend": "^2.1.0", "@types/i18next-node-fs-backend": "^2.1.0",
"@types/jest": "^27.0.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9", "@types/mongodb": "^3.6.9",
"@types/mongoose": "^5.10.5", "@types/mongoose": "^5.10.5",
@ -51,7 +52,7 @@
"saslprep": "^1.0.3", "saslprep": "^1.0.3",
"ts-node": "^9.1.1", "ts-node": "^9.1.1",
"ts-node-dev": "^1.1.6", "ts-node-dev": "^1.1.6",
"typescript": "^4.1.2" "typescript": "^4.4.2"
}, },
"dependencies": { "dependencies": {
"@fosscord/util": "file:../util", "@fosscord/util": "file:../util",
@ -73,12 +74,21 @@
"i18next-http-middleware": "^3.1.3", "i18next-http-middleware": "^3.1.3",
"i18next-node-fs-backend": "^2.1.3", "i18next-node-fs-backend": "^2.1.3",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"lambert-server": "^1.2.8", "lambert-server": "^1.2.10",
"missing-native-js-functions": "^1.2.10", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.12.3", "mongoose": "^5.12.3",
"mongoose-autopopulate": "^0.12.3", "mongoose-autopopulate": "^0.12.3",
"mongoose-long": "^0.3.2", "mongoose-long": "^0.3.2",
"multer": "^1.4.2", "multer": "^1.4.2",
"node-fetch": "^2.6.1" "node-fetch": "^2.6.1",
"supertest": "^6.1.6",
"typeorm": "^0.2.37"
},
"jest": {
"setupFiles": [
"<rootDir>/jest/setup.js",
"<rootDir>/scripts/setup_test.js"
],
"verbose": true
} }
} }

13
api/scripts/setup_test.js Normal file
View File

@ -0,0 +1,13 @@
const fs = require("fs");
const { FosscordServer } = require("../dist/Server");
const Server = new FosscordServer({ port: 3001 });
(async () => {
try {
fs.unlinkSync(`${__dirname}/database.db`);
} catch {}
return await Server.start();
})();
// afterAll(async () => {
// return await Server.stop();
// });

View File

@ -2,7 +2,7 @@ import "missing-native-js-functions";
import { Connection } from "mongoose"; import { Connection } from "mongoose";
import { Server, ServerOptions } from "lambert-server"; import { Server, ServerOptions } from "lambert-server";
import { Authentication, CORS } from "./middlewares/"; import { Authentication, CORS } from "./middlewares/";
import { Config, db, initEvent } from "@fosscord/util"; import { Config, initDatabase, initEvent } from "@fosscord/util";
import { ErrorHandler } from "./middlewares/ErrorHandler"; import { ErrorHandler } from "./middlewares/ErrorHandler";
import { BodyParser } from "./middlewares/BodyParser"; import { BodyParser } from "./middlewares/BodyParser";
import { Router, Request, Response, NextFunction } from "express"; import { Router, Request, Response, NextFunction } from "express";
@ -31,30 +31,13 @@ export class FosscordServer extends Server {
super({ ...opts, errorHandler: false, jsonBody: false }); super({ ...opts, errorHandler: false, jsonBody: false });
} }
async setupSchema() {
return Promise.all([
db.collection("users").createIndex({ id: 1 }, { unique: true }),
db.collection("messages").createIndex({ id: 1 }, { unique: true }),
db.collection("channels").createIndex({ id: 1 }, { unique: true }),
db.collection("guilds").createIndex({ id: 1 }, { unique: true }),
db.collection("members").createIndex({ id: 1, guild_id: 1 }, { unique: true }),
db.collection("roles").createIndex({ id: 1 }, { unique: true }),
db.collection("emojis").createIndex({ id: 1 }, { unique: true }),
db.collection("invites").createIndex({ code: 1 }, { unique: true }),
db.collection("invites").createIndex({ expires_at: 1 }, { expireAfterSeconds: 0 }), // after 0 seconds of expires_at the invite will get delete
db.collection("ratelimits").createIndex({ expires_at: 1 }, { expireAfterSeconds: 0 })
]);
}
async start() { async start() {
// @ts-ignore await initDatabase();
await (db as Promise<Connection>);
await this.setupSchema();
await Config.init(); await Config.init();
await initEvent(); await initEvent();
this.app.use(CORS); this.app.use(CORS);
this.app.use(BodyParser({ inflate: true, limit: 1024 * 1024 * 10 })); // 2MB this.app.use(BodyParser({ inflate: true, limit: 1024 * 1024 * 10 })); // 10MB
const app = this.app; const app = this.app;
const api = Router(); // @ts-ignore const api = Router(); // @ts-ignore

View File

@ -8,8 +8,6 @@ export * from "./schema/Message";
export * from "./util/Constants"; export * from "./util/Constants";
export * from "./util/instanceOf"; export * from "./util/instanceOf";
export * from "./util/instanceOf"; export * from "./util/instanceOf";
export * from "./util/Member";
export * from "./util/RandomInviteID"; export * from "./util/RandomInviteID";
export * from "./util/String"; export * from "./util/String";
export * from "./util/User";
export { check as checkPassword } from "./util/passwordStrength"; export { check as checkPassword } from "./util/passwordStrength";

View File

@ -18,9 +18,9 @@ export const API_PREFIX_TRAILING_SLASH = /^\/api(\/v\d+)?\//;
declare global { declare global {
namespace Express { namespace Express {
interface Request { interface Request {
user_id: any; user_id: string;
user_bot: boolean; user_bot: boolean;
token: any; token: string;
} }
} }
} }
@ -28,7 +28,7 @@ declare global {
export async function Authentication(req: Request, res: Response, next: NextFunction) { export async function Authentication(req: Request, res: Response, next: NextFunction) {
if (req.method === "OPTIONS") return res.sendStatus(204); if (req.method === "OPTIONS") return res.sendStatus(204);
const url = req.url.replace(API_PREFIX, ""); const url = req.url.replace(API_PREFIX, "");
if (url.startsWith("/invites") && req.method === "GET") return next(); // @ts-ignore if (url.startsWith("/invites") && req.method === "GET") return next();
if ( if (
NO_AUTHORIZATION_ROUTES.some((x) => { NO_AUTHORIZATION_ROUTES.some((x) => {
if (typeof x === "string") return url.startsWith(x); if (typeof x === "string") return url.startsWith(x);
@ -47,7 +47,7 @@ export async function Authentication(req: Request, res: Response, next: NextFunc
req.user_id = decoded.id; req.user_id = decoded.id;
req.user_bot = user.bot; req.user_bot = user.bot;
return next(); return next();
} catch (error) { } catch (error: any) {
return next(new HTTPError(error.toString(), 400)); return next(new HTTPError(error?.toString(), 400));
} }
} }

View File

@ -1,9 +1,12 @@
import { NextFunction, Request, Response } from "express"; import { NextFunction, Request, Response } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { EntityNotFoundError } from "typeorm";
import { FieldError } from "../util/instanceOf"; import { FieldError } from "../util/instanceOf";
import {ApiError} from "../util/ApiError";
// TODO: update with new body/typorm validation
export function ErrorHandler(error: Error, req: Request, res: Response, next: NextFunction) { export function ErrorHandler(error: Error, req: Request, res: Response, next: NextFunction) {
if (!error) next(); if (!error) return next();
try { try {
let code = 400; let code = 400;
@ -12,13 +15,23 @@ export function ErrorHandler(error: Error, req: Request, res: Response, next: Ne
let errors = undefined; let errors = undefined;
if (error instanceof HTTPError && error.code) code = httpcode = error.code; if (error instanceof HTTPError && error.code) code = httpcode = error.code;
else if (error instanceof FieldError) { else if (error instanceof ApiError) {
code = error.code;
message = error.message;
httpcode = error.httpStatus;
}
else if (error instanceof EntityNotFoundError) {
message = `${(error as any).stringifyTarget} can not be found`;
code = 404;
} else if (error instanceof FieldError) {
code = Number(error.code); code = Number(error.code);
message = error.message; message = error.message;
errors = error.errors; errors = error.errors;
} else { } else {
console.error(error); console.error(`[Error] ${code} ${req.url}`, errors || error, "body:", req.body);
if (req.server?.options?.production) { if (req.server?.options?.production) {
// don't expose internal errors to the user, instead human errors should be thrown as HTTPError
message = "Internal Server Error"; message = "Internal Server Error";
} }
code = httpcode = 500; code = httpcode = 500;
@ -26,8 +39,6 @@ export function ErrorHandler(error: Error, req: Request, res: Response, next: Ne
if (httpcode > 511) httpcode = 400; if (httpcode > 511) httpcode = 400;
console.error(`[Error] ${code} ${req.url} ${message}`, errors || error);
res.status(httpcode).json({ code: code, message, errors }); res.status(httpcode).json({ code: code, message, errors });
} catch (error) { } catch (error) {
console.error(`[Internal Server Error] 500`, error); console.error(`[Internal Server Error] 500`, error);

View File

@ -1,11 +1,12 @@
// @ts-nocheck import { Config, listenEvent } from "@fosscord/util";
import { db, Bucket, Config, listenEvent, emitEvent } from "@fosscord/util";
import { NextFunction, Request, Response, Router } from "express"; import { NextFunction, Request, Response, Router } from "express";
import { getIpAdress } from "../util/ipAddress"; import { getIpAdress } from "../util/ipAddress";
import { API_PREFIX_TRAILING_SLASH } from "./Authentication"; import { API_PREFIX_TRAILING_SLASH } from "./Authentication";
// Docs: https://discord.com/developers/docs/topics/rate-limits // Docs: https://discord.com/developers/docs/topics/rate-limits
// TODO: use better caching (e.g. redis) as else it creates to much pressure on the database
/* /*
? bucket limit? Max actions/sec per bucket? ? bucket limit? Max actions/sec per bucket?
@ -18,10 +19,18 @@ TODO: different for methods (GET/POST)
*/ */
var Cache = new Map<string, Bucket>(); type RateLimit = {
const EventRateLimit = "ratelimit"; id: "global" | "error" | string;
executor_id: string;
hits: number;
blocked: boolean;
expires_at: Date;
};
export default function RateLimit(opts: { var Cache = new Map<string, RateLimit>();
const EventRateLimit = "RATELIMIT";
export default function rateLimit(opts: {
bucket?: string; bucket?: string;
window: number; window: number;
count: number; count: number;
@ -36,23 +45,32 @@ export default function RateLimit(opts: {
}): any { }): any {
return async (req: Request, res: Response, next: NextFunction): Promise<any> => { return async (req: Request, res: Response, next: NextFunction): Promise<any> => {
const bucket_id = opts.bucket || req.originalUrl.replace(API_PREFIX_TRAILING_SLASH, ""); const bucket_id = opts.bucket || req.originalUrl.replace(API_PREFIX_TRAILING_SLASH, "");
var user_id = getIpAdress(req); var executor_id = getIpAdress(req);
if (!opts.onlyIp && req.user_id) user_id = req.user_id; if (!opts.onlyIp && req.user_id) executor_id = req.user_id;
var max_hits = opts.count; var max_hits = opts.count;
if (opts.bot && req.user_bot) max_hits = opts.bot; if (opts.bot && req.user_bot) max_hits = opts.bot;
if (opts.GET && ["GET", "OPTIONS", "HEAD"].includes(req.method)) max_hits = opts.GET; if (opts.GET && ["GET", "OPTIONS", "HEAD"].includes(req.method)) max_hits = opts.GET;
else if (opts.MODIFY && ["POST", "DELETE", "PATCH", "PUT"].includes(req.method)) max_hits = opts.MODIFY; else if (opts.MODIFY && ["POST", "DELETE", "PATCH", "PUT"].includes(req.method)) max_hits = opts.MODIFY;
const offender = Cache.get(user_id + bucket_id) as Bucket | null; const offender = Cache.get(executor_id + bucket_id);
if (offender && offender.blocked) { if (offender) {
const reset = offender.expires_at.getTime(); const reset = offender.expires_at.getTime();
const resetAfterMs = reset - Date.now(); const resetAfterMs = reset - Date.now();
const resetAfterSec = resetAfterMs / 1000; const resetAfterSec = resetAfterMs / 1000;
const global = bucket_id === "global";
if (resetAfterMs > 0) { if (resetAfterMs <= 0) {
offender.hits = 0;
offender.expires_at = new Date(Date.now() + opts.window * 1000);
offender.blocked = false;
Cache.delete(executor_id + bucket_id);
}
if (offender.blocked) {
const global = bucket_id === "global";
console.log("blocked bucket: " + bucket_id, { resetAfterMs }); console.log("blocked bucket: " + bucket_id, { resetAfterMs });
return ( return (
res res
@ -67,17 +85,11 @@ export default function RateLimit(opts: {
// TODO: error rate limit message translation // TODO: error rate limit message translation
.send({ message: "You are being rate limited.", retry_after: resetAfterSec, global }) .send({ message: "You are being rate limited.", retry_after: resetAfterSec, global })
); );
} else {
offender.hits = 0;
offender.expires_at = new Date(Date.now() + opts.window * 1000);
offender.blocked = false;
// mongodb ttl didn't update yet -> manually update/delete
db.collection("ratelimits").updateOne({ id: bucket_id, user_id }, { $set: offender });
Cache.delete(user_id + bucket_id);
} }
} }
next(); next();
const hitRouteOpts = { bucket_id, user_id, max_hits, window: opts.window }; const hitRouteOpts = { bucket_id, executor_id, max_hits, window: opts.window };
if (opts.error || opts.success) { if (opts.error || opts.success) {
res.once("finish", () => { res.once("finish", () => {
@ -97,69 +109,94 @@ export default function RateLimit(opts: {
export async function initRateLimits(app: Router) { export async function initRateLimits(app: Router) {
const { routes, global, ip, error } = Config.get().limits.rate; const { routes, global, ip, error } = Config.get().limits.rate;
await listenEvent(EventRateLimit, (event) => { await listenEvent(EventRateLimit, (event) => {
Cache.set(event.channel_id, event.data); Cache.set(event.channel_id as string, event.data);
event.acknowledge?.(); event.acknowledge?.();
}); });
// await RateLimit.delete({ expires_at: LessThan(new Date().toISOString()) }); // cleans up if not already deleted, morethan -> older date
// const limits = await RateLimit.find({ blocked: true });
// limits.forEach((limit) => {
// Cache.set(limit.executor_id, limit);
// });
setInterval(() => { setInterval(() => {
Cache.forEach((x, key) => { Cache.forEach((x, key) => {
if (Date.now() > x.expires_at) Cache.delete(key); if (new Date() > x.expires_at) {
Cache.delete(key);
// RateLimit.delete({ executor_id: key });
}
}); });
}, 1000 * 60 * 10); }, 1000 * 60);
app.use( app.use(
RateLimit({ rateLimit({
bucket: "global", bucket: "global",
onlyIp: true, onlyIp: true,
...ip ...ip
}) })
); );
app.use(RateLimit({ bucket: "global", ...global })); app.use(rateLimit({ bucket: "global", ...global }));
app.use( app.use(
RateLimit({ rateLimit({
bucket: "error", bucket: "error",
error: true, error: true,
onlyIp: true, onlyIp: true,
...error ...error
}) })
); );
app.use("/guilds/:id", RateLimit(routes.guild)); app.use("/guilds/:id", rateLimit(routes.guild));
app.use("/webhooks/:id", RateLimit(routes.webhook)); app.use("/webhooks/:id", rateLimit(routes.webhook));
app.use("/channels/:id", RateLimit(routes.channel)); app.use("/channels/:id", rateLimit(routes.channel));
app.use("/auth/login", RateLimit(routes.auth.login)); app.use("/auth/login", rateLimit(routes.auth.login));
app.use("/auth/register", RateLimit({ onlyIp: true, success: true, ...routes.auth.register })); app.use("/auth/register", rateLimit({ onlyIp: true, success: true, ...routes.auth.register }));
} }
async function hitRoute(opts: { user_id: string; bucket_id: string; max_hits: number; window: number }) { async function hitRoute(opts: { executor_id: string; bucket_id: string; max_hits: number; window: number }) {
const filter = { id: opts.bucket_id, user_id: opts.user_id }; const id = opts.executor_id + opts.bucket_id;
const { value } = await db.collection("ratelimits").findOneAndUpdate( var limit = Cache.get(id);
filter, if (!limit) {
{ limit = {
$setOnInsert: { id: opts.bucket_id,
id: opts.bucket_id, executor_id: opts.executor_id,
user_id: opts.user_id, expires_at: new Date(Date.now() + opts.window * 1000),
expires_at: new Date(Date.now() + opts.window * 1000) hits: 0,
}, blocked: false
$inc: { };
hits: 1 Cache.set(id, limit);
} }
// Conditionally update blocked doesn't work
}, limit.hits++;
{ upsert: true, returnDocument: "before" } if (limit.hits >= opts.max_hits) {
); limit.blocked = true;
if (!value) return; }
const updateBlock = !value.blocked && value.hits >= opts.max_hits;
/*
var ratelimit = await RateLimit.findOne({ id: opts.bucket_id, executor_id: opts.executor_id });
if (!ratelimit) {
ratelimit = new RateLimit({
id: opts.bucket_id,
executor_id: opts.executor_id,
expires_at: new Date(Date.now() + opts.window * 1000),
hits: 0,
blocked: false
});
}
ratelimit.hits++;
const updateBlock = !ratelimit.blocked && ratelimit.hits >= opts.max_hits;
if (updateBlock) { if (updateBlock) {
value.blocked = true; ratelimit.blocked = true;
Cache.set(opts.user_id + opts.bucket_id, value); Cache.set(opts.executor_id + opts.bucket_id, ratelimit);
await emitEvent({ await emitEvent({
channel_id: EventRateLimit, channel_id: EventRateLimit,
event: EventRateLimit, event: EventRateLimit,
data: value data: ratelimit
}); });
await db.collection("ratelimits").updateOne(filter, { $set: { blocked: true } });
} else { } else {
Cache.delete(opts.user_id); Cache.delete(opts.executor_id);
} }
await ratelimit.save();
*/
} }

View File

@ -19,7 +19,7 @@ export async function initTranslation(router: Router) {
fallbackLng: "en", fallbackLng: "en",
ns, ns,
backend: { backend: {
loadPath: __dirname + "/../locales/{{lng}}/{{ns}}.json" loadPath: __dirname + "/../../locales/{{lng}}/{{ns}}.json"
}, },
load: "all" load: "all"
}); });

View File

@ -2,7 +2,7 @@ import { Request, Response, Router } from "express";
import { check, FieldErrors, Length } from "../../util/instanceOf"; import { check, FieldErrors, Length } from "../../util/instanceOf";
import bcrypt from "bcrypt"; import bcrypt from "bcrypt";
import jwt from "jsonwebtoken"; import jwt from "jsonwebtoken";
import { Config, UserModel } from "@fosscord/util"; import { Config, User } from "@fosscord/util";
import { adjustEmail } from "./register"; import { adjustEmail } from "./register";
const router: Router = Router(); const router: Router = Router();
@ -21,10 +21,7 @@ router.post(
async (req: Request, res: Response) => { async (req: Request, res: Response) => {
const { login, password, captcha_key, undelete } = req.body; const { login, password, captcha_key, undelete } = req.body;
const email = adjustEmail(login); const email = adjustEmail(login);
const query: any[] = [{ phone: login }]; console.log("login", email);
if (email) query.push({ email });
console.log(req.body, email);
const config = Config.get(); const config = Config.get();
@ -41,27 +38,24 @@ router.post(
// TODO: check captcha // TODO: check captcha
} }
const user = await UserModel.findOne( const user = await User.findOneOrFail({
{ $or: query }, where: [{ phone: login }, { email: login }],
{ "user_data.hash": true, id: true, disabled: true, deleted: true, "user_settings.locale": true, "user_settings.theme": true } select: ["data", "id", "disabled", "deleted", "settings"]
) }).catch((e) => {
.exec() throw FieldErrors({ login: { message: req.t("auth:login.INVALID_LOGIN"), code: "INVALID_LOGIN" } });
.catch((e) => { });
console.log(e, query);
throw FieldErrors({ login: { message: req.t("auth:login.INVALID_LOGIN"), code: "INVALID_LOGIN" } });
});
if (undelete) { if (undelete) {
// undelete refers to un'disable' here // undelete refers to un'disable' here
if (user.disabled) await UserModel.updateOne({ id: user.id }, { disabled: false }).exec(); if (user.disabled) await User.update({ id: user.id }, { disabled: false });
if (user.deleted) await UserModel.updateOne({ id: user.id }, { deleted: false }).exec(); if (user.deleted) await User.update({ id: user.id }, { deleted: false });
} else { } else {
if (user.deleted) return res.status(400).json({ message: "This account is scheduled for deletion.", code: 20011 }); if (user.deleted) return res.status(400).json({ message: "This account is scheduled for deletion.", code: 20011 });
if (user.disabled) return res.status(400).json({ message: req.t("auth:login.ACCOUNT_DISABLED"), code: 20013 }); if (user.disabled) return res.status(400).json({ message: req.t("auth:login.ACCOUNT_DISABLED"), code: 20013 });
} }
// the salt is saved in the password refer to bcrypt docs // the salt is saved in the password refer to bcrypt docs
const same_password = await bcrypt.compare(password, user.user_data.hash || ""); const same_password = await bcrypt.compare(password, user.data.hash || "");
if (!same_password) { if (!same_password) {
throw FieldErrors({ password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" } }); throw FieldErrors({ password: { message: req.t("auth:login.INVALID_PASSWORD"), code: "INVALID_PASSWORD" } });
} }
@ -72,7 +66,7 @@ router.post(
// Discord header is just the user id as string, which is not possible with npm-jsonwebtoken package // Discord header is just the user id as string, which is not possible with npm-jsonwebtoken package
// https://user-images.githubusercontent.com/6506416/81051916-dd8c9900-8ec2-11ea-8794-daf12d6f31f0.png // https://user-images.githubusercontent.com/6506416/81051916-dd8c9900-8ec2-11ea-8794-daf12d6f31f0.png
res.json({ token, user_settings: user.user_settings }); res.json({ token, settings: user.settings });
} }
); );
@ -106,6 +100,6 @@ export async function generateToken(id: string) {
* @returns {"captcha_key": ["captcha-required"], "captcha_sitekey": null, "captcha_service": "recaptcha"} * @returns {"captcha_key": ["captcha-required"], "captcha_sitekey": null, "captcha_service": "recaptcha"}
* Sucess: * Sucess:
* @returns {"token": "USERTOKEN", "user_settings": {"locale": "en", "theme": "dark"}} * @returns {"token": "USERTOKEN", "settings": {"locale": "en", "theme": "dark"}}
*/ */

View File

@ -1,12 +1,12 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { trimSpecial, User, Snowflake, UserModel, Config } from "@fosscord/util"; import { trimSpecial, User, Snowflake, Config, defaultSettings } from "@fosscord/util";
import bcrypt from "bcrypt"; import bcrypt from "bcrypt";
import { check, Email, EMAIL_REGEX, FieldErrors, Length } from "../../util/instanceOf"; import { check, Email, EMAIL_REGEX, FieldErrors, Length } from "../../util/instanceOf";
import "missing-native-js-functions"; import "missing-native-js-functions";
import { generateToken } from "./login"; import { generateToken } from "./login";
import { getIpAdress, IPAnalysis, isProxy } from "../../util/ipAddress"; import { getIpAdress, IPAnalysis, isProxy } from "../../util/ipAddress";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import RateLimit from "../../middlewares/RateLimit"; import { In } from "typeorm";
const router: Router = Router(); const router: Router = Router();
@ -55,13 +55,13 @@ router.post(
// TODO: check password strength // TODO: check password strength
// adjusted_email will be slightly modified version of the user supplied email -> e.g. protection against GMail Trick // adjusted_email will be slightly modified version of the user supplied email -> e.g. protection against GMail Trick
let adjusted_email: string | null = adjustEmail(email); let adjusted_email = adjustEmail(email);
// adjusted_password will be the hash of the password // adjusted_password will be the hash of the password
let adjusted_password: string = ""; let adjusted_password = "";
// trim special uf8 control characters -> Backspace, Newline, ... // trim special uf8 control characters -> Backspace, Newline, ...
let adjusted_username: string = trimSpecial(username); let adjusted_username = trimSpecial(username);
// discriminator will be randomly generated // discriminator will be randomly generated
let discriminator = ""; let discriminator = "";
@ -92,9 +92,7 @@ router.post(
if (!adjusted_email) throw FieldErrors({ email: { code: "INVALID_EMAIL", message: req.t("auth:register.INVALID_EMAIL") } }); if (!adjusted_email) throw FieldErrors({ email: { code: "INVALID_EMAIL", message: req.t("auth:register.INVALID_EMAIL") } });
// check if there is already an account with this email // check if there is already an account with this email
const exists = await UserModel.findOne({ email: adjusted_email }) const exists = await User.findOneOrFail({ email: adjusted_email }).catch((e) => {});
.exec()
.catch((e) => {});
if (exists) { if (exists) {
throw FieldErrors({ throw FieldErrors({
@ -131,9 +129,7 @@ router.post(
if (!register.allowMultipleAccounts) { if (!register.allowMultipleAccounts) {
// TODO: check if fingerprint was eligible generated // TODO: check if fingerprint was eligible generated
const exists = await UserModel.findOne({ fingerprints: fingerprint }) const exists = await User.findOne({ where: { fingerprints: In(fingerprint) } });
.exec()
.catch((e) => {});
if (exists) { if (exists) {
throw FieldErrors({ throw FieldErrors({
@ -168,12 +164,8 @@ router.post(
// TODO: is there any better way to generate a random discriminator only once, without checking if it already exists in the mongodb database? // TODO: is there any better way to generate a random discriminator only once, without checking if it already exists in the mongodb database?
for (let tries = 0; tries < 5; tries++) { for (let tries = 0; tries < 5; tries++) {
discriminator = Math.randomIntBetween(1, 9999).toString().padStart(4, "0"); discriminator = Math.randomIntBetween(1, 9999).toString().padStart(4, "0");
try { exists = await User.findOne({ where: { discriminator, username: adjusted_username }, select: ["id"] });
exists = await UserModel.findOne({ discriminator, username: adjusted_username }, "id").exec(); if (!exists) break;
} catch (error) {
// doesn't exist -> break
break;
}
} }
if (exists) { if (exists) {
@ -189,96 +181,40 @@ router.post(
// appearently discord doesn't save the date of birth and just calculate if nsfw is allowed // appearently discord doesn't save the date of birth and just calculate if nsfw is allowed
// if nsfw_allowed is null/undefined it'll require date_of_birth to set it to true/false // if nsfw_allowed is null/undefined it'll require date_of_birth to set it to true/false
const user: User = { const user = {
id: Snowflake.generate(),
created_at: new Date(), created_at: new Date(),
username: adjusted_username, username: adjusted_username,
discriminator, discriminator,
avatar: null, id: Snowflake.generate(),
accent_color: null,
banner: null,
bot: false, bot: false,
system: false, system: false,
desktop: false, desktop: false,
mobile: false, mobile: false,
premium: true, premium: true,
premium_type: 2, premium_type: 2,
phone: null,
bio: "", bio: "",
mfa_enabled: false, mfa_enabled: false,
verified: false, verified: false,
disabled: false, disabled: false,
deleted: false, deleted: false,
presence: {
activities: [],
client_status: {
desktop: undefined,
mobile: undefined,
web: undefined
},
status: "offline"
},
email: adjusted_email, email: adjusted_email,
nsfw_allowed: true, // TODO: depending on age nsfw_allowed: true, // TODO: depending on age
public_flags: 0n, public_flags: "0",
flags: 0n, // TODO: generate default flags flags: "0", // TODO: generate
guilds: [], data: {
user_data: {
hash: adjusted_password, hash: adjusted_password,
valid_tokens_since: new Date(), valid_tokens_since: new Date()
relationships: [],
connected_accounts: [],
fingerprints: []
}, },
user_settings: { settings: defaultSettings,
afk_timeout: 300, fingerprints: []
allow_accessibility_detection: true,
animate_emoji: true,
animate_stickers: 0,
contact_sync_enabled: false,
convert_emoticons: false,
custom_status: {
emoji_id: null,
emoji_name: null,
expires_at: null,
text: null
},
default_guilds_restricted: false,
detect_platform_accounts: true,
developer_mode: false,
disable_games_tab: false,
enable_tts_command: true,
explicit_content_filter: 0,
friend_source_flags: { all: true },
gateway_connected: false,
gif_auto_play: true,
guild_folders: [],
guild_positions: [],
inline_attachment_media: true,
inline_embed_media: true,
locale: req.language,
message_display_compact: false,
native_phone_integration_enabled: true,
render_embeds: true,
render_reactions: true,
restricted_guilds: [],
show_current_game: true,
status: "offline",
stream_notifications_enabled: true,
theme: "dark",
timezone_offset: 0
// timezone_offset: // TODO: timezone from request
}
}; };
await User.insert(user);
// insert user into database
await new UserModel(user).save();
return res.json({ token: await generateToken(user.id) }); return res.json({ token: await generateToken(user.id) });
} }
); );
export function adjustEmail(email: string): string | null { export function adjustEmail(email: string): string | undefined {
// body parser already checked if it is a valid email // body parser already checked if it is a valid email
const parts = <RegExpMatchArray>email.match(EMAIL_REGEX); const parts = <RegExpMatchArray>email.match(EMAIL_REGEX);
// @ts-ignore // @ts-ignore
@ -304,6 +240,6 @@ export default router;
* Field Error * Field Error
* @returns { "code": 50035, "errors": { "consent": { "_errors": [{ "code": "CONSENT_REQUIRED", "message": "You must agree to Discord's Terms of Service and Privacy Policy." }]}}, "message": "Invalid Form Body"} * @returns { "code": 50035, "errors": { "consent": { "_errors": [{ "code": "CONSENT_REQUIRED", "message": "You must agree to Discord's Terms of Service and Privacy Policy." }]}}, "message": "Invalid Form Body"}
* *
* Success 201: * Success 200:
* @returns {token: "OMITTED"} * @returns {token: "OMITTED"}
*/ */

View File

@ -1,4 +1,4 @@
import { ChannelDeleteEvent, ChannelModel, ChannelUpdateEvent, emitEvent, getPermission, GuildUpdateEvent, toObject } from "@fosscord/util"; import { ChannelDeleteEvent, Channel, ChannelUpdateEvent, emitEvent, getPermission } from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { ChannelModifySchema } from "../../../schema/Channel"; import { ChannelModifySchema } from "../../../schema/Channel";
@ -10,28 +10,28 @@ const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const permission = await getPermission(req.user_id, channel.guild_id, channel_id); const permission = await getPermission(req.user_id, channel.guild_id, channel_id);
permission.hasThrow("VIEW_CHANNEL"); permission.hasThrow("VIEW_CHANNEL");
return res.send(toObject(channel)); return res.send(channel);
}); });
router.delete("/", async (req: Request, res: Response) => { router.delete("/", async (req: Request, res: Response) => {
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const permission = await getPermission(req.user_id, channel?.guild_id, channel_id, { channel }); const permission = await getPermission(req.user_id, channel?.guild_id, channel_id);
permission.hasThrow("MANAGE_CHANNELS"); permission.hasThrow("MANAGE_CHANNELS");
// TODO: Dm channel "close" not delete // TODO: Dm channel "close" not delete
const data = toObject(channel); const data = channel;
await emitEvent({ event: "CHANNEL_DELETE", data, channel_id } as ChannelDeleteEvent); await emitEvent({ event: "CHANNEL_DELETE", data, channel_id } as ChannelDeleteEvent);
await ChannelModel.deleteOne({ id: channel_id }); await Channel.delete({ id: channel_id });
res.send(data); res.send(data);
}); });
@ -43,17 +43,19 @@ router.patch("/", check(ChannelModifySchema), async (req: Request, res: Response
const permission = await getPermission(req.user_id, undefined, channel_id); const permission = await getPermission(req.user_id, undefined, channel_id);
permission.hasThrow("MANAGE_CHANNELS"); permission.hasThrow("MANAGE_CHANNELS");
const channel = await ChannelModel.findOneAndUpdate({ id: channel_id }, payload, { new: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
channel.assign(payload);
const data = toObject(channel); await Promise.all([
channel.save(),
emitEvent({
event: "CHANNEL_UPDATE",
data: channel,
channel_id
} as ChannelUpdateEvent)
]);
await emitEvent({ res.send(channel);
event: "CHANNEL_UPDATE",
data,
channel_id
} as ChannelUpdateEvent);
res.send(data);
}); });
export default router; export default router;

View File

@ -6,14 +6,14 @@ import { random } from "../../../util/RandomInviteID";
import { InviteCreateSchema } from "../../../schema/Invite"; import { InviteCreateSchema } from "../../../schema/Invite";
import { getPermission, ChannelModel, InviteModel, InviteCreateEvent, toObject, emitEvent } from "@fosscord/util"; import { getPermission, Channel, Invite, InviteCreateEvent, emitEvent } from "@fosscord/util";
const router: Router = Router(); const router: Router = Router();
router.post("/", check(InviteCreateSchema), async (req: Request, res: Response) => { router.post("/", check(InviteCreateSchema), async (req: Request, res: Response) => {
const { user_id } = req; const { user_id } = req;
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
if (!channel.guild_id) { if (!channel.guild_id) {
throw new HTTPError("This channel doesn't exist", 404); throw new HTTPError("This channel doesn't exist", 404);
@ -38,7 +38,7 @@ router.post("/", check(InviteCreateSchema), async (req: Request, res: Response)
inviter_id: user_id inviter_id: user_id
}; };
await new InviteModel(invite).save(); await new Invite(invite).save();
await emitEvent({ event: "INVITE_CREATE", data: invite, guild_id } as InviteCreateEvent); await emitEvent({ event: "INVITE_CREATE", data: invite, guild_id } as InviteCreateEvent);
res.status(201).send(invite); res.status(201).send(invite);
@ -47,7 +47,7 @@ router.post("/", check(InviteCreateSchema), async (req: Request, res: Response)
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { user_id } = req; const { user_id } = req;
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
if (!channel.guild_id) { if (!channel.guild_id) {
throw new HTTPError("This channel doesn't exist", 404); throw new HTTPError("This channel doesn't exist", 404);
@ -56,9 +56,9 @@ router.get("/", async (req: Request, res: Response) => {
const permission = await getPermission(user_id, guild_id); const permission = await getPermission(user_id, guild_id);
permission.hasThrow("MANAGE_CHANNELS"); permission.hasThrow("MANAGE_CHANNELS");
const invites = await InviteModel.find({ guild_id }).exec(); const invites = await Invite.find({ guild_id });
res.status(200).send(toObject(invites)); res.status(200).send(invites);
}); });
export default router; export default router;

View File

@ -1,4 +1,4 @@
import { emitEvent, getPermission, MessageAckEvent, ReadStateModel } from "@fosscord/util"; import { emitEvent, getPermission, MessageAckEvent, ReadState } from "@fosscord/util";
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { check } from "../../../../../util/instanceOf"; import { check } from "../../../../../util/instanceOf";
@ -14,10 +14,7 @@ router.post("/", check({ $manual: Boolean, $mention_count: Number }), async (req
const permission = await getPermission(req.user_id, undefined, channel_id); const permission = await getPermission(req.user_id, undefined, channel_id);
permission.hasThrow("VIEW_CHANNEL"); permission.hasThrow("VIEW_CHANNEL");
await ReadStateModel.updateOne( await ReadState.update({ user_id: req.user_id, channel_id }, { user_id: req.user_id, channel_id, last_message_id: message_id });
{ user_id: req.user_id, channel_id, message_id },
{ user_id: req.user_id, channel_id, message_id }
).exec();
await emitEvent({ await emitEvent({
event: "MESSAGE_ACK", event: "MESSAGE_ACK",

View File

@ -1,6 +1,5 @@
import { ChannelModel, emitEvent, getPermission, MessageDeleteEvent, MessageModel, MessageUpdateEvent, toObject } from "@fosscord/util"; import { Channel, emitEvent, getPermission, MessageDeleteEvent, Message, MessageUpdateEvent } from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { HTTPError } from "lambert-server";
import { MessageCreateSchema } from "../../../../../schema/Message"; import { MessageCreateSchema } from "../../../../../schema/Message";
import { check } from "../../../../../util/instanceOf"; import { check } from "../../../../../util/instanceOf";
@ -12,7 +11,7 @@ router.patch("/", check(MessageCreateSchema), async (req: Request, res: Response
const { message_id, channel_id } = req.params; const { message_id, channel_id } = req.params;
var body = req.body as MessageCreateSchema; var body = req.body as MessageCreateSchema;
var message = await MessageModel.findOne({ id: message_id, channel_id }, { author_id: true, message_reference: true }).lean().exec(); const message = await Message.findOneOrFail({ id: message_id, channel_id });
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
@ -21,7 +20,9 @@ router.patch("/", check(MessageCreateSchema), async (req: Request, res: Response
body = { flags: body.flags }; // admins can only suppress embeds of other messages body = { flags: body.flags }; // admins can only suppress embeds of other messages
} }
const opts = await handleMessage({ const new_message = await handleMessage({
// TODO: should be message_reference overridable?
// @ts-ignore
message_reference: message.message_reference, message_reference: message.message_reference,
...body, ...body,
author_id: message.author_id, author_id: message.author_id,
@ -30,18 +31,18 @@ router.patch("/", check(MessageCreateSchema), async (req: Request, res: Response
edited_timestamp: new Date() edited_timestamp: new Date()
}); });
// @ts-ignore await Promise.all([
message = await MessageModel.findOneAndUpdate({ id: message_id }, opts, { new: true }).populate("author").exec(); new_message.save(),
await emitEvent({
await emitEvent({ event: "MESSAGE_UPDATE",
event: "MESSAGE_UPDATE", channel_id,
channel_id, data: { ...message, nonce: undefined }
data: { ...toObject(message), nonce: undefined } } as MessageUpdateEvent)
} as MessageUpdateEvent); ]);
postHandleMessage(message); postHandleMessage(message);
return res.json(toObject(message)); return res.json(message);
}); });
// TODO: delete attachments in message // TODO: delete attachments in message
@ -49,13 +50,13 @@ router.patch("/", check(MessageCreateSchema), async (req: Request, res: Response
router.delete("/", async (req: Request, res: Response) => { router.delete("/", async (req: Request, res: Response) => {
const { message_id, channel_id } = req.params; const { message_id, channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true }); const channel = await Channel.findOneOrFail({ id: channel_id });
const message = await MessageModel.findOne({ id: message_id }, { author_id: true }).exec(); const message = await Message.findOneOrFail({ id: message_id });
const permission = await getPermission(req.user_id, channel.guild_id, channel_id); const permission = await getPermission(req.user_id, channel.guild_id, channel_id);
if (message.author_id !== req.user_id) permission.hasThrow("MANAGE_MESSAGES"); if (message.author_id !== req.user_id) permission.hasThrow("MANAGE_MESSAGES");
await MessageModel.deleteOne({ id: message_id }).exec(); await Message.delete({ id: message_id });
await emitEvent({ await emitEvent({
event: "MESSAGE_DELETE", event: "MESSAGE_DELETE",

View File

@ -1,21 +1,21 @@
import { import {
ChannelModel, Channel,
emitEvent, emitEvent,
EmojiModel, Emoji,
getPermission, getPermission,
MemberModel, Member,
MessageModel, Message,
MessageReactionAddEvent, MessageReactionAddEvent,
MessageReactionRemoveAllEvent, MessageReactionRemoveAllEvent,
MessageReactionRemoveEmojiEvent, MessageReactionRemoveEmojiEvent,
MessageReactionRemoveEvent, MessageReactionRemoveEvent,
PartialEmoji, PartialEmoji,
PublicUserProjection, PublicUserProjection,
toObject, User
UserModel
} from "@fosscord/util"; } from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { In } from "typeorm";
const router = Router(); const router = Router();
// TODO: check if emoji is really an unicode emoji or a prperly encoded external emoji // TODO: check if emoji is really an unicode emoji or a prperly encoded external emoji
@ -38,12 +38,12 @@ function getEmoji(emoji: string): PartialEmoji {
router.delete("/", async (req: Request, res: Response) => { router.delete("/", async (req: Request, res: Response) => {
const { message_id, channel_id } = req.params; const { message_id, channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
permissions.hasThrow("MANAGE_MESSAGES"); permissions.hasThrow("MANAGE_MESSAGES");
await MessageModel.findOneAndUpdate({ id: message_id, channel_id }, { reactions: [] }, { new: true }).exec(); await Message.update({ id: message_id, channel_id }, { reactions: [] });
await emitEvent({ await emitEvent({
event: "MESSAGE_REACTION_REMOVE_ALL", event: "MESSAGE_REACTION_REMOVE_ALL",
@ -62,29 +62,28 @@ router.delete("/:emoji", async (req: Request, res: Response) => {
const { message_id, channel_id } = req.params; const { message_id, channel_id } = req.params;
const emoji = getEmoji(req.params.emoji); const emoji = getEmoji(req.params.emoji);
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true }).exec();
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
permissions.hasThrow("MANAGE_MESSAGES"); permissions.hasThrow("MANAGE_MESSAGES");
const message = await MessageModel.findOne({ id: message_id, channel_id }).exec(); const message = await Message.findOneOrFail({ id: message_id, channel_id });
const already_added = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name); const already_added = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name);
if (!already_added) throw new HTTPError("Reaction not found", 404); if (!already_added) throw new HTTPError("Reaction not found", 404);
message.reactions.remove(already_added); message.reactions.remove(already_added);
await MessageModel.updateOne({ id: message_id, channel_id }, message).exec(); await Promise.all([
message.save(),
await emitEvent({ emitEvent({
event: "MESSAGE_REACTION_REMOVE_EMOJI", event: "MESSAGE_REACTION_REMOVE_EMOJI",
channel_id,
data: {
channel_id, channel_id,
message_id, data: {
guild_id: channel.guild_id, channel_id,
emoji message_id,
} guild_id: message.guild_id,
} as MessageReactionRemoveEmojiEvent); emoji
}
} as MessageReactionRemoveEmojiEvent)
]);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -93,17 +92,21 @@ router.get("/:emoji", async (req: Request, res: Response) => {
const { message_id, channel_id } = req.params; const { message_id, channel_id } = req.params;
const emoji = getEmoji(req.params.emoji); const emoji = getEmoji(req.params.emoji);
const message = await MessageModel.findOne({ id: message_id, channel_id }).exec(); const message = await Message.findOneOrFail({ id: message_id, channel_id });
if (!message) throw new HTTPError("Message not found", 404);
const reaction = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name); const reaction = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name);
if (!reaction) throw new HTTPError("Reaction not found", 404); if (!reaction) throw new HTTPError("Reaction not found", 404);
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
permissions.hasThrow("VIEW_CHANNEL"); permissions.hasThrow("VIEW_CHANNEL");
const users = await UserModel.find({ id: { $in: reaction.user_ids } }, PublicUserProjection).exec(); const users = await User.find({
where: {
id: In(reaction.user_ids)
},
select: PublicUserProjection
});
res.json(toObject(users)); res.json(users);
}); });
router.put("/:emoji/:user_id", async (req: Request, res: Response) => { router.put("/:emoji/:user_id", async (req: Request, res: Response) => {
@ -111,8 +114,8 @@ router.put("/:emoji/:user_id", async (req: Request, res: Response) => {
if (user_id !== "@me") throw new HTTPError("Invalid user"); if (user_id !== "@me") throw new HTTPError("Invalid user");
const emoji = getEmoji(req.params.emoji); const emoji = getEmoji(req.params.emoji);
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const message = await MessageModel.findOne({ id: message_id, channel_id }).exec(); const message = await Message.findOneOrFail({ id: message_id, channel_id });
const already_added = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name); const already_added = message.reactions.find((x) => (x.emoji.id === emoji.id && emoji.id) || x.emoji.name === emoji.name);
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
@ -120,7 +123,7 @@ router.put("/:emoji/:user_id", async (req: Request, res: Response) => {
if (!already_added) permissions.hasThrow("ADD_REACTIONS"); if (!already_added) permissions.hasThrow("ADD_REACTIONS");
if (emoji.id) { if (emoji.id) {
const external_emoji = await EmojiModel.findOne({ id: emoji.id }).exec(); const external_emoji = await Emoji.findOneOrFail({ id: emoji.id });
if (!already_added) permissions.hasThrow("USE_EXTERNAL_EMOJIS"); if (!already_added) permissions.hasThrow("USE_EXTERNAL_EMOJIS");
emoji.animated = external_emoji.animated; emoji.animated = external_emoji.animated;
emoji.name = external_emoji.name; emoji.name = external_emoji.name;
@ -131,9 +134,9 @@ router.put("/:emoji/:user_id", async (req: Request, res: Response) => {
already_added.count++; already_added.count++;
} else message.reactions.push({ count: 1, emoji, user_ids: [req.user_id] }); } else message.reactions.push({ count: 1, emoji, user_ids: [req.user_id] });
await MessageModel.updateOne({ id: message_id, channel_id }, message).exec(); await Message.update({ id: message_id, channel_id }, message);
const member = channel.guild_id && (await MemberModel.findOne({ id: req.user_id }).exec()); const member = channel.guild_id && (await Member.findOneOrFail({ id: req.user_id }));
await emitEvent({ await emitEvent({
event: "MESSAGE_REACTION_ADD", event: "MESSAGE_REACTION_ADD",
@ -156,8 +159,8 @@ router.delete("/:emoji/:user_id", async (req: Request, res: Response) => {
const emoji = getEmoji(req.params.emoji); const emoji = getEmoji(req.params.emoji);
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const message = await MessageModel.findOne({ id: message_id, channel_id }).exec(); const message = await Message.findOneOrFail({ id: message_id, channel_id });
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
@ -171,7 +174,7 @@ router.delete("/:emoji/:user_id", async (req: Request, res: Response) => {
if (already_added.count <= 0) message.reactions.remove(already_added); if (already_added.count <= 0) message.reactions.remove(already_added);
await MessageModel.updateOne({ id: message_id, channel_id }, message).exec(); await Message.update({ id: message_id, channel_id }, message);
await emitEvent({ await emitEvent({
event: "MESSAGE_REACTION_REMOVE", event: "MESSAGE_REACTION_REMOVE",

View File

@ -1,8 +1,9 @@
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { ChannelModel, Config, emitEvent, getPermission, MessageDeleteBulkEvent, MessageModel } from "@fosscord/util"; import { Channel, Config, emitEvent, getPermission, MessageDeleteBulkEvent, Message } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { check } from "../../../../util/instanceOf"; import { check } from "../../../../util/instanceOf";
import { In } from "typeorm";
const router: Router = Router(); const router: Router = Router();
@ -13,10 +14,10 @@ export default router;
// https://discord.com/developers/docs/resources/channel#bulk-delete-messages // https://discord.com/developers/docs/resources/channel#bulk-delete-messages
router.post("/", check({ messages: [String] }), async (req: Request, res: Response) => { router.post("/", check({ messages: [String] }), async (req: Request, res: Response) => {
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }, { permission_overwrites: true, guild_id: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
if (!channel.guild_id) throw new HTTPError("Can't bulk delete dm channel messages", 400); if (!channel.guild_id) throw new HTTPError("Can't bulk delete dm channel messages", 400);
const permission = await getPermission(req.user_id, channel?.guild_id, channel_id, { channel }); const permission = await getPermission(req.user_id, channel?.guild_id, channel_id);
permission.hasThrow("MANAGE_MESSAGES"); permission.hasThrow("MANAGE_MESSAGES");
const { maxBulkDelete } = Config.get().limits.message; const { maxBulkDelete } = Config.get().limits.message;
@ -25,7 +26,7 @@ router.post("/", check({ messages: [String] }), async (req: Request, res: Respon
if (messages.length < 2) throw new HTTPError("You must at least specify 2 messages to bulk delete"); if (messages.length < 2) throw new HTTPError("You must at least specify 2 messages to bulk delete");
if (messages.length > maxBulkDelete) throw new HTTPError(`You cannot delete more than ${maxBulkDelete} messages`); if (messages.length > maxBulkDelete) throw new HTTPError(`You cannot delete more than ${maxBulkDelete} messages`);
await MessageModel.deleteMany({ id: { $in: messages } }).exec(); await Message.delete({ id: In(messages) });
await emitEvent({ await emitEvent({
event: "MESSAGE_DELETE_BULK", event: "MESSAGE_DELETE_BULK",

View File

@ -1,5 +1,5 @@
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { Attachment, ChannelModel, ChannelType, getPermission, MessageDocument, MessageModel, toObject } from "@fosscord/util"; import { Attachment, Channel, ChannelType, getPermission, Message } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { MessageCreateSchema } from "../../../../schema/Message"; import { MessageCreateSchema } from "../../../../schema/Message";
import { check, instanceOf, Length } from "../../../../util/instanceOf"; import { check, instanceOf, Length } from "../../../../util/instanceOf";
@ -7,6 +7,7 @@ import multer from "multer";
import { Query } from "mongoose"; import { Query } from "mongoose";
import { sendMessage } from "../../../../util/Message"; import { sendMessage } from "../../../../util/Message";
import { uploadFile } from "../../../../util/cdn"; import { uploadFile } from "../../../../util/cdn";
import { FindManyOptions, LessThan, MoreThan } from "typeorm";
const router: Router = Router(); const router: Router = Router();
@ -30,12 +31,7 @@ export function isTextChannel(type: ChannelType): boolean {
// get messages // get messages
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const channel_id = req.params.channel_id; const channel_id = req.params.channel_id;
const channel = await ChannelModel.findOne( const channel = await Channel.findOneOrFail({ id: channel_id });
{ id: channel_id },
{ guild_id: true, type: true, permission_overwrites: true, recipient_ids: true, owner_id: true }
)
.lean() // lean is needed, because we don't want to populate .recipients that also auto deletes .recipient_ids
.exec();
if (!channel) throw new HTTPError("Channel not found", 404); if (!channel) throw new HTTPError("Channel not found", 404);
isTextChannel(channel.type); isTextChannel(channel.type);
@ -57,32 +53,34 @@ router.get("/", async (req: Request, res: Response) => {
permissions.hasThrow("VIEW_CHANNEL"); permissions.hasThrow("VIEW_CHANNEL");
if (!permissions.has("READ_MESSAGE_HISTORY")) return res.json([]); if (!permissions.has("READ_MESSAGE_HISTORY")) return res.json([]);
var query: Query<MessageDocument[], MessageDocument>; var query: FindManyOptions<Message> & { where: { id?: any } } = {
if (after) query = MessageModel.find({ channel_id, id: { $gt: after } }); order: { id: "DESC" },
else if (before) query = MessageModel.find({ channel_id, id: { $lt: before } }); take: limit,
else if (around) where: { channel_id },
query = MessageModel.find({ relations: ["author", "webhook", "application", "mentions", "mention_roles", "mention_channels", "sticker_items", "attachments"]
channel_id, };
id: { $gt: (BigInt(around) - BigInt(halfLimit)).toString(), $lt: (BigInt(around) + BigInt(halfLimit)).toString() }
}); if (after) query.where.id = MoreThan(after);
else { else if (before) query.where.id = LessThan(before);
query = MessageModel.find({ channel_id }); else if (around) {
query.where.id = [
MoreThan((BigInt(around) - BigInt(halfLimit)).toString()),
LessThan((BigInt(around) + BigInt(halfLimit)).toString())
];
} }
query = query.sort({ id: -1 }); const messages = await Message.find(query);
const messages = await query.limit(limit).exec();
return res.json( return res.json(
toObject(messages).map((x) => { messages.map((x) => {
(x.reactions || []).forEach((x) => { (x.reactions || []).forEach((x: any) => {
// @ts-ignore // @ts-ignore
if ((x.user_ids || []).includes(req.user_id)) x.me = true; if ((x.user_ids || []).includes(req.user_id)) x.me = true;
// @ts-ignore // @ts-ignore
delete x.user_ids; delete x.user_ids;
}); });
// @ts-ignore // @ts-ignore
if (!x.author) x.author = { discriminator: "0000", username: "Deleted User", public_flags: 0n, avatar: null }; if (!x.author) x.author = { discriminator: "0000", username: "Deleted User", public_flags: "0", avatar: null };
return x; return x;
}) })
@ -139,8 +137,8 @@ router.post("/", messageUpload.single("file"), async (req: Request, res: Respons
embeds, embeds,
channel_id, channel_id,
attachments, attachments,
edited_timestamp: null edited_timestamp: undefined
}); });
return res.send(data); return res.json(data);
}); });

View File

@ -1,13 +1,4 @@
import { import { Channel, ChannelPermissionOverwrite, ChannelUpdateEvent, emitEvent, getPermission, Member, Role } from "@fosscord/util";
ChannelModel,
ChannelPermissionOverwrite,
ChannelUpdateEvent,
emitEvent,
getPermission,
MemberModel,
RoleModel,
toObject
} from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
@ -20,16 +11,16 @@ router.put("/:overwrite_id", check({ allow: String, deny: String, type: Number,
const { channel_id, overwrite_id } = req.params; const { channel_id, overwrite_id } = req.params;
const body = req.body as { allow: bigint; deny: bigint; type: number; id: string }; const body = req.body as { allow: bigint; deny: bigint; type: number; id: string };
var channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true, permission_overwrites: true }).exec(); var channel = await Channel.findOneOrFail({ id: channel_id });
if (!channel.guild_id) throw new HTTPError("Channel not found", 404); if (!channel.guild_id) throw new HTTPError("Channel not found", 404);
const permissions = await getPermission(req.user_id, channel.guild_id, channel_id); const permissions = await getPermission(req.user_id, channel.guild_id, channel_id);
permissions.hasThrow("MANAGE_ROLES"); permissions.hasThrow("MANAGE_ROLES");
if (body.type === 0) { if (body.type === 0) {
if (!(await RoleModel.exists({ id: overwrite_id }))) throw new HTTPError("role not found", 404); if (!(await Role.count({ id: overwrite_id }))) throw new HTTPError("role not found", 404);
} else if (body.type === 1) { } else if (body.type === 1) {
if (!(await MemberModel.exists({ id: overwrite_id }))) throw new HTTPError("user not found", 404); if (!(await Member.count({ id: overwrite_id }))) throw new HTTPError("user not found", 404);
} else throw new HTTPError("type not supported", 501); } else throw new HTTPError("type not supported", 501);
// @ts-ignore // @ts-ignore
@ -48,12 +39,12 @@ router.put("/:overwrite_id", check({ allow: String, deny: String, type: Number,
overwrite.deny = body.deny; overwrite.deny = body.deny;
// @ts-ignore // @ts-ignore
channel = await ChannelModel.findOneAndUpdate({ id: channel_id }, channel, { new: true }).exec(); channel = await Channel.findOneOrFailAndUpdate({ id: channel_id }, channel, { new: true });
await emitEvent({ await emitEvent({
event: "CHANNEL_UPDATE", event: "CHANNEL_UPDATE",
channel_id, channel_id,
data: toObject(channel) data: channel
} as ChannelUpdateEvent); } as ChannelUpdateEvent);
return res.sendStatus(204); return res.sendStatus(204);
@ -66,18 +57,19 @@ router.delete("/:overwrite_id", async (req: Request, res: Response) => {
const permissions = await getPermission(req.user_id, undefined, channel_id); const permissions = await getPermission(req.user_id, undefined, channel_id);
permissions.hasThrow("MANAGE_ROLES"); permissions.hasThrow("MANAGE_ROLES");
const channel = await ChannelModel.findOneAndUpdate( const channel = await Channel.findOneOrFail({ id: channel_id });
{ id: channel_id },
{ $pull: { permission_overwrites: { id: overwrite_id } } },
{ new: true }
);
if (!channel.guild_id) throw new HTTPError("Channel not found", 404); if (!channel.guild_id) throw new HTTPError("Channel not found", 404);
await emitEvent({ channel.permission_overwrites = channel.permission_overwrites.filter((x) => x.id === overwrite_id);
event: "CHANNEL_UPDATE",
channel_id, await Promise.all([
data: toObject(channel) channel.save(),
} as ChannelUpdateEvent); emitEvent({
event: "CHANNEL_UPDATE",
channel_id,
data: channel
} as ChannelUpdateEvent)
]);
return res.sendStatus(204); return res.sendStatus(204);
}); });

View File

@ -1,13 +1,4 @@
import { import { Channel, ChannelPinsUpdateEvent, Config, emitEvent, getPermission, Message, MessageUpdateEvent } from "@fosscord/util";
ChannelModel,
ChannelPinsUpdateEvent,
Config,
emitEvent,
getPermission,
MessageModel,
MessageUpdateEvent,
toObject
} from "@fosscord/util";
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
@ -15,35 +6,36 @@ const router: Router = Router();
router.put("/:message_id", async (req: Request, res: Response) => { router.put("/:message_id", async (req: Request, res: Response) => {
const { channel_id, message_id } = req.params; const { channel_id, message_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec();
const permission = await getPermission(req.user_id, channel.guild_id, channel_id); const message = await Message.findOneOrFail({ id: message_id });
const permission = await getPermission(req.user_id, message.guild_id, channel_id);
permission.hasThrow("VIEW_CHANNEL"); permission.hasThrow("VIEW_CHANNEL");
// * in dm channels anyone can pin messages -> only check for guilds // * in dm channels anyone can pin messages -> only check for guilds
if (channel.guild_id) permission.hasThrow("MANAGE_MESSAGES"); if (message.guild_id) permission.hasThrow("MANAGE_MESSAGES");
const pinned_count = await MessageModel.count({ channel_id, pinned: true }).exec(); const pinned_count = await Message.count({ channel: { id: channel_id }, pinned: true });
const { maxPins } = Config.get().limits.channel; const { maxPins } = Config.get().limits.channel;
if (pinned_count >= maxPins) throw new HTTPError("Max pin count reached: " + maxPins); if (pinned_count >= maxPins) throw new HTTPError("Max pin count reached: " + maxPins);
await MessageModel.updateOne({ id: message_id }, { pinned: true }).exec(); await Promise.all([
const message = toObject(await MessageModel.findOne({ id: message_id }).exec()); Message.update({ id: message_id }, { pinned: true }),
emitEvent({
await emitEvent({ event: "MESSAGE_UPDATE",
event: "MESSAGE_UPDATE",
channel_id,
data: message
} as MessageUpdateEvent);
await emitEvent({
event: "CHANNEL_PINS_UPDATE",
channel_id,
data: {
channel_id, channel_id,
guild_id: channel.guild_id, data: message
last_pin_timestamp: undefined } as MessageUpdateEvent),
}
} as ChannelPinsUpdateEvent); emitEvent({
event: "CHANNEL_PINS_UPDATE",
channel_id,
data: {
channel_id,
guild_id: message.guild_id,
last_pin_timestamp: undefined
}
} as ChannelPinsUpdateEvent)
]);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -51,29 +43,34 @@ router.put("/:message_id", async (req: Request, res: Response) => {
router.delete("/:message_id", async (req: Request, res: Response) => { router.delete("/:message_id", async (req: Request, res: Response) => {
const { channel_id, message_id } = req.params; const { channel_id, message_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const permission = await getPermission(req.user_id, channel.guild_id, channel_id); const permission = await getPermission(req.user_id, channel.guild_id, channel_id);
permission.hasThrow("VIEW_CHANNEL"); permission.hasThrow("VIEW_CHANNEL");
if (channel.guild_id) permission.hasThrow("MANAGE_MESSAGES"); if (channel.guild_id) permission.hasThrow("MANAGE_MESSAGES");
const message = toObject(await MessageModel.findOneAndUpdate({ id: message_id }, { pinned: false }, { new: true }).exec()); const message = await Message.findOneOrFail({ id: message_id });
message.pinned = false;
await emitEvent({ await Promise.all([
event: "MESSAGE_UPDATE", message.save(),
channel_id,
data: message
} as MessageUpdateEvent);
await emitEvent({ emitEvent({
event: "CHANNEL_PINS_UPDATE", event: "MESSAGE_UPDATE",
channel_id,
data: {
channel_id, channel_id,
guild_id: channel.guild_id, data: message
last_pin_timestamp: undefined } as MessageUpdateEvent),
}
} as ChannelPinsUpdateEvent); emitEvent({
event: "CHANNEL_PINS_UPDATE",
channel_id,
data: {
channel_id,
guild_id: channel.guild_id,
last_pin_timestamp: undefined
}
} as ChannelPinsUpdateEvent)
]);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -81,13 +78,13 @@ router.delete("/:message_id", async (req: Request, res: Response) => {
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { channel_id } = req.params; const { channel_id } = req.params;
const channel = await ChannelModel.findOne({ id: channel_id }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
const permission = await getPermission(req.user_id, channel.guild_id, channel_id); const permission = await getPermission(req.user_id, channel.guild_id, channel_id);
permission.hasThrow("VIEW_CHANNEL"); permission.hasThrow("VIEW_CHANNEL");
let pins = await MessageModel.find({ channel_id: channel_id, pinned: true }).exec(); let pins = await Message.find({ channel_id: channel_id, pinned: true });
res.send(toObject(pins)); res.send(pins);
}); });
export default router; export default router;

View File

@ -1,4 +1,4 @@
import { ChannelModel, emitEvent, MemberModel, toObject, TypingStartEvent } from "@fosscord/util"; import { Channel, emitEvent, Member, TypingStartEvent } from "@fosscord/util";
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
@ -9,15 +9,15 @@ router.post("/", async (req: Request, res: Response) => {
const { channel_id } = req.params; const { channel_id } = req.params;
const user_id = req.user_id; const user_id = req.user_id;
const timestamp = Date.now(); const timestamp = Date.now();
const channel = await ChannelModel.findOne({ id: channel_id }); const channel = await Channel.findOneOrFail({ id: channel_id });
const member = await MemberModel.findOne({ id: user_id }).exec(); const member = await Member.findOneOrFail({ id: user_id });
await emitEvent({ await emitEvent({
event: "TYPING_START", event: "TYPING_START",
channel_id: channel_id, channel_id: channel_id,
data: { data: {
// this is the paylod // this is the paylod
member: toObject(member), member: { ...member, roles: member.roles.map((x) => x.id) },
channel_id, channel_id,
timestamp, timestamp,
user_id, user_id,

View File

@ -1,6 +1,6 @@
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { check, Length } from "../../../util/instanceOf"; import { check, Length } from "../../../util/instanceOf";
import { ChannelModel, getPermission, trimSpecial } from "@fosscord/util"; import { Channel, getPermission, trimSpecial } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { isTextChannel } from "./messages/index"; import { isTextChannel } from "./messages/index";
@ -10,7 +10,7 @@ const router: Router = Router();
// TODO: use Image Data Type for avatar instead of String // TODO: use Image Data Type for avatar instead of String
router.post("/", check({ name: new Length(String, 1, 80), $avatar: String }), async (req: Request, res: Response) => { router.post("/", check({ name: new Length(String, 1, 80), $avatar: String }), async (req: Request, res: Response) => {
const channel_id = req.params.channel_id; const channel_id = req.params.channel_id;
const channel = await ChannelModel.findOne({ id: channel_id }, { guild_id: true, type: true }).exec(); const channel = await Channel.findOneOrFail({ id: channel_id });
isTextChannel(channel.type); isTextChannel(channel.type);
if (!channel.guild_id) throw new HTTPError("Not a guild channel", 400); if (!channel.guild_id) throw new HTTPError("Not a guild channel", 400);

View File

@ -1,30 +1,25 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { BanModel, emitEvent, getPermission, GuildBanAddEvent, GuildBanRemoveEvent, GuildModel, toObject } from "@fosscord/util"; import { emitEvent, getPermission, GuildBanAddEvent, GuildBanRemoveEvent, Guild, Ban, User, Member } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { getIpAdress } from "../../../util/ipAddress"; import { getIpAdress } from "../../../util/ipAddress";
import { BanCreateSchema } from "../../../schema/Ban"; import { BanCreateSchema } from "../../../schema/Ban";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { removeMember } from "../../../util/Member";
import { getPublicUser } from "../../../util/User";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.exists({ id: guild_id }); var bans = await Ban.find({ guild_id: guild_id });
if (!guild) throw new HTTPError("Guild not found", 404); return res.json(bans);
var bans = await BanModel.find({ guild_id: guild_id }, { user_id: true, reason: true }).exec();
return res.json(toObject(bans));
}); });
router.get("/:user", async (req: Request, res: Response) => { router.get("/:user", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const user_id = req.params.ban; const user_id = req.params.ban;
var ban = await BanModel.findOne({ guild_id: guild_id, user_id: user_id }).exec(); var ban = await Ban.findOneOrFail({ guild_id: guild_id, user_id: user_id });
return res.json(ban); return res.json(ban);
}); });
@ -32,57 +27,59 @@ router.put("/:user_id", check(BanCreateSchema), async (req: Request, res: Respon
const { guild_id } = req.params; const { guild_id } = req.params;
const banned_user_id = req.params.user_id; const banned_user_id = req.params.user_id;
const banned_user = await getPublicUser(banned_user_id); const banned_user = await User.getPublicUser(banned_user_id);
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("BAN_MEMBERS"); perms.hasThrow("BAN_MEMBERS");
if (req.user_id === banned_user_id) throw new HTTPError("You can't ban yourself", 400); if (req.user_id === banned_user_id) throw new HTTPError("You can't ban yourself", 400);
if (perms.cache.guild?.owner_id === banned_user_id) throw new HTTPError("You can't ban the owner", 400);
await removeMember(banned_user_id, guild_id); const ban = new Ban({
const ban = await new BanModel({
user_id: banned_user_id, user_id: banned_user_id,
guild_id: guild_id, guild_id: guild_id,
ip: getIpAdress(req), ip: getIpAdress(req),
executor_id: req.user_id, executor_id: req.user_id,
reason: req.body.reason // || otherwise empty reason: req.body.reason // || otherwise empty
}).save(); });
await emitEvent({ await Promise.all([
event: "GUILD_BAN_ADD", Member.removeFromGuild(banned_user_id, guild_id),
data: { ban.save(),
guild_id: guild_id, emitEvent({
user: banned_user event: "GUILD_BAN_ADD",
}, data: {
guild_id: guild_id guild_id: guild_id,
} as GuildBanAddEvent); user: banned_user
},
guild_id: guild_id
} as GuildBanAddEvent)
]);
return res.json(toObject(ban)); return res.json(ban);
}); });
router.delete("/:user_id", async (req: Request, res: Response) => { router.delete("/:user_id", async (req: Request, res: Response) => {
var { guild_id } = req.params; var { guild_id } = req.params;
var banned_user_id = req.params.user_id; var banned_user_id = req.params.user_id;
const banned_user = await getPublicUser(banned_user_id); const banned_user = await User.getPublicUser(banned_user_id);
const guild = await GuildModel.exists({ id: guild_id });
if (!guild) throw new HTTPError("Guild not found", 404);
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("BAN_MEMBERS"); perms.hasThrow("BAN_MEMBERS");
await BanModel.deleteOne({ await Promise.all([
user_id: banned_user_id, Ban.delete({
guild_id user_id: banned_user_id,
}).exec(); guild_id
}),
await emitEvent({ emitEvent({
event: "GUILD_BAN_REMOVE", event: "GUILD_BAN_REMOVE",
data: { data: {
guild_id, guild_id,
user: banned_user user: banned_user
}, },
guild_id guild_id
} as GuildBanRemoveEvent); } as GuildBanRemoveEvent)
]);
return res.status(204).send(); return res.status(204).send();
}); });

View File

@ -1,17 +1,16 @@
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { ChannelModel, toObject, ChannelUpdateEvent, getPermission, emitEvent } from "@fosscord/util"; import { Channel, ChannelUpdateEvent, getPermission, emitEvent } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { ChannelModifySchema } from "../../../schema/Channel"; import { ChannelModifySchema } from "../../../schema/Channel";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { createChannel } from "../../../util/Channel";
const router = Router(); const router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const channels = await ChannelModel.find({ guild_id }).exec(); const channels = await Channel.find({ guild_id });
res.json(toObject(channels)); res.json(channels);
}); });
// TODO: check if channel type is permitted // TODO: check if channel type is permitted
@ -22,9 +21,9 @@ router.post("/", check(ChannelModifySchema), async (req: Request, res: Response)
const { guild_id } = req.params; const { guild_id } = req.params;
const body = req.body as ChannelModifySchema; const body = req.body as ChannelModifySchema;
const channel = await createChannel({ ...body, guild_id }, req.user_id); const channel = await Channel.createChannel({ ...body, guild_id }, req.user_id);
res.status(201).json(toObject(channel)); res.status(201).json(channel);
}); });
// TODO: check if parent_id exists // TODO: check if parent_id exists
@ -48,18 +47,19 @@ router.patch(
if (x.parent_id) { if (x.parent_id) {
opts.parent_id = x.parent_id; opts.parent_id = x.parent_id;
const parent_channel = await ChannelModel.findOne( const parent_channel = await Channel.findOneOrFail({
{ id: x.parent_id, guild_id }, where: { id: x.parent_id, guild_id },
{ permission_overwrites: true } select: ["permission_overwrites"]
).exec(); });
if (x.lock_permissions) { if (x.lock_permissions) {
opts.permission_overwrites = parent_channel.permission_overwrites; opts.permission_overwrites = parent_channel.permission_overwrites;
} }
} }
const channel = await ChannelModel.findOneAndUpdate({ id: x.id, guild_id }, opts, { new: true }).exec(); await Channel.update({ guild_id, id: x.id }, opts);
const channel = await Channel.findOneOrFail({ guild_id, id: x.id });
await emitEvent({ event: "CHANNEL_UPDATE", data: toObject(channel), channel_id: x.id, guild_id } as ChannelUpdateEvent); await emitEvent({ event: "CHANNEL_UPDATE", data: channel, channel_id: x.id, guild_id } as ChannelUpdateEvent);
}) })
]); ]);

View File

@ -1,15 +1,4 @@
import { import { Channel, emitEvent, GuildDeleteEvent, Guild, Member, Message, Role, Invite, Emoji } from "@fosscord/util";
ChannelModel,
emitEvent,
EmojiModel,
GuildDeleteEvent,
GuildModel,
InviteModel,
MemberModel,
MessageModel,
RoleModel,
UserModel
} from "@fosscord/util";
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
@ -20,7 +9,7 @@ const router = Router();
router.post("/", async (req: Request, res: Response) => { router.post("/", async (req: Request, res: Response) => {
var { guild_id } = req.params; var { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }, "owner_id").exec(); const guild = await Guild.findOneOrFail({ where: { id: guild_id }, select: ["owner_id"] });
if (guild.owner_id !== req.user_id) throw new HTTPError("You are not the owner of this guild", 401); if (guild.owner_id !== req.user_id) throw new HTTPError("You are not the owner of this guild", 401);
await emitEvent({ await emitEvent({
@ -32,14 +21,13 @@ router.post("/", async (req: Request, res: Response) => {
} as GuildDeleteEvent); } as GuildDeleteEvent);
await Promise.all([ await Promise.all([
GuildModel.deleteOne({ id: guild_id }).exec(), Guild.delete({ id: guild_id }),
UserModel.updateMany({ guilds: guild_id }, { $pull: { guilds: guild_id } }).exec(), Role.delete({ guild_id }),
RoleModel.deleteMany({ guild_id }).exec(), Channel.delete({ guild_id }),
ChannelModel.deleteMany({ guild_id }).exec(), Emoji.delete({ guild_id }),
EmojiModel.deleteMany({ guild_id }).exec(), Invite.delete({ guild_id }),
InviteModel.deleteMany({ guild_id }).exec(), Message.delete({ guild_id }),
MessageModel.deleteMany({ guild_id }).exec(), Member.delete({ guild_id })
MemberModel.deleteMany({ guild_id }).exec()
]); ]);
return res.sendStatus(204); return res.sendStatus(204);

View File

@ -1,19 +1,5 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { import { emitEvent, getPermission, Guild, GuildUpdateEvent, Member } from "@fosscord/util";
ChannelModel,
emitEvent,
EmojiModel,
getPermission,
GuildDeleteEvent,
GuildModel,
GuildUpdateEvent,
InviteModel,
MemberModel,
MessageModel,
RoleModel,
toObject,
UserModel
} from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { GuildUpdateSchema } from "../../../schema/Guild"; import { GuildUpdateSchema } from "../../../schema/Guild";
@ -26,12 +12,15 @@ const router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }) const [guild, member_count, member] = await Promise.all([
.populate({ path: "joined_at", match: { id: req.user_id } }) Guild.findOneOrFail({ id: guild_id }),
.exec(); Member.count({ guild: { id: guild_id }, id: req.user_id }),
Member.findOneOrFail({ id: req.user_id })
]);
if (!member_count) throw new HTTPError("You are not a member of the guild you are trying to access", 401);
const member = await MemberModel.exists({ guild_id: guild_id, id: req.user_id }); // @ts-ignore
if (!member) throw new HTTPError("You are not a member of the guild you are trying to access", 401); guild.joined_at = member?.joined_at;
return res.json(guild); return res.json(guild);
}); });
@ -48,15 +37,12 @@ router.patch("/", check(GuildUpdateSchema), async (req: Request, res: Response)
if (body.banner) body.banner = await handleFile(`/banners/${guild_id}`, body.banner); if (body.banner) body.banner = await handleFile(`/banners/${guild_id}`, body.banner);
if (body.splash) body.splash = await handleFile(`/splashes/${guild_id}`, body.splash); if (body.splash) body.splash = await handleFile(`/splashes/${guild_id}`, body.splash);
const guild = await GuildModel.findOneAndUpdate({ id: guild_id }, body, { new: true }) const guild = await Guild.findOneOrFail({ id: guild_id });
.populate({ path: "joined_at", match: { id: req.user_id } }) guild.assign(body);
.exec();
const data = toObject(guild); await Promise.all([guild.save(), emitEvent({ event: "GUILD_UPDATE", data: guild, guild_id } as GuildUpdateEvent)]);
emitEvent({ event: "GUILD_UPDATE", data: data, guild_id } as GuildUpdateEvent); return res.json(guild);
return res.json(data);
}); });
export default router; export default router;

View File

@ -1,4 +1,4 @@
import { getPermission, InviteModel, toObject } from "@fosscord/util"; import { getPermission, Invite } from "@fosscord/util";
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
const router = Router(); const router = Router();
@ -9,9 +9,9 @@ router.get("/", async (req: Request, res: Response) => {
const permissions = await getPermission(req.user_id, guild_id); const permissions = await getPermission(req.user_id, guild_id);
permissions.hasThrow("MANAGE_GUILD"); permissions.hasThrow("MANAGE_GUILD");
const invites = await InviteModel.find({ guild_id }).exec(); const invites = await Invite.find({ guild_id });
return res.json(toObject(invites)); return res.json(invites);
}); });
export default router; export default router;

View File

@ -1,50 +1,53 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { import {
GuildModel, Guild,
MemberModel, Member,
UserModel, User,
toObject,
GuildMemberAddEvent, GuildMemberAddEvent,
getPermission, getPermission,
PermissionResolvable, PermissionResolvable,
RoleModel, Role,
GuildMemberUpdateEvent, GuildMemberUpdateEvent,
emitEvent emitEvent
} from "@fosscord/util"; } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { addMember, isMember, removeMember } from "../../../../../util/Member";
import { check } from "../../../../../util/instanceOf"; import { check } from "../../../../../util/instanceOf";
import { MemberChangeSchema } from "../../../../../schema/Member"; import { MemberChangeSchema } from "../../../../../schema/Member";
import { In } from "typeorm";
const router = Router(); const router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id, member_id } = req.params; const { guild_id, member_id } = req.params;
await isMember(req.user_id, guild_id); await Member.IsInGuildOrFail(req.user_id, guild_id);
const member = await MemberModel.findOne({ id: member_id, guild_id }).exec(); const member = await Member.findOneOrFail({ id: member_id, guild_id });
return res.json(toObject(member)); return res.json(member);
}); });
router.patch("/", check(MemberChangeSchema), async (req: Request, res: Response) => { router.patch("/", check(MemberChangeSchema), async (req: Request, res: Response) => {
const { guild_id, member_id } = req.params; const { guild_id, member_id } = req.params;
const body = req.body as MemberChangeSchema; const body = req.body as MemberChangeSchema;
if (body.roles) { if (body.roles) {
const roles = await RoleModel.find({ id: { $in: body.roles } }).exec(); const roles = await Role.find({ id: In(body.roles) });
if (body.roles.length !== roles.length) throw new HTTPError("Roles not found", 404); if (body.roles.length !== roles.length) throw new HTTPError("Roles not found", 404);
// TODO: check if user has permission to add role // TODO: check if user has permission to add role
} }
const member = await MemberModel.findOneAndUpdate({ id: member_id, guild_id }, body, { new: true }).exec(); const member = await Member.findOneOrFail({ id: member_id, guild_id });
member.assign(req.body);
await emitEvent({ Promise.all([
event: "GUILD_MEMBER_UPDATE", member.save(),
guild_id, emitEvent({
data: toObject(member) event: "GUILD_MEMBER_UPDATE",
} as GuildMemberUpdateEvent); guild_id,
data: { ...member, roles: member.roles.map((x) => x.id) }
} as GuildMemberUpdateEvent)
]);
res.json(toObject(member)); res.json(member);
}); });
router.put("/", async (req: Request, res: Response) => { router.put("/", async (req: Request, res: Response) => {
@ -52,7 +55,7 @@ router.put("/", async (req: Request, res: Response) => {
throw new HTTPError("Maintenance: Currently you can't add a member", 403); throw new HTTPError("Maintenance: Currently you can't add a member", 403);
// TODO: only for oauth2 applications // TODO: only for oauth2 applications
await addMember(member_id, guild_id); await Member.addToGuild(member_id, guild_id);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -62,7 +65,7 @@ router.delete("/", async (req: Request, res: Response) => {
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("KICK_MEMBERS"); perms.hasThrow("KICK_MEMBERS");
await removeMember(member_id, guild_id); await Member.removeFromGuild(member_id, guild_id);
res.sendStatus(204); res.sendStatus(204);
}); });

View File

@ -1,8 +1,7 @@
import { getPermission, PermissionResolvable } from "@fosscord/util"; import { getPermission, Member, PermissionResolvable } from "@fosscord/util";
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { check } from "lambert-server"; import { check } from "lambert-server";
import { MemberNickChangeSchema } from "../../../../../schema/Member"; import { MemberNickChangeSchema } from "../../../../../schema/Member";
import { changeNickname } from "../../../../../util/Member";
const router = Router(); const router = Router();
@ -17,7 +16,7 @@ router.patch("/", check(MemberNickChangeSchema), async (req: Request, res: Respo
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow(permissionString); perms.hasThrow(permissionString);
await changeNickname(member_id, guild_id, req.body.nick); await Member.changeNickname(member_id, guild_id, req.body.nick);
res.status(200).send(); res.status(200).send();
}); });

View File

@ -1,6 +1,5 @@
import { getPermission } from "@fosscord/util"; import { getPermission, Member } from "@fosscord/util";
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { addRole, removeRole } from "../../../../../../../util/Member";
const router = Router(); const router = Router();
@ -10,7 +9,7 @@ router.delete("/:member_id/roles/:role_id", async (req: Request, res: Response)
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_ROLES"); perms.hasThrow("MANAGE_ROLES");
await removeRole(member_id, guild_id, role_id); await Member.removeRole(member_id, guild_id, role_id);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -20,7 +19,7 @@ router.put("/:member_id/roles/:role_id", async (req: Request, res: Response) =>
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_ROLES"); perms.hasThrow("MANAGE_ROLES");
await addRole(member_id, guild_id, role_id); await Member.addRole(member_id, guild_id, role_id);
res.sendStatus(204); res.sendStatus(204);
}); });

View File

@ -1,8 +1,7 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { GuildModel, MemberModel, toObject } from "@fosscord/util"; import { Guild, Member, PublicMemberProjection } from "@fosscord/util";
import { HTTPError } from "lambert-server";
import { instanceOf, Length } from "../../../../util/instanceOf"; import { instanceOf, Length } from "../../../../util/instanceOf";
import { PublicMemberProjection, isMember } from "../../../../util/Member"; import { MoreThan } from "typeorm";
const router = Router(); const router = Router();
@ -10,8 +9,8 @@ const router = Router();
// TODO: send over websocket // TODO: send over websocket
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ id: guild_id });
await isMember(req.user_id, guild_id); await Member.IsInGuildOrFail(req.user_id, guild_id);
try { try {
instanceOf({ $limit: new Length(Number, 1, 1000), $after: String }, req.query, { instanceOf({ $limit: new Length(Number, 1, 1000), $after: String }, req.query, {
@ -23,16 +22,17 @@ router.get("/", async (req: Request, res: Response) => {
return res.status(400).json({ code: 50035, message: "Invalid Query", success: false, errors: error }); return res.status(400).json({ code: 50035, message: "Invalid Query", success: false, errors: error });
} }
// @ts-ignore const { limit, after } = (<unknown>req.query) as { limit?: number; after?: string };
if (!req.query.limit) req.query.limit = 1; const query = after ? { id: MoreThan(after) } : {};
const { limit, after } = (<unknown>req.query) as { limit: number; after: string };
const query = after ? { id: { $gt: after } } : {};
var members = await MemberModel.find({ guild_id, ...query }, PublicMemberProjection) const members = await Member.find({
.limit(limit) where: { guild_id, ...query },
.exec(); select: PublicMemberProjection,
take: limit || 1,
order: { id: "ASC" }
});
return res.json(toObject(members)); return res.json(members);
}); });
export default router; export default router;

View File

@ -1,10 +1,15 @@
import { Config } from "@fosscord/util"; import {Config, Guild, Member} from "@fosscord/util";
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import {getVoiceRegions} from "../../../util/Voice";
import {getIpAdress} from "../../../util/ipAddress";
const router = Router(); const router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
return res.json(Config.get().regions.available); const { guild_id } = req.params;
const guild = await Guild.findOneOrFail({ id: guild_id });
//TODO we should use an enum for guild's features and not hardcoded strings
return res.json(await getVoiceRegions(getIpAdress(req), guild.features.includes("VIP_REGIONS")));
}); });
export default router; export default router;

View File

@ -1,12 +1,9 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { import {
RoleModel, Role,
GuildModel,
getPermission, getPermission,
toObject,
UserModel,
Snowflake, Snowflake,
MemberModel, Member,
GuildRoleCreateEvent, GuildRoleCreateEvent,
GuildRoleUpdateEvent, GuildRoleUpdateEvent,
GuildRoleDeleteEvent, GuildRoleDeleteEvent,
@ -16,40 +13,34 @@ import { HTTPError } from "lambert-server";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { RoleModifySchema } from "../../../schema/Roles"; import { RoleModifySchema } from "../../../schema/Roles";
import { getPublicUser } from "../../../util/User";
import { isMember } from "../../../util/Member";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const guild_id = req.params.guild_id; const guild_id = req.params.guild_id;
await isMember(req.user_id, guild_id); await Member.IsInGuildOrFail(req.user_id, guild_id);
const roles = await RoleModel.find({ guild_id: guild_id }).exec(); const roles = await Role.find({ guild_id: guild_id });
return res.json(toObject(roles)); return res.json(roles);
}); });
router.post("/", check(RoleModifySchema), async (req: Request, res: Response) => { router.post("/", check(RoleModifySchema), async (req: Request, res: Response) => {
const guild_id = req.params.guild_id; const guild_id = req.params.guild_id;
const body = req.body as RoleModifySchema; const body = req.body as RoleModifySchema;
const guild = await GuildModel.findOne({ id: guild_id }, { id: true }).exec();
const user = await UserModel.findOne({ id: req.user_id }).exec();
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_ROLES"); perms.hasThrow("MANAGE_ROLES");
if (!body.name) throw new HTTPError("You need to specify a name");
const role = await new RoleModel({ const role = await new Role({
...body, ...body,
id: Snowflake.generate(), id: Snowflake.generate(),
guild_id: guild_id, guild_id: guild_id,
managed: false, managed: false,
position: 0, position: 0,
tags: null, tags: null,
permissions: body.permissions || 0n permissions: String(perms.bitfield & (body.permissions || 0n))
}).save(); }).save();
await emitEvent({ await emitEvent({
@ -57,11 +48,11 @@ router.post("/", check(RoleModifySchema), async (req: Request, res: Response) =>
guild_id, guild_id,
data: { data: {
guild_id, guild_id,
role: toObject(role) role: role
} }
} as GuildRoleCreateEvent); } as GuildRoleCreateEvent);
res.json(toObject(role)); res.json(role);
}); });
router.delete("/:role_id", async (req: Request, res: Response) => { router.delete("/:role_id", async (req: Request, res: Response) => {
@ -72,19 +63,20 @@ router.delete("/:role_id", async (req: Request, res: Response) => {
const permissions = await getPermission(req.user_id, guild_id); const permissions = await getPermission(req.user_id, guild_id);
permissions.hasThrow("MANAGE_ROLES"); permissions.hasThrow("MANAGE_ROLES");
await RoleModel.deleteOne({ await Promise.all([
id: role_id, Role.delete({
guild_id: guild_id id: role_id,
}).exec(); guild_id: guild_id
}),
await emitEvent({ emitEvent({
event: "GUILD_ROLE_DELETE", event: "GUILD_ROLE_DELETE",
guild_id,
data: {
guild_id, guild_id,
role_id data: {
} guild_id,
} as GuildRoleDeleteEvent); role_id
}
} as GuildRoleDeleteEvent)
]);
res.sendStatus(204); res.sendStatus(204);
}); });
@ -96,32 +88,24 @@ router.patch("/:role_id", check(RoleModifySchema), async (req: Request, res: Res
const { role_id } = req.params; const { role_id } = req.params;
const body = req.body as RoleModifySchema; const body = req.body as RoleModifySchema;
const guild = await GuildModel.findOne({ id: guild_id }, { id: true }).exec();
const user = await UserModel.findOne({ id: req.user_id }).exec();
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_ROLES"); perms.hasThrow("MANAGE_ROLES");
const role = await RoleModel.findOneAndUpdate( const role = new Role({ ...body, id: role_id, guild_id, permissions: perms.bitfield & (body.permissions || 0n) });
{
id: role_id,
guild_id: guild_id
},
// @ts-ignore
body,
{ new: true }
).exec();
await emitEvent({ await Promise.all([
event: "GUILD_ROLE_UPDATE", role.save(),
guild_id, emitEvent({
data: { event: "GUILD_ROLE_UPDATE",
guild_id, guild_id,
role data: {
} guild_id,
} as GuildRoleUpdateEvent); role
}
} as GuildRoleUpdateEvent)
]);
res.json(toObject(role)); res.json(role);
}); });
export default router; export default router;

View File

@ -1,5 +1,5 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { TemplateModel, GuildModel, getPermission, toObject, UserModel, Snowflake } from "@fosscord/util"; import { Guild, getPermission, Template } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { TemplateCreateSchema, TemplateModifySchema } from "../../../schema/Template"; import { TemplateCreateSchema, TemplateModifySchema } from "../../../schema/Template";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
@ -7,43 +7,41 @@ import { generateCode } from "../../../util/String";
const router: Router = Router(); const router: Router = Router();
const TemplateGuildProjection = { const TemplateGuildProjection: (keyof Guild)[] = [
name: true, "name",
description: true, "description",
region: true, "region",
verification_level: true, "verification_level",
default_message_notifications: true, "default_message_notifications",
explicit_content_filter: true, "explicit_content_filter",
preferred_locale: true, "preferred_locale",
afk_timeout: true, "afk_timeout",
roles: true, "roles",
channels: true, // "channels",
afk_channel_id: true, "afk_channel_id",
system_channel_id: true, "system_channel_id",
system_channel_flags: true, "system_channel_flags",
icon_hash: true "icon"
}; ];
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
var templates = await TemplateModel.find({ source_guild_id: guild_id }).exec(); var templates = await Template.find({ source_guild_id: guild_id });
return res.json(toObject(templates)); return res.json(templates);
}); });
router.post("/", check(TemplateCreateSchema), async (req: Request, res: Response) => { router.post("/", check(TemplateCreateSchema), async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }, TemplateGuildProjection).exec(); const guild = await Guild.findOneOrFail({ where: { id: guild_id }, select: TemplateGuildProjection });
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
const exists = await TemplateModel.findOne({ id: guild_id }) const exists = await Template.findOneOrFail({ id: guild_id }).catch((e) => {});
.exec()
.catch((e) => {});
if (exists) throw new HTTPError("Template already exists", 400); if (exists) throw new HTTPError("Template already exists", 400);
const template = await new TemplateModel({ const template = await new Template({
...req.body, ...req.body,
code: generateCode(), code: generateCode(),
creator_id: req.user_id, creator_id: req.user_id,
@ -53,7 +51,7 @@ router.post("/", check(TemplateCreateSchema), async (req: Request, res: Response
serialized_source_guild: guild serialized_source_guild: guild
}).save(); }).save();
res.json(toObject(template)).send(); res.json(template);
}); });
router.delete("/:code", async (req: Request, res: Response) => { router.delete("/:code", async (req: Request, res: Response) => {
@ -63,41 +61,39 @@ router.delete("/:code", async (req: Request, res: Response) => {
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
const template = await TemplateModel.findOneAndDelete({ const template = await Template.delete({
code code
}).exec(); });
res.send(toObject(template)); res.json(template);
}); });
router.put("/:code", async (req: Request, res: Response) => { router.put("/:code", async (req: Request, res: Response) => {
const guild_id = req.params.guild_id; // synchronizes the template
const { code } = req.params; const { code, guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }, TemplateGuildProjection).exec(); const guild = await Guild.findOneOrFail({ where: { id: guild_id }, select: TemplateGuildProjection });
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
const template = await TemplateModel.findOneAndUpdate({ code }, { serialized_source_guild: guild }, { new: true }).exec(); const template = await new Template({ code, serialized_source_guild: guild }).save();
res.json(toObject(template)).send(); res.json(template);
}); });
router.patch("/:code", check(TemplateModifySchema), async (req: Request, res: Response) => { router.patch("/:code", check(TemplateModifySchema), async (req: Request, res: Response) => {
// updates the template description
const { guild_id } = req.params; const { guild_id } = req.params;
const { code } = req.params; const { code } = req.params;
const { name, description } = req.body;
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
const template = await TemplateModel.findOneAndUpdate( const template = await new Template({ code, name: name, description: description }).save();
{ code },
{ name: req.body.name, description: req.body.description },
{ new: true }
).exec();
res.json(toObject(template)).send(); res.json(template);
}); });
export default router; export default router;

View File

@ -1,8 +1,7 @@
import { ChannelModel, ChannelType, getPermission, GuildModel, InviteModel, trimSpecial } from "@fosscord/util"; import { Channel, ChannelType, getPermission, Guild, Invite, trimSpecial } from "@fosscord/util";
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { check, Length } from "../../../util/instanceOf"; import { check, Length } from "../../../util/instanceOf";
import { isMember } from "../../../util/Member";
const router = Router(); const router = Router();
@ -14,46 +13,37 @@ router.get("/", async (req: Request, res: Response) => {
const permission = await getPermission(req.user_id, guild_id); const permission = await getPermission(req.user_id, guild_id);
permission.hasThrow("MANAGE_GUILD"); permission.hasThrow("MANAGE_GUILD");
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ where: { id: guild_id }, relations: ["vanity_url"] });
if (!guild.vanity_url_code) return res.json({ code: null }); if (!guild.vanity_url) return res.json({ code: null });
const { uses } = await InviteModel.findOne({ code: guild.vanity_url_code }).exec();
return res.json({ code: guild.vanity_url_code, uses }); return res.json({ code: guild.vanity_url_code, uses: guild.vanity_url.uses });
}); });
// TODO: check if guild is elgible for vanity url // TODO: check if guild is elgible for vanity url
router.patch("/", check({ code: new Length(String, 0, 20) }), async (req: Request, res: Response) => { router.patch("/", check({ code: new Length(String, 0, 20) }), async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
var code = req.body.code.replace(InviteRegex); const code = req.body.code.replace(InviteRegex);
if (!code) code = null;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); await Invite.findOneOrFail({ code });
const permission = await getPermission(req.user_id, guild_id, undefined, { guild });
const guild = await Guild.findOneOrFail({ id: guild_id });
const permission = await getPermission(req.user_id, guild_id);
permission.hasThrow("MANAGE_GUILD"); permission.hasThrow("MANAGE_GUILD");
const alreadyExists = await Promise.all([ const { id } = await Channel.findOneOrFail({ guild_id, type: ChannelType.GUILD_TEXT });
GuildModel.findOne({ vanity_url_code: code }) guild.vanity_url_code = code;
.exec()
.catch(() => null),
InviteModel.findOne({ code: code })
.exec()
.catch(() => null)
]);
if (alreadyExists.some((x) => x)) throw new HTTPError("Vanity url already exists", 400);
await GuildModel.updateOne({ id: guild_id }, { vanity_url_code: code }).exec(); Promise.all([
const { id } = await ChannelModel.findOne({ guild_id, type: ChannelType.GUILD_TEXT }).exec(); guild.save(),
await InviteModel.updateOne( Invite.delete({ code: guild.vanity_url_code }),
{ code: guild.vanity_url_code }, new Invite({
{
code: code, code: code,
uses: 0, uses: 0,
created_at: new Date(), created_at: new Date(),
guild_id, guild_id,
channel_id: id channel_id: id
}, }).save()
{ upsert: true } ]);
).exec();
return res.json({ code: code }); return res.json({ code: code });
}); });

View File

@ -1,47 +1,35 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { GuildModel, getPermission, toObject, Snowflake } from "@fosscord/util"; import { Guild, getPermission, Snowflake, Member } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { isMember } from "../../../util/Member"; import { GuildUpdateWelcomeScreenSchema } from "../../../schema/Guild";
import { GuildAddChannelToWelcomeScreenSchema } from "../../../schema/Guild";
import { getPublicUser } from "../../../util/User";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const guild_id = req.params.guild_id; const guild_id = req.params.guild_id;
const guild = await GuildModel.findOne({ id: guild_id }); const guild = await Guild.findOneOrFail({ id: guild_id });
await isMember(req.user_id, guild_id); await Member.IsInGuildOrFail(req.user_id, guild_id);
res.json(toObject(guild.welcome_screen)); res.json(guild.welcome_screen);
}); });
router.post("/", check(GuildAddChannelToWelcomeScreenSchema), async (req: Request, res: Response) => { router.patch("/", check(GuildUpdateWelcomeScreenSchema), async (req: Request, res: Response) => {
const guild_id = req.params.guild_id; const guild_id = req.params.guild_id;
const body = req.body as GuildAddChannelToWelcomeScreenSchema; const body = req.body as GuildUpdateWelcomeScreenSchema;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ id: guild_id });
var channelObject = {
...body
};
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
if (!guild.welcome_screen.enabled) throw new HTTPError("Welcome screen disabled", 400); if (!guild.welcome_screen.enabled) throw new HTTPError("Welcome screen disabled", 400);
if (guild.welcome_screen.welcome_channels.some((channel) => channel.channel_id === body.channel_id)) if (body.welcome_channels) guild.welcome_screen.welcome_channels = body.welcome_channels; // TODO: check if they exist and are valid
throw new Error("Welcome Channel exists"); if (body.description) guild.welcome_screen.description = body.description;
if (body.enabled != null) guild.welcome_screen.enabled = body.enabled;
await GuildModel.findOneAndUpdate(
{
id: guild_id
},
{ $push: { "welcome_screen.welcome_channels": channelObject } }
).exec();
res.sendStatus(204); res.sendStatus(204);
}); });

View File

@ -1,5 +1,5 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { Config, Permissions, GuildModel, InviteModel, ChannelModel, MemberModel } from "@fosscord/util"; import { Config, Permissions, Guild, Invite, Channel, Member } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { random } from "../../../util/RandomInviteID"; import { random } from "../../../util/RandomInviteID";
@ -17,11 +17,12 @@ const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ id: guild_id });
if (!guild.widget_enabled) throw new HTTPError("Widget Disabled", 404); if (!guild.widget_enabled) throw new HTTPError("Widget Disabled", 404);
// Fetch existing widget invite for widget channel // Fetch existing widget invite for widget channel
var invite = await InviteModel.findOne({ channel_id: guild.widget_channel_id, inviter_id: { $type: 10 } }).exec(); var invite = await Invite.findOne({ channel_id: guild.widget_channel_id });
if (guild.widget_channel_id && !invite) { if (guild.widget_channel_id && !invite) {
// Create invite for channel if none exists // Create invite for channel if none exists
// TODO: Refactor invite create code to a shared function // TODO: Refactor invite create code to a shared function
@ -40,87 +41,29 @@ router.get("/", async (req: Request, res: Response) => {
inviter_id: null inviter_id: null
}; };
invite = await new InviteModel(body).save(); invite = await new Invite(body).save();
} }
// Fetch voice channels, and the @everyone permissions object // Fetch voice channels, and the @everyone permissions object
let channels: any[] = []; const channels = [] as any[];
await ChannelModel.find({ guild_id: guild_id, type: 2 }, { permission_overwrites: { $elemMatch: { id: guild_id } } })
.lean() (await Channel.find({ where: { guild_id: guild_id, type: 2 }, order: { position: "ASC" } })).filter((doc) => {
.select("id name position permission_overwrites") // Only return channels where @everyone has the CONNECT permission
.sort({ position: 1 }) if (
.cursor() doc.permission_overwrites === undefined ||
.eachAsync((doc) => { Permissions.channelPermission(doc.permission_overwrites, Permissions.FLAGS.CONNECT) === Permissions.FLAGS.CONNECT
// Only return channels where @everyone has the CONNECT permission ) {
if ( channels.push({
doc.permission_overwrites === undefined || id: doc.id,
Permissions.channelPermission(doc.permission_overwrites, Permissions.FLAGS.CONNECT) === Permissions.FLAGS.CONNECT name: doc.name,
) { position: doc.position
channels.push({ });
id: doc.id, }
name: doc.name, });
position: doc.position
});
}
});
// Fetch members // Fetch members
// TODO: Understand how Discord's max 100 random member sample works, and apply to here (see top of this file) // TODO: Understand how Discord's max 100 random member sample works, and apply to here (see top of this file)
let members: any[] = []; let members = await Member.find({ where: { guild_id: guild_id } });
await MemberModel.find({ guild_id: guild_id })
.lean()
.populate({ path: "user", select: { _id: 0, username: 1, avatar: 1, presence: 1 } })
.select("id user nick deaf mute")
.cursor()
.eachAsync((doc) => {
const status = doc.user?.presence?.status || "offline";
if (status == "offline") return;
let item = {};
item = {
...item,
id: null, // this is updated during the sort outside of the query
username: doc.nick || doc.user?.username,
discriminator: "0000", // intended (https://github.com/discord/discord-api-docs/issues/1287)
avatar: null, // intended, avatar_url below will return a unique guild + user url to the avatar
status: status
};
const activity = doc.user?.presence?.activities?.[0];
if (activity) {
item = {
...item,
game: { name: activity.name }
};
}
// TODO: If the member is in a voice channel, return extra widget details
// Extra fields returned include deaf, mute, self_deaf, self_mute, supress, and channel_id (voice channel connected to)
// Get this from VoiceState
// TODO: Implement a widget-avatar endpoint on the CDN, and implement logic here to request it
// Get unique avatar url for guild user, cdn to serve the actual avatar image on this url
/*
const avatar = doc.user?.avatar;
if (avatar) {
const CDN_HOST = Config.get().cdn.endpoint || "http://localhost:3003";
const avatar_url = "/widget-avatars/" + ;
item = {
...item,
avatar_url: avatar_url
}
}
*/
members.push(item);
});
// Sort members, and update ids (Unable to do under the mongoose query due to https://mongoosejs.com/docs/faq.html#populate_sort_order)
members = members.sort((first, second) => 0 - (first.username > second.username ? -1 : 1));
members.forEach((x, i) => {
x.id = i;
});
// Construct object to respond with // Construct object to respond with
const data = { const data = {

View File

@ -1,5 +1,5 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { GuildModel } from "@fosscord/util"; import { Guild } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import fs from "fs"; import fs from "fs";
import path from "path"; import path from "path";
@ -13,7 +13,7 @@ const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { guild_id } = req.params; const { guild_id } = req.params;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ id: guild_id });
if (!guild.widget_enabled) throw new HTTPError("Unknown Guild", 404); if (!guild.widget_enabled) throw new HTTPError("Unknown Guild", 404);
// Fetch guild information // Fetch guild information

View File

@ -1,5 +1,5 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
import { getPermission, GuildModel } from "@fosscord/util"; import { getPermission, Guild } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { WidgetModifySchema } from "../../../schema/Widget"; import { WidgetModifySchema } from "../../../schema/Widget";
@ -13,7 +13,7 @@ router.get("/", async (req: Request, res: Response) => {
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const guild = await Guild.findOneOrFail({ id: guild_id });
return res.json({ enabled: guild.widget_enabled || false, channel_id: guild.widget_channel_id || null }); return res.json({ enabled: guild.widget_enabled || false, channel_id: guild.widget_channel_id || null });
}); });
@ -26,7 +26,7 @@ router.patch("/", check(WidgetModifySchema), async (req: Request, res: Response)
const perms = await getPermission(req.user_id, guild_id); const perms = await getPermission(req.user_id, guild_id);
perms.hasThrow("MANAGE_GUILD"); perms.hasThrow("MANAGE_GUILD");
await GuildModel.updateOne({ id: guild_id }, { widget_enabled: body.enabled, widget_channel_id: body.channel_id }).exec(); await Guild.update({ id: guild_id }, { widget_enabled: body.enabled, widget_channel_id: body.channel_id });
// Widget invite for the widget_channel_id gets created as part of the /guilds/{guild.id}/widget.json request // Widget invite for the widget_channel_id gets created as part of the /guilds/{guild.id}/widget.json request
return res.json(body); return res.json(body);

View File

@ -1,11 +1,8 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { RoleModel, GuildModel, Snowflake, Guild, RoleDocument, Config } from "@fosscord/util"; import { Role, Guild, Snowflake, Config, User, Member, Channel } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { check } from "./../../util/instanceOf"; import { check } from "./../../util/instanceOf";
import { GuildCreateSchema } from "../../schema/Guild"; import { GuildCreateSchema } from "../../schema/Guild";
import { getPublicUser } from "../../util/User";
import { addMember } from "../../util/Member";
import { createChannel } from "../../util/Channel";
const router: Router = Router(); const router: Router = Router();
@ -15,58 +12,43 @@ router.post("/", check(GuildCreateSchema), async (req: Request, res: Response) =
const body = req.body as GuildCreateSchema; const body = req.body as GuildCreateSchema;
const { maxGuilds } = Config.get().limits.user; const { maxGuilds } = Config.get().limits.user;
const user = await getPublicUser(req.user_id, { guilds: true }); const guild_count = await Member.count({ id: req.user_id });
if (guild_count >= maxGuilds) {
if (user.guilds.length >= maxGuilds) {
throw new HTTPError(`Maximum number of guilds reached ${maxGuilds}`, 403); throw new HTTPError(`Maximum number of guilds reached ${maxGuilds}`, 403);
} }
const guild_id = Snowflake.generate(); const guild_id = Snowflake.generate();
const guild: Guild = {
name: body.name,
region: Config.get().regions.default,
owner_id: req.user_id,
icon: undefined,
afk_channel_id: undefined,
afk_timeout: 300,
application_id: undefined,
banner: undefined,
default_message_notifications: 0,
description: undefined,
splash: undefined,
discovery_splash: undefined,
explicit_content_filter: 0,
features: [],
id: guild_id,
large: undefined,
max_members: 250000,
max_presences: 250000,
max_video_channel_users: 25,
presence_count: 0,
member_count: 0, // will automatically be increased by addMember()
mfa_level: 0,
preferred_locale: "en-US",
premium_subscription_count: 0,
premium_tier: 0,
public_updates_channel_id: undefined,
rules_channel_id: undefined,
system_channel_flags: 0,
system_channel_id: undefined,
unavailable: false,
vanity_url_code: undefined,
verification_level: 0,
welcome_screen: {
enabled: false,
description: "No description",
welcome_channels: []
},
widget_channel_id: undefined,
widget_enabled: false
};
const [guild_doc, role] = await Promise.all([ const [guild, role] = await Promise.all([
new GuildModel(guild).save(), Guild.insert({
new RoleModel({ name: body.name,
region: Config.get().regions.default,
owner_id: req.user_id,
afk_timeout: 300,
default_message_notifications: 0,
explicit_content_filter: 0,
features: [],
id: guild_id,
max_members: 250000,
max_presences: 250000,
max_video_channel_users: 25,
presence_count: 0,
member_count: 0, // will automatically be increased by addMember()
mfa_level: 0,
preferred_locale: "en-US",
premium_subscription_count: 0,
premium_tier: 0,
system_channel_flags: 0,
unavailable: false,
verification_level: 0,
welcome_screen: {
enabled: false,
description: "No description",
welcome_channels: []
},
widget_enabled: false
}),
Role.insert({
id: guild_id, id: guild_id,
guild_id: guild_id, guild_id: guild_id,
color: 0, color: 0,
@ -74,10 +56,9 @@ router.post("/", check(GuildCreateSchema), async (req: Request, res: Response) =
managed: false, managed: false,
mentionable: false, mentionable: false,
name: "@everyone", name: "@everyone",
permissions: 2251804225n, permissions: String("2251804225"),
position: 0, position: 0
tags: null })
}).save()
]); ]);
if (!body.channels || !body.channels.length) body.channels = [{ id: "01", type: 0, name: "general" }]; if (!body.channels || !body.channels.length) body.channels = [{ id: "01", type: 0, name: "general" }];
@ -94,16 +75,21 @@ router.post("/", check(GuildCreateSchema), async (req: Request, res: Response) =
body.channels?.map((x) => { body.channels?.map((x) => {
var id = ids.get(x.id) || Snowflake.generate(); var id = ids.get(x.id) || Snowflake.generate();
// TODO: should we abort if parent_id is a category? (or not to allow sub category channels) // TODO: should we abort if parent_id is a category? (to disallow sub category channels)
var parent_id = ids.get(x.parent_id); var parent_id = ids.get(x.parent_id);
return createChannel({ ...x, guild_id, id, parent_id }, req.user_id, { keepId: true, skipExistsCheck: true }); return Channel.createChannel({ ...x, guild_id, id, parent_id }, req.user_id, {
keepId: true,
skipExistsCheck: true,
skipPermissionCheck: true,
skipEventEmit: true
});
}) })
); );
await addMember(req.user_id, guild_id); await Member.addToGuild(req.user_id, guild_id);
res.status(201).json({ id: guild.id }); res.status(201).json({ id: guild_id });
}); });
export default router; export default router;

View File

@ -1,18 +1,16 @@
import { Request, Response, Router } from "express"; import { Request, Response, Router } from "express";
const router: Router = Router(); const router: Router = Router();
import { TemplateModel, GuildModel, toObject, UserModel, RoleModel, Snowflake, Guild, Config } from "@fosscord/util"; import { Template, Guild, Role, Snowflake, Config, User, Member } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { GuildTemplateCreateSchema } from "../../../schema/Guild"; import { GuildTemplateCreateSchema } from "../../../schema/Guild";
import { getPublicUser } from "../../../util/User";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { addMember } from "../../../util/Member";
router.get("/:code", async (req: Request, res: Response) => { router.get("/:code", async (req: Request, res: Response) => {
const { code } = req.params; const { code } = req.params;
const template = await TemplateModel.findOne({ code: code }).exec(); const template = await Template.findOneOrFail({ code: code });
res.json(toObject(template)).send(); res.json(template);
}); });
router.post("/:code", check(GuildTemplateCreateSchema), async (req: Request, res: Response) => { router.post("/:code", check(GuildTemplateCreateSchema), async (req: Request, res: Response) => {
@ -20,26 +18,24 @@ router.post("/:code", check(GuildTemplateCreateSchema), async (req: Request, res
const body = req.body as GuildTemplateCreateSchema; const body = req.body as GuildTemplateCreateSchema;
const { maxGuilds } = Config.get().limits.user; const { maxGuilds } = Config.get().limits.user;
const user = await getPublicUser(req.user_id, { guilds: true });
if (user.guilds.length >= maxGuilds) { const guild_count = await Member.count({ id: req.user_id });
if (guild_count >= maxGuilds) {
throw new HTTPError(`Maximum number of guilds reached ${maxGuilds}`, 403); throw new HTTPError(`Maximum number of guilds reached ${maxGuilds}`, 403);
} }
const template = await TemplateModel.findOne({ code: code }).exec(); const template = await Template.findOneOrFail({ code: code });
const guild_id = Snowflake.generate(); const guild_id = Snowflake.generate();
const guild: Guild = { const [guild, role] = await Promise.all([
...body, new Guild({
...template.serialized_source_guild, ...body,
id: guild_id, ...template.serialized_source_guild,
owner_id: req.user_id id: guild_id,
}; owner_id: req.user_id
}).save(),
const [guild_doc, role] = await Promise.all([ new Role({
new GuildModel(guild).save(),
new RoleModel({
id: guild_id, id: guild_id,
guild_id: guild_id, guild_id: guild_id,
color: 0, color: 0,
@ -53,7 +49,7 @@ router.post("/:code", check(GuildTemplateCreateSchema), async (req: Request, res
}).save() }).save()
]); ]);
await addMember(req.user_id, guild_id, { guild: guild_doc }); await Member.addToGuild(req.user_id, guild_id);
res.status(201).json({ id: guild.id }); res.status(201).json({ id: guild.id });
}); });

View File

@ -1,48 +1,41 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { getPermission, GuildModel, InviteModel, toObject } from "@fosscord/util"; import { getPermission, Guild, Invite, Member } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { addMember } from "../../util/Member";
const router: Router = Router(); const router: Router = Router();
router.get("/:code", async (req: Request, res: Response) => { router.get("/:code", async (req: Request, res: Response) => {
const { code } = req.params; const { code } = req.params;
const invite = await InviteModel.findOne({ code }).exec(); const invite = await Invite.findOneOrFail({ code });
if (!invite) throw new HTTPError("Unknown Invite", 404);
res.status(200).send(toObject(invite)); res.status(200).send(invite);
}); });
router.post("/:code", async (req: Request, res: Response) => { router.post("/:code", async (req: Request, res: Response) => {
const { code } = req.params; const { code } = req.params;
const invite = await InviteModel.findOneAndUpdate({ code }, { $inc: { uses: 1 } }, { new: true }).exec(); const invite = await Invite.findOneOrFail({ code });
if (!invite) throw new HTTPError("Unknown Invite", 404); if (invite.uses++ >= invite.max_uses) await Invite.delete({ code });
if (invite.uses >= invite.max_uses) await InviteModel.deleteOne({ code }); else await invite.save();
await addMember(req.user_id, invite.guild_id); await Member.addToGuild(req.user_id, invite.guild_id);
res.status(200).send(toObject(invite)); res.status(200).send(invite);
}); });
router.delete("/:code", async (req: Request, res: Response) => { router.delete("/:code", async (req: Request, res: Response) => {
const { code } = req.params; const { code } = req.params;
const invite = await InviteModel.findOne({ code }).exec(); const invite = await Invite.findOneOrFail({ code });
const { guild_id, channel_id } = invite; const { guild_id, channel_id } = invite;
const guild = await GuildModel.findOne({ id: guild_id }).exec(); const permission = await getPermission(req.user_id, guild_id, channel_id);
const permission = await getPermission(req.user_id, guild_id, channel_id, { guild });
if (!permission.has("MANAGE_GUILD") && !permission.has("MANAGE_CHANNELS")) if (!permission.has("MANAGE_GUILD") && !permission.has("MANAGE_CHANNELS"))
throw new HTTPError("You missing the MANAGE_GUILD or MANAGE_CHANNELS permission", 401); throw new HTTPError("You missing the MANAGE_GUILD or MANAGE_CHANNELS permission", 401);
await InviteModel.deleteOne({ code }).exec(); await Promise.all([Invite.delete({ code }), Guild.update({ vanity_url_code: code }, { vanity_url_code: undefined })]);
await GuildModel.updateOne({ vanity_url_code: code }, { $unset: { vanity_url_code: 1 } }) res.json({ invite: invite });
.exec()
.catch((e) => {});
res.status(200).send({ invite: toObject(invite) });
}); });
export default router; export default router;

View File

@ -1,13 +1,12 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { getPublicUser } from "../../../util/User"; import { User } from "../../../../../util/dist";
import { HTTPError } from "lambert-server";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const { id } = req.params; const { id } = req.params;
res.json(await getPublicUser(id)); res.json(await User.getPublicUser(id));
}); });
export default router; export default router;

View File

@ -1,27 +1,27 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { getPublicUser } from "../../../util/User"; import { User } from "../../../../../util/dist";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const user = await getPublicUser(req.params.id, { user_data: true }) const user = await User.getPublicUser(req.params.id, { relations: ["connected_accounts"] });
res.json({ res.json({
connected_accounts: user.user_data.connected_accounts, connected_accounts: user.connected_accounts,
premium_guild_since: null, // TODO premium_guild_since: null, // TODO
premium_since: null, // TODO premium_since: null, // TODO
user: { user: {
username: user.username, username: user.username,
discriminator: user.discriminator, discriminator: user.discriminator,
id: user.id, id: user.id,
public_flags: user.public_flags, public_flags: user.public_flags,
avatar: user.avatar, avatar: user.avatar,
accent_color: user.accent_color, accent_color: user.accent_color,
banner: user.banner, banner: user.banner,
bio: req.user_bot ? null : user.bio, bio: req.user_bot ? null : user.bio,
bot: user.bot, bot: user.bot
} }
}); });
}); });
export default router; export default router;

View File

@ -1,27 +1,18 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { import { Channel, ChannelCreateEvent, ChannelType, Snowflake, trimSpecial, User, emitEvent } from "@fosscord/util";
ChannelModel,
ChannelCreateEvent,
toObject,
ChannelType,
Snowflake,
trimSpecial,
Channel,
DMChannel,
UserModel,
emitEvent
} from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { DmChannelCreateSchema } from "../../../schema/Channel"; import { DmChannelCreateSchema } from "../../../schema/Channel";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { In } from "typeorm";
import { Recipient } from "../../../../../util/dist/entities/Recipient";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
var channels = await ChannelModel.find({ recipient_ids: req.user_id }).exec(); const recipients = await Recipient.find({ where: { id: req.user_id }, relations: ["channel"] });
res.json(toObject(channels)); res.json(recipients.map((x) => x.channel));
}); });
router.post("/", check(DmChannelCreateSchema), async (req: Request, res: Response) => { router.post("/", check(DmChannelCreateSchema), async (req: Request, res: Response) => {
@ -29,26 +20,27 @@ router.post("/", check(DmChannelCreateSchema), async (req: Request, res: Respons
body.recipients = body.recipients.filter((x) => x !== req.user_id).unique(); body.recipients = body.recipients.filter((x) => x !== req.user_id).unique();
if (!(await Promise.all(body.recipients.map((x) => UserModel.exists({ id: x })))).every((x) => x)) { const recipients = await User.find({ id: In(body.recipients) });
throw new HTTPError("Recipient not found");
if (recipients.length !== body.recipients.length) {
throw new HTTPError("Recipient/s not found");
} }
const type = body.recipients.length === 1 ? ChannelType.DM : ChannelType.GROUP_DM; const type = body.recipients.length === 1 ? ChannelType.DM : ChannelType.GROUP_DM;
const name = trimSpecial(body.name); const name = trimSpecial(body.name);
const channel = await new ChannelModel({ const channel = await new Channel({
name, name,
type, type,
owner_id: req.user_id, owner_id: req.user_id,
id: Snowflake.generate(),
created_at: new Date(), created_at: new Date(),
last_message_id: null, last_message_id: null,
recipient_ids: [...body.recipients, req.user_id] recipients: [...body.recipients.map((x) => new Recipient({ id: x })), new Recipient({ id: req.user_id })]
}).save(); }).save();
await emitEvent({ event: "CHANNEL_CREATE", data: toObject(channel), user_id: req.user_id } as ChannelCreateEvent); await emitEvent({ event: "CHANNEL_CREATE", data: channel, user_id: req.user_id } as ChannelCreateEvent);
res.json(toObject(channel)); res.json(channel);
}); });
export default router; export default router;

View File

@ -1,16 +1,23 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { GuildModel, MemberModel, UserModel } from "@fosscord/util"; import { Guild, Member, User } from "@fosscord/util";
import bcrypt from "bcrypt"; import bcrypt from "bcrypt";
const router = Router(); const router = Router();
router.post("/", async (req: Request, res: Response) => { router.post("/", async (req: Request, res: Response) => {
const user = await UserModel.findOne({ id: req.user_id }).exec(); //User object const user = await User.findOneOrFail({ id: req.user_id }); //User object
let correctpass = true;
if (user.data.hash) {
// guest accounts can delete accounts without password
correctpass = await bcrypt.compare(req.body.password, user.data.hash); //Not sure if user typed right password :/
}
// TODO: decrement guild member count
let correctpass = await bcrypt.compare(req.body.password, user!.user_data.hash); //Not sure if user typed right password :/
if (correctpass) { if (correctpass) {
await Promise.all([ await Promise.all([
UserModel.deleteOne({ id: req.user_id }).exec(), //Yeetus user deletus User.delete({ id: req.user_id }), //Yeetus user deletus
MemberModel.deleteMany({ id: req.user_id }).exec() Member.delete({ id: req.user_id })
]); ]);
res.sendStatus(204); res.sendStatus(204);

View File

@ -1,15 +1,20 @@
import { UserModel } from "@fosscord/util"; import { User } from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import bcrypt from "bcrypt"; import bcrypt from "bcrypt";
const router = Router(); const router = Router();
router.post("/", async (req: Request, res: Response) => { router.post("/", async (req: Request, res: Response) => {
const user = await UserModel.findOne({ id: req.user_id }).exec(); //User object const user = await User.findOneOrFail({ id: req.user_id }); //User object
let correctpass = true;
if (user.data.hash) {
// guest accounts can delete accounts without password
correctpass = await bcrypt.compare(req.body.password, user.data.hash); //Not sure if user typed right password :/
}
let correctpass = await bcrypt.compare(req.body.password, user!.user_data.hash); //Not sure if user typed right password :/
if (correctpass) { if (correctpass) {
await UserModel.updateOne({ id: req.user_id }, { disabled: true }).exec(); await User.update({ id: req.user_id }, { disabled: true });
res.sendStatus(204); res.sendStatus(204);
} else { } else {

View File

@ -1,34 +1,26 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { GuildModel, MemberModel, UserModel, GuildDeleteEvent, GuildMemberRemoveEvent, toObject, emitEvent } from "@fosscord/util"; import { Guild, Member, User, GuildDeleteEvent, GuildMemberRemoveEvent, emitEvent } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { In } from "typeorm";
import { getPublicUser } from "../../../util/User";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const user = await UserModel.findOne({ id: req.user_id }, { guilds: true }).exec(); const members = await Member.find({ relations: ["guild"], where: { id: req.user_id } });
if (!user) throw new HTTPError("User not found", 404);
var guildIDs = user.guilds || []; res.json(members.map((x) => x.guild));
var guild = await GuildModel.find({ id: { $in: guildIDs } })
.populate({ path: "joined_at", match: { id: req.user_id } })
.exec();
res.json(toObject(guild));
}); });
// user send to leave a certain guild // user send to leave a certain guild
router.delete("/:id", async (req: Request, res: Response) => { router.delete("/:id", async (req: Request, res: Response) => {
const guild_id = req.params.id; const guild_id = req.params.id;
const guild = await GuildModel.findOne({ id: guild_id }, { guild_id: true }).exec(); const guild = await Guild.findOneOrFail({ where: { id: guild_id }, select: ["owner_id"] });
if (!guild) throw new HTTPError("Guild doesn't exist", 404); if (!guild) throw new HTTPError("Guild doesn't exist", 404);
if (guild.owner_id === req.user_id) throw new HTTPError("You can't leave your own guild", 400); if (guild.owner_id === req.user_id) throw new HTTPError("You can't leave your own guild", 400);
await Promise.all([ await Promise.all([
MemberModel.deleteOne({ id: req.user_id, guild_id: guild_id }).exec(), Member.delete({ id: req.user_id, guild_id: guild_id }),
UserModel.updateOne({ id: req.user_id }, { $pull: { guilds: guild_id } }).exec(),
emitEvent({ emitEvent({
event: "GUILD_DELETE", event: "GUILD_DELETE",
data: { data: {
@ -38,7 +30,7 @@ router.delete("/:id", async (req: Request, res: Response) => {
} as GuildDeleteEvent) } as GuildDeleteEvent)
]); ]);
const user = await getPublicUser(req.user_id); const user = await User.getPublicUser(req.user_id);
await emitEvent({ await emitEvent({
event: "GUILD_MEMBER_REMOVE", event: "GUILD_MEMBER_REMOVE",

View File

@ -1,6 +1,5 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { UserModel, toObject, PublicUserProjection } from "@fosscord/util"; import { User } from "@fosscord/util";
import { getPublicUser } from "../../../util/User";
import { UserModifySchema } from "../../../schema/User"; import { UserModifySchema } from "../../../schema/User";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { handleFile } from "../../../util/cdn"; import { handleFile } from "../../../util/cdn";
@ -8,29 +7,29 @@ import { handleFile } from "../../../util/cdn";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
res.json(await getPublicUser(req.user_id)); res.json(await User.getPublicUser(req.user_id));
}); });
const UserUpdateProjection = { const UserUpdateProjection = [
accent_color: true, "accent_color",
avatar: true, "avatar",
banner: true, "banner",
bio: true, "bio",
bot: true, "bot",
discriminator: true, "discriminator",
email: true, "email",
flags: true, "flags",
id: true, "id",
locale: true, "locale",
mfa_enabled: true, "mfa_enabled",
nsfw_alllowed: true, "nsfw_alllowed",
phone: true, "phone",
public_flags: true, "public_flags",
purchased_flags: true, "purchased_flags",
// token: true, // this isn't saved in the db and needs to be set manually // "token", // this isn't saved in the db and needs to be set manually
username: true, "username",
verified: true "verified"
}; ];
router.patch("/", check(UserModifySchema), async (req: Request, res: Response) => { router.patch("/", check(UserModifySchema), async (req: Request, res: Response) => {
const body = req.body as UserModifySchema; const body = req.body as UserModifySchema;
@ -38,10 +37,10 @@ router.patch("/", check(UserModifySchema), async (req: Request, res: Response) =
if (body.avatar) body.avatar = await handleFile(`/avatars/${req.user_id}`, body.avatar as string); if (body.avatar) body.avatar = await handleFile(`/avatars/${req.user_id}`, body.avatar as string);
if (body.banner) body.banner = await handleFile(`/banners/${req.user_id}`, body.banner as string); if (body.banner) body.banner = await handleFile(`/banners/${req.user_id}`, body.banner as string);
const user = await UserModel.findOneAndUpdate({ id: req.user_id }, body, { projection: UserUpdateProjection, new: true }).exec(); const user = await new User({ ...body, id: req.user_id }).save();
// TODO: dispatch user update event // TODO: dispatch user update event
res.json(toObject(user)); res.json(user);
}); });
export default router; export default router;

View File

@ -1,27 +1,27 @@
import { Router, Request, Response } from "express"; import { Router, Request, Response } from "express";
import { getPublicUser } from "../../../util/User"; import { User } from "../../../../../util/dist";
const router: Router = Router(); const router: Router = Router();
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const user = await getPublicUser(req.user_id, { user_data: true }) const user = await User.getPublicUser(req.user_id, { relations: ["connected_accounts"] });
res.json({ res.json({
connected_accounts: user.user_data.connected_accounts, connected_accounts: user.connected_accounts,
premium_guild_since: null, // TODO premium_guild_since: null, // TODO
premium_since: null, // TODO premium_since: null, // TODO
user: { user: {
username: user.username, username: user.username,
discriminator: user.discriminator, discriminator: user.discriminator,
id: user.id, id: user.id,
public_flags: user.public_flags, public_flags: user.public_flags,
avatar: user.avatar, avatar: user.avatar,
accent_color: user.accent_color, accent_color: user.accent_color,
banner: user.banner, banner: user.banner,
bio: user.bio, bio: user.bio,
bot: user.bot, bot: user.bot
} }
}); });
}); });
export default router; export default router;

View File

@ -1,12 +1,11 @@
import { import {
RelationshipAddEvent, RelationshipAddEvent,
UserModel, User,
PublicUserProjection, PublicUserProjection,
toObject,
RelationshipType, RelationshipType,
RelationshipRemoveEvent, RelationshipRemoveEvent,
UserDocument, emitEvent,
emitEvent Relationship
} from "@fosscord/util"; } from "@fosscord/util";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
@ -15,40 +14,36 @@ import { check, Length } from "../../../util/instanceOf";
const router = Router(); const router = Router();
const userProjection = { "user_data.relationships": true, ...PublicUserProjection }; const userProjection: (keyof User)[] = ["relationships", ...PublicUserProjection];
router.get("/", async (req: Request, res: Response) => { router.get("/", async (req: Request, res: Response) => {
const user = await UserModel.findOne({ id: req.user_id }, { user_data: { relationships: true } }) const user = await User.findOneOrFail({ where: { id: req.user_id }, select: ["relationships"] });
.populate({ path: "user_data.relationships.id", model: UserModel })
.exec();
return res.json(toObject(user.user_data.relationships)); return res.json(user.relationships);
}); });
async function addRelationship(req: Request, res: Response, friend: UserDocument, type: RelationshipType) { async function updateRelationship(req: Request, res: Response, friend: User, type: RelationshipType) {
const id = friend.id; const id = friend.id;
if (id === req.user_id) throw new HTTPError("You can't add yourself as a friend"); if (id === req.user_id) throw new HTTPError("You can't add yourself as a friend");
const user = await UserModel.findOne({ id: req.user_id }, userProjection).exec(); const user = await User.findOneOrFail({ id: req.user_id }, { relations: ["relationships"], select: userProjection });
const newUserRelationships = [...user.user_data.relationships];
const newFriendRelationships = [...friend.user_data.relationships];
var relationship = newUserRelationships.find((x) => x.id === id); var relationship = user.relationships.find((x) => x.id === id);
const friendRequest = newFriendRelationships.find((x) => x.id === req.user_id); const friendRequest = friend.relationships.find((x) => x.id === req.user_id);
if (type === RelationshipType.blocked) { if (type === RelationshipType.blocked) {
if (relationship) { if (relationship) {
if (relationship.type === RelationshipType.blocked) throw new HTTPError("You already blocked the user"); if (relationship.type === RelationshipType.blocked) throw new HTTPError("You already blocked the user");
relationship.type = RelationshipType.blocked; relationship.type = RelationshipType.blocked;
} else { } else {
relationship = { id, type: RelationshipType.blocked }; relationship = new Relationship({ id, type: RelationshipType.blocked });
newUserRelationships.push(relationship); user.relationships.push(relationship);
} }
if (friendRequest && friendRequest.type !== RelationshipType.blocked) { if (friendRequest && friendRequest.type !== RelationshipType.blocked) {
newFriendRelationships.remove(friendRequest); friend.relationships.remove(friendRequest);
await Promise.all([ await Promise.all([
UserModel.updateOne({ id: friend.id }, { "user_data.relationships": newFriendRelationships }).exec(), user.save(),
emitEvent({ emitEvent({
event: "RELATIONSHIP_REMOVE", event: "RELATIONSHIP_REMOVE",
data: friendRequest, data: friendRequest,
@ -58,12 +53,12 @@ async function addRelationship(req: Request, res: Response, friend: UserDocument
} }
await Promise.all([ await Promise.all([
UserModel.updateOne({ id: req.user_id }, { "user_data.relationships": newUserRelationships }).exec(), user.save(),
emitEvent({ emitEvent({
event: "RELATIONSHIP_ADD", event: "RELATIONSHIP_ADD",
data: { data: {
...toObject(relationship), ...relationship,
user: { ...toObject(friend), user_data: undefined } user: { ...friend }
}, },
user_id: req.user_id user_id: req.user_id
} as RelationshipAddEvent) } as RelationshipAddEvent)
@ -72,41 +67,40 @@ async function addRelationship(req: Request, res: Response, friend: UserDocument
return res.sendStatus(204); return res.sendStatus(204);
} }
var incoming_relationship = { id: req.user_id, nickname: undefined, type: RelationshipType.incoming }; var incoming_relationship = new Relationship({ nickname: undefined, type: RelationshipType.incoming, id: req.user_id });
var outgoing_relationship = { id, nickname: undefined, type: RelationshipType.outgoing }; var outgoing_relationship = new Relationship({ nickname: undefined, type: RelationshipType.outgoing, id });
if (friendRequest) { if (friendRequest) {
if (friendRequest.type === RelationshipType.blocked) throw new HTTPError("The user blocked you"); if (friendRequest.type === RelationshipType.blocked) throw new HTTPError("The user blocked you");
// accept friend request // accept friend request
// @ts-ignore
incoming_relationship = friendRequest; incoming_relationship = friendRequest;
incoming_relationship.type = RelationshipType.friends; incoming_relationship.type = RelationshipType.friends;
outgoing_relationship.type = RelationshipType.friends; outgoing_relationship.type = RelationshipType.friends;
} else newFriendRelationships.push(incoming_relationship); } else friend.relationships.push(incoming_relationship);
if (relationship) { if (relationship) {
if (relationship.type === RelationshipType.outgoing) throw new HTTPError("You already sent a friend request"); if (relationship.type === RelationshipType.outgoing) throw new HTTPError("You already sent a friend request");
if (relationship.type === RelationshipType.blocked) throw new HTTPError("Unblock the user before sending a friend request"); if (relationship.type === RelationshipType.blocked) throw new HTTPError("Unblock the user before sending a friend request");
if (relationship.type === RelationshipType.friends) throw new HTTPError("You are already friends with the user"); if (relationship.type === RelationshipType.friends) throw new HTTPError("You are already friends with the user");
} else newUserRelationships.push(outgoing_relationship); } else user.relationships.push(outgoing_relationship);
await Promise.all([ await Promise.all([
UserModel.updateOne({ id: req.user_id }, { "user_data.relationships": newUserRelationships }).exec(), user.save(),
UserModel.updateOne({ id: friend.id }, { "user_data.relationships": newFriendRelationships }).exec(), friend.save(),
emitEvent({ emitEvent({
event: "RELATIONSHIP_ADD", event: "RELATIONSHIP_ADD",
data: { data: {
...outgoing_relationship, ...outgoing_relationship,
user: { ...toObject(friend), user_data: undefined } user: { ...friend }
}, },
user_id: req.user_id user_id: req.user_id
} as RelationshipAddEvent), } as RelationshipAddEvent),
emitEvent({ emitEvent({
event: "RELATIONSHIP_ADD", event: "RELATIONSHIP_ADD",
data: { data: {
...toObject(incoming_relationship), ...incoming_relationship,
should_notify: true, should_notify: true,
user: { ...toObject(user), user_data: undefined } user: { ...user }
}, },
user_id: id user_id: id
} as RelationshipAddEvent) } as RelationshipAddEvent)
@ -116,14 +110,23 @@ async function addRelationship(req: Request, res: Response, friend: UserDocument
} }
router.put("/:id", check({ $type: new Length(Number, 1, 4) }), async (req: Request, res: Response) => { router.put("/:id", check({ $type: new Length(Number, 1, 4) }), async (req: Request, res: Response) => {
return await addRelationship(req, res, await UserModel.findOne({ id: req.params.id }), req.body.type); return await updateRelationship(
req,
res,
await User.findOneOrFail({ id: req.params.id }, { relations: ["relationships"], select: userProjection }),
req.body.type
);
}); });
router.post("/", check({ discriminator: String, username: String }), async (req: Request, res: Response) => { router.post("/", check({ discriminator: String, username: String }), async (req: Request, res: Response) => {
return await addRelationship( return await updateRelationship(
req, req,
res, res,
await UserModel.findOne(req.body as { discriminator: string; username: string }).exec(), await User.findOneOrFail({
relations: ["relationships"],
select: userProjection,
where: req.body as { discriminator: string; username: string }
}),
req.body.type req.body.type
); );
}); });
@ -132,17 +135,15 @@ router.delete("/:id", async (req: Request, res: Response) => {
const { id } = req.params; const { id } = req.params;
if (id === req.user_id) throw new HTTPError("You can't remove yourself as a friend"); if (id === req.user_id) throw new HTTPError("You can't remove yourself as a friend");
const user = await UserModel.findOne({ id: req.user_id }).exec(); const user = await User.findOneOrFail({ id: req.user_id }, { select: userProjection, relations: ["relationships"] });
if (!user) throw new HTTPError("Invalid token", 400); const friend = await User.findOneOrFail({ id: id }, { select: userProjection, relations: ["relationships"] });
const friend = await UserModel.findOne({ id }, userProjection).exec(); const relationship = user.relationships.find((x) => x.id === id);
if (!friend) throw new HTTPError("User not found", 404); const friendRequest = friend.relationships.find((x) => x.id === req.user_id);
const relationship = user.user_data.relationships.find((x) => x.id === id);
const friendRequest = friend.user_data.relationships.find((x) => x.id === req.user_id);
if (relationship?.type === RelationshipType.blocked) { if (relationship?.type === RelationshipType.blocked) {
// unblock user // unblock user
user.user_data.relationships.remove(relationship); user.relationships.remove(relationship);
await Promise.all([ await Promise.all([
user.save(), user.save(),
@ -153,8 +154,8 @@ router.delete("/:id", async (req: Request, res: Response) => {
if (!relationship || !friendRequest) throw new HTTPError("You are not friends with the user", 404); if (!relationship || !friendRequest) throw new HTTPError("You are not friends with the user", 404);
if (friendRequest.type === RelationshipType.blocked) throw new HTTPError("The user blocked you"); if (friendRequest.type === RelationshipType.blocked) throw new HTTPError("The user blocked you");
user.user_data.relationships.remove(relationship); user.relationships.remove(relationship);
friend.user_data.relationships.remove(friendRequest); friend.relationships.remove(friendRequest);
await Promise.all([ await Promise.all([
user.save(), user.save(),

View File

@ -1,5 +1,5 @@
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import { UserModel, UserSettings } from "@fosscord/util"; import { User, UserSettings } from "@fosscord/util";
import { check } from "../../../util/instanceOf"; import { check } from "../../../util/instanceOf";
import { UserSettingsSchema } from "../../../schema/User"; import { UserSettingsSchema } from "../../../schema/User";
@ -8,7 +8,8 @@ const router = Router();
router.patch("/", check(UserSettingsSchema), async (req: Request, res: Response) => { router.patch("/", check(UserSettingsSchema), async (req: Request, res: Response) => {
const body = req.body as UserSettings; const body = req.body as UserSettings;
await UserModel.updateOne({ id: req.user_id }, body).exec(); // only users can update user settings
await User.update({ id: req.user_id, bot: false }, { settings: body });
res.sendStatus(204); res.sendStatus(204);
}); });

View File

@ -0,0 +1,11 @@
import { Router, Request, Response } from "express";
import {getIpAdress} from "../../util/ipAddress";
import {getVoiceRegions} from "../../util/Voice";
const router: Router = Router();
router.get("/", async (req: Request, res: Response) => {
res.json(await getVoiceRegions(getIpAdress(req), true))//vip true?
});
export default router;

View File

@ -1,4 +1,4 @@
import { ChannelSchema, GuildChannel } from "@fosscord/util"; import { Channel } from "@fosscord/util";
import { Length } from "../util/instanceOf"; import { Length } from "../util/instanceOf";
import { ChannelModifySchema } from "./Channel"; import { ChannelModifySchema } from "./Channel";
@ -33,7 +33,7 @@ export const GuildUpdateSchema = {
$icon: String, $icon: String,
$verification_level: Number, $verification_level: Number,
$default_message_notifications: Number, $default_message_notifications: Number,
$system_channel_flags: Number, $system_channel_flags: String,
$system_channel_id: String, $system_channel_id: String,
$explicit_content_filter: Number, $explicit_content_filter: Number,
$public_updates_channel_id: String, $public_updates_channel_id: String,
@ -59,54 +59,6 @@ export interface GuildUpdateSchema extends Omit<GuildCreateSchema, "channels"> {
preferred_locale?: string; preferred_locale?: string;
} }
export const GuildGetSchema = {
id: true,
name: true,
icon: true,
splash: true,
discovery_splash: true,
owner: true,
owner_id: true,
permissions: true,
region: true,
afk_channel_id: true,
afk_timeout: true,
widget_enabled: true,
widget_channel_id: true,
verification_level: true,
default_message_notifications: true,
explicit_content_filter: true,
roles: true,
emojis: true,
features: true,
mfa_level: true,
application_id: true,
system_channel_id: true,
system_channel_flags: true,
rules_channel_id: true,
joined_at: true,
// large: true,
// unavailable: true,
member_count: true,
// voice_states: true,
// members: true,
// channels: true,
// presences: true,
max_presences: true,
max_members: true,
vanity_url_code: true,
description: true,
banner: true,
premium_tier: true,
premium_subscription_count: true,
preferred_locale: true,
public_updates_channel_id: true,
max_video_channel_users: true,
approximate_member_count: true,
approximate_presence_count: true
// welcome_screen: true,
};
export const GuildTemplateCreateSchema = { export const GuildTemplateCreateSchema = {
name: String, name: String,
$avatar: String $avatar: String
@ -117,16 +69,26 @@ export interface GuildTemplateCreateSchema {
avatar?: string; avatar?: string;
} }
export const GuildAddChannelToWelcomeScreenSchema = { export const GuildUpdateWelcomeScreenSchema = {
channel_id: String, $welcome_channels: [
description: String, {
$emoji_id: String, channel_id: String,
emoji_name: String description: String,
$emoji_id: String,
emoji_name: String
}
],
$enabled: Boolean,
$description: new Length(String, 0, 140)
}; };
export interface GuildAddChannelToWelcomeScreenSchema { export interface GuildUpdateWelcomeScreenSchema {
channel_id: string; welcome_channels?: {
description: string; channel_id: string;
emoji_id?: string; description: string;
emoji_name: string; emoji_id?: string;
emoji_name: string;
}[];
enabled?: boolean;
description?: string;
} }

View File

@ -1,11 +1,17 @@
import { Embed, EmbedImage } from "@fosscord/util"; import { Embed } from "@fosscord/util";
import { Length } from "../util/instanceOf"; import { Length } from "../util/instanceOf";
export const EmbedImage = {
$url: String,
$width: Number,
$height: Number
};
export const MessageCreateSchema = { export const MessageCreateSchema = {
$content: new Length(String, 0, 2000), $content: new Length(String, 0, 2000),
$nonce: String, $nonce: String,
$tts: Boolean, $tts: Boolean,
$flags: BigInt, $flags: String,
$embed: { $embed: {
$title: new Length(String, 0, 256), //title of embed $title: new Length(String, 0, 256), //title of embed
$type: String, // type of embed (always "rich" for webhook embeds) $type: String, // type of embed (always "rich" for webhook embeds)
@ -63,7 +69,7 @@ export interface MessageCreateSchema {
content?: string; content?: string;
nonce?: string; nonce?: string;
tts?: boolean; tts?: boolean;
flags?: bigint; flags?: string;
embed?: Embed & { timestamp?: string }; embed?: Embed & { timestamp?: string };
allowed_mentions?: { allowed_mentions?: {
parse?: string[]; parse?: string[];
@ -75,7 +81,7 @@ export interface MessageCreateSchema {
message_id: string; message_id: string;
channel_id: string; channel_id: string;
guild_id?: string; guild_id?: string;
fail_if_not_exists: boolean; fail_if_not_exists?: boolean;
}; };
payload_json?: string; payload_json?: string;
file?: any; file?: any;

View File

@ -9,7 +9,7 @@ export const RoleModifySchema = {
export interface RoleModifySchema { export interface RoleModifySchema {
name?: string; name?: string;
permissions?: BigInt; permissions?: bigint;
color?: number; color?: number;
hoist?: boolean; // whether the role should be displayed separately in the sidebar hoist?: boolean; // whether the role should be displayed separately in the sidebar
mentionable?: boolean; // whether the role should be mentionable mentionable?: boolean; // whether the role should be mentionable

View File

@ -1,40 +0,0 @@
import mongoose, { Schema, Types } from "mongoose";
require("mongoose-long")(mongoose);
const userSchema = new Schema({
id: String,
});
const messageSchema = new Schema({
id: String,
content: String,
});
const message = mongoose.model("message", messageSchema, "messages");
const user = mongoose.model("user", userSchema, "users");
messageSchema.virtual("u", {
ref: user,
localField: "id",
foreignField: "id",
justOne: true,
});
messageSchema.set("toObject", { virtuals: true });
messageSchema.set("toJSON", { virtuals: true });
async function main() {
const conn = await mongoose.connect("mongodb://localhost:27017/lambert?readPreference=secondaryPreferred", {
useNewUrlParser: true,
useUnifiedTopology: false,
});
console.log("connected");
// const u = await new user({ name: "test" }).save();
// await new message({ user: u._id, content: "test" }).save();
const test = await message.findOne({}).populate("u").exec();
// @ts-ignore
console.log(test?.toJSON());
}
main();

View File

@ -1,39 +0,0 @@
// @ts-nocheck
import "missing-native-js-functions";
import { config } from "dotenv";
config();
import { DiscordServer } from "../Server";
import fetch from "node-fetch";
import { promises } from "fs";
const count = 100;
async function main() {
const server = new DiscordServer({ port: 3000 });
await server.start();
const tasks = [];
for (let i = 0; i < count; i++) {
tasks.push(test());
}
await Promise.all(tasks);
console.log("logging in 5secs");
setTimeout(async () => {
await test();
process.exit();
}, 5000);
}
main();
async function test() {
const res = await fetch("http://localhost:3000/api/v8/guilds/813524615463698433/members/813524464300982272", {
headers: {
authorization:
"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjgxMzUyNDQ2NDMwMDk4MjI3MiIsImlhdCI6MTYxNDAyOTc0Nn0.6WQiU4D5HHRi3sliHOQe1hsW-hZTEttvdtZuNIdviNI",
},
});
return await res.text();
}

View File

@ -1,3 +0,0 @@
import { Snowflake } from "@fosscord/util";
console.log(Snowflake.deconstruct("0"));

23
api/src/util/ApiError.ts Normal file
View File

@ -0,0 +1,23 @@
export class ApiError extends Error {
constructor(readonly message: string, public readonly code: number, public readonly httpStatus: number = 400, public readonly defaultParams?: string[]) {
super(message);
}
withDefaultParams(): ApiError {
if(this.defaultParams)
return new ApiError(applyParamsToString(this.message, this.defaultParams), this.code, this.httpStatus)
return this
}
withParams(...params: string[]): ApiError {
return new ApiError(applyParamsToString(this.message, params), this.code, this.httpStatus)
}
}
export function applyParamsToString(s: string, params: string[]): string {
let newString = s
params.forEach(a => {
newString = newString.replace("{}", a)
})
return newString
}

View File

@ -1,63 +0,0 @@
import {
ChannelCreateEvent,
ChannelModel,
ChannelType,
emitEvent,
getPermission,
GuildModel,
Snowflake,
TextChannel,
toObject,
VoiceChannel
} from "@fosscord/util";
import { HTTPError } from "lambert-server";
// TODO: DM channel
export async function createChannel(
channel: Partial<TextChannel | VoiceChannel>,
user_id: string = "0",
opts?: {
keepId?: boolean;
skipExistsCheck?: boolean;
}
) {
// Always check if user has permission first
const permissions = await getPermission(user_id, channel.guild_id);
permissions.hasThrow("MANAGE_CHANNELS");
switch (channel.type) {
case ChannelType.GUILD_TEXT:
case ChannelType.GUILD_VOICE:
if (channel.parent_id && !opts?.skipExistsCheck) {
const exists = await ChannelModel.findOne({ id: channel.parent_id }, { guild_id: true }).exec();
if (!exists) throw new HTTPError("Parent id channel doesn't exist", 400);
if (exists.guild_id !== channel.guild_id) throw new HTTPError("The category channel needs to be in the guild");
}
break;
case ChannelType.GUILD_CATEGORY:
break;
case ChannelType.DM:
case ChannelType.GROUP_DM:
throw new HTTPError("You can't create a dm channel in a guild");
// TODO: check if guild is community server
case ChannelType.GUILD_STORE:
case ChannelType.GUILD_NEWS:
default:
throw new HTTPError("Not yet supported");
}
if (!channel.permission_overwrites) channel.permission_overwrites = [];
// TODO: auto generate position
channel = await new ChannelModel({
...channel,
...(!opts?.keepId && { id: Snowflake.generate() }),
created_at: new Date(),
// @ts-ignore
recipient_ids: null
}).save();
await emitEvent({ event: "CHANNEL_CREATE", data: toObject(channel), guild_id: channel.guild_id } as ChannelCreateEvent);
return channel;
}

View File

@ -1,3 +1,5 @@
import {ApiError} from "./ApiError";
export const WSCodes = { export const WSCodes = {
1000: "WS_CLOSE_REQUESTED", 1000: "WS_CLOSE_REQUESTED",
4004: "TOKEN_INVALID", 4004: "TOKEN_INVALID",
@ -421,6 +423,7 @@ export const VerificationLevels = ["NONE", "LOW", "MEDIUM", "HIGH", "VERY_HIGH"]
/** /**
* An error encountered while performing an API request. Here are the potential errors: * An error encountered while performing an API request. Here are the potential errors:
* * GENERAL_ERROR
* * UNKNOWN_ACCOUNT * * UNKNOWN_ACCOUNT
* * UNKNOWN_APPLICATION * * UNKNOWN_APPLICATION
* * UNKNOWN_CHANNEL * * UNKNOWN_CHANNEL
@ -436,27 +439,70 @@ export const VerificationLevels = ["NONE", "LOW", "MEDIUM", "HIGH", "VERY_HIGH"]
* * UNKNOWN_USER * * UNKNOWN_USER
* * UNKNOWN_EMOJI * * UNKNOWN_EMOJI
* * UNKNOWN_WEBHOOK * * UNKNOWN_WEBHOOK
* * UNKNOWN_WEBHOOK_SERVICE
* * UNKNOWN_SESSION
* * UNKNOWN_BAN * * UNKNOWN_BAN
* * UNKNOWN_SKU
* * UNKNOWN_STORE_LISTING
* * UNKNOWN_ENTITLEMENT
* * UNKNOWN_BUILD
* * UNKNOWN_LOBBY
* * UNKNOWN_BRANCH
* * UNKNOWN_STORE_DIRECTORY_LAYOUT
* * UNKNOWN_REDISTRIBUTABLE
* * UNKNOWN_GIFT_CODE
* * UNKNOWN_STREAM
* * UNKNOWN_PREMIUM_SERVER_SUBSCRIBE_COOLDOWN
* * UNKNOWN_GUILD_TEMPLATE * * UNKNOWN_GUILD_TEMPLATE
* * UNKNOWN_DISCOVERABLE_SERVER_CATEGORY
* * UNKNOWN_STICKER
* * UNKNOWN_INTERACTION
* * UNKNOWN_APPLICATION_COMMAND
* * UNKNOWN_APPLICATION_COMMAND_PERMISSIONS
* * UNKNOWN_STAGE_INSTANCE
* * UNKNOWN_GUILD_MEMBER_VERIFICATION_FORM
* * UNKNOWN_GUILD_WELCOME_SCREEN
* * UNKNOWN_GUILD_SCHEDULED_EVENT
* * UNKNOWN_GUILD_SCHEDULED_EVENT_USER
* * BOT_PROHIBITED_ENDPOINT * * BOT_PROHIBITED_ENDPOINT
* * BOT_ONLY_ENDPOINT * * BOT_ONLY_ENDPOINT
* * CHANNEL_HIT_WRITE_RATELIMIT * * EXPLICIT_CONTENT_CANNOT_BE_SENT_TO_RECIPIENT
* * ACTION_NOT_AUTHORIZED_ON_APPLICATION
* * SLOWMODE_RATE_LIMIT
* * ONLY_OWNER
* * ANNOUNCEMENT_RATE_LIMITS
* * CHANNEL_WRITE_RATELIMIT
* * WORDS_NOT_ALLOWED
* * GUILD_PREMIUM_LEVEL_TOO_LOW
* * MAXIMUM_GUILDS * * MAXIMUM_GUILDS
* * MAXIMUM_FRIENDS * * MAXIMUM_FRIENDS
* * MAXIMUM_PINS * * MAXIMUM_PINS
* * MAXIMUM_NUMBER_OF_RECIPIENTS_REACHED
* * MAXIMUM_ROLES * * MAXIMUM_ROLES
* * MAXIMUM_WEBHOOKS * * MAXIMUM_WEBHOOKS
* * MAXIMUM_NUMBER_OF_EMOJIS_REACHED
* * MAXIMUM_REACTIONS * * MAXIMUM_REACTIONS
* * MAXIMUM_CHANNELS * * MAXIMUM_CHANNELS
* * MAXIMUM_ATTACHMENTS * * MAXIMUM_ATTACHMENTS
* * MAXIMUM_INVITES * * MAXIMUM_INVITES
* * MAXIMUM_ANIMATED_EMOJIS
* * MAXIMUM_SERVER_MEMBERS
* * MAXIMUM_SERVER_CATEGORIES
* * GUILD_ALREADY_HAS_TEMPLATE * * GUILD_ALREADY_HAS_TEMPLATE
* * MAXIMUM_THREAD_PARTICIPANTS
* * MAXIMUM_BANS_FOR_NON_GUILD_MEMBERS
* * MAXIMUM_BANS_FETCHES
* * MAXIMUM_STICKERS
* * MAXIMUM_PRUNE_REQUESTS
* * UNAUTHORIZED * * UNAUTHORIZED
* * ACCOUNT_VERIFICATION_REQUIRED * * ACCOUNT_VERIFICATION_REQUIRED
* * OPENING_DIRECT_MESSAGES_TOO_FAST
* * REQUEST_ENTITY_TOO_LARGE * * REQUEST_ENTITY_TOO_LARGE
* * FEATURE_TEMPORARILY_DISABLED * * FEATURE_TEMPORARILY_DISABLED
* * USER_BANNED * * USER_BANNED
* * TARGET_USER_IS_NOT_CONNECTED_TO_VOICE
* * ALREADY_CROSSPOSTED * * ALREADY_CROSSPOSTED
* * APPLICATION_COMMAND_ALREADY_EXISTS
* * MISSING_ACCESS * * MISSING_ACCESS
* * INVALID_ACCOUNT_TYPE * * INVALID_ACCOUNT_TYPE
* * CANNOT_EXECUTE_ON_DM * * CANNOT_EXECUTE_ON_DM
@ -476,81 +522,196 @@ export const VerificationLevels = ["NONE", "LOW", "MEDIUM", "HIGH", "VERY_HIGH"]
* * CANNOT_PIN_MESSAGE_IN_OTHER_CHANNEL * * CANNOT_PIN_MESSAGE_IN_OTHER_CHANNEL
* * INVALID_OR_TAKEN_INVITE_CODE * * INVALID_OR_TAKEN_INVITE_CODE
* * CANNOT_EXECUTE_ON_SYSTEM_MESSAGE * * CANNOT_EXECUTE_ON_SYSTEM_MESSAGE
* * CANNOT_EXECUTE_ON_THIS_CHANNEL_TYPE
* * INVALID_OAUTH_TOKEN * * INVALID_OAUTH_TOKEN
* * MISSING_REQUIRED_OAUTH2_SCOPE
* * INVALID_WEBHOOK_TOKEN_PROVIDED
* * INVALID_ROLE
* * INVALID_RECIPIENT
* * BULK_DELETE_MESSAGE_TOO_OLD * * BULK_DELETE_MESSAGE_TOO_OLD
* * INVALID_FORM_BODY * * INVALID_FORM_BODY
* * INVITE_ACCEPTED_TO_GUILD_NOT_CONTAINING_BOT * * INVITE_ACCEPTED_TO_GUILD_NOT_CONTAINING_BOT
* * INVALID_API_VERSION * * INVALID_API_VERSION
* * FILE_EXCEEDS_MAXIMUM_SIZE
* * INVALID_FILE_UPLOADED
* * CANNOT_SELF_REDEEM_GIFT
* * PAYMENT_SOURCE_REQUIRED
* * CANNOT_DELETE_COMMUNITY_REQUIRED_CHANNEL * * CANNOT_DELETE_COMMUNITY_REQUIRED_CHANNEL
* * INVALID_STICKER_SENT
* * CANNOT_EDIT_ARCHIVED_THREAD
* * INVALID_THREAD_NOTIFICATION_SETTINGS
* * BEFORE_EARLIER_THAN_THREAD_CREATION_DATE
* * SERVER_NOT_AVAILABLE_IN_YOUR_LOCATION
* * SERVER_NEEDS_MONETIZATION_ENABLED
* * TWO_FACTOR_REQUIRED
* * NO_USERS_WITH_DISCORDTAG_EXIST
* * REACTION_BLOCKED * * REACTION_BLOCKED
* * RESOURCE_OVERLOADED * * RESOURCE_OVERLOADED
* * STAGE_ALREADY_OPEN
* * THREAD_ALREADY_CREATED_FOR_THIS_MESSAGE
* * THREAD_IS_LOCKED
* * MAXIMUM_NUMBER_OF_ACTIVE_THREADS
* * MAXIMUM_NUMBER_OF_ACTIVE_ANNOUNCEMENT_THREADS
* * INVALID_JSON_FOR_UPLOADED_LOTTIE_FILE
* * LOTTIES_CANNOT_CONTAIN_RASTERIZED_IMAGES
* * STICKER_MAXIMUM_FRAMERATE
* * STICKER_MAXIMUM_FRAME_COUNT
* * LOTTIE_ANIMATION_MAXIMUM_DIMENSIONS
* * STICKER_FRAME_RATE_TOO_SMALL_OR_TOO_LARGE
* * STICKER_ANIMATION_DURATION_MAXIMUM
* * UNKNOWN_VOICE_STATE
* @typedef {string} APIError * @typedef {string} APIError
*/ */
export const APIErrors = { export const DiscordApiErrors = {
UNKNOWN_ACCOUNT: 10001, //https://discord.com/developers/docs/topics/opcodes-and-status-codes#json-json-error-codes
UNKNOWN_APPLICATION: 10002, GENERAL_ERROR: new ApiError("General error (such as a malformed request body, amongst other things)", 0),
UNKNOWN_CHANNEL: 10003, UNKNOWN_ACCOUNT: new ApiError("Unknown account", 10001),
UNKNOWN_GUILD: 10004, UNKNOWN_APPLICATION: new ApiError("Unknown application", 10002),
UNKNOWN_INTEGRATION: 10005, UNKNOWN_CHANNEL: new ApiError("Unknown channel", 10003),
UNKNOWN_INVITE: 10006, UNKNOWN_GUILD: new ApiError("Unknown guild", 10004),
UNKNOWN_MEMBER: 10007, UNKNOWN_INTEGRATION: new ApiError("Unknown integration", 10005),
UNKNOWN_MESSAGE: 10008, UNKNOWN_INVITE: new ApiError("Unknown invite", 10006),
UNKNOWN_OVERWRITE: 10009, UNKNOWN_MEMBER: new ApiError("Unknown member", 10007),
UNKNOWN_PROVIDER: 10010, UNKNOWN_MESSAGE: new ApiError("Unknown message", 10008),
UNKNOWN_ROLE: 10011, UNKNOWN_OVERWRITE: new ApiError("Unknown permission overwrite", 10009),
UNKNOWN_TOKEN: 10012, UNKNOWN_PROVIDER: new ApiError("Unknown provider", 10010),
UNKNOWN_USER: 10013, UNKNOWN_ROLE: new ApiError("Unknown role", 10011),
UNKNOWN_EMOJI: 10014, UNKNOWN_TOKEN: new ApiError("Unknown token", 10012),
UNKNOWN_WEBHOOK: 10015, UNKNOWN_USER: new ApiError("Unknown user", 10013),
UNKNOWN_BAN: 10026, UNKNOWN_EMOJI: new ApiError("Unknown emoji", 10014),
UNKNOWN_GUILD_TEMPLATE: 10057, UNKNOWN_WEBHOOK: new ApiError("Unknown webhook", 10015),
BOT_PROHIBITED_ENDPOINT: 20001, UNKNOWN_WEBHOOK_SERVICE: new ApiError("Unknown webhook service", 10016),
BOT_ONLY_ENDPOINT: 20002, UNKNOWN_SESSION: new ApiError("Unknown session", 10020),
CHANNEL_HIT_WRITE_RATELIMIT: 20028, UNKNOWN_BAN: new ApiError("Unknown ban", 10026),
MAXIMUM_GUILDS: 30001, UNKNOWN_SKU: new ApiError("Unknown SKU", 10027),
MAXIMUM_FRIENDS: 30002, UNKNOWN_STORE_LISTING: new ApiError("Unknown Store Listing", 10028),
MAXIMUM_PINS: 30003, UNKNOWN_ENTITLEMENT: new ApiError("Unknown entitlement", 10029),
MAXIMUM_ROLES: 30005, UNKNOWN_BUILD: new ApiError("Unknown build", 10030),
MAXIMUM_WEBHOOKS: 30007, UNKNOWN_LOBBY: new ApiError("Unknown lobby", 10031),
MAXIMUM_REACTIONS: 30010, UNKNOWN_BRANCH: new ApiError("Unknown branch", 10032),
MAXIMUM_CHANNELS: 30013, UNKNOWN_STORE_DIRECTORY_LAYOUT: new ApiError("Unknown store directory layout", 10033),
MAXIMUM_ATTACHMENTS: 30015, UNKNOWN_REDISTRIBUTABLE: new ApiError("Unknown redistributable", 10036),
MAXIMUM_INVITES: 30016, UNKNOWN_GIFT_CODE: new ApiError("Unknown gift code", 10038),
GUILD_ALREADY_HAS_TEMPLATE: 30031, UNKNOWN_STREAM: new ApiError("Unknown stream", 10049),
UNAUTHORIZED: 40001, UNKNOWN_PREMIUM_SERVER_SUBSCRIBE_COOLDOWN: new ApiError("Unknown premium server subscribe cooldown", 10050),
ACCOUNT_VERIFICATION_REQUIRED: 40002, UNKNOWN_GUILD_TEMPLATE: new ApiError("Unknown guild template", 10057),
REQUEST_ENTITY_TOO_LARGE: 40005, UNKNOWN_DISCOVERABLE_SERVER_CATEGORY: new ApiError("Unknown discoverable server category", 10059),
FEATURE_TEMPORARILY_DISABLED: 40006, UNKNOWN_STICKER: new ApiError("Unknown sticker", 10060),
USER_BANNED: 40007, UNKNOWN_INTERACTION: new ApiError("Unknown interaction", 10062),
ALREADY_CROSSPOSTED: 40033, UNKNOWN_APPLICATION_COMMAND: new ApiError("Unknown application command", 10063),
MISSING_ACCESS: 50001, UNKNOWN_APPLICATION_COMMAND_PERMISSIONS: new ApiError("Unknown application command permissions", 10066),
INVALID_ACCOUNT_TYPE: 50002, UNKNOWN_STAGE_INSTANCE: new ApiError("Unknown Stage Instance", 10067),
CANNOT_EXECUTE_ON_DM: 50003, UNKNOWN_GUILD_MEMBER_VERIFICATION_FORM: new ApiError("Unknown Guild Member Verification Form", 10068),
EMBED_DISABLED: 50004, UNKNOWN_GUILD_WELCOME_SCREEN: new ApiError("Unknown Guild Welcome Screen", 10069),
CANNOT_EDIT_MESSAGE_BY_OTHER: 50005, UNKNOWN_GUILD_SCHEDULED_EVENT: new ApiError("Unknown Guild Scheduled Event", 10070),
CANNOT_SEND_EMPTY_MESSAGE: 50006, UNKNOWN_GUILD_SCHEDULED_EVENT_USER: new ApiError("Unknown Guild Scheduled Event User", 10071),
CANNOT_MESSAGE_USER: 50007, BOT_PROHIBITED_ENDPOINT: new ApiError("Bots cannot use this endpoint", 20001),
CANNOT_SEND_MESSAGES_IN_VOICE_CHANNEL: 50008, BOT_ONLY_ENDPOINT: new ApiError("Only bots can use this endpoint", 20002),
CHANNEL_VERIFICATION_LEVEL_TOO_HIGH: 50009, EXPLICIT_CONTENT_CANNOT_BE_SENT_TO_RECIPIENT: new ApiError("Explicit content cannot be sent to the desired recipient(s)", 20009),
OAUTH2_APPLICATION_BOT_ABSENT: 50010, ACTION_NOT_AUTHORIZED_ON_APPLICATION: new ApiError("You are not authorized to perform this action on this application", 20012),
MAXIMUM_OAUTH2_APPLICATIONS: 50011, SLOWMODE_RATE_LIMIT: new ApiError("This action cannot be performed due to slowmode rate limit", 20016),
INVALID_OAUTH_STATE: 50012, ONLY_OWNER: new ApiError("Only the owner of this account can perform this action", 20018),
MISSING_PERMISSIONS: 50013, ANNOUNCEMENT_RATE_LIMITS: new ApiError("This message cannot be edited due to announcement rate limits", 20022),
INVALID_AUTHENTICATION_TOKEN: 50014, CHANNEL_WRITE_RATELIMIT: new ApiError("The channel you are writing has hit the write rate limit", 20028),
NOTE_TOO_LONG: 50015, WORDS_NOT_ALLOWED: new ApiError("Your Stage topic, server name, server description, or channel names contain words that are not allowed", 20031),
INVALID_BULK_DELETE_QUANTITY: 50016, GUILD_PREMIUM_LEVEL_TOO_LOW: new ApiError("Guild premium subscription level too low", 20035),
CANNOT_PIN_MESSAGE_IN_OTHER_CHANNEL: 50019, MAXIMUM_GUILDS: new ApiError("Maximum number of guilds reached ({})", 30001, undefined, ["100"]),
INVALID_OR_TAKEN_INVITE_CODE: 50020, MAXIMUM_FRIENDS: new ApiError("Maximum number of friends reached ({})", 30002, undefined, ["1000"]),
CANNOT_EXECUTE_ON_SYSTEM_MESSAGE: 50021, MAXIMUM_PINS: new ApiError("Maximum number of pins reached for the channel ({})", 30003, undefined, ["50"]),
INVALID_OAUTH_TOKEN: 50025, MAXIMUM_NUMBER_OF_RECIPIENTS_REACHED: new ApiError("Maximum number of recipients reached ({})", 30004, undefined, ["10"]),
BULK_DELETE_MESSAGE_TOO_OLD: 50034, MAXIMUM_ROLES: new ApiError("Maximum number of guild roles reached ({})", 30005, undefined, ["250"]),
INVALID_FORM_BODY: 50035, MAXIMUM_WEBHOOKS: new ApiError("Maximum number of webhooks reached ({})", 30007, undefined, ["10"]),
INVITE_ACCEPTED_TO_GUILD_NOT_CONTAINING_BOT: 50036, MAXIMUM_NUMBER_OF_EMOJIS_REACHED: new ApiError("Maximum number of emojis reached", 30008),
INVALID_API_VERSION: 50041, MAXIMUM_REACTIONS: new ApiError("Maximum number of reactions reached ({})", 30010, undefined, ["20"]),
CANNOT_DELETE_COMMUNITY_REQUIRED_CHANNEL: 50074, MAXIMUM_CHANNELS: new ApiError("Maximum number of guild channels reached ({})", 30013, undefined, ["500"]),
REACTION_BLOCKED: 90001, MAXIMUM_ATTACHMENTS: new ApiError("Maximum number of attachments in a message reached ({})", 30015, undefined, ["10"]),
RESOURCE_OVERLOADED: 130000, MAXIMUM_INVITES: new ApiError("Maximum number of invites reached ({})", 30016, undefined, ["1000"]),
}; MAXIMUM_ANIMATED_EMOJIS: new ApiError("Maximum number of animated emojis reached", 30018),
MAXIMUM_SERVER_MEMBERS: new ApiError("Maximum number of server members reached", 30019),
MAXIMUM_SERVER_CATEGORIES: new ApiError("Maximum number of server categories has been reached ({})", 30030, undefined, ["5"]),
GUILD_ALREADY_HAS_TEMPLATE: new ApiError("Guild already has a template", 30031),
MAXIMUM_THREAD_PARTICIPANTS: new ApiError("Max number of thread participants has been reached", 30033),
MAXIMUM_BANS_FOR_NON_GUILD_MEMBERS: new ApiError("Maximum number of bans for non-guild members have been exceeded", 30035),
MAXIMUM_BANS_FETCHES: new ApiError("Maximum number of bans fetches has been reached", 30037),
MAXIMUM_STICKERS: new ApiError("Maximum number of stickers reached", 30039),
MAXIMUM_PRUNE_REQUESTS: new ApiError("Maximum number of prune requests has been reached. Try again later", 30040),
UNAUTHORIZED: new ApiError("Unauthorized. Provide a valid token and try again", 40001),
ACCOUNT_VERIFICATION_REQUIRED: new ApiError("You need to verify your account in order to perform this action", 40002),
OPENING_DIRECT_MESSAGES_TOO_FAST: new ApiError("You are opening direct messages too fast", 40003),
REQUEST_ENTITY_TOO_LARGE: new ApiError("Request entity too large. Try sending something smaller in size", 40005),
FEATURE_TEMPORARILY_DISABLED: new ApiError("This feature has been temporarily disabled server-side", 40006),
USER_BANNED: new ApiError("The user is banned from this guild", 40007),
TARGET_USER_IS_NOT_CONNECTED_TO_VOICE: new ApiError("Target user is not connected to voice", 40032),
ALREADY_CROSSPOSTED: new ApiError("This message has already been crossposted", 40033),
APPLICATION_COMMAND_ALREADY_EXISTS: new ApiError("An application command with that name already exists", 40041),
MISSING_ACCESS: new ApiError("Missing access", 50001),
INVALID_ACCOUNT_TYPE: new ApiError("Invalid account type", 50002),
CANNOT_EXECUTE_ON_DM: new ApiError("Cannot execute action on a DM channel", 50003),
EMBED_DISABLED: new ApiError("Guild widget disabled", 50004),
CANNOT_EDIT_MESSAGE_BY_OTHER: new ApiError("Cannot edit a message authored by another user", 50005),
CANNOT_SEND_EMPTY_MESSAGE: new ApiError("Cannot send an empty message", 50006),
CANNOT_MESSAGE_USER: new ApiError("Cannot send messages to this user", 50007),
CANNOT_SEND_MESSAGES_IN_VOICE_CHANNEL: new ApiError("Cannot send messages in a voice channel", 50008),
CHANNEL_VERIFICATION_LEVEL_TOO_HIGH: new ApiError("Channel verification level is too high for you to gain access", 50009),
OAUTH2_APPLICATION_BOT_ABSENT: new ApiError("OAuth2 application does not have a bot", 50010),
MAXIMUM_OAUTH2_APPLICATIONS: new ApiError("OAuth2 application limit reached", 50011),
INVALID_OAUTH_STATE: new ApiError("Invalid OAuth2 state", 50012),
MISSING_PERMISSIONS: new ApiError("You lack permissions to perform that action", 50013),
INVALID_AUTHENTICATION_TOKEN: new ApiError("Invalid authentication token provided", 50014),
NOTE_TOO_LONG: new ApiError("Note was too long", 50015),
INVALID_BULK_DELETE_QUANTITY: new ApiError("Provided too few or too many messages to delete. Must provide at least {} and fewer than {} messages to delete", 50016, undefined, ["2","100"]),
CANNOT_PIN_MESSAGE_IN_OTHER_CHANNEL: new ApiError("A message can only be pinned to the channel it was sent in", 50019),
INVALID_OR_TAKEN_INVITE_CODE: new ApiError("Invite code was either invalid or taken", 50020),
CANNOT_EXECUTE_ON_SYSTEM_MESSAGE: new ApiError("Cannot execute action on a system message", 50021),
CANNOT_EXECUTE_ON_THIS_CHANNEL_TYPE: new ApiError("Cannot execute action on this channel type", 50024),
INVALID_OAUTH_TOKEN: new ApiError("Invalid OAuth2 access token provided", 50025),
MISSING_REQUIRED_OAUTH2_SCOPE: new ApiError("Missing required OAuth2 scope", 50026),
INVALID_WEBHOOK_TOKEN_PROVIDED: new ApiError("Invalid webhook token provided", 50027),
INVALID_ROLE: new ApiError("Invalid role", 50028),
INVALID_RECIPIENT: new ApiError("Invalid Recipient(s)", 50033),
BULK_DELETE_MESSAGE_TOO_OLD: new ApiError("A message provided was too old to bulk delete", 50034),
INVALID_FORM_BODY: new ApiError("Invalid form body (returned for both application/json and multipart/form-data bodies), or invalid Content-Type provided", 50035),
INVITE_ACCEPTED_TO_GUILD_NOT_CONTAINING_BOT: new ApiError("An invite was accepted to a guild the application's bot is not in", 50036),
INVALID_API_VERSION: new ApiError("Invalid API version provided", 50041),
FILE_EXCEEDS_MAXIMUM_SIZE: new ApiError("File uploaded exceeds the maximum size", 50045),
INVALID_FILE_UPLOADED: new ApiError("Invalid file uploaded", 50046),
CANNOT_SELF_REDEEM_GIFT: new ApiError("Cannot self-redeem this gift", 50054),
PAYMENT_SOURCE_REQUIRED: new ApiError("Payment source required to redeem gift", 50070),
CANNOT_DELETE_COMMUNITY_REQUIRED_CHANNEL: new ApiError("Cannot delete a channel required for Community guilds", 50074),
INVALID_STICKER_SENT: new ApiError("Invalid sticker sent", 50081),
CANNOT_EDIT_ARCHIVED_THREAD: new ApiError("Tried to perform an operation on an archived thread, such as editing a message or adding a user to the thread", 50083),
INVALID_THREAD_NOTIFICATION_SETTINGS: new ApiError("Invalid thread notification settings", 50084),
BEFORE_EARLIER_THAN_THREAD_CREATION_DATE: new ApiError("before value is earlier than the thread creation date", 50085),
SERVER_NOT_AVAILABLE_IN_YOUR_LOCATION: new ApiError("This server is not available in your location", 50095),
SERVER_NEEDS_MONETIZATION_ENABLED: new ApiError("This server needs monetization enabled in order to perform this action", 50097),
TWO_FACTOR_REQUIRED: new ApiError("Two factor is required for this operation", 60003),
NO_USERS_WITH_DISCORDTAG_EXIST: new ApiError("No users with DiscordTag exist", 80004),
REACTION_BLOCKED: new ApiError("Reaction was blocked", 90001),
RESOURCE_OVERLOADED: new ApiError("API resource is currently overloaded. Try again a little later", 130000),
STAGE_ALREADY_OPEN: new ApiError("The Stage is already open", 150006),
THREAD_ALREADY_CREATED_FOR_THIS_MESSAGE: new ApiError("A thread has already been created for this message", 160004),
THREAD_IS_LOCKED: new ApiError("Thread is locked", 160005),
MAXIMUM_NUMBER_OF_ACTIVE_THREADS: new ApiError("Maximum number of active threads reached", 160006),
MAXIMUM_NUMBER_OF_ACTIVE_ANNOUNCEMENT_THREADS: new ApiError("Maximum number of active announcement threads reached", 160007),
INVALID_JSON_FOR_UPLOADED_LOTTIE_FILE: new ApiError("Invalid JSON for uploaded Lottie file", 170001),
LOTTIES_CANNOT_CONTAIN_RASTERIZED_IMAGES: new ApiError("Uploaded Lotties cannot contain rasterized images such as PNG or JPEG", 170002),
STICKER_MAXIMUM_FRAMERATE: new ApiError("Sticker maximum framerate exceeded", 170003),
STICKER_MAXIMUM_FRAME_COUNT: new ApiError("Sticker frame count exceeds maximum of {} frames", 170004, undefined, ["1000"]),
LOTTIE_ANIMATION_MAXIMUM_DIMENSIONS: new ApiError("Lottie animation maximum dimensions exceeded", 170005),
STICKER_FRAME_RATE_TOO_SMALL_OR_TOO_LARGE: new ApiError("Sticker frame rate is either too small or too large", 170006),
STICKER_ANIMATION_DURATION_MAXIMUM: new ApiError("Sticker animation duration exceeds maximum of {} seconds", 170007, undefined, ["5"]),
//Other errors
UNKNOWN_VOICE_STATE: new ApiError("Unknown Voice State", 10065, 404),
}
/**
* An error encountered while performing an API request (Fosscord only). Here are the potential errors:
*/
export const FosscordApiErrors = {
}
/** /**
* The value set for a guild's default message notifications, e.g. `ALL`. Here are the available types: * The value set for a guild's default message notifications, e.g. `ALL`. Here are the available types:

View File

@ -1,222 +0,0 @@
import {
Guild,
GuildCreateEvent,
GuildDeleteEvent,
GuildMemberAddEvent,
GuildMemberRemoveEvent,
GuildMemberUpdateEvent,
GuildModel,
MemberModel,
RoleModel,
toObject,
UserModel,
GuildDocument,
Config,
emitEvent
} from "@fosscord/util";
import { HTTPError } from "lambert-server";
import { getPublicUser } from "./User";
export const PublicMemberProjection = {
id: true,
guild_id: true,
nick: true,
roles: true,
joined_at: true,
pending: true,
deaf: true,
mute: true,
premium_since: true
};
export async function isMember(user_id: string, guild_id: string) {
const exists = await MemberModel.exists({ id: user_id, guild_id });
if (!exists) throw new HTTPError("You are not a member of this guild", 403);
return exists;
}
export async function addMember(user_id: string, guild_id: string, cache?: { guild?: GuildDocument }) {
const user = await getPublicUser(user_id, { guilds: true });
const { maxGuilds } = Config.get().limits.user;
if (user.guilds.length >= maxGuilds) {
throw new HTTPError(`You are at the ${maxGuilds} server limit.`, 403);
}
const guild = cache?.guild || (await GuildModel.findOne({ id: guild_id }).exec());
if (!guild) throw new HTTPError("Guild not found", 404);
if (await MemberModel.exists({ id: user.id, guild_id })) throw new HTTPError("You are already a member of this guild", 400);
const member = {
id: user_id,
guild_id: guild_id,
nick: undefined,
roles: [guild_id], // @everyone role
joined_at: new Date(),
premium_since: undefined,
deaf: false,
mute: false,
pending: false
};
await Promise.all([
new MemberModel({
...member,
read_state: {},
settings: {
channel_overrides: [],
message_notifications: 0,
mobile_push: true,
mute_config: null,
muted: false,
suppress_everyone: false,
suppress_roles: false,
version: 0
}
}).save(),
UserModel.updateOne({ id: user_id }, { $push: { guilds: guild_id } }).exec(),
GuildModel.updateOne({ id: guild_id }, { $inc: { member_count: 1 } }).exec(),
emitEvent({
event: "GUILD_MEMBER_ADD",
data: {
...member,
user,
guild_id: guild_id
},
guild_id: guild_id
} as GuildMemberAddEvent)
]);
await emitEvent({
event: "GUILD_CREATE",
data: toObject(
await guild
.populate({ path: "members", match: { guild_id } })
.populate({ path: "joined_at", match: { id: user.id } })
.execPopulate()
),
user_id
} as GuildCreateEvent);
}
export async function removeMember(user_id: string, guild_id: string) {
const user = await getPublicUser(user_id);
const guild = await GuildModel.findOne({ id: guild_id }, { owner_id: true }).exec();
if (!guild) throw new HTTPError("Guild not found", 404);
if (guild.owner_id === user_id) throw new Error("The owner cannot be removed of the guild");
if (!(await MemberModel.exists({ id: user.id, guild_id }))) throw new HTTPError("Is not member of this guild", 404);
// use promise all to execute all promises at the same time -> save time
return Promise.all([
MemberModel.deleteOne({
id: user_id,
guild_id: guild_id
}).exec(),
UserModel.updateOne({ id: user.id }, { $pull: { guilds: guild_id } }).exec(),
GuildModel.updateOne({ id: guild_id }, { $inc: { member_count: -1 } }).exec(),
emitEvent({
event: "GUILD_DELETE",
data: {
id: guild_id
},
user_id: user_id
} as GuildDeleteEvent),
emitEvent({
event: "GUILD_MEMBER_REMOVE",
data: {
guild_id: guild_id,
user: user
},
guild_id: guild_id
} as GuildMemberRemoveEvent)
]);
}
export async function addRole(user_id: string, guild_id: string, role_id: string) {
const user = await getPublicUser(user_id);
const role = await RoleModel.findOne({ id: role_id, guild_id: guild_id }).exec();
if (!role) throw new HTTPError("role not found", 404);
var memberObj = await MemberModel.findOneAndUpdate(
{
id: user_id,
guild_id: guild_id
},
{ $push: { roles: role_id } },
{ new: true }
).exec();
if (!memberObj) throw new HTTPError("Member not found", 404);
await emitEvent({
event: "GUILD_MEMBER_UPDATE",
data: {
guild_id: guild_id,
user: user,
roles: memberObj.roles
},
guild_id: guild_id
} as GuildMemberUpdateEvent);
}
export async function removeRole(user_id: string, guild_id: string, role_id: string) {
const user = await getPublicUser(user_id);
const role = await RoleModel.findOne({ id: role_id, guild_id: guild_id }).exec();
if (!role) throw new HTTPError("role not found", 404);
var memberObj = await MemberModel.findOneAndUpdate(
{
id: user_id,
guild_id: guild_id
},
{ $pull: { roles: role_id } },
{ new: true }
).exec();
if (!memberObj) throw new HTTPError("Member not found", 404);
await emitEvent({
event: "GUILD_MEMBER_UPDATE",
data: {
guild_id: guild_id,
user: user,
roles: memberObj.roles
},
guild_id: guild_id
} as GuildMemberUpdateEvent);
}
export async function changeNickname(user_id: string, guild_id: string, nickname: string) {
const user = await getPublicUser(user_id);
var memberObj = await MemberModel.findOneAndUpdate(
{
id: user_id,
guild_id: guild_id
},
{ nick: nickname },
{ new: true }
).exec();
if (!memberObj) throw new HTTPError("Member not found", 404);
await emitEvent({
event: "GUILD_MEMBER_UPDATE",
data: {
guild_id: guild_id,
user: user,
nick: nickname
},
guild_id: guild_id
} as GuildMemberUpdateEvent);
}

View File

@ -1,5 +1,5 @@
import { import {
ChannelModel, Channel,
Embed, Embed,
emitEvent, emitEvent,
Message, Message,
@ -7,21 +7,23 @@ import {
MessageUpdateEvent, MessageUpdateEvent,
getPermission, getPermission,
CHANNEL_MENTION, CHANNEL_MENTION,
toObject,
MessageModel,
Snowflake, Snowflake,
PublicMemberProjection,
USER_MENTION, USER_MENTION,
ROLE_MENTION, ROLE_MENTION,
RoleModel, Role,
EVERYONE_MENTION, EVERYONE_MENTION,
HERE_MENTION HERE_MENTION,
MessageType,
User,
Application,
Webhook,
Attachment
} from "@fosscord/util"; } from "@fosscord/util";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import fetch from "node-fetch"; import fetch from "node-fetch";
import cheerio from "cheerio"; import cheerio from "cheerio";
import { MessageCreateSchema } from "../schema/Message";
import { MessageType } from "@fosscord/util/dist/util/Constants";
// TODO: check webhook, application, system author // TODO: check webhook, application, system author
const LINK_REGEX = /https?:\/\/(www\.)?[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/g; const LINK_REGEX = /https?:\/\/(www\.)?[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/g;
@ -37,19 +39,37 @@ const DEFAULT_FETCH_OPTIONS: any = {
method: "GET" method: "GET"
}; };
export async function handleMessage(opts: Partial<Message>) { export async function handleMessage(opts: MessageOptions): Promise<Message> {
const channel = await ChannelModel.findOne( const channel = await Channel.findOneOrFail({ where: { id: opts.channel_id }, relations: ["recipients"] });
{ id: opts.channel_id },
{ guild_id: true, type: true, permission_overwrites: true, recipient_ids: true, owner_id: true }
)
.lean() // lean is needed, because we don't want to populate .recipients that also auto deletes .recipient_ids
.exec();
if (!channel || !opts.channel_id) throw new HTTPError("Channel not found", 404); if (!channel || !opts.channel_id) throw new HTTPError("Channel not found", 404);
// TODO: are tts messages allowed in dm channels? should permission be checked?
// @ts-ignore const message = new Message({
const permission = await getPermission(opts.author_id, channel.guild_id, opts.channel_id, { channel }); ...opts,
guild_id: channel.guild_id,
channel_id: opts.channel_id,
attachments: opts.attachments || [],
embeds: opts.embeds || [],
reactions: /*opts.reactions ||*/ [],
type: opts.type ?? 0
});
// TODO: are tts messages allowed in dm channels? should permission be checked?
if (opts.author_id) {
message.author = await User.getPublicUser(opts.author_id);
}
if (opts.application_id) {
message.application = await Application.findOneOrFail({ id: opts.application_id });
}
if (opts.webhook_id) {
message.webhook = await Webhook.findOneOrFail({ id: opts.webhook_id });
}
const permission = await getPermission(opts.author_id, channel.guild_id, opts.channel_id);
permission.hasThrow("SEND_MESSAGES"); permission.hasThrow("SEND_MESSAGES");
if (permission.cache.member) {
message.member = permission.cache.member;
}
if (opts.tts) permission.hasThrow("SEND_TTS_MESSAGES"); if (opts.tts) permission.hasThrow("SEND_TTS_MESSAGES");
if (opts.message_reference) { if (opts.message_reference) {
permission.hasThrow("READ_MESSAGE_HISTORY"); permission.hasThrow("READ_MESSAGE_HISTORY");
@ -57,24 +77,24 @@ export async function handleMessage(opts: Partial<Message>) {
if (opts.message_reference.channel_id !== opts.channel_id) throw new HTTPError("You can only reference messages from this channel"); if (opts.message_reference.channel_id !== opts.channel_id) throw new HTTPError("You can only reference messages from this channel");
// TODO: should be checked if the referenced message exists? // TODO: should be checked if the referenced message exists?
// @ts-ignore // @ts-ignore
opts.type = MessageType.REPLY; message.type = MessageType.REPLY;
} }
if (!opts.content && !opts.embeds?.length && !opts.attachments?.length && !opts.stickers?.length && !opts.activity) { // TODO: stickers/activity
if (!opts.content && !opts.embeds?.length && !opts.attachments?.length) {
throw new HTTPError("Empty messages are not allowed", 50006); throw new HTTPError("Empty messages are not allowed", 50006);
} }
var content = opts.content; var content = opts.content;
var mention_channels_ids = [] as string[]; var mention_channel_ids = [] as string[];
var mention_role_ids = [] as string[]; var mention_role_ids = [] as string[];
var mention_user_ids = [] as string[]; var mention_user_ids = [] as string[];
var mention_everyone = false; var mention_everyone = false;
var mention_everyone = false;
if (content) { if (content) {
content = content.trim(); message.content = content.trim();
for (const [_, mention] of content.matchAll(CHANNEL_MENTION)) { for (const [_, mention] of content.matchAll(CHANNEL_MENTION)) {
if (!mention_channels_ids.includes(mention)) mention_channels_ids.push(mention); if (!mention_channel_ids.includes(mention)) mention_channel_ids.push(mention);
} }
for (const [_, mention] of content.matchAll(USER_MENTION)) { for (const [_, mention] of content.matchAll(USER_MENTION)) {
@ -83,7 +103,7 @@ export async function handleMessage(opts: Partial<Message>) {
await Promise.all( await Promise.all(
Array.from(content.matchAll(ROLE_MENTION)).map(async ([_, mention]) => { Array.from(content.matchAll(ROLE_MENTION)).map(async ([_, mention]) => {
const role = await RoleModel.findOne({ id: mention, guild_id: channel.guild_id }).exec(); const role = await Role.findOneOrFail({ id: mention, guild_id: channel.guild_id });
if (role.mentionable || permission.has("MANAGE_ROLES")) { if (role.mentionable || permission.has("MANAGE_ROLES")) {
mention_role_ids.push(mention); mention_role_ids.push(mention);
} }
@ -95,20 +115,14 @@ export async function handleMessage(opts: Partial<Message>) {
} }
} }
message.mention_channels = mention_channel_ids.map((x) => new Channel({ id: x }));
message.mention_roles = mention_role_ids.map((x) => new Role({ id: x }));
message.mentions = mention_user_ids.map((x) => new User({ id: x }));
message.mention_everyone = mention_everyone;
// TODO: check and put it all in the body // TODO: check and put it all in the body
return {
...opts, return message;
guild_id: channel.guild_id,
channel_id: opts.channel_id,
mention_channels_ids,
mention_role_ids,
mention_user_ids,
mention_everyone,
attachments: opts.attachments || [],
embeds: opts.embeds || [],
reactions: opts.reactions || [],
type: opts.type ?? 0
};
} }
// TODO: cache link result in db // TODO: cache link result in db
@ -160,20 +174,33 @@ export async function postHandleMessage(message: Message) {
channel_id: message.channel_id, channel_id: message.channel_id,
data data
} as MessageUpdateEvent), } as MessageUpdateEvent),
MessageModel.updateOne({ id: message.id, channel_id: message.channel_id }, data).exec() Message.update({ id: message.id, channel_id: message.channel_id }, data)
]); ]);
} }
export async function sendMessage(opts: Partial<Message>) { export async function sendMessage(opts: MessageOptions) {
const message = await handleMessage({ ...opts, id: Snowflake.generate(), timestamp: new Date() }); const message = await handleMessage({ ...opts, timestamp: new Date() });
const data = toObject( await Promise.all([
await new MessageModel(message).populate({ path: "member", select: PublicMemberProjection }).populate("referenced_message").save() message.save(),
); emitEvent({ event: "MESSAGE_CREATE", channel_id: opts.channel_id, data: message.toJSON() } as MessageCreateEvent)
]);
await emitEvent({ event: "MESSAGE_CREATE", channel_id: opts.channel_id, data } as MessageCreateEvent); postHandleMessage(message).catch((e) => {}); // no await as it shouldnt block the message send function and silently catch error
postHandleMessage(data).catch((e) => {}); // no await as it shouldnt block the message send function and silently catch error return message;
}
return data;
interface MessageOptions extends MessageCreateSchema {
id?: string;
type?: MessageType;
pinned?: boolean;
author_id?: string;
webhook_id?: string;
application_id?: string;
embeds?: Embed[];
channel_id?: string;
attachments?: Attachment[];
edited_timestamp?: Date;
timestamp?: Date;
} }

View File

@ -1,16 +0,0 @@
import { toObject, UserModel, PublicUserProjection } from "@fosscord/util";
import { HTTPError } from "lambert-server";
export { PublicUserProjection };
export async function getPublicUser(user_id: string, additional_fields?: any) {
const user = await UserModel.findOne(
{ id: user_id },
{
...PublicUserProjection,
...additional_fields
}
).exec();
if (!user) throw new HTTPError("User not found", 404);
return toObject(user);
}

32
api/src/util/Voice.ts Normal file
View File

@ -0,0 +1,32 @@
import {Config} from "@fosscord/util";
import {distanceBetweenLocations, IPAnalysis} from "./ipAddress";
export async function getVoiceRegions(ipAddress: string, vip: boolean) {
const regions = Config.get().regions;
const availableRegions = regions.available.filter(ar => vip ? true : !ar.vip);
let optimalId = regions.default
if(!regions.useDefaultAsOptimal) {
const clientIpAnalysis = await IPAnalysis(ipAddress)
let min = Number.POSITIVE_INFINITY
for (let ar of availableRegions) {
//TODO the endpoint location should be saved in the database if not already present to prevent IPAnalysis call
const dist = distanceBetweenLocations(clientIpAnalysis, ar.location || (await IPAnalysis(ar.endpoint)))
if(dist < min) {
min = dist
optimalId = ar.id
}
}
}
return availableRegions.map(ar => ({
id: ar.id,
name: ar.name,
custom: ar.custom,
deprecated: ar.deprecated,
optimal: ar.id === optimalId
}))
}

View File

@ -60,6 +60,7 @@ const exampleData = {
status: 200 status: 200
}; };
//TODO add function that support both ip and domain names
export async function IPAnalysis(ip: string): Promise<typeof exampleData> { export async function IPAnalysis(ip: string): Promise<typeof exampleData> {
const { ipdataApiKey } = Config.get().security; const { ipdataApiKey } = Config.get().security;
if (!ipdataApiKey) return { ...exampleData, ip }; if (!ipdataApiKey) return { ...exampleData, ip };
@ -79,3 +80,19 @@ export function getIpAdress(req: Request): string {
// @ts-ignore // @ts-ignore
return req.headers[Config.get().security.forwadedFor] || req.socket.remoteAddress; return req.headers[Config.get().security.forwadedFor] || req.socket.remoteAddress;
} }
export function distanceBetweenLocations(loc1: any, loc2: any): number {
return distanceBetweenCoords(loc1.latitude, loc1.longitude, loc2.latitude, loc2.longitude);
}
//Haversine function
function distanceBetweenCoords(lat1: number, lon1: number, lat2: number, lon2: number) {
const p = 0.017453292519943295; // Math.PI / 180
const c = Math.cos;
const a = 0.5 - c((lat2 - lat1) * p) / 2 +
c(lat1 * p) * c(lat2 * p) *
(1 - c((lon2 - lon1) * p)) / 2;
return 12742 * Math.asin(Math.sqrt(a)); // 2 * R; R = 6371 km
}

View File

@ -0,0 +1,2 @@
const supertest = require("supertest");
const request = supertest("http://localhost:1870");

View File

@ -0,0 +1,25 @@
const supertest = require("supertest");
const request = supertest("http://localhost:3001");
describe("/api/register", () => {
describe("POST", () => {
test("without body", async () => {
const response = await request.post("/api/auth/register").send({});
expect(response.statusCode).toBe(400);
});
test("with body", async () => {
const response = await request.post("/api/auth/register").send({
fingerprint: "805826570869932034.wR8vi8lGlFBJerErO9LG5NViJFw",
email: "qo8etzvaf@gmail.com",
username: "qp39gr98",
password: "wtp9gep9gw",
invite: null,
consent: true,
date_of_birth: "2000-04-04",
gift_code_sku_id: null,
captcha_key: null
});
expect(response.statusCode).toBe(200);
});
});
});

View File

@ -0,0 +1,12 @@
const supertest = require("supertest");
const request = supertest("http://localhost:3001");
describe("/ping", () => {
describe("GET", () => {
test("should return 200 and pong", async () => {
let response = await request.get("/api/ping");
expect(response.text).toBe("pong");
expect(response.statusCode).toBe(200);
});
});
});

BIN
bundle/database.db Normal file

Binary file not shown.

View File

@ -16,6 +16,7 @@
"@fosscord/util": "file:../util", "@fosscord/util": "file:../util",
"async-exit-hook": "^2.0.1", "async-exit-hook": "^2.0.1",
"express": "^4.17.1", "express": "^4.17.1",
"missing-native-js-functions": "^1.2.13",
"mongodb-memory-server": "^7.3.6", "mongodb-memory-server": "^7.3.6",
"node-os-utils": "^1.3.5" "node-os-utils": "^1.3.5"
}, },
@ -63,19 +64,22 @@
"i18next-http-middleware": "^3.1.3", "i18next-http-middleware": "^3.1.3",
"i18next-node-fs-backend": "^2.1.3", "i18next-node-fs-backend": "^2.1.3",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"lambert-server": "^1.2.8", "lambert-server": "^1.2.10",
"missing-native-js-functions": "^1.2.10", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.12.3", "mongoose": "^5.12.3",
"mongoose-autopopulate": "^0.12.3", "mongoose-autopopulate": "^0.12.3",
"mongoose-long": "^0.3.2", "mongoose-long": "^0.3.2",
"multer": "^1.4.2", "multer": "^1.4.2",
"node-fetch": "^2.6.1" "node-fetch": "^2.6.1",
"supertest": "^6.1.6",
"typeorm": "^0.2.37"
}, },
"devDependencies": { "devDependencies": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/bcrypt": "^5.0.0", "@types/bcrypt": "^5.0.0",
"@types/express": "^4.17.9", "@types/express": "^4.17.9",
"@types/i18next-node-fs-backend": "^2.1.0", "@types/i18next-node-fs-backend": "^2.1.0",
"@types/jest": "^27.0.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9", "@types/mongodb": "^3.6.9",
"@types/mongoose": "^5.10.5", "@types/mongoose": "^5.10.5",
@ -111,11 +115,13 @@
"file-type": "^16.5.0", "file-type": "^16.5.0",
"fs-extra": "^10.0.0", "fs-extra": "^10.0.0",
"image-size": "^1.0.0", "image-size": "^1.0.0",
"jest": "^27.0.6",
"lambert-db": "^1.2.3", "lambert-db": "^1.2.3",
"lambert-server": "^1.2.8", "lambert-server": "^1.2.8",
"missing-native-js-functions": "^1.2.10", "missing-native-js-functions": "^1.2.10",
"multer": "^1.4.2", "multer": "^1.4.2",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"supertest": "^6.1.6",
"typescript": "^4.1.2", "typescript": "^4.1.2",
"uuid": "^8.3.2" "uuid": "^8.3.2"
}, },
@ -173,26 +179,30 @@
"hasInstallScript": true, "hasInstallScript": true,
"license": "GPLV3", "license": "GPLV3",
"dependencies": { "dependencies": {
"ajv": "^8.5.0", "ajv": "^8.6.2",
"amqplib": "^0.8.0", "amqplib": "^0.8.0",
"class-validator": "^0.13.1",
"dot-prop": "^6.0.1", "dot-prop": "^6.0.1",
"env-paths": "^2.2.1", "env-paths": "^2.2.1",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"missing-native-js-functions": "^1.2.10", "lambert-server": "^1.2.10",
"mongodb": "^3.6.9", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.13.7",
"mongoose-autopopulate": "^0.12.3",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"typescript": "^4.1.3" "patch-package": "^6.4.7",
"pg": "^8.7.1",
"reflect-metadata": "^0.1.13",
"sqlite3": "^5.0.2",
"typeorm": "^0.2.37",
"typescript": "^4.3.5",
"typescript-json-schema": "^0.50.1"
}, },
"devDependencies": { "devDependencies": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9",
"@types/mongoose-autopopulate": "^0.10.1", "@types/mongoose-autopopulate": "^0.10.1",
"@types/mongoose-lean-virtuals": "^0.5.1",
"@types/node": "^14.17.9", "@types/node": "^14.17.9",
"@types/node-fetch": "^2.5.12" "@types/node-fetch": "^2.5.12",
"jest": "^27.0.6"
} }
}, },
"node_modules/@babel/runtime": { "node_modules/@babel/runtime": {
@ -1216,6 +1226,11 @@
"node": "*" "node": "*"
} }
}, },
"node_modules/missing-native-js-functions": {
"version": "1.2.13",
"resolved": "https://registry.npmjs.org/missing-native-js-functions/-/missing-native-js-functions-1.2.13.tgz",
"integrity": "sha512-1RAArfUkrGkj5N3xJVW251F2PvfP2ozAcxsLLDR6uiiAixTP5Abh8zzGMadepbqgiHC0FGlTSAUNbh9abN4Osg=="
},
"node_modules/mkdirp": { "node_modules/mkdirp": {
"version": "1.0.4", "version": "1.0.4",
"resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-1.0.4.tgz", "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-1.0.4.tgz",
@ -1868,6 +1883,7 @@
"@types/bcrypt": "^5.0.0", "@types/bcrypt": "^5.0.0",
"@types/express": "^4.17.9", "@types/express": "^4.17.9",
"@types/i18next-node-fs-backend": "^2.1.0", "@types/i18next-node-fs-backend": "^2.1.0",
"@types/jest": "^27.0.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9", "@types/mongodb": "^3.6.9",
"@types/mongoose": "^5.10.5", "@types/mongoose": "^5.10.5",
@ -1899,16 +1915,18 @@
"image-size": "^1.0.0", "image-size": "^1.0.0",
"jest": "^26.6.3", "jest": "^26.6.3",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"lambert-server": "^1.2.8", "lambert-server": "^1.2.10",
"missing-native-js-functions": "^1.2.10", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.12.3", "mongoose": "^5.12.3",
"mongoose-autopopulate": "^0.12.3", "mongoose-autopopulate": "^0.12.3",
"mongoose-long": "^0.3.2", "mongoose-long": "^0.3.2",
"multer": "^1.4.2", "multer": "^1.4.2",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"saslprep": "^1.0.3", "saslprep": "^1.0.3",
"supertest": "^6.1.6",
"ts-node": "^9.1.1", "ts-node": "^9.1.1",
"ts-node-dev": "^1.1.6", "ts-node-dev": "^1.1.6",
"typeorm": "^0.2.37",
"typescript": "^4.1.2" "typescript": "^4.1.2"
} }
}, },
@ -1940,11 +1958,13 @@
"file-type": "^16.5.0", "file-type": "^16.5.0",
"fs-extra": "^10.0.0", "fs-extra": "^10.0.0",
"image-size": "^1.0.0", "image-size": "^1.0.0",
"jest": "^27.0.6",
"lambert-db": "^1.2.3", "lambert-db": "^1.2.3",
"lambert-server": "^1.2.8", "lambert-server": "^1.2.8",
"missing-native-js-functions": "^1.2.10", "missing-native-js-functions": "^1.2.10",
"multer": "^1.4.2", "multer": "^1.4.2",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"supertest": "^6.1.6",
"typescript": "^4.1.2", "typescript": "^4.1.2",
"uuid": "^8.3.2" "uuid": "^8.3.2"
} }
@ -1981,22 +2001,26 @@
"requires": { "requires": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9",
"@types/mongoose-autopopulate": "^0.10.1", "@types/mongoose-autopopulate": "^0.10.1",
"@types/mongoose-lean-virtuals": "^0.5.1",
"@types/node": "^14.17.9", "@types/node": "^14.17.9",
"@types/node-fetch": "^2.5.12", "@types/node-fetch": "^2.5.12",
"ajv": "^8.5.0", "ajv": "^8.6.2",
"amqplib": "^0.8.0", "amqplib": "^0.8.0",
"class-validator": "^0.13.1",
"dot-prop": "^6.0.1", "dot-prop": "^6.0.1",
"env-paths": "^2.2.1", "env-paths": "^2.2.1",
"jest": "^27.0.6",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"missing-native-js-functions": "^1.2.10", "lambert-server": "^1.2.10",
"mongodb": "^3.6.9", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.13.7",
"mongoose-autopopulate": "^0.12.3",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"typescript": "^4.1.3" "patch-package": "^6.4.7",
"pg": "^8.7.1",
"reflect-metadata": "^0.1.13",
"sqlite3": "^5.0.2",
"typeorm": "^0.2.37",
"typescript": "^4.3.5",
"typescript-json-schema": "^0.50.1"
} }
}, },
"@types/amqplib": { "@types/amqplib": {
@ -2784,6 +2808,11 @@
"brace-expansion": "^1.1.7" "brace-expansion": "^1.1.7"
} }
}, },
"missing-native-js-functions": {
"version": "1.2.13",
"resolved": "https://registry.npmjs.org/missing-native-js-functions/-/missing-native-js-functions-1.2.13.tgz",
"integrity": "sha512-1RAArfUkrGkj5N3xJVW251F2PvfP2ozAcxsLLDR6uiiAixTP5Abh8zzGMadepbqgiHC0FGlTSAUNbh9abN4Osg=="
},
"mkdirp": { "mkdirp": {
"version": "1.0.4", "version": "1.0.4",
"resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-1.0.4.tgz", "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-1.0.4.tgz",

View File

@ -5,8 +5,9 @@
"main": "src/start.js", "main": "src/start.js",
"scripts": { "scripts": {
"preinstall": "cd ../util && npm i && cd ../api && npm i && cd ../cdn && npm i && cd ../gateway && npm i", "preinstall": "cd ../util && npm i && cd ../api && npm i && cd ../cdn && npm i && cd ../gateway && npm i",
"build": "npm run build:api && npm run build:cdn && npm run build:gateway && npm run build:bundle", "build": "npm run build:util && npm run build:api && npm run build:cdn && npm run build:gateway && npm run build:bundle",
"build:bundle": "npx tsc -b .", "build:bundle": "npx tsc -b .",
"build:util": "cd ../util/ && npm run build",
"build:api": "cd ../api/ && npm run build", "build:api": "cd ../api/ && npm run build",
"build:cdn": "cd ../cdn/ && npm run build", "build:cdn": "cd ../cdn/ && npm run build",
"build:gateway": "cd ../gateway/ && npm run build", "build:gateway": "cd ../gateway/ && npm run build",
@ -50,6 +51,7 @@
"@fosscord/util": "file:../util", "@fosscord/util": "file:../util",
"async-exit-hook": "^2.0.1", "async-exit-hook": "^2.0.1",
"express": "^4.17.1", "express": "^4.17.1",
"missing-native-js-functions": "^1.2.13",
"mongodb-memory-server": "^7.3.6", "mongodb-memory-server": "^7.3.6",
"node-os-utils": "^1.3.5" "node-os-utils": "^1.3.5"
} }

View File

@ -1,44 +0,0 @@
import fs from "fs";
import { MongoMemoryServer } from "mongodb-memory-server";
import path from "path";
import exitHook from "async-exit-hook";
if (process.arch == "ia32") {
Object.defineProperty(process, "arch", {
value: "x64",
});
}
export async function setupDatabase() {
if (process.env.MONGO_URL) return; // exit because the user provides his own mongodb
const dbPath = path.join(__dirname, "..", "..", "db");
const dbName = "fosscord";
const storageEngine = "wiredTiger";
const port = 27020;
const ip = "127.0.0.1";
var mongod: MongoMemoryServer;
fs.mkdirSync(dbPath, { recursive: true });
exitHook((callback: any) => {
(async () => {
console.log(`Stopping MongoDB ...`);
await mongod.stop();
console.log(`Stopped MongoDB`);
callback();
})();
});
console.log(`[Database] starting ...`);
mongod = new MongoMemoryServer({
instance: {
port,
ip,
dbName,
dbPath,
storageEngine,
auth: false, // by default `mongod` is started with '--noauth', start `mongod` with '--auth'
},
});
await mongod.start();
process.env.MONGO_URL = mongod.getUri(dbName);
}

View File

@ -6,7 +6,7 @@ import { FosscordServer as APIServer } from "@fosscord/api";
import { Server as GatewayServer } from "@fosscord/gateway"; import { Server as GatewayServer } from "@fosscord/gateway";
import { CDNServer } from "@fosscord/cdn/"; import { CDNServer } from "@fosscord/cdn/";
import express from "express"; import express from "express";
import { Config } from "@fosscord/util"; import { Config, initDatabase } from "@fosscord/util";
const app = express(); const app = express();
const server = http.createServer(); const server = http.createServer();
@ -22,6 +22,8 @@ const cdn = new CDNServer({ server, port, production, app });
const gateway = new GatewayServer({ server, port, production }); const gateway = new GatewayServer({ server, port, production });
async function main() { async function main() {
await initDatabase();
await Config.init();
await Config.set({ await Config.set({
cdn: { cdn: {
endpointClient: "${location.host}", endpointClient: "${location.host}",

View File

@ -1,7 +1,6 @@
// process.env.MONGOMS_DEBUG = "true"; // process.env.MONGOMS_DEBUG = "true";
import cluster from "cluster"; import cluster from "cluster";
import os from "os"; import os from "os";
import { setupDatabase } from "./Database";
import { initStats } from "./stats"; import { initStats } from "./stats";
// TODO: add tcp socket event transmission // TODO: add tcp socket event transmission
@ -12,7 +11,6 @@ if (cluster.isMaster && !process.env.masterStarted) {
(async () => { (async () => {
initStats(); initStats();
await setupDatabase();
if (cores === 1) { if (cores === 1) {
require("./Server.js"); require("./Server.js");

View File

@ -61,6 +61,7 @@
"jest": { "jest": {
"setupFilesAfterEnv": [ "setupFilesAfterEnv": [
"<rootDir>/jest/setup.js" "<rootDir>/jest/setup.js"
] ],
"verbose": true
} }
} }

View File

@ -1,5 +1,5 @@
import { Server, ServerOptions } from "lambert-server"; import { Server, ServerOptions } from "lambert-server";
import { Config, db } from "@fosscord/util"; import { Config, initDatabase } from "@fosscord/util";
import path from "path"; import path from "path";
import avatarsRoute from "./routes/avatars"; import avatarsRoute from "./routes/avatars";
@ -13,8 +13,7 @@ export class CDNServer extends Server {
} }
async start() { async start() {
// @ts-ignore await initDatabase();
await (db as Promise<Connection>);
await Config.init(); await Config.init();
this.app.use((req, res, next) => { this.app.use((req, res, next) => {
res.set("Access-Control-Allow-Origin", "*"); res.set("Access-Control-Allow-Origin", "*");

View File

@ -1,45 +1,38 @@
// @ts-nocheck
import bodyParser from "body-parser";
import { Router, Response, Request } from "express"; import { Router, Response, Request } from "express";
import fetch from "node-fetch"; import fetch from "node-fetch";
import crypto from "crypto";
import { HTTPError } from "lambert-server"; import { HTTPError } from "lambert-server";
import { Snowflake } from "@fosscord/util"; import { Snowflake } from "@fosscord/util";
import { storage } from "../util/Storage"; import { storage } from "../util/Storage";
import FileType from "file-type";
import { Config } from "@fosscord/util";
// TODO: somehow handle the deletion of images posted to the /external route
const router = Router(); const router = Router();
type crawled = {
id: string;
ogTitle: string;
ogType: string;
ogDescription: string;
ogUrl: string;
cachedImage: string;
};
const DEFAULT_FETCH_OPTIONS: any = { const DEFAULT_FETCH_OPTIONS: any = {
redirect: "follow", redirect: "follow",
follow: 1, follow: 1,
headers: { headers: {
"user-agent": "Mozilla/5.0 (compatible; Discordbot/2.0; +https://discordapp.com)", "user-agent": "Mozilla/5.0 (compatible Fosscordbot/0.1; +https://fosscord.com)",
}, },
size: 1024 * 1024 * 8, size: 1024 * 1024 * 8,
compress: true, compress: true,
method: "GET", method: "GET",
}; };
router.post("/", bodyParser.json(), async (req: Request, res: Response) => { router.post("/", async (req: Request, res: Response) => {
if (req.headers.signature !== Config.get().security.requestSignature) if (req.headers.signature !== Config.get().security.requestSignature)
throw new HTTPError("Invalid request signature"); throw new HTTPError("Invalid request signature");
if (!req.body) throw new HTTPError("Invalid Body"); if (!req.body) throw new HTTPError("Invalid Body");
const { url } = req.body; const { url } = req.body;
if (!url || typeof url !== "string") throw new HTTPError("Invalid url"); if (!url || typeof url !== "string") throw new HTTPError("Invalid url");
const id = Snowflake.generate(); const id = Snowflake.generate();
try { try {
const response = await fetch(ogImage, DEFAULT_FETCH_OPTIONS); const response = await fetch(url, DEFAULT_FETCH_OPTIONS);
const buffer = await response.buffer(); const buffer = await response.buffer();
await storage.set(`/external/${id}`, buffer); await storage.set(`/external/${id}`, buffer);
@ -50,7 +43,7 @@ router.post("/", bodyParser.json(), async (req: Request, res: Response) => {
} }
}); });
router.get("/:id/", async (req: Request, res: Response) => { router.get("/:id", async (req: Request, res: Response) => {
const { id } = req.params; const { id } = req.params;
const file = await storage.get(`/external/${id}`); const file = await storage.get(`/external/${id}`);

View File

@ -6,6 +6,8 @@ import "missing-native-js-functions";
import { Readable } from "stream"; import { Readable } from "stream";
import ExifTransformer = require("exif-be-gone"); import ExifTransformer = require("exif-be-gone");
// TODO: split stored files into separate folders named after cloned route
function getPath(path: string) { function getPath(path: string) {
// STORAGE_LOCATION has a default value in start.ts // STORAGE_LOCATION has a default value in start.ts
const root = process.env.STORAGE_LOCATION || "../"; const root = process.env.STORAGE_LOCATION || "../";

View File

@ -0,0 +1,211 @@
const dotenv = require("dotenv");
const path = require("path");
const fse = require("fs-extra");
dotenv.config();
// TODO: write unittest to check if FileStorage.ts is working
// TODO: write unitest to check if env vars are defined
if (!process.env.STORAGE_PROVIDER) process.env.STORAGE_PROVIDER = "file";
// TODO:nodejs path.join trailing slash windows compatible
if (process.env.STORAGE_PROVIDER === "file") {
if (process.env.STORAGE_LOCATION) {
if (!process.env.STORAGE_LOCATION.startsWith("/")) {
process.env.STORAGE_LOCATION = path.join(__dirname, "..", process.env.STORAGE_LOCATION, "/");
}
} else {
process.env.STORAGE_LOCATION = path.join(__dirname, "..", "files", "/");
}
fse.ensureDirSync(process.env.STORAGE_LOCATION);
}
const { CDNServer } = require("../dist/Server");
const { Config } = require("@fosscord/util");
const supertest = require("supertest");
const request = supertest("http://localhost:3003");
const server = new CDNServer({ port: Number(process.env.PORT) || 3003 });
beforeAll(async () => {
await server.start();
return server;
});
afterAll(() => {
return server.stop();
});
describe("/ping", () => {
describe("GET", () => {
describe("without signature specified", () => {
test("route should respond with 200", async () => {
let response = await request.get("/ping");
expect(response.text).toBe("pong");
});
});
});
});
describe("/attachments", () => {
describe("POST", () => {
describe("without signature specified", () => {
test("route should respond with 400", async () => {
const response = await request.post("/attachments/123456789");
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, without file specified", () => {
test("route should respond with 400", async () => {
const response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature });
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, with file specified ", () => {
test("route should respond with Content-type: application/json, 200 and res.body.url", async () => {
const response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
expect(response.statusCode).toBe(200);
expect(response.headers["content-type"]).toEqual(expect.stringContaining("json"));
expect(response.body.url).toBeDefined();
});
});
});
describe("GET", () => {
describe("getting uploaded image by url returned by POST /attachments", () => {
test("route should respond with 200", async () => {
let response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.get(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.statusCode).toBe(200);
});
});
});
});
describe("DELETE", () => {
describe("deleting uploaded image by url returned by POST /attachments", () => {
test("route should respond with res.body.success", async () => {
let response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.delete(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.body.success).toBeDefined();
});
});
});
});
});
describe("/avatars", () => {
describe("POST", () => {
describe("without signature specified", () => {
test("route should respond with 400", async () => {
const response = await request.post("/avatars/123456789");
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, without file specified", () => {
test("route should respond with 400", async () => {
const response = await request
.post("/avatars/123456789")
.set({ signature: Config.get().security.requestSignature });
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, with file specified ", () => {
test("route should respond with Content-type: application/json, 200 and res.body.url", async () => {
const response = await request
.post("/avatars/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
expect(response.statusCode).toBe(200);
expect(response.headers["content-type"]).toEqual(expect.stringContaining("json"));
expect(response.body.url).toBeDefined();
});
});
});
describe("GET", () => {
describe("getting uploaded image by url returned by POST /avatars", () => {
test("route should respond with 200", async () => {
let response = await request
.post("/avatars/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.get(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.statusCode).toBe(200);
});
});
});
});
describe("DELETE", () => {
describe("deleting uploaded image by url returned by POST /avatars", () => {
test("route should respond with res.body.success", async () => {
let response = await request
.post("/avatars/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.delete(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.body.success).toBeDefined();
});
});
});
});
});
describe("/external", () => {
describe("POST", () => {
describe("without signature specified", () => {
test("route should respond with 400", async () => {
const response = await request.post("/external");
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, without file specified", () => {
test("route should respond with 400", async () => {
const response = await request
.post("/external")
.set({ signature: Config.get().security.requestSignature });
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, with file specified ", () => {
test("route should respond with Content-type: application/json, 200 and res.body.url", async () => {
const response = await request
.post("/external")
.set({ signature: Config.get().security.requestSignature })
.send({ url: "https://i.ytimg.com/vi_webp/TiXzhQr5AUc/mqdefault.webp" });
expect(response.statusCode).toBe(200);
expect(response.headers["content-type"]).toEqual(expect.stringContaining("json"));
expect(response.body.id).toBeDefined();
});
});
describe("with signature specified, with falsy url specified ", () => {
test("route should respond with 400", async () => {
const response = await request
.post("/external")
.set({ signature: Config.get().security.requestSignature })
.send({
url: "notavalidurl.123",
});
expect(response.statusCode).toBe(400);
});
});
});
describe("GET", () => {
describe("getting uploaded image by url returned by POST /avatars", () => {
test("route should respond with 200", async () => {
let response = await request
.post("/external")
.set({ signature: Config.get().security.requestSignature })
.send({ url: "https://i.ytimg.com/vi_webp/TiXzhQr5AUc/mqdefault.webp" });
request.get(`external/${response.body.id}`).then((x) => {
expect(x.statusCode).toBe(200);
});
});
});
});
});

View File

@ -0,0 +1,27 @@
const path = require("path");
process.env.STORAGE_LOCATION = path.join(__dirname, "..", "files", "/");
const { FileStorage } = require("../dist/util/FileStorage");
const storage = new FileStorage();
const fs = require("fs");
const file = fs.readFileSync(path.join(__dirname, "antman.jpg"));
describe("FileStorage", () => {
describe("saving a file", () => {
test("saving a buffer", async () => {
await storage.set("test_saving_file", file);
});
});
describe("getting a file", () => {
test("getting buffer with given name", async () => {
const buffer2 = await storage.get("test_saving_file");
expect(Buffer.compare(file, buffer2)).toBeTruthy();
});
});
describe("deleting a file", () => {
test("deleting buffer with given name", async () => {
await storage.delete("test_saving_file");
});
});
});

View File

@ -1,101 +0,0 @@
const dotenv = require("dotenv");
const path = require("path");
const fse = require("fs-extra");
dotenv.config();
if (!process.env.STORAGE_PROVIDER) process.env.STORAGE_PROVIDER = "file";
// TODO:nodejs path.join trailing slash windows compatible
if (process.env.STORAGE_PROVIDER === "file") {
if (process.env.STORAGE_LOCATION) {
if (!process.env.STORAGE_LOCATION.startsWith("/")) {
process.env.STORAGE_LOCATION = path.join(__dirname, "..", process.env.STORAGE_LOCATION, "/");
}
} else {
process.env.STORAGE_LOCATION = path.join(__dirname, "..", "files", "/");
}
fse.ensureDirSync(process.env.STORAGE_LOCATION);
}
const { CDNServer } = require("../dist/Server");
const { db, Config } = require("@fosscord/util");
const supertest = require("supertest");
const request = supertest("http://localhost:3003");
const server = new CDNServer({ port: Number(process.env.PORT) || 3003 });
beforeAll(async () => {
await server.start();
return server;
});
afterAll(() => {
db.close();
return server.stop();
});
describe("/ping", () => {
describe("GET", () => {
describe("without signature specified", () => {
test("route should respond with 200", async () => {
let response = await request.get("/ping");
expect(response.text).toBe("pong");
});
});
});
});
describe("/attachments", () => {
describe("POST", () => {
describe("without signature specified", () => {
test("route should respond with 400", async () => {
const response = await request.post("/attachments/123456789");
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, without file specified", () => {
test("route should respond with 400", async () => {
const response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature });
expect(response.statusCode).toBe(400);
});
});
describe("with signature specified, with file specified ", () => {
test("route should respond with Content-type: application/json, 200 and res.body.url", async () => {
const response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
expect(response.statusCode).toBe(200);
expect(response.headers["content-type"]).toEqual(expect.stringContaining("json"));
expect(response.body.url).toBeDefined();
attachment_url = response.body.url;
});
});
});
describe("GET", () => {
describe("getting uploaded image by url returned by POST /attachments", () => {
test("route should respond with 200", async () => {
let response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.get(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.statusCode).toBe(200);
});
});
});
});
describe("DELETE", () => {
describe("deleting uploaded image by url returned by POST /attachments", () => {
test("route should respond with res.body.success", async () => {
let response = await request
.post("/attachments/123456789")
.set({ signature: Config.get().security.requestSignature })
.attach("file", __dirname + "/antman.jpg");
request.delete(response.body.url.replace("http://localhost:3003", "")).then((x) => {
expect(x.body.success).toBeDefined();
});
});
});
});
});

View File

@ -41,26 +41,30 @@
"hasInstallScript": true, "hasInstallScript": true,
"license": "GPLV3", "license": "GPLV3",
"dependencies": { "dependencies": {
"ajv": "^8.5.0", "ajv": "^8.6.2",
"amqplib": "^0.8.0", "amqplib": "^0.8.0",
"class-validator": "^0.13.1",
"dot-prop": "^6.0.1", "dot-prop": "^6.0.1",
"env-paths": "^2.2.1", "env-paths": "^2.2.1",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"missing-native-js-functions": "^1.2.10", "lambert-server": "^1.2.10",
"mongodb": "^3.6.9", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.13.7",
"mongoose-autopopulate": "^0.12.3",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"typescript": "^4.1.3" "patch-package": "^6.4.7",
"pg": "^8.7.1",
"reflect-metadata": "^0.1.13",
"sqlite3": "^5.0.2",
"typeorm": "^0.2.37",
"typescript": "^4.4.2",
"typescript-json-schema": "^0.50.1"
}, },
"devDependencies": { "devDependencies": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9",
"@types/mongoose-autopopulate": "^0.10.1", "@types/mongoose-autopopulate": "^0.10.1",
"@types/mongoose-lean-virtuals": "^0.5.1",
"@types/node": "^14.17.9", "@types/node": "^14.17.9",
"@types/node-fetch": "^2.5.12" "@types/node-fetch": "^2.5.12",
"jest": "^27.0.6"
} }
}, },
"node_modules/@fosscord/util": { "node_modules/@fosscord/util": {
@ -1927,22 +1931,26 @@
"requires": { "requires": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9",
"@types/mongoose-autopopulate": "^0.10.1", "@types/mongoose-autopopulate": "^0.10.1",
"@types/mongoose-lean-virtuals": "^0.5.1",
"@types/node": "^14.17.9", "@types/node": "^14.17.9",
"@types/node-fetch": "^2.5.12", "@types/node-fetch": "^2.5.12",
"ajv": "^8.5.0", "ajv": "^8.6.2",
"amqplib": "^0.8.0", "amqplib": "^0.8.0",
"class-validator": "^0.13.1",
"dot-prop": "^6.0.1", "dot-prop": "^6.0.1",
"env-paths": "^2.2.1", "env-paths": "^2.2.1",
"jest": "^27.0.6",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"missing-native-js-functions": "^1.2.10", "lambert-server": "^1.2.10",
"mongodb": "^3.6.9", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.13.7",
"mongoose-autopopulate": "^0.12.3",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"typescript": "^4.1.3" "patch-package": "^6.4.7",
"pg": "^8.7.1",
"reflect-metadata": "^0.1.13",
"sqlite3": "^5.0.2",
"typeorm": "^0.2.37",
"typescript": "^4.4.2",
"typescript-json-schema": "^0.50.1"
} }
}, },
"@types/amqplib": { "@types/amqplib": {

View File

@ -1,7 +1,7 @@
import "missing-native-js-functions"; import "missing-native-js-functions";
import dotenv from "dotenv"; import dotenv from "dotenv";
dotenv.config(); dotenv.config();
import { Config, db, initEvent, RabbitMQ } from "@fosscord/util"; import { closeDatabase, Config, initDatabase, initEvent, RabbitMQ } from "@fosscord/util";
import { Server as WebSocketServer } from "ws"; import { Server as WebSocketServer } from "ws";
import { Connection } from "./events/Connection"; import { Connection } from "./events/Connection";
import http from "http"; import http from "http";
@ -38,15 +38,8 @@ export class Server {
this.ws.on("error", console.error); this.ws.on("error", console.error);
} }
async setupSchema() {
// TODO: adjust expireAfterSeconds -> lower
await Promise.all([db.collection("events").createIndex({ created_at: 1 }, { expireAfterSeconds: 60 })]);
}
async start(): Promise<void> { async start(): Promise<void> {
// @ts-ignore await initDatabase();
await (db as Promise<Connection>);
await this.setupSchema();
await Config.init(); await Config.init();
await initEvent(); await initEvent();
if (!this.server.listening) { if (!this.server.listening) {
@ -56,7 +49,7 @@ export class Server {
} }
async stop() { async stop() {
await db.close(); closeDatabase();
this.server.close(); this.server.close();
} }
} }

View File

@ -1,22 +1,21 @@
import { import {
db, User,
Event,
UserModel,
getPermission, getPermission,
Permissions, Permissions,
ChannelModel, Channel,
RabbitMQ, RabbitMQ,
EVENT,
listenEvent, listenEvent,
EventOpts, EventOpts,
ListenEventOpts, ListenEventOpts,
Member,
} from "@fosscord/util"; } from "@fosscord/util";
import { OPCODES } from "../util/Constants"; import { OPCODES } from "../util/Constants";
import { Send } from "../util/Send"; import { Send } from "../util/Send";
import WebSocket from "../util/WebSocket"; import WebSocket from "../util/WebSocket";
import "missing-native-js-functions"; import "missing-native-js-functions";
import { ConsumeMessage } from "amqplib"; import { Channel as AMQChannel } from "amqplib";
import { Channel } from "amqplib"; import { In, Like } from "../../../util/node_modules/typeorm";
import { Recipient } from "../../../util/dist/entities/Recipient";
// TODO: close connection on Invalidated Token // TODO: close connection on Invalidated Token
// TODO: check intent // TODO: check intent
@ -27,15 +26,15 @@ import { Channel } from "amqplib";
// TODO: use already queried guilds/channels of Identify and don't fetch them again // TODO: use already queried guilds/channels of Identify and don't fetch them again
export async function setupListener(this: WebSocket) { export async function setupListener(this: WebSocket) {
const user = await UserModel.findOne({ id: this.user_id }, { guilds: true }).exec(); const members = await Member.find({ where: { id: this.user_id } });
const channels = await ChannelModel.find( const guild_ids = members.map((x) => x.guild_id);
{ $or: [{ recipient_ids: this.user_id }, { guild_id: { $in: user.guilds } }] }, const user = await User.findOneOrFail({ id: this.user_id });
{ id: true, permission_overwrites: true } const recipients = await Recipient.find({ where: { id: this.user_id }, relations: ["channel"] });
).exec(); const channels = await Channel.find({ guild_id: In(guild_ids) });
const dm_channels = channels.filter((x) => !x.guild_id); const dm_channels = recipients.map((x) => x.channel);
const guild_channels = channels.filter((x) => x.guild_id); const guild_channels = channels.filter((x) => x.guild_id);
const opts: { acknowledge: boolean; channel?: Channel } = { acknowledge: true }; const opts: { acknowledge: boolean; channel?: AMQChannel } = { acknowledge: true };
const consumer = consume.bind(this); const consumer = consume.bind(this);
if (RabbitMQ.connection) { if (RabbitMQ.connection) {
@ -50,7 +49,7 @@ export async function setupListener(this: WebSocket) {
this.events[channel.id] = await listenEvent(channel.id, consumer, opts); this.events[channel.id] = await listenEvent(channel.id, consumer, opts);
} }
for (const guild of user.guilds) { for (const guild of guild_ids) {
// contains guild and dm channels // contains guild and dm channels
getPermission(this.user_id, guild) getPermission(this.user_id, guild)

View File

@ -1,17 +1,16 @@
import { CLOSECODES, Payload, OPCODES } from "../util/Constants"; import { CLOSECODES, Payload, OPCODES } from "../util/Constants";
import WebSocket from "../util/WebSocket"; import WebSocket from "../util/WebSocket";
import { import {
ChannelModel, Channel,
checkToken, checkToken,
GuildModel, Guild,
Intents, Intents,
MemberDocument, Member,
MemberModel,
ReadyEventData, ReadyEventData,
UserModel, User,
toObject,
EVENTEnum, EVENTEnum,
Config, Config,
dbConnection,
} from "@fosscord/util"; } from "@fosscord/util";
import { setupListener } from "../listener/listener"; import { setupListener } from "../listener/listener";
import { IdentifySchema } from "../schema/Identify"; import { IdentifySchema } from "../schema/Identify";
@ -19,6 +18,8 @@ import { Send } from "../util/Send";
// import experiments from "./experiments.json"; // import experiments from "./experiments.json";
const experiments: any = []; const experiments: any = [];
import { check } from "./instanceOf"; import { check } from "./instanceOf";
import { Like } from "../../../util/node_modules/typeorm";
import { Recipient } from "../../../util/dist/entities/Recipient";
// TODO: bot sharding // TODO: bot sharding
// TODO: check priviliged intents // TODO: check priviliged intents
@ -54,17 +55,22 @@ export async function onIdentify(this: WebSocket, data: Payload) {
} }
} }
const members = toObject(await MemberModel.find({ id: this.user_id }).exec()); const members = await Member.find({
where: { id: this.user_id },
relations: ["guild", "guild.channels", "guild.emojis", "guild.roles", "guild.stickers", "user", "roles"],
});
const merged_members = members.map((x: any) => { const merged_members = members.map((x: any) => {
const y = { ...x, user_id: x.id }; return [x];
delete y.settings; }) as Member[][];
delete y.id; const guilds = members.map((x) => ({ ...x.guild, joined_at: x.joined_at }));
return [y];
}) as MemberDocument[][];
const user_guild_settings_entries = members.map((x) => x.settings); const user_guild_settings_entries = members.map((x) => x.settings);
const channels = await ChannelModel.find({ recipient_ids: this.user_id }).exec(); const recipients = await Recipient.find({
const user = await UserModel.findOne({ id: this.user_id }).exec(); where: { id: this.user_id },
relations: ["channel", "channel.recipients"],
});
const channels = recipients.map((x) => x.channel);
const user = await User.findOneOrFail({ id: this.user_id });
if (!user) return this.close(CLOSECODES.Authentication_failed); if (!user) return this.close(CLOSECODES.Authentication_failed);
const public_user = { const public_user = {
@ -74,12 +80,9 @@ export async function onIdentify(this: WebSocket, data: Payload) {
public_flags: user.public_flags, public_flags: user.public_flags,
avatar: user.avatar, avatar: user.avatar,
bot: user.bot, bot: user.bot,
bio: user.bio,
}; };
const guilds = await GuildModel.find({ id: { $in: user.guilds } })
.populate({ path: "joined_at", match: { id: this.user_id } })
.exec();
const privateUser = { const privateUser = {
avatar: user.avatar, avatar: user.avatar,
mobile: user.mobile, mobile: user.mobile,
@ -99,14 +102,15 @@ export async function onIdentify(this: WebSocket, data: Payload) {
bot: user.bot, bot: user.bot,
accent_color: user.accent_color || 0, accent_color: user.accent_color || 0,
banner: user.banner, banner: user.banner,
bio: user.bio,
}; };
const d: ReadyEventData = { const d: ReadyEventData = {
v: 8, v: 8,
user: privateUser, user: privateUser,
user_settings: user.user_settings, user_settings: user.settings,
// @ts-ignore // @ts-ignore
guilds: toObject(guilds).map((x) => { guilds: guilds.map((x) => {
// @ts-ignore // @ts-ignore
x.guild_hashes = { x.guild_hashes = {
channels: { omitted: false, hash: "y4PV2fZ0gmo" }, channels: { omitted: false, hash: "y4PV2fZ0gmo" },
@ -118,7 +122,7 @@ export async function onIdentify(this: WebSocket, data: Payload) {
}), }),
guild_experiments: [], // TODO guild_experiments: [], // TODO
geo_ordered_rtc_regions: [], // TODO geo_ordered_rtc_regions: [], // TODO
relationships: user.user_data.relationships, relationships: user.relationships,
read_state: { read_state: {
// TODO // TODO
entries: [], entries: [],
@ -130,12 +134,7 @@ export async function onIdentify(this: WebSocket, data: Payload) {
partial: false, // TODO partial partial: false, // TODO partial
version: 642, version: 642,
}, },
// @ts-ignore private_channels: channels,
private_channels: toObject(channels).map((x: ChannelDocument) => {
x.recipient_ids = x.recipients.map((y: any) => y.id);
delete x.recipients;
return x;
}),
session_id: "", // TODO session_id: "", // TODO
analytics_token: "", // TODO analytics_token: "", // TODO
connected_accounts: [], // TODO connected_accounts: [], // TODO
@ -144,17 +143,12 @@ export async function onIdentify(this: WebSocket, data: Payload) {
consented: false, // TODO consented: false, // TODO
}, },
}, },
country_code: user.user_settings.locale, country_code: user.settings.locale,
friend_suggestion_count: 0, // TODO friend_suggestion_count: 0, // TODO
// @ts-ignore // @ts-ignore
experiments: experiments, // TODO experiments: experiments, // TODO
guild_join_requests: [], // TODO what is this? guild_join_requests: [], // TODO what is this?
users: [ users: [public_user].unique(), // TODO
public_user,
...toObject(channels)
.map((x: any) => x.recipients)
.flat(),
].unique(), // TODO
merged_members: merged_members, merged_members: merged_members,
// shard // TODO: only for bots sharding // shard // TODO: only for bots sharding
// application // TODO for applications // application // TODO for applications

View File

@ -18,45 +18,43 @@ export async function onLazyRequest(this: WebSocket, { d }: Payload) {
permissions.hasThrow("VIEW_CHANNEL"); permissions.hasThrow("VIEW_CHANNEL");
// MongoDB query to retrieve all hoisted roles and join them with the members and users collection // MongoDB query to retrieve all hoisted roles and join them with the members and users collection
const roles = toObject( const roles = await db
await db .collection("roles")
.collection("roles") .aggregate([
.aggregate([ {
{ $match: {
$match: { guild_id,
guild_id, // hoist: true // TODO: also match @everyone role
// hoist: true // TODO: also match @everyone role
},
}, },
{ $sort: { position: 1 } }, },
{ { $sort: { position: 1 } },
$lookup: { {
from: "members", $lookup: {
let: { id: "$id" }, from: "members",
pipeline: [ let: { id: "$id" },
{ $match: { $expr: { $in: ["$$id", "$roles"] } } }, pipeline: [
{ $limit: 100 }, { $match: { $expr: { $in: ["$$id", "$roles"] } } },
{ { $limit: 100 },
$lookup: { {
from: "users", $lookup: {
let: { user_id: "$id" }, from: "users",
pipeline: [ let: { user_id: "$id" },
{ $match: { $expr: { $eq: ["$id", "$$user_id"] } } }, pipeline: [
{ $project: PublicUserProjection }, { $match: { $expr: { $eq: ["$id", "$$user_id"] } } },
], { $project: PublicUserProjection },
as: "user", ],
}, as: "user",
}, },
{ },
$unwind: "$user", {
}, $unwind: "$user",
], },
as: "members", ],
}, as: "members",
}, },
]) },
.toArray() ])
); .toArray();
const groups = roles.map((x) => ({ id: x.id === guild_id ? "online" : x.id, count: x.members.length })); const groups = roles.map((x) => ({ id: x.id === guild_id ? "online" : x.id, count: x.members.length }));
const member_count = roles.reduce((a, b) => b.members.length + a, 0); const member_count = roles.reduce((a, b) => b.members.length + a, 0);

View File

@ -1,10 +1,47 @@
import { ActivityBodySchema } from "@fosscord/util";
import { EmojiSchema } from "./Emoji"; import { EmojiSchema } from "./Emoji";
export const ActivitySchema = { export const ActivitySchema = {
afk: Boolean, afk: Boolean,
status: String, status: String,
$activities: [ActivityBodySchema], $activities: [
{
name: String,
type: Number,
$url: String,
$created_at: Date,
$timestamps: [
{
$start: Number,
$end: Number,
},
],
$application_id: String,
$details: String,
$state: String,
$emoji: {
$name: String,
$id: String,
$amimated: Boolean,
},
$party: {
$id: String,
$size: [Number, Number],
},
$assets: {
$large_image: String,
$large_text: String,
$small_image: String,
$small_text: String,
},
$secrets: {
$join: String,
$spectate: String,
$match: String,
},
$instance: Boolean,
$flags: String,
},
],
$since: Number, // unix time (in milliseconds) of when the client went idle, or null if the client is not idle $since: Number, // unix time (in milliseconds) of when the client went idle, or null if the client is not idle
}; };
@ -42,7 +79,7 @@ export interface ActivitySchema {
match?: string; // the secret for a specific instanced match match?: string; // the secret for a specific instanced match
}; };
instance?: boolean; instance?: boolean;
flags: bigint; // activity flags OR d together, describes what the payload includes flags: string; // activity flags OR d together, describes what the payload includes
} }
]; ];
since?: number; // unix time (in milliseconds) of when the client went idle, or null if the client is not idle since?: number; // unix time (in milliseconds) of when the client went idle, or null if the client is not idle

3
util/.gitignore vendored
View File

@ -104,4 +104,5 @@ typings/
.DS_Store .DS_Store
# Compiled TypeScript code # Compiled TypeScript code
dist/ dist/
database.db

View File

@ -8,10 +8,20 @@
"sourceMaps": true, "sourceMaps": true,
"type": "node", "type": "node",
"request": "launch", "request": "launch",
"name": "Launch Server", "name": "Launch Util",
"program": "${workspaceFolder}/dist/index.js", "program": "${workspaceFolder}/dist/index.js",
"preLaunchTask": "tsc: build - tsconfig.json", "preLaunchTask": "tsc: build - tsconfig.json",
"outFiles": ["${workspaceFolder}/dist/**/*.js"] "outFiles": ["${workspaceFolder}/dist/**/*.js"]
},
{
"name": "Debug Jest Tests",
"type": "node",
"request": "launch",
"runtimeArgs": ["--inspect-brk", "${workspaceRoot}/node_modules/jest/bin/jest.js", "--runInBand"],
"preLaunchTask": "tsc: build - tsconfig.json",
"console": "integratedTerminal",
"internalConsoleOptions": "neverOpen",
"port": 9229
} }
] ]
} }

14744
util/package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@ -5,7 +5,10 @@
"main": "dist/index.js", "main": "dist/index.js",
"types": "dist/index.d.ts", "types": "dist/index.d.ts",
"scripts": { "scripts": {
"postinstall": "npm run build", "start": "npm run build && node dist/",
"patch": "patch-package",
"test": "npm run build && jest",
"postinstall": "npm run patch && npm run build",
"build": "npx tsc -b ." "build": "npx tsc -b ."
}, },
"repository": { "repository": {
@ -28,23 +31,32 @@
"devDependencies": { "devDependencies": {
"@types/amqplib": "^0.8.1", "@types/amqplib": "^0.8.1",
"@types/jsonwebtoken": "^8.5.0", "@types/jsonwebtoken": "^8.5.0",
"@types/mongodb": "^3.6.9",
"@types/mongoose-autopopulate": "^0.10.1", "@types/mongoose-autopopulate": "^0.10.1",
"@types/mongoose-lean-virtuals": "^0.5.1",
"@types/node": "^14.17.9", "@types/node": "^14.17.9",
"@types/node-fetch": "^2.5.12" "@types/node-fetch": "^2.5.12",
"jest": "^27.0.6"
}, },
"dependencies": { "dependencies": {
"ajv": "^8.5.0", "ajv": "^8.6.2",
"amqplib": "^0.8.0", "amqplib": "^0.8.0",
"class-validator": "^0.13.1",
"dot-prop": "^6.0.1", "dot-prop": "^6.0.1",
"env-paths": "^2.2.1", "env-paths": "^2.2.1",
"jsonwebtoken": "^8.5.1", "jsonwebtoken": "^8.5.1",
"missing-native-js-functions": "^1.2.10", "lambert-server": "^1.2.10",
"mongodb": "^3.6.9", "missing-native-js-functions": "^1.2.11",
"mongoose": "^5.13.7",
"mongoose-autopopulate": "^0.12.3",
"node-fetch": "^2.6.1", "node-fetch": "^2.6.1",
"typescript": "^4.1.3" "patch-package": "^6.4.7",
"pg": "^8.7.1",
"reflect-metadata": "^0.1.13",
"sqlite3": "^5.0.2",
"typeorm": "^0.2.37",
"typescript": "^4.4.2",
"typescript-json-schema": "^0.50.1"
},
"jest": {
"setupFilesAfterEnv": [
"./tests/setupJest.js"
]
} }
} }

View File

@ -0,0 +1,249 @@
diff --git a/node_modules/ajv/dist/compile/jtd/parse.js b/node_modules/ajv/dist/compile/jtd/parse.js
index 1eeb1be..7684121 100644
--- a/node_modules/ajv/dist/compile/jtd/parse.js
+++ b/node_modules/ajv/dist/compile/jtd/parse.js
@@ -239,6 +239,9 @@ function parseType(cxt) {
gen.if(fail, () => parsingError(cxt, codegen_1.str `invalid timestamp`));
break;
}
+ case "bigint":
+ parseBigInt(cxt);
+ break
case "float32":
case "float64":
parseNumber(cxt);
@@ -284,6 +287,15 @@ function parseNumber(cxt, maxDigits) {
skipWhitespace(cxt);
gen.if(codegen_1._ `"-0123456789".indexOf(${jsonSlice(1)}) < 0`, () => jsonSyntaxError(cxt), () => parseWith(cxt, parseJson_1.parseJsonNumber, maxDigits));
}
+function parseBigInt(cxt, maxDigits) {
+ const {gen} = cxt
+ skipWhitespace(cxt)
+ gen.if(
+ _`"-0123456789".indexOf(${jsonSlice(1)}) < 0`,
+ () => jsonSyntaxError(cxt),
+ () => parseWith(cxt, parseJson_1.parseJsonBigInt, maxDigits)
+ )
+}
function parseBooleanToken(bool, fail) {
return (cxt) => {
const { gen, data } = cxt;
diff --git a/node_modules/ajv/dist/compile/rules.js b/node_modules/ajv/dist/compile/rules.js
index 82a591f..1ebd8fe 100644
--- a/node_modules/ajv/dist/compile/rules.js
+++ b/node_modules/ajv/dist/compile/rules.js
@@ -1,7 +1,7 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.getRules = exports.isJSONType = void 0;
-const _jsonTypes = ["string", "number", "integer", "boolean", "null", "object", "array"];
+const _jsonTypes = ["string", "number", "integer", "boolean", "null", "object", "array","bigint"];
const jsonTypes = new Set(_jsonTypes);
function isJSONType(x) {
return typeof x == "string" && jsonTypes.has(x);
@@ -13,10 +13,11 @@ function getRules() {
string: { type: "string", rules: [] },
array: { type: "array", rules: [] },
object: { type: "object", rules: [] },
+ bigint: {type: "bigint", rules: []}
};
return {
- types: { ...groups, integer: true, boolean: true, null: true },
- rules: [{ rules: [] }, groups.number, groups.string, groups.array, groups.object],
+ types: { ...groups, integer: true, boolean: true, null: true, bigint: true },
+ rules: [{ rules: [] }, groups.number, groups.string, groups.array, groups.object, groups.bigint],
post: { rules: [] },
all: {},
keywords: {},
diff --git a/node_modules/ajv/dist/compile/validate/dataType.js b/node_modules/ajv/dist/compile/validate/dataType.js
index 6319e76..8b50b4c 100644
--- a/node_modules/ajv/dist/compile/validate/dataType.js
+++ b/node_modules/ajv/dist/compile/validate/dataType.js
@@ -52,7 +52,7 @@ function coerceAndCheckDataType(it, types) {
return checkTypes;
}
exports.coerceAndCheckDataType = coerceAndCheckDataType;
-const COERCIBLE = new Set(["string", "number", "integer", "boolean", "null"]);
+const COERCIBLE = new Set(["string", "number", "integer", "boolean", "null","bigint"]);
function coerceToTypes(types, coerceTypes) {
return coerceTypes
? types.filter((t) => COERCIBLE.has(t) || (coerceTypes === "array" && t === "array"))
@@ -83,6 +83,14 @@ function coerceData(it, types, coerceTo) {
});
function coerceSpecificType(t) {
switch (t) {
+ case "bigint":
+ gen
+ .elseIf(
+ codegen_1._`${dataType} == "boolean" || ${data} === null
+ || (${dataType} == "string" && ${data} && ${data} == BigInt(${data}))`
+ )
+ .assign(coerced, codegen_1._`BigInt(${data})`)
+ return
case "string":
gen
.elseIf(codegen_1._ `${dataType} == "number" || ${dataType} == "boolean"`)
@@ -143,6 +151,9 @@ function checkDataType(dataType, data, strictNums, correct = DataType.Correct) {
case "number":
cond = numCond();
break;
+ case "bigint":
+ cond = codegen_1._`typeof ${data} == "bigint" && isFinite(${data})`
+ break
default:
return codegen_1._ `typeof ${data} ${EQ} ${dataType}`;
}
diff --git a/node_modules/ajv/dist/refs/json-schema-2019-09/meta/validation.json b/node_modules/ajv/dist/refs/json-schema-2019-09/meta/validation.json
index 7027a12..25679c8 100644
--- a/node_modules/ajv/dist/refs/json-schema-2019-09/meta/validation.json
+++ b/node_modules/ajv/dist/refs/json-schema-2019-09/meta/validation.json
@@ -78,7 +78,7 @@
"default": 0
},
"simpleTypes": {
- "enum": ["array", "boolean", "integer", "null", "number", "object", "string"]
+ "enum": ["array", "boolean", "integer", "null", "number", "object", "string","bigint"]
},
"stringArray": {
"type": "array",
diff --git a/node_modules/ajv/dist/refs/json-schema-2020-12/meta/validation.json b/node_modules/ajv/dist/refs/json-schema-2020-12/meta/validation.json
index e0ae13d..57c9036 100644
--- a/node_modules/ajv/dist/refs/json-schema-2020-12/meta/validation.json
+++ b/node_modules/ajv/dist/refs/json-schema-2020-12/meta/validation.json
@@ -78,7 +78,7 @@
"default": 0
},
"simpleTypes": {
- "enum": ["array", "boolean", "integer", "null", "number", "object", "string"]
+ "enum": ["array", "boolean", "integer", "null", "number", "object", "string","bigint"]
},
"stringArray": {
"type": "array",
diff --git a/node_modules/ajv/dist/refs/json-schema-draft-06.json b/node_modules/ajv/dist/refs/json-schema-draft-06.json
index 5410064..774435b 100644
--- a/node_modules/ajv/dist/refs/json-schema-draft-06.json
+++ b/node_modules/ajv/dist/refs/json-schema-draft-06.json
@@ -16,7 +16,7 @@
"allOf": [{"$ref": "#/definitions/nonNegativeInteger"}, {"default": 0}]
},
"simpleTypes": {
- "enum": ["array", "boolean", "integer", "null", "number", "object", "string"]
+ "enum": ["array", "boolean", "integer", "null", "number", "object", "string","bigint"]
},
"stringArray": {
"type": "array",
diff --git a/node_modules/ajv/dist/refs/json-schema-draft-07.json b/node_modules/ajv/dist/refs/json-schema-draft-07.json
index 6a74851..fc6dd7d 100644
--- a/node_modules/ajv/dist/refs/json-schema-draft-07.json
+++ b/node_modules/ajv/dist/refs/json-schema-draft-07.json
@@ -16,7 +16,7 @@
"allOf": [{"$ref": "#/definitions/nonNegativeInteger"}, {"default": 0}]
},
"simpleTypes": {
- "enum": ["array", "boolean", "integer", "null", "number", "object", "string"]
+ "enum": ["array", "boolean", "integer", "null", "number", "object", "string","bigint"]
},
"stringArray": {
"type": "array",
diff --git a/node_modules/ajv/dist/refs/jtd-schema.js b/node_modules/ajv/dist/refs/jtd-schema.js
index 1ee940a..1148887 100644
--- a/node_modules/ajv/dist/refs/jtd-schema.js
+++ b/node_modules/ajv/dist/refs/jtd-schema.js
@@ -38,6 +38,7 @@ const typeForm = (root) => ({
"uint16",
"int32",
"uint32",
+ "bigint",
],
},
},
diff --git a/node_modules/ajv/dist/runtime/parseJson.js b/node_modules/ajv/dist/runtime/parseJson.js
index 2576a6e..e7447b1 100644
--- a/node_modules/ajv/dist/runtime/parseJson.js
+++ b/node_modules/ajv/dist/runtime/parseJson.js
@@ -97,6 +97,71 @@ exports.parseJsonNumber = parseJsonNumber;
parseJsonNumber.message = undefined;
parseJsonNumber.position = 0;
parseJsonNumber.code = 'require("ajv/dist/runtime/parseJson").parseJsonNumber';
+
+function parseJsonBigInt(s, pos, maxDigits) {
+ let numStr = "";
+ let c;
+ parseJsonBigInt.message = undefined;
+ if (s[pos] === "-") {
+ numStr += "-";
+ pos++;
+ }
+ if (s[pos] === "0") {
+ numStr += "0";
+ pos++;
+ }
+ else {
+ if (!parseDigits(maxDigits)) {
+ errorMessage();
+ return undefined;
+ }
+ }
+ if (maxDigits) {
+ parseJsonBigInt.position = pos;
+ return BigInt(numStr);
+ }
+ if (s[pos] === ".") {
+ numStr += ".";
+ pos++;
+ if (!parseDigits()) {
+ errorMessage();
+ return undefined;
+ }
+ }
+ if (((c = s[pos]), c === "e" || c === "E")) {
+ numStr += "e";
+ pos++;
+ if (((c = s[pos]), c === "+" || c === "-")) {
+ numStr += c;
+ pos++;
+ }
+ if (!parseDigits()) {
+ errorMessage();
+ return undefined;
+ }
+ }
+ parseJsonBigInt.position = pos;
+ return BigInt(numStr);
+ function parseDigits(maxLen) {
+ let digit = false;
+ while (((c = s[pos]), c >= "0" && c <= "9" && (maxLen === undefined || maxLen-- > 0))) {
+ digit = true;
+ numStr += c;
+ pos++;
+ }
+ return digit;
+ }
+ function errorMessage() {
+ parseJsonBigInt.position = pos;
+ parseJsonBigInt.message = pos < s.length ? `unexpected token ${s[pos]}` : "unexpected end";
+ }
+}
+exports.parseJsonBigInt = parseJsonBigInt;
+parseJsonBigInt.message = undefined;
+parseJsonBigInt.position = 0;
+parseJsonBigInt.code = 'require("ajv/dist/runtime/parseJson").parseJsonBigInt';
+
+
const escapedChars = {
b: "\b",
f: "\f",
diff --git a/node_modules/ajv/dist/vocabularies/jtd/type.js b/node_modules/ajv/dist/vocabularies/jtd/type.js
index 428bddb..fbc3070 100644
--- a/node_modules/ajv/dist/vocabularies/jtd/type.js
+++ b/node_modules/ajv/dist/vocabularies/jtd/type.js
@@ -45,6 +45,9 @@ const def = {
cond = timestampCode(cxt);
break;
}
+ case "bigint":
+ cond = codegen_1._`typeof ${data} == "bigint" || typeof ${data} == "string"`
+ break
case "float32":
case "float64":
cond = codegen_1._ `typeof ${data} == "number"`;

View File

@ -0,0 +1,14 @@
diff --git a/node_modules/typescript-json-schema/dist/typescript-json-schema.js b/node_modules/typescript-json-schema/dist/typescript-json-schema.js
index 47e1598..8397b9d 100644
--- a/node_modules/typescript-json-schema/dist/typescript-json-schema.js
+++ b/node_modules/typescript-json-schema/dist/typescript-json-schema.js
@@ -432,6 +432,9 @@ var JsonSchemaGenerator = (function () {
else if (flags & ts.TypeFlags.Boolean) {
definition.type = "boolean";
}
+ else if (flags & ts.TypeFlags.BigInt) {
+ definition.type = "bigint";
+ }
else if (flags & ts.TypeFlags.Null) {
definition.type = "null";
}

View File

@ -0,0 +1,107 @@
import { Column, Entity, JoinColumn, ManyToOne, RelationId } from "typeorm";
import { BaseClass } from "./BaseClass";
import { Guild } from "./Guild";
import { Team } from "./Team";
import { User } from "./User";
@Entity("applications")
export class Application extends BaseClass {
@Column()
name: string;
@Column({ nullable: true })
icon?: string;
@Column()
description: string;
@Column({ type: "simple-array", nullable: true })
rpc_origins?: string[];
@Column()
bot_public: boolean;
@Column()
bot_require_code_grant: boolean;
@Column({ nullable: true })
terms_of_service_url?: string;
@Column({ nullable: true })
privacy_policy_url?: string;
@JoinColumn({ name: "owner_id" })
@ManyToOne(() => User)
owner?: User;
@Column({ nullable: true })
summary?: string;
@Column()
verify_key: string;
@JoinColumn({ name: "team_id" })
@ManyToOne(() => Team)
team?: Team;
@JoinColumn({ name: "guild_id" })
@ManyToOne(() => Guild)
guild: Guild; // if this application is a game sold, this field will be the guild to which it has been linked
@Column({ nullable: true })
primary_sku_id?: string; // if this application is a game sold, this field will be the id of the "Game SKU" that is created,
@Column({ nullable: true })
slug?: string; // if this application is a game sold, this field will be the URL slug that links to the store page
@Column({ nullable: true })
cover_image?: string; // the application's default rich presence invite cover image hash
@Column()
flags: string; // the application's public flags
}
export interface ApplicationCommand {
id: string;
application_id: string;
name: string;
description: string;
options?: ApplicationCommandOption[];
}
export interface ApplicationCommandOption {
type: ApplicationCommandOptionType;
name: string;
description: string;
required?: boolean;
choices?: ApplicationCommandOptionChoice[];
options?: ApplicationCommandOption[];
}
export interface ApplicationCommandOptionChoice {
name: string;
value: string | number;
}
export enum ApplicationCommandOptionType {
SUB_COMMAND = 1,
SUB_COMMAND_GROUP = 2,
STRING = 3,
INTEGER = 4,
BOOLEAN = 5,
USER = 6,
CHANNEL = 7,
ROLE = 8,
}
export interface ApplicationCommandInteractionData {
id: string;
name: string;
options?: ApplicationCommandInteractionDataOption[];
}
export interface ApplicationCommandInteractionDataOption {
name: string;
value?: any;
options?: ApplicationCommandInteractionDataOption[];
}

Some files were not shown because too many files have changed in this diff Show More