reminder-bot/web/src/lib.rs

216 lines
6.4 KiB
Rust
Raw Normal View History

2022-02-11 17:44:08 +00:00
#[macro_use]
extern crate rocket;
mod consts;
#[macro_use]
mod macros;
2022-02-11 17:44:08 +00:00
mod routes;
use std::{collections::HashMap, env, path::Path};
2022-02-11 17:44:08 +00:00
2022-02-19 22:11:21 +00:00
use oauth2::{basic::BasicClient, AuthUrl, ClientId, ClientSecret, RedirectUrl, TokenUrl};
use rocket::{
fs::FileServer,
serde::json::{json, Value as JsonValue},
tokio::sync::broadcast::Sender,
};
2022-02-11 17:44:08 +00:00
use rocket_dyn_templates::Template;
use serenity::{
client::Context,
http::CacheHttp,
model::id::{GuildId, UserId},
};
2022-02-11 17:44:08 +00:00
use sqlx::{MySql, Pool};
2022-02-19 22:11:21 +00:00
use crate::consts::{CNC_GUILD, DISCORD_OAUTH_AUTHORIZE, DISCORD_OAUTH_TOKEN, SUBSCRIPTION_ROLES};
2022-02-11 17:44:08 +00:00
type Database = MySql;
#[derive(Debug)]
enum Error {
SQLx(sqlx::Error),
Serenity(serenity::Error),
}
2022-02-11 17:44:08 +00:00
#[catch(401)]
async fn not_authorized() -> Template {
let map: HashMap<String, String> = HashMap::new();
Template::render("errors/401", &map)
}
#[catch(403)]
async fn forbidden() -> Template {
let map: HashMap<String, String> = HashMap::new();
Template::render("errors/403", &map)
}
#[catch(404)]
async fn not_found() -> Template {
let map: HashMap<String, String> = HashMap::new();
Template::render("errors/404", &map)
}
#[catch(413)]
async fn payload_too_large() -> JsonValue {
json!({"error": "Data too large.", "errors": ["Data too large."]})
}
#[catch(422)]
async fn unprocessable_entity() -> JsonValue {
json!({"error": "Invalid request.", "errors": ["Invalid request."]})
}
2022-02-11 17:44:08 +00:00
#[catch(500)]
async fn internal_server_error() -> Template {
let map: HashMap<String, String> = HashMap::new();
Template::render("errors/500", &map)
}
pub async fn initialize(
2022-03-21 23:11:52 +00:00
kill_channel: Sender<()>,
2022-02-11 17:44:08 +00:00
serenity_context: Context,
db_pool: Pool<Database>,
) -> Result<(), Box<dyn std::error::Error>> {
info!("Checking environment variables...");
env::var("OAUTH2_CLIENT_ID").expect("`OAUTH2_CLIENT_ID' not supplied");
env::var("OAUTH2_CLIENT_SECRET").expect("`OAUTH2_CLIENT_SECRET' not supplied");
env::var("OAUTH2_DISCORD_CALLBACK").expect("`OAUTH2_DISCORD_CALLBACK' not supplied");
env::var("PATREON_GUILD_ID").expect("`PATREON_GUILD_ID' not supplied");
info!("Done!");
2022-02-11 17:44:08 +00:00
let oauth2_client = BasicClient::new(
ClientId::new(env::var("OAUTH2_CLIENT_ID")?),
Some(ClientSecret::new(env::var("OAUTH2_CLIENT_SECRET")?)),
AuthUrl::new(DISCORD_OAUTH_AUTHORIZE.to_string())?,
Some(TokenUrl::new(DISCORD_OAUTH_TOKEN.to_string())?),
)
.set_redirect_uri(RedirectUrl::new(env::var("OAUTH2_DISCORD_CALLBACK")?)?);
let reqwest_client = reqwest::Client::new();
let static_path =
if Path::new("web/static").exists() { "web/static" } else { "/lib/reminder-rs/static" };
2022-02-11 17:44:08 +00:00
rocket::build()
.attach(Template::fairing())
.register(
"/",
catchers![
not_authorized,
forbidden,
not_found,
internal_server_error,
unprocessable_entity,
payload_too_large,
],
)
2022-02-11 17:44:08 +00:00
.manage(oauth2_client)
.manage(reqwest_client)
.manage(serenity_context)
.manage(db_pool)
.mount("/static", FileServer::from(static_path))
2022-02-11 17:44:08 +00:00
.mount(
"/",
routes![
routes::index,
routes::cookies,
routes::privacy,
routes::terms,
2023-06-20 12:13:26 +00:00
routes::return_to_same_site,
routes::report::report_error,
2022-03-20 21:04:24 +00:00
],
)
.mount(
"/help",
routes![
2022-02-11 17:44:08 +00:00
routes::help,
routes::help_timezone,
2022-03-20 21:04:24 +00:00
routes::help_create_reminder,
2022-03-20 21:41:38 +00:00
routes::help_delete_reminder,
routes::help_timers,
routes::help_todo_lists,
routes::help_macros,
2022-05-14 11:02:46 +00:00
routes::help_intervals,
routes::help_dashboard,
routes::help_iemanager,
2022-02-11 17:44:08 +00:00
],
)
2023-06-20 07:50:12 +00:00
.mount(
"/login",
routes![
routes::login::discord_login,
routes::login::discord_logout,
routes::login::discord_callback
],
)
2022-02-11 17:44:08 +00:00
.mount(
"/dashboard",
routes![
routes::dashboard::dashboard,
2022-02-11 17:44:08 +00:00
routes::dashboard::dashboard_home,
routes::dashboard::user::get_user_info,
routes::dashboard::user::update_user_info,
routes::dashboard::user::get_user_guilds,
2022-04-19 14:23:27 +00:00
routes::dashboard::guild::get_guild_patreon,
2022-02-11 17:44:08 +00:00
routes::dashboard::guild::get_guild_channels,
routes::dashboard::guild::get_guild_roles,
routes::dashboard::guild::get_reminder_templates,
routes::dashboard::guild::create_reminder_template,
routes::dashboard::guild::delete_reminder_template,
2022-07-24 19:06:37 +00:00
routes::dashboard::guild::create_guild_reminder,
2022-02-11 17:44:08 +00:00
routes::dashboard::guild::get_reminders,
routes::dashboard::guild::edit_reminder,
routes::dashboard::guild::delete_reminder,
2022-07-22 22:30:45 +00:00
routes::dashboard::export::export_reminders,
routes::dashboard::export::export_reminder_templates,
routes::dashboard::export::export_todos,
routes::dashboard::export::import_reminders,
routes::dashboard::export::import_todos,
2022-02-11 17:44:08 +00:00
],
)
.launch()
.await?;
2022-03-21 23:11:52 +00:00
warn!("Exiting rocket runtime");
// distribute kill signal
2022-03-22 22:21:47 +00:00
match kill_channel.send(()) {
Ok(_) => {}
Err(e) => {
error!("Failed to issue kill signal: {:?}", e);
}
}
2022-03-21 23:11:52 +00:00
2022-02-11 17:44:08 +00:00
Ok(())
2022-02-06 15:47:59 +00:00
}
pub async fn check_subscription(cache_http: impl CacheHttp, user_id: impl Into<UserId>) -> bool {
if let Some(subscription_guild) = *CNC_GUILD {
let guild_member = GuildId(subscription_guild).member(cache_http, user_id).await;
if let Ok(member) = guild_member {
for role in member.roles {
if SUBSCRIPTION_ROLES.contains(role.as_u64()) {
return true;
}
}
}
false
} else {
true
}
}
pub async fn check_guild_subscription(
cache_http: impl CacheHttp,
guild_id: impl Into<GuildId>,
) -> bool {
if let Some(guild) = cache_http.cache().unwrap().guild(guild_id) {
let owner = guild.owner_id;
check_subscription(&cache_http, owner).await
} else {
false
}
}