2022-02-11 17:44:08 +00:00
|
|
|
#[macro_use]
|
|
|
|
extern crate rocket;
|
|
|
|
|
|
|
|
mod consts;
|
2022-03-05 19:43:02 +00:00
|
|
|
#[macro_use]
|
|
|
|
mod macros;
|
2022-02-11 17:44:08 +00:00
|
|
|
mod routes;
|
|
|
|
|
2022-02-19 22:11:21 +00:00
|
|
|
use std::{collections::HashMap, env};
|
2022-02-11 17:44:08 +00:00
|
|
|
|
2022-02-19 22:11:21 +00:00
|
|
|
use oauth2::{basic::BasicClient, AuthUrl, ClientId, ClientSecret, RedirectUrl, TokenUrl};
|
2022-04-07 16:13:02 +00:00
|
|
|
use rocket::{
|
|
|
|
fs::FileServer,
|
2022-04-07 20:41:24 +00:00
|
|
|
serde::json::{json, Value as JsonValue},
|
2022-04-07 16:13:02 +00:00
|
|
|
tokio::sync::broadcast::Sender,
|
|
|
|
};
|
2022-02-11 17:44:08 +00:00
|
|
|
use rocket_dyn_templates::Template;
|
2022-03-05 19:43:02 +00:00
|
|
|
use serenity::{
|
|
|
|
client::Context,
|
|
|
|
http::CacheHttp,
|
|
|
|
model::id::{GuildId, UserId},
|
|
|
|
};
|
2022-02-11 17:44:08 +00:00
|
|
|
use sqlx::{MySql, Pool};
|
2022-02-19 22:11:21 +00:00
|
|
|
|
2022-03-05 19:43:02 +00:00
|
|
|
use crate::consts::{CNC_GUILD, DISCORD_OAUTH_AUTHORIZE, DISCORD_OAUTH_TOKEN, SUBSCRIPTION_ROLES};
|
2022-02-11 17:44:08 +00:00
|
|
|
|
|
|
|
type Database = MySql;
|
|
|
|
|
2022-03-05 19:43:02 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
enum Error {
|
|
|
|
SQLx(sqlx::Error),
|
2022-03-19 21:28:11 +00:00
|
|
|
Serenity(serenity::Error),
|
2022-03-05 19:43:02 +00:00
|
|
|
}
|
|
|
|
|
2022-02-11 17:44:08 +00:00
|
|
|
#[catch(401)]
|
|
|
|
async fn not_authorized() -> Template {
|
|
|
|
let map: HashMap<String, String> = HashMap::new();
|
|
|
|
Template::render("errors/401", &map)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[catch(403)]
|
|
|
|
async fn forbidden() -> Template {
|
|
|
|
let map: HashMap<String, String> = HashMap::new();
|
|
|
|
Template::render("errors/403", &map)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[catch(404)]
|
|
|
|
async fn not_found() -> Template {
|
|
|
|
let map: HashMap<String, String> = HashMap::new();
|
|
|
|
Template::render("errors/404", &map)
|
|
|
|
}
|
|
|
|
|
2022-04-09 11:21:28 +00:00
|
|
|
#[catch(413)]
|
|
|
|
async fn payload_too_large() -> JsonValue {
|
|
|
|
json!({"error": "Data too large.", "errors": ["Data too large."]})
|
|
|
|
}
|
|
|
|
|
2022-04-07 16:13:02 +00:00
|
|
|
#[catch(422)]
|
|
|
|
async fn unprocessable_entity() -> JsonValue {
|
|
|
|
json!({"error": "Invalid request.", "errors": ["Invalid request."]})
|
|
|
|
}
|
|
|
|
|
2022-02-11 17:44:08 +00:00
|
|
|
#[catch(500)]
|
|
|
|
async fn internal_server_error() -> Template {
|
|
|
|
let map: HashMap<String, String> = HashMap::new();
|
|
|
|
Template::render("errors/500", &map)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn initialize(
|
2022-03-21 23:11:52 +00:00
|
|
|
kill_channel: Sender<()>,
|
2022-02-11 17:44:08 +00:00
|
|
|
serenity_context: Context,
|
|
|
|
db_pool: Pool<Database>,
|
|
|
|
) -> Result<(), Box<dyn std::error::Error>> {
|
2022-04-09 11:21:28 +00:00
|
|
|
info!("Checking environment variables...");
|
|
|
|
env::var("OAUTH2_CLIENT_ID").expect("`OAUTH2_CLIENT_ID' not supplied");
|
|
|
|
env::var("OAUTH2_CLIENT_SECRET").expect("`OAUTH2_CLIENT_SECRET' not supplied");
|
|
|
|
env::var("OAUTH2_DISCORD_CALLBACK").expect("`OAUTH2_DISCORD_CALLBACK' not supplied");
|
|
|
|
env::var("PATREON_GUILD_ID").expect("`PATREON_GUILD' not supplied");
|
|
|
|
info!("Done!");
|
|
|
|
|
2022-02-11 17:44:08 +00:00
|
|
|
let oauth2_client = BasicClient::new(
|
|
|
|
ClientId::new(env::var("OAUTH2_CLIENT_ID")?),
|
|
|
|
Some(ClientSecret::new(env::var("OAUTH2_CLIENT_SECRET")?)),
|
|
|
|
AuthUrl::new(DISCORD_OAUTH_AUTHORIZE.to_string())?,
|
|
|
|
Some(TokenUrl::new(DISCORD_OAUTH_TOKEN.to_string())?),
|
|
|
|
)
|
|
|
|
.set_redirect_uri(RedirectUrl::new(env::var("OAUTH2_DISCORD_CALLBACK")?)?);
|
|
|
|
|
|
|
|
let reqwest_client = reqwest::Client::new();
|
|
|
|
|
|
|
|
rocket::build()
|
|
|
|
.attach(Template::fairing())
|
2022-04-07 16:13:02 +00:00
|
|
|
.register(
|
|
|
|
"/",
|
|
|
|
catchers![
|
|
|
|
not_authorized,
|
|
|
|
forbidden,
|
|
|
|
not_found,
|
|
|
|
internal_server_error,
|
2022-04-09 11:21:28 +00:00
|
|
|
unprocessable_entity,
|
|
|
|
payload_too_large,
|
2022-04-07 16:13:02 +00:00
|
|
|
],
|
|
|
|
)
|
2022-02-11 17:44:08 +00:00
|
|
|
.manage(oauth2_client)
|
|
|
|
.manage(reqwest_client)
|
|
|
|
.manage(serenity_context)
|
|
|
|
.manage(db_pool)
|
|
|
|
.mount("/static", FileServer::from(concat!(env!("CARGO_MANIFEST_DIR"), "/static")))
|
|
|
|
.mount(
|
|
|
|
"/",
|
|
|
|
routes![
|
|
|
|
routes::index,
|
|
|
|
routes::cookies,
|
|
|
|
routes::privacy,
|
|
|
|
routes::terms,
|
2022-03-20 21:04:24 +00:00
|
|
|
routes::return_to_same_site
|
|
|
|
],
|
|
|
|
)
|
|
|
|
.mount(
|
|
|
|
"/help",
|
|
|
|
routes![
|
2022-02-11 17:44:08 +00:00
|
|
|
routes::help,
|
2022-03-19 23:47:40 +00:00
|
|
|
routes::help_timezone,
|
2022-03-20 21:04:24 +00:00
|
|
|
routes::help_create_reminder,
|
2022-03-20 21:41:38 +00:00
|
|
|
routes::help_delete_reminder,
|
|
|
|
routes::help_timers,
|
|
|
|
routes::help_todo_lists,
|
|
|
|
routes::help_macros,
|
2022-05-14 11:02:46 +00:00
|
|
|
routes::help_intervals,
|
|
|
|
routes::help_dashboard,
|
|
|
|
routes::help_iemanager,
|
2022-02-11 17:44:08 +00:00
|
|
|
],
|
|
|
|
)
|
|
|
|
.mount("/login", routes![routes::login::discord_login, routes::login::discord_callback])
|
|
|
|
.mount(
|
|
|
|
"/dashboard",
|
|
|
|
routes![
|
2022-04-07 20:41:24 +00:00
|
|
|
routes::dashboard::dashboard,
|
2022-02-11 17:44:08 +00:00
|
|
|
routes::dashboard::dashboard_home,
|
|
|
|
routes::dashboard::user::get_user_info,
|
|
|
|
routes::dashboard::user::update_user_info,
|
|
|
|
routes::dashboard::user::get_user_guilds,
|
2022-04-19 14:23:27 +00:00
|
|
|
routes::dashboard::guild::get_guild_patreon,
|
2022-02-11 17:44:08 +00:00
|
|
|
routes::dashboard::guild::get_guild_channels,
|
|
|
|
routes::dashboard::guild::get_guild_roles,
|
2022-04-07 20:41:24 +00:00
|
|
|
routes::dashboard::guild::get_reminder_templates,
|
|
|
|
routes::dashboard::guild::create_reminder_template,
|
2022-04-09 11:21:28 +00:00
|
|
|
routes::dashboard::guild::delete_reminder_template,
|
2022-07-24 19:06:37 +00:00
|
|
|
routes::dashboard::guild::create_guild_reminder,
|
2022-02-11 17:44:08 +00:00
|
|
|
routes::dashboard::guild::get_reminders,
|
|
|
|
routes::dashboard::guild::edit_reminder,
|
|
|
|
routes::dashboard::guild::delete_reminder,
|
2022-07-22 22:30:45 +00:00
|
|
|
routes::dashboard::export::export_reminders,
|
|
|
|
routes::dashboard::export::export_reminder_templates,
|
|
|
|
routes::dashboard::export::export_todos,
|
|
|
|
routes::dashboard::export::import_reminders,
|
|
|
|
routes::dashboard::export::import_todos,
|
2022-02-11 17:44:08 +00:00
|
|
|
],
|
|
|
|
)
|
|
|
|
.launch()
|
|
|
|
.await?;
|
|
|
|
|
2022-03-21 23:11:52 +00:00
|
|
|
warn!("Exiting rocket runtime");
|
|
|
|
// distribute kill signal
|
2022-03-22 22:21:47 +00:00
|
|
|
match kill_channel.send(()) {
|
|
|
|
Ok(_) => {}
|
|
|
|
Err(e) => {
|
|
|
|
error!("Failed to issue kill signal: {:?}", e);
|
|
|
|
}
|
|
|
|
}
|
2022-03-21 23:11:52 +00:00
|
|
|
|
2022-02-11 17:44:08 +00:00
|
|
|
Ok(())
|
2022-02-06 15:47:59 +00:00
|
|
|
}
|
2022-03-05 19:43:02 +00:00
|
|
|
|
|
|
|
pub async fn check_subscription(cache_http: impl CacheHttp, user_id: impl Into<UserId>) -> bool {
|
|
|
|
if let Some(subscription_guild) = *CNC_GUILD {
|
|
|
|
let guild_member = GuildId(subscription_guild).member(cache_http, user_id).await;
|
|
|
|
|
|
|
|
if let Ok(member) = guild_member {
|
|
|
|
for role in member.roles {
|
|
|
|
if SUBSCRIPTION_ROLES.contains(role.as_u64()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
false
|
|
|
|
} else {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn check_guild_subscription(
|
|
|
|
cache_http: impl CacheHttp,
|
|
|
|
guild_id: impl Into<GuildId>,
|
|
|
|
) -> bool {
|
|
|
|
if let Some(guild) = cache_http.cache().unwrap().guild(guild_id) {
|
|
|
|
let owner = guild.owner_id;
|
|
|
|
|
|
|
|
check_subscription(&cache_http, owner).await
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|