2023-04-14 17:50:14 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2022-2023 Jordan Bancino <@jordan:bancino.net>
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person
|
|
|
|
* obtaining a copy of this software and associated documentation files
|
|
|
|
* (the "Software"), to deal in the Software without restriction,
|
|
|
|
* including without limitation the rights to use, copy, modify, merge,
|
|
|
|
* publish, distribute, sublicense, and/or sell copies of the Software,
|
|
|
|
* and to permit persons to whom the Software is furnished to do so,
|
|
|
|
* subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include <Routes.h>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <HashMap.h>
|
|
|
|
#include <Memory.h>
|
|
|
|
#include <User.h>
|
|
|
|
#include <Json.h>
|
|
|
|
#include <Str.h>
|
|
|
|
|
2023-04-14 21:20:56 +00:00
|
|
|
ROUTE_IMPL(RouteUserProfile, path, argp)
|
2023-04-14 17:50:14 +00:00
|
|
|
{
|
2023-04-14 21:20:56 +00:00
|
|
|
RouteArgs *args = argp;
|
2023-04-14 17:50:14 +00:00
|
|
|
Db *db = args->matrixArgs->db;
|
|
|
|
|
|
|
|
HashMap *request = NULL;
|
|
|
|
HashMap *response = NULL;
|
|
|
|
|
|
|
|
UserId *userId = NULL;
|
|
|
|
User *user = NULL;
|
|
|
|
|
2023-04-19 00:33:38 +00:00
|
|
|
char *serverName;
|
2023-04-14 17:50:14 +00:00
|
|
|
char *username = NULL;
|
|
|
|
char *entry = NULL;
|
|
|
|
char *token = NULL;
|
|
|
|
char *value = NULL;
|
|
|
|
|
2023-04-19 00:33:38 +00:00
|
|
|
Config *config = ConfigLock(db);
|
2023-04-19 02:07:38 +00:00
|
|
|
|
2023-04-19 00:33:38 +00:00
|
|
|
if (!config)
|
|
|
|
{
|
|
|
|
Log(LOG_ERR, "User profile endpoint failed to lock configuration.");
|
|
|
|
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
|
2023-08-05 19:26:03 +00:00
|
|
|
return MatrixErrorCreate(M_UNKNOWN, NULL);
|
2023-04-19 00:33:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
serverName = config->serverName;
|
|
|
|
|
2023-04-14 21:20:56 +00:00
|
|
|
username = ArrayGet(path, 0);
|
2023-04-14 17:50:14 +00:00
|
|
|
userId = UserIdParse(username, serverName);
|
|
|
|
if (!userId)
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_INVALID_PARAM, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
if (strcmp(userId->server, serverName))
|
|
|
|
{
|
|
|
|
/* TODO: Implement lookup over federation. */
|
|
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_FORBIDDEN, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: Actually implement user data */
|
|
|
|
switch (HttpRequestMethodGet(args->context))
|
|
|
|
{
|
|
|
|
case HTTP_GET:
|
|
|
|
user = UserLock(db, userId->localpart);
|
|
|
|
if (!user)
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_NOT_FOUND);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_NOT_FOUND, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
2023-04-14 21:20:56 +00:00
|
|
|
|
|
|
|
if (ArraySize(path) > 1)
|
2023-04-14 17:50:14 +00:00
|
|
|
{
|
2023-04-14 21:20:56 +00:00
|
|
|
entry = ArrayGet(path, 1);
|
2023-04-14 17:50:14 +00:00
|
|
|
response = HashMapCreate();
|
|
|
|
|
|
|
|
value = UserGetProfile(user, entry);
|
|
|
|
if (value)
|
|
|
|
{
|
|
|
|
HashMapSet(response, entry, JsonValueString(value));
|
|
|
|
}
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
response = HashMapCreate();
|
|
|
|
value = UserGetProfile(user, "avatar_url");
|
|
|
|
if (value)
|
|
|
|
{
|
|
|
|
HashMapSet(response, "avatar_url", JsonValueString(value));
|
|
|
|
}
|
|
|
|
value = UserGetProfile(user, "displayname");
|
|
|
|
if (value)
|
|
|
|
{
|
|
|
|
HashMapSet(response, "displayname", JsonValueString(value));
|
|
|
|
}
|
|
|
|
goto finish;
|
|
|
|
case HTTP_PUT:
|
2023-04-14 21:20:56 +00:00
|
|
|
if (ArraySize(path) > 1)
|
2023-04-14 17:50:14 +00:00
|
|
|
{
|
|
|
|
request = JsonDecode(HttpServerStream(args->context));
|
|
|
|
if (!request)
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_NOT_JSON, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
response = MatrixGetAccessToken(args->context, &token);
|
|
|
|
if (response)
|
|
|
|
{
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
user = UserAuthenticate(db, token);
|
|
|
|
if (!user)
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
2023-04-14 21:20:56 +00:00
|
|
|
entry = ArrayGet(path, 1);
|
2023-05-06 22:34:36 +00:00
|
|
|
if (StrEquals(entry, "displayname") ||
|
|
|
|
StrEquals(entry, "avatar_url"))
|
2023-04-14 17:50:14 +00:00
|
|
|
{
|
|
|
|
/* Check if user has privilege to do that action. */
|
2023-04-16 17:51:03 +00:00
|
|
|
if (strcmp(userId->localpart, UserGetName(user)) == 0)
|
2023-04-14 17:50:14 +00:00
|
|
|
{
|
|
|
|
value = JsonValueAsString(HashMapGet(request, entry));
|
|
|
|
/* TODO: Make UserSetProfile notify other
|
|
|
|
* parties of the change */
|
|
|
|
UserSetProfile(user, entry, value);
|
|
|
|
response = HashMapCreate();
|
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
/* User is not allowed to carry-on the action */
|
|
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_FORBIDDEN, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_UNRECOGNIZED, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_MISSING_PARAM, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
goto finish;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
2023-08-05 19:26:03 +00:00
|
|
|
response = MatrixErrorCreate(M_UNKNOWN, NULL);
|
2023-04-14 17:50:14 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
finish:
|
2023-04-19 00:33:38 +00:00
|
|
|
ConfigUnlock(config);
|
2023-09-11 14:57:16 +00:00
|
|
|
|
|
|
|
/* Username is handled by the router, freeing it *will* cause issues
|
|
|
|
* (see #33). I honestly don't know how it didn't come to bite us sooner.
|
|
|
|
Free(username); */
|
2023-04-14 17:50:14 +00:00
|
|
|
Free(entry);
|
|
|
|
UserIdFree(userId);
|
|
|
|
UserUnlock(user);
|
|
|
|
JsonFree(request);
|
|
|
|
return response;
|
|
|
|
}
|