forked from Telodendria/Telodendria
Jordan Bancino
1fee47a628
This pull request also requires the use of the external [Cytoplasm](/Telodendria/Cytoplasm) repository by removing the in-tree copy of Cytoplasm. The increased modularity requires a little more complex build process, but is overall better. Closes #19 The appropriate documentation has been updated. Closes #18 --- Please review the developer certificate of origin: 1. The contribution was created in whole or in part by me, and I have the right to submit it under the open source licenses of the Telodendria project; or 1. The contribution is based upon a previous work that, to the best of my knowledge, is covered under an appropriate open source license and I have the right under that license to submit that work with modifications, whether created in whole or in part by me, under the Telodendria project license; or 1. The contribution was provided directly to me by some other person who certified (1), (2), or (3), and I have not modified it. 1. I understand and agree that this project and the contribution are made public and that a record of the contribution—including all personal information I submit with it—is maintained indefinitely and may be redistributed consistent with this project or the open source licenses involved. - [x] I have read the Telodendria Project development certificate of origin, and I certify that I have permission to submit this patch under the conditions specified in it. Reviewed-on: Telodendria/Telodendria#38
184 lines
6.3 KiB
C
184 lines
6.3 KiB
C
/*
|
|
* Copyright (C) 2022-2023 Jordan Bancino <@jordan:bancino.net>
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person
|
|
* obtaining a copy of this software and associated documentation files
|
|
* (the "Software"), to deal in the Software without restriction,
|
|
* including without limitation the rights to use, copy, modify, merge,
|
|
* publish, distribute, sublicense, and/or sell copies of the Software,
|
|
* and to permit persons to whom the Software is furnished to do so,
|
|
* subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be
|
|
* included in all copies or portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
* SOFTWARE.
|
|
*/
|
|
#include <Routes.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <Cytoplasm/HashMap.h>
|
|
#include <Cytoplasm/Memory.h>
|
|
#include <User.h>
|
|
#include <Cytoplasm/Json.h>
|
|
#include <Cytoplasm/Str.h>
|
|
|
|
ROUTE_IMPL(RouteUserProfile, path, argp)
|
|
{
|
|
RouteArgs *args = argp;
|
|
Db *db = args->matrixArgs->db;
|
|
|
|
HashMap *request = NULL;
|
|
HashMap *response = NULL;
|
|
|
|
UserId *userId = NULL;
|
|
User *user = NULL;
|
|
|
|
char *serverName;
|
|
char *username = NULL;
|
|
char *entry = NULL;
|
|
char *token = NULL;
|
|
char *value = NULL;
|
|
|
|
Config *config = ConfigLock(db);
|
|
|
|
if (!config)
|
|
{
|
|
Log(LOG_ERR, "User profile endpoint failed to lock configuration.");
|
|
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
|
|
return MatrixErrorCreate(M_UNKNOWN, NULL);
|
|
}
|
|
|
|
serverName = config->serverName;
|
|
|
|
username = ArrayGet(path, 0);
|
|
userId = UserIdParse(username, serverName);
|
|
if (!userId)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_INVALID_PARAM, NULL);
|
|
goto finish;
|
|
}
|
|
if (strcmp(userId->server, serverName))
|
|
{
|
|
/* TODO: Implement lookup over federation. */
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
|
response = MatrixErrorCreate(M_FORBIDDEN, NULL);
|
|
goto finish;
|
|
}
|
|
|
|
/* TODO: Actually implement user data */
|
|
switch (HttpRequestMethodGet(args->context))
|
|
{
|
|
case HTTP_GET:
|
|
user = UserLock(db, userId->localpart);
|
|
if (!user)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_NOT_FOUND);
|
|
response = MatrixErrorCreate(M_NOT_FOUND, NULL);
|
|
goto finish;
|
|
}
|
|
|
|
if (ArraySize(path) > 1)
|
|
{
|
|
entry = ArrayGet(path, 1);
|
|
response = HashMapCreate();
|
|
|
|
value = UserGetProfile(user, entry);
|
|
if (value)
|
|
{
|
|
HashMapSet(response, entry, JsonValueString(value));
|
|
}
|
|
goto finish;
|
|
}
|
|
response = HashMapCreate();
|
|
value = UserGetProfile(user, "avatar_url");
|
|
if (value)
|
|
{
|
|
HashMapSet(response, "avatar_url", JsonValueString(value));
|
|
}
|
|
value = UserGetProfile(user, "displayname");
|
|
if (value)
|
|
{
|
|
HashMapSet(response, "displayname", JsonValueString(value));
|
|
}
|
|
goto finish;
|
|
case HTTP_PUT:
|
|
if (ArraySize(path) > 1)
|
|
{
|
|
request = JsonDecode(HttpServerStream(args->context));
|
|
if (!request)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_NOT_JSON, NULL);
|
|
goto finish;
|
|
}
|
|
response = MatrixGetAccessToken(args->context, &token);
|
|
if (response)
|
|
{
|
|
goto finish;
|
|
}
|
|
user = UserAuthenticate(db, token);
|
|
if (!user)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
|
|
goto finish;
|
|
}
|
|
entry = ArrayGet(path, 1);
|
|
if (StrEquals(entry, "displayname") ||
|
|
StrEquals(entry, "avatar_url"))
|
|
{
|
|
/* Check if user has privilege to do that action. */
|
|
if (strcmp(userId->localpart, UserGetName(user)) == 0)
|
|
{
|
|
value = JsonValueAsString(HashMapGet(request, entry));
|
|
/* TODO: Make UserSetProfile notify other
|
|
* parties of the change */
|
|
UserSetProfile(user, entry, value);
|
|
response = HashMapCreate();
|
|
goto finish;
|
|
}
|
|
/* User is not allowed to carry-on the action */
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
|
response = MatrixErrorCreate(M_FORBIDDEN, NULL);
|
|
goto finish;
|
|
}
|
|
else
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNRECOGNIZED, NULL);
|
|
goto finish;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_MISSING_PARAM, NULL);
|
|
goto finish;
|
|
}
|
|
default:
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNKNOWN, NULL);
|
|
break;
|
|
}
|
|
finish:
|
|
ConfigUnlock(config);
|
|
|
|
/* Username is handled by the router, freeing it *will* cause issues
|
|
* (see #33). I honestly don't know how it didn't come to bite us sooner.
|
|
Free(username); */
|
|
Free(entry);
|
|
UserIdFree(userId);
|
|
UserUnlock(user);
|
|
JsonFree(request);
|
|
return response;
|
|
}
|