finish migration to Pilz.NET

This commit is contained in:
Schedel Pascal
2024-08-23 11:18:46 +02:00
parent 90283ff5df
commit 4cd52de441
10 changed files with 103 additions and 110 deletions

View File

@@ -1,6 +1,6 @@
namespace OwnChar.Server.Api.Endpoint;
internal class CharactersApi(IServer server) : IApiEndpoint
internal class CharactersApi(IOwnCharServer server) : IApiEndpoint
{
public void Initialize(IApiBuilder builder)
{

View File

@@ -1,44 +1,33 @@
using OwnChar.Api.Packets;
using OwnChar.Api.Packets.General;
using OwnChar.Api.Packets.General;
using OwnChar.Api.Packets.Groups;
using OwnChar.Api.Updates;
using OwnChar.Data;
using OwnChar.Data.Model.Client;
using OwnChar.Server.Data.Model;
using OwnChar.Server.Extensions;
using Pilz.Net.Api;
namespace OwnChar.Server.Api.Endpoint;
internal class GroupsApi(IServer server) : IApiEndpoint
internal class GroupsApi(IOwnCharServer server)
{
public void Initialize(IApiBuilder builder)
[MessageHandler("/group/get/byid")]
public ApiResult GetById(GetSinlgeObjectRequest request, ApiRequestInfo info)
{
builder.Map("/groups/get/byid", GetById);
builder.Map("/groups/get", Get);
builder.Map("/groups/create", Create);
builder.Map("/groups/update", Update);
builder.Map("/groups/delete", Delete);
builder.Map("/groups/members/get", GetMembers);
builder.Map("/groups/members/add", AddMembers);
builder.Map("/groups/members/update", UpdateMember);
builder.Map("/groups/members/remove", RemoveMembers);
}
private IResult GetById(GetSinlgeObjectRequest request)
{
if (!server.CheckLogin(request, UserType.Guest, out UserAccountDb? user))
return TypedResults.Unauthorized();
if (!server.CheckLogin(info, UserType.Guest, out UserAccountDb? user))
return ApiResult.Unauthorized();
if (server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.ObjectId && n.Members.Any(m => m.User != null && m.User.Id == user.Id)) is not GroupDb group)
return TypedResults.Ok(new GetSingleObjectResponse<Group>(null).With(OwnCharResponseError.NotFound));
return ApiResult.NotFound();
return TypedResults.Ok(new GetSingleObjectResponse<Group>(group.ToClient()));
return ApiResult.Ok(new GetSingleObjectResponse<Group>(group.ToClient()));
}
private IResult Get(GetGroupsRequest request)
[MessageHandler("/group/get", RequiesAuth = true)]
public ApiResult Get(GetGroupsRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.Guest, out UserAccountDb? user))
return TypedResults.Unauthorized();
if (!server.CheckLogin(info, UserType.Guest, out UserAccountDb? user))
return ApiResult.Unauthorized();
IQueryable<GroupDb> groups;
@@ -49,13 +38,14 @@ internal class GroupsApi(IServer server) : IApiEndpoint
else
groups = Array.Empty<GroupDb>().AsQueryable(); // Currently not supported.
return TypedResults.Ok(new GetGroupsResponse([.. groups.Select(g => g.ToClient())]));
return ApiResult.Ok(new GetGroupsResponse([.. groups.Select(g => g.ToClient())]));
}
private IResult Create(CreateGroupRequest request)
[MessageHandler("/group/create", RequiesAuth = true)]
public ApiResult Create(CreateGroupRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user))
return TypedResults.Unauthorized();
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user))
return ApiResult.Unauthorized();
var group = new GroupDb();
@@ -71,19 +61,20 @@ internal class GroupsApi(IServer server) : IApiEndpoint
server.Data!.Update(group);
server.Data.SaveChanges();
return TypedResults.Ok(new CreateGroupResponse(group.ToClient()));
return ApiResult.Ok(new CreateGroupResponse(group.ToClient()));
}
private IResult Update(UpdateRequest request)
[MessageHandler("/group/update", RequiesAuth = true)]
public ApiResult Update(UpdateRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.Update.Id) is not GroupDb group
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Admin
|| user.IsNot(UserType.Admin)))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
if (request.Update is not GroupUpdate update)
return TypedResults.Ok(new UpdateResponse().With(OwnCharResponseError.Default));
return ApiResult.NotFound();
group.Name = update.Name;
group.Fandom = update.Fandom;
@@ -91,42 +82,45 @@ internal class GroupsApi(IServer server) : IApiEndpoint
server.Data.Update(group);
server.Data.SaveChanges();
return TypedResults.Ok(new UpdateResponse());
return ApiResult.Ok();
}
private IResult Delete(DeleteObjectRequest request)
[MessageHandler("/group/delete", RequiesAuth = true)]
public ApiResult Delete(DeleteObjectRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.ObjectId) is not GroupDb group
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Owner)
|| user.IsNot(UserType.Admin))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
server.Data.Remove(group);
server.Data.SaveChanges();
return TypedResults.Ok(new DeleteObjectResponse());
return ApiResult.Ok();
}
private IResult GetMembers(GetGroupMembersRequest request)
[MessageHandler("/group/members/get", RequiesAuth = true)]
public ApiResult GetMembers(GetGroupMembersRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.GroupId) is not GroupDb group
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Member)
|| user.IsNot(UserType.Admin))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
var members = group.Members.Select(n => n.ToClient());
return TypedResults.Ok(new GetGroupMembersResponse(members.ToList()));
return ApiResult.Ok(new GetGroupMembersResponse(members.ToList()));
}
private IResult AddMembers(GroupMemberAddRequest request)
[MessageHandler("/group/members/add", RequiesAuth = true)]
public ApiResult AddMembers(GroupMemberAddRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.GroupId) is not GroupDb group
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Admin)
|| user.IsNot(UserType.Admin))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
var addedMembers = new List<MemberEntryDb>();
@@ -146,43 +140,45 @@ internal class GroupsApi(IServer server) : IApiEndpoint
}
}
return TypedResults.Ok(new GroupMemberAddResponse(addedMembers.Select(m => m.ToClient()).ToList()));
return ApiResult.Ok(new GroupMemberAddResponse(addedMembers.Select(m => m.ToClient()).ToList()));
}
private IResult UpdateMember(UpdateRequest request)
[MessageHandler("/group/members/update", RequiesAuth = true)]
public ApiResult UpdateMember(UpdateRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Id == request.Update.Id) is not GroupDb group
|| group.Members.FirstOrDefault(m => m.Id == request.Update.Id) is not MemberEntryDb member
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Admin
|| user.IsNot(UserType.Admin)))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
if (request.Update is not MemberUpdate update)
return TypedResults.Ok(new UpdateResponse().With(OwnCharResponseError.Default));
return ApiResult.NotFound();
member.Level = update.Level;
server.Data.Update(member);
server.Data.SaveChanges();
return TypedResults.Ok(new UpdateResponse());
return ApiResult.Ok();
}
private IResult RemoveMembers(DeleteObjectRequest request)
[MessageHandler("/group/members/remove", RequiesAuth = true)]
public ApiResult RemoveMembers(DeleteObjectRequest request, ApiRequestInfo info)
{
if (!server.CheckLogin(request, UserType.User, out UserAccountDb? user)
if (!server.CheckLogin(info, UserType.User, out UserAccountDb? user)
|| server.Data?.Set<MemberEntryDb>().FirstOrDefault(m => m.Id == request.ObjectId) is not MemberEntryDb member
|| server.Data?.Set<GroupDb>().FirstOrDefault(n => n.Members.Contains(member)) is not GroupDb group
|| !group.Members.Any(m => m.Id == user.Profile!.Id && m.Level >= MemberLevel.Admin
|| user.IsNot(UserType.Admin)))
return TypedResults.Unauthorized();
return ApiResult.Unauthorized();
group.Members.Remove(member);
server.Data.Remove(member);
server.Data.Update(group);
server.Data.SaveChanges();
return TypedResults.Ok(new DeleteObjectResponse());
return ApiResult.Ok();
}
}

View File

@@ -1,6 +0,0 @@
namespace OwnChar.Server.Api.Endpoint;
internal interface IApiEndpoint
{
void Initialize(IApiBuilder builder);
}

View File

@@ -2,41 +2,29 @@
using OwnChar.Api.Packets.General;
using OwnChar.Server.Data.Model;
using OwnChar.Server.Extensions;
using Pilz.Net.Api;
namespace OwnChar.Server.Api.Endpoint;
internal class LoginApi(ServerContext server) : IApiEndpoint
internal class LoginApi(ServerContext server)
{
public void Initialize(IApiBuilder builder)
[MessageHandler("/auth/login")]
public ApiResult Login(LoginRequest request, ApiRequestInfo info)
{
builder.Map("/auth/login", Login);
builder.Map("/auth/logout", Logout);
if (server.Data?.Set<UserAccountDb>()?.FirstOrDefault(n => n.Username == request.Username && n.Password == request.Password) is UserAccountDb acc && acc.Profile != null)
{
if (info.IsAuthenticated)
server.Logout(info.AuthKey);
return ApiResult.Ok(new LoginResponse(acc.ToClient(), acc.Profile.ToClient(), server.Login(acc)));
}
return ApiResult.NotFound();
}
private IResult Login(LoginRequest request)
[MessageHandler("/auth/logout")]
public ApiResult Logout(ApiRequestInfo info)
{
LoginResponse? result;
if (server.Data != null
&& server.Data.Set<UserAccountDb>()?.FirstOrDefault(n => n.Username == request.Username && n.Password == request.Password) is UserAccountDb acc
&& acc.Profile != null)
{
result = new(acc.ToClient(), acc.Profile.ToClient(), server.Login(acc));
}
else
{
result = new(null, null, null)
{
ErrorCode = OwnCharResponseError.NotFound,
};
}
return TypedResults.Ok(result);
}
private IResult Logout(LogoutRequest request)
{
server.Logout(request.AuthSecret);
return TypedResults.Ok(new LogoutResponse());
if (info.IsAuthenticated)
server.Logout(info.AuthKey);
return ApiResult.Ok();
}
}

View File

@@ -1,6 +1,6 @@
namespace OwnChar.Server.Api.Endpoint;
internal class UsersApi(IServer server) : IApiEndpoint
internal class UsersApi(IOwnCharServer server) : IApiEndpoint
{
public void Initialize(IApiBuilder builder)
{

View File

@@ -6,7 +6,7 @@ using System.Diagnostics.CodeAnalysis;
namespace OwnChar.Server.Api;
public interface IServer : IApiServer
public interface IOwnCharServer : IApiServer
{
ISettings Settings { get; }
DbContext? Data { get; }

View File

@@ -1,5 +1,4 @@
using OwnChar.Server.Api.Endpoint;
using Pilz.Plugins.Advanced;
using Pilz.Plugins.Advanced;
namespace OwnChar.Server.Api.Plugins;
@@ -7,5 +6,5 @@ public abstract class ApiEndpointFeature(string identifier) : PluginFeature(Feat
{
public static string FeatureType => "ownchar.server.apiep";
public abstract void OnServerInit(IServer init);
public abstract void OnServerInit(IOwnCharServer init);
}

View File

@@ -3,7 +3,7 @@ using OwnChar.Server.Api;
namespace OwnChar.Server.Api.Plugins;
public class OwnCharServerPluginInitParams(IServer server) : OwnCharPluginInitParams
public class OwnCharServerPluginInitParams(IOwnCharServer server) : OwnCharPluginInitParams
{
public IServer Server { get; } = server;
public IOwnCharServer Server { get; } = server;
}

View File

@@ -3,31 +3,40 @@ using OwnChar.Data;
using OwnChar.Data.Model.Base;
using OwnChar.Server.Api;
using OwnChar.Server.Data.Model;
using Pilz.Net.Api;
using System.Diagnostics.CodeAnalysis;
namespace OwnChar.Server.Extensions;
public static class GeneralExtensions
{
public static bool CheckLogin(this IServer server, OwnCharRequest request, UserType userType)
public static bool CheckLogin(this IOwnCharServer server, ApiRequestInfo request, UserType userType)
{
if (server.Data is null
|| string.IsNullOrWhiteSpace(request.Username)
|| string.IsNullOrWhiteSpace(request.AuthSecret)
|| !server.IsLoggedIn(request.AuthSecret)
|| server.GetUser(request.AuthSecret) is not UserAccountBase usr
|| !request.IsAuthenticated
|| request.AuthKey.Split(":") is not string[] authKey
|| authKey.ElementAtOrDefault(0) is not string username
|| authKey.ElementAtOrDefault(1) is not string secret
|| string.IsNullOrWhiteSpace(username)
|| string.IsNullOrWhiteSpace(secret)
|| !server.IsLoggedIn(secret)
|| server.GetUser(secret) is not UserAccountBase usr
|| usr.Type < userType)
return false;
return true;
}
public static bool CheckLogin(this IServer server, OwnCharRequest request, UserType userType, [NotNullWhen(true)] out UserAccountDb? user)
public static bool CheckLogin(this IOwnCharServer server, ApiRequestInfo request, UserType userType, [NotNullWhen(true)] out UserAccountDb? user)
{
if (server.Data is null
|| string.IsNullOrWhiteSpace(request.Username)
|| string.IsNullOrWhiteSpace(request.AuthSecret)
|| !server.IsLoggedIn(request.AuthSecret)
|| server.GetUser(request.AuthSecret) is not UserAccountDb usr
|| !request.IsAuthenticated
|| request.AuthKey.Split(":") is not string[] authKey
|| authKey.ElementAtOrDefault(0) is not string username
|| authKey.ElementAtOrDefault(1) is not string secret
|| string.IsNullOrWhiteSpace(username)
|| string.IsNullOrWhiteSpace(secret)
|| !server.IsLoggedIn(secret)
|| server.GetUser(secret) is not UserAccountDb usr
|| usr.Type < userType)
{
user = null;

View File

@@ -12,7 +12,7 @@ using Pilz.Plugins.Advanced;
namespace OwnChar.Server;
internal class ServerContext(ISettings settings) : ApiServer(settings.Get<ServerSettings>().ApiUrl!), IServer
internal class ServerContext(ISettings settings) : ApiServer(settings.Get<ServerSettings>().ApiUrl!), IOwnCharServer
{
private readonly Dictionary<string, UserAccountBase> users = [];
@@ -47,12 +47,19 @@ internal class ServerContext(ISettings settings) : ApiServer(settings.Get<Server
protected override string? DecodeAuthKey(string authKey)
{
return base.DecodeAuthKey(new SecureString(authKey, true));
if (!string.IsNullOrWhiteSpace(authKey))
return new SecureString(authKey, true).Value;
return authKey;
}
protected override bool CheckAuthentication(string authKey)
{
return base.CheckAuthentication(authKey) || IsLoggedIn(authKey);
return string.IsNullOrWhiteSpace(authKey)
|| authKey.Split(":") is not string[] authKeyParts
|| authKey.Length != 2
|| string.IsNullOrWhiteSpace(authKeyParts[0])
|| string.IsNullOrWhiteSpace(authKeyParts[1])
|| !IsLoggedIn(authKeyParts[1]);
}
public string Login(UserAccountBase account)