e4d27f8d6b
Also: - General code refactoring - Allow banned/restricted users to see their scores etc - common.MethodData now contains UserPrivileges - UserPrivileges have now their own type - Implement md.HasQuery, to know if there's a GET querystring parameter or not
136 lines
3.3 KiB
Go
136 lines
3.3 KiB
Go
package app
|
|
|
|
import (
|
|
"crypto/md5"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"git.zxq.co/ripple/rippleapi/common"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// Method wraps an API method to a HandlerFunc.
|
|
func Method(f func(md common.MethodData) common.CodeMessager, privilegesNeeded ...int) gin.HandlerFunc {
|
|
return func(c *gin.Context) {
|
|
initialCaretaker(c, f, privilegesNeeded...)
|
|
}
|
|
}
|
|
|
|
func initialCaretaker(c *gin.Context, f func(md common.MethodData) common.CodeMessager, privilegesNeeded ...int) {
|
|
rateLimiter()
|
|
|
|
data, err := ioutil.ReadAll(c.Request.Body)
|
|
if err != nil {
|
|
c.Error(err)
|
|
}
|
|
|
|
token := ""
|
|
switch {
|
|
case c.Request.Header.Get("X-Ripple-Token") != "":
|
|
token = c.Request.Header.Get("X-Ripple-Token")
|
|
case c.Query("token") != "":
|
|
token = c.Query("token")
|
|
case c.Query("k") != "":
|
|
token = c.Query("k")
|
|
default:
|
|
token, _ = c.Cookie("rt")
|
|
}
|
|
c.Set("token", fmt.Sprintf("%x", md5.Sum([]byte(token))))
|
|
|
|
md := common.MethodData{
|
|
DB: db,
|
|
RequestData: data,
|
|
C: c,
|
|
}
|
|
if token != "" {
|
|
tokenReal, exists := GetTokenFull(token, db)
|
|
if exists {
|
|
md.User = tokenReal
|
|
}
|
|
}
|
|
|
|
var ip string
|
|
if requestIP, _, err := net.SplitHostPort(strings.TrimSpace(c.Request.RemoteAddr)); err != nil {
|
|
panic(err)
|
|
} else {
|
|
// if requestIP is not 127.0.0.1, means no reverse proxy is being used => direct request.
|
|
if requestIP != "127.0.0.1" {
|
|
ip = requestIP
|
|
}
|
|
}
|
|
|
|
// means we're using reverse-proxy, so X-Real-IP
|
|
if ip == "" {
|
|
ip = c.ClientIP()
|
|
}
|
|
|
|
// requests from hanayo should not be rate limited.
|
|
if !(c.Request.Header.Get("H-Key") == cf.HanayoKey && c.Request.UserAgent() == "hanayo") {
|
|
perUserRequestLimiter(md.ID(), c.ClientIP())
|
|
}
|
|
|
|
missingPrivileges := 0
|
|
for _, privilege := range privilegesNeeded {
|
|
if uint64(md.User.TokenPrivileges)&uint64(privilege) == 0 {
|
|
missingPrivileges |= privilege
|
|
}
|
|
}
|
|
if missingPrivileges != 0 {
|
|
c.IndentedJSON(401, common.SimpleResponse(401, "You don't have the privilege(s): "+common.Privileges(missingPrivileges).String()+"."))
|
|
return
|
|
}
|
|
|
|
resp := f(md)
|
|
if resp.GetCode() == 0 {
|
|
// Dirty hack to set the code
|
|
type setCoder interface {
|
|
SetCode(int)
|
|
}
|
|
if newver, can := resp.(setCoder); can {
|
|
newver.SetCode(500)
|
|
}
|
|
}
|
|
|
|
if md.HasQuery("pls200") {
|
|
c.Writer.WriteHeader(200)
|
|
} else {
|
|
c.Writer.WriteHeader(resp.GetCode())
|
|
}
|
|
|
|
if md.HasQuery("callback") {
|
|
c.Header("Content-Type", "application/javascript; charset=utf-8")
|
|
} else {
|
|
c.Header("Content-Type", "application/json; charset=utf-8")
|
|
}
|
|
|
|
mkjson(c, resp)
|
|
}
|
|
|
|
// Very restrictive, but this way it shouldn't completely fuck up.
|
|
var callbackJSONP = regexp.MustCompile(`^[a-zA-Z_\$][a-zA-Z0-9_\$]*$`)
|
|
|
|
// mkjson auto indents json, and wraps json into a jsonp callback if specified by the request.
|
|
// then writes to the gin.Context the data.
|
|
func mkjson(c *gin.Context, data interface{}) {
|
|
exported, err := json.MarshalIndent(data, "", "\t")
|
|
if err != nil {
|
|
c.Error(err)
|
|
exported = []byte(`{ "code": 500, "message": "something has gone really really really really really really wrong." }`)
|
|
}
|
|
cb := c.Query("callback")
|
|
willcb := cb != "" &&
|
|
len(cb) < 100 &&
|
|
callbackJSONP.MatchString(cb)
|
|
if willcb {
|
|
c.Writer.Write([]byte("/**/ typeof " + cb + " === 'function' && " + cb + "("))
|
|
}
|
|
c.Writer.Write(exported)
|
|
if willcb {
|
|
c.Writer.Write([]byte(");"))
|
|
}
|
|
}
|