rogueserver/api/endpoints.go

686 lines
17 KiB
Go
Raw Normal View History

2024-04-29 17:26:46 -04:00
/*
Copyright (C) 2024 Pagefault Games
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2024-04-29 15:32:58 -04:00
2023-12-05 13:28:08 -05:00
package api
import (
2024-05-09 14:26:54 -04:00
"database/sql"
2024-04-08 20:44:36 -04:00
"encoding/json"
2024-05-12 20:05:46 +02:00
"errors"
2024-04-08 20:44:36 -04:00
"fmt"
"net/http"
2024-04-08 20:44:36 -04:00
"strconv"
2024-04-29 15:22:27 -04:00
"github.com/pagefaultgames/rogueserver/api/account"
"github.com/pagefaultgames/rogueserver/api/daily"
"github.com/pagefaultgames/rogueserver/api/savedata"
"github.com/pagefaultgames/rogueserver/db"
"github.com/pagefaultgames/rogueserver/defs"
)
2023-12-29 14:30:47 -05:00
2024-04-08 20:44:36 -04:00
/*
The caller of endpoint handler functions are responsible for extracting the necessary data from the request.
Handler functions are responsible for checking the validity of this data and returning a result or error.
Handlers should not return serialized JSON, instead return the struct itself.
*/
// account
2023-12-29 14:30:47 -05:00
func handleAccountInfo(w http.ResponseWriter, r *http.Request) {
2024-05-05 16:12:10 -04:00
uuid, err := uuidFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
return
2024-04-19 03:27:47 -04:00
}
2024-04-08 20:44:36 -04:00
2024-05-05 16:12:10 -04:00
username, err := db.FetchUsernameFromUUID(uuid)
if err != nil {
2024-05-05 16:12:10 -04:00
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-04-08 20:44:36 -04:00
response, err := account.Info(username, uuid)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-04-08 20:44:36 -04:00
2024-05-23 14:15:44 -04:00
writeJSON(w, r, response)
}
2024-04-20 16:58:04 -04:00
func handleAccountRegister(w http.ResponseWriter, r *http.Request) {
err := r.ParseForm()
if err != nil {
httpError(w, r, fmt.Errorf("failed to parse request form: %s", err), http.StatusBadRequest)
return
}
2024-04-08 20:44:36 -04:00
err = account.Register(r.Form.Get("username"), r.Form.Get("password"))
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2023-12-29 14:30:47 -05:00
w.WriteHeader(http.StatusOK)
}
2024-04-08 20:44:36 -04:00
func handleAccountLogin(w http.ResponseWriter, r *http.Request) {
err := r.ParseForm()
if err != nil {
httpError(w, r, fmt.Errorf("failed to parse request form: %s", err), http.StatusBadRequest)
return
}
2024-04-19 03:27:47 -04:00
response, err := account.Login(r.Form.Get("username"), r.Form.Get("password"))
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-04-20 16:58:04 -04:00
2024-05-23 14:15:44 -04:00
writeJSON(w, r, response)
}
2024-04-19 03:27:47 -04:00
2024-04-28 17:27:58 -04:00
func handleAccountChangePW(w http.ResponseWriter, r *http.Request) {
err := r.ParseForm()
if err != nil {
httpError(w, r, fmt.Errorf("failed to parse request form: %s", err), http.StatusBadRequest)
return
}
uuid, err := uuidFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
2024-04-28 17:27:58 -04:00
return
}
err = account.ChangePW(uuid, r.Form.Get("password"))
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusOK)
}
func handleAccountLogout(w http.ResponseWriter, r *http.Request) {
token, err := tokenFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusBadRequest)
return
}
2024-04-19 03:27:47 -04:00
err = account.Logout(token)
if err != nil {
// also possible for InternalServerError but that's unlikely unless the server blew up
httpError(w, r, err, http.StatusUnauthorized)
return
}
2024-04-20 16:58:04 -04:00
w.WriteHeader(http.StatusOK)
}
2024-03-23 21:34:18 -04:00
// game
func handleGameTitleStats(w http.ResponseWriter, r *http.Request) {
2024-05-12 20:05:46 +02:00
stats := defs.TitleStats{
PlayerCount: playerCount,
BattleCount: battleCount,
}
2024-04-08 20:44:36 -04:00
2024-05-23 14:15:44 -04:00
writeJSON(w, r, stats)
}
func handleGameClassicSessionCount(w http.ResponseWriter, r *http.Request) {
2024-06-02 18:15:24 -04:00
w.Write([]byte(strconv.Itoa(classicSessionCount)))
}
2024-06-07 22:23:02 -04:00
func handleSession(w http.ResponseWriter, r *http.Request) {
2024-05-14 14:30:04 +02:00
uuid, err := uuidFromRequest(r)
2024-05-14 12:54:06 +02:00
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
2024-05-14 12:54:06 +02:00
return
}
2024-06-07 22:38:24 -04:00
slot, err := strconv.Atoi(r.URL.Query().Get("slot"))
2024-05-12 20:05:46 +02:00
if err != nil {
httpError(w, r, err, http.StatusBadRequest)
return
}
2024-06-07 22:38:24 -04:00
if slot < 0 || slot >= defs.SessionSlotCount {
httpError(w, r, fmt.Errorf("slot id %d out of range", slot), http.StatusBadRequest)
2024-05-12 20:05:46 +02:00
return
}
2024-06-02 18:23:51 -04:00
if !r.URL.Query().Has("clientSessionId") {
2024-05-14 12:54:06 +02:00
httpError(w, r, fmt.Errorf("missing clientSessionId"), http.StatusBadRequest)
2024-05-12 20:05:46 +02:00
return
}
2024-06-02 18:23:51 -04:00
err = db.UpdateActiveSession(uuid, r.URL.Query().Get("clientSessionId"))
if err != nil {
2024-05-14 12:54:06 +02:00
httpError(w, r, fmt.Errorf("failed to update active session: %s", err), http.StatusBadRequest)
return
}
2024-06-09 20:03:27 -04:00
switch r.PathValue("action") {
default:
fallthrough
case "get":
2024-06-07 22:23:02 -04:00
save, err := savedata.GetSession(uuid, slot)
if errors.Is(err, sql.ErrNoRows) {
http.Error(w, err.Error(), http.StatusNotFound)
return
}
if err != nil {
2024-06-07 22:23:02 -04:00
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-07 22:23:02 -04:00
writeJSON(w, r, save)
2024-06-09 20:03:27 -04:00
case "update":
2024-06-07 22:23:02 -04:00
var session defs.SessionSaveData
err = json.NewDecoder(r.Body).Decode(&session)
if err != nil {
2024-06-07 22:23:02 -04:00
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
2024-06-07 22:23:02 -04:00
err = savedata.PutSession(uuid, slot, session)
if err != nil {
2024-06-07 22:23:02 -04:00
httpError(w, r, fmt.Errorf("failed to put session data: %s", err), http.StatusInternalServerError)
return
}
2024-06-09 20:03:27 -04:00
w.WriteHeader(http.StatusOK)
case "clear":
var session defs.SessionSaveData
err = json.NewDecoder(r.Body).Decode(&session)
if err != nil {
2024-06-09 20:03:27 -04:00
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
2024-06-09 20:03:27 -04:00
seed, err := db.GetDailyRunSeed()
if err != nil {
2024-06-09 20:03:27 -04:00
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-09 20:03:27 -04:00
resp, err := savedata.Clear(uuid, slot, seed, session)
if err != nil {
2024-06-09 20:03:27 -04:00
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-09 20:03:27 -04:00
writeJSON(w, r, resp)
case "newclear":
resp, err := savedata.NewClear(uuid, slot)
if err != nil {
2024-06-09 20:03:27 -04:00
httpError(w, r, fmt.Errorf("failed to read new clear: %s", err), http.StatusInternalServerError)
return
}
2024-06-09 20:03:27 -04:00
writeJSON(w, r, resp)
case "delete":
err := savedata.DeleteSession(uuid, slot)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-09 20:03:27 -04:00
w.WriteHeader(http.StatusOK)
}
}
2024-06-09 20:03:27 -04:00
const legacyClientSessionId = "LEGACY_CLIENT"
2024-05-14 12:54:06 +02:00
func legacyHandleSaveData(w http.ResponseWriter, r *http.Request) {
uuid, err := uuidFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
return
}
datatype := -1
if r.URL.Query().Has("datatype") {
datatype, err = strconv.Atoi(r.URL.Query().Get("datatype"))
if err != nil {
httpError(w, r, err, http.StatusBadRequest)
return
2024-04-08 20:44:36 -04:00
}
}
2024-04-08 20:44:36 -04:00
var slot int
if r.URL.Query().Has("slot") {
slot, err = strconv.Atoi(r.URL.Query().Get("slot"))
if err != nil {
2024-04-21 16:52:26 -04:00
httpError(w, r, err, http.StatusBadRequest)
return
}
}
2024-06-02 18:23:51 -04:00
clientSessionId := r.URL.Query().Get("clientSessionId")
2024-05-14 12:54:06 +02:00
if clientSessionId == "" {
clientSessionId = legacyClientSessionId
}
var save any
2024-06-07 18:24:55 -04:00
// /savedata/delete specify datatype, but don't expect data in body
if r.URL.Path != "/savedata/delete" {
if datatype == 0 {
var system defs.SystemSaveData
err = json.NewDecoder(r.Body).Decode(&system)
if err != nil {
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
save = system
// /savedata/clear doesn't specify datatype, it is assumed to be 1 (session)
} else if datatype == 1 || r.URL.Path == "/savedata/clear" {
var session defs.SessionSaveData
err = json.NewDecoder(r.Body).Decode(&session)
if err != nil {
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
2024-04-21 16:52:26 -04:00
save = session
2024-04-21 16:52:26 -04:00
}
}
var active bool
2024-06-07 18:24:55 -04:00
active, err = db.IsActiveSession(uuid, clientSessionId)
if err != nil {
httpError(w, r, fmt.Errorf("failed to check active session: %s", err), http.StatusBadRequest)
return
}
// TODO: make this not suck
if !active && r.URL.Path != "/savedata/clear" {
httpError(w, r, fmt.Errorf("session out of date: not active"), http.StatusBadRequest)
return
}
var trainerId, secretId int
if r.URL.Path != "/savedata/update" || datatype == 1 {
if r.URL.Query().Has("trainerId") && r.URL.Query().Has("secretId") {
trainerId, err = strconv.Atoi(r.URL.Query().Get("trainerId"))
2024-04-30 15:26:13 -04:00
if err != nil {
2024-06-07 18:24:55 -04:00
httpError(w, r, err, http.StatusBadRequest)
2024-04-30 15:26:13 -04:00
return
}
2024-04-08 20:44:36 -04:00
2024-06-07 18:24:55 -04:00
secretId, err = strconv.Atoi(r.URL.Query().Get("secretId"))
2024-04-30 15:26:13 -04:00
if err != nil {
2024-06-07 18:24:55 -04:00
httpError(w, r, err, http.StatusBadRequest)
2024-04-30 15:26:13 -04:00
return
}
}
} else {
2024-06-07 18:24:55 -04:00
trainerId = save.(defs.SystemSaveData).TrainerId
secretId = save.(defs.SystemSaveData).SecretId
}
2024-06-07 18:24:55 -04:00
storedTrainerId, storedSecretId, err := db.FetchTrainerIds(uuid)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-07 18:24:55 -04:00
if storedTrainerId > 0 || storedSecretId > 0 {
if trainerId != storedTrainerId || secretId != storedSecretId {
httpError(w, r, fmt.Errorf("session out of date: stored trainer or secret ID does not match"), http.StatusBadRequest)
return
}
2024-06-07 18:24:55 -04:00
} else {
if err := db.UpdateTrainerIds(trainerId, secretId, uuid); err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
}
2024-04-08 20:44:36 -04:00
switch r.URL.Path {
case "/savedata/update":
err = savedata.Update(uuid, slot, save)
case "/savedata/delete":
err = savedata.Delete(uuid, datatype, slot)
case "/savedata/clear":
if !active {
// TODO: make this not suck
2024-05-15 07:28:49 +02:00
save = savedata.ClearResponse{Error: "session out of date: not active"}
break
}
2024-04-08 20:44:36 -04:00
2024-05-08 18:53:58 +02:00
var seed string
seed, err = db.GetDailyRunSeed()
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
// doesn't return a save, but it works
save, err = savedata.Clear(uuid, slot, seed, save.(defs.SessionSaveData))
}
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-04-08 20:44:36 -04:00
if save == nil || r.URL.Path == "/savedata/update" {
w.WriteHeader(http.StatusOK)
return
}
2024-04-08 20:44:36 -04:00
2024-05-23 14:15:44 -04:00
writeJSON(w, r, save)
}
2024-04-08 20:44:36 -04:00
2024-05-12 03:34:08 +02:00
type CombinedSaveData struct {
2024-05-14 12:54:06 +02:00
System defs.SystemSaveData `json:"system"`
Session defs.SessionSaveData `json:"session"`
SessionSlotId int `json:"sessionSlotId"`
ClientSessionId string `json:"clientSessionId"`
2024-05-12 03:34:08 +02:00
}
2024-05-12 03:42:35 +02:00
// TODO wrap this in a transaction
func handleUpdateAll(w http.ResponseWriter, r *http.Request) {
2024-05-14 14:30:04 +02:00
uuid, err := uuidFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
return
}
2024-05-12 03:34:08 +02:00
var data CombinedSaveData
err = json.NewDecoder(r.Body).Decode(&data)
if err != nil {
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
2024-06-07 18:05:41 -04:00
2024-05-15 04:08:42 +02:00
if data.ClientSessionId == "" {
data.ClientSessionId = legacyClientSessionId
}
2024-05-12 03:34:08 +02:00
var active bool
2024-05-15 04:07:47 +02:00
active, err = db.IsActiveSession(uuid, data.ClientSessionId)
2024-05-12 03:34:08 +02:00
if err != nil {
httpError(w, r, fmt.Errorf("failed to check active session: %s", err), http.StatusBadRequest)
return
}
if !active {
2024-05-15 07:28:49 +02:00
httpError(w, r, fmt.Errorf("session out of date: not active"), http.StatusBadRequest)
2024-05-12 03:34:08 +02:00
return
}
storedTrainerId, storedSecretId, err := db.FetchTrainerIds(uuid)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
if storedTrainerId > 0 || storedSecretId > 0 {
2024-06-07 18:05:41 -04:00
if data.System.TrainerId != storedTrainerId || data.System.SecretId != storedSecretId {
2024-05-15 07:28:49 +02:00
httpError(w, r, fmt.Errorf("session out of date: stored trainer or secret ID does not match"), http.StatusBadRequest)
2024-05-12 03:34:08 +02:00
return
}
} else {
2024-06-07 18:05:41 -04:00
err = db.UpdateTrainerIds(data.System.TrainerId, data.System.SecretId, uuid)
if err != nil {
2024-05-12 03:34:08 +02:00
httpError(w, r, err, http.StatusInternalServerError)
return
}
}
err = savedata.Update(uuid, data.SessionSlotId, data.Session)
2024-05-08 18:53:58 +02:00
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-06-07 18:05:41 -04:00
2024-05-12 03:34:08 +02:00
err = savedata.Update(uuid, 0, data.System)
2024-05-08 18:53:58 +02:00
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-05-12 03:34:08 +02:00
w.WriteHeader(http.StatusOK)
2024-05-14 12:54:06 +02:00
}
2024-05-15 00:00:38 +02:00
type SystemVerifyRequest struct {
2024-05-14 12:54:06 +02:00
ClientSessionId string `json:"clientSessionId"`
}
2024-05-15 00:00:38 +02:00
type SystemVerifyResponse struct {
2024-06-09 20:03:27 -04:00
Valid bool `json:"valid"`
SystemData defs.SystemSaveData `json:"systemData"`
2024-05-14 12:54:06 +02:00
}
2024-06-07 22:23:02 -04:00
func handleSystem(w http.ResponseWriter, r *http.Request) {
2024-05-14 14:30:04 +02:00
uuid, err := uuidFromRequest(r)
2024-05-14 12:54:06 +02:00
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
2024-05-14 12:54:06 +02:00
return
}
var active bool
2024-06-10 14:56:15 -04:00
if r.URL.Path != "/savedata/system/verify" {
if !r.URL.Query().Has("clientSessionId") {
httpError(w, r, fmt.Errorf("missing clientSessionId"), http.StatusBadRequest)
return
}
active, err = db.IsActiveSession(uuid, r.URL.Query().Get("clientSessionId"))
if err != nil {
httpError(w, r, fmt.Errorf("failed to check active session: %s", err), http.StatusBadRequest)
return
}
2024-05-14 12:54:06 +02:00
}
2024-06-09 20:03:27 -04:00
switch r.PathValue("action") {
default:
fallthrough
case "get":
if !active {
err = db.UpdateActiveSession(uuid, r.URL.Query().Get("clientSessionId"))
if err != nil {
httpError(w, r, fmt.Errorf("failed to update active session: %s", err), http.StatusBadRequest)
return
}
}
2024-05-14 12:54:06 +02:00
2024-06-07 22:23:02 -04:00
save, err := savedata.GetSystem(uuid)
2024-05-14 12:54:06 +02:00
if err != nil {
2024-06-07 22:23:02 -04:00
if errors.Is(err, sql.ErrNoRows) {
http.Error(w, err.Error(), http.StatusNotFound)
} else {
httpError(w, r, err, http.StatusInternalServerError)
}
2024-06-07 22:38:24 -04:00
2024-05-14 12:54:06 +02:00
return
}
2024-06-07 22:23:02 -04:00
writeJSON(w, r, save)
2024-06-09 20:03:27 -04:00
case "update":
if !active {
httpError(w, r, fmt.Errorf("session out of date: not active"), http.StatusBadRequest)
return
}
2024-06-07 22:23:02 -04:00
var system defs.SystemSaveData
err = json.NewDecoder(r.Body).Decode(&system)
2024-05-14 12:54:06 +02:00
if err != nil {
2024-06-07 22:23:02 -04:00
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
2024-05-14 12:54:06 +02:00
return
}
2024-06-07 22:23:02 -04:00
err = savedata.PutSystem(uuid, system)
if err != nil {
httpError(w, r, fmt.Errorf("failed to put system data: %s", err), http.StatusInternalServerError)
return
}
2024-05-14 12:54:06 +02:00
w.WriteHeader(http.StatusNoContent)
2024-06-09 20:03:27 -04:00
case "verify":
var input SystemVerifyRequest
2024-06-10 14:56:15 -04:00
if !r.URL.Query().Has("clientSessionId") {
err = json.NewDecoder(r.Body).Decode(&input)
if err != nil {
httpError(w, r, fmt.Errorf("failed to decode request body: %s", err), http.StatusBadRequest)
return
}
2024-05-15 13:37:36 -04:00
active, err = db.IsActiveSession(uuid, input.ClientSessionId)
if err != nil {
httpError(w, r, fmt.Errorf("failed to check active session: %s", err), http.StatusBadRequest)
return
}
2024-06-10 14:56:15 -04:00
} else {
active, err = db.IsActiveSession(uuid, r.URL.Query().Get("clientSessionId"))
if err != nil {
httpError(w, r, fmt.Errorf("failed to check active session: %s", err), http.StatusBadRequest)
return
}
2024-06-09 20:03:27 -04:00
}
2024-06-10 14:56:15 -04:00
2024-06-09 20:03:27 -04:00
response := SystemVerifyResponse{
Valid: active,
}
2024-05-14 12:54:06 +02:00
2024-06-09 20:03:27 -04:00
// not valid, send server state
if !active {
err = db.UpdateActiveSession(uuid, input.ClientSessionId)
if err != nil {
httpError(w, r, fmt.Errorf("failed to update active session: %s", err), http.StatusBadRequest)
return
}
2024-05-14 12:54:06 +02:00
2024-06-09 20:03:27 -04:00
var storedSaveData defs.SystemSaveData
storedSaveData, err = db.ReadSystemSaveData(uuid)
if err != nil {
httpError(w, r, fmt.Errorf("failed to read session save data: %s", err), http.StatusInternalServerError)
return
}
2024-05-14 12:54:06 +02:00
2024-06-09 20:03:27 -04:00
response.SystemData = storedSaveData
}
2024-05-14 12:54:06 +02:00
2024-06-09 20:03:27 -04:00
writeJSON(w, r, response)
case "delete":
2024-06-07 22:23:02 -04:00
err := savedata.DeleteSystem(uuid)
if err != nil {
2024-05-14 12:54:06 +02:00
httpError(w, r, err, http.StatusInternalServerError)
2024-06-07 22:23:02 -04:00
return
2024-05-14 12:54:06 +02:00
}
2024-06-09 20:03:27 -04:00
w.WriteHeader(http.StatusOK)
2024-05-14 12:54:06 +02:00
}
}
func legacyHandleNewClear(w http.ResponseWriter, r *http.Request) {
2024-05-10 18:07:14 -04:00
uuid, err := uuidFromRequest(r)
if err != nil {
httpError(w, r, err, http.StatusUnauthorized)
2024-05-10 18:07:14 -04:00
return
}
var slot int
if r.URL.Query().Has("slot") {
slot, err = strconv.Atoi(r.URL.Query().Get("slot"))
if err != nil {
httpError(w, r, err, http.StatusBadRequest)
return
}
}
newClear, err := savedata.NewClear(uuid, slot)
if err != nil {
httpError(w, r, fmt.Errorf("failed to read new clear: %s", err), http.StatusInternalServerError)
return
}
2024-05-23 14:15:44 -04:00
writeJSON(w, r, newClear)
2024-05-10 18:07:14 -04:00
}
// daily
func handleDailySeed(w http.ResponseWriter, r *http.Request) {
seed, err := db.GetDailyRunSeed()
2024-05-08 18:53:58 +02:00
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-05-10 15:33:37 -04:00
_, err = w.Write([]byte(seed))
if err != nil {
httpError(w, r, fmt.Errorf("failed to write seed: %s", err), http.StatusInternalServerError)
}
}
func handleDailyRankings(w http.ResponseWriter, r *http.Request) {
var err error
var category int
if r.URL.Query().Has("category") {
category, err = strconv.Atoi(r.URL.Query().Get("category"))
2024-04-08 20:44:36 -04:00
if err != nil {
httpError(w, r, fmt.Errorf("failed to convert category: %s", err), http.StatusBadRequest)
2024-04-08 20:44:36 -04:00
return
}
}
2024-04-08 20:44:36 -04:00
page := 1
if r.URL.Query().Has("page") {
page, err = strconv.Atoi(r.URL.Query().Get("page"))
2024-04-08 20:44:36 -04:00
if err != nil {
httpError(w, r, fmt.Errorf("failed to convert page: %s", err), http.StatusBadRequest)
2024-04-08 20:44:36 -04:00
return
}
}
2024-04-20 16:58:04 -04:00
rankings, err := daily.Rankings(category, page)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
return
}
2024-05-23 14:15:44 -04:00
writeJSON(w, r, rankings)
}
func handleDailyRankingPageCount(w http.ResponseWriter, r *http.Request) {
var category int
if r.URL.Query().Has("category") {
var err error
category, err = strconv.Atoi(r.URL.Query().Get("category"))
2024-04-08 20:44:36 -04:00
if err != nil {
httpError(w, r, fmt.Errorf("failed to convert category: %s", err), http.StatusBadRequest)
return
2024-04-08 20:44:36 -04:00
}
}
2024-04-08 20:44:36 -04:00
count, err := daily.RankingPageCount(category)
if err != nil {
httpError(w, r, err, http.StatusInternalServerError)
2023-12-29 14:30:47 -05:00
}
2024-06-02 18:15:24 -04:00
w.Write([]byte(strconv.Itoa(count)))
2024-04-10 02:41:58 -04:00
}