elk/composables/users.ts

360 lines
12 KiB
TypeScript
Raw Normal View History

2022-11-23 02:08:36 +03:00
import { login as loginMasto } from 'masto'
import type { mastodon } from 'masto'
2022-12-13 16:22:27 +03:00
import type { Ref } from 'vue'
import type { MaybeComputedRef, RemovableRef } from '@vueuse/core'
import type { ElkMasto, UserLogin } from '~/types'
import {
DEFAULT_POST_CHARS_LIMIT,
STORAGE_KEY_CURRENT_USER,
STORAGE_KEY_NOTIFICATION,
STORAGE_KEY_NOTIFICATION_POLICY,
STORAGE_KEY_SERVERS,
STORAGE_KEY_USERS,
} from '~/constants'
import type { PushNotificationPolicy, PushNotificationRequest } from '~/composables/push-notifications/types'
import { useAsyncIDBKeyval } from '~/composables/idb'
2022-11-23 02:08:36 +03:00
const mock = process.mock
const initializeUsers = async (): Promise<Ref<UserLogin[]> | RemovableRef<UserLogin[]>> => {
let defaultUsers = mock ? [mock.user] : []
// Backward compatibility with localStorage
let removeUsersOnLocalStorage = false
if (globalThis?.localStorage) {
const usersOnLocalStorageString = globalThis.localStorage.getItem(STORAGE_KEY_USERS)
if (usersOnLocalStorageString) {
defaultUsers = JSON.parse(usersOnLocalStorageString)
removeUsersOnLocalStorage = true
}
}
const users = process.server
? ref<UserLogin[]>(defaultUsers)
: await useAsyncIDBKeyval<UserLogin[]>(STORAGE_KEY_USERS, defaultUsers, { deep: true })
if (removeUsersOnLocalStorage)
globalThis.localStorage.removeItem(STORAGE_KEY_USERS)
return users
}
const users = await initializeUsers()
const instances = useLocalStorage<Record<string, mastodon.v1.Instance>>(STORAGE_KEY_SERVERS, mock ? mock.server : {}, { deep: true })
const currentUserId = useLocalStorage<string>(STORAGE_KEY_CURRENT_USER, mock ? mock.user.account.id : '')
2022-11-23 02:08:36 +03:00
export const currentUser = computed<UserLogin | undefined>(() => {
2022-11-23 07:25:48 +03:00
if (currentUserId.value) {
2022-12-20 17:44:19 +03:00
const user = users.value.find(user => user.account?.id === currentUserId.value)
2022-11-23 02:08:36 +03:00
if (user)
return user
}
// Fallback to the first account
2022-11-23 07:25:48 +03:00
return users.value[0]
2022-11-23 02:08:36 +03:00
})
const publicInstance = ref<mastodon.v1.Instance | null>(null)
export const currentInstance = computed<null | mastodon.v1.Instance>(() => currentUser.value ? instances.value[currentUser.value.server] ?? null : publicInstance.value)
export const isGlitchEdition = computed(() => currentInstance.value?.version.includes('+glitch'))
2022-12-13 16:49:22 +03:00
export const publicServer = ref('')
2022-11-29 23:51:52 +03:00
export const currentServer = computed<string>(() => currentUser.value?.server || publicServer.value)
2022-11-23 02:08:36 +03:00
// when multiple tabs: we need to reload window when sign in, switch account or sign out
if (process.client) {
const windowReload = () => {
document.visibilityState === 'visible' && window.location.reload()
}
watch(currentUserId, async (id, oldId) => {
// when sign in or switch account
if (id) {
if (id === currentUser.value?.account?.id) {
// when sign in, the other tab will not have the user, idb is not reactive
const newUser = users.value.find(user => user.account?.id === id)
// if the user is there, then we are switching account
if (newUser) {
// check if the change is on current tab: if so, don't reload
if (document.hasFocus() || document.visibilityState === 'visible')
return
}
}
window.addEventListener('visibilitychange', windowReload, { capture: true })
}
// when sign out
else if (oldId) {
const oldUser = users.value.find(user => user.account?.id === oldId)
// when sign out, the other tab will not have the user, idb is not reactive
if (oldUser)
window.addEventListener('visibilitychange', windowReload, { capture: true })
}
}, { immediate: true, flush: 'post' })
}
export const currentUserHandle = computed(() => currentUser.value?.account.id
? `${currentUser.value.account.acct}@${currentInstance.value?.uri || currentServer.value}`
: '[anonymous]',
)
2022-11-23 06:48:01 +03:00
export const useUsers = () => users
export const useSelfAccount = (user: MaybeComputedRef<mastodon.v1.Account | undefined>) =>
computed(() => currentUser.value && resolveUnref(user)?.id === currentUser.value.account.id)
2022-11-25 17:21:07 +03:00
export const characterLimit = computed(() => currentInstance.value?.configuration.statuses.maxCharacters ?? DEFAULT_POST_CHARS_LIMIT)
2023-01-08 09:21:09 +03:00
async function loginTo(user?: Omit<UserLogin, 'account'> & { account?: mastodon.v1.AccountCredentials }) {
const route = useRoute()
const router = useRouter()
const server = user?.server || route.params.server as string || publicServer.value
2022-11-23 02:08:36 +03:00
const masto = await loginMasto({
url: `https://${server}`,
accessToken: user?.token,
disableVersionCheck: true,
2022-11-23 02:08:36 +03:00
})
2022-11-29 23:51:52 +03:00
if (!user?.token) {
publicServer.value = server
publicInstance.value = await masto.v1.instances.fetch()
2022-11-29 23:51:52 +03:00
}
else {
try {
const [me, instance, pushSubscription] = await Promise.all([
2023-01-08 09:21:09 +03:00
masto.v1.accounts.verifyCredentials(),
masto.v1.instances.fetch(),
2022-12-23 21:28:10 +03:00
// if PWA is not enabled, don't get push subscription
useRuntimeConfig().public.pwaEnabled
// we get 404 response instead empty data
2023-01-08 09:21:09 +03:00
? masto.v1.webPushSubscriptions.fetch().catch(() => Promise.resolve(undefined))
2022-12-23 21:28:10 +03:00
: Promise.resolve(undefined),
])
2023-01-03 02:00:12 +03:00
if (!me.acct.includes('@'))
me.acct = `${me.acct}@${instance.uri}`
2023-01-03 02:00:12 +03:00
user.account = me
user.pushSubscription = pushSubscription
currentUserId.value = me.id
instances.value[server] = instance
if (!users.value.some(u => u.server === user.server && u.token === user.token))
users.value.push(user as UserLogin)
}
catch {
await signout()
}
}
// This only cleans up the URL; page content should stay the same
if (route.path === '/signin/callback') {
await router.push('/home')
}
else if ('server' in route.params && user?.token && !useNuxtApp()._processingMiddleware) {
await router.push({
...route,
force: true,
})
}
return masto
2022-11-23 02:08:36 +03:00
}
2022-11-23 07:20:59 +03:00
2023-01-08 09:21:09 +03:00
export function setAccountInfo(userId: string, account: mastodon.v1.AccountCredentials) {
const index = getUsersIndexByUserId(userId)
if (index === -1)
return false
users.value[index].account = account
return true
}
export async function pullMyAccountInfo() {
2023-01-08 09:21:09 +03:00
const account = await useMasto().v1.accounts.verifyCredentials()
2023-01-03 02:00:12 +03:00
if (!account.acct.includes('@'))
account.acct = `${account.acct}@${currentInstance.value!.uri}`
2023-01-03 02:00:12 +03:00
setAccountInfo(currentUserId.value, account)
2023-01-03 02:00:12 +03:00
cacheAccount(account, currentServer.value, true)
}
export function getUsersIndexByUserId(userId: string) {
return users.value.findIndex(u => u.account?.id === userId)
}
export async function removePushNotificationData(user: UserLogin, fromSWPushManager = true) {
// clear push subscription
user.pushSubscription = undefined
const { acct } = user.account
// clear request notification permission
delete useLocalStorage<PushNotificationRequest>(STORAGE_KEY_NOTIFICATION, {}).value[acct]
// clear push notification policy
delete useLocalStorage<PushNotificationPolicy>(STORAGE_KEY_NOTIFICATION_POLICY, {}).value[acct]
2022-12-23 21:28:10 +03:00
const pwaEnabled = useRuntimeConfig().public.pwaEnabled
const pwa = useNuxtApp().$pwa
const registrationError = pwa?.registrationError === true
const unregister = pwaEnabled && !registrationError && pwa?.registrationError === true && fromSWPushManager
2022-12-23 21:28:10 +03:00
// we remove the sw push manager if required and there are no more accounts with subscriptions
if (unregister && (users.value.length === 0 || users.value.every(u => !u.pushSubscription))) {
// clear sw push subscription
try {
const registration = await navigator.serviceWorker.ready
const subscription = await registration.pushManager.getSubscription()
if (subscription)
await subscription.unsubscribe()
}
catch {
// juts ignore
}
}
}
export async function removePushNotifications(user: UserLogin) {
2022-12-23 21:28:10 +03:00
if (!user.pushSubscription)
return
// unsubscribe push notifications
try {
2023-01-08 09:21:09 +03:00
await useMasto().v1.webPushSubscriptions.remove()
}
catch {
// ignore
}
}
2022-11-23 07:20:59 +03:00
export async function signout() {
// TODO: confirm
if (!currentUser.value)
return
const masto = useMasto()
2022-11-26 22:33:36 +03:00
const _currentUserId = currentUser.value.account.id
const index = users.value.findIndex(u => u.account?.id === _currentUserId)
if (index !== -1) {
// Clear stale data
2022-12-13 16:22:27 +03:00
clearUserLocalStorage()
if (!users.value.some((u, i) => u.server === currentUser.value!.server && i !== index))
delete instances.value[currentUser.value.server]
2022-11-23 07:20:59 +03:00
await removePushNotifications(currentUser.value)
await removePushNotificationData(currentUser.value)
2022-11-29 08:43:06 +03:00
currentUserId.value = ''
2022-11-26 22:33:36 +03:00
// Remove the current user from the users
users.value.splice(index, 1)
}
// Set currentUserId to next user if available
2022-11-23 07:25:48 +03:00
currentUserId.value = users.value[0]?.account?.id
2022-11-26 22:33:36 +03:00
if (!currentUserId.value)
await useRouter().push('/')
2022-11-23 07:20:59 +03:00
await masto.loginTo(currentUser.value)
2022-11-23 07:20:59 +03:00
}
2022-12-02 05:18:57 +03:00
export function checkLogin() {
if (!currentUser.value) {
openSigninDialog()
return false
}
return true
}
2022-12-13 16:22:27 +03:00
/**
* Create reactive storage for the current user
*/
export function useUserLocalStorage<T extends object>(key: string, initial: () => T) {
2022-12-13 16:49:22 +03:00
// @ts-expect-error bind value to the function
const storages = useUserLocalStorage._ = useUserLocalStorage._ || new Map<string, Ref<Record<string, any>>>()
if (!storages.has(key))
storages.set(key, useLocalStorage(key, {}, { deep: true }))
const all = storages.get(key) as Ref<Record<string, T>>
return computed(() => {
const id = currentUser.value?.account.id
2023-01-03 02:00:12 +03:00
? currentUser.value.account.acct
2022-12-13 16:49:22 +03:00
: '[anonymous]'
all.value[id] = Object.assign(initial(), all.value[id] || {})
return all.value[id]
})
2022-12-13 16:22:27 +03:00
}
/**
* Clear all storages for the given account
*/
2023-01-08 09:21:09 +03:00
export function clearUserLocalStorage(account?: mastodon.v1.Account) {
2022-12-13 16:22:27 +03:00
if (!account)
account = currentUser.value?.account
if (!account)
return
const id = `${account.acct}@${currentInstance.value?.uri || currentServer.value}`
2022-12-13 17:03:30 +03:00
// @ts-expect-error bind value to the function
;(useUserLocalStorage._ as Map<string, Ref<Record<string, any>>>).forEach((storage) => {
2022-12-13 16:22:27 +03:00
if (storage.value[id])
delete storage.value[id]
})
}
export const createMasto = () => {
2023-01-08 09:21:09 +03:00
const api = shallowRef<mastodon.Client | null>(null)
const apiPromise = ref<Promise<mastodon.Client> | null>(null)
const initialised = computed(() => !!api.value)
const masto = new Proxy({} as ElkMasto, {
get(_, key: keyof ElkMasto) {
if (key === 'loggedIn')
return initialised
if (key === 'loginTo') {
2023-01-08 09:21:09 +03:00
return (...args: any[]): Promise<mastodon.Client> => {
return apiPromise.value = loginTo(...args).then((r) => {
api.value = r
return masto
}).catch(() => {
// Show error page when Mastodon server is down
throw createError({
fatal: true,
statusMessage: 'Could not log into account.',
})
})
}
}
if (api.value && key in api.value)
2023-01-08 09:21:09 +03:00
return api.value[key as keyof mastodon.Client]
if (!api.value) {
return new Proxy({}, {
get(_, subkey) {
2022-12-26 11:34:30 +03:00
if (typeof subkey === 'string' && subkey.startsWith('iterate')) {
return (...args: any[]) => {
let paginator: any
function next() {
paginator = paginator || (api.value as any)?.[key][subkey](...args)
return paginator.next()
}
return { next }
}
}
return (...args: any[]) => apiPromise.value?.then((r: any) => r[key][subkey](...args))
},
})
}
return undefined
},
})
return masto
}