2022-11-23 02:08:36 +03:00
|
|
|
import { login as loginMasto } from 'masto'
|
2022-12-21 00:03:15 +03:00
|
|
|
import type { Account, AccountCredentials, Instance, MastoClient, WsEvents } from 'masto'
|
2022-12-13 16:22:27 +03:00
|
|
|
import type { Ref } from 'vue'
|
2023-01-01 22:38:05 +03:00
|
|
|
import type { RemovableRef } from '@vueuse/core'
|
2022-12-21 00:03:15 +03:00
|
|
|
import type { ElkMasto, UserLogin } from '~/types'
|
2022-12-18 02:29:16 +03:00
|
|
|
import {
|
|
|
|
DEFAULT_POST_CHARS_LIMIT,
|
|
|
|
DEFAULT_SERVER,
|
|
|
|
STORAGE_KEY_CURRENT_USER,
|
|
|
|
STORAGE_KEY_NOTIFICATION,
|
|
|
|
STORAGE_KEY_NOTIFICATION_POLICY,
|
|
|
|
STORAGE_KEY_SERVERS,
|
|
|
|
STORAGE_KEY_USERS,
|
|
|
|
} from '~/constants'
|
|
|
|
import type { PushNotificationPolicy, PushNotificationRequest } from '~/composables/push-notifications/types'
|
2023-01-03 03:18:01 +03:00
|
|
|
import { useAsyncIDBKeyval } from '~/composables/idb'
|
2022-11-23 02:08:36 +03:00
|
|
|
|
2022-11-29 09:39:49 +03:00
|
|
|
const mock = process.mock
|
2023-01-03 04:26:14 +03:00
|
|
|
export const GUEST_ID = '[anonymous]'
|
2023-01-01 22:38:05 +03:00
|
|
|
|
2023-01-03 03:18:01 +03:00
|
|
|
const initializeUsers = async (): Promise<Ref<UserLogin[]> | RemovableRef<UserLogin[]>> => {
|
2023-01-01 22:38:05 +03:00
|
|
|
let defaultUsers = mock ? [mock.user] : []
|
|
|
|
|
|
|
|
// Backward compatibility with localStorage
|
|
|
|
let removeUsersOnLocalStorage = false
|
|
|
|
if (globalThis?.localStorage) {
|
|
|
|
const usersOnLocalStorageString = globalThis.localStorage.getItem(STORAGE_KEY_USERS)
|
|
|
|
if (usersOnLocalStorageString) {
|
|
|
|
defaultUsers = JSON.parse(usersOnLocalStorageString)
|
|
|
|
removeUsersOnLocalStorage = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const users = process.server
|
|
|
|
? ref<UserLogin[]>(defaultUsers)
|
2023-01-03 03:18:01 +03:00
|
|
|
: await useAsyncIDBKeyval<UserLogin[]>(STORAGE_KEY_USERS, defaultUsers, { deep: true })
|
2023-01-01 22:38:05 +03:00
|
|
|
|
|
|
|
if (removeUsersOnLocalStorage)
|
|
|
|
globalThis.localStorage.removeItem(STORAGE_KEY_USERS)
|
|
|
|
|
|
|
|
return users
|
|
|
|
}
|
|
|
|
|
2023-01-03 03:18:01 +03:00
|
|
|
const users = await initializeUsers()
|
2022-12-20 03:16:15 +03:00
|
|
|
const instances = useLocalStorage<Record<string, Instance>>(STORAGE_KEY_SERVERS, mock ? mock.server : {}, { deep: true })
|
2022-11-29 09:39:49 +03:00
|
|
|
const currentUserId = useLocalStorage<string>(STORAGE_KEY_CURRENT_USER, mock ? mock.user.account.id : '')
|
2023-01-03 05:29:58 +03:00
|
|
|
const isGuestId = computed(() => !currentUserId.value || currentUserId.value.startsWith(`${GUEST_ID}@`))
|
2022-11-23 02:08:36 +03:00
|
|
|
|
|
|
|
export const currentUser = computed<UserLogin | undefined>(() => {
|
2023-01-03 03:11:10 +03:00
|
|
|
if (!currentUserId.value)
|
|
|
|
// Fallback to the first account
|
|
|
|
return users.value[0]
|
|
|
|
|
2023-01-03 04:23:16 +03:00
|
|
|
if (isGuestId.value) {
|
2023-01-03 04:26:14 +03:00
|
|
|
const server = currentUserId.value.replace(`${GUEST_ID}@`, '')
|
2023-01-03 04:23:16 +03:00
|
|
|
return users.value.find(user => user.guest && user.server === server)
|
|
|
|
}
|
2022-11-23 02:08:36 +03:00
|
|
|
|
2023-01-03 04:23:16 +03:00
|
|
|
return users.value.find(user => user.account?.id === currentUserId.value)
|
|
|
|
})
|
2022-12-13 16:49:22 +03:00
|
|
|
|
2023-01-03 03:11:10 +03:00
|
|
|
export const currentServer = computed<string>(() => currentUser.value?.server || DEFAULT_SERVER)
|
|
|
|
export const currentInstance = computed<null | Instance>(() => {
|
|
|
|
return instances.value[currentServer.value] ?? null
|
|
|
|
})
|
2023-01-03 04:23:16 +03:00
|
|
|
export const checkUser = (val: UserLogin | undefined): val is UserLogin<true> => !!(val && !val.guest)
|
|
|
|
export const isGuest = computed(() => !checkUser(currentUser.value))
|
2023-01-03 05:29:58 +03:00
|
|
|
export const getUniqueUserId = (user: UserLogin) => user.guest ? `${GUEST_ID}@${user.server}` : user.account.id
|
2023-01-03 05:14:54 +03:00
|
|
|
export const isSameUser = (a: UserLogin | undefined, b: UserLogin | undefined) =>
|
2023-01-03 05:29:58 +03:00
|
|
|
a && b && getUniqueUserId(a) === getUniqueUserId(b)
|
2022-11-23 02:08:36 +03:00
|
|
|
|
2023-01-03 03:11:10 +03:00
|
|
|
export const currentUserHandle = computed(() =>
|
2023-01-03 04:26:14 +03:00
|
|
|
isGuestId.value ? GUEST_ID : currentUser.value!.account!.acct
|
2023-01-03 03:11:10 +03:00
|
|
|
,
|
2022-12-20 03:16:15 +03:00
|
|
|
)
|
2022-11-23 06:48:01 +03:00
|
|
|
|
2022-12-20 03:16:15 +03:00
|
|
|
export const useUsers = () => users
|
2022-11-25 17:01:28 +03:00
|
|
|
|
2022-11-25 17:21:07 +03:00
|
|
|
export const characterLimit = computed(() => currentInstance.value?.configuration.statuses.maxCharacters ?? DEFAULT_POST_CHARS_LIMIT)
|
2022-11-25 17:01:28 +03:00
|
|
|
|
2023-01-03 03:11:10 +03:00
|
|
|
async function loginTo(user?: UserLogin) {
|
2022-12-04 22:56:33 +03:00
|
|
|
const route = useRoute()
|
|
|
|
const router = useRouter()
|
2023-01-03 04:23:16 +03:00
|
|
|
const server = user?.server || (route.params.server as string) || DEFAULT_SERVER
|
2022-11-23 02:08:36 +03:00
|
|
|
const masto = await loginMasto({
|
2022-12-04 22:56:33 +03:00
|
|
|
url: `https://${server}`,
|
2022-11-27 18:13:04 +03:00
|
|
|
accessToken: user?.token,
|
2022-12-22 17:22:56 +03:00
|
|
|
disableVersionCheck: true,
|
2022-12-21 04:06:39 +03:00
|
|
|
// Suppress warning of `masto/fetch` usage
|
|
|
|
disableExperimentalWarning: true,
|
2022-11-23 02:08:36 +03:00
|
|
|
})
|
2022-11-27 18:13:04 +03:00
|
|
|
|
2022-11-29 23:51:52 +03:00
|
|
|
if (!user?.token) {
|
2023-01-03 03:11:10 +03:00
|
|
|
const instance = await masto.instances.fetch()
|
|
|
|
|
|
|
|
instances.value[server] = instance
|
2023-01-03 04:23:16 +03:00
|
|
|
if (!users.value.some(u => u.server === server && u.guest))
|
|
|
|
users.value.push({ server, guest: true })
|
|
|
|
|
2023-01-03 04:26:14 +03:00
|
|
|
currentUserId.value = `${GUEST_ID}@${server}`
|
2022-11-29 23:51:52 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
else {
|
2022-11-27 18:13:04 +03:00
|
|
|
try {
|
2022-12-20 03:16:15 +03:00
|
|
|
const [me, instance, pushSubscription] = await Promise.all([
|
2022-12-04 16:12:16 +03:00
|
|
|
masto.accounts.verifyCredentials(),
|
|
|
|
masto.instances.fetch(),
|
2022-12-23 21:28:10 +03:00
|
|
|
// if PWA is not enabled, don't get push subscription
|
|
|
|
useRuntimeConfig().public.pwaEnabled
|
|
|
|
// we get 404 response instead empty data
|
|
|
|
? masto.pushSubscriptions.fetch().catch(() => Promise.resolve(undefined))
|
|
|
|
: Promise.resolve(undefined),
|
2022-12-04 16:12:16 +03:00
|
|
|
])
|
|
|
|
|
2023-01-03 02:00:12 +03:00
|
|
|
if (!me.acct.includes('@'))
|
|
|
|
me.acct = `${me.acct}@${instance.uri}`
|
|
|
|
|
2022-11-27 18:13:04 +03:00
|
|
|
user.account = me
|
2022-12-18 02:29:16 +03:00
|
|
|
user.pushSubscription = pushSubscription
|
2022-12-04 16:12:16 +03:00
|
|
|
currentUserId.value = me.id
|
2022-12-20 03:16:15 +03:00
|
|
|
instances.value[server] = instance
|
2022-11-27 18:13:04 +03:00
|
|
|
|
|
|
|
if (!users.value.some(u => u.server === user.server && u.token === user.token))
|
2023-01-03 03:11:10 +03:00
|
|
|
users.value.push(user)
|
2022-11-27 18:13:04 +03:00
|
|
|
}
|
|
|
|
catch {
|
|
|
|
await signout()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-26 10:33:14 +03:00
|
|
|
// This only cleans up the URL; page content should stay the same
|
|
|
|
if (route.path === '/signin/callback') {
|
|
|
|
await router.push('/home')
|
|
|
|
}
|
|
|
|
|
|
|
|
else if ('server' in route.params && user?.token && !useNuxtApp()._processingMiddleware) {
|
2022-12-04 22:56:33 +03:00
|
|
|
await router.push({
|
|
|
|
...route,
|
|
|
|
force: true,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-11-27 18:13:04 +03:00
|
|
|
return masto
|
2022-11-23 02:08:36 +03:00
|
|
|
}
|
2022-11-23 07:20:59 +03:00
|
|
|
|
2023-01-03 05:14:54 +03:00
|
|
|
export const switchUser = (user: UserLogin, masto: ElkMasto) => {
|
|
|
|
const router = useRouter()
|
|
|
|
if (!user.guest && !isGuest.value && user.account.id === currentUser.value!.account!.id)
|
|
|
|
router.push(getAccountRoute(user.account))
|
|
|
|
else
|
|
|
|
masto.loginTo(user)
|
|
|
|
}
|
|
|
|
|
2022-12-26 11:50:11 +03:00
|
|
|
export function setAccountInfo(userId: string, account: AccountCredentials) {
|
|
|
|
const index = getUsersIndexByUserId(userId)
|
|
|
|
if (index === -1)
|
|
|
|
return false
|
|
|
|
|
|
|
|
users.value[index].account = account
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
export async function pullMyAccountInfo() {
|
2023-01-01 22:42:11 +03:00
|
|
|
const account = await useMasto().accounts.verifyCredentials()
|
2023-01-03 02:00:12 +03:00
|
|
|
if (!account.acct.includes('@'))
|
|
|
|
account.acct = `${account.acct}@${currentInstance.value!.uri}`
|
|
|
|
|
2023-01-01 22:42:11 +03:00
|
|
|
setAccountInfo(currentUserId.value, account)
|
2023-01-03 02:00:12 +03:00
|
|
|
cacheAccount(account, currentServer.value, true)
|
2022-12-26 11:50:11 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
export function getUsersIndexByUserId(userId: string) {
|
|
|
|
return users.value.findIndex(u => u.account?.id === userId)
|
|
|
|
}
|
|
|
|
|
2022-12-22 16:48:20 +03:00
|
|
|
export async function removePushNotificationData(user: UserLogin, fromSWPushManager = true) {
|
2022-12-18 02:29:16 +03:00
|
|
|
// clear push subscription
|
|
|
|
user.pushSubscription = undefined
|
2023-01-03 03:11:10 +03:00
|
|
|
const { acct } = user.account!
|
2022-12-18 02:29:16 +03:00
|
|
|
// clear request notification permission
|
|
|
|
delete useLocalStorage<PushNotificationRequest>(STORAGE_KEY_NOTIFICATION, {}).value[acct]
|
|
|
|
// clear push notification policy
|
|
|
|
delete useLocalStorage<PushNotificationPolicy>(STORAGE_KEY_NOTIFICATION_POLICY, {}).value[acct]
|
|
|
|
|
2022-12-23 21:28:10 +03:00
|
|
|
const pwaEnabled = useRuntimeConfig().public.pwaEnabled
|
|
|
|
|
2022-12-18 02:29:16 +03:00
|
|
|
// we remove the sw push manager if required and there are no more accounts with subscriptions
|
2022-12-23 21:28:10 +03:00
|
|
|
if (pwaEnabled && fromSWPushManager && (users.value.length === 0 || users.value.every(u => !u.pushSubscription))) {
|
2022-12-18 02:29:16 +03:00
|
|
|
// clear sw push subscription
|
|
|
|
try {
|
|
|
|
const registration = await navigator.serviceWorker.ready
|
|
|
|
const subscription = await registration.pushManager.getSubscription()
|
|
|
|
if (subscription)
|
|
|
|
await subscription.unsubscribe()
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
// juts ignore
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-03 04:23:16 +03:00
|
|
|
export async function removePushNotifications(user: UserLogin<true>) {
|
2022-12-23 21:28:10 +03:00
|
|
|
if (!user.pushSubscription)
|
2022-12-22 16:48:20 +03:00
|
|
|
return
|
|
|
|
|
|
|
|
// unsubscribe push notifications
|
|
|
|
try {
|
|
|
|
await useMasto().pushSubscriptions.remove()
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
// ignore
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-23 07:20:59 +03:00
|
|
|
export async function signout() {
|
|
|
|
// TODO: confirm
|
|
|
|
if (!currentUser.value)
|
|
|
|
return
|
|
|
|
|
2023-01-03 05:29:58 +03:00
|
|
|
const index = users.value.findIndex(u => isSameUser(u, currentUser.value))
|
2022-11-26 22:33:36 +03:00
|
|
|
|
|
|
|
if (index !== -1) {
|
|
|
|
// Clear stale data
|
2022-12-13 16:22:27 +03:00
|
|
|
clearUserLocalStorage()
|
2022-12-20 03:16:15 +03:00
|
|
|
if (!users.value.some((u, i) => u.server === currentUser.value!.server && i !== index))
|
|
|
|
delete instances.value[currentUser.value.server]
|
2022-11-23 07:20:59 +03:00
|
|
|
|
2023-01-03 04:23:16 +03:00
|
|
|
if (checkUser(currentUser.value)) {
|
|
|
|
await removePushNotifications(currentUser.value)
|
|
|
|
await removePushNotificationData(currentUser.value)
|
|
|
|
}
|
2022-12-22 16:48:20 +03:00
|
|
|
|
2022-11-29 08:43:06 +03:00
|
|
|
currentUserId.value = ''
|
2022-11-26 22:33:36 +03:00
|
|
|
// Remove the current user from the users
|
|
|
|
users.value.splice(index, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set currentUserId to next user if available
|
2022-11-23 07:25:48 +03:00
|
|
|
currentUserId.value = users.value[0]?.account?.id
|
2022-11-26 22:33:36 +03:00
|
|
|
|
2022-11-27 18:13:04 +03:00
|
|
|
if (!currentUserId.value)
|
2022-12-12 02:30:26 +03:00
|
|
|
await useRouter().push('/')
|
2022-11-23 07:20:59 +03:00
|
|
|
|
2023-01-03 05:29:58 +03:00
|
|
|
const masto = useMasto()
|
2022-12-20 18:56:54 +03:00
|
|
|
await masto.loginTo(currentUser.value)
|
2022-11-23 07:20:59 +03:00
|
|
|
}
|
2022-12-02 05:18:57 +03:00
|
|
|
|
2022-12-02 05:21:10 +03:00
|
|
|
const notifications = reactive<Record<string, undefined | [Promise<WsEvents>, number]>>({})
|
|
|
|
|
|
|
|
export const useNotifications = () => {
|
2023-01-03 04:23:16 +03:00
|
|
|
const id = $computed(() => currentUser.value?.account?.id)
|
2022-12-17 19:55:29 +03:00
|
|
|
const masto = useMasto()
|
2022-12-02 05:21:10 +03:00
|
|
|
|
|
|
|
const clearNotifications = () => {
|
|
|
|
if (!id || !notifications[id])
|
|
|
|
return
|
|
|
|
notifications[id]![1] = 0
|
|
|
|
}
|
|
|
|
|
|
|
|
async function connect(): Promise<void> {
|
2022-12-17 19:55:29 +03:00
|
|
|
if (!isMastoInitialised.value || !id || notifications[id] || !currentUser.value?.token)
|
2022-12-02 05:21:10 +03:00
|
|
|
return
|
|
|
|
|
|
|
|
const stream = masto.stream.streamUser()
|
|
|
|
notifications[id] = [stream, 0]
|
|
|
|
;(await stream).on('notification', () => {
|
|
|
|
if (notifications[id])
|
|
|
|
notifications[id]![1]++
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
function disconnect(): void {
|
|
|
|
if (!id || !notifications[id])
|
|
|
|
return
|
|
|
|
notifications[id]![0].then(stream => stream.disconnect())
|
|
|
|
notifications[id] = undefined
|
|
|
|
}
|
|
|
|
|
|
|
|
watch(currentUser, disconnect)
|
|
|
|
connect()
|
|
|
|
|
2022-12-13 17:03:30 +03:00
|
|
|
return {
|
|
|
|
notifications: computed(() => id ? notifications[id]?.[1] ?? 0 : 0),
|
|
|
|
disconnect,
|
|
|
|
clearNotifications,
|
|
|
|
}
|
2022-12-02 05:21:10 +03:00
|
|
|
}
|
|
|
|
|
2022-12-02 05:18:57 +03:00
|
|
|
export function checkLogin() {
|
|
|
|
if (!currentUser.value) {
|
|
|
|
openSigninDialog()
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
2022-12-13 16:22:27 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Create reactive storage for the current user
|
|
|
|
*/
|
|
|
|
export function useUserLocalStorage<T extends object>(key: string, initial: () => T) {
|
2022-12-13 16:49:22 +03:00
|
|
|
// @ts-expect-error bind value to the function
|
|
|
|
const storages = useUserLocalStorage._ = useUserLocalStorage._ || new Map<string, Ref<Record<string, any>>>()
|
|
|
|
|
|
|
|
if (!storages.has(key))
|
|
|
|
storages.set(key, useLocalStorage(key, {}, { deep: true }))
|
|
|
|
const all = storages.get(key) as Ref<Record<string, T>>
|
|
|
|
|
|
|
|
return computed(() => {
|
2023-01-03 04:23:16 +03:00
|
|
|
const id = isGuestId.value
|
2023-01-03 04:26:14 +03:00
|
|
|
? GUEST_ID
|
2023-01-03 03:11:10 +03:00
|
|
|
: currentUser.value!.account!.acct
|
2022-12-13 16:49:22 +03:00
|
|
|
all.value[id] = Object.assign(initial(), all.value[id] || {})
|
|
|
|
return all.value[id]
|
|
|
|
})
|
2022-12-13 16:22:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Clear all storages for the given account
|
|
|
|
*/
|
|
|
|
export function clearUserLocalStorage(account?: Account) {
|
|
|
|
if (!account)
|
|
|
|
account = currentUser.value?.account
|
|
|
|
if (!account)
|
|
|
|
return
|
|
|
|
|
2022-12-20 03:16:15 +03:00
|
|
|
const id = `${account.acct}@${currentInstance.value?.uri || currentServer.value}`
|
2022-12-13 17:03:30 +03:00
|
|
|
// @ts-expect-error bind value to the function
|
|
|
|
;(useUserLocalStorage._ as Map<string, Ref<Record<string, any>>>).forEach((storage) => {
|
2022-12-13 16:22:27 +03:00
|
|
|
if (storage.value[id])
|
|
|
|
delete storage.value[id]
|
|
|
|
})
|
|
|
|
}
|
2022-12-21 00:03:15 +03:00
|
|
|
|
|
|
|
export const createMasto = () => {
|
|
|
|
const api = shallowRef<MastoClient | null>(null)
|
|
|
|
const apiPromise = ref<Promise<MastoClient> | null>(null)
|
|
|
|
const initialised = computed(() => !!api.value)
|
|
|
|
|
|
|
|
const masto = new Proxy({} as ElkMasto, {
|
|
|
|
get(_, key: keyof ElkMasto) {
|
|
|
|
if (key === 'loggedIn')
|
|
|
|
return initialised
|
|
|
|
|
|
|
|
if (key === 'loginTo') {
|
|
|
|
return (...args: any[]): Promise<MastoClient> => {
|
|
|
|
return apiPromise.value = loginTo(...args).then((r) => {
|
|
|
|
api.value = r
|
|
|
|
return masto
|
|
|
|
}).catch(() => {
|
|
|
|
// Show error page when Mastodon server is down
|
|
|
|
throw createError({
|
|
|
|
fatal: true,
|
|
|
|
statusMessage: 'Could not log into account.',
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (api.value && key in api.value)
|
|
|
|
return api.value[key as keyof MastoClient]
|
|
|
|
|
|
|
|
if (!api.value) {
|
|
|
|
return new Proxy({}, {
|
|
|
|
get(_, subkey) {
|
2022-12-26 11:34:30 +03:00
|
|
|
if (typeof subkey === 'string' && subkey.startsWith('iterate')) {
|
|
|
|
return (...args: any[]) => {
|
|
|
|
let paginator: any
|
|
|
|
function next() {
|
|
|
|
paginator = paginator || (api.value as any)?.[key][subkey](...args)
|
|
|
|
return paginator.next()
|
|
|
|
}
|
|
|
|
return { next }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-21 00:03:15 +03:00
|
|
|
return (...args: any[]) => apiPromise.value?.then((r: any) => r[key][subkey](...args))
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
return undefined
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
return masto
|
|
|
|
}
|