summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorSanto Cariotti <santo@dcariotti.me>2024-09-07 12:13:12 +0200
committerSanto Cariotti <santo@dcariotti.me>2024-09-07 12:13:12 +0200
commit2c0c99ce01a69c8a5ec14eab737d7858cf11dcb1 (patch)
tree00803615c8eb6a3cde0ba5bce197032843502228 /src
parenta434be7b14daee8505e45068db7413d7a8886cd8 (diff)
Use submodules mutations and query for types
Diffstat (limited to 'src')
-rw-r--r--src/graphql/mutation.rs241
-rw-r--r--src/graphql/query.rs12
-rw-r--r--src/graphql/types/alert.rs252
-rw-r--r--src/graphql/types/jwt.rs36
-rw-r--r--src/graphql/types/notification.rs106
-rw-r--r--src/graphql/types/position.rs239
-rw-r--r--src/graphql/types/user.rs251
7 files changed, 599 insertions, 538 deletions
diff --git a/src/graphql/mutation.rs b/src/graphql/mutation.rs
index 6e0a265..cef4b22 100644
--- a/src/graphql/mutation.rs
+++ b/src/graphql/mutation.rs
@@ -1,14 +1,10 @@
-use crate::{
- expo,
- graphql::types::{
- alert,
- jwt::{self, Authentication},
- notification, position,
- user::{self, find_user},
- },
- state::AppState,
+use crate::graphql::types::{
+ alert,
+ jwt::{self},
+ position,
+ user::{self},
};
-use async_graphql::{Context, Error, FieldResult, Object};
+use async_graphql::{Context,FieldResult, Object};
/// Mutation struct
pub struct Mutation;
@@ -36,27 +32,7 @@ impl Mutation {
ctx: &Context<'ctx>,
input: jwt::LoginCredentials,
) -> FieldResult<jwt::AuthBody> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
-
- let password = sha256::digest(input.password);
- let rows = client
- .query(
- "SELECT id FROM users WHERE email = $1 AND password = $2",
- &[&input.email, &password],
- )
- .await
- .unwrap();
-
- let id: Vec<i32> = rows.iter().map(|row| row.get(0)).collect();
- if id.len() == 1 {
- // Create a new claim using the found ID
- let claims = jwt::Claims::new(id[0]);
- let token = claims.get_token().unwrap();
- Ok(jwt::AuthBody::new(token, id[0]))
- } else {
- Err(Error::new("Invalid email or password"))
- }
+ jwt::mutations::login(ctx, input).await
}
/// Make GraphQL call to register a notification device token for the user.
@@ -79,28 +55,7 @@ impl Mutation {
ctx: &Context<'ctx>,
input: user::RegisterNotificationToken,
) -> FieldResult<user::User> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
-
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err(Error::new("Can't find the owner")),
- Authentication::Logged(claims) => {
- let user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
-
- client
- .query(
- "UPDATE users SET notification_token = $1 WHERE id = $2",
- &[&input.token, &claims.user_id],
- )
- .await
- .unwrap();
-
- Ok(user)
- }
- }
+ user::mutations::register_device(ctx, input).await
}
/// Make GraphQL request to create new position to track
@@ -126,48 +81,7 @@ impl Mutation {
ctx: &Context<'ctx>,
input: position::PositionInput,
) -> FieldResult<position::Position> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
-
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err(Error::new("Can't find the owner")),
- Authentication::Logged(claims) => {
- let rows = client
- .query(
- "INSERT INTO positions (user_id, location, activity)
- VALUES (
- $1,
- ST_SetSRID(ST_MakePoint($2, $3), 4326),
- $4
- )
- RETURNING id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
- ",
- &[
- &claims.user_id,
- &input.longitude,
- &input.latitude,
- &input.moving_activity,
- ],
- )
- .await
- .unwrap();
-
- let positions: Vec<position::Position> = rows
- .iter()
- .map(|row| position::Position {
- id: row.get("id"),
- user_id: row.get("user_id"),
- created_at: row.get::<_, f64>("created_at") as i64,
- latitude: row.get("latitude"),
- longitude: row.get("longitude"),
- moving_activity: row.get("activity"),
- })
- .collect();
-
- Ok(positions[0].clone())
- }
- }
+ position::mutations::new_position(ctx, input).await
}
/// Make GraphQL request to create new alert. Only for admins.
@@ -197,141 +111,6 @@ impl Mutation {
ctx: &Context<'ctx>,
input: alert::AlertInput,
) -> FieldResult<alert::Alert> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
-
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err(Error::new("Can't find the owner")),
- Authentication::Logged(claims) => {
- let claim_user = find_user(client, claims.user_id).await.unwrap();
- if !claim_user.is_admin {
- return Err(Error::new("Unauthorized"));
- }
-
- let points: String = input
- .points
- .iter()
- .map(|x| {
- format!(
- "ST_SetSRID(ST_MakePoint({}, {}), 4326)",
- x.longitude, x.latitude
- )
- })
- .collect::<Vec<String>>()
- .join(",");
-
- let polygon = format!("ST_MakePolygon(ST_MakeLine(ARRAY[{}]))", points);
-
- let valid_query = format!("SELECT ST_IsValid({}) as is_valid", polygon);
- let rows = client.query(&valid_query, &[]).await.unwrap();
-
- let is_valid: bool = rows[0].get("is_valid");
- if !is_valid {
- return Err(Error::new("Polygon is not valid"));
- }
-
- let insert_query = format!(
- "INSERT INTO alerts (user_id, area, level)
- VALUES($1, {}, $2)
- RETURNING id, user_id, extract(epoch from created_at)::double precision as created_at, ST_AsText(area) as area,
- ST_AsText(ST_Buffer(area::geography, CASE WHEN level = 'One' THEN 0 WHEN level = 'Two' THEN 1000 WHEN level = 'Three' THEN 2000 ELSE 0 END)) as extended_area, level, reached_users",
- polygon
- );
-
- let rows = client
- .query(&insert_query, &[&claims.user_id, &input.level])
- .await
- .unwrap();
- let mut alert = rows
- .iter()
- .map(|row| alert::Alert {
- id: row.get("id"),
- user_id: row.get("user_id"),
- created_at: row.get::<_, f64>("created_at") as i64,
- area: row.get("area"),
- extended_area: row.get("extended_area"),
- level: row.get("level"),
- reached_users: row.get("reached_users"),
- })
- .collect::<Vec<alert::Alert>>()
- .first()
- .cloned()
- .ok_or_else(|| Error::new("Failed to create alert"))?;
-
- let distance: f64 = match alert.level {
- alert::LevelAlert::One => 0.0,
- alert::LevelAlert::Two => 1000.0,
- alert::LevelAlert::Three => 2000.0,
- };
-
- let position_ids: Vec<i32> = client
- .query(
- "
- SELECT id FROM positions
- WHERE ST_DWithin(
- location::geography,
- (SELECT area::geography FROM alerts WHERE id = $1),
- $2
- )",
- &[&alert.id, &distance],
- )
- .await
- .unwrap()
- .iter()
- .map(|row| row.get(0))
- .collect();
-
- let mut notification_ids = vec![];
- for id in &position_ids {
- let notification = notification::Notification::insert_db(client, alert.id, *id)
- .await
- .unwrap();
- notification_ids.push(notification);
- }
-
- alert.reached_users = notification_ids.len() as i32;
- client
- .query(
- "UPDATE alerts SET reached_users = $1 WHERE id = $2",
- &[&alert.reached_users, &alert.id],
- )
- .await
- .unwrap();
-
- let placeholders: Vec<String> = (1..=position_ids.len())
- .map(|i| format!("${}", i))
- .collect();
- let query = format!(
- "SELECT u.notification_token FROM positions p JOIN users u ON u.id = p.user_id
- WHERE p.id IN ({}) AND notification_token IS NOT NULL",
- placeholders.join(", ")
- );
-
- let tokens: Vec<String> = client
- .query(
- &query,
- &position_ids
- .iter()
- .map(|id| id as &(dyn tokio_postgres::types::ToSql + Sync))
- .collect::<Vec<&(dyn tokio_postgres::types::ToSql + Sync)>>(),
- )
- .await
- .unwrap()
- .iter()
- .map(|row| format!("ExponentPushToken[{}]", row.get::<usize, String>(0)))
- .collect();
-
- expo::send(
- tokens,
- "New Alert!".to_string(),
- "Keep an eye open".to_string(),
- )
- .await
- .unwrap();
-
- Ok(alert)
- }
- }
+ alert::mutations::new_alert(ctx, input).await
}
}
diff --git a/src/graphql/query.rs b/src/graphql/query.rs
index 58685ed..e52bd2a 100644
--- a/src/graphql/query.rs
+++ b/src/graphql/query.rs
@@ -26,7 +26,7 @@ impl Query {
#[graphql(desc = "Limit results")] limit: Option<i64>,
#[graphql(desc = "Offset results")] offset: Option<i64>,
) -> Result<Option<Vec<user::User>>, String> {
- user::get_users(ctx, limit, offset).await
+ user::query::get_users(ctx, limit, offset).await
}
/// Returns an user by ID. Admins can check everyone.
@@ -43,7 +43,7 @@ impl Query {
ctx: &Context<'ctx>,
#[graphql(desc = "User to find")] id: i32,
) -> Result<user::User, String> {
- user::get_user_by_id(ctx, id).await
+ user::query::get_user_by_id(ctx, id).await
}
/// Returns all the positions
@@ -62,7 +62,7 @@ impl Query {
#[graphql(desc = "Limit results")] limit: Option<i64>,
#[graphql(desc = "Offset results")] offset: Option<i64>,
) -> Result<Option<Vec<position::Position>>, String> {
- position::get_positions(ctx, user_id, limit, offset).await
+ position::query::get_positions(ctx, user_id, limit, offset).await
}
/// Returns all the last positions for each user.
@@ -82,7 +82,7 @@ impl Query {
position::MovingActivity,
>,
) -> Result<Option<Vec<position::Position>>, String> {
- position::last_positions(ctx, moving_activity).await
+ position::query::last_positions(ctx, moving_activity).await
}
/// Returns all the positions
@@ -101,7 +101,7 @@ impl Query {
#[graphql(desc = "Limit results")] limit: Option<i64>,
#[graphql(desc = "Offset results")] offset: Option<i64>,
) -> Result<Option<Vec<alert::Alert>>, String> {
- alert::get_alerts(ctx, id, limit, offset).await
+ alert::query::get_alerts(ctx, id, limit, offset).await
}
/// Returns all the notifications. They can be filtered by an alert id.
@@ -123,6 +123,6 @@ impl Query {
#[graphql(desc = "Limit results")] limit: Option<i64>,
#[graphql(desc = "Offset results")] offset: Option<i64>,
) -> Result<Option<Vec<notification::Notification>>, String> {
- notification::get_notifications(ctx, seen, alert_id, limit, offset).await
+ notification::query::get_notifications(ctx, seen, alert_id, limit, offset).await
}
}
diff --git a/src/graphql/types/alert.rs b/src/graphql/types/alert.rs
index ab82c2e..41ae4de 100644
--- a/src/graphql/types/alert.rs
+++ b/src/graphql/types/alert.rs
@@ -1,5 +1,9 @@
-use crate::{graphql::types::jwt::Authentication, state::AppState};
-use async_graphql::{Context, Enum, InputObject, SimpleObject};
+use crate::{
+ expo,
+ graphql::types::{jwt::Authentication, notification::Notification, user::find_user},
+ state::AppState,
+};
+use async_graphql::{Context, Enum, FieldResult, InputObject, SimpleObject};
use serde::{Deserialize, Serialize};
use std::error::Error;
use tokio_postgres::types::{to_sql_checked, FromSql, IsNull, ToSql, Type};
@@ -84,29 +88,32 @@ pub struct AlertInput {
pub level: LevelAlert,
}
-/// Get alerts from the database
-pub async fn get_alerts<'ctx>(
- ctx: &Context<'ctx>,
-
- // Optional filter by id.
- id: Option<i32>,
-
- // Optional limit results
- limit: Option<i64>,
-
- // Optional offset results. It should be used with limit field.
- offset: Option<i64>,
-) -> Result<Option<Vec<Alert>>, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(_) => {
- let rows = match id {
- Some(id) => client
- .query(
- "SELECT id,
+pub mod query {
+ use super::*;
+
+ /// Get alerts from the database
+ pub async fn get_alerts<'ctx>(
+ ctx: &Context<'ctx>,
+
+ // Optional filter by id.
+ id: Option<i32>,
+
+ // Optional limit results
+ limit: Option<i64>,
+
+ // Optional offset results. It should be used with limit field.
+ offset: Option<i64>,
+ ) -> Result<Option<Vec<Alert>>, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(_) => {
+ let rows = match id {
+ Some(id) => client
+ .query(
+ "SELECT id,
user_id,
extract(epoch from created_at)::double precision as created_at,
ST_AsText(area) as area,
@@ -125,13 +132,13 @@ pub async fn get_alerts<'ctx>(
reached_users
FROM alerts
WHERE id = $1",
- &[&id],
- )
- .await
- .unwrap(),
- None => client
- .query(
- "SELECT id,
+ &[&id],
+ )
+ .await
+ .unwrap(),
+ None => client
+ .query(
+ "SELECT id,
user_id,
extract(epoch from created_at)::double precision as created_at,
ST_AsText(area) as area,
@@ -152,26 +159,171 @@ pub async fn get_alerts<'ctx>(
ORDER BY id DESC
LIMIT $1
OFFSET $2",
- &[&limit.unwrap_or(20), &offset.unwrap_or(0)],
+ &[&limit.unwrap_or(20), &offset.unwrap_or(0)],
+ )
+ .await
+ .unwrap(),
+ };
+
+ let alerts: Vec<Alert> = rows
+ .iter()
+ .map(|row| Alert {
+ id: row.get("id"),
+ user_id: row.get("user_id"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ area: row.get("area"),
+ extended_area: row.get("extended_area"),
+ level: row.get("level"),
+ reached_users: row.get("reached_users"),
+ })
+ .collect();
+
+ Ok(Some(alerts))
+ }
+ }
+ }
+}
+
+pub mod mutations {
+ use super::*;
+
+ /// Create a new alert
+ pub async fn new_alert<'ctx>(ctx: &Context<'ctx>, input: AlertInput) -> FieldResult<Alert> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err(async_graphql::Error::new("Can't find the owner")),
+ Authentication::Logged(claims) => {
+ let claim_user = find_user(client, claims.user_id).await.unwrap();
+ if !claim_user.is_admin {
+ return Err(async_graphql::Error::new("Unauthorized"));
+ }
+
+ let points: String = input
+ .points
+ .iter()
+ .map(|x| {
+ format!(
+ "ST_SetSRID(ST_MakePoint({}, {}), 4326)",
+ x.longitude, x.latitude
+ )
+ })
+ .collect::<Vec<String>>()
+ .join(",");
+
+ let polygon = format!("ST_MakePolygon(ST_MakeLine(ARRAY[{}]))", points);
+
+ let valid_query = format!("SELECT ST_IsValid({}) as is_valid", polygon);
+ let rows = client.query(&valid_query, &[]).await.unwrap();
+
+ let is_valid: bool = rows[0].get("is_valid");
+ if !is_valid {
+ return Err(async_graphql::Error::new("Polygon is not valid"));
+ }
+
+ let insert_query = format!(
+ "INSERT INTO alerts (user_id, area, level)
+ VALUES($1, {}, $2)
+ RETURNING id, user_id, extract(epoch from created_at)::double precision as created_at, ST_AsText(area) as area,
+ ST_AsText(ST_Buffer(area::geography, CASE WHEN level = 'One' THEN 0 WHEN level = 'Two' THEN 1000 WHEN level = 'Three' THEN 2000 ELSE 0 END)) as extended_area, level, reached_users",
+ polygon
+ );
+
+ let rows = client
+ .query(&insert_query, &[&claims.user_id, &input.level])
+ .await
+ .unwrap();
+ let mut alert = rows
+ .iter()
+ .map(|row| Alert {
+ id: row.get("id"),
+ user_id: row.get("user_id"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ area: row.get("area"),
+ extended_area: row.get("extended_area"),
+ level: row.get("level"),
+ reached_users: row.get("reached_users"),
+ })
+ .collect::<Vec<Alert>>()
+ .first()
+ .cloned()
+ .ok_or_else(|| async_graphql::Error::new("Failed to create alert"))?;
+
+ let distance: f64 = match alert.level {
+ LevelAlert::One => 0.0,
+ LevelAlert::Two => 1000.0,
+ LevelAlert::Three => 2000.0,
+ };
+
+ let position_ids: Vec<i32> = client
+ .query(
+ "
+ SELECT id FROM positions
+ WHERE ST_DWithin(
+ location::geography,
+ (SELECT area::geography FROM alerts WHERE id = $1),
+ $2
+ )",
+ &[&alert.id, &distance],
)
.await
- .unwrap(),
- };
-
- let alerts: Vec<Alert> = rows
- .iter()
- .map(|row| Alert {
- id: row.get("id"),
- user_id: row.get("user_id"),
- created_at: row.get::<_, f64>("created_at") as i64,
- area: row.get("area"),
- extended_area: row.get("extended_area"),
- level: row.get("level"),
- reached_users: row.get("reached_users"),
- })
- .collect();
-
- Ok(Some(alerts))
+ .unwrap()
+ .iter()
+ .map(|row| row.get(0))
+ .collect();
+
+ let mut notification_ids = vec![];
+ for id in &position_ids {
+ let notification = Notification::insert_db(client, alert.id, *id)
+ .await
+ .unwrap();
+ notification_ids.push(notification);
+ }
+
+ alert.reached_users = notification_ids.len() as i32;
+ client
+ .query(
+ "UPDATE alerts SET reached_users = $1 WHERE id = $2",
+ &[&alert.reached_users, &alert.id],
+ )
+ .await
+ .unwrap();
+
+ let placeholders: Vec<String> = (1..=position_ids.len())
+ .map(|i| format!("${}", i))
+ .collect();
+ let query = format!(
+ "SELECT u.notification_token FROM positions p JOIN users u ON u.id = p.user_id
+ WHERE p.id IN ({}) AND notification_token IS NOT NULL",
+ placeholders.join(", ")
+ );
+
+ let tokens: Vec<String> = client
+ .query(
+ &query,
+ &position_ids
+ .iter()
+ .map(|id| id as &(dyn tokio_postgres::types::ToSql + Sync))
+ .collect::<Vec<&(dyn tokio_postgres::types::ToSql + Sync)>>(),
+ )
+ .await
+ .unwrap()
+ .iter()
+ .map(|row| format!("ExponentPushToken[{}]", row.get::<usize, String>(0)))
+ .collect();
+
+ expo::send(
+ tokens,
+ "New Alert!".to_string(),
+ "Keep an eye open".to_string(),
+ )
+ .await
+ .unwrap();
+
+ Ok(alert)
+ }
}
}
}
diff --git a/src/graphql/types/jwt.rs b/src/graphql/types/jwt.rs
index d27c6c3..5656dc5 100644
--- a/src/graphql/types/jwt.rs
+++ b/src/graphql/types/jwt.rs
@@ -1,5 +1,5 @@
-use crate::errors::AppError;
-use async_graphql::{InputObject, SimpleObject};
+use crate::{errors::AppError, state::AppState};
+use async_graphql::{Context, Error, FieldResult, InputObject, SimpleObject};
use axum::{async_trait, extract::FromRequestParts, http::request::Parts};
use axum_extra::{
headers::{authorization::Bearer, Authorization},
@@ -121,3 +121,35 @@ where
}
}
}
+
+pub mod mutations {
+ use super::*;
+
+ /// Login mutation
+ pub async fn login<'ctx>(
+ ctx: &Context<'ctx>,
+ input: LoginCredentials,
+ ) -> FieldResult<AuthBody> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+
+ let password = sha256::digest(input.password);
+ let rows = client
+ .query(
+ "SELECT id FROM users WHERE email = $1 AND password = $2",
+ &[&input.email, &password],
+ )
+ .await
+ .unwrap();
+
+ let id: Vec<i32> = rows.iter().map(|row| row.get(0)).collect();
+ if id.len() == 1 {
+ // Create a new claim using the found ID
+ let claims = Claims::new(id[0]);
+ let token = claims.get_token().unwrap();
+ Ok(AuthBody::new(token, id[0]))
+ } else {
+ Err(Error::new("Invalid email or password"))
+ }
+ }
+}
diff --git a/src/graphql/types/notification.rs b/src/graphql/types/notification.rs
index 6a14d71..0773876 100644
--- a/src/graphql/types/notification.rs
+++ b/src/graphql/types/notification.rs
@@ -44,36 +44,39 @@ impl Notification {
}
}
-/// Get notifications from the database
-pub async fn get_notifications<'ctx>(
- ctx: &Context<'ctx>,
+pub mod query {
+ use super::*;
- // Filter for `seen` field
- seen: bool,
+ /// Get notifications from the database
+ pub async fn get_notifications<'ctx>(
+ ctx: &Context<'ctx>,
- // Optional filter by alert id
- alert_id: Option<i32>,
+ // Filter for `seen` field
+ seen: bool,
- // Optional limit results
- limit: Option<i64>,
+ // Optional filter by alert id
+ alert_id: Option<i32>,
- // Optional offset results. It should be used with limit field.
- offset: Option<i64>,
-) -> Result<Option<Vec<Notification>>, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(claims) => {
- let claim_user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
+ // Optional limit results
+ limit: Option<i64>,
- let limit = limit.unwrap_or(20);
- let offset = offset.unwrap_or(0);
+ // Optional offset results. It should be used with limit field.
+ offset: Option<i64>,
+ ) -> Result<Option<Vec<Notification>>, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(claims) => {
+ let claim_user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
+
+ let limit = limit.unwrap_or(20);
+ let offset = offset.unwrap_or(0);
- let base_query = "SELECT n.id,
+ let base_query = "SELECT n.id,
n.alert_id,
n.position_id,
n.seen,
@@ -105,7 +108,7 @@ pub async fn get_notifications<'ctx>(
JOIN alerts a ON n.alert_id = a.id
JOIN positions p ON n.position_id = p.id".to_string();
- let rows = match alert_id {
+ let rows = match alert_id {
Some(id) if claim_user.is_admin =>
client
.query(&format!(
@@ -136,33 +139,34 @@ pub async fn get_notifications<'ctx>(
.unwrap(),
};
- let notifications: Vec<Notification> = rows
- .iter()
- .map(|row| Notification {
- id: row.get("id"),
- alert: Alert {
- id: row.get("alert_id"),
- user_id: row.get("alert_user_id"),
- created_at: row.get::<_, f64>("alert_created_at") as i64,
- area: row.get("alert_area"),
- extended_area: row.get("alert_extended_area"),
- level: row.get("alert_level"),
- reached_users: row.get("alert_reached_users"),
- },
- position: Position {
- id: row.get("position_id"),
- user_id: row.get("position_user_id"),
- created_at: row.get::<_, f64>("position_created_at") as i64,
- latitude: row.get("position_latitude"),
- longitude: row.get("position_longitude"),
- moving_activity: row.get("position_activity"),
- },
- seen: row.get("seen"),
- created_at: row.get::<_, f64>("created_at") as i64,
- })
- .collect();
+ let notifications: Vec<Notification> = rows
+ .iter()
+ .map(|row| Notification {
+ id: row.get("id"),
+ alert: Alert {
+ id: row.get("alert_id"),
+ user_id: row.get("alert_user_id"),
+ created_at: row.get::<_, f64>("alert_created_at") as i64,
+ area: row.get("alert_area"),
+ extended_area: row.get("alert_extended_area"),
+ level: row.get("alert_level"),
+ reached_users: row.get("alert_reached_users"),
+ },
+ position: Position {
+ id: row.get("position_id"),
+ user_id: row.get("position_user_id"),
+ created_at: row.get::<_, f64>("position_created_at") as i64,
+ latitude: row.get("position_latitude"),
+ longitude: row.get("position_longitude"),
+ moving_activity: row.get("position_activity"),
+ },
+ seen: row.get("seen"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ })
+ .collect();
- Ok(Some(notifications))
+ Ok(Some(notifications))
+ }
}
}
}
diff --git a/src/graphql/types/position.rs b/src/graphql/types/position.rs
index dfa1830..4332a17 100644
--- a/src/graphql/types/position.rs
+++ b/src/graphql/types/position.rs
@@ -1,5 +1,5 @@
use crate::{graphql::types::jwt::Authentication, state::AppState};
-use async_graphql::{Context, Enum, InputObject, SimpleObject};
+use async_graphql::{Context, Enum,FieldResult, InputObject, SimpleObject};
use serde::{Deserialize, Serialize};
use std::error::Error;
use tokio_postgres::types::{to_sql_checked, FromSql, IsNull, ToSql, Type};
@@ -85,35 +85,38 @@ pub struct PositionInput {
pub moving_activity: MovingActivity,
}
-/// Get positions from the database
-pub async fn get_positions<'ctx>(
- ctx: &Context<'ctx>,
-
- // Optional filter by user id. If not defined returns only available positions:
- // If claimed user is admin returns everything, otherwise only positions linked to that user.
- user_id: Option<i32>,
-
- // Optional limit results
- limit: Option<i64>,
-
- // Optional offset results. It should be used with limit field.
- offset: Option<i64>,
-) -> Result<Option<Vec<Position>>, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(claims) => {
- let rows;
- let claim_user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
-
- if claim_user.is_admin {
- match user_id {
- Some(id) => {
- rows = client.query("
+pub mod query {
+ use super::*;
+
+ /// Get positions from the database
+ pub async fn get_positions<'ctx>(
+ ctx: &Context<'ctx>,
+
+ // Optional filter by user id. If not defined returns only available positions:
+ // If claimed user is admin returns everything, otherwise only positions linked to that user.
+ user_id: Option<i32>,
+
+ // Optional limit results
+ limit: Option<i64>,
+
+ // Optional offset results. It should be used with limit field.
+ offset: Option<i64>,
+ ) -> Result<Option<Vec<Position>>, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(claims) => {
+ let rows;
+ let claim_user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
+
+ if claim_user.is_admin {
+ match user_id {
+ Some(id) => {
+ rows = client.query("
SELECT id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
FROM positions
WHERE user_id = $1
@@ -121,19 +124,19 @@ pub async fn get_positions<'ctx>(
LIMIT $2
OFFSET $3",
&[&id, &limit.unwrap_or(20), &offset.unwrap_or(0)]).await.unwrap();
- }
- None => {
- rows = client.query("
+ }
+ None => {
+ rows = client.query("
SELECT id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
FROM positions
ORDER BY id DESC
LIMIT $1
OFFSET $2",
&[&limit.unwrap_or(20), &offset.unwrap_or(0)]).await.unwrap();
+ }
}
- }
- } else {
- rows = client.query("
+ } else {
+ rows = client.query("
SELECT id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
FROM positions
WHERE user_id = $1
@@ -141,50 +144,50 @@ pub async fn get_positions<'ctx>(
LIMIT $2
OFFSET $3",
&[&claim_user.id, &limit.unwrap_or(20), &offset.unwrap_or(0)]).await.unwrap();
- }
+ }
- let positions: Vec<Position> = rows
- .iter()
- .map(|row| Position {
- id: row.get("id"),
- user_id: row.get("user_id"),
- created_at: row.get::<_, f64>("created_at") as i64,
- latitude: row.get("latitude"),
- longitude: row.get("longitude"),
- moving_activity: row.get("activity"),
- })
- .collect();
-
- Ok(Some(positions))
+ let positions: Vec<Position> = rows
+ .iter()
+ .map(|row| Position {
+ id: row.get("id"),
+ user_id: row.get("user_id"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ latitude: row.get("latitude"),
+ longitude: row.get("longitude"),
+ moving_activity: row.get("activity"),
+ })
+ .collect();
+
+ Ok(Some(positions))
+ }
}
}
-}
-/// Get last positions from the database for each user.
-/// It is restricted to only admin users.
-pub async fn last_positions<'ctx>(
- ctx: &Context<'ctx>,
-
- // Optional filter by moving activity
- moving_activity: Option<MovingActivity>,
-) -> Result<Option<Vec<Position>>, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(claims) => {
- let claim_user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
-
- if !claim_user.is_admin {
- return Err("Unauthorized".to_string());
- }
+ /// Get last positions from the database for each user.
+ /// It is restricted to only admin users.
+ pub async fn last_positions<'ctx>(
+ ctx: &Context<'ctx>,
+
+ // Optional filter by moving activity
+ moving_activity: Option<MovingActivity>,
+ ) -> Result<Option<Vec<Position>>, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(claims) => {
+ let claim_user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
- let rows = client
+ if !claim_user.is_admin {
+ return Err("Unauthorized".to_string());
+ }
+
+ let rows = client
.query(
- "SELECT DISTINCT ON (user_id)
+ "SELECT DISTINCT ON (user_id)
id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
FROM positions ORDER BY user_id, created_at DESC",
&[],
@@ -192,20 +195,74 @@ pub async fn last_positions<'ctx>(
.await
.unwrap();
- let positions: Vec<Position> = match moving_activity {
- Some(activity) => rows
- .iter()
- .map(|row| Position {
- id: row.get("id"),
- user_id: row.get("user_id"),
- created_at: row.get::<_, f64>("created_at") as i64,
- latitude: row.get("latitude"),
- longitude: row.get("longitude"),
- moving_activity: row.get("activity"),
- })
- .filter(|x| x.moving_activity == activity)
- .collect(),
- None => rows
+ let positions: Vec<Position> = match moving_activity {
+ Some(activity) => rows
+ .iter()
+ .map(|row| Position {
+ id: row.get("id"),
+ user_id: row.get("user_id"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ latitude: row.get("latitude"),
+ longitude: row.get("longitude"),
+ moving_activity: row.get("activity"),
+ })
+ .filter(|x| x.moving_activity == activity)
+ .collect(),
+ None => rows
+ .iter()
+ .map(|row| Position {
+ id: row.get("id"),
+ user_id: row.get("user_id"),
+ created_at: row.get::<_, f64>("created_at") as i64,
+ latitude: row.get("latitude"),
+ longitude: row.get("longitude"),
+ moving_activity: row.get("activity"),
+ })
+ .collect(),
+ };
+
+ Ok(Some(positions))
+ }
+ }
+ }
+}
+
+pub mod mutations {
+ use super::*;
+
+ /// Create a new position for a logged user
+ pub async fn new_position<'ctx>(
+ ctx: &Context<'ctx>,
+ input: PositionInput,
+ ) -> FieldResult<Position> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err(async_graphql::Error::new("Can't find the owner")),
+ Authentication::Logged(claims) => {
+ let rows = client
+ .query(
+ "INSERT INTO positions (user_id, location, activity)
+ VALUES (
+ $1,
+ ST_SetSRID(ST_MakePoint($2, $3), 4326),
+ $4
+ )
+ RETURNING id, user_id, extract(epoch from created_at)::double precision as created_at, ST_Y(location::geometry) AS latitude, ST_X(location::geometry) AS longitude, activity
+ ",
+ &[
+ &claims.user_id,
+ &input.longitude,
+ &input.latitude,
+ &input.moving_activity,
+ ],
+ )
+ .await
+ .unwrap();
+
+ let positions: Vec<Position> = rows
.iter()
.map(|row| Position {
id: row.get("id"),
@@ -215,10 +272,10 @@ pub async fn last_positions<'ctx>(
longitude: row.get("longitude"),
moving_activity: row.get("activity"),
})
- .collect(),
- };
+ .collect();
- Ok(Some(positions))
+ Ok(positions[0].clone())
+ }
}
}
}
diff --git a/src/graphql/types/user.rs b/src/graphql/types/user.rs
index 798fd8c..0e287ea 100644
--- a/src/graphql/types/user.rs
+++ b/src/graphql/types/user.rs
@@ -1,5 +1,5 @@
use crate::{errors::AppError, state::AppState};
-use async_graphql::{Context, InputObject, Object};
+use async_graphql::{Context, Error, FieldResult, InputObject, Object};
use serde::{Deserialize, Serialize};
use tokio_postgres::Client;
@@ -53,112 +53,6 @@ pub struct RegisterNotificationToken {
pub token: String,
}
-/// Get users from the database
-pub async fn get_users<'ctx>(
- ctx: &Context<'ctx>,
-
- // Optional limit results
- limit: Option<i64>,
- // Optional offset results. It should be used with limit field.
- offset: Option<i64>,
-) -> Result<Option<Vec<User>>, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(claims) => {
- let claim_user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
-
- if !claim_user.is_admin {
- return Err("Unauthorized".to_string());
- }
-
- let rows = client
- .query(
- "SELECT id, email, name, address, is_admin FROM users LIMIT $1 OFFSET $2",
- &[&limit.unwrap_or(20), &offset.unwrap_or(0)],
- )
- .await
- .unwrap();
-
- let users: Vec<User> = rows
- .iter()
- .map(|row| User {
- id: row.get("id"),
- email: row.get("email"),
- password: String::new(),
- name: row.get("name"),
- address: row.get("address"),
- notification_token: None,
- is_admin: row.get("is_admin"),
- })
- .collect();
-
- Ok(Some(users))
- }
- }
-}
-
-/// Get users from the database
-pub async fn get_user_by_id<'ctx>(ctx: &Context<'ctx>, id: i32) -> Result<User, String> {
- let state = ctx.data::<AppState>().expect("Can't connect to db");
- let client = &*state.client;
- let auth: &Authentication = ctx.data().unwrap();
- match auth {
- Authentication::NotLogged => Err("Unauthorized".to_string()),
- Authentication::Logged(claims) => {
- let claim_user = find_user(client, claims.user_id)
- .await
- .expect("Should not be here");
-
- let rows;
- if claim_user.is_admin {
- rows = client
- .query(
- "SELECT id, email, name, address, is_admin FROM users
- WHERE id = $1",
- &[&id],
- )
- .await
- .unwrap();
- } else if claims.user_id != id {
- return Err("Unauthorized".to_string());
- } else {
- rows = client
- .query(
- "SELECT id, email, name, address, is_admin FROM users
- WHERE id = $1",
- &[&claims.user_id],
- )
- .await
- .unwrap();
- }
-
- let users: Vec<User> = rows
- .iter()
- .map(|row| User {
- id: row.get("id"),
- email: row.get("email"),
- password: String::new(),
- name: row.get("name"),
- address: row.get("address"),
- notification_token: None,
- is_admin: row.get("is_admin"),
- })
- .collect();
-
- if users.is_empty() {
- return Err("Not found".to_string());
- }
-
- Ok(users[0].clone())
- }
- }
-}
-
/// Find an user with id = `id` using the PostgreSQL `client`
pub async fn find_user(client: &Client, id: i32) -> Result<User, AppError> {
let rows = client
@@ -188,3 +82,146 @@ pub async fn find_user(client: &Client, id: i32) -> Result<User, AppError> {
Err(AppError::NotFound("User".to_string()))
}
}
+
+pub mod query {
+ use super::*;
+
+ /// Get users from the database
+ pub async fn get_users<'ctx>(
+ ctx: &Context<'ctx>,
+
+ // Optional limit results
+ limit: Option<i64>,
+ // Optional offset results. It should be used with limit field.
+ offset: Option<i64>,
+ ) -> Result<Option<Vec<User>>, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(claims) => {
+ let claim_user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
+
+ if !claim_user.is_admin {
+ return Err("Unauthorized".to_string());
+ }
+
+ let rows = client
+ .query(
+ "SELECT id, email, name, address, is_admin FROM users LIMIT $1 OFFSET $2",
+ &[&limit.unwrap_or(20), &offset.unwrap_or(0)],
+ )
+ .await
+ .unwrap();
+
+ let users: Vec<User> = rows
+ .iter()
+ .map(|row| User {
+ id: row.get("id"),
+ email: row.get("email"),
+ password: String::new(),
+ name: row.get("name"),
+ address: row.get("address"),
+ notification_token: None,
+ is_admin: row.get("is_admin"),
+ })
+ .collect();
+
+ Ok(Some(users))
+ }
+ }
+ }
+
+ /// Get users from the database
+ pub async fn get_user_by_id<'ctx>(ctx: &Context<'ctx>, id: i32) -> Result<User, String> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err("Unauthorized".to_string()),
+ Authentication::Logged(claims) => {
+ let claim_user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
+
+ let rows;
+ if claim_user.is_admin {
+ rows = client
+ .query(
+ "SELECT id, email, name, address, is_admin FROM users
+ WHERE id = $1",
+ &[&id],
+ )
+ .await
+ .unwrap();
+ } else if claims.user_id != id {
+ return Err("Unauthorized".to_string());
+ } else {
+ rows = client
+ .query(
+ "SELECT id, email, name, address, is_admin FROM users
+ WHERE id = $1",
+ &[&claims.user_id],
+ )
+ .await
+ .unwrap();
+ }
+
+ let users: Vec<User> = rows
+ .iter()
+ .map(|row| User {
+ id: row.get("id"),
+ email: row.get("email"),
+ password: String::new(),
+ name: row.get("name"),
+ address: row.get("address"),
+ notification_token: None,
+ is_admin: row.get("is_admin"),
+ })
+ .collect();
+
+ if users.is_empty() {
+ return Err("Not found".to_string());
+ }
+
+ Ok(users[0].clone())
+ }
+ }
+ }
+}
+
+pub mod mutations {
+ use super::*;
+
+ /// Register device mutation edits the `notification_token` value for a logged user
+ pub async fn register_device<'ctx>(
+ ctx: &Context<'ctx>,
+ input: RegisterNotificationToken,
+ ) -> FieldResult<User> {
+ let state = ctx.data::<AppState>().expect("Can't connect to db");
+ let client = &*state.client;
+
+ let auth: &Authentication = ctx.data().unwrap();
+ match auth {
+ Authentication::NotLogged => Err(Error::new("Can't find the owner")),
+ Authentication::Logged(claims) => {
+ let user = find_user(client, claims.user_id)
+ .await
+ .expect("Should not be here");
+
+ client
+ .query(
+ "UPDATE users SET notification_token = $1 WHERE id = $2",
+ &[&input.token, &claims.user_id],
+ )
+ .await
+ .unwrap();
+
+ Ok(user)
+ }
+ }
+ }
+}