Initial project structure and core files
Add base project files including environment example, license, README, .gitignore, error classes, ESLint config, database modules, texture assets, repositories, routes, schemas, services, and server entry point. This establishes the foundational structure for a Yggdrasil-compatible REST API with modular error handling, database setup, and route organization.
This commit is contained in:
26
routes/minecraftservices/minecraft/profile/capes/active.js
Normal file
26
routes/minecraftservices/minecraft/profile/capes/active.js
Normal file
@@ -0,0 +1,26 @@
|
||||
const express = require("express")
|
||||
const router = express.Router()
|
||||
const userService = require("../../../../../services/userService")
|
||||
const authService = require("../../../../../services/authService")
|
||||
|
||||
router.delete("/", async (req, res) => {
|
||||
const player = await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer", "").trim() })
|
||||
await userService.hideCape(player.user.uuid)
|
||||
return res.status(200).send()
|
||||
})
|
||||
|
||||
router.put("/", async (req, res) => {
|
||||
const player = await authService.verifyAccessToken(req.headers.authorization)
|
||||
|
||||
await userService.showCape(player.user.uuid, req.body.capeId)
|
||||
const [skinsResult, capesResult] = await Promise.all([userService.getSkins(player.user.uuid), userService.getCapes(player.user.uuid)])
|
||||
|
||||
return res.status(200).json({
|
||||
id: player.user.uuid.replace(/-/g, ""),
|
||||
name: player.user.username,
|
||||
skins: skinsResult.data || [],
|
||||
capes: capesResult.data || []
|
||||
})
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
18
routes/minecraftservices/minecraft/profile/index.js
Normal file
18
routes/minecraftservices/minecraft/profile/index.js
Normal file
@@ -0,0 +1,18 @@
|
||||
const express = require("express")
|
||||
const router = express.Router()
|
||||
const userService = require("../../../../services/userService")
|
||||
const authService = require("../../../../services/authService")
|
||||
|
||||
router.get("/", async (req, res) => {
|
||||
const player = await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer ", "") })
|
||||
const [skinsResult, capesResult] = await Promise.all([userService.getSkins(player.user.uuid), userService.getCapes(player.user.uuid)])
|
||||
|
||||
return res.status(200).json({
|
||||
id: player.uuid.replace(/-/g, ""),
|
||||
name: player.user.username,
|
||||
skins: skinsResult.data || [],
|
||||
capes: capesResult.data || []
|
||||
})
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
@@ -0,0 +1,10 @@
|
||||
const express = require("express")
|
||||
const userService = require("../../../../../../services/userService")
|
||||
const router = express.Router()
|
||||
|
||||
router.post("/", async (req, res) => {
|
||||
const profiles = await userService.bulkLookup(req.body)
|
||||
return res.status(200).json(profiles)
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
@@ -0,0 +1,27 @@
|
||||
const express = require("express")
|
||||
const utils = require("../../../../../../modules/utils")
|
||||
const userService = require("../../../../../../services/userService")
|
||||
const authService = require("../../../../../../services/authService")
|
||||
const { ServiceError } = require("../../../../../../errors/errors")
|
||||
const router = express.Router({ mergeParams: true })
|
||||
|
||||
router.get("", async (req, res) => {
|
||||
const profile = await userService.getLegacyProfile(req.params.username)
|
||||
const isUsernameOK = await authService.checkUsernameAvailability(newName)
|
||||
const at = req.query.at
|
||||
if (at != undefined && utils.isTrueFromDotEnv("SUPPORT_UUID_TO_NAME_HISTORY")) {
|
||||
const history = await userService.getNameUUIDs(parseInt(at))
|
||||
return res.status(history.code).json(history.data)
|
||||
} else {
|
||||
throw new ServiceError(400, req.originalUrl, "IllegalArgumentException", "Invalid timestamp.")
|
||||
}
|
||||
if (isUsernameOK.status != "AVAILABLE") {
|
||||
throw new ServiceError(400, req.originalUrl, "CONSTRAINT_VIOLATION", "Invalid username.")
|
||||
}
|
||||
if (!profile) {
|
||||
return res.status(204).send()
|
||||
}
|
||||
return res.status(200).json(profile)
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
44
routes/minecraftservices/minecraft/profile/name/[name].js
Normal file
44
routes/minecraftservices/minecraft/profile/name/[name].js
Normal file
@@ -0,0 +1,44 @@
|
||||
const express = require("express")
|
||||
const authService = require("../../../../../services/authService")
|
||||
const { DefaultError, ServiceError } = require("../../../../../errors/errors")
|
||||
const router = express.Router({ mergeParams: true })
|
||||
|
||||
router.get("/available", async (req, res) => {
|
||||
try {
|
||||
await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer", "").trim() })
|
||||
const isAvailable = await authService.checkUsernameAvailability(req.params.name)
|
||||
return res.status(200).json({ status: isAvailable.status })
|
||||
} catch (error) {
|
||||
if (error instanceof DefaultError) {
|
||||
throw new ServiceError(error.code, req.originalUrl, null, null, null)
|
||||
}
|
||||
throw error
|
||||
}
|
||||
})
|
||||
|
||||
router.put("/", async (req, res) => {
|
||||
try {
|
||||
const player = await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer", "").trim() })
|
||||
const newName = req.params.name
|
||||
|
||||
await userService.changeUsername(player.uuid, newName)
|
||||
|
||||
const skinsResult = await userService.getSkins({ uuid: player.uuid })
|
||||
const capesResult = await userService.getCapes({ uuid: player.uuid })
|
||||
|
||||
return res.status(200).json({
|
||||
id: player.uuid.replace(/-/g, ""),
|
||||
name: newName,
|
||||
skins: skinsResult.data || [],
|
||||
capes: capesResult.data || []
|
||||
})
|
||||
|
||||
} catch (err) {
|
||||
const mcStatus = err.code === 409 ? "DUPLICATE" : (err.code === 400 || err.code === 403) ? "NOT_ALLOWED" : null
|
||||
const finalCode = (mcStatus === "DUPLICATE") ? 403 : (err.code || 500)
|
||||
const errorType = mcStatus ? "FORBIDDEN" : (err.error || "Internal Server Error")
|
||||
throw new ServiceError(finalCode, req.originalUrl, errorType, err.message, mcStatus ? { status: mcStatus } : null)
|
||||
}
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
12
routes/minecraftservices/minecraft/profile/namechange.js
Normal file
12
routes/minecraftservices/minecraft/profile/namechange.js
Normal file
@@ -0,0 +1,12 @@
|
||||
const express = require("express")
|
||||
const router = express.Router()
|
||||
const userService = require("../../../../services/userService")
|
||||
const authService = require("../../../../services/authService")
|
||||
|
||||
router.get("/", async (req, res) => {
|
||||
const player = await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer ", "") })
|
||||
const nameChangeInformation = await userService.getPlayerNameChangeStatus(player.user.uuid)
|
||||
return res.status(nameChangeInformation.code).json(nameChangeInformation.data)
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
12
routes/minecraftservices/minecraft/profile/skins/active.js
Normal file
12
routes/minecraftservices/minecraft/profile/skins/active.js
Normal file
@@ -0,0 +1,12 @@
|
||||
const express = require("express")
|
||||
const router = express.Router()
|
||||
const userService = require("../../../../../services/userService")
|
||||
const authService = require("../../../../../services/authService")
|
||||
|
||||
router.delete("/", async (req, res) => {
|
||||
const player = await authService.verifyAccessToken({ accessToken: req.headers.authorization.replace("Bearer", "").trim() })
|
||||
await userService.resetSkin(player.user.uuid)
|
||||
return res.status(200).send()
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
77
routes/minecraftservices/minecraft/profile/skins/index.js
Normal file
77
routes/minecraftservices/minecraft/profile/skins/index.js
Normal file
@@ -0,0 +1,77 @@
|
||||
const fs = require("node:fs")
|
||||
const path = require("node:path")
|
||||
const express = require("express")
|
||||
const router = express.Router()
|
||||
const multer = require("multer")
|
||||
const rateLimit = require("express-rate-limit")
|
||||
const userService = require("../../../../../services/userService")
|
||||
const authService = require("../../../../../services/authService")
|
||||
const { DefaultError } = require("../../../../../errors/errors")
|
||||
|
||||
const TEMP_DIR = path.join(process.cwd(), "data", "temp")
|
||||
|
||||
if (!fs.existsSync(TEMP_DIR)) {
|
||||
fs.mkdirSync(TEMP_DIR, { recursive: true })
|
||||
}
|
||||
|
||||
const upload = multer({
|
||||
dest: TEMP_DIR,
|
||||
limits: { fileSize: 2 * 1024 * 1024 }
|
||||
})
|
||||
|
||||
const uploadLimiter = rateLimit({
|
||||
windowMs: 60 * 1000,
|
||||
max: 20,
|
||||
standardHeaders: true,
|
||||
legacyHeaders: false,
|
||||
validate: {
|
||||
ip: false
|
||||
},
|
||||
keyGenerator: (req) => {
|
||||
rateLimit.ipKeyGenerator()
|
||||
return req.headers.authorization || req.ip
|
||||
},
|
||||
handler: (req, res, next, options) => {
|
||||
throw new DefaultError(429, "Too many requests. Please try again later.")
|
||||
}
|
||||
})
|
||||
|
||||
|
||||
router.post("/", uploadLimiter, async (req, res, next) => {
|
||||
if (req.is('application/json')) {
|
||||
try {
|
||||
const token = req.headers.authorization.replace("Bearer ", "").trim()
|
||||
const player = await authService.verifyAccessToken({ accessToken: token })
|
||||
|
||||
await userService.uploadSkinFromUrl(player.user.uuid, req.body.url, req.body.variant)
|
||||
|
||||
return res.status(200).send()
|
||||
} catch (err) {
|
||||
return next(err)
|
||||
}
|
||||
}
|
||||
|
||||
else {
|
||||
upload.single("file")(req, res, async (err) => {
|
||||
if (err) return next(err)
|
||||
try {
|
||||
if (!req.headers.authorization) {
|
||||
if (req.file) await fs.promises.unlink(req.file.path).catch(() => {})
|
||||
throw new DefaultError(401, "Missing Authorization Header")
|
||||
}
|
||||
|
||||
const token = req.headers.authorization.replace("Bearer ", "").trim()
|
||||
const player = await authService.verifyAccessToken({ accessToken: token })
|
||||
|
||||
await userService.uploadSkin(player.user.uuid, req.file, req.body.variant)
|
||||
|
||||
return res.status(200).send()
|
||||
} catch (error) {
|
||||
if (req.file) await fs.promises.unlink(req.file.path).catch(() => {})
|
||||
return next(error)
|
||||
}
|
||||
})
|
||||
}
|
||||
})
|
||||
|
||||
module.exports = router
|
||||
Reference in New Issue
Block a user