From 71c2f729208cecb039e2bd753a50b55c2788f2d0 Mon Sep 17 00:00:00 2001 From: Nathanael Sensfelder Date: Wed, 2 Jan 2019 01:46:34 +0100 Subject: Bounties? Somehow, Dialyzer does not see the type issues with src/bounty/bnt_join_battle.erl, but there are btl_character and rst_character mix-ups. --- src/battle/query/btl_join.erl | 183 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 183 insertions(+) create mode 100644 src/battle/query/btl_join.erl (limited to 'src/battle/query/btl_join.erl') diff --git a/src/battle/query/btl_join.erl b/src/battle/query/btl_join.erl new file mode 100644 index 0000000..a723a8b --- /dev/null +++ b/src/battle/query/btl_join.erl @@ -0,0 +1,183 @@ +-module(btl_join). + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%% TYPES %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +-include("../../../include/yaws_api.hrl"). + +-type mode() :: (attack | defend | {invalid, binary()}). + +-record +( + input, + { + player_id :: shr_player:id(), + session_token :: binary(), + mode :: mode(), + size :: non_neg_integer(), + roster_ixs :: list(non_neg_integer()), + map_id :: ataxia_id:type() + } +). + + +-type input() :: #input{}. +-type defend_query_state() :: 'ok'. +-type attack_query_state() :: 'ok'. + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%% EXPORTS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +-export([out/1]). + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%% LOCAL FUNCTIONS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +-spec parse_input (binary()) -> input(). +parse_input (Req) -> + JSONReqMap = jiffy:decode(Req, [return_maps]), + PlayerID = maps:get(<<"pid">>, JSONReqMap), + SessionToken = maps:get(<<"stk">>, JSONReqMap), + + Mode = + case maps:get(<<"m">>, JSONReqMap) of + <<"a">> -> attack; + <<"d">> -> defend; + V -> {invalid, V} + end, + + true = ((Mode == attack) or (Mode == defend)), + + Size = + case maps:get(<<"s">>, JSONReqMap) of + <<"s">> -> 8; + <<"m">> -> 16; + <<"l">> -> 24; + _ -> 0 + end, + + Roster = maps:get(<<"r">>, JSONReqMap), + MapID = maps:get(<<"map_id">>, JSONReqMap), + + #input + { + player_id = PlayerID, + session_token = SessionToken, + mode = Mode, + size = Size, + roster_ixs = Roster, + map_id = MapID + }. + +-spec authenticate_user (input()) -> ('ok' | 'error'). +authenticate_user (Input) -> + PlayerID = Input#input.player_id, + SessionToken = Input#input.session_token, + + Player = shr_timed_cache:fetch(player_db, any, PlayerID), + + case shr_security:credentials_match(SessionToken, Player) of + true -> ok; + _ -> error + end. + +-spec handle_attack (input()) -> 'ok'. +handle_attack (Input) -> + PlayerID = Input#input.player_id, + SelectedCharacterIXs = Input#input.roster_ixs, + PlayerDBUser = ataxia_security:user_from_id(PlayerID), + PartySize = length(SelectedCharacterIXs), + + % TODO: be less brutal if none is found. + {ok, AvailablePendingBattle, _ID} = + ataxia_client:update_and_fetch_any + ( + btl_pending, + PlayerDBUser, + ataxic:update_lock + ( + ataxic:apply_function + ( + ataxia_lock, + locked, + [ + ataxic:constant(PlayerDBUser), + ataxic:constant(60) + ] + ) + ), + ataxic:ge + ( + ataxic:field + ( + ataxia_entry:get_value_field(), + ataxic:field + ( + btl_pending_battle:get_free_slots_field(), + ataxic:current_value() + ) + ), + ataxic:constant(PartySize) + ) + ), + + bnt_join_battle:attempt + ( + PlayerID, + SelectedCharacterIXs, + AvailablePendingBattle + ), + + ok. +-spec handle_defend (input()) -> 'ok'. +handle_defend (Input) -> + PlayerID = Input#input.player_id, + SelectedCharacterIXs = Input#input.roster_ixs, + MapID = Input#input.map_id, + + bnt_join_battle:generate(PlayerID, MapID, SelectedCharacterIXs), + + ok. + +-spec fetch_attack_data (input()) -> attack_query_state(). +fetch_attack_data (_Input) -> ok. % TODO + +-spec fetch_defend_data (input()) -> defend_query_state(). +fetch_defend_data (_Input) -> ok. % TODO + +-spec authorize_attack (attack_query_state(), input()) -> 'ok'. +authorize_attack (_QueryState, _Input) -> ok. % TODO + +-spec authorize_defend (defend_query_state(), input()) -> 'ok'. +authorize_defend (_QueryState, _Input) -> ok. % TODO + +-spec handle (binary()) -> binary(). +handle (Req) -> + Input = parse_input(Req), + case authenticate_user(Input) of + ok -> + case Input#input.mode of + attack -> + QueryState = fetch_attack_data(Input), + ok = authorize_attack(QueryState, Input), + handle_attack(Input); + + defend -> + QueryState = fetch_defend_data(Input), + ok = authorize_defend(QueryState, Input), + handle_defend(Input) + end, + jiffy:encode([shr_okay:generate()]); + + error -> jiffy:encode([shr_disconnected:generate()]) + end. + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%% EXPORTED FUNCTIONS %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +out(A) -> + { + content, + "application/json; charset=UTF-8", + handle(A#arg.clidata) + }. -- cgit v1.2.3-70-g09d2