Initial commit: Open sourcing all of the Maple Open Technologies code.

This commit is contained in:
Bartlomiej Mika 2025-12-02 14:33:08 -05:00
commit 755d54a99d
2010 changed files with 448675 additions and 0 deletions

View file

@ -0,0 +1,97 @@
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/blockedemail/create.go
package blockedemail
import (
"bytes"
"context"
"encoding/json"
"io"
"net/http"
"go.uber.org/zap"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/config"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/middleware"
svc_blockedemail "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/blockedemail"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
)
type CreateBlockedEmailHTTPHandler struct {
config *config.Configuration
logger *zap.Logger
service svc_blockedemail.CreateBlockedEmailService
middleware middleware.Middleware
}
func NewCreateBlockedEmailHTTPHandler(
config *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.CreateBlockedEmailService,
middleware middleware.Middleware,
) *CreateBlockedEmailHTTPHandler {
logger = logger.Named("CreateBlockedEmailHTTPHandler")
return &CreateBlockedEmailHTTPHandler{
config: config,
logger: logger,
service: service,
middleware: middleware,
}
}
func (*CreateBlockedEmailHTTPHandler) Pattern() string {
return "POST /api/v1/me/blocked-emails"
}
func (h *CreateBlockedEmailHTTPHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
h.middleware.Attach(h.Execute)(w, req)
}
func (h *CreateBlockedEmailHTTPHandler) unmarshalRequest(
ctx context.Context,
r *http.Request,
) (*svc_blockedemail.CreateBlockedEmailRequestDTO, error) {
var requestData svc_blockedemail.CreateBlockedEmailRequestDTO
defer r.Body.Close()
var rawJSON bytes.Buffer
teeReader := io.TeeReader(r.Body, &rawJSON)
err := json.NewDecoder(teeReader).Decode(&requestData)
if err != nil {
h.logger.Error("decoding error",
zap.Any("err", err))
// Log raw JSON at debug level only to avoid PII exposure in production logs
h.logger.Debug("raw request body for debugging",
zap.String("json", rawJSON.String()))
return nil, httperror.NewForSingleField(http.StatusBadRequest, "non_field_error", "payload structure is wrong")
}
return &requestData, nil
}
func (h *CreateBlockedEmailHTTPHandler) Execute(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
ctx := r.Context()
req, err := h.unmarshalRequest(ctx, r)
if err != nil {
httperror.RespondWithError(w, r, err)
return
}
resp, err := h.service.Execute(ctx, req)
if err != nil {
httperror.RespondWithError(w, r, err)
return
}
w.WriteHeader(http.StatusCreated)
if err := json.NewEncoder(w).Encode(resp); err != nil {
h.logger.Error("failed to encode response",
zap.Any("error", err))
httperror.RespondWithError(w, r, err)
return
}
}

View file

@ -0,0 +1,87 @@
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/blockedemail/delete.go
package blockedemail
import (
"encoding/json"
"net/http"
"net/url"
"go.uber.org/zap"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/config"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/middleware"
svc_blockedemail "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/blockedemail"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/validation"
)
type DeleteBlockedEmailHTTPHandler struct {
config *config.Configuration
logger *zap.Logger
service svc_blockedemail.DeleteBlockedEmailService
middleware middleware.Middleware
}
func NewDeleteBlockedEmailHTTPHandler(
config *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.DeleteBlockedEmailService,
middleware middleware.Middleware,
) *DeleteBlockedEmailHTTPHandler {
logger = logger.Named("DeleteBlockedEmailHTTPHandler")
return &DeleteBlockedEmailHTTPHandler{
config: config,
logger: logger,
service: service,
middleware: middleware,
}
}
func (*DeleteBlockedEmailHTTPHandler) Pattern() string {
return "DELETE /api/v1/me/blocked-emails/{email}"
}
func (h *DeleteBlockedEmailHTTPHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
h.middleware.Attach(h.Execute)(w, req)
}
func (h *DeleteBlockedEmailHTTPHandler) Execute(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
ctx := r.Context()
// Extract email from URL path
emailEncoded := r.PathValue("email")
if emailEncoded == "" {
httperror.RespondWithError(w, r, httperror.NewBadRequestError("Email is required"))
return
}
// URL decode the email using PathUnescape (not QueryUnescape)
// PathUnescape correctly handles %2B as + instead of treating + as space
email, err := url.PathUnescape(emailEncoded)
if err != nil {
h.logger.Error("failed to decode email",
zap.String("encoded_email", validation.MaskEmail(emailEncoded)),
zap.Any("error", err))
httperror.RespondWithError(w, r, httperror.NewBadRequestError("Invalid email format"))
return
}
h.logger.Debug("decoded email from path",
zap.String("encoded", validation.MaskEmail(emailEncoded)),
zap.String("decoded", validation.MaskEmail(email)))
resp, err := h.service.Execute(ctx, email)
if err != nil {
httperror.RespondWithError(w, r, err)
return
}
if err := json.NewEncoder(w).Encode(resp); err != nil {
h.logger.Error("failed to encode response",
zap.Any("error", err))
httperror.RespondWithError(w, r, err)
return
}
}

View file

@ -0,0 +1,63 @@
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/blockedemail/list.go
package blockedemail
import (
"encoding/json"
"net/http"
"go.uber.org/zap"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/config"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/middleware"
svc_blockedemail "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/blockedemail"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/pkg/httperror"
)
type ListBlockedEmailsHTTPHandler struct {
config *config.Configuration
logger *zap.Logger
service svc_blockedemail.ListBlockedEmailsService
middleware middleware.Middleware
}
func NewListBlockedEmailsHTTPHandler(
config *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.ListBlockedEmailsService,
middleware middleware.Middleware,
) *ListBlockedEmailsHTTPHandler {
logger = logger.Named("ListBlockedEmailsHTTPHandler")
return &ListBlockedEmailsHTTPHandler{
config: config,
logger: logger,
service: service,
middleware: middleware,
}
}
func (*ListBlockedEmailsHTTPHandler) Pattern() string {
return "GET /api/v1/me/blocked-emails"
}
func (h *ListBlockedEmailsHTTPHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
h.middleware.Attach(h.Execute)(w, req)
}
func (h *ListBlockedEmailsHTTPHandler) Execute(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
ctx := r.Context()
resp, err := h.service.Execute(ctx)
if err != nil {
httperror.RespondWithError(w, r, err)
return
}
if err := json.NewEncoder(w).Encode(resp); err != nil {
h.logger.Error("failed to encode response",
zap.Any("error", err))
httperror.RespondWithError(w, r, err)
return
}
}

View file

@ -0,0 +1,37 @@
// codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/blockedemail/provider.go
package blockedemail
import (
"go.uber.org/zap"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/config"
"codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/interface/http/middleware"
svc_blockedemail "codeberg.org/mapleopentech/monorepo/cloud/maplefile-backend/internal/service/blockedemail"
)
func ProvideCreateBlockedEmailHTTPHandler(
cfg *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.CreateBlockedEmailService,
middleware middleware.Middleware,
) *CreateBlockedEmailHTTPHandler {
return NewCreateBlockedEmailHTTPHandler(cfg, logger, service, middleware)
}
func ProvideListBlockedEmailsHTTPHandler(
cfg *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.ListBlockedEmailsService,
middleware middleware.Middleware,
) *ListBlockedEmailsHTTPHandler {
return NewListBlockedEmailsHTTPHandler(cfg, logger, service, middleware)
}
func ProvideDeleteBlockedEmailHTTPHandler(
cfg *config.Configuration,
logger *zap.Logger,
service svc_blockedemail.DeleteBlockedEmailService,
middleware middleware.Middleware,
) *DeleteBlockedEmailHTTPHandler {
return NewDeleteBlockedEmailHTTPHandler(cfg, logger, service, middleware)
}