Routes (additiv unter /api/v1/marketplace/*): - POST/GET /authors/me — eigenes Author-Profil anlegen/updaten/lesen - GET /authors/:slug — public Profile-Lookup (banned-reason gestrippt) - POST /decks — Deck-Init (Slug-Validation + Pflicht-Author-Profil + CHECK auf paid + Pro-License) - POST /decks/:slug/publish — Versions-Snapshot mit per-Karte cardContentHash aus @cards/domain, per-Version-Hash, AI-Mod-Stub-Log, atomarer latest_version_id-Bump in Drizzle-Transaction - PATCH /decks/:slug — Metadaten-Update (Owner-Only) - GET /decks/:slug — Public-Detail mit optional-auth-Middleware Geport aus cards-decommission-base:services/cards-server/, mit Greenfield-Anpassungen: - Hashing über @cards/domain.cardContentHash (gemeinsame SoT zwischen privatem cards.cards und marketplace.deck_cards), per- Version-Hash als SHA-256 über sortierte Karten-Hashes mit Ord-Prefix - AI-Moderation als R2-Stub (pass+rationale+model='stub'), echte mana-llm-Anbindung in späterer Welle - Auth-Middleware-Shape an Greenfield (userId/tier/authMode in c.get(...) statt user-Object), optional-auth als Schwester für anonymen Public-Read - Hono-typing: outer Marketplace-Decks-Router ist Partial<AuthVars> weil Public-GET kein JWT braucht; Auth-Subroute ist strict Lese-Referenz: - 3331 LOC altes cards-server-Code (routes, services, middleware, lib) unter docs/marketplace/archive/code/ archiviert. Read-only, nicht im Build-Path. Verifikation: - 16 neue Vitest-Tests (Slug + Version-Hash), 72 gesamt grün - type-check 0 errors - E2E-Smoke gegen lokale cards-api: Cardecky-Author + Deck r2-stoische-ethik mit 3 Karten v1.0.0 (basic + basic + cloze), per-Karten-Hashes geschrieben, ai_moderation_log-Row da, semver-409 + paid-422-Errors verifiziert. Smoke-Daten danach aufgeräumt. Verbleibend für R3+: Discovery (explore + search), Engagement (stars/ subscribe/fork), Smart-Merge mit FSRS-State-Erhalt; danach R4 PRs + Card-Discussions, R5 Frontend-Routes. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
45 lines
1.5 KiB
TypeScript
45 lines
1.5 KiB
TypeScript
import { Hono } from 'hono';
|
|
import { z } from 'zod';
|
|
import type { AuthUser } from '../middleware/jwt-auth';
|
|
import type { AuthorService } from '../services/authors';
|
|
import { BadRequestError, UnauthorizedError } from '../lib/errors';
|
|
|
|
const upsertSchema = z.object({
|
|
slug: z.string(),
|
|
displayName: z.string().min(1).max(80),
|
|
bio: z.string().max(500).optional(),
|
|
avatarUrl: z.string().url().max(512).optional(),
|
|
pseudonym: z.boolean().optional(),
|
|
});
|
|
|
|
function requireUser(user: AuthUser | undefined): AuthUser {
|
|
if (!user || !user.userId) throw new UnauthorizedError();
|
|
return user;
|
|
}
|
|
|
|
export function createAuthorRoutes(authorService: AuthorService) {
|
|
const router = new Hono<{ Variables: { user?: AuthUser } }>();
|
|
|
|
// POST /me + GET /me are write/private — auth required.
|
|
router.post('/me', async (c) => {
|
|
const user = requireUser(c.get('user'));
|
|
const parsed = upsertSchema.safeParse(await c.req.json().catch(() => ({})));
|
|
if (!parsed.success) throw new BadRequestError('Invalid body', parsed.error.format());
|
|
const author = await authorService.upsertMe(user.userId, parsed.data);
|
|
return c.json(author);
|
|
});
|
|
|
|
router.get('/me', async (c) => {
|
|
const user = requireUser(c.get('user'));
|
|
const author = await authorService.getByUserId(user.userId);
|
|
return c.json(author);
|
|
});
|
|
|
|
// GET /:slug is public — anyone can look up an author profile.
|
|
router.get('/:slug', async (c) => {
|
|
const author = await authorService.getPublicBySlug(c.req.param('slug'));
|
|
return c.json(author);
|
|
});
|
|
|
|
return router;
|
|
}
|