2023-01-20 01:20:56 +09:00
|
|
|
import { withoutProtocol } from 'ufo'
|
2023-01-10 21:29:16 +09:00
|
|
|
import type { mastodon } from 'masto'
|
2023-01-14 18:55:09 +09:00
|
|
|
import type { EffectScope, Ref } from 'vue'
|
2023-05-02 08:58:55 +09:00
|
|
|
import type { MaybeRefOrGetter, RemovableRef } from '@vueuse/core'
|
2023-01-15 17:38:02 +09:00
|
|
|
import type { ElkMasto } from './masto/masto'
|
|
|
|
import type { UserLogin } from '~/types'
|
|
|
|
import type { Overwrite } from '~/types/utils'
|
2022-12-18 08:29:16 +09:00
|
|
|
import {
|
|
|
|
DEFAULT_POST_CHARS_LIMIT,
|
2023-01-14 18:34:53 +09:00
|
|
|
STORAGE_KEY_CURRENT_USER_HANDLE,
|
2023-01-15 18:21:03 +09:00
|
|
|
STORAGE_KEY_NODES,
|
2022-12-18 08:29:16 +09:00
|
|
|
STORAGE_KEY_NOTIFICATION,
|
|
|
|
STORAGE_KEY_NOTIFICATION_POLICY,
|
|
|
|
STORAGE_KEY_SERVERS,
|
|
|
|
STORAGE_KEY_USERS,
|
|
|
|
} from '~/constants'
|
|
|
|
import type { PushNotificationPolicy, PushNotificationRequest } from '~/composables/push-notifications/types'
|
2023-01-03 09:18:01 +09:00
|
|
|
import { useAsyncIDBKeyval } from '~/composables/idb'
|
2022-11-23 08:08:36 +09:00
|
|
|
|
2022-11-29 15:39:49 +09:00
|
|
|
const mock = process.mock
|
2023-01-02 04:38:05 +09:00
|
|
|
|
2023-03-31 04:01:24 +09:00
|
|
|
function initializeUsers(): Promise<Ref<UserLogin[]> | RemovableRef<UserLogin[]>> | Ref<UserLogin[]> | RemovableRef<UserLogin[]> {
|
2023-01-02 04:38:05 +09:00
|
|
|
let defaultUsers = mock ? [mock.user] : []
|
|
|
|
|
|
|
|
// Backward compatibility with localStorage
|
|
|
|
let removeUsersOnLocalStorage = false
|
|
|
|
if (globalThis?.localStorage) {
|
|
|
|
const usersOnLocalStorageString = globalThis.localStorage.getItem(STORAGE_KEY_USERS)
|
|
|
|
if (usersOnLocalStorageString) {
|
|
|
|
defaultUsers = JSON.parse(usersOnLocalStorageString)
|
|
|
|
removeUsersOnLocalStorage = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const users = process.server
|
|
|
|
? ref<UserLogin[]>(defaultUsers)
|
2023-02-06 18:34:50 +09:00
|
|
|
: useAsyncIDBKeyval<UserLogin[]>(STORAGE_KEY_USERS, defaultUsers, { deep: true })
|
2023-01-02 04:38:05 +09:00
|
|
|
|
|
|
|
if (removeUsersOnLocalStorage)
|
|
|
|
globalThis.localStorage.removeItem(STORAGE_KEY_USERS)
|
|
|
|
|
|
|
|
return users
|
|
|
|
}
|
|
|
|
|
2023-02-06 18:34:50 +09:00
|
|
|
const users = process.server ? initializeUsers() as Ref<UserLogin[]> | RemovableRef<UserLogin[]> : await initializeUsers()
|
2023-01-30 19:58:18 +09:00
|
|
|
const nodes = useLocalStorage<Record<string, any>>(STORAGE_KEY_NODES, {}, { deep: true })
|
2023-01-30 00:58:32 +09:00
|
|
|
const currentUserHandle = useLocalStorage<string>(STORAGE_KEY_CURRENT_USER_HANDLE, mock ? mock.user.account.id : '')
|
2023-01-30 19:58:18 +09:00
|
|
|
export const instanceStorage = useLocalStorage<Record<string, mastodon.v1.Instance>>(STORAGE_KEY_SERVERS, mock ? mock.server : {}, { deep: true })
|
2022-11-23 08:08:36 +09:00
|
|
|
|
2023-01-15 18:44:36 +09:00
|
|
|
export type ElkInstance = Partial<mastodon.v1.Instance> & {
|
|
|
|
uri: string
|
|
|
|
/** support GoToSocial */
|
|
|
|
accountDomain?: string | null
|
|
|
|
}
|
2023-03-31 04:01:24 +09:00
|
|
|
export function getInstanceCache(server: string): mastodon.v1.Instance | undefined {
|
|
|
|
return instanceStorage.value[server]
|
|
|
|
}
|
2023-01-15 17:38:02 +09:00
|
|
|
|
2022-11-23 08:08:36 +09:00
|
|
|
export const currentUser = computed<UserLogin | undefined>(() => {
|
2023-01-30 00:58:32 +09:00
|
|
|
if (currentUserHandle.value) {
|
|
|
|
const user = users.value.find(user => user.account?.acct === currentUserHandle.value)
|
2022-11-23 08:08:36 +09:00
|
|
|
if (user)
|
|
|
|
return user
|
|
|
|
}
|
|
|
|
// Fallback to the first account
|
2022-11-23 13:25:48 +09:00
|
|
|
return users.value[0]
|
2022-11-23 08:08:36 +09:00
|
|
|
})
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
const publicInstance = ref<ElkInstance | null>(null)
|
2023-01-30 19:58:18 +09:00
|
|
|
export const currentInstance = computed<null | ElkInstance>(() => currentUser.value ? instanceStorage.value[currentUser.value.server] ?? null : publicInstance.value)
|
2022-12-13 22:49:22 +09:00
|
|
|
|
2023-01-15 18:44:36 +09:00
|
|
|
export function getInstanceDomain(instance: ElkInstance) {
|
2023-01-20 01:20:56 +09:00
|
|
|
return instance.accountDomain || withoutProtocol(instance.uri)
|
2023-01-15 18:44:36 +09:00
|
|
|
}
|
|
|
|
|
2023-01-08 06:38:31 +09:00
|
|
|
export const publicServer = ref('')
|
2022-11-30 05:51:52 +09:00
|
|
|
export const currentServer = computed<string>(() => currentUser.value?.server || publicServer.value)
|
2022-11-23 08:08:36 +09:00
|
|
|
|
2023-01-15 18:21:03 +09:00
|
|
|
export const currentNodeInfo = computed<null | Record<string, any>>(() => nodes.value[currentServer.value] || null)
|
|
|
|
export const isGotoSocial = computed(() => currentNodeInfo.value?.software?.name === 'gotosocial')
|
|
|
|
export const isGlitchEdition = computed(() => currentInstance.value?.version?.includes('+glitch'))
|
|
|
|
|
2023-01-06 08:39:10 +09:00
|
|
|
// when multiple tabs: we need to reload window when sign in, switch account or sign out
|
|
|
|
if (process.client) {
|
|
|
|
const windowReload = () => {
|
|
|
|
document.visibilityState === 'visible' && window.location.reload()
|
|
|
|
}
|
2023-01-30 00:58:32 +09:00
|
|
|
watch(currentUserHandle, async (handle, oldHandle) => {
|
2023-01-06 08:39:10 +09:00
|
|
|
// when sign in or switch account
|
2023-01-30 00:58:32 +09:00
|
|
|
if (handle) {
|
|
|
|
if (handle === currentUser.value?.account?.acct) {
|
2023-01-06 08:39:10 +09:00
|
|
|
// when sign in, the other tab will not have the user, idb is not reactive
|
2023-01-30 00:58:32 +09:00
|
|
|
const newUser = users.value.find(user => user.account?.acct === handle)
|
2023-01-06 08:39:10 +09:00
|
|
|
// if the user is there, then we are switching account
|
|
|
|
if (newUser) {
|
|
|
|
// check if the change is on current tab: if so, don't reload
|
|
|
|
if (document.hasFocus() || document.visibilityState === 'visible')
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
window.addEventListener('visibilitychange', windowReload, { capture: true })
|
|
|
|
}
|
|
|
|
// when sign out
|
2023-01-30 00:58:32 +09:00
|
|
|
else if (oldHandle) {
|
|
|
|
const oldUser = users.value.find(user => user.account?.acct === oldHandle)
|
2023-01-06 08:39:10 +09:00
|
|
|
// when sign out, the other tab will not have the user, idb is not reactive
|
|
|
|
if (oldUser)
|
|
|
|
window.addEventListener('visibilitychange', windowReload, { capture: true })
|
|
|
|
}
|
|
|
|
}, { immediate: true, flush: 'post' })
|
2023-01-14 18:34:53 +09:00
|
|
|
}
|
2022-11-23 12:48:01 +09:00
|
|
|
|
2023-03-31 04:01:24 +09:00
|
|
|
export function useUsers() {
|
|
|
|
return users
|
|
|
|
}
|
2023-05-02 08:58:55 +09:00
|
|
|
export function useSelfAccount(user: MaybeRefOrGetter<mastodon.v1.Account | undefined>) {
|
2023-03-31 04:01:24 +09:00
|
|
|
return computed(() => currentUser.value && resolveUnref(user)?.id === currentUser.value.account.id)
|
|
|
|
}
|
2022-11-25 23:01:28 +09:00
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
export const characterLimit = computed(() => currentInstance.value?.configuration?.statuses.maxCharacters ?? DEFAULT_POST_CHARS_LIMIT)
|
2022-11-25 23:01:28 +09:00
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
export async function loginTo(masto: ElkMasto, user: Overwrite<UserLogin, { account?: mastodon.v1.AccountCredentials }>) {
|
|
|
|
const { client } = $(masto)
|
|
|
|
const instance = mastoLogin(masto, user)
|
2022-11-28 00:13:04 +09:00
|
|
|
|
2023-01-15 18:21:03 +09:00
|
|
|
// GoToSocial only API
|
|
|
|
const url = `https://${user.server}`
|
|
|
|
fetch(`${url}/nodeinfo/2.0`).then(r => r.json()).then((info) => {
|
|
|
|
nodes.value[user.server] = info
|
2023-01-15 19:11:19 +09:00
|
|
|
}).catch(() => undefined)
|
2023-01-15 18:21:03 +09:00
|
|
|
|
2022-11-30 05:51:52 +09:00
|
|
|
if (!user?.token) {
|
2023-01-15 17:38:02 +09:00
|
|
|
publicServer.value = user.server
|
2023-01-13 01:01:18 +09:00
|
|
|
publicInstance.value = instance
|
2023-01-15 17:38:02 +09:00
|
|
|
return
|
2022-11-30 05:51:52 +09:00
|
|
|
}
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
function getUser() {
|
|
|
|
return users.value.find(u => u.server === user.server && u.token === user.token)
|
2022-11-28 00:13:04 +09:00
|
|
|
}
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
const account = getUser()?.account
|
|
|
|
if (account)
|
2023-01-30 00:58:32 +09:00
|
|
|
currentUserHandle.value = account.acct
|
2023-01-15 17:38:02 +09:00
|
|
|
|
|
|
|
const [me, pushSubscription] = await Promise.all([
|
|
|
|
fetchAccountInfo(client, user.server),
|
|
|
|
// if PWA is not enabled, don't get push subscription
|
2023-01-29 23:18:27 +09:00
|
|
|
useAppConfig().pwaEnabled
|
2023-01-15 17:38:02 +09:00
|
|
|
// we get 404 response instead empty data
|
|
|
|
? client.v1.webPushSubscriptions.fetch().catch(() => Promise.resolve(undefined))
|
|
|
|
: Promise.resolve(undefined),
|
|
|
|
])
|
|
|
|
|
|
|
|
const existingUser = getUser()
|
|
|
|
if (existingUser) {
|
|
|
|
existingUser.account = me
|
|
|
|
existingUser.pushSubscription = pushSubscription
|
2022-12-26 16:33:14 +09:00
|
|
|
}
|
2023-01-15 17:38:02 +09:00
|
|
|
else {
|
|
|
|
users.value.push({
|
|
|
|
...user,
|
|
|
|
account: me,
|
|
|
|
pushSubscription,
|
2022-12-05 04:56:33 +09:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-01-30 00:58:32 +09:00
|
|
|
currentUserHandle.value = me.acct
|
2022-11-23 08:08:36 +09:00
|
|
|
}
|
2022-11-23 13:20:59 +09:00
|
|
|
|
2023-05-06 02:34:43 +09:00
|
|
|
const accountPreferencesMap = new Map<string, Partial<mastodon.v1.Preference>>()
|
2023-05-06 01:12:07 +09:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @returns `true` when user ticked the preference to always expand posts with content warnings
|
|
|
|
*/
|
2023-05-05 05:29:47 +09:00
|
|
|
export function getExpandSpoilersByDefault(account: mastodon.v1.AccountCredentials) {
|
|
|
|
return accountPreferencesMap.get(account.acct)?.['reading:expand:spoilers'] ?? false
|
|
|
|
}
|
|
|
|
|
2023-05-06 01:12:07 +09:00
|
|
|
/**
|
|
|
|
* @returns `true` when user selected "Always show media" as Media Display preference
|
|
|
|
*/
|
|
|
|
export function getExpandMediaByDefault(account: mastodon.v1.AccountCredentials) {
|
|
|
|
return accountPreferencesMap.get(account.acct)?.['reading:expand:media'] === 'show_all' ?? false
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @returns `true` when user selected "Always hide media" as Media Display preference
|
|
|
|
*/
|
|
|
|
export function getHideMediaByDefault(account: mastodon.v1.AccountCredentials) {
|
|
|
|
return accountPreferencesMap.get(account.acct)?.['reading:expand:media'] === 'hide_all' ?? false
|
|
|
|
}
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
export async function fetchAccountInfo(client: mastodon.Client, server: string) {
|
2023-05-06 02:34:43 +09:00
|
|
|
// Try to fetch user preferences if the backend supports it.
|
|
|
|
const fetchPrefs = async (): Promise<Partial<mastodon.v1.Preference>> => {
|
|
|
|
try {
|
|
|
|
return await client.v1.preferences.fetch()
|
|
|
|
}
|
|
|
|
catch (e) {
|
|
|
|
console.warn(`Cannot fetch preferences: ${e}`)
|
|
|
|
return {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-05 05:29:47 +09:00
|
|
|
const [account, preferences] = await Promise.all([
|
|
|
|
client.v1.accounts.verifyCredentials(),
|
2023-05-06 02:34:43 +09:00
|
|
|
fetchPrefs(),
|
2023-05-05 05:29:47 +09:00
|
|
|
])
|
|
|
|
|
2023-05-10 21:19:50 +09:00
|
|
|
if (!account.acct.includes('@')) {
|
|
|
|
const webDomain = getInstanceDomainFromServer(server)
|
|
|
|
account.acct = `${account.acct}@${webDomain}`
|
|
|
|
}
|
2023-05-05 05:29:47 +09:00
|
|
|
|
|
|
|
// TODO: lazy load preferences
|
|
|
|
accountPreferencesMap.set(account.acct, preferences)
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
cacheAccount(account, server, true)
|
|
|
|
return account
|
2022-12-26 17:50:11 +09:00
|
|
|
}
|
|
|
|
|
2023-05-10 21:19:50 +09:00
|
|
|
export function getInstanceDomainFromServer(server: string) {
|
|
|
|
const instance = getInstanceCache(server)
|
|
|
|
const webDomain = instance ? getInstanceDomain(instance) : server
|
|
|
|
return webDomain
|
|
|
|
}
|
|
|
|
|
2023-01-15 17:38:02 +09:00
|
|
|
export async function refreshAccountInfo() {
|
|
|
|
const account = await fetchAccountInfo(useMastoClient(), currentServer.value)
|
|
|
|
currentUser.value!.account = account
|
|
|
|
return account
|
2022-12-26 17:50:11 +09:00
|
|
|
}
|
|
|
|
|
2022-12-22 22:48:20 +09:00
|
|
|
export async function removePushNotificationData(user: UserLogin, fromSWPushManager = true) {
|
2022-12-18 08:29:16 +09:00
|
|
|
// clear push subscription
|
|
|
|
user.pushSubscription = undefined
|
|
|
|
const { acct } = user.account
|
|
|
|
// clear request notification permission
|
|
|
|
delete useLocalStorage<PushNotificationRequest>(STORAGE_KEY_NOTIFICATION, {}).value[acct]
|
|
|
|
// clear push notification policy
|
|
|
|
delete useLocalStorage<PushNotificationPolicy>(STORAGE_KEY_NOTIFICATION_POLICY, {}).value[acct]
|
|
|
|
|
2023-01-29 23:18:27 +09:00
|
|
|
const pwaEnabled = useAppConfig().pwaEnabled
|
2023-01-08 23:12:25 +09:00
|
|
|
const pwa = useNuxtApp().$pwa
|
|
|
|
const registrationError = pwa?.registrationError === true
|
|
|
|
const unregister = pwaEnabled && !registrationError && pwa?.registrationError === true && fromSWPushManager
|
2022-12-24 03:28:10 +09:00
|
|
|
|
2022-12-18 08:29:16 +09:00
|
|
|
// we remove the sw push manager if required and there are no more accounts with subscriptions
|
2023-01-08 23:12:25 +09:00
|
|
|
if (unregister && (users.value.length === 0 || users.value.every(u => !u.pushSubscription))) {
|
2022-12-18 08:29:16 +09:00
|
|
|
// clear sw push subscription
|
|
|
|
try {
|
|
|
|
const registration = await navigator.serviceWorker.ready
|
|
|
|
const subscription = await registration.pushManager.getSubscription()
|
|
|
|
if (subscription)
|
|
|
|
await subscription.unsubscribe()
|
|
|
|
}
|
|
|
|
catch {
|
2023-01-12 14:39:22 +09:00
|
|
|
// just ignore
|
2022-12-18 08:29:16 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-22 22:48:20 +09:00
|
|
|
export async function removePushNotifications(user: UserLogin) {
|
2022-12-24 03:28:10 +09:00
|
|
|
if (!user.pushSubscription)
|
2022-12-22 22:48:20 +09:00
|
|
|
return
|
|
|
|
|
|
|
|
// unsubscribe push notifications
|
2023-01-15 17:38:02 +09:00
|
|
|
await useMastoClient().v1.webPushSubscriptions.remove().catch(() => Promise.resolve())
|
|
|
|
}
|
|
|
|
|
|
|
|
export async function switchUser(user: UserLogin) {
|
|
|
|
const masto = useMasto()
|
|
|
|
|
|
|
|
await loginTo(masto, user)
|
|
|
|
|
|
|
|
// This only cleans up the URL; page content should stay the same
|
|
|
|
const route = useRoute()
|
|
|
|
const router = useRouter()
|
|
|
|
if ('server' in route.params && user?.token && !useNuxtApp()._processingMiddleware) {
|
|
|
|
await router.push({
|
|
|
|
...route,
|
|
|
|
force: true,
|
|
|
|
})
|
|
|
|
}
|
2022-12-22 22:48:20 +09:00
|
|
|
}
|
|
|
|
|
2023-01-30 19:58:18 +09:00
|
|
|
export async function signOut() {
|
2022-11-23 13:20:59 +09:00
|
|
|
// TODO: confirm
|
|
|
|
if (!currentUser.value)
|
|
|
|
return
|
|
|
|
|
2022-12-21 00:56:54 +09:00
|
|
|
const masto = useMasto()
|
|
|
|
|
2022-11-27 04:33:36 +09:00
|
|
|
const _currentUserId = currentUser.value.account.id
|
|
|
|
|
|
|
|
const index = users.value.findIndex(u => u.account?.id === _currentUserId)
|
|
|
|
|
|
|
|
if (index !== -1) {
|
|
|
|
// Clear stale data
|
2022-12-13 22:22:27 +09:00
|
|
|
clearUserLocalStorage()
|
2022-12-20 09:16:15 +09:00
|
|
|
if (!users.value.some((u, i) => u.server === currentUser.value!.server && i !== index))
|
2023-01-30 19:58:18 +09:00
|
|
|
delete instanceStorage.value[currentUser.value.server]
|
2022-11-23 13:20:59 +09:00
|
|
|
|
2022-12-18 08:29:16 +09:00
|
|
|
await removePushNotifications(currentUser.value)
|
|
|
|
|
2022-12-22 22:48:20 +09:00
|
|
|
await removePushNotificationData(currentUser.value)
|
|
|
|
|
2023-01-30 00:58:32 +09:00
|
|
|
currentUserHandle.value = ''
|
2022-11-27 04:33:36 +09:00
|
|
|
// Remove the current user from the users
|
|
|
|
users.value.splice(index, 1)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set currentUserId to next user if available
|
2023-01-30 00:58:32 +09:00
|
|
|
currentUserHandle.value = users.value[0]?.account?.acct
|
2022-11-27 04:33:36 +09:00
|
|
|
|
2023-01-30 00:58:32 +09:00
|
|
|
if (!currentUserHandle.value)
|
2022-12-12 08:30:26 +09:00
|
|
|
await useRouter().push('/')
|
2022-11-23 13:20:59 +09:00
|
|
|
|
2023-02-05 21:10:19 +09:00
|
|
|
loginTo(masto, currentUser.value || { server: publicServer.value })
|
2022-11-23 13:20:59 +09:00
|
|
|
}
|
2022-12-02 11:18:57 +09:00
|
|
|
|
|
|
|
export function checkLogin() {
|
|
|
|
if (!currentUser.value) {
|
|
|
|
openSigninDialog()
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
2022-12-13 22:22:27 +09:00
|
|
|
|
2023-01-14 18:55:09 +09:00
|
|
|
interface UseUserLocalStorageCache {
|
|
|
|
scope: EffectScope
|
|
|
|
value: Ref<Record<string, any>>
|
|
|
|
}
|
|
|
|
|
2022-12-13 22:22:27 +09:00
|
|
|
/**
|
|
|
|
* Create reactive storage for the current user
|
|
|
|
*/
|
2023-01-14 19:09:17 +09:00
|
|
|
export function useUserLocalStorage<T extends object>(key: string, initial: () => T): Ref<T> {
|
2023-01-16 04:09:01 +09:00
|
|
|
if (process.server || process.test)
|
2023-01-14 19:09:17 +09:00
|
|
|
return shallowRef(initial())
|
|
|
|
|
2023-01-14 18:55:09 +09:00
|
|
|
// @ts-expect-error bind value to the function
|
|
|
|
const map: Map<string, UseUserLocalStorageCache> = useUserLocalStorage._ = useUserLocalStorage._ || new Map()
|
|
|
|
|
|
|
|
if (!map.has(key)) {
|
|
|
|
const scope = effectScope(true)
|
|
|
|
const value = scope.run(() => {
|
|
|
|
const all = useLocalStorage<Record<string, T>>(key, {}, { deep: true })
|
2023-05-10 21:19:50 +09:00
|
|
|
|
2023-01-14 18:55:09 +09:00
|
|
|
return computed(() => {
|
|
|
|
const id = currentUser.value?.account.id
|
|
|
|
? currentUser.value.account.acct
|
|
|
|
: '[anonymous]'
|
2023-05-10 21:19:50 +09:00
|
|
|
|
|
|
|
// Backward compatibility, respect webDomain in acct
|
|
|
|
// In previous versions, acct was username@server instead of username@webDomain
|
|
|
|
// for example: elk@m.webtoo.ls instead of elk@webtoo.ls
|
|
|
|
if (!all.value[id]) {
|
|
|
|
const [username, webDomain] = id.split('@')
|
|
|
|
const server = currentServer.value
|
|
|
|
if (webDomain && server && server !== webDomain) {
|
|
|
|
const oldId = `${username}@${server}`
|
|
|
|
const outdatedSettings = all.value[oldId]
|
|
|
|
if (outdatedSettings) {
|
|
|
|
const newAllValue = { ...all.value, [id]: outdatedSettings }
|
|
|
|
delete newAllValue[oldId]
|
|
|
|
all.value = newAllValue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-01-14 18:55:09 +09:00
|
|
|
all.value[id] = Object.assign(initial(), all.value[id] || {})
|
|
|
|
return all.value[id]
|
|
|
|
})
|
|
|
|
})
|
|
|
|
map.set(key, { scope, value: value! })
|
|
|
|
}
|
|
|
|
|
2023-01-14 19:09:17 +09:00
|
|
|
return map.get(key)!.value as Ref<T>
|
2022-12-13 22:22:27 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Clear all storages for the given account
|
|
|
|
*/
|
2023-01-08 15:21:09 +09:00
|
|
|
export function clearUserLocalStorage(account?: mastodon.v1.Account) {
|
2022-12-13 22:22:27 +09:00
|
|
|
if (!account)
|
|
|
|
account = currentUser.value?.account
|
|
|
|
if (!account)
|
|
|
|
return
|
|
|
|
|
2023-01-20 01:20:56 +09:00
|
|
|
const id = `${account.acct}@${currentInstance.value ? getInstanceDomain(currentInstance.value) : currentServer.value}`
|
2023-01-14 18:55:09 +09:00
|
|
|
|
2022-12-13 23:03:30 +09:00
|
|
|
// @ts-expect-error bind value to the function
|
2023-01-14 18:55:09 +09:00
|
|
|
const cacheMap = useUserLocalStorage._ as Map<string, UseUserLocalStorageCache> | undefined
|
|
|
|
cacheMap?.forEach(({ value }) => {
|
|
|
|
if (value.value[id])
|
|
|
|
delete value.value[id]
|
2022-12-13 22:22:27 +09:00
|
|
|
})
|
|
|
|
}
|