crystal-gauntlet/src/endpoints/misc/likeItem.cr
2022-12-31 14:07:12 +09:00

36 lines
883 B
Crystal

require "uri"
require "base64"
require "crypto/bcrypt/password"
include CrystalGauntlet
CrystalGauntlet.endpoints["/likeGJItem211.php"] = ->(body : String): String {
params = URI::Params.parse(body)
puts params.inspect
if !params.has_key?("itemID")
return "-1"
end
item_id = params["itemID"].to_i
type = (params["type"]? || "1").to_i
table = ""
column = ""
case type
when 1
table = "levels"
column = "id"
else # type 2 = comment, type 3 = account comments
return "-1"
end
is_like = (params["isLike"]? || "1").to_i
sign = is_like == 1 ? '+' : '-'
# note: formatting them like this is not a security vulnerability as the only possibilities for table, sign
# and column are already known and not controlled directly by user input
DATABASE.exec "update #{table} set likes = likes #{sign} 1 where #{column} = ?", item_id
"1"
}