@discordeno/rest 19.0.0-next.e9c011e → 19.0.0-next.eb6dd97

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -21,7 +21,7 @@ import { delay, logger } from '@discordeno/utils';
21
21
  processing: false,
22
22
  waiting: [],
23
23
  requestsAllowed: function() {
24
- if (bucket.resetAt !== undefined && Date.now() > bucket.resetAt) {
24
+ if (bucket.resetAt !== undefined && Date.now() >= bucket.resetAt) {
25
25
  bucket.invalidRequests = 0;
26
26
  bucket.resetAt = Date.now() + bucket.interval;
27
27
  }
@@ -45,14 +45,13 @@ import { delay, logger } from '@discordeno/utils';
45
45
  },
46
46
  processWaiting: async function() {
47
47
  // If already processing, that loop will handle all waiting requests.
48
- if (bucket.processing) {
49
- return;
50
- }
48
+ if (bucket.processing) return;
51
49
  // Mark as processing so other loops don't start
52
50
  bucket.processing = true;
53
51
  while(bucket.waiting.length > 0){
54
- logger.info(`[InvalidBucket] processing waiting queue while loop ran with ${bucket.waiting.length} remaining.`);
55
- if (bucket.resetAt !== undefined && !bucket.isRequestAllowed()) {
52
+ logger.info(`[InvalidBucket] processing waiting queue while loop ran with ${bucket.waiting.length} pending requests to be made. ${JSON.stringify(bucket)}`);
53
+ if (!bucket.isRequestAllowed() && bucket.resetAt !== undefined) {
54
+ logger.warn(`[InvalidBucket] processing waiting queue is now paused until more requests are available. ${bucket.waiting.length} pending requests. ${JSON.stringify(bucket)}`);
56
55
  await delay(bucket.resetAt - Date.now());
57
56
  }
58
57
  bucket.activeRequests += 1;
@@ -74,6 +73,7 @@ import { delay, logger } from '@discordeno/utils';
74
73
  bucket.resetAt = Date.now() + bucket.interval;
75
74
  }
76
75
  bucket.invalidRequests += 1;
76
+ logger.warn(`[InvalidBucket] an invalid request was made. Increasing invalidRequests count to ${bucket.invalidRequests}`);
77
77
  }
78
78
  };
79
79
  return bucket;
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/invalidBucket.ts"],"sourcesContent":["import { delay, logger } from '@discordeno/utils'\n\n/**\n * A invalid request bucket is used in a similar manner as a leaky bucket but a invalid request bucket can be refilled as needed.\n * It's purpose is to make sure the bot does not hit the limit to getting a 1 hr ban.\n *\n * @param options The options used to configure this bucket.\n * @returns RefillingBucket\n */\nexport function createInvalidRequestBucket(options: InvalidRequestBucketOptions): InvalidRequestBucket {\n const bucket: InvalidRequestBucket = {\n invalidRequests: options.current ?? 0,\n max: options.max ?? 10000,\n interval: options.interval ?? 600_000, // 10 minutes\n resetAt: options.resetAt,\n safety: options.safety ?? 1,\n errorStatuses: options.errorStatuses ?? [401, 403, 429],\n activeRequests: options.requested ?? 0,\n processing: false,\n\n waiting: [],\n\n requestsAllowed: function () {\n if (bucket.resetAt !== undefined && Date.now() > bucket.resetAt) {\n bucket.invalidRequests = 0\n bucket.resetAt = Date.now() + bucket.interval\n }\n\n return bucket.max - bucket.invalidRequests - bucket.activeRequests - bucket.safety\n },\n\n isRequestAllowed: function () {\n return bucket.requestsAllowed() > 0\n },\n\n waitUntilRequestAvailable: async function () {\n // eslint-disable-next-line no-async-promise-executor\n return await new Promise(async (resolve) => {\n // If whatever amount of requests is left is more than the safety margin, allow the request\n if (bucket.isRequestAllowed()) {\n bucket.activeRequests += 1\n resolve()\n } else {\n bucket.waiting.push(resolve)\n await bucket.processWaiting()\n }\n })\n },\n\n processWaiting: async function () {\n // If already processing, that loop will handle all waiting requests.\n if (bucket.processing) {\n return\n }\n\n // Mark as processing so other loops don't start\n bucket.processing = true\n\n while (bucket.waiting.length > 0) {\n logger.info(`[InvalidBucket] processing waiting queue while loop ran with ${bucket.waiting.length} remaining.`)\n\n if (bucket.resetAt !== undefined && !bucket.isRequestAllowed()) {\n await delay(bucket.resetAt - Date.now())\n }\n\n bucket.activeRequests += 1\n // Resolve the next item in the queue\n bucket.waiting.shift()?.()\n }\n\n // Mark as false so next pending request can be triggered by new loop.\n bucket.processing = false\n },\n\n handleCompletedRequest: function (code, sharedScope) {\n // Since request is complete, we can remove one from requested.\n bucket.activeRequests -= 1\n // Since it is as a valid request, we don't need to do anything\n if (!bucket.errorStatuses.includes(code)) return\n // Shared scope is not considered invalid\n if (code === 429 && sharedScope) return\n\n // INVALID REQUEST WAS MADE\n if (bucket.resetAt === undefined) {\n bucket.resetAt = Date.now() + bucket.interval\n }\n\n bucket.invalidRequests += 1\n },\n }\n\n return bucket\n}\n\nexport interface InvalidRequestBucketOptions {\n /** current invalid amount */\n current?: number\n /** max invalid requests allowed until ban. Defaults to 10,000 */\n max?: number\n /** The time that discord allows to make the max number of invalid requests. Defaults to 10 minutes */\n interval?: number\n /** When the timeout for the bucket has started at. */\n resetAt?: number\n /** how safe to be from max. Defaults to 1 */\n safety?: number\n /** The request statuses that count as an invalid request. */\n errorStatuses?: number[]\n /** The amount of requests that were requested from this bucket. */\n requested?: number\n}\n\nexport interface InvalidRequestBucket {\n /** current invalid amount */\n invalidRequests: number\n /** max invalid requests allowed until ban. Defaults to 10,000 */\n max: number\n /** The time that discord allows to make the max number of invalid requests. Defaults to 10 minutes */\n interval: number\n /** When the timeout for this bucket has started at. */\n resetAt: number | undefined\n /** how safe to be from max. Defaults to 1 */\n safety: number\n /** The request statuses that count as an invalid request. */\n errorStatuses: number[]\n /** The amount of requests that were requested from this bucket. */\n activeRequests: number\n /** The requests that are currently pending. */\n waiting: Array<(value: void | PromiseLike<void>) => void>\n /** Whether or not the waiting queue is already processing. */\n processing: boolean\n\n /** Gives the number of requests that are currently allowed. */\n requestsAllowed: () => number\n /** Checks if a request is allowed at this time. */\n isRequestAllowed: () => boolean\n /** Waits until a request is available */\n waitUntilRequestAvailable: () => Promise<void>\n /** Begins processing the waiting queue of requests. */\n processWaiting: () => Promise<void>\n /** Handler for whenever a request is validated. This should update the requested values or trigger any other necessary stuff. */\n handleCompletedRequest: (code: number, sharedScope: boolean) => void\n}\n"],"names":["delay","logger","createInvalidRequestBucket","options","bucket","invalidRequests","current","max","interval","resetAt","safety","errorStatuses","activeRequests","requested","processing","waiting","requestsAllowed","undefined","Date","now","isRequestAllowed","waitUntilRequestAvailable","Promise","resolve","push","processWaiting","length","info","shift","handleCompletedRequest","code","sharedScope","includes"],"mappings":"AAAA,SAASA,KAAK,EAAEC,MAAM,QAAQ,oBAAmB;AAEjD;;;;;;CAMC,GACD,OAAO,SAASC,2BAA2BC,OAAoC,EAAwB;IACrG,MAAMC,SAA+B;QACnCC,iBAAiBF,QAAQG,OAAO,IAAI;QACpCC,KAAKJ,QAAQI,GAAG,IAAI;QACpBC,UAAUL,QAAQK,QAAQ,IAAI;QAC9BC,SAASN,QAAQM,OAAO;QACxBC,QAAQP,QAAQO,MAAM,IAAI;QAC1BC,eAAeR,QAAQQ,aAAa,IAAI;YAAC;YAAK;YAAK;SAAI;QACvDC,gBAAgBT,QAAQU,SAAS,IAAI;QACrCC,YAAY,KAAK;QAEjBC,SAAS,EAAE;QAEXC,iBAAiB,WAAY;YAC3B,IAAIZ,OAAOK,OAAO,KAAKQ,aAAaC,KAAKC,GAAG,KAAKf,OAAOK,OAAO,EAAE;gBAC/DL,OAAOC,eAAe,GAAG;gBACzBD,OAAOK,OAAO,GAAGS,KAAKC,GAAG,KAAKf,OAAOI,QAAQ;YAC/C,CAAC;YAED,OAAOJ,OAAOG,GAAG,GAAGH,OAAOC,eAAe,GAAGD,OAAOQ,cAAc,GAAGR,OAAOM,MAAM;QACpF;QAEAU,kBAAkB,WAAY;YAC5B,OAAOhB,OAAOY,eAAe,KAAK;QACpC;QAEAK,2BAA2B,iBAAkB;YAC3C,qDAAqD;YACrD,OAAO,MAAM,IAAIC,QAAQ,OAAOC,UAAY;gBAC1C,2FAA2F;gBAC3F,IAAInB,OAAOgB,gBAAgB,IAAI;oBAC7BhB,OAAOQ,cAAc,IAAI;oBACzBW;gBACF,OAAO;oBACLnB,OAAOW,OAAO,CAACS,IAAI,CAACD;oBACpB,MAAMnB,OAAOqB,cAAc;gBAC7B,CAAC;YACH;QACF;QAEAA,gBAAgB,iBAAkB;YAChC,qEAAqE;YACrE,IAAIrB,OAAOU,UAAU,EAAE;gBACrB;YACF,CAAC;YAED,gDAAgD;YAChDV,OAAOU,UAAU,GAAG,IAAI;YAExB,MAAOV,OAAOW,OAAO,CAACW,MAAM,GAAG,EAAG;gBAChCzB,OAAO0B,IAAI,CAAC,CAAC,6DAA6D,EAAEvB,OAAOW,OAAO,CAACW,MAAM,CAAC,WAAW,CAAC;gBAE9G,IAAItB,OAAOK,OAAO,KAAKQ,aAAa,CAACb,OAAOgB,gBAAgB,IAAI;oBAC9D,MAAMpB,MAAMI,OAAOK,OAAO,GAAGS,KAAKC,GAAG;gBACvC,CAAC;gBAEDf,OAAOQ,cAAc,IAAI;gBACzB,qCAAqC;gBACrCR,OAAOW,OAAO,CAACa,KAAK;YACtB;YAEA,sEAAsE;YACtExB,OAAOU,UAAU,GAAG,KAAK;QAC3B;QAEAe,wBAAwB,SAAUC,IAAI,EAAEC,WAAW,EAAE;YACnD,+DAA+D;YAC/D3B,OAAOQ,cAAc,IAAI;YACzB,+DAA+D;YAC/D,IAAI,CAACR,OAAOO,aAAa,CAACqB,QAAQ,CAACF,OAAO;YAC1C,yCAAyC;YACzC,IAAIA,SAAS,OAAOC,aAAa;YAEjC,2BAA2B;YAC3B,IAAI3B,OAAOK,OAAO,KAAKQ,WAAW;gBAChCb,OAAOK,OAAO,GAAGS,KAAKC,GAAG,KAAKf,OAAOI,QAAQ;YAC/C,CAAC;YAEDJ,OAAOC,eAAe,IAAI;QAC5B;IACF;IAEA,OAAOD;AACT,CAAC"}
1
+ {"version":3,"sources":["../src/invalidBucket.ts"],"sourcesContent":["import { delay, logger } from '@discordeno/utils'\n\n/**\n * A invalid request bucket is used in a similar manner as a leaky bucket but a invalid request bucket can be refilled as needed.\n * It's purpose is to make sure the bot does not hit the limit to getting a 1 hr ban.\n *\n * @param options The options used to configure this bucket.\n * @returns RefillingBucket\n */\nexport function createInvalidRequestBucket(options: InvalidRequestBucketOptions): InvalidRequestBucket {\n const bucket: InvalidRequestBucket = {\n invalidRequests: options.current ?? 0,\n max: options.max ?? 10000,\n interval: options.interval ?? 600_000, // 10 minutes\n resetAt: options.resetAt,\n safety: options.safety ?? 1,\n errorStatuses: options.errorStatuses ?? [401, 403, 429],\n activeRequests: options.requested ?? 0,\n processing: false,\n\n waiting: [],\n\n requestsAllowed: function () {\n if (bucket.resetAt !== undefined && Date.now() >= bucket.resetAt) {\n bucket.invalidRequests = 0\n bucket.resetAt = Date.now() + bucket.interval\n }\n\n return bucket.max - bucket.invalidRequests - bucket.activeRequests - bucket.safety\n },\n\n isRequestAllowed: function () {\n return bucket.requestsAllowed() > 0\n },\n\n waitUntilRequestAvailable: async function () {\n // eslint-disable-next-line no-async-promise-executor\n return await new Promise(async (resolve) => {\n // If whatever amount of requests is left is more than the safety margin, allow the request\n if (bucket.isRequestAllowed()) {\n bucket.activeRequests += 1\n resolve()\n } else {\n bucket.waiting.push(resolve)\n await bucket.processWaiting()\n }\n })\n },\n\n processWaiting: async function () {\n // If already processing, that loop will handle all waiting requests.\n if (bucket.processing) return\n\n // Mark as processing so other loops don't start\n bucket.processing = true\n\n while (bucket.waiting.length > 0) {\n logger.info(`[InvalidBucket] processing waiting queue while loop ran with ${bucket.waiting.length} pending requests to be made. ${JSON.stringify(bucket)}`)\n\n if (!bucket.isRequestAllowed() && bucket.resetAt !== undefined) {\n logger.warn(`[InvalidBucket] processing waiting queue is now paused until more requests are available. ${bucket.waiting.length} pending requests. ${JSON.stringify(bucket)}`)\n await delay(bucket.resetAt - Date.now())\n }\n\n bucket.activeRequests += 1\n // Resolve the next item in the queue\n bucket.waiting.shift()?.()\n }\n\n // Mark as false so next pending request can be triggered by new loop.\n bucket.processing = false\n },\n\n handleCompletedRequest: function (code, sharedScope) {\n // Since request is complete, we can remove one from requested.\n bucket.activeRequests -= 1\n // Since it is as a valid request, we don't need to do anything\n if (!bucket.errorStatuses.includes(code)) return\n // Shared scope is not considered invalid\n if (code === 429 && sharedScope) return\n\n // INVALID REQUEST WAS MADE\n if (bucket.resetAt === undefined) {\n bucket.resetAt = Date.now() + bucket.interval\n }\n\n bucket.invalidRequests += 1\n logger.warn(`[InvalidBucket] an invalid request was made. Increasing invalidRequests count to ${bucket.invalidRequests}`)\n },\n }\n\n return bucket\n}\n\nexport interface InvalidRequestBucketOptions {\n /** current invalid amount */\n current?: number\n /** max invalid requests allowed until ban. Defaults to 10,000 */\n max?: number\n /** The time that discord allows to make the max number of invalid requests. Defaults to 10 minutes */\n interval?: number\n /** When the timeout for the bucket has started at. */\n resetAt?: number\n /** how safe to be from max. Defaults to 1 */\n safety?: number\n /** The request statuses that count as an invalid request. */\n errorStatuses?: number[]\n /** The amount of requests that were requested from this bucket. */\n requested?: number\n}\n\nexport interface InvalidRequestBucket {\n /** current invalid amount */\n invalidRequests: number\n /** max invalid requests allowed until ban. Defaults to 10,000 */\n max: number\n /** The time that discord allows to make the max number of invalid requests. Defaults to 10 minutes */\n interval: number\n /** When the timeout for this bucket has started at. */\n resetAt: number | undefined\n /** how safe to be from max. Defaults to 1 */\n safety: number\n /** The request statuses that count as an invalid request. */\n errorStatuses: number[]\n /** The amount of requests that were requested from this bucket. */\n activeRequests: number\n /** The requests that are currently pending. */\n waiting: Array<(value: void | PromiseLike<void>) => void>\n /** Whether or not the waiting queue is already processing. */\n processing: boolean\n\n /** Gives the number of requests that are currently allowed. */\n requestsAllowed: () => number\n /** Checks if a request is allowed at this time. */\n isRequestAllowed: () => boolean\n /** Waits until a request is available */\n waitUntilRequestAvailable: () => Promise<void>\n /** Begins processing the waiting queue of requests. */\n processWaiting: () => Promise<void>\n /** Handler for whenever a request is validated. This should update the requested values or trigger any other necessary stuff. */\n handleCompletedRequest: (code: number, sharedScope: boolean) => void\n}\n"],"names":["delay","logger","createInvalidRequestBucket","options","bucket","invalidRequests","current","max","interval","resetAt","safety","errorStatuses","activeRequests","requested","processing","waiting","requestsAllowed","undefined","Date","now","isRequestAllowed","waitUntilRequestAvailable","Promise","resolve","push","processWaiting","length","info","JSON","stringify","warn","shift","handleCompletedRequest","code","sharedScope","includes"],"mappings":"AAAA,SAASA,KAAK,EAAEC,MAAM,QAAQ,oBAAmB;AAEjD;;;;;;CAMC,GACD,OAAO,SAASC,2BAA2BC,OAAoC,EAAwB;IACrG,MAAMC,SAA+B;QACnCC,iBAAiBF,QAAQG,OAAO,IAAI;QACpCC,KAAKJ,QAAQI,GAAG,IAAI;QACpBC,UAAUL,QAAQK,QAAQ,IAAI;QAC9BC,SAASN,QAAQM,OAAO;QACxBC,QAAQP,QAAQO,MAAM,IAAI;QAC1BC,eAAeR,QAAQQ,aAAa,IAAI;YAAC;YAAK;YAAK;SAAI;QACvDC,gBAAgBT,QAAQU,SAAS,IAAI;QACrCC,YAAY,KAAK;QAEjBC,SAAS,EAAE;QAEXC,iBAAiB,WAAY;YAC3B,IAAIZ,OAAOK,OAAO,KAAKQ,aAAaC,KAAKC,GAAG,MAAMf,OAAOK,OAAO,EAAE;gBAChEL,OAAOC,eAAe,GAAG;gBACzBD,OAAOK,OAAO,GAAGS,KAAKC,GAAG,KAAKf,OAAOI,QAAQ;YAC/C,CAAC;YAED,OAAOJ,OAAOG,GAAG,GAAGH,OAAOC,eAAe,GAAGD,OAAOQ,cAAc,GAAGR,OAAOM,MAAM;QACpF;QAEAU,kBAAkB,WAAY;YAC5B,OAAOhB,OAAOY,eAAe,KAAK;QACpC;QAEAK,2BAA2B,iBAAkB;YAC3C,qDAAqD;YACrD,OAAO,MAAM,IAAIC,QAAQ,OAAOC,UAAY;gBAC1C,2FAA2F;gBAC3F,IAAInB,OAAOgB,gBAAgB,IAAI;oBAC7BhB,OAAOQ,cAAc,IAAI;oBACzBW;gBACF,OAAO;oBACLnB,OAAOW,OAAO,CAACS,IAAI,CAACD;oBACpB,MAAMnB,OAAOqB,cAAc;gBAC7B,CAAC;YACH;QACF;QAEAA,gBAAgB,iBAAkB;YAChC,qEAAqE;YACrE,IAAIrB,OAAOU,UAAU,EAAE;YAEvB,gDAAgD;YAChDV,OAAOU,UAAU,GAAG,IAAI;YAExB,MAAOV,OAAOW,OAAO,CAACW,MAAM,GAAG,EAAG;gBAChCzB,OAAO0B,IAAI,CAAC,CAAC,6DAA6D,EAAEvB,OAAOW,OAAO,CAACW,MAAM,CAAC,8BAA8B,EAAEE,KAAKC,SAAS,CAACzB,QAAQ,CAAC;gBAE1J,IAAI,CAACA,OAAOgB,gBAAgB,MAAMhB,OAAOK,OAAO,KAAKQ,WAAW;oBAC9DhB,OAAO6B,IAAI,CAAC,CAAC,0FAA0F,EAAE1B,OAAOW,OAAO,CAACW,MAAM,CAAC,mBAAmB,EAAEE,KAAKC,SAAS,CAACzB,QAAQ,CAAC;oBAC5K,MAAMJ,MAAMI,OAAOK,OAAO,GAAGS,KAAKC,GAAG;gBACvC,CAAC;gBAEDf,OAAOQ,cAAc,IAAI;gBACzB,qCAAqC;gBACrCR,OAAOW,OAAO,CAACgB,KAAK;YACtB;YAEA,sEAAsE;YACtE3B,OAAOU,UAAU,GAAG,KAAK;QAC3B;QAEAkB,wBAAwB,SAAUC,IAAI,EAAEC,WAAW,EAAE;YACnD,+DAA+D;YAC/D9B,OAAOQ,cAAc,IAAI;YACzB,+DAA+D;YAC/D,IAAI,CAACR,OAAOO,aAAa,CAACwB,QAAQ,CAACF,OAAO;YAC1C,yCAAyC;YACzC,IAAIA,SAAS,OAAOC,aAAa;YAEjC,2BAA2B;YAC3B,IAAI9B,OAAOK,OAAO,KAAKQ,WAAW;gBAChCb,OAAOK,OAAO,GAAGS,KAAKC,GAAG,KAAKf,OAAOI,QAAQ;YAC/C,CAAC;YAEDJ,OAAOC,eAAe,IAAI;YAC1BJ,OAAO6B,IAAI,CAAC,CAAC,iFAAiF,EAAE1B,OAAOC,eAAe,CAAC,CAAC;QAC1H;IACF;IAEA,OAAOD;AACT,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"manager.d.ts","sourceRoot":"","sources":["../src/manager.ts"],"names":[],"mappings":"AAkDA,OAAO,KAAK,EAA4B,wBAAwB,EAAE,WAAW,EAAsB,MAAM,YAAY,CAAA;AAKrH,eAAO,MAAM,mBAAmB,KAAK,CAAA;AACrC,eAAO,MAAM,eAAe,4BAA4B,CAAA;AAExD,eAAO,MAAM,uBAAuB,uBAAuB,CAAA;AAC3D,eAAO,MAAM,2BAA2B,0BAA0B,CAAA;AAClE,eAAO,MAAM,6BAA6B,4BAA4B,CAAA;AACtE,eAAO,MAAM,wBAAwB,uBAAuB,CAAA;AAC5D,eAAO,MAAM,wBAAwB,uBAAuB,CAAA;AAC5D,eAAO,MAAM,uBAAuB,sBAAsB,CAAA;AAC1D,eAAO,MAAM,uBAAuB,sBAAsB,CAAA;AAE1D,wBAAgB,iBAAiB,CAAC,OAAO,EAAE,wBAAwB,GAAG,WAAW,CAwnChF"}
1
+ {"version":3,"file":"manager.d.ts","sourceRoot":"","sources":["../src/manager.ts"],"names":[],"mappings":"AAyDA,OAAO,KAAK,EAA4B,wBAAwB,EAAsB,WAAW,EAAsB,MAAM,YAAY,CAAA;AAKzI,eAAO,MAAM,mBAAmB,KAAK,CAAA;AACrC,eAAO,MAAM,eAAe,4BAA4B,CAAA;AAExD,eAAO,MAAM,uBAAuB,uBAAuB,CAAA;AAC3D,eAAO,MAAM,2BAA2B,0BAA0B,CAAA;AAClE,eAAO,MAAM,6BAA6B,4BAA4B,CAAA;AACtE,eAAO,MAAM,wBAAwB,uBAAuB,CAAA;AAC5D,eAAO,MAAM,wBAAwB,uBAAuB,CAAA;AAC5D,eAAO,MAAM,uBAAuB,sBAAsB,CAAA;AAC1D,eAAO,MAAM,uBAAuB,sBAAsB,CAAA;AAE1D,wBAAgB,iBAAiB,CAAC,OAAO,EAAE,wBAAwB,GAAG,WAAW,CAs3ChF"}
package/dist/manager.js CHANGED
@@ -1,7 +1,8 @@
1
- /* eslint-disable @typescript-eslint/restrict-template-expressions */ /* eslint-disable no-const-assign */ import { InteractionResponseTypes } from '@discordeno/types';
1
+ /* eslint-disable @typescript-eslint/restrict-template-expressions */ /* eslint-disable no-const-assign */ import { Buffer } from 'node:buffer';
2
2
  import { calculateBits, camelize, camelToSnakeCase, delay, getBotIdFromToken, logger, processReactionString, urlToBase64 } from '@discordeno/utils';
3
3
  import { createInvalidRequestBucket } from './invalidBucket.js';
4
4
  import { Queue } from './queue.js';
5
+ import { InteractionResponseTypes } from '@discordeno/types';
5
6
  import { createRoutes } from './routes.js';
6
7
  // TODO: make dynamic based on package.json file
7
8
  const version = '19.0.0-alpha.1';
@@ -23,6 +24,7 @@ export function createRestManager(options) {
23
24
  const rest = {
24
25
  applicationId,
25
26
  authorization: options.proxy?.authorization,
27
+ authorizationHeader: options.proxy?.authorizationHeader ?? 'authorization',
26
28
  baseUrl,
27
29
  deleteQueueDelay: 60000,
28
30
  globallyRateLimited: false,
@@ -35,8 +37,14 @@ export function createRestManager(options) {
35
37
  token: options.token,
36
38
  version: options.version ?? DISCORD_API_VERSION,
37
39
  routes: createRoutes(),
38
- checkRateLimits (url) {
39
- const ratelimited = rest.rateLimitedPaths.get(url);
40
+ createBaseHeaders () {
41
+ return {
42
+ 'user-agent': `DiscordBot (https://github.com/discordeno/discordeno, v${version})`
43
+ };
44
+ },
45
+ checkRateLimits (url, headers) {
46
+ const authHeader = headers?.authorization ?? '';
47
+ const ratelimited = rest.rateLimitedPaths.get(`${authHeader}${url}`);
40
48
  const global = rest.rateLimitedPaths.get('global');
41
49
  const now = Date.now();
42
50
  if (ratelimited && now < ratelimited.resetTimestamp) {
@@ -55,20 +63,27 @@ export function createRestManager(options) {
55
63
  }
56
64
  const newObj = {};
57
65
  for (const key of Object.keys(obj)){
58
- // Keys that dont require snake casing
59
- if ([
60
- 'permissions',
61
- 'allow',
62
- 'deny'
63
- ].includes(key) && obj[key] !== undefined) {
64
- newObj[key] = calculateBits(obj[key]);
65
- continue;
66
+ const value = obj[key];
67
+ // Some falsy values should be allowed like null or 0
68
+ if (value !== undefined) {
69
+ switch(key){
70
+ case 'permissions':
71
+ case 'allow':
72
+ case 'deny':
73
+ newObj[key] = typeof value === 'string' ? value : calculateBits(value);
74
+ continue;
75
+ case 'defaultMemberPermissions':
76
+ newObj.default_member_permissions = typeof value === 'string' ? value : calculateBits(value);
77
+ continue;
78
+ case 'nameLocalizations':
79
+ newObj.name_localizations = value;
80
+ continue;
81
+ case 'descriptionLocalizations':
82
+ newObj.description_localizations = value;
83
+ continue;
84
+ }
66
85
  }
67
- if (key === 'defaultMemberPermissions' && obj[key] !== undefined) {
68
- newObj.default_member_permissions = calculateBits(obj[key]);
69
- continue;
70
- }
71
- newObj[camelToSnakeCase(key)] = rest.changeToDiscordFormat(obj[key]);
86
+ newObj[camelToSnakeCase(key)] = rest.changeToDiscordFormat(value);
72
87
  }
73
88
  return newObj;
74
89
  }
@@ -76,10 +91,8 @@ export function createRestManager(options) {
76
91
  return obj;
77
92
  },
78
93
  createRequestBody (method, options) {
79
- const headers = {
80
- 'user-agent': `DiscordBot (https://github.com/discordeno/discordeno, v${version})`
81
- };
82
- if (options?.unauthorized !== false) headers.authorization = `Bot ${rest.token}`;
94
+ const headers = this.createBaseHeaders();
95
+ if (options?.unauthorized !== true) headers.authorization = `Bot ${rest.token}`;
83
96
  // IF A REASON IS PROVIDED ENCODE IT IN HEADERS
84
97
  if (options?.reason !== undefined) {
85
98
  headers[AUDIT_LOG_REASON_HEADER] = encodeURIComponent(options?.reason);
@@ -93,12 +106,21 @@ export function createRestManager(options) {
93
106
  for(let i = 0; i < options.files.length; ++i){
94
107
  form.append(`file${i}`, options.files[i].blob, options.files[i].name);
95
108
  }
96
- form.append('payload_json', JSON.stringify({
109
+ // Have to use changeToDiscordFormat or else JSON.stringify may throw an error for the presence of BigInt(s) in the json
110
+ form.append('payload_json', JSON.stringify(rest.changeToDiscordFormat({
97
111
  ...options.body,
98
112
  files: undefined
99
- }));
113
+ })));
114
+ // No need to set the `content-type` header since `fetch` does that automatically for us when we use a `FormData` object.
100
115
  body = form;
101
- // No need to set the `content-type` header since `fetch` does that automatically for us when we use a `FormData` object.
116
+ } else if (options?.body && options.headers && options.headers['content-type'] === 'application/x-www-form-urlencoded') {
117
+ // OAuth2 body handling
118
+ const formBody = [];
119
+ const discordBody = rest.changeToDiscordFormat(options.body);
120
+ for(const prop in discordBody){
121
+ formBody.push(`${encodeURIComponent(prop)}=${encodeURIComponent(discordBody[prop])}`);
122
+ }
123
+ body = formBody.join('&');
102
124
  } else if (options?.body !== undefined) {
103
125
  if (options.body instanceof FormData) {
104
126
  body = options.body;
@@ -145,7 +167,7 @@ export function createRestManager(options) {
145
167
  }, 1000);
146
168
  }
147
169
  },
148
- /** Processes the rate limit headers and determines if it needs to be rate limited and returns the bucket id if available */ processHeaders (url, headers) {
170
+ /** Processes the rate limit headers and determines if it needs to be rate limited and returns the bucket id if available */ processHeaders (url, headers, requestAuthorization) {
149
171
  let rateLimited = false;
150
172
  // GET ALL NECESSARY HEADERS
151
173
  const remaining = headers.get(RATE_LIMIT_REMAINING_HEADER);
@@ -155,7 +177,7 @@ export function createRestManager(options) {
155
177
  // undefined override null needed for typings
156
178
  const bucketId = headers.get(RATE_LIMIT_BUCKET_HEADER) ?? undefined;
157
179
  const limit = headers.get(RATE_LIMIT_LIMIT_HEADER);
158
- rest.queues.get(url)?.handleCompletedRequest({
180
+ rest.queues.get(`${requestAuthorization}${url}`)?.handleCompletedRequest({
159
181
  remaining: remaining ? Number(remaining) : undefined,
160
182
  interval: retryAfter ? Number(retryAfter) * 1000 : undefined,
161
183
  max: limit ? Number(limit) : undefined
@@ -164,14 +186,14 @@ export function createRestManager(options) {
164
186
  if (remaining === '0') {
165
187
  rateLimited = true;
166
188
  // SAVE THE URL AS LIMITED, IMPORTANT FOR NEW REQUESTS BY USER WITHOUT BUCKET
167
- rest.rateLimitedPaths.set(url, {
189
+ rest.rateLimitedPaths.set(`${requestAuthorization}${url}`, {
168
190
  url,
169
191
  resetTimestamp: reset,
170
192
  bucketId
171
193
  });
172
194
  // SAVE THE BUCKET AS LIMITED SINCE DIFFERENT URLS MAY SHARE A BUCKET
173
195
  if (bucketId) {
174
- rest.rateLimitedPaths.set(bucketId, {
196
+ rest.rateLimitedPaths.set(`${requestAuthorization}${bucketId}`, {
175
197
  url,
176
198
  resetTimestamp: reset,
177
199
  bucketId
@@ -180,8 +202,8 @@ export function createRestManager(options) {
180
202
  }
181
203
  // IF THERE IS NO REMAINING GLOBAL LIMIT, MARK IT RATE LIMITED GLOBALLY
182
204
  if (global) {
183
- const retryAfter = headers.get('retry-after');
184
- const globalReset = Date.now() + Number(retryAfter) * 1000;
205
+ const retryAfter = Number(headers.get('retry-after')) * 1000;
206
+ const globalReset = Date.now() + retryAfter;
185
207
  // rest.debug(
186
208
  // `[REST = Globally Rate Limited] URL: ${url} | Global Rest: ${globalReset}`
187
209
  // )
@@ -189,14 +211,14 @@ export function createRestManager(options) {
189
211
  rateLimited = true;
190
212
  setTimeout(()=>{
191
213
  rest.globallyRateLimited = false;
192
- }, globalReset);
214
+ }, retryAfter);
193
215
  rest.rateLimitedPaths.set('global', {
194
216
  url: 'global',
195
217
  resetTimestamp: globalReset,
196
218
  bucketId
197
219
  });
198
220
  if (bucketId) {
199
- rest.rateLimitedPaths.set(bucketId, {
221
+ rest.rateLimitedPaths.set(`${requestAuthorization}${bucketId}`, {
200
222
  url: 'global',
201
223
  resetTimestamp: globalReset,
202
224
  bucketId
@@ -211,17 +233,33 @@ export function createRestManager(options) {
211
233
  async sendRequest (options) {
212
234
  const url = `${rest.baseUrl}/v${rest.version}${options.route}`;
213
235
  const payload = rest.createRequestBody(options.method, options.requestBodyOptions);
236
+ const loggingHeaders = {
237
+ ...payload.headers
238
+ };
239
+ const authenticationScheme = payload.headers.authorization?.split(' ')[0];
240
+ if (payload.headers.authorization) {
241
+ loggingHeaders.authorization = `${authenticationScheme} tokenhere`;
242
+ }
214
243
  logger.debug(`sending request to ${url}`, 'with payload:', {
215
244
  ...payload,
216
- headers: {
217
- ...payload.headers,
218
- authorization: 'Bot tokenhere'
219
- }
245
+ headers: loggingHeaders
246
+ });
247
+ const response = await fetch(url, payload).catch(async (error)=>{
248
+ logger.error(error);
249
+ // Mark request and completed
250
+ rest.invalidBucket.handleCompletedRequest(999, false);
251
+ options.reject({
252
+ ok: false,
253
+ status: 999,
254
+ error: 'Possible network or request shape issue occurred. If this is rare, its a network glitch. If it occurs a lot something is wrong.'
255
+ });
256
+ throw error;
220
257
  });
221
- const response = await fetch(url, payload);
222
258
  logger.debug(`request fetched from ${url} with status ${response.status} & ${response.statusText}`);
259
+ // Mark request and completed
260
+ rest.invalidBucket.handleCompletedRequest(response.status, response.headers.get(RATE_LIMIT_SCOPE_HEADER) === 'shared');
223
261
  // Set the bucket id if it was available on the headers
224
- const bucketId = rest.processHeaders(rest.simplifyUrl(options.route, options.method), response.headers);
262
+ const bucketId = rest.processHeaders(rest.simplifyUrl(options.route, options.method), response.headers, authenticationScheme === 'Bearer' ? payload.headers.authorization : '');
225
263
  if (bucketId) options.bucketId = bucketId;
226
264
  if (response.status < 200 || response.status >= 400) {
227
265
  logger.debug(`Request to ${url} failed.`);
@@ -246,8 +284,6 @@ export function createRestManager(options) {
246
284
  return;
247
285
  }
248
286
  options.retryCount += 1;
249
- // Rate limited, add back to queue
250
- rest.invalidBucket.handleCompletedRequest(response.status, response.headers.get(RATE_LIMIT_SCOPE_HEADER) === 'shared');
251
287
  const resetAfter = response.headers.get(RATE_LIMIT_RESET_AFTER_HEADER);
252
288
  if (resetAfter) await delay(Number(resetAfter) * 1000);
253
289
  // process the response to prevent mem leak
@@ -288,19 +324,21 @@ export function createRestManager(options) {
288
324
  await rest.sendRequest(request);
289
325
  return;
290
326
  }
291
- const queue = rest.queues.get(url);
327
+ const authHeader = request.requestBodyOptions?.headers?.authorization ?? '';
328
+ const queue = rest.queues.get(`${authHeader}${url}`);
292
329
  if (queue !== undefined) {
293
330
  queue.makeRequest(request);
294
331
  } else {
295
332
  // CREATES A NEW QUEUE
296
333
  const bucketQueue = new Queue(rest, {
297
334
  url,
298
- deleteQueueDelay: rest.deleteQueueDelay
335
+ deleteQueueDelay: rest.deleteQueueDelay,
336
+ authentication: authHeader
299
337
  });
300
338
  // Add request to queue
301
339
  bucketQueue.makeRequest(request);
302
340
  // Save queue
303
- rest.queues.set(url, bucketQueue);
341
+ rest.queues.set(`${authHeader}${url}`, bucketQueue);
304
342
  }
305
343
  },
306
344
  async makeRequest (method, route, options) {
@@ -308,7 +346,7 @@ export function createRestManager(options) {
308
346
  if (rest.authorization !== undefined) {
309
347
  options ??= {};
310
348
  options.headers ??= {};
311
- options.headers.authorization = rest.authorization;
349
+ options.headers[rest.authorizationHeader] = rest.authorization;
312
350
  }
313
351
  const result = await fetch(`${rest.baseUrl}/v${rest.version}${route}`, rest.createRequestBody(method, options));
314
352
  if (!result.ok) {
@@ -376,6 +414,11 @@ export function createRestManager(options) {
376
414
  async addThreadMember (channelId, userId) {
377
415
  await rest.put(rest.routes.channels.threads.user(channelId, userId));
378
416
  },
417
+ async addDmRecipient (channelId, userId, body) {
418
+ await rest.put(rest.routes.channels.dmRecipient(channelId, userId), {
419
+ body
420
+ });
421
+ },
379
422
  async createAutomodRule (guildId, body, reason) {
380
423
  return await rest.post(rest.routes.guilds.automod.rules(guildId), {
381
424
  body,
@@ -394,20 +437,34 @@ export function createRestManager(options) {
394
437
  reason
395
438
  });
396
439
  },
397
- async createGlobalApplicationCommand (body) {
398
- return await rest.post(rest.routes.interactions.commands.commands(rest.applicationId), {
440
+ async createGlobalApplicationCommand (body, options) {
441
+ const restOptions = {
399
442
  body
400
- });
443
+ };
444
+ if (options?.bearerToken) {
445
+ restOptions.unauthorized = true;
446
+ restOptions.headers = {
447
+ authorization: `Bearer ${options.bearerToken}`
448
+ };
449
+ }
450
+ return await rest.post(rest.routes.interactions.commands.commands(rest.applicationId), restOptions);
401
451
  },
402
452
  async createGuild (body) {
403
453
  return await rest.post(rest.routes.guilds.all(), {
404
454
  body
405
455
  });
406
456
  },
407
- async createGuildApplicationCommand (body, guildId) {
408
- return await rest.post(rest.routes.interactions.commands.guilds.all(rest.applicationId, guildId), {
457
+ async createGuildApplicationCommand (body, guildId, options) {
458
+ const restOptions = {
409
459
  body
410
- });
460
+ };
461
+ if (options?.bearerToken) {
462
+ restOptions.unauthorized = true;
463
+ restOptions.headers = {
464
+ authorization: `Bearer ${options.bearerToken}`
465
+ };
466
+ }
467
+ return await rest.post(rest.routes.interactions.commands.guilds.all(rest.applicationId, guildId), restOptions);
411
468
  },
412
469
  async createGuildFromTemplate (templateCode, body) {
413
470
  if (body.icon) {
@@ -600,7 +657,7 @@ export function createRestManager(options) {
600
657
  },
601
658
  async editBotProfile (options) {
602
659
  const avatar = options?.botAvatarURL ? await urlToBase64(options?.botAvatarURL) : options?.botAvatarURL;
603
- return await rest.patch(rest.routes.userBot(), {
660
+ return await rest.patch(rest.routes.currentUser(), {
604
661
  body: {
605
662
  username: options.username?.trim(),
606
663
  avatar
@@ -674,7 +731,8 @@ export function createRestManager(options) {
674
731
  },
675
732
  async editMessage (channelId, messageId, body) {
676
733
  return await rest.patch(rest.routes.channels.message(channelId, messageId), {
677
- body
734
+ body,
735
+ files: body.files
678
736
  });
679
737
  },
680
738
  async editOriginalInteractionResponse (token, body) {
@@ -776,14 +834,62 @@ export function createRestManager(options) {
776
834
  async getActiveThreads (guildId) {
777
835
  return await rest.get(rest.routes.channels.threads.active(guildId));
778
836
  },
779
- async getApplicationCommandPermission (guildId, commandId) {
780
- return await rest.get(rest.routes.interactions.commands.permission(rest.applicationId, guildId, commandId));
781
- },
782
- async getApplicationCommandPermissions (guildId) {
783
- return await rest.get(rest.routes.interactions.commands.permissions(rest.applicationId, guildId));
837
+ async getApplicationCommandPermission (guildId, commandId, options) {
838
+ const restOptions = {};
839
+ if (options?.accessToken) {
840
+ restOptions.unauthorized = true;
841
+ restOptions.headers = {
842
+ authorization: `Bearer ${options.accessToken}`
843
+ };
844
+ }
845
+ return await rest.get(rest.routes.interactions.commands.permission(options?.applicationId ?? rest.applicationId, guildId, commandId), restOptions);
846
+ },
847
+ async getApplicationCommandPermissions (guildId, options) {
848
+ const restOptions = {};
849
+ if (options?.accessToken) {
850
+ restOptions.unauthorized = true;
851
+ restOptions.headers = {
852
+ authorization: `Bearer ${options.accessToken}`
853
+ };
854
+ }
855
+ return await rest.get(rest.routes.interactions.commands.permissions(options?.applicationId ?? rest.applicationId, guildId), restOptions);
784
856
  },
785
857
  async getApplicationInfo () {
786
- return await rest.get(rest.routes.oauth2Application());
858
+ return await rest.get(rest.routes.oauth2.application());
859
+ },
860
+ async getCurrentAuthenticationInfo (token) {
861
+ return await rest.get(rest.routes.oauth2.currentAuthorization(), {
862
+ headers: {
863
+ authorization: `Bearer ${token}`
864
+ },
865
+ unauthorized: true
866
+ });
867
+ },
868
+ async exchangeToken (clientId, clientSecret, body) {
869
+ const basicCredentials = Buffer.from(`${clientId}:${clientSecret}`);
870
+ const restOptions = {
871
+ body,
872
+ headers: {
873
+ 'content-type': 'application/x-www-form-urlencoded',
874
+ authorization: `Basic ${basicCredentials.toString('base64')}`
875
+ },
876
+ unauthorized: true
877
+ };
878
+ if (body.grantType === 'client_credentials') {
879
+ restOptions.body.scope = body.scope.join(' ');
880
+ }
881
+ return await rest.post(rest.routes.oauth2.tokenExchange(), restOptions);
882
+ },
883
+ async revokeToken (clientId, clientSecret, body) {
884
+ const basicCredentials = Buffer.from(`${clientId}:${clientSecret}`);
885
+ await rest.post(rest.routes.oauth2.tokenRevoke(), {
886
+ body,
887
+ headers: {
888
+ 'content-type': 'application/x-www-form-urlencoded',
889
+ authorization: `Basic ${basicCredentials.toString('base64')}`
890
+ },
891
+ unauthorized: true
892
+ });
787
893
  },
788
894
  async getAuditLog (guildId, options) {
789
895
  return await rest.get(rest.routes.guilds.auditlogs(guildId, options));
@@ -822,6 +928,11 @@ export function createRestManager(options) {
822
928
  }
823
929
  });
824
930
  },
931
+ async getGroupDmChannel (body) {
932
+ return await rest.post(rest.routes.channels.dm(), {
933
+ body
934
+ });
935
+ },
825
936
  async getEmoji (guildId, emojiId) {
826
937
  return await rest.get(rest.routes.guilds.emoji(guildId, emojiId));
827
938
  },
@@ -847,6 +958,14 @@ export function createRestManager(options) {
847
958
  }) {
848
959
  return await rest.get(rest.routes.guilds.guild(guildId, options.counts));
849
960
  },
961
+ async getGuilds (token, options) {
962
+ return await rest.get(rest.routes.guilds.userGuilds(options), {
963
+ headers: {
964
+ authorization: `Bearer ${token}`
965
+ },
966
+ unauthorized: true
967
+ });
968
+ },
850
969
  async getGuildApplicationCommand (commandId, guildId) {
851
970
  return await rest.get(rest.routes.interactions.commands.guilds.one(rest.applicationId, guildId, commandId));
852
971
  },
@@ -942,6 +1061,30 @@ export function createRestManager(options) {
942
1061
  async getUser (id) {
943
1062
  return await rest.get(rest.routes.user(id));
944
1063
  },
1064
+ async getCurrentUser (token) {
1065
+ return await rest.get(rest.routes.currentUser(), {
1066
+ headers: {
1067
+ authorization: `Bearer ${token}`
1068
+ },
1069
+ unauthorized: true
1070
+ });
1071
+ },
1072
+ async getUserConnections (token) {
1073
+ return await rest.get(rest.routes.oauth2.connections(), {
1074
+ headers: {
1075
+ authorization: `Bearer ${token}`
1076
+ },
1077
+ unauthorized: true
1078
+ });
1079
+ },
1080
+ async getUserApplicationRoleConnection (token, applicationId) {
1081
+ return await rest.get(rest.routes.oauth2.roleConnections(applicationId), {
1082
+ headers: {
1083
+ authorization: `Bearer ${token}`
1084
+ },
1085
+ unauthorized: true
1086
+ });
1087
+ },
945
1088
  async getVanityUrl (guildId) {
946
1089
  return await rest.get(rest.routes.guilds.vanity(guildId));
947
1090
  },
@@ -986,6 +1129,9 @@ export function createRestManager(options) {
986
1129
  async removeThreadMember (channelId, userId) {
987
1130
  await rest.delete(rest.routes.channels.threads.user(channelId, userId));
988
1131
  },
1132
+ async removeDmRecipient (channelId, userId) {
1133
+ await rest.delete(rest.routes.channels.dmRecipient(channelId, userId));
1134
+ },
989
1135
  async sendFollowupMessage (token, options) {
990
1136
  return await rest.post(rest.routes.webhooks.webhook(rest.applicationId, token), {
991
1137
  body: options,
@@ -1043,6 +1189,14 @@ export function createRestManager(options) {
1043
1189
  async getMember (guildId, userId) {
1044
1190
  return await rest.get(rest.routes.guilds.members.member(guildId, userId));
1045
1191
  },
1192
+ async getCurrentMember (guildId, token) {
1193
+ return await rest.get(rest.routes.guilds.members.currentMember(guildId), {
1194
+ headers: {
1195
+ authorization: `Bearer ${token}`
1196
+ },
1197
+ unauthorized: true
1198
+ });
1199
+ },
1046
1200
  async getMembers (guildId, options) {
1047
1201
  return await rest.get(rest.routes.guilds.members.members(guildId, options));
1048
1202
  },
@@ -1078,15 +1232,62 @@ export function createRestManager(options) {
1078
1232
  async triggerTypingIndicator (channelId) {
1079
1233
  await rest.post(rest.routes.channels.typing(channelId));
1080
1234
  },
1081
- async upsertGlobalApplicationCommands (body) {
1082
- return await rest.put(rest.routes.interactions.commands.commands(rest.applicationId), {
1235
+ async upsertGlobalApplicationCommands (body, options) {
1236
+ const restOptions = {
1083
1237
  body
1238
+ };
1239
+ if (options?.bearerToken) {
1240
+ restOptions.unauthorized = true;
1241
+ restOptions.headers = {
1242
+ authorization: `Bearer ${options.bearerToken}`
1243
+ };
1244
+ }
1245
+ return await rest.put(rest.routes.interactions.commands.commands(rest.applicationId), restOptions);
1246
+ },
1247
+ async upsertGuildApplicationCommands (guildId, body, options) {
1248
+ const restOptions = {
1249
+ body
1250
+ };
1251
+ if (options?.bearerToken) {
1252
+ restOptions.unauthorized = true;
1253
+ restOptions.headers = {
1254
+ authorization: `Bearer ${options.bearerToken}`
1255
+ };
1256
+ }
1257
+ return await rest.put(rest.routes.interactions.commands.guilds.all(rest.applicationId, guildId), restOptions);
1258
+ },
1259
+ async editUserApplicationRoleConnection (token, applicationId, body) {
1260
+ return await rest.put(rest.routes.oauth2.roleConnections(applicationId), {
1261
+ body,
1262
+ headers: {
1263
+ authorization: `Bearer ${token}`
1264
+ },
1265
+ unauthorized: true
1084
1266
  });
1085
1267
  },
1086
- async upsertGuildApplicationCommands (guildId, body) {
1087
- return await rest.put(rest.routes.interactions.commands.guilds.all(rest.applicationId, guildId), {
1268
+ async addGuildMember (guildId, userId, body) {
1269
+ return await rest.put(rest.routes.guilds.members.member(guildId, userId), {
1088
1270
  body
1089
1271
  });
1272
+ },
1273
+ preferSnakeCase (enabled) {
1274
+ const camelizer = enabled ? (x)=>x : camelize;
1275
+ rest.get = async (url, options)=>{
1276
+ return camelizer(await rest.makeRequest('GET', url, options));
1277
+ };
1278
+ rest.post = async (url, options)=>{
1279
+ return camelizer(await rest.makeRequest('POST', url, options));
1280
+ };
1281
+ rest.delete = async (url, options)=>{
1282
+ camelizer(await rest.makeRequest('DELETE', url, options));
1283
+ };
1284
+ rest.patch = async (url, options)=>{
1285
+ return camelizer(await rest.makeRequest('PATCH', url, options));
1286
+ };
1287
+ rest.put = async (url, options)=>{
1288
+ return camelizer(await rest.makeRequest('PUT', url, options));
1289
+ };
1290
+ return rest;
1090
1291
  }
1091
1292
  };
1092
1293
  return rest;