2021-07-26 21:00:05 +02:00
|
|
|
use crate::addressing::{Address, Addressable};
|
2022-02-09 20:34:52 +01:00
|
|
|
use crate::database::constants::{ADDED_ATTR, LABEL_ATTR};
|
|
|
|
use crate::database::entry::{Entry, EntryValue, InEntry, InvariantEntry};
|
2021-12-17 23:04:35 +01:00
|
|
|
use crate::database::hierarchies::{list_roots, resolve_path, UHierPath};
|
2021-07-26 21:00:05 +02:00
|
|
|
use crate::database::lang::Query;
|
2021-12-23 11:10:16 +01:00
|
|
|
use crate::database::UpEndDatabase;
|
2022-01-23 14:55:49 +01:00
|
|
|
use crate::filesystem::add_file;
|
2021-12-27 12:40:02 +01:00
|
|
|
use crate::previews::PreviewStore;
|
2022-01-26 16:55:23 +01:00
|
|
|
use crate::util::hash::{b58_decode, b58_encode, Hashable};
|
2021-07-26 21:14:12 +02:00
|
|
|
use crate::util::jobs::JobContainer;
|
2020-08-27 01:07:25 +02:00
|
|
|
use actix_files::NamedFile;
|
2022-01-18 17:05:45 +01:00
|
|
|
use actix_multipart::Multipart;
|
2020-09-13 20:10:18 +02:00
|
|
|
use actix_web::error::{ErrorBadRequest, ErrorInternalServerError, ErrorNotFound};
|
2021-12-23 11:18:04 +01:00
|
|
|
use actix_web::http;
|
2022-01-27 15:55:48 +01:00
|
|
|
use actix_web::http::header::{ContentDisposition, DispositionType};
|
2021-12-19 22:38:41 +01:00
|
|
|
use actix_web::{delete, error, get, post, put, web, Either, Error, HttpResponse};
|
2022-01-18 17:05:45 +01:00
|
|
|
use anyhow::{anyhow, Result};
|
|
|
|
use futures_util::TryStreamExt;
|
2021-12-21 17:43:29 +01:00
|
|
|
use log::{debug, info, trace};
|
2020-08-27 01:29:44 +02:00
|
|
|
use serde::Deserialize;
|
2021-05-06 20:23:20 +02:00
|
|
|
use serde_json::json;
|
2022-02-09 20:34:52 +01:00
|
|
|
use std::convert::{TryFrom, TryInto};
|
2022-01-18 17:05:45 +01:00
|
|
|
use std::fs;
|
|
|
|
use std::io::Write;
|
|
|
|
use std::path::PathBuf;
|
2021-02-20 17:36:19 +01:00
|
|
|
use std::sync::{Arc, RwLock};
|
2022-02-09 20:34:52 +01:00
|
|
|
use std::time::{SystemTime, UNIX_EPOCH};
|
2022-01-18 22:43:55 +01:00
|
|
|
use std::{collections::HashMap, io};
|
2022-01-18 17:05:45 +01:00
|
|
|
use tempfile::NamedTempFile;
|
2020-09-12 14:27:45 +02:00
|
|
|
|
2021-12-19 22:38:41 +01:00
|
|
|
#[cfg(feature = "desktop")]
|
|
|
|
use is_executable::IsExecutable;
|
|
|
|
|
2020-08-30 22:11:32 +02:00
|
|
|
#[derive(Clone)]
|
2020-08-27 01:07:25 +02:00
|
|
|
pub struct State {
|
2021-12-23 11:10:16 +01:00
|
|
|
pub upend: Arc<UpEndDatabase>,
|
2021-05-06 20:23:20 +02:00
|
|
|
pub vault_name: Option<String>,
|
2021-02-20 17:36:19 +01:00
|
|
|
pub job_container: Arc<RwLock<JobContainer>>,
|
2021-12-27 12:40:02 +01:00
|
|
|
pub preview_store: Option<Arc<PreviewStore>>,
|
2022-01-19 20:42:36 +01:00
|
|
|
pub desktop_enabled: bool,
|
2020-08-27 01:07:25 +02:00
|
|
|
}
|
|
|
|
|
2021-12-19 22:38:41 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
pub struct RawRequest {
|
|
|
|
native: Option<String>,
|
2022-01-27 15:55:48 +01:00
|
|
|
inline: Option<String>,
|
2021-12-19 22:38:41 +01:00
|
|
|
}
|
|
|
|
|
2020-09-25 02:45:17 +02:00
|
|
|
#[get("/api/raw/{hash}")]
|
2021-12-19 22:38:41 +01:00
|
|
|
pub async fn get_raw(
|
|
|
|
state: web::Data<State>,
|
|
|
|
web::Query(query): web::Query<RawRequest>,
|
|
|
|
hash: web::Path<String>,
|
|
|
|
) -> Result<Either<NamedFile, HttpResponse>, Error> {
|
2022-01-27 15:55:48 +01:00
|
|
|
let address =
|
|
|
|
Address::decode(&b58_decode(hash.into_inner()).map_err(ErrorInternalServerError)?)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2020-09-13 14:28:58 +02:00
|
|
|
if let Address::Hash(hash) = address {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2022-01-14 22:04:53 +01:00
|
|
|
|
|
|
|
// First check if there's an entry with this hash
|
|
|
|
let entry = connection
|
|
|
|
.retrieve_entry(hash.clone())
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
if let Some(entry) = entry {
|
|
|
|
return Ok(Either::B(HttpResponse::Ok().json(entry)));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Then, check the files
|
2021-12-23 11:10:16 +01:00
|
|
|
let files = connection
|
2022-02-04 20:33:07 +01:00
|
|
|
.retrieve_file(&hash)
|
2021-12-23 11:10:16 +01:00
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-12-19 22:38:41 +01:00
|
|
|
if let Some(file) = files.get(0) {
|
2021-12-23 11:10:16 +01:00
|
|
|
let file_path = state.upend.vault_path.join(&file.path);
|
2020-09-12 14:27:45 +02:00
|
|
|
|
2021-12-23 11:18:04 +01:00
|
|
|
if query.native.is_none() {
|
2022-02-03 16:34:35 +01:00
|
|
|
Ok(Either::A(
|
2022-01-27 15:55:48 +01:00
|
|
|
NamedFile::open(file_path)?.set_content_disposition(ContentDisposition {
|
2022-02-03 16:34:35 +01:00
|
|
|
disposition: if query.inline.is_some() {
|
|
|
|
DispositionType::Inline
|
|
|
|
} else {
|
|
|
|
DispositionType::Attachment
|
|
|
|
},
|
2022-01-27 15:55:48 +01:00
|
|
|
parameters: vec![],
|
2022-02-03 16:34:35 +01:00
|
|
|
}),
|
|
|
|
))
|
2022-01-19 20:42:36 +01:00
|
|
|
} else if state.desktop_enabled {
|
2021-12-23 11:18:04 +01:00
|
|
|
#[cfg(feature = "desktop")]
|
|
|
|
{
|
|
|
|
info!("Opening {:?}...", file_path);
|
|
|
|
let mut response = HttpResponse::NoContent();
|
|
|
|
let path = if !file_path.is_executable() {
|
|
|
|
file_path
|
|
|
|
} else {
|
|
|
|
response
|
|
|
|
.header(
|
|
|
|
http::header::WARNING,
|
|
|
|
"199 - Opening parent directory due to file being executable.",
|
|
|
|
)
|
|
|
|
.header(
|
|
|
|
http::header::ACCESS_CONTROL_EXPOSE_HEADERS,
|
|
|
|
http::header::WARNING.to_string(),
|
|
|
|
);
|
2021-12-21 17:43:29 +01:00
|
|
|
|
2021-12-23 11:18:04 +01:00
|
|
|
file_path
|
|
|
|
.parent()
|
|
|
|
.ok_or_else(|| {
|
|
|
|
ErrorInternalServerError("No parent to open as fallback.")
|
|
|
|
})?
|
|
|
|
.to_path_buf()
|
|
|
|
};
|
|
|
|
opener::open(path).map_err(error::ErrorServiceUnavailable)?;
|
|
|
|
Ok(Either::B(response.finish()))
|
2021-12-19 22:38:41 +01:00
|
|
|
}
|
2021-12-23 11:18:04 +01:00
|
|
|
|
|
|
|
#[cfg(not(feature = "desktop"))]
|
|
|
|
unreachable!()
|
|
|
|
} else {
|
2021-12-23 23:45:46 +01:00
|
|
|
Err(error::ErrorNotImplemented("Desktop features not enabled."))
|
2021-12-19 22:38:41 +01:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Err(error::ErrorNotFound("NOT FOUND"))
|
2020-09-13 14:28:58 +02:00
|
|
|
}
|
|
|
|
} else {
|
2021-12-22 11:56:06 +01:00
|
|
|
Err(ErrorBadRequest(
|
|
|
|
"Address does not refer to a rawable object.",
|
|
|
|
))
|
2020-08-27 01:07:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-10 14:58:00 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
pub struct ThumbRequest {
|
|
|
|
mime: Option<String>,
|
|
|
|
}
|
|
|
|
|
2022-02-04 12:06:45 +01:00
|
|
|
#[get("/api/thumb/{hash}")]
|
|
|
|
pub async fn get_thumbnail(
|
|
|
|
state: web::Data<State>,
|
|
|
|
hash: web::Path<String>,
|
2022-02-10 14:58:00 +01:00
|
|
|
web::Query(query): web::Query<ThumbRequest>,
|
2022-02-04 12:06:45 +01:00
|
|
|
) -> Result<Either<NamedFile, HttpResponse>, Error> {
|
|
|
|
#[cfg(feature = "previews")]
|
|
|
|
if let Some(preview_store) = &state.preview_store {
|
|
|
|
let hash = hash.into_inner();
|
|
|
|
let address = Address::decode(&b58_decode(&hash).map_err(ErrorInternalServerError)?)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
if let Address::Hash(address_hash) = address {
|
|
|
|
let preview_store = preview_store.clone();
|
2022-02-10 15:11:38 +01:00
|
|
|
let preview_result = web::block(move || {
|
|
|
|
preview_store.get(address_hash, query.mime, state.job_container.clone())
|
|
|
|
})
|
|
|
|
.await?;
|
2022-02-04 12:06:45 +01:00
|
|
|
|
|
|
|
if let Some(preview_path) = preview_result {
|
|
|
|
let mut file = NamedFile::open(&preview_path)?.disable_content_disposition();
|
|
|
|
if let Some(mime_type) = tree_magic_mini::from_filepath(&preview_path) {
|
|
|
|
if let Ok(mime) = mime_type.parse() {
|
|
|
|
file = file.set_content_type(mime);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return Ok(Either::A(file));
|
|
|
|
} else {
|
|
|
|
return Ok(Either::B(
|
|
|
|
HttpResponse::SeeOther()
|
2022-02-07 10:23:17 +01:00
|
|
|
.header(http::header::LOCATION, format!("../../api/raw/{hash}"))
|
2022-02-04 12:06:45 +01:00
|
|
|
.finish(),
|
|
|
|
));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return Err(ErrorBadRequest(
|
|
|
|
"Address does not refer to a previewable object.",
|
|
|
|
));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(error::ErrorNotImplemented("Previews not enabled."))
|
|
|
|
}
|
|
|
|
|
2022-02-06 22:25:23 +01:00
|
|
|
#[post("/api/query")]
|
|
|
|
pub async fn get_query(state: web::Data<State>, query: String) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2021-02-20 12:12:48 +01:00
|
|
|
|
2022-02-06 22:25:23 +01:00
|
|
|
let in_query: Query = query.parse().map_err(ErrorBadRequest)?;
|
2021-12-23 11:10:16 +01:00
|
|
|
let entries = connection
|
|
|
|
.query(in_query)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-02-21 12:30:17 +01:00
|
|
|
let mut result: HashMap<String, Entry> = HashMap::new();
|
|
|
|
for entry in entries {
|
|
|
|
result.insert(
|
2022-01-26 16:55:23 +01:00
|
|
|
b58_encode(
|
2021-02-21 17:08:33 +01:00
|
|
|
entry
|
|
|
|
.address()
|
|
|
|
.map_err(ErrorInternalServerError)?
|
|
|
|
.encode()
|
|
|
|
.map_err(ErrorInternalServerError)?,
|
|
|
|
),
|
2021-02-21 12:30:17 +01:00
|
|
|
entry,
|
|
|
|
);
|
|
|
|
}
|
2021-02-20 12:12:48 +01:00
|
|
|
|
2021-02-21 12:30:17 +01:00
|
|
|
Ok(HttpResponse::Ok().json(&result))
|
2021-02-20 12:12:48 +01:00
|
|
|
}
|
|
|
|
|
2021-12-17 23:04:35 +01:00
|
|
|
trait EntriesAsHash {
|
|
|
|
fn as_hash(&self) -> Result<HashMap<String, &Entry>>;
|
|
|
|
}
|
|
|
|
|
|
|
|
impl EntriesAsHash for Vec<Entry> {
|
|
|
|
fn as_hash(&self) -> Result<HashMap<String, &Entry>> {
|
|
|
|
let mut result: HashMap<String, &Entry> = HashMap::new();
|
|
|
|
for entry in self {
|
2022-01-26 16:55:23 +01:00
|
|
|
result.insert(b58_encode(entry.address()?.encode()?), entry);
|
2021-12-17 23:04:35 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok(result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-29 00:55:09 +02:00
|
|
|
#[get("/api/obj/{address_str}")]
|
2020-09-13 13:20:35 +02:00
|
|
|
pub async fn get_object(
|
|
|
|
state: web::Data<State>,
|
2022-02-07 20:46:17 +01:00
|
|
|
address: web::Path<Address>,
|
2020-09-13 13:20:35 +02:00
|
|
|
) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2022-02-07 20:46:17 +01:00
|
|
|
let address = address.into_inner();
|
2021-12-23 11:10:16 +01:00
|
|
|
let result: Vec<Entry> = connection
|
2022-02-07 20:46:17 +01:00
|
|
|
.retrieve_object(&address)
|
2021-12-23 11:10:16 +01:00
|
|
|
.map_err(ErrorInternalServerError)?;
|
2020-09-13 13:20:35 +02:00
|
|
|
|
2021-12-17 23:04:35 +01:00
|
|
|
debug!("{:?}", result);
|
2022-02-07 20:46:17 +01:00
|
|
|
|
2022-02-07 21:59:30 +01:00
|
|
|
// TODO: make this automatically derive from `Address` definition
|
2022-02-07 20:46:17 +01:00
|
|
|
let (entity_type, entity_content) = match address {
|
|
|
|
Address::Hash(_) => ("Hash", None),
|
|
|
|
Address::Uuid(_) => ("Uuid", None),
|
|
|
|
Address::Attribute(attribute) => ("Attribute", Some(attribute)),
|
|
|
|
Address::Url(url) => ("Url", Some(url)),
|
|
|
|
};
|
|
|
|
|
|
|
|
Ok(HttpResponse::Ok().json(json!({
|
|
|
|
"entity": {
|
|
|
|
"t": entity_type,
|
|
|
|
"c": entity_content
|
|
|
|
},
|
|
|
|
"entries": result.as_hash().map_err(ErrorInternalServerError)?
|
|
|
|
})))
|
2020-09-13 13:20:35 +02:00
|
|
|
}
|
|
|
|
|
2021-02-19 21:58:35 +01:00
|
|
|
#[put("/api/obj")]
|
|
|
|
pub async fn put_object(
|
|
|
|
state: web::Data<State>,
|
2022-01-18 17:05:45 +01:00
|
|
|
payload: Either<web::Json<InEntry>, Multipart>,
|
2021-02-19 21:58:35 +01:00
|
|
|
) -> Result<HttpResponse, Error> {
|
2022-02-09 20:34:52 +01:00
|
|
|
let (entry_address, entity_address) = match payload {
|
2022-01-18 17:05:45 +01:00
|
|
|
Either::A(in_entry) => {
|
2022-02-09 20:34:52 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2022-01-18 17:05:45 +01:00
|
|
|
let in_entry = in_entry.into_inner();
|
2021-02-19 21:58:35 +01:00
|
|
|
|
2022-02-09 20:34:52 +01:00
|
|
|
debug!("PUTting {in_entry:?}");
|
2022-01-09 21:18:19 +01:00
|
|
|
|
2022-02-09 20:34:52 +01:00
|
|
|
match in_entry {
|
|
|
|
InEntry::Invariant(in_entry) => {
|
|
|
|
let invariant = Entry::try_from(&InvariantEntry {
|
|
|
|
attribute: in_entry.attribute,
|
|
|
|
value: in_entry.value,
|
|
|
|
})
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
Ok((
|
|
|
|
Some(
|
|
|
|
connection
|
|
|
|
.insert_entry(invariant.clone())
|
|
|
|
.map_err(ErrorInternalServerError)?,
|
|
|
|
),
|
|
|
|
invariant.entity,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
InEntry::Address { entity: in_address } => {
|
|
|
|
let address = in_address.try_into().map_err(ErrorBadRequest)?;
|
|
|
|
|
|
|
|
let entries_to_add = match &address {
|
|
|
|
Address::Hash(_) => vec![],
|
|
|
|
Address::Uuid(uuid) => vec![Entry {
|
|
|
|
entity: address.clone(),
|
|
|
|
attribute: LABEL_ATTR.to_string(),
|
|
|
|
value: EntryValue::String(uuid.to_string()),
|
|
|
|
}],
|
|
|
|
Address::Attribute(attribute) => vec![Entry {
|
|
|
|
entity: address.clone(),
|
|
|
|
attribute: LABEL_ATTR.to_string(),
|
|
|
|
value: EntryValue::String(format!("ATTRIBUTE: {attribute}")),
|
|
|
|
}],
|
2022-02-10 11:38:45 +01:00
|
|
|
Address::Url(url) => {
|
|
|
|
#[cfg(feature = "extractors-web")]
|
|
|
|
actix::spawn(crate::extractors::web::insert_info(
|
|
|
|
url.clone(),
|
|
|
|
state.upend.connection().map_err(ErrorInternalServerError)?,
|
|
|
|
state.job_container.clone(),
|
|
|
|
));
|
|
|
|
vec![Entry {
|
|
|
|
entity: address.clone(),
|
|
|
|
attribute: LABEL_ATTR.to_string(),
|
|
|
|
value: EntryValue::String(url.clone()),
|
|
|
|
}]
|
|
|
|
}
|
2022-02-09 20:34:52 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
connection
|
|
|
|
.transaction::<_, anyhow::Error, _>(|| {
|
|
|
|
if connection.retrieve_object(&address)?.is_empty() {
|
|
|
|
connection.insert_entry(Entry {
|
|
|
|
entity: address.clone(),
|
|
|
|
attribute: ADDED_ATTR.to_string(),
|
|
|
|
value: EntryValue::Number(
|
|
|
|
SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.unwrap()
|
|
|
|
.as_secs()
|
|
|
|
as f64,
|
|
|
|
),
|
|
|
|
})?;
|
|
|
|
}
|
|
|
|
|
|
|
|
for entry in entries_to_add {
|
|
|
|
connection.insert_entry(entry)?;
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
})
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
Ok((None, address))
|
|
|
|
}
|
|
|
|
}
|
2022-01-18 17:05:45 +01:00
|
|
|
}
|
|
|
|
Either::B(mut multipart) => {
|
|
|
|
if let Some(mut field) = multipart.try_next().await? {
|
|
|
|
let content_disposition = field
|
|
|
|
.content_disposition()
|
|
|
|
.ok_or_else(|| HttpResponse::BadRequest().finish())?;
|
|
|
|
|
|
|
|
let filename = content_disposition.get_filename();
|
|
|
|
|
|
|
|
let mut file = NamedTempFile::new()?;
|
|
|
|
while let Some(chunk) = field.try_next().await? {
|
|
|
|
file = web::block(move || file.write_all(&chunk).map(|_| file)).await?;
|
|
|
|
}
|
|
|
|
let path = PathBuf::from(file.path());
|
|
|
|
let hash = web::block(move || path.hash()).await?;
|
|
|
|
let address = Address::Hash(hash.clone());
|
|
|
|
|
2022-01-23 15:01:14 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
let existing_files = connection
|
2022-02-04 20:33:07 +01:00
|
|
|
.retrieve_file(&hash)
|
2022-01-23 15:01:14 +01:00
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
if existing_files.is_empty() {
|
2022-01-26 16:55:23 +01:00
|
|
|
let addr_str = b58_encode(address.encode().map_err(ErrorInternalServerError)?);
|
2022-01-23 15:01:14 +01:00
|
|
|
let final_name = if let Some(filename) = filename {
|
|
|
|
format!("{addr_str}_{filename}")
|
|
|
|
} else {
|
|
|
|
addr_str
|
|
|
|
};
|
2022-01-18 17:05:45 +01:00
|
|
|
|
2022-01-23 15:01:14 +01:00
|
|
|
let final_path = state.upend.vault_path.join(&final_name);
|
2022-01-18 17:05:45 +01:00
|
|
|
|
2022-01-23 15:01:14 +01:00
|
|
|
let (_, tmp_path) = file.keep().map_err(ErrorInternalServerError)?;
|
|
|
|
let final_path = web::block::<_, _, io::Error>(move || {
|
|
|
|
fs::copy(&tmp_path, &final_path)?;
|
|
|
|
fs::remove_file(tmp_path)?;
|
|
|
|
Ok(final_path)
|
|
|
|
})
|
|
|
|
.await?;
|
2022-01-18 17:05:45 +01:00
|
|
|
|
2022-01-23 15:01:14 +01:00
|
|
|
add_file(&connection, &final_path, hash).map_err(ErrorInternalServerError)?;
|
|
|
|
}
|
2022-01-23 14:55:49 +01:00
|
|
|
|
|
|
|
if let Some(filename) = filename {
|
|
|
|
let _ = upend_insert_val!(&connection, address, "LBL", filename);
|
|
|
|
}
|
2022-01-18 17:05:45 +01:00
|
|
|
|
2022-02-09 20:34:52 +01:00
|
|
|
Ok((None, address))
|
2022-01-18 17:05:45 +01:00
|
|
|
} else {
|
2022-02-09 20:34:52 +01:00
|
|
|
Err(anyhow!("Multipart contains no fields."))
|
2022-01-18 17:05:45 +01:00
|
|
|
}
|
|
|
|
}
|
2022-02-09 20:34:52 +01:00
|
|
|
}
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-02-19 21:58:35 +01:00
|
|
|
|
2022-02-09 20:34:52 +01:00
|
|
|
Ok(HttpResponse::Ok().json([entry_address, Some(entity_address)]))
|
2021-02-19 21:58:35 +01:00
|
|
|
}
|
|
|
|
|
2022-02-02 00:45:05 +01:00
|
|
|
#[put("/api/obj/{address}/{attribute}")]
|
|
|
|
pub async fn put_object_attribute(
|
|
|
|
state: web::Data<State>,
|
|
|
|
web::Path((address, attribute)): web::Path<(Address, String)>,
|
|
|
|
value: web::Json<EntryValue>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
let new_address = connection
|
|
|
|
.transaction::<_, anyhow::Error, _>(|| {
|
|
|
|
let existing_attr_entries =
|
|
|
|
connection.query(format!("(matches \"{address}\" \"{attribute}\" ?)").parse()?)?;
|
|
|
|
|
|
|
|
for eae in existing_attr_entries {
|
|
|
|
let _ = connection.remove_object(eae.address()?)?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let new_attr_entry = Entry {
|
|
|
|
entity: address,
|
|
|
|
attribute,
|
|
|
|
value: value.into_inner(),
|
|
|
|
};
|
|
|
|
|
|
|
|
connection.insert_entry(new_attr_entry)
|
|
|
|
})
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
Ok(HttpResponse::Ok().json(new_address))
|
|
|
|
}
|
|
|
|
|
2020-09-29 00:55:09 +02:00
|
|
|
#[delete("/api/obj/{address_str}")]
|
|
|
|
pub async fn delete_object(
|
|
|
|
state: web::Data<State>,
|
|
|
|
address_str: web::Path<String>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
let _ = connection
|
|
|
|
.remove_object(
|
2022-01-26 16:55:23 +01:00
|
|
|
Address::decode(&b58_decode(address_str.into_inner()).map_err(ErrorBadRequest)?)
|
2021-12-23 11:10:16 +01:00
|
|
|
.map_err(ErrorInternalServerError)?,
|
|
|
|
)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2020-09-29 00:55:09 +02:00
|
|
|
|
|
|
|
Ok(HttpResponse::Ok().finish())
|
|
|
|
}
|
|
|
|
|
2022-01-09 21:18:19 +01:00
|
|
|
// #[post("api/obj/{address_str}")]
|
|
|
|
// pub async fn update_attribute(
|
|
|
|
// state: web::Data<State>,
|
|
|
|
// address_str: web::Path<String>,
|
|
|
|
// mut payload: web::Payload,
|
|
|
|
// ) -> Result<HttpResponse, Error> {
|
|
|
|
// let body = load_body(&mut payload)
|
|
|
|
// .await
|
|
|
|
// .map_err(error::ErrorBadRequest)?;
|
|
|
|
// let entry_value = serde_json::from_slice::<EntryValue>(&body).map_err(ErrorBadRequest)?;
|
|
|
|
|
|
|
|
// let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
// connection
|
|
|
|
// .transaction::<_, anyhow::Error, _>(|| {
|
|
|
|
// let address = Address::decode(&decode(address_str.into_inner())?)?;
|
|
|
|
// let _ = connection.remove_object(address)?;
|
|
|
|
|
|
|
|
// Ok(())
|
|
|
|
// })
|
|
|
|
// .map_err(ErrorInternalServerError)?;
|
|
|
|
|
|
|
|
// Ok(HttpResponse::Ok().finish())
|
|
|
|
// }
|
|
|
|
|
2022-01-04 21:58:23 +01:00
|
|
|
#[get("/api/all/attributes")]
|
|
|
|
pub async fn get_all_attributes(state: web::Data<State>) -> Result<HttpResponse, Error> {
|
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2022-01-07 00:52:09 +01:00
|
|
|
let result = connection
|
|
|
|
.get_all_attributes()
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2022-01-04 21:58:23 +01:00
|
|
|
Ok(HttpResponse::Ok().json(result))
|
|
|
|
}
|
|
|
|
|
2020-09-25 02:45:17 +02:00
|
|
|
#[get("/api/hier/{path:.*}")]
|
2020-09-13 20:10:18 +02:00
|
|
|
pub async fn list_hier(
|
|
|
|
state: web::Data<State>,
|
|
|
|
path: web::Path<String>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2021-12-17 23:42:58 +01:00
|
|
|
if path.is_empty() {
|
|
|
|
Ok(HttpResponse::MovedPermanently()
|
2022-02-07 10:23:17 +01:00
|
|
|
.header(http::header::LOCATION, "../../api/hier_roots")
|
2021-12-17 23:42:58 +01:00
|
|
|
.finish())
|
2021-12-17 23:04:35 +01:00
|
|
|
} else {
|
2021-12-17 23:42:58 +01:00
|
|
|
let upath: UHierPath = path.into_inner().parse().map_err(ErrorBadRequest)?;
|
|
|
|
trace!("Listing path \"{}\"", upath);
|
|
|
|
|
2021-12-17 23:04:35 +01:00
|
|
|
// todo: 500 if actual error occurs
|
|
|
|
let path = resolve_path(&connection, &upath, false).map_err(ErrorNotFound)?;
|
2021-12-17 23:42:58 +01:00
|
|
|
match path.last() {
|
|
|
|
Some(addr) => Ok(HttpResponse::Found()
|
2022-02-07 10:23:17 +01:00
|
|
|
.header(http::header::LOCATION, format!("../../api/obj/{}", addr))
|
2021-12-17 23:42:58 +01:00
|
|
|
.finish()),
|
|
|
|
None => Ok(HttpResponse::NotFound().finish()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/api/hier_roots")]
|
|
|
|
pub async fn list_hier_roots(state: web::Data<State>) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
2021-12-17 23:42:58 +01:00
|
|
|
|
|
|
|
let result = list_roots(&connection)
|
|
|
|
.map_err(ErrorInternalServerError)?
|
|
|
|
.into_iter()
|
2022-02-07 20:46:17 +01:00
|
|
|
.map(|root| connection.retrieve_object(&root))
|
2021-12-17 23:42:58 +01:00
|
|
|
.collect::<Result<Vec<Vec<Entry>>>>()
|
|
|
|
.map_err(ErrorInternalServerError)?
|
|
|
|
.concat();
|
|
|
|
|
|
|
|
Ok(HttpResponse::Ok().json(result.as_hash().map_err(ErrorInternalServerError)?))
|
2020-09-13 20:10:18 +02:00
|
|
|
}
|
|
|
|
|
2022-01-31 17:26:31 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
pub struct RescanRequest {
|
|
|
|
full: Option<String>,
|
|
|
|
}
|
|
|
|
|
2020-08-27 01:07:25 +02:00
|
|
|
#[post("/api/refresh")]
|
2022-01-31 17:26:31 +01:00
|
|
|
pub async fn api_refresh(
|
|
|
|
state: web::Data<State>,
|
|
|
|
web::Query(query): web::Query<RescanRequest>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
2021-03-06 22:14:17 +01:00
|
|
|
actix::spawn(crate::filesystem::rescan_vault(
|
2021-12-23 11:10:16 +01:00
|
|
|
state.upend.clone(),
|
2021-02-20 17:36:19 +01:00
|
|
|
state.job_container.clone(),
|
2022-01-31 17:26:31 +01:00
|
|
|
query.full.is_none(),
|
2022-01-21 17:04:07 +01:00
|
|
|
false,
|
2021-02-20 17:36:19 +01:00
|
|
|
));
|
2020-08-27 01:07:25 +02:00
|
|
|
Ok(HttpResponse::Ok().finish())
|
|
|
|
}
|
2021-02-20 17:36:19 +01:00
|
|
|
|
2021-04-23 23:28:58 +02:00
|
|
|
#[get("/api/files/{hash}")]
|
|
|
|
pub async fn get_file(
|
|
|
|
state: web::Data<State>,
|
|
|
|
hash: web::Path<String>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
2022-01-27 15:55:48 +01:00
|
|
|
let address =
|
|
|
|
Address::decode(&b58_decode(hash.into_inner()).map_err(ErrorInternalServerError)?)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-04-23 23:28:58 +02:00
|
|
|
|
|
|
|
if let Address::Hash(hash) = address {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
let response = connection
|
2022-02-04 20:33:07 +01:00
|
|
|
.retrieve_file(&hash)
|
2021-12-23 11:10:16 +01:00
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-04-23 23:28:58 +02:00
|
|
|
|
|
|
|
Ok(HttpResponse::Ok().json(response))
|
|
|
|
} else {
|
|
|
|
Err(ErrorBadRequest("Address does not refer to a file."))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:51:23 +01:00
|
|
|
#[get("/api/files/latest")]
|
|
|
|
pub async fn latest_files(state: web::Data<State>) -> Result<HttpResponse, Error> {
|
2021-12-23 11:10:16 +01:00
|
|
|
let connection = state.upend.connection().map_err(ErrorInternalServerError)?;
|
|
|
|
let files = connection
|
|
|
|
.get_latest_files(100)
|
|
|
|
.map_err(ErrorInternalServerError)?;
|
2021-02-21 19:51:23 +01:00
|
|
|
Ok(HttpResponse::Ok().json(&files))
|
|
|
|
}
|
|
|
|
|
2022-02-10 15:20:15 +01:00
|
|
|
#[derive(Deserialize)]
|
|
|
|
pub struct JobsRequest {
|
|
|
|
full: Option<String>,
|
|
|
|
}
|
|
|
|
|
2021-02-20 17:36:19 +01:00
|
|
|
#[get("/api/jobs")]
|
2022-02-10 15:20:15 +01:00
|
|
|
pub async fn get_jobs(
|
|
|
|
state: web::Data<State>,
|
|
|
|
web::Query(query): web::Query<JobsRequest>,
|
|
|
|
) -> Result<HttpResponse, Error> {
|
2021-02-20 17:36:19 +01:00
|
|
|
let jobs = state.job_container.read().unwrap().get_jobs();
|
2022-02-10 15:20:15 +01:00
|
|
|
Ok(HttpResponse::Ok().json(if query.full.is_some() {
|
|
|
|
jobs
|
|
|
|
} else {
|
|
|
|
jobs.into_iter()
|
|
|
|
.filter(|(_, j)| matches!(j.state, crate::util::jobs::State::InProgress))
|
|
|
|
.collect()
|
|
|
|
}))
|
2021-02-20 17:36:19 +01:00
|
|
|
}
|
2021-05-06 20:23:20 +02:00
|
|
|
|
|
|
|
#[get("/api/info")]
|
|
|
|
pub async fn get_info(state: web::Data<State>) -> Result<HttpResponse, Error> {
|
|
|
|
Ok(HttpResponse::Ok().json(json!({
|
|
|
|
"name": state.vault_name,
|
2021-12-23 23:45:46 +01:00
|
|
|
"location": &*state.upend.vault_path,
|
2022-02-04 12:09:43 +01:00
|
|
|
"version": crate::common::PKG_VERSION,
|
|
|
|
"desktop": state.desktop_enabled
|
2021-05-06 20:23:20 +02:00
|
|
|
})))
|
|
|
|
}
|