2
0
Fork 0
mirror of https://git.asonix.dog/asonix/pict-rs synced 2024-11-10 06:25:00 +00:00
pict-rs/src/main.rs

991 lines
31 KiB
Rust
Raw Normal View History

use actix_form_data::{Field, Form, Value};
2021-01-14 16:26:17 +00:00
use actix_web::{
guard,
http::header::{CacheControl, CacheDirective, LastModified, ACCEPT_RANGES},
2021-04-17 19:59:42 +00:00
web, App, HttpResponse, HttpResponseBuilder, HttpServer,
2021-01-14 16:26:17 +00:00
};
2021-03-10 02:51:03 +00:00
use awc::Client;
use dashmap::{mapref::entry::Entry, DashMap};
2021-10-14 00:06:53 +00:00
use futures_util::{stream::once, Stream};
2021-09-06 17:08:13 +00:00
use once_cell::sync::Lazy;
use opentelemetry::{
sdk::{propagation::TraceContextPropagator, Resource},
KeyValue,
};
2021-09-18 21:29:30 +00:00
use opentelemetry_otlp::WithExportConfig;
use std::{
collections::HashSet,
future::{ready, Future},
path::PathBuf,
pin::Pin,
task::{Context, Poll},
time::SystemTime,
};
2020-06-07 00:54:06 +00:00
use structopt::StructOpt;
use tokio::{
2021-10-14 00:06:53 +00:00
io::AsyncReadExt,
2021-09-12 15:42:44 +00:00
sync::{
oneshot::{Receiver, Sender},
Semaphore,
},
};
2021-09-14 01:22:42 +00:00
use tracing::{debug, error, info, instrument, subscriber::set_global_default, Span};
use tracing_actix_web::TracingLogger;
2021-09-25 22:09:55 +00:00
use tracing_awc::Propagate;
2021-09-14 01:22:42 +00:00
use tracing_error::ErrorLayer;
2021-09-16 22:51:20 +00:00
use tracing_futures::Instrument;
2021-09-14 01:22:42 +00:00
use tracing_log::LogTracer;
2021-09-18 21:29:30 +00:00
use tracing_subscriber::{fmt::format::FmtSpan, layer::SubscriberExt, EnvFilter, Registry};
2020-06-06 21:41:17 +00:00
2020-06-07 00:54:06 +00:00
mod config;
2021-10-14 00:06:53 +00:00
mod either;
2020-06-06 21:41:17 +00:00
mod error;
2021-08-31 16:02:30 +00:00
mod exiftool;
mod ffmpeg;
2021-10-13 04:16:31 +00:00
mod file;
mod magick;
mod middleware;
2020-07-11 20:40:40 +00:00
mod migrate;
mod processor;
mod range;
mod stream;
2020-06-06 21:41:17 +00:00
mod upload_manager;
2020-06-11 16:46:00 +00:00
mod validate;
2020-06-06 21:41:17 +00:00
use self::{
config::{Config, Format},
2021-10-14 00:06:53 +00:00
either::Either,
2021-09-14 01:22:42 +00:00
error::{Error, UploadError},
middleware::{Deadline, Internal},
2021-09-12 00:53:26 +00:00
upload_manager::{Details, UploadManager, UploadManagerSession},
2020-06-24 16:58:46 +00:00
validate::{image_webp, video_mp4},
};
const MEGABYTES: usize = 1024 * 1024;
const MINUTES: u32 = 60;
const HOURS: u32 = 60 * MINUTES;
const DAYS: u32 = 24 * HOURS;
static TMP_DIR: Lazy<PathBuf> = Lazy::new(|| {
use rand::{
distributions::{Alphanumeric, Distribution},
thread_rng,
};
let mut rng = thread_rng();
let tmp_nonce = Alphanumeric
.sample_iter(&mut rng)
.take(7)
2021-02-10 22:57:42 +00:00
.map(char::from)
.collect::<String>();
let mut path = std::env::temp_dir();
path.push(format!("pict-rs-{}", tmp_nonce));
path
});
static CONFIG: Lazy<Config> = Lazy::new(Config::from_args);
2021-09-12 15:42:44 +00:00
static PROCESS_SEMAPHORE: Lazy<Semaphore> =
Lazy::new(|| Semaphore::new(num_cpus::get().saturating_sub(1).max(1)));
static PROCESS_MAP: Lazy<ProcessMap> = Lazy::new(DashMap::new);
type OutcomeSender = Sender<(Details, web::Bytes)>;
type ProcessMap = DashMap<PathBuf, Vec<OutcomeSender>>;
struct CancelSafeProcessor<F> {
span: Span,
path: PathBuf,
receiver: Option<Receiver<(Details, web::Bytes)>>,
fut: F,
}
impl<F> CancelSafeProcessor<F>
where
2021-09-14 01:22:42 +00:00
F: Future<Output = Result<(Details, web::Bytes), Error>> + Unpin,
{
pub(crate) fn new(path: PathBuf, fut: F) -> Self {
let entry = PROCESS_MAP.entry(path.clone());
let (receiver, span) = match entry {
Entry::Vacant(vacant) => {
vacant.insert(Vec::new());
let span = tracing::info_span!(
"Processing image",
path = &tracing::field::debug(&path),
completed = &tracing::field::Empty,
);
(None, span)
}
Entry::Occupied(mut occupied) => {
let (tx, rx) = tokio::sync::oneshot::channel();
occupied.get_mut().push(tx);
let span = tracing::info_span!(
"Waiting for processed image",
path = &tracing::field::debug(&path),
);
(Some(rx), span)
}
};
CancelSafeProcessor {
span,
path,
receiver,
fut,
}
}
}
impl<F> Future for CancelSafeProcessor<F>
where
2021-09-14 01:22:42 +00:00
F: Future<Output = Result<(Details, web::Bytes), Error>> + Unpin,
{
2021-09-14 01:22:42 +00:00
type Output = Result<(Details, web::Bytes), Error>;
fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
let span = self.span.clone();
span.in_scope(|| {
if let Some(ref mut rx) = self.receiver {
Pin::new(rx)
.poll(cx)
.map(|res| res.map_err(|_| UploadError::Canceled.into()))
} else {
Pin::new(&mut self.fut).poll(cx).map(|res| {
let opt = PROCESS_MAP.remove(&self.path);
res.map(|tup| {
if let Some((_, vec)) = opt {
for sender in vec {
let _ = sender.send(tup.clone());
}
}
tup
})
})
}
})
}
}
impl<F> Drop for CancelSafeProcessor<F> {
fn drop(&mut self) {
if self.receiver.is_none() {
let completed = PROCESS_MAP.remove(&self.path).is_none();
self.span.record("completed", &completed);
}
}
}
2020-06-24 16:58:46 +00:00
// try moving a file
2021-09-14 01:22:42 +00:00
#[instrument(name = "Moving file")]
async fn safe_move_file(from: PathBuf, to: PathBuf) -> Result<(), Error> {
2020-06-24 16:58:46 +00:00
if let Some(path) = to.parent() {
debug!("Creating directory {:?}", path);
2021-09-04 19:20:31 +00:00
tokio::fs::create_dir_all(path).await?;
2020-06-24 16:58:46 +00:00
}
debug!("Checking if {:?} already exists", to);
2021-09-04 19:20:31 +00:00
if let Err(e) = tokio::fs::metadata(&to).await {
if e.kind() != std::io::ErrorKind::NotFound {
2020-06-24 16:58:46 +00:00
return Err(e.into());
}
} else {
2021-09-14 01:22:42 +00:00
return Err(UploadError::FileExists.into());
2020-06-24 16:58:46 +00:00
}
debug!("Moving {:?} to {:?}", from, to);
2021-09-04 19:20:31 +00:00
tokio::fs::copy(&from, to).await?;
tokio::fs::remove_file(from).await?;
2020-06-24 16:58:46 +00:00
Ok(())
}
2021-09-14 01:22:42 +00:00
async fn safe_create_parent<P>(path: P) -> Result<(), Error>
where
P: AsRef<std::path::Path>,
{
if let Some(path) = path.as_ref().parent() {
debug!("Creating directory {:?}", path);
2021-09-04 19:20:31 +00:00
tokio::fs::create_dir_all(path).await?;
}
Ok(())
}
2020-06-06 21:41:17 +00:00
// Try writing to a file
2021-09-14 01:22:42 +00:00
#[instrument(name = "Saving file", skip(bytes))]
2021-10-14 00:06:53 +00:00
async fn safe_save_file(path: PathBuf, bytes: web::Bytes) -> Result<(), Error> {
2020-06-06 21:41:17 +00:00
if let Some(path) = path.parent() {
// create the directory for the file
2020-06-14 15:07:31 +00:00
debug!("Creating directory {:?}", path);
2021-09-04 19:20:31 +00:00
tokio::fs::create_dir_all(path).await?;
}
2020-06-06 21:41:17 +00:00
// Only write the file if it doesn't already exist
2020-06-14 15:07:31 +00:00
debug!("Checking if {:?} already exists", path);
2021-09-04 19:20:31 +00:00
if let Err(e) = tokio::fs::metadata(&path).await {
if e.kind() != std::io::ErrorKind::NotFound {
return Err(e.into());
}
2020-06-06 21:41:17 +00:00
} else {
return Ok(());
}
2020-06-06 21:41:17 +00:00
// Open the file for writing
2020-06-14 15:07:31 +00:00
debug!("Creating {:?}", path);
2021-10-13 04:16:31 +00:00
let mut file = crate::file::File::create(&path).await?;
2020-06-06 21:41:17 +00:00
// try writing
2020-06-14 15:07:31 +00:00
debug!("Writing to {:?}", path);
2021-10-14 00:06:53 +00:00
if let Err(e) = file.write_from_bytes(bytes).await {
2020-06-14 15:07:31 +00:00
error!("Error writing {:?}, {}", path, e);
2020-06-06 21:41:17 +00:00
// remove file if writing failed before completion
2021-09-04 19:20:31 +00:00
tokio::fs::remove_file(path).await?;
2020-06-06 21:41:17 +00:00
return Err(e.into());
}
2020-06-14 15:07:31 +00:00
debug!("{:?} written", path);
2020-06-06 21:41:17 +00:00
Ok(())
}
2020-06-24 16:58:46 +00:00
pub(crate) fn tmp_file() -> PathBuf {
use rand::distributions::{Alphanumeric, Distribution};
let limit: usize = 10;
let rng = rand::thread_rng();
2021-02-10 22:57:42 +00:00
let s: String = Alphanumeric
.sample_iter(rng)
.take(limit)
.map(char::from)
.collect();
2020-06-24 16:58:46 +00:00
let name = format!("{}.tmp", s);
let mut path = TMP_DIR.clone();
2020-06-24 16:58:46 +00:00
path.push(&name);
path
}
2021-09-14 01:22:42 +00:00
fn to_ext(mime: mime::Mime) -> Result<&'static str, Error> {
if mime == mime::IMAGE_PNG {
2020-06-24 16:58:46 +00:00
Ok(".png")
} else if mime == mime::IMAGE_JPEG {
2020-06-24 16:58:46 +00:00
Ok(".jpg")
} else if mime == video_mp4() {
Ok(".mp4")
} else if mime == image_webp() {
Ok(".webp")
} else {
2021-09-14 01:22:42 +00:00
Err(UploadError::UnsupportedFormat.into())
2020-06-24 16:58:46 +00:00
}
}
2020-06-06 21:41:17 +00:00
/// Handle responding to succesful uploads
2021-09-14 01:22:42 +00:00
#[instrument(name = "Uploaded files", skip(value, manager))]
2020-06-07 00:29:15 +00:00
async fn upload(
2021-09-12 00:53:26 +00:00
value: Value<UploadManagerSession>,
2020-06-07 00:29:15 +00:00
manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let images = value
.map()
.and_then(|mut m| m.remove("images"))
.and_then(|images| images.array())
.ok_or(UploadError::NoFiles)?;
let mut files = Vec::new();
2021-09-12 00:53:26 +00:00
let images = images
.into_iter()
.filter_map(|i| i.file())
.collect::<Vec<_>>();
for image in &images {
if let Some(alias) = image.result.alias() {
info!("Uploaded {} as {:?}", image.filename, alias);
2021-09-12 00:53:26 +00:00
let delete_token = image.result.delete_token().await?;
let name = manager.from_alias(alias.to_owned()).await?;
let mut path = manager.image_dir();
path.push(name.clone());
let details = manager.variant_details(path.clone(), name.clone()).await?;
let details = if let Some(details) = details {
2021-08-31 17:14:23 +00:00
debug!("details exist");
details
} else {
2021-08-31 17:14:23 +00:00
debug!("generating new details from {:?}", path);
let new_details = Details::from_path(path.clone()).await?;
2021-08-31 17:14:23 +00:00
debug!("storing details for {:?} {}", path, name);
manager
.store_variant_details(path, name, &new_details)
.await?;
2021-08-31 17:14:23 +00:00
debug!("stored");
new_details
};
2020-06-07 00:29:15 +00:00
files.push(serde_json::json!({
"file": alias,
"delete_token": delete_token,
"details": details,
2020-06-07 00:29:15 +00:00
}));
}
}
2021-09-12 00:53:26 +00:00
for image in images {
image.result.succeed();
}
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Created().json(&serde_json::json!({
"msg": "ok",
"files": files
})))
}
2020-06-24 16:58:46 +00:00
#[derive(Debug, serde::Deserialize)]
struct UrlQuery {
url: String,
}
/// download an image from a URL
2021-09-14 01:22:42 +00:00
#[instrument(name = "Downloading file", skip(client, manager))]
async fn download(
client: web::Data<Client>,
manager: web::Data<UploadManager>,
query: web::Query<UrlQuery>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let mut res = client.get(&query.url).propagate().send().await?;
if !res.status().is_success() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Download(res.status()).into());
}
2020-06-14 15:07:31 +00:00
let fut = res.body().limit(CONFIG.max_file_size() * MEGABYTES);
2021-09-04 19:20:31 +00:00
let stream = Box::pin(once(fut));
2021-09-06 17:08:13 +00:00
let permit = PROCESS_SEMAPHORE.acquire().await?;
2021-09-12 00:53:26 +00:00
let session = manager.session().upload(stream).await?;
let alias = session.alias().unwrap().to_owned();
drop(permit);
2021-09-12 00:53:26 +00:00
let delete_token = session.delete_token().await?;
let name = manager.from_alias(alias.to_owned()).await?;
let mut path = manager.image_dir();
path.push(name.clone());
let details = manager.variant_details(path.clone(), name.clone()).await?;
let details = if let Some(details) = details {
details
} else {
let new_details = Details::from_path(path.clone()).await?;
manager
.store_variant_details(path, name, &new_details)
.await?;
new_details
};
2021-09-12 00:53:26 +00:00
session.succeed();
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Created().json(&serde_json::json!({
"msg": "ok",
"files": [{
"file": alias,
"delete_token": delete_token,
"details": details,
}]
})))
}
2020-06-15 02:41:45 +00:00
/// Delete aliases and files
2021-09-14 01:22:42 +00:00
#[instrument(name = "Deleting file", skip(manager))]
2020-06-07 00:29:15 +00:00
async fn delete(
manager: web::Data<UploadManager>,
path_entries: web::Path<(String, String)>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
2020-06-07 00:29:15 +00:00
let (alias, token) = path_entries.into_inner();
manager.delete(token, alias).await?;
Ok(HttpResponse::NoContent().finish())
}
2020-06-24 16:58:46 +00:00
type ProcessQuery = Vec<(String, String)>;
async fn prepare_process(
2020-06-24 16:58:46 +00:00
query: web::Query<ProcessQuery>,
ext: &str,
manager: &UploadManager,
whitelist: &Option<HashSet<String>>,
2021-09-14 01:22:42 +00:00
) -> Result<(Format, String, PathBuf, Vec<String>), Error> {
2020-06-24 16:58:46 +00:00
let (alias, operations) =
query
.into_inner()
.into_iter()
.fold((String::new(), Vec::new()), |(s, mut acc), (k, v)| {
if k == "src" {
(v, acc)
} else {
acc.push((k, v));
(s, acc)
}
});
2020-06-06 21:41:17 +00:00
2021-09-12 15:42:44 +00:00
if alias.is_empty() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::MissingFilename.into());
2020-06-24 16:58:46 +00:00
}
2020-06-06 22:43:33 +00:00
let name = manager.from_alias(alias).await?;
2020-06-06 21:41:17 +00:00
2020-06-24 16:58:46 +00:00
let operations = if let Some(whitelist) = whitelist.as_ref() {
operations
.into_iter()
.filter(|(k, _)| whitelist.contains(&k.to_lowercase()))
.collect()
} else {
operations
};
let chain = self::processor::build_chain(&operations);
let format = ext
.parse::<Format>()
.map_err(|_| UploadError::UnsupportedFormat)?;
2020-06-24 16:58:46 +00:00
let processed_name = format!("{}.{}", name, ext);
let base = manager.image_dir();
let thumbnail_path = self::processor::build_path(base, &chain, processed_name);
let thumbnail_args = self::processor::build_args(&chain);
Ok((format, name, thumbnail_path, thumbnail_args))
}
2021-09-14 01:22:42 +00:00
#[instrument(name = "Fetching derived details", skip(manager, whitelist))]
async fn process_details(
query: web::Query<ProcessQuery>,
ext: web::Path<String>,
manager: web::Data<UploadManager>,
whitelist: web::Data<Option<HashSet<String>>>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let (_, name, thumbnail_path, _) =
prepare_process(query, ext.as_str(), &manager, &whitelist).await?;
let details = manager.variant_details(thumbnail_path, name).await?;
let details = details.ok_or(UploadError::NoFiles)?;
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&details))
}
/// Process files
#[instrument(name = "Serving processed image", skip(manager, whitelist))]
async fn process(
range: Option<range::RangeHeader>,
query: web::Query<ProcessQuery>,
ext: web::Path<String>,
manager: web::Data<UploadManager>,
whitelist: web::Data<Option<HashSet<String>>>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let (format, name, thumbnail_path, thumbnail_args) =
prepare_process(query, ext.as_str(), &manager, &whitelist).await?;
2020-06-06 21:41:17 +00:00
// If the thumbnail doesn't exist, we need to create it
2021-09-25 22:09:55 +00:00
let thumbnail_exists = if let Err(e) = tokio::fs::metadata(&thumbnail_path)
.instrument(tracing::info_span!("Get thumbnail metadata"))
.await
{
2021-09-04 19:20:31 +00:00
if e.kind() != std::io::ErrorKind::NotFound {
error!("Error looking up processed image, {}", e);
return Err(e.into());
}
false
} else {
true
};
let details = manager
.variant_details(thumbnail_path.clone(), name.clone())
.await?;
if !thumbnail_exists || details.is_none() {
2020-06-06 21:41:17 +00:00
let mut original_path = manager.image_dir();
original_path.push(name.clone());
let thumbnail_path2 = thumbnail_path.clone();
let process_fut = async {
let thumbnail_path = thumbnail_path2;
// Create and save a JPG for motion images (gif, mp4)
if let Some((updated_path, exists)) =
self::processor::prepare_image(original_path.clone()).await?
{
original_path = updated_path.clone();
if exists.is_new() {
// Save the transcoded file in another task
debug!("Spawning storage task");
let manager2 = manager.clone();
let name = name.clone();
let span = tracing::info_span!(
parent: None,
"Storing variant info",
path = &tracing::field::debug(&updated_path),
name = &tracing::field::display(&name),
);
span.follows_from(Span::current());
2021-09-16 22:51:20 +00:00
actix_rt::spawn(
async move {
if let Err(e) = manager2.store_variant(updated_path, name).await {
error!("Error storing variant, {}", e);
return;
}
}
.instrument(span),
2021-09-16 22:51:20 +00:00
);
}
2020-06-16 23:13:22 +00:00
}
2020-06-24 16:58:46 +00:00
2021-09-06 17:08:13 +00:00
let permit = PROCESS_SEMAPHORE.acquire().await?;
2021-10-13 04:16:31 +00:00
let file = crate::file::File::open(original_path.clone()).await?;
let mut processed_reader =
2021-10-14 00:06:53 +00:00
crate::magick::process_image_file_read(file, thumbnail_args, format)?;
let mut vec = Vec::new();
processed_reader.read_to_end(&mut vec).await?;
let bytes = web::Bytes::from(vec);
drop(permit);
let details = if let Some(details) = details {
details
} else {
Details::from_bytes(bytes.clone()).await?
};
let save_span = tracing::info_span!(
parent: None,
"Saving variant information",
path = tracing::field::debug(&thumbnail_path),
name = tracing::field::display(&name),
);
save_span.follows_from(Span::current());
let details2 = details.clone();
let bytes2 = bytes.clone();
2021-09-16 22:51:20 +00:00
actix_rt::spawn(
async move {
if let Err(e) = safe_save_file(thumbnail_path.clone(), bytes2).await {
tracing::warn!("Error saving thumbnail: {}", e);
return;
}
if let Err(e) = manager
.store_variant_details(thumbnail_path.clone(), name.clone(), &details2)
.await
{
tracing::warn!("Error saving variant details: {}", e);
return;
}
if let Err(e) = manager.store_variant(thumbnail_path, name.clone()).await {
tracing::warn!("Error saving variant info: {}", e);
}
}
.instrument(save_span),
2021-09-16 22:51:20 +00:00
);
2021-09-14 01:22:42 +00:00
Ok((details, bytes)) as Result<(Details, web::Bytes), Error>
};
let (details, bytes) =
CancelSafeProcessor::new(thumbnail_path.clone(), Box::pin(process_fut)).await?;
return match range {
Some(range_header) => {
if !range_header.is_bytes() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Range.into());
}
if range_header.is_empty() {
2021-09-14 01:22:42 +00:00
Err(UploadError::Range.into())
} else if range_header.len() == 1 {
let range = range_header.ranges().next().unwrap();
let content_range = range.to_content_range(bytes.len() as u64);
let stream = range.chop_bytes(bytes);
let mut builder = HttpResponse::PartialContent();
builder.insert_header(content_range);
Ok(srv_response(
builder,
stream,
details.content_type(),
7 * DAYS,
details.system_time(),
))
} else {
2021-09-14 01:22:42 +00:00
Err(UploadError::Range.into())
}
}
None => Ok(srv_response(
HttpResponse::Ok(),
2021-09-14 01:22:42 +00:00
once(ready(Ok(bytes) as Result<_, Error>)),
details.content_type(),
7 * DAYS,
details.system_time(),
)),
};
}
let details = if let Some(details) = details {
details
} else {
let details = Details::from_path(thumbnail_path.clone()).await?;
manager
.store_variant_details(thumbnail_path.clone(), name, &details)
.await?;
details
};
ranged_file_resp(thumbnail_path, range, details).await
2020-06-24 16:58:46 +00:00
}
/// Fetch file details
2021-09-14 01:22:42 +00:00
#[instrument(name = "Fetching details", skip(manager))]
async fn details(
alias: web::Path<String>,
manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let name = manager.from_alias(alias.into_inner()).await?;
let mut path = manager.image_dir();
path.push(name.clone());
let details = manager.variant_details(path.clone(), name.clone()).await?;
let details = if let Some(details) = details {
details
} else {
let new_details = Details::from_path(path.clone()).await?;
manager
.store_variant_details(path.clone(), name, &new_details)
.await?;
new_details
};
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&details))
}
2020-06-24 16:58:46 +00:00
/// Serve files
2021-09-14 01:22:42 +00:00
#[instrument(name = "Serving file", skip(manager))]
2020-06-24 16:58:46 +00:00
async fn serve(
range: Option<range::RangeHeader>,
2020-06-24 16:58:46 +00:00
alias: web::Path<String>,
manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
2020-06-24 16:58:46 +00:00
let name = manager.from_alias(alias.into_inner()).await?;
let mut path = manager.image_dir();
path.push(name.clone());
let details = manager.variant_details(path.clone(), name.clone()).await?;
let details = if let Some(details) = details {
details
} else {
let details = Details::from_path(path.clone()).await?;
manager
.store_variant_details(path.clone(), name, &details)
.await?;
details
};
2020-06-24 16:58:46 +00:00
ranged_file_resp(path, range, details).await
}
2021-01-14 01:08:04 +00:00
2021-01-14 16:26:17 +00:00
async fn ranged_file_resp(
path: PathBuf,
range: Option<range::RangeHeader>,
2021-01-14 16:26:17 +00:00
details: Details,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let (builder, stream) = match range {
//Range header exists - return as ranged
Some(range_header) => {
if !range_header.is_bytes() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Range.into());
}
2021-01-14 01:08:04 +00:00
if range_header.is_empty() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Range.into());
} else if range_header.len() == 1 {
2021-10-13 04:16:31 +00:00
let file = crate::file::File::open(path).await?;
2021-09-04 19:20:31 +00:00
let meta = file.metadata().await?;
let range = range_header.ranges().next().unwrap();
let mut builder = HttpResponse::PartialContent();
2021-02-10 22:57:42 +00:00
builder.insert_header(range.to_content_range(meta.len()));
2021-01-14 01:08:04 +00:00
2021-10-14 00:06:53 +00:00
(builder, Either::Left(range.chop_file(file).await?))
} else {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Range.into());
}
2021-01-14 01:08:04 +00:00
}
//No Range header in the request - return the entire document
None => {
2021-10-13 04:16:31 +00:00
let file = crate::file::File::open(path).await?;
2021-10-14 00:06:53 +00:00
let stream = file.read_to_stream(None, None).await?;
(HttpResponse::Ok(), Either::Right(stream))
2021-01-14 01:08:04 +00:00
}
};
Ok(srv_response(
builder,
stream,
details.content_type(),
7 * DAYS,
details.system_time(),
))
}
2020-06-06 21:41:17 +00:00
// A helper method to produce responses with proper cache headers
fn srv_response<S, E>(
mut builder: HttpResponseBuilder,
stream: S,
ext: mime::Mime,
expires: u32,
modified: SystemTime,
) -> HttpResponse
where
2021-02-10 22:57:42 +00:00
S: Stream<Item = Result<web::Bytes, E>> + Unpin + 'static,
2021-06-19 19:39:41 +00:00
E: std::error::Error + 'static,
actix_web::Error: From<E>,
2021-01-14 01:08:04 +00:00
{
builder
2021-02-10 22:57:42 +00:00
.insert_header(LastModified(modified.into()))
.insert_header(CacheControl(vec![
2021-01-14 01:08:04 +00:00
CacheDirective::Public,
CacheDirective::MaxAge(expires),
CacheDirective::Extension("immutable".to_owned(), None),
]))
2021-02-10 22:57:42 +00:00
.insert_header((ACCEPT_RANGES, "bytes"))
.content_type(ext.to_string())
.streaming(stream)
}
#[derive(Debug, serde::Deserialize)]
#[serde(untagged)]
enum FileOrAlias {
File { file: String },
Alias { alias: String },
}
2021-09-14 01:22:42 +00:00
#[instrument(name = "Purging file", skip(upload_manager))]
async fn purge(
query: web::Query<FileOrAlias>,
upload_manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let aliases = match query.into_inner() {
FileOrAlias::File { file } => upload_manager.aliases_by_filename(file).await?,
FileOrAlias::Alias { alias } => upload_manager.aliases_by_alias(alias).await?,
};
for alias in aliases.iter() {
upload_manager
.delete_without_token(alias.to_owned())
.await?;
}
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
"aliases": aliases
})))
}
2021-09-14 01:22:42 +00:00
#[instrument(name = "Fetching aliases", skip(upload_manager))]
async fn aliases(
query: web::Query<FileOrAlias>,
upload_manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let aliases = match query.into_inner() {
FileOrAlias::File { file } => upload_manager.aliases_by_filename(file).await?,
FileOrAlias::Alias { alias } => upload_manager.aliases_by_alias(alias).await?,
};
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
"aliases": aliases,
})))
}
#[derive(Debug, serde::Deserialize)]
struct ByAlias {
alias: String,
}
2021-09-14 01:22:42 +00:00
#[instrument(name = "Fetching filename", skip(upload_manager))]
async fn filename_by_alias(
query: web::Query<ByAlias>,
upload_manager: web::Data<UploadManager>,
2021-09-14 01:22:42 +00:00
) -> Result<HttpResponse, Error> {
let filename = upload_manager.from_alias(query.into_inner().alias).await?;
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
"filename": filename,
})))
}
#[actix_rt::main]
async fn main() -> Result<(), anyhow::Error> {
2021-09-14 01:22:42 +00:00
LogTracer::init()?;
2021-09-19 19:36:53 +00:00
opentelemetry::global::set_text_map_propagator(TraceContextPropagator::new());
2021-09-18 21:29:30 +00:00
let env_filter = EnvFilter::try_from_default_env().unwrap_or_else(|_| EnvFilter::new("info"));
let format_layer = tracing_subscriber::fmt::layer()
.with_span_events(FmtSpan::NEW | FmtSpan::CLOSE)
.pretty();
2021-09-14 01:22:42 +00:00
let subscriber = Registry::default()
.with(env_filter)
2021-09-18 21:29:30 +00:00
.with(format_layer)
2021-09-14 01:22:42 +00:00
.with(ErrorLayer::default());
2021-09-18 21:29:30 +00:00
if let Some(url) = CONFIG.opentelemetry_url() {
let tracer =
opentelemetry_otlp::new_pipeline()
.tracing()
.with_trace_config(opentelemetry::sdk::trace::config().with_resource(
Resource::new(vec![KeyValue::new("service.name", "pict-rs")]),
))
.with_exporter(
opentelemetry_otlp::new_exporter()
.tonic()
.with_endpoint(url.as_str()),
)
.install_batch(opentelemetry::runtime::Tokio)?;
let otel_layer = tracing_opentelemetry::layer().with_tracer(tracer);
let subscriber = subscriber.with(otel_layer);
2021-09-14 01:22:42 +00:00
set_global_default(subscriber)?;
} else {
let subscriber = subscriber.with(tracing_subscriber::fmt::layer());
set_global_default(subscriber)?;
};
2020-06-14 15:07:31 +00:00
let manager = UploadManager::new(CONFIG.data_dir(), CONFIG.format()).await?;
2020-06-06 21:41:17 +00:00
// Create a new Multipart Form validator
//
// This form is expecting a single array field, 'images' with at most 10 files in it
let manager2 = manager.clone();
let form = Form::new()
.max_files(10)
2020-06-14 15:07:31 +00:00
.max_file_size(CONFIG.max_file_size() * MEGABYTES)
2021-09-14 01:22:42 +00:00
.transform_error(|e| Error::from(e).into())
.field(
"images",
2020-06-14 18:56:42 +00:00
Field::array(Field::file(move |filename, _, stream| {
let manager = manager2.clone();
2021-09-16 22:51:20 +00:00
let span = tracing::info_span!("file-upload", ?filename);
2020-06-14 18:56:42 +00:00
2021-09-16 22:51:20 +00:00
async move {
2021-09-06 17:08:13 +00:00
let permit = PROCESS_SEMAPHORE.acquire().await?;
2021-09-12 00:53:26 +00:00
let res = manager.session().upload(stream).await;
drop(permit);
2020-06-14 18:56:42 +00:00
res
}
2021-09-16 22:51:20 +00:00
.instrument(span)
})),
);
// Create a new Multipart Form validator for internal imports
//
// This form is expecting a single array field, 'images' with at most 10 files in it
2020-06-14 15:07:31 +00:00
let validate_imports = CONFIG.validate_imports();
let manager2 = manager.clone();
let import_form = Form::new()
.max_files(10)
2020-06-14 15:07:31 +00:00
.max_file_size(CONFIG.max_file_size() * MEGABYTES)
2021-09-14 01:22:42 +00:00
.transform_error(|e| Error::from(e).into())
.field(
"images",
Field::array(Field::file(move |filename, content_type, stream| {
let manager = manager2.clone();
2021-09-16 22:51:20 +00:00
let span = tracing::info_span!("file-import", ?filename);
2020-06-14 18:56:42 +00:00
2021-09-16 22:51:20 +00:00
async move {
2021-09-06 17:08:13 +00:00
let permit = PROCESS_SEMAPHORE.acquire().await?;
2020-06-14 18:56:42 +00:00
let res = manager
2021-09-12 00:53:26 +00:00
.session()
2020-06-14 15:07:31 +00:00
.import(filename, content_type, validate_imports, stream)
2021-09-12 00:53:26 +00:00
.await;
drop(permit);
2020-06-14 18:56:42 +00:00
res
}
2021-09-16 22:51:20 +00:00
.instrument(span)
})),
);
HttpServer::new(move || {
2020-09-14 15:52:18 +00:00
let client = Client::builder()
2021-09-18 21:34:23 +00:00
.header("User-Agent", "pict-rs v0.3.0-main")
.finish();
App::new()
2021-09-18 21:34:23 +00:00
.wrap(TracingLogger::default())
2021-09-11 20:31:00 +00:00
.wrap(Deadline)
2021-06-26 18:10:28 +00:00
.app_data(web::Data::new(manager.clone()))
.app_data(web::Data::new(client))
.app_data(web::Data::new(CONFIG.filter_whitelist()))
.service(
web::scope("/image")
.service(
web::resource("")
.guard(guard::Post())
.wrap(form.clone())
.route(web::post().to(upload)),
)
.service(web::resource("/download").route(web::get().to(download)))
2020-06-07 00:29:15 +00:00
.service(
web::resource("/delete/{delete_token}/{filename}")
2020-06-09 22:37:48 +00:00
.route(web::delete().to(delete))
.route(web::get().to(delete)),
2020-06-07 00:29:15 +00:00
)
2020-06-24 16:58:46 +00:00
.service(web::resource("/original/{filename}").route(web::get().to(serve)))
.service(web::resource("/process.{ext}").route(web::get().to(process)))
.service(
web::scope("/details")
.service(
web::resource("/original/{filename}").route(web::get().to(details)),
)
.service(
web::resource("/process.{ext}")
.route(web::get().to(process_details)),
),
),
)
.service(
2020-07-11 21:28:49 +00:00
web::scope("/internal")
.wrap(Internal(CONFIG.api_key().map(|s| s.to_owned())))
.service(
web::resource("/import")
.wrap(import_form.clone())
.route(web::post().to(upload)),
)
.service(web::resource("/purge").route(web::post().to(purge)))
.service(web::resource("/aliases").route(web::get().to(aliases)))
.service(web::resource("/filename").route(web::get().to(filename_by_alias))),
)
})
2020-06-14 15:07:31 +00:00
.bind(CONFIG.bind_address())?
.run()
.await?;
2021-09-04 19:20:31 +00:00
if tokio::fs::metadata(&*TMP_DIR).await.is_ok() {
tokio::fs::remove_dir_all(&*TMP_DIR).await?;
}
Ok(())
}