2
0
Fork 0
mirror of https://git.asonix.dog/asonix/pict-rs synced 2024-11-14 00:13:59 +00:00
pict-rs/src/main.rs

1023 lines
32 KiB
Rust
Raw Normal View History

use actix_form_data::{Field, Form, Value};
2021-01-14 16:26:17 +00:00
use actix_web::{
guard,
2022-03-01 17:23:15 +00:00
http::header::{CacheControl, CacheDirective, LastModified, Range, ACCEPT_RANGES},
2021-04-17 19:59:42 +00:00
web, App, HttpResponse, HttpResponseBuilder, HttpServer,
2021-01-14 16:26:17 +00:00
};
2021-03-10 02:51:03 +00:00
use awc::Client;
use futures_util::{
stream::{empty, once},
Stream, StreamExt, TryStreamExt,
};
2022-03-25 23:47:50 +00:00
use once_cell::sync::Lazy;
use std::{
2021-10-21 00:28:40 +00:00
future::ready,
path::PathBuf,
2022-03-29 18:18:47 +00:00
sync::atomic::{AtomicU64, Ordering},
time::{Duration, SystemTime},
};
use tokio::sync::Semaphore;
use tracing::{debug, info, instrument};
2021-09-14 01:22:42 +00:00
use tracing_actix_web::TracingLogger;
2021-12-03 20:21:31 +00:00
use tracing_awc::Tracing;
2021-09-16 22:51:20 +00:00
use tracing_futures::Instrument;
2020-06-06 21:41:17 +00:00
mod backgrounded;
2021-10-21 00:28:40 +00:00
mod concurrent_processor;
2020-06-07 00:54:06 +00:00
mod config;
2022-03-24 22:09:15 +00:00
mod details;
2021-10-14 00:06:53 +00:00
mod either;
2020-06-06 21:41:17 +00:00
mod error;
2021-08-31 16:02:30 +00:00
mod exiftool;
mod ffmpeg;
2021-10-23 19:14:12 +00:00
mod file;
mod generate;
mod ingest;
2021-10-21 00:28:40 +00:00
mod init_tracing;
mod magick;
mod middleware;
2021-10-21 00:28:40 +00:00
mod process;
mod processor;
mod queue;
mod range;
mod repo;
mod serde_str;
2021-10-23 04:48:56 +00:00
mod store;
mod stream;
2021-10-23 19:14:12 +00:00
mod tmp_file;
2020-06-11 16:46:00 +00:00
mod validate;
2020-06-06 21:41:17 +00:00
2022-04-03 02:15:39 +00:00
use crate::repo::UploadResult;
use self::{
backgrounded::Backgrounded,
2022-03-28 04:27:07 +00:00
config::{Configuration, ImageFormat, Operation},
2022-03-24 22:09:15 +00:00
details::Details,
2021-10-14 00:06:53 +00:00
either::Either,
2021-09-14 01:22:42 +00:00
error::{Error, UploadError},
ingest::Session,
2021-10-21 00:28:40 +00:00
init_tracing::init_tracing,
2022-03-25 23:47:50 +00:00
magick::details_hint,
2021-09-14 01:22:42 +00:00
middleware::{Deadline, Internal},
queue::queue_generate,
2022-04-03 02:15:39 +00:00
repo::{Alias, DeleteToken, FullRepo, HashRepo, IdentifierRepo, Repo, SettingsRepo, UploadId},
2022-03-28 04:27:07 +00:00
serde_str::Serde,
store::{file_store::FileStore, object_store::ObjectStore, Identifier, Store},
stream::{StreamLimit, StreamTimeout},
};
const MEGABYTES: usize = 1024 * 1024;
const MINUTES: u32 = 60;
const HOURS: u32 = 60 * MINUTES;
const DAYS: u32 = 24 * HOURS;
2022-03-28 04:27:07 +00:00
static DO_CONFIG: Lazy<(Configuration, Operation)> =
Lazy::new(|| config::configure().expect("Failed to configure"));
static CONFIG: Lazy<Configuration> = Lazy::new(|| DO_CONFIG.0.clone());
static OPERATION: Lazy<Operation> = Lazy::new(|| DO_CONFIG.1.clone());
2021-09-12 15:42:44 +00:00
static PROCESS_SEMAPHORE: Lazy<Semaphore> =
Lazy::new(|| Semaphore::new(num_cpus::get().saturating_sub(1).max(1)));
2020-06-06 21:41:17 +00:00
/// Handle responding to succesful uploads
#[instrument(name = "Uploaded files", skip(value))]
async fn upload<R: FullRepo, S: Store + 'static>(
value: Value<Session<R, S>>,
repo: web::Data<R>,
2021-11-01 02:11:35 +00:00
store: web::Data<S>,
) -> Result<HttpResponse, Error> {
let images = value
.map()
.and_then(|mut m| m.remove("images"))
.and_then(|images| images.array())
.ok_or(UploadError::NoFiles)?;
let mut files = Vec::new();
2021-09-12 00:53:26 +00:00
let images = images
.into_iter()
.filter_map(|i| i.file())
.collect::<Vec<_>>();
2021-09-12 00:53:26 +00:00
for image in &images {
if let Some(alias) = image.result.alias() {
info!("Uploaded {} as {:?}", image.filename, alias);
2021-09-12 00:53:26 +00:00
let delete_token = image.result.delete_token().await?;
let identifier = repo.identifier_from_alias::<S::Identifier>(alias).await?;
let details = repo.details(&identifier).await?;
let details = if let Some(details) = details {
2021-08-31 17:14:23 +00:00
debug!("details exist");
details
} else {
2021-10-23 04:48:56 +00:00
debug!("generating new details from {:?}", identifier);
2022-03-26 21:49:23 +00:00
let hint = details_hint(alias);
2021-10-23 04:48:56 +00:00
let new_details =
2021-11-01 02:11:35 +00:00
Details::from_store((**store).clone(), identifier.clone(), hint).await?;
2022-03-26 21:49:23 +00:00
debug!("storing details for {:?}", identifier);
repo.relate_details(&identifier, &new_details).await?;
2021-08-31 17:14:23 +00:00
debug!("stored");
new_details
};
2020-06-07 00:29:15 +00:00
files.push(serde_json::json!({
2022-03-26 21:49:23 +00:00
"file": alias.to_string(),
"delete_token": delete_token.to_string(),
"details": details,
2020-06-07 00:29:15 +00:00
}));
}
}
for mut image in images {
image.result.disarm();
2021-09-12 00:53:26 +00:00
}
2022-04-02 23:53:03 +00:00
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Created().json(&serde_json::json!({
"msg": "ok",
"files": files
})))
}
#[instrument(name = "Uploaded files", skip(value))]
async fn upload_backgrounded<R: FullRepo, S: Store>(
value: Value<Backgrounded<R, S>>,
repo: web::Data<R>,
) -> Result<HttpResponse, Error> {
let images = value
.map()
.and_then(|mut m| m.remove("images"))
.and_then(|images| images.array())
.ok_or(UploadError::NoFiles)?;
let mut files = Vec::new();
let images = images
.into_iter()
.filter_map(|i| i.file())
.collect::<Vec<_>>();
for image in &images {
let upload_id = image.result.upload_id().expect("Upload ID exists");
let identifier = image
.result
.identifier()
.expect("Identifier exists")
.to_bytes()?;
queue::queue_ingest(&**repo, identifier, upload_id, None, true).await?;
files.push(serde_json::json!({
2022-04-03 02:15:39 +00:00
"upload_id": upload_id.to_string(),
}));
}
for image in images {
image.result.disarm();
}
2022-04-03 02:15:39 +00:00
Ok(HttpResponse::Accepted().json(&serde_json::json!({
"msg": "ok",
2022-04-03 02:15:39 +00:00
"uploads": files
})))
}
2022-04-03 02:15:39 +00:00
#[derive(Debug, serde::Deserialize)]
struct ClaimQuery {
upload_id: Serde<UploadId>,
}
/// Claim a backgrounded upload
#[instrument(name = "Waiting on upload", skip(repo))]
async fn claim_upload<R: FullRepo>(
repo: web::Data<R>,
query: web::Query<ClaimQuery>,
) -> Result<HttpResponse, Error> {
let upload_id = Serde::into_inner(query.into_inner().upload_id);
match actix_rt::time::timeout(Duration::from_secs(10), repo.wait(upload_id)).await {
Ok(wait_res) => {
let upload_result = wait_res?;
repo.claim(upload_id).await?;
match upload_result {
UploadResult::Success { alias, token } => {
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
"files": [{
"file": alias.to_string(),
"delete_token": token.to_string(),
}]
})))
}
UploadResult::Failure { message } => Ok(HttpResponse::UnprocessableEntity().json(
&serde_json::json!({
"msg": message,
}),
)),
}
}
Err(_) => Ok(HttpResponse::NoContent().finish()),
}
}
2020-06-24 16:58:46 +00:00
#[derive(Debug, serde::Deserialize)]
struct UrlQuery {
url: String,
}
/// download an image from a URL
#[instrument(name = "Downloading file", skip(client, repo))]
async fn download<R: FullRepo + 'static, S: Store + 'static>(
client: web::Data<Client>,
repo: web::Data<R>,
2021-11-01 02:11:35 +00:00
store: web::Data<S>,
query: web::Query<UrlQuery>,
) -> Result<HttpResponse, Error> {
2021-12-03 20:21:31 +00:00
let res = client.get(&query.url).send().await?;
if !res.status().is_success() {
2021-09-14 01:22:42 +00:00
return Err(UploadError::Download(res.status()).into());
}
let stream = res
.map_err(Error::from)
.limit((CONFIG.media.max_file_size * MEGABYTES) as u64);
let mut session = ingest::ingest(&**repo, &**store, stream, None, true).await?;
let alias = session.alias().expect("alias should exist").to_owned();
2021-09-12 00:53:26 +00:00
let delete_token = session.delete_token().await?;
let identifier = repo.identifier_from_alias::<S::Identifier>(&alias).await?;
let details = repo.details(&identifier).await?;
let details = if let Some(details) = details {
details
} else {
2022-03-26 21:49:23 +00:00
let hint = details_hint(&alias);
2021-11-01 02:11:35 +00:00
let new_details = Details::from_store((**store).clone(), identifier.clone(), hint).await?;
repo.relate_details(&identifier, &new_details).await?;
new_details
};
session.disarm();
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Created().json(&serde_json::json!({
"msg": "ok",
"files": [{
2022-03-26 21:49:23 +00:00
"file": alias.to_string(),
"delete_token": delete_token.to_string(),
"details": details,
}]
})))
}
2020-06-15 02:41:45 +00:00
/// Delete aliases and files
#[instrument(name = "Deleting file", skip(repo))]
async fn delete<R: FullRepo>(
repo: web::Data<R>,
2020-06-07 00:29:15 +00:00
path_entries: web::Path<(String, String)>,
) -> Result<HttpResponse, Error> {
let (token, alias) = path_entries.into_inner();
2020-06-07 00:29:15 +00:00
2022-03-26 21:49:23 +00:00
let token = DeleteToken::from_existing(&token);
let alias = Alias::from_existing(&alias);
2022-03-26 21:49:23 +00:00
queue::cleanup_alias(&**repo, alias, token).await?;
2020-06-07 00:29:15 +00:00
Ok(HttpResponse::NoContent().finish())
}
2020-06-24 16:58:46 +00:00
type ProcessQuery = Vec<(String, String)>;
2022-03-26 21:49:23 +00:00
fn prepare_process(
2020-06-24 16:58:46 +00:00
query: web::Query<ProcessQuery>,
ext: &str,
2022-03-28 04:27:07 +00:00
) -> Result<(ImageFormat, Alias, PathBuf, Vec<String>), Error> {
2020-06-24 16:58:46 +00:00
let (alias, operations) =
query
.into_inner()
.into_iter()
.fold((String::new(), Vec::new()), |(s, mut acc), (k, v)| {
if k == "src" {
(v, acc)
} else {
acc.push((k, v));
(s, acc)
}
});
2020-06-06 21:41:17 +00:00
2021-09-12 15:42:44 +00:00
if alias.is_empty() {
return Err(UploadError::MissingAlias.into());
2020-06-24 16:58:46 +00:00
}
2022-03-26 21:49:23 +00:00
let alias = Alias::from_existing(&alias);
2020-06-06 21:41:17 +00:00
let operations = operations
.into_iter()
.filter(|(k, _)| CONFIG.media.filters.contains(&k.to_lowercase()))
.collect::<Vec<_>>();
2020-06-24 16:58:46 +00:00
let format = ext
2022-03-28 04:27:07 +00:00
.parse::<ImageFormat>()
.map_err(|_| UploadError::UnsupportedFormat)?;
2021-10-21 01:13:39 +00:00
let ext = format.to_string();
let (thumbnail_path, thumbnail_args) = self::processor::build_chain(&operations, &ext)?;
2022-03-26 21:49:23 +00:00
Ok((format, alias, thumbnail_path, thumbnail_args))
}
#[instrument(name = "Fetching derived details", skip(repo))]
async fn process_details<R: FullRepo, S: Store>(
query: web::Query<ProcessQuery>,
ext: web::Path<String>,
repo: web::Data<R>,
) -> Result<HttpResponse, Error> {
let (_, alias, thumbnail_path, _) = prepare_process(query, ext.as_str())?;
let hash = repo.hash(&alias).await?;
let identifier = repo
.variant_identifier::<S::Identifier>(hash, thumbnail_path.to_string_lossy().to_string())
2021-10-19 04:37:11 +00:00
.await?
.ok_or(UploadError::MissingAlias)?;
let details = repo.details(&identifier).await?;
let details = details.ok_or(UploadError::NoFiles)?;
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&details))
}
/// Process files
#[instrument(name = "Serving processed image", skip(repo))]
async fn process<R: FullRepo, S: Store + 'static>(
2022-03-01 17:23:15 +00:00
range: Option<web::Header<Range>>,
query: web::Query<ProcessQuery>,
ext: web::Path<String>,
repo: web::Data<R>,
2021-11-01 02:11:35 +00:00
store: web::Data<S>,
) -> Result<HttpResponse, Error> {
let (format, alias, thumbnail_path, thumbnail_args) = prepare_process(query, ext.as_str())?;
let path_string = thumbnail_path.to_string_lossy().to_string();
let hash = repo.hash(&alias).await?;
let identifier_opt = repo
.variant_identifier::<S::Identifier>(hash.clone(), path_string)
2021-11-01 02:11:35 +00:00
.await?;
2021-10-23 04:48:56 +00:00
if let Some(identifier) = identifier_opt {
let details_opt = repo.details(&identifier).await?;
2021-10-19 04:37:11 +00:00
2021-10-21 00:28:40 +00:00
let details = if let Some(details) = details_opt {
details
} else {
2022-03-26 21:49:23 +00:00
let hint = details_hint(&alias);
2021-11-01 02:11:35 +00:00
let details = Details::from_store((**store).clone(), identifier.clone(), hint).await?;
repo.relate_details(&identifier, &details).await?;
2021-10-21 00:28:40 +00:00
details
};
2021-10-19 04:37:11 +00:00
2021-11-01 02:11:35 +00:00
return ranged_file_resp(&**store, identifier, range, details).await;
2021-10-19 04:37:11 +00:00
}
let (details, bytes) = generate::generate(
&**repo,
&**store,
format,
alias,
thumbnail_path,
thumbnail_args,
hash,
)
.await?;
2021-10-19 04:37:11 +00:00
2022-03-01 17:23:15 +00:00
let (builder, stream) = if let Some(web::Header(range_header)) = range {
if let Some(range) = range::single_bytes_range(&range_header) {
let len = bytes.len() as u64;
if let Some(content_range) = range::to_content_range(range, len) {
2021-10-19 04:37:11 +00:00
let mut builder = HttpResponse::PartialContent();
builder.insert_header(content_range);
2022-03-01 17:23:15 +00:00
let stream = range::chop_bytes(range, bytes, len)?;
2021-10-19 04:37:11 +00:00
(builder, Either::left(Either::left(stream)))
2021-10-19 04:37:11 +00:00
} else {
(
HttpResponse::RangeNotSatisfiable(),
Either::left(Either::right(empty())),
)
2021-10-19 04:37:11 +00:00
}
} else {
return Err(UploadError::Range.into());
2021-10-19 04:37:11 +00:00
}
} else {
(HttpResponse::Ok(), Either::right(once(ready(Ok(bytes)))))
};
Ok(srv_response(
builder,
stream,
details.content_type(),
7 * DAYS,
details.system_time(),
))
2020-06-24 16:58:46 +00:00
}
/// Process files
#[instrument(name = "Spawning image process", skip(repo))]
async fn process_backgrounded<R: FullRepo, S: Store>(
query: web::Query<ProcessQuery>,
ext: web::Path<String>,
repo: web::Data<R>,
) -> Result<HttpResponse, Error> {
let (target_format, source, process_path, process_args) = prepare_process(query, ext.as_str())?;
let path_string = process_path.to_string_lossy().to_string();
let hash = repo.hash(&source).await?;
let identifier_opt = repo
.variant_identifier::<S::Identifier>(hash.clone(), path_string)
.await?;
if identifier_opt.is_some() {
return Ok(HttpResponse::Accepted().finish());
}
queue_generate(&**repo, target_format, source, process_path, process_args).await?;
Ok(HttpResponse::Accepted().finish())
}
/// Fetch file details
#[instrument(name = "Fetching details", skip(repo))]
async fn details<R: FullRepo, S: Store + 'static>(
alias: web::Path<String>,
repo: web::Data<R>,
2021-11-01 02:11:35 +00:00
store: web::Data<S>,
) -> Result<HttpResponse, Error> {
2022-03-26 21:49:23 +00:00
let alias = alias.into_inner();
let alias = Alias::from_existing(&alias);
let identifier = repo.identifier_from_alias::<S::Identifier>(&alias).await?;
let details = repo.details(&identifier).await?;
let details = if let Some(details) = details {
details
} else {
2022-03-26 21:49:23 +00:00
let hint = details_hint(&alias);
2021-11-01 02:11:35 +00:00
let new_details = Details::from_store((**store).clone(), identifier.clone(), hint).await?;
repo.relate_details(&identifier, &new_details).await?;
new_details
};
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&details))
}
2020-06-24 16:58:46 +00:00
/// Serve files
#[instrument(name = "Serving file", skip(repo))]
async fn serve<R: FullRepo, S: Store + 'static>(
2022-03-01 17:23:15 +00:00
range: Option<web::Header<Range>>,
2020-06-24 16:58:46 +00:00
alias: web::Path<String>,
repo: web::Data<R>,
2021-11-01 02:11:35 +00:00
store: web::Data<S>,
) -> Result<HttpResponse, Error> {
2022-03-26 21:49:23 +00:00
let alias = alias.into_inner();
let alias = Alias::from_existing(&alias);
let identifier = repo.identifier_from_alias::<S::Identifier>(&alias).await?;
let details = repo.details(&identifier).await?;
let details = if let Some(details) = details {
details
} else {
2022-03-26 21:49:23 +00:00
let hint = details_hint(&alias);
2021-11-01 02:11:35 +00:00
let details = Details::from_store((**store).clone(), identifier.clone(), hint).await?;
repo.relate_details(&identifier, &details).await?;
details
};
2020-06-24 16:58:46 +00:00
2021-11-01 02:11:35 +00:00
ranged_file_resp(&**store, identifier, range, details).await
}
2021-01-14 01:08:04 +00:00
async fn ranged_file_resp<S: Store + 'static>(
2021-11-01 02:11:35 +00:00
store: &S,
2021-10-23 04:48:56 +00:00
identifier: S::Identifier,
2022-03-01 17:23:15 +00:00
range: Option<web::Header<Range>>,
2021-01-14 16:26:17 +00:00
details: Details,
) -> Result<HttpResponse, Error> {
2022-03-01 17:23:15 +00:00
let (builder, stream) = if let Some(web::Header(range_header)) = range {
//Range header exists - return as ranged
2022-03-01 17:23:15 +00:00
if let Some(range) = range::single_bytes_range(&range_header) {
let len = store.len(&identifier).await?;
2022-03-01 17:23:15 +00:00
if let Some(content_range) = range::to_content_range(range, len) {
let mut builder = HttpResponse::PartialContent();
builder.insert_header(content_range);
2021-10-23 04:48:56 +00:00
(
builder,
Either::left(Either::left(
range::chop_store(range, store, &identifier, len)
.await?
.map_err(Error::from),
)),
2021-10-23 04:48:56 +00:00
)
} else {
(
HttpResponse::RangeNotSatisfiable(),
Either::left(Either::right(empty())),
)
}
} else {
return Err(UploadError::Range.into());
2021-01-14 01:08:04 +00:00
}
} else {
2021-01-14 01:08:04 +00:00
//No Range header in the request - return the entire document
let stream = store
.to_stream(&identifier, None, None)
.await?
.map_err(Error::from);
(HttpResponse::Ok(), Either::right(stream))
2021-01-14 01:08:04 +00:00
};
Ok(srv_response(
builder,
2021-10-20 23:58:32 +00:00
stream,
details.content_type(),
7 * DAYS,
details.system_time(),
))
}
2020-06-06 21:41:17 +00:00
// A helper method to produce responses with proper cache headers
fn srv_response<S, E>(
mut builder: HttpResponseBuilder,
stream: S,
ext: mime::Mime,
expires: u32,
modified: SystemTime,
) -> HttpResponse
where
2021-10-20 23:58:32 +00:00
S: Stream<Item = Result<web::Bytes, E>> + 'static,
2021-06-19 19:39:41 +00:00
E: std::error::Error + 'static,
actix_web::Error: From<E>,
2021-01-14 01:08:04 +00:00
{
let stream = stream.timeout(Duration::from_secs(5)).map(|res| match res {
Ok(Ok(item)) => Ok(item),
Ok(Err(e)) => Err(actix_web::Error::from(e)),
Err(e) => Err(Error::from(e).into()),
});
builder
2021-02-10 22:57:42 +00:00
.insert_header(LastModified(modified.into()))
.insert_header(CacheControl(vec![
2021-01-14 01:08:04 +00:00
CacheDirective::Public,
CacheDirective::MaxAge(expires),
CacheDirective::Extension("immutable".to_owned(), None),
]))
2021-02-10 22:57:42 +00:00
.insert_header((ACCEPT_RANGES, "bytes"))
.content_type(ext.to_string())
2021-11-23 18:29:42 +00:00
.streaming(stream)
}
#[derive(Debug, serde::Deserialize)]
2022-03-26 21:49:23 +00:00
struct AliasQuery {
alias: String,
}
#[instrument(name = "Purging file", skip(repo))]
async fn purge<R: FullRepo>(
2022-03-26 21:49:23 +00:00
query: web::Query<AliasQuery>,
repo: web::Data<R>,
) -> Result<HttpResponse, Error> {
2022-03-26 21:49:23 +00:00
let alias = Alias::from_existing(&query.alias);
let aliases = repo.aliases_from_alias(&alias).await?;
for alias in aliases.iter() {
let token = repo.delete_token(alias).await?;
queue::cleanup_alias(&**repo, alias.clone(), token).await?;
}
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
2022-03-26 21:49:23 +00:00
"aliases": aliases.iter().map(|a| a.to_string()).collect::<Vec<_>>()
})))
}
#[instrument(name = "Fetching aliases", skip(repo))]
async fn aliases<R: FullRepo>(
2022-03-26 21:49:23 +00:00
query: web::Query<AliasQuery>,
repo: web::Data<R>,
) -> Result<HttpResponse, Error> {
2022-03-26 21:49:23 +00:00
let alias = Alias::from_existing(&query.alias);
let aliases = repo.aliases_from_alias(&alias).await?;
2021-02-10 22:57:42 +00:00
Ok(HttpResponse::Ok().json(&serde_json::json!({
"msg": "ok",
2022-03-26 21:49:23 +00:00
"aliases": aliases.iter().map(|a| a.to_string()).collect::<Vec<_>>()
})))
}
2021-10-23 04:48:56 +00:00
fn transform_error(error: actix_form_data::Error) -> actix_web::Error {
let error: Error = error.into();
let error: actix_web::Error = error.into();
error
}
2021-10-21 00:28:40 +00:00
fn build_client() -> awc::Client {
Client::builder()
2021-12-03 20:21:31 +00:00
.wrap(Tracing)
2021-12-19 02:24:22 +00:00
.add_default_header(("User-Agent", "pict-rs v0.3.0-main"))
.finish()
}
fn build_reqwest_client() -> reqwest::Result<reqwest::Client> {
reqwest::Client::builder()
.user_agent("pict-rs v0.3.0-main")
.build()
}
2022-03-29 18:18:47 +00:00
fn next_worker_id() -> String {
static WORKER_ID: AtomicU64 = AtomicU64::new(0);
let next_id = WORKER_ID.fetch_add(1, Ordering::Relaxed);
format!("{}-{}", CONFIG.server.worker_id, next_id)
}
async fn launch<R: FullRepo + Clone + 'static, S: Store + Clone + 'static>(
repo: R,
store: S,
2022-03-29 01:47:46 +00:00
) -> color_eyre::Result<()> {
2022-04-02 23:53:03 +00:00
repo.requeue_in_progress(CONFIG.server.worker_id.as_bytes().to_vec())
.await?;
2020-06-06 21:41:17 +00:00
// Create a new Multipart Form validator
//
// This form is expecting a single array field, 'images' with at most 10 files in it
let repo2 = repo.clone();
2021-11-01 02:11:35 +00:00
let store2 = store.clone();
let form = Form::new()
.max_files(10)
2022-03-28 04:27:07 +00:00
.max_file_size(CONFIG.media.max_file_size * MEGABYTES)
2021-10-23 04:48:56 +00:00
.transform_error(transform_error)
.field(
"images",
2020-06-14 18:56:42 +00:00
Field::array(Field::file(move |filename, _, stream| {
let repo = repo2.clone();
2021-11-01 02:11:35 +00:00
let store = store2.clone();
2021-09-16 22:51:20 +00:00
let span = tracing::info_span!("file-upload", ?filename);
2020-06-14 18:56:42 +00:00
let stream = stream.map_err(Error::from);
Box::pin(
async move { ingest::ingest(&repo, &store, stream, None, true).await }
.instrument(span),
)
})),
);
// Create a new Multipart Form validator for internal imports
//
// This form is expecting a single array field, 'images' with at most 10 files in it
let repo2 = repo.clone();
2021-11-01 02:11:35 +00:00
let store2 = store.clone();
let import_form = Form::new()
.max_files(10)
2022-03-28 04:27:07 +00:00
.max_file_size(CONFIG.media.max_file_size * MEGABYTES)
2021-10-23 04:48:56 +00:00
.transform_error(transform_error)
.field(
"images",
2021-10-23 17:35:07 +00:00
Field::array(Field::file(move |filename, _, stream| {
let repo = repo2.clone();
2021-11-01 02:11:35 +00:00
let store = store2.clone();
2021-09-16 22:51:20 +00:00
let span = tracing::info_span!("file-import", ?filename);
2020-06-14 18:56:42 +00:00
let stream = stream.map_err(Error::from);
Box::pin(
async move {
ingest::ingest(
&repo,
&store,
stream,
Some(Alias::from_existing(&filename)),
2022-03-29 16:09:23 +00:00
!CONFIG.media.skip_validate_imports,
2021-10-23 04:48:56 +00:00
)
.await
}
.instrument(span),
)
})),
);
// Create a new Multipart Form validator for backgrounded uploads
//
// This form is expecting a single array field, 'images' with at most 10 files in it
let repo2 = repo.clone();
let store2 = store.clone();
let backgrounded_form = Form::new()
.max_files(10)
.max_file_size(CONFIG.media.max_file_size * MEGABYTES)
.transform_error(transform_error)
.field(
"images",
Field::array(Field::file(move |filename, _, stream| {
let repo = repo2.clone();
let store = store2.clone();
let span = tracing::info_span!("file-proxy", ?filename);
let stream = stream.map_err(Error::from);
Box::pin(
async move { Backgrounded::proxy(repo, store, stream).await }.instrument(span),
)
})),
);
HttpServer::new(move || {
2022-03-29 18:18:47 +00:00
let store = store.clone();
let repo = repo.clone();
2022-03-29 18:18:47 +00:00
actix_rt::spawn(queue::process_cleanup(
repo.clone(),
store.clone(),
next_worker_id(),
));
actix_rt::spawn(queue::process_images(
repo.clone(),
2022-03-29 18:18:47 +00:00
store.clone(),
next_worker_id(),
));
App::new()
2021-09-18 21:34:23 +00:00
.wrap(TracingLogger::default())
2021-09-11 20:31:00 +00:00
.wrap(Deadline)
.app_data(web::Data::new(repo))
2022-03-29 18:18:47 +00:00
.app_data(web::Data::new(store))
.app_data(web::Data::new(build_client()))
.service(
web::scope("/image")
.service(
web::resource("")
.guard(guard::Post())
.wrap(form.clone())
.route(web::post().to(upload::<R, S>)),
)
.service(
2022-04-03 02:15:39 +00:00
web::scope("/backgrounded")
.service(
web::resource("")
.guard(guard::Post())
.wrap(backgrounded_form.clone())
.route(web::post().to(upload_backgrounded::<R, S>)),
)
.service(
web::resource("/claim").route(web::get().to(claim_upload::<R>)),
),
)
.service(web::resource("/download").route(web::get().to(download::<R, S>)))
2020-06-07 00:29:15 +00:00
.service(
web::resource("/delete/{delete_token}/{filename}")
.route(web::delete().to(delete::<R>))
.route(web::get().to(delete::<R>)),
)
.service(
web::resource("/original/{filename}").route(web::get().to(serve::<R, S>)),
2020-06-07 00:29:15 +00:00
)
.service(web::resource("/process.{ext}").route(web::get().to(process::<R, S>)))
.service(
web::resource("/process_backgrounded.{ext}")
.route(web::get().to(process_backgrounded::<R, S>)),
)
.service(
web::scope("/details")
.service(
2021-10-23 04:48:56 +00:00
web::resource("/original/{filename}")
.route(web::get().to(details::<R, S>)),
)
.service(
web::resource("/process.{ext}")
.route(web::get().to(process_details::<R, S>)),
),
),
)
.service(
2020-07-11 21:28:49 +00:00
web::scope("/internal")
2022-03-28 04:27:07 +00:00
.wrap(Internal(
CONFIG.server.api_key.as_ref().map(|s| s.to_owned()),
))
2020-07-11 21:28:49 +00:00
.service(
web::resource("/import")
.wrap(import_form.clone())
.route(web::post().to(upload::<R, S>)),
)
.service(web::resource("/purge").route(web::post().to(purge::<R>)))
.service(web::resource("/aliases").route(web::get().to(aliases::<R>))),
)
})
2022-03-28 04:27:07 +00:00
.bind(CONFIG.server.address)?
.run()
.await?;
2021-10-23 19:14:12 +00:00
crate::tmp_file::remove_tmp_dir().await?;
Ok(())
}
2021-10-23 04:48:56 +00:00
async fn migrate_inner<S1>(repo: &Repo, from: S1, to: &config::Store) -> color_eyre::Result<()>
2021-11-01 02:11:35 +00:00
where
S1: Store,
{
match to {
2022-03-28 04:27:07 +00:00
config::Store::Filesystem(config::Filesystem { path }) => {
2022-03-26 21:49:23 +00:00
let to = FileStore::build(path.clone(), repo.clone()).await?;
match repo {
Repo::Sled(repo) => migrate_store(repo, from, to).await?,
}
2021-11-01 02:11:35 +00:00
}
2022-03-28 04:27:07 +00:00
config::Store::ObjectStorage(config::ObjectStorage {
2021-11-01 02:11:35 +00:00
bucket_name,
region,
access_key,
secret_key,
security_token,
session_token,
2022-03-25 23:47:50 +00:00
}) => {
2021-11-01 02:11:35 +00:00
let to = ObjectStore::build(
bucket_name,
2022-03-28 04:27:07 +00:00
region.as_ref().clone(),
Some(access_key.clone()),
Some(secret_key.clone()),
2021-11-01 02:11:35 +00:00
security_token.clone(),
session_token.clone(),
2022-03-26 21:49:23 +00:00
repo.clone(),
build_reqwest_client()?,
2022-03-26 21:49:23 +00:00
)
.await?;
2021-11-01 02:11:35 +00:00
match repo {
Repo::Sled(repo) => migrate_store(repo, from, to).await?,
}
2021-11-01 02:11:35 +00:00
}
}
Ok(())
}
2021-10-23 04:48:56 +00:00
#[actix_rt::main]
2022-03-29 01:47:46 +00:00
async fn main() -> color_eyre::Result<()> {
2022-03-28 04:27:07 +00:00
init_tracing(&CONFIG.tracing)?;
2021-10-23 04:48:56 +00:00
2022-03-28 04:27:07 +00:00
let repo = Repo::open(CONFIG.repo.clone())?;
2022-04-03 20:07:31 +00:00
repo.from_db(CONFIG.old_db.path.clone()).await?;
2021-11-01 02:11:35 +00:00
2022-03-28 04:27:07 +00:00
match (*OPERATION).clone() {
Operation::Run => (),
Operation::MigrateStore { from, to } => {
2022-03-25 23:47:50 +00:00
match from {
2022-03-28 04:27:07 +00:00
config::Store::Filesystem(config::Filesystem { path }) => {
2022-03-26 21:49:23 +00:00
let from = FileStore::build(path.clone(), repo.clone()).await?;
migrate_inner(&repo, from, &to).await?;
2022-03-25 23:47:50 +00:00
}
2022-03-28 04:27:07 +00:00
config::Store::ObjectStorage(config::ObjectStorage {
2021-11-01 02:11:35 +00:00
bucket_name,
2022-03-25 23:47:50 +00:00
region,
access_key,
secret_key,
security_token,
session_token,
}) => {
let from = ObjectStore::build(
&bucket_name,
2022-03-28 04:27:07 +00:00
Serde::into_inner(region),
Some(access_key),
Some(secret_key),
2022-03-25 23:47:50 +00:00
security_token,
session_token,
2022-03-26 21:49:23 +00:00
repo.clone(),
2022-03-25 23:47:50 +00:00
build_reqwest_client()?,
2022-03-26 21:49:23 +00:00
)
.await?;
2022-03-25 23:47:50 +00:00
migrate_inner(&repo, from, &to).await?;
2022-03-25 23:47:50 +00:00
}
2021-11-01 02:11:35 +00:00
}
2022-03-25 23:47:50 +00:00
return Ok(());
}
2021-11-01 02:11:35 +00:00
}
2021-10-23 04:48:56 +00:00
2022-03-28 04:27:07 +00:00
match CONFIG.store.clone() {
config::Store::Filesystem(config::Filesystem { path }) => {
let store = FileStore::build(path, repo.clone()).await?;
match repo {
Repo::Sled(sled_repo) => launch(sled_repo, store).await,
}
}
2022-03-28 04:27:07 +00:00
config::Store::ObjectStorage(config::ObjectStorage {
bucket_name,
region,
access_key,
secret_key,
security_token,
session_token,
2022-03-25 23:47:50 +00:00
}) => {
let store = ObjectStore::build(
&bucket_name,
2022-03-28 04:27:07 +00:00
Serde::into_inner(region),
Some(access_key),
Some(secret_key),
2022-03-25 23:47:50 +00:00
security_token,
session_token,
repo.clone(),
build_reqwest_client()?,
2022-03-26 21:49:23 +00:00
)
.await?;
match repo {
Repo::Sled(sled_repo) => launch(sled_repo, store).await,
}
}
}
2021-10-23 04:48:56 +00:00
}
const STORE_MIGRATION_PROGRESS: &str = "store-migration-progress";
async fn migrate_store<R, S1, S2>(repo: &R, from: S1, to: S2) -> Result<(), Error>
where
S1: Store,
S2: Store,
R: IdentifierRepo + HashRepo + SettingsRepo,
{
let stream = repo.hashes().await;
let mut stream = Box::pin(stream);
while let Some(hash) = stream.next().await {
let hash = hash?;
if let Some(identifier) = repo
.motion_identifier(hash.as_ref().to_vec().into())
.await?
{
let new_identifier = migrate_file(&from, &to, &identifier).await?;
migrate_details(repo, identifier, &new_identifier).await?;
repo.relate_motion_identifier(hash.as_ref().to_vec().into(), &new_identifier)
.await?;
}
for (variant, identifier) in repo.variants(hash.as_ref().to_vec().into()).await? {
let new_identifier = migrate_file(&from, &to, &identifier).await?;
migrate_details(repo, identifier, &new_identifier).await?;
repo.relate_variant_identifier(hash.as_ref().to_vec().into(), variant, &new_identifier)
.await?;
}
let identifier = repo.identifier(hash.as_ref().to_vec().into()).await?;
let new_identifier = migrate_file(&from, &to, &identifier).await?;
migrate_details(repo, identifier, &new_identifier).await?;
repo.relate_identifier(hash.as_ref().to_vec().into(), &new_identifier)
.await?;
repo.set(STORE_MIGRATION_PROGRESS, hash.as_ref().to_vec().into())
.await?;
}
// clean up the migration key to avoid interfering with future migrations
repo.remove(STORE_MIGRATION_PROGRESS).await?;
Ok(())
}
async fn migrate_file<S1, S2>(
from: &S1,
to: &S2,
identifier: &S1::Identifier,
) -> Result<S2::Identifier, Error>
where
S1: Store,
S2: Store,
{
let stream = from.to_stream(identifier, None, None).await?;
futures_util::pin_mut!(stream);
let mut reader = tokio_util::io::StreamReader::new(stream);
let new_identifier = to.save_async_read(&mut reader).await?;
Ok(new_identifier)
}
async fn migrate_details<R, I1, I2>(repo: &R, from: I1, to: &I2) -> Result<(), Error>
where
R: IdentifierRepo,
I1: Identifier,
I2: Identifier,
{
if let Some(details) = repo.details(&from).await? {
repo.relate_details(to, &details).await?;
repo.cleanup(&from).await?;
}
Ok(())
}