mod backgrounded; mod bytes_stream; mod concurrent_processor; mod config; mod details; mod discover; mod either; mod error; mod exiftool; mod ffmpeg; mod file; mod formats; mod generate; mod ingest; mod init_tracing; mod magick; mod middleware; mod migrate_store; mod process; mod processor; mod queue; mod range; mod repo; mod serde_str; mod store; mod stream; mod tmp_file; mod validate; use actix_form_data::{Field, Form, FormData, Multipart, Value}; use actix_web::{ guard, http::header::{CacheControl, CacheDirective, LastModified, Range, ACCEPT_RANGES}, web, App, HttpRequest, HttpResponse, HttpResponseBuilder, HttpServer, }; use futures_util::{ stream::{empty, once}, Stream, StreamExt, TryStreamExt, }; use once_cell::sync::Lazy; use reqwest_middleware::{ClientBuilder, ClientWithMiddleware}; use reqwest_tracing::TracingMiddleware; use rusty_s3::UrlStyle; use std::{ future::ready, path::Path, path::PathBuf, sync::atomic::{AtomicU64, Ordering}, time::{Duration, SystemTime}, }; use tokio::sync::Semaphore; use tracing_actix_web::TracingLogger; use tracing_futures::Instrument; use self::{ backgrounded::Backgrounded, concurrent_processor::ProcessMap, config::{Configuration, Operation}, details::Details, either::Either, error::{Error, UploadError}, formats::InputProcessableFormat, ingest::Session, init_tracing::init_tracing, middleware::{Deadline, Internal}, migrate_store::migrate_store, queue::queue_generate, repo::{ sled::SledRepo, Alias, DeleteToken, FullRepo, HashRepo, IdentifierRepo, QueueRepo, Repo, SettingsRepo, UploadId, UploadResult, }, serde_str::Serde, store::{ file_store::FileStore, object_store::{ObjectStore, ObjectStoreConfig}, Identifier, Store, }, stream::{StreamLimit, StreamTimeout}, }; pub use self::config::{ConfigSource, PictRsConfiguration}; const MEGABYTES: usize = 1024 * 1024; const MINUTES: u32 = 60; const HOURS: u32 = 60 * MINUTES; const DAYS: u32 = 24 * HOURS; const NOT_FOUND_KEY: &str = "404-alias"; static PROCESS_SEMAPHORE: Lazy = Lazy::new(|| { tracing::trace_span!(parent: None, "Initialize semaphore") .in_scope(|| Semaphore::new(num_cpus::get().saturating_sub(1).max(1))) }); async fn ensure_details( repo: &R, store: &S, config: &Configuration, alias: &Alias, ) -> Result { let Some(identifier) = repo.identifier_from_alias::(alias).await? else { return Err(UploadError::MissingAlias.into()); }; let details = repo.details(&identifier).await?.and_then(|details| { if details.internal_format().is_some() { Some(details) } else { None } }); if let Some(details) = details { tracing::debug!("details exist"); Ok(details) } else { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } tracing::debug!("generating new details from {:?}", identifier); let new_details = Details::from_store(store, &identifier).await?; tracing::debug!("storing details for {:?}", identifier); repo.relate_details(&identifier, &new_details).await?; tracing::debug!("stored"); Ok(new_details) } } struct Upload(Value>); impl FormData for Upload { type Item = Session; type Error = Error; fn form(req: &HttpRequest) -> Form { // Create a new Multipart Form validator // // This form is expecting a single array field, 'images' with at most 10 files in it let repo = req .app_data::>() .expect("No repo in request") .clone(); let store = req .app_data::>() .expect("No store in request") .clone(); let config = req .app_data::>() .expect("No configuration in request") .clone(); Form::new() .max_files(config.server.max_file_count) .max_file_size(config.media.max_file_size * MEGABYTES) .transform_error(transform_error) .field( "images", Field::array(Field::file(move |filename, _, stream| { let repo = repo.clone(); let store = store.clone(); let config = config.clone(); let span = tracing::info_span!("file-upload", ?filename); let stream = stream.map_err(Error::from); Box::pin( async move { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } ingest::ingest(&**repo, &**store, stream, None, &config.media).await } .instrument(span), ) })), ) } fn extract(value: Value>) -> Result { Ok(Upload(value)) } } struct Import(Value>); impl FormData for Import { type Item = Session; type Error = Error; fn form(req: &actix_web::HttpRequest) -> Form { let repo = req .app_data::>() .expect("No repo in request") .clone(); let store = req .app_data::>() .expect("No store in request") .clone(); let config = req .app_data::>() .expect("No configuration in request") .clone(); // Create a new Multipart Form validator for internal imports // // This form is expecting a single array field, 'images' with at most 10 files in it Form::new() .max_files(config.server.max_file_count) .max_file_size(config.media.max_file_size * MEGABYTES) .transform_error(transform_error) .field( "images", Field::array(Field::file(move |filename, _, stream| { let repo = repo.clone(); let store = store.clone(); let config = config.clone(); let span = tracing::info_span!("file-import", ?filename); let stream = stream.map_err(Error::from); Box::pin( async move { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } ingest::ingest( &**repo, &**store, stream, Some(Alias::from_existing(&filename)), &config.media, ) .await } .instrument(span), ) })), ) } fn extract(value: Value) -> Result where Self: Sized, { Ok(Import(value)) } } /// Handle responding to successful uploads #[tracing::instrument(name = "Uploaded files", skip(value, repo, store, config))] async fn upload( Multipart(Upload(value)): Multipart>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { handle_upload(value, repo, store, config).await } /// Handle responding to successful uploads #[tracing::instrument(name = "Imported files", skip(value, repo, store, config))] async fn import( Multipart(Import(value)): Multipart>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { handle_upload(value, repo, store, config).await } /// Handle responding to successful uploads #[tracing::instrument(name = "Uploaded files", skip(value, repo, store, config))] async fn handle_upload( value: Value>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let images = value .map() .and_then(|mut m| m.remove("images")) .and_then(|images| images.array()) .ok_or(UploadError::NoFiles)?; let mut files = Vec::new(); let images = images .into_iter() .filter_map(|i| i.file()) .collect::>(); for image in &images { if let Some(alias) = image.result.alias() { tracing::debug!("Uploaded {} as {:?}", image.filename, alias); let delete_token = image.result.delete_token().await?; let details = ensure_details(&repo, &store, &config, alias).await?; files.push(serde_json::json!({ "file": alias.to_string(), "delete_token": delete_token.to_string(), "details": details, })); } } for mut image in images { image.result.disarm(); } Ok(HttpResponse::Created().json(&serde_json::json!({ "msg": "ok", "files": files }))) } struct BackgroundedUpload(Value>); impl FormData for BackgroundedUpload { type Item = Backgrounded; type Error = Error; fn form(req: &actix_web::HttpRequest) -> Form { // Create a new Multipart Form validator for backgrounded uploads // // This form is expecting a single array field, 'images' with at most 10 files in it let repo = req .app_data::>() .expect("No repo in request") .clone(); let store = req .app_data::>() .expect("No store in request") .clone(); let config = req .app_data::>() .expect("No configuration in request") .clone(); let read_only = config.server.read_only; Form::new() .max_files(config.server.max_file_count) .max_file_size(config.media.max_file_size * MEGABYTES) .transform_error(transform_error) .field( "images", Field::array(Field::file(move |filename, _, stream| { let repo = (**repo).clone(); let store = (**store).clone(); let span = tracing::info_span!("file-proxy", ?filename); let stream = stream.map_err(Error::from); Box::pin( async move { if read_only { return Err(UploadError::ReadOnly.into()); } Backgrounded::proxy(repo, store, stream).await } .instrument(span), ) })), ) } fn extract(value: Value) -> Result where Self: Sized, { Ok(BackgroundedUpload(value)) } } #[tracing::instrument(name = "Uploaded files", skip(value, repo))] async fn upload_backgrounded( Multipart(BackgroundedUpload(value)): Multipart>, repo: web::Data, ) -> Result { let images = value .map() .and_then(|mut m| m.remove("images")) .and_then(|images| images.array()) .ok_or(UploadError::NoFiles)?; let mut files = Vec::new(); let images = images .into_iter() .filter_map(|i| i.file()) .collect::>(); for image in &images { let upload_id = image.result.upload_id().expect("Upload ID exists"); let identifier = image .result .identifier() .expect("Identifier exists") .to_bytes()?; queue::queue_ingest(&repo, identifier, upload_id, None).await?; files.push(serde_json::json!({ "upload_id": upload_id.to_string(), })); } for image in images { image.result.disarm(); } Ok(HttpResponse::Accepted().json(&serde_json::json!({ "msg": "ok", "uploads": files }))) } #[derive(Debug, serde::Deserialize)] struct ClaimQuery { upload_id: Serde, } /// Claim a backgrounded upload #[tracing::instrument(name = "Waiting on upload", skip_all)] async fn claim_upload( repo: web::Data, store: web::Data, config: web::Data, query: web::Query, ) -> Result { let upload_id = Serde::into_inner(query.into_inner().upload_id); match actix_rt::time::timeout(Duration::from_secs(10), repo.wait(upload_id)).await { Ok(wait_res) => { let upload_result = wait_res?; repo.claim(upload_id).await?; match upload_result { UploadResult::Success { alias, token } => { let details = ensure_details(&repo, &store, &config, &alias).await?; Ok(HttpResponse::Ok().json(&serde_json::json!({ "msg": "ok", "files": [{ "file": alias.to_string(), "delete_token": token.to_string(), "details": details, }] }))) } UploadResult::Failure { message } => Ok(HttpResponse::UnprocessableEntity().json( &serde_json::json!({ "msg": message, }), )), } } Err(_) => Ok(HttpResponse::NoContent().finish()), } } #[derive(Debug, serde::Deserialize)] struct UrlQuery { url: String, #[serde(default)] backgrounded: bool, } /// download an image from a URL #[tracing::instrument(name = "Downloading file", skip(client, repo, store, config))] async fn download( client: web::Data, repo: web::Data, store: web::Data, config: web::Data, query: web::Query, ) -> Result { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } let res = client.get(&query.url).send().await?; if !res.status().is_success() { return Err(UploadError::Download(res.status()).into()); } let stream = res .bytes_stream() .map_err(Error::from) .limit((config.media.max_file_size * MEGABYTES) as u64); if query.backgrounded { do_download_backgrounded(stream, repo, store).await } else { do_download_inline(stream, repo, store, config).await } } #[tracing::instrument(name = "Downloading file inline", skip(stream, repo, store, config))] async fn do_download_inline( stream: impl Stream> + Unpin + 'static, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let mut session = ingest::ingest(&repo, &store, stream, None, &config.media).await?; let alias = session.alias().expect("alias should exist").to_owned(); let delete_token = session.delete_token().await?; let details = ensure_details(&repo, &store, &config, &alias).await?; session.disarm(); Ok(HttpResponse::Created().json(&serde_json::json!({ "msg": "ok", "files": [{ "file": alias.to_string(), "delete_token": delete_token.to_string(), "details": details, }] }))) } #[tracing::instrument(name = "Downloading file in background", skip(stream, repo, store))] async fn do_download_backgrounded( stream: impl Stream> + Unpin + 'static, repo: web::Data, store: web::Data, ) -> Result { let backgrounded = Backgrounded::proxy((**repo).clone(), (**store).clone(), stream).await?; let upload_id = backgrounded.upload_id().expect("Upload ID exists"); let identifier = backgrounded .identifier() .expect("Identifier exists") .to_bytes()?; queue::queue_ingest(&repo, identifier, upload_id, None).await?; backgrounded.disarm(); Ok(HttpResponse::Accepted().json(&serde_json::json!({ "msg": "ok", "uploads": [{ "upload_id": upload_id.to_string(), }] }))) } /// Delete aliases and files #[tracing::instrument(name = "Deleting file", skip(repo))] async fn delete( repo: web::Data, config: web::Data, path_entries: web::Path<(String, String)>, ) -> Result { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } let (token, alias) = path_entries.into_inner(); let token = DeleteToken::from_existing(&token); let alias = Alias::from_existing(&alias); queue::cleanup_alias(&repo, alias, token).await?; Ok(HttpResponse::NoContent().finish()) } type ProcessQuery = Vec<(String, String)>; fn prepare_process( config: &Configuration, query: web::Query, ext: &str, ) -> Result<(InputProcessableFormat, Alias, PathBuf, Vec), Error> { let (alias, operations) = query .into_inner() .into_iter() .fold((String::new(), Vec::new()), |(s, mut acc), (k, v)| { if k == "src" { (v, acc) } else { acc.push((k, v)); (s, acc) } }); if alias.is_empty() { return Err(UploadError::MissingAlias.into()); } let alias = Alias::from_existing(&alias); let operations = operations .into_iter() .filter(|(k, _)| config.media.filters.contains(&k.to_lowercase())) .collect::>(); let format = ext .parse::() .map_err(|_| UploadError::UnsupportedProcessExtension)?; let (thumbnail_path, thumbnail_args) = self::processor::build_chain(&operations, &format.to_string())?; Ok((format, alias, thumbnail_path, thumbnail_args)) } #[tracing::instrument(name = "Fetching derived details", skip(repo, config))] async fn process_details( query: web::Query, ext: web::Path, repo: web::Data, config: web::Data, ) -> Result { let (_, alias, thumbnail_path, _) = prepare_process(&config, query, ext.as_str())?; let Some(hash) = repo.hash(&alias).await? else { // Invalid alias return Ok(HttpResponse::NotFound().json(&serde_json::json!({ "msg": "No images associated with provided alias", }))); }; let identifier = repo .variant_identifier::(hash, thumbnail_path.to_string_lossy().to_string()) .await? .ok_or(UploadError::MissingAlias)?; let details = repo.details(&identifier).await?; let details = details.ok_or(UploadError::NoFiles)?; Ok(HttpResponse::Ok().json(&details)) } async fn not_found_hash(repo: &R) -> Result, Error> { let Some(not_found) = repo.get(NOT_FOUND_KEY).await? else { return Ok(None); }; let Some(alias) = Alias::from_slice(not_found.as_ref()) else { tracing::warn!("Couldn't parse not-found alias"); return Ok(None); }; let Some(hash) = repo.hash(&alias).await? else { tracing::warn!("No hash found for not-found alias"); return Ok(None); }; Ok(Some((alias, hash))) } /// Process files #[tracing::instrument( name = "Serving processed image", skip(repo, store, config, process_map) )] async fn process( range: Option>, query: web::Query, ext: web::Path, repo: web::Data, store: web::Data, config: web::Data, process_map: web::Data, ) -> Result { let (format, alias, thumbnail_path, thumbnail_args) = prepare_process(&config, query, ext.as_str())?; let path_string = thumbnail_path.to_string_lossy().to_string(); let (hash, alias, not_found) = if let Some(hash) = repo.hash(&alias).await? { (hash, alias, false) } else { let Some((alias, hash)) = not_found_hash(&repo).await? else { return Ok(HttpResponse::NotFound().finish()); }; (hash, alias, true) }; let identifier_opt = repo .variant_identifier::(hash.clone(), path_string) .await?; if let Some(identifier) = identifier_opt { let details = repo.details(&identifier).await?.and_then(|details| { if details.internal_format().is_some() { Some(details) } else { None } }); let details = if let Some(details) = details { tracing::debug!("details exist"); details } else { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } tracing::debug!("generating new details from {:?}", identifier); let new_details = Details::from_store(&store, &identifier).await?; tracing::debug!("storing details for {:?}", identifier); repo.relate_details(&identifier, &new_details).await?; tracing::debug!("stored"); new_details }; if let Some(public_url) = store.public_url(&identifier) { return Ok(HttpResponse::SeeOther() .insert_header((actix_web::http::header::LOCATION, public_url.as_str())) .finish()); } return ranged_file_resp(&store, identifier, range, details, not_found).await; } if config.server.read_only { return Err(UploadError::ReadOnly.into()); } let original_details = ensure_details(&repo, &store, &config, &alias).await?; let (details, bytes) = generate::generate( &repo, &store, &process_map, format, alias, thumbnail_path, thumbnail_args, original_details.video_format(), None, &config.media, hash, ) .await?; let (builder, stream) = if let Some(web::Header(range_header)) = range { if let Some(range) = range::single_bytes_range(&range_header) { let len = bytes.len() as u64; if let Some(content_range) = range::to_content_range(range, len) { let mut builder = HttpResponse::PartialContent(); builder.insert_header(content_range); let stream = range::chop_bytes(range, bytes, len)?; (builder, Either::left(Either::left(stream))) } else { ( HttpResponse::RangeNotSatisfiable(), Either::left(Either::right(empty())), ) } } else { return Err(UploadError::Range.into()); } } else if not_found { ( HttpResponse::NotFound(), Either::right(once(ready(Ok(bytes)))), ) } else { (HttpResponse::Ok(), Either::right(once(ready(Ok(bytes))))) }; Ok(srv_response( builder, stream, details.media_type(), 7 * DAYS, details.system_time(), )) } #[tracing::instrument(name = "Serving processed image headers", skip(repo, store, config))] async fn process_head( range: Option>, query: web::Query, ext: web::Path, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let (_, alias, thumbnail_path, _) = prepare_process(&config, query, ext.as_str())?; let path_string = thumbnail_path.to_string_lossy().to_string(); let Some(hash) = repo.hash(&alias).await? else { // Invalid alias return Ok(HttpResponse::NotFound().finish()); }; let identifier_opt = repo .variant_identifier::(hash.clone(), path_string) .await?; if let Some(identifier) = identifier_opt { let details = repo.details(&identifier).await?.and_then(|details| { if details.internal_format().is_some() { Some(details) } else { None } }); let details = if let Some(details) = details { tracing::debug!("details exist"); details } else { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } tracing::debug!("generating new details from {:?}", identifier); let new_details = Details::from_store(&store, &identifier).await?; tracing::debug!("storing details for {:?}", identifier); repo.relate_details(&identifier, &new_details).await?; tracing::debug!("stored"); new_details }; if let Some(public_url) = store.public_url(&identifier) { return Ok(HttpResponse::SeeOther() .insert_header((actix_web::http::header::LOCATION, public_url.as_str())) .finish()); } return ranged_file_head_resp(&store, identifier, range, details).await; } Ok(HttpResponse::NotFound().finish()) } /// Process files #[tracing::instrument(name = "Spawning image process", skip(repo))] async fn process_backgrounded( query: web::Query, ext: web::Path, repo: web::Data, config: web::Data, ) -> Result { let (target_format, source, process_path, process_args) = prepare_process(&config, query, ext.as_str())?; let path_string = process_path.to_string_lossy().to_string(); let Some(hash) = repo.hash(&source).await? else { // Invalid alias return Ok(HttpResponse::BadRequest().finish()); }; let identifier_opt = repo .variant_identifier::(hash.clone(), path_string) .await?; if identifier_opt.is_some() { return Ok(HttpResponse::Accepted().finish()); } if config.server.read_only { return Err(UploadError::ReadOnly.into()); } queue_generate(&repo, target_format, source, process_path, process_args).await?; Ok(HttpResponse::Accepted().finish()) } /// Fetch file details #[tracing::instrument(name = "Fetching details", skip(repo, store, config))] async fn details( alias: web::Path>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let alias = alias.into_inner(); let details = ensure_details(&repo, &store, &config, &alias).await?; Ok(HttpResponse::Ok().json(&details)) } /// Serve files #[tracing::instrument(name = "Serving file", skip(repo, store, config))] async fn serve( range: Option>, alias: web::Path>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let alias = alias.into_inner(); let (hash, alias, not_found) = if let Some(hash) = repo.hash(&alias).await? { (hash, Serde::into_inner(alias), false) } else { let Some((alias, hash)) = not_found_hash(&repo).await? else { return Ok(HttpResponse::NotFound().finish()); }; (hash, alias, true) }; let Some(identifier) = repo.identifier(hash.clone()).await? else { tracing::warn!( "Original File identifier for hash {} is missing, queue cleanup task", hex::encode(&hash) ); crate::queue::cleanup_hash(&repo, hash).await?; return Ok(HttpResponse::NotFound().finish()); }; let details = ensure_details(&repo, &store, &config, &alias).await?; if let Some(public_url) = store.public_url(&identifier) { return Ok(HttpResponse::SeeOther() .insert_header((actix_web::http::header::LOCATION, public_url.as_str())) .finish()); } ranged_file_resp(&store, identifier, range, details, not_found).await } #[tracing::instrument(name = "Serving file headers", skip(repo, store, config))] async fn serve_head( range: Option>, alias: web::Path>, repo: web::Data, store: web::Data, config: web::Data, ) -> Result { let alias = alias.into_inner(); let Some(identifier) = repo.identifier_from_alias::(&alias).await? else { // Invalid alias return Ok(HttpResponse::NotFound().finish()); }; let details = ensure_details(&repo, &store, &config, &alias).await?; if let Some(public_url) = store.public_url(&identifier) { return Ok(HttpResponse::SeeOther() .insert_header((actix_web::http::header::LOCATION, public_url.as_str())) .finish()); } ranged_file_head_resp(&store, identifier, range, details).await } async fn ranged_file_head_resp( store: &S, identifier: S::Identifier, range: Option>, details: Details, ) -> Result { let builder = if let Some(web::Header(range_header)) = range { //Range header exists - return as ranged if let Some(range) = range::single_bytes_range(&range_header) { let len = store.len(&identifier).await?; if let Some(content_range) = range::to_content_range(range, len) { let mut builder = HttpResponse::PartialContent(); builder.insert_header(content_range); builder } else { HttpResponse::RangeNotSatisfiable() } } else { return Err(UploadError::Range.into()); } } else { // no range header HttpResponse::Ok() }; Ok(srv_head( builder, details.media_type(), 7 * DAYS, details.system_time(), ) .finish()) } async fn ranged_file_resp( store: &S, identifier: S::Identifier, range: Option>, details: Details, not_found: bool, ) -> Result { let (builder, stream) = if let Some(web::Header(range_header)) = range { //Range header exists - return as ranged if let Some(range) = range::single_bytes_range(&range_header) { let len = store.len(&identifier).await?; if let Some(content_range) = range::to_content_range(range, len) { let mut builder = HttpResponse::PartialContent(); builder.insert_header(content_range); ( builder, Either::left(Either::left( range::chop_store(range, store, &identifier, len) .await? .map_err(Error::from), )), ) } else { ( HttpResponse::RangeNotSatisfiable(), Either::left(Either::right(empty())), ) } } else { return Err(UploadError::Range.into()); } } else { //No Range header in the request - return the entire document let stream = store .to_stream(&identifier, None, None) .await? .map_err(Error::from); if not_found { (HttpResponse::NotFound(), Either::right(stream)) } else { (HttpResponse::Ok(), Either::right(stream)) } }; Ok(srv_response( builder, stream, details.media_type(), 7 * DAYS, details.system_time(), )) } // A helper method to produce responses with proper cache headers fn srv_response( builder: HttpResponseBuilder, stream: S, ext: mime::Mime, expires: u32, modified: SystemTime, ) -> HttpResponse where S: Stream> + 'static, E: std::error::Error + 'static, actix_web::Error: From, { let stream = stream.timeout(Duration::from_secs(5)).map(|res| match res { Ok(Ok(item)) => Ok(item), Ok(Err(e)) => Err(actix_web::Error::from(e)), Err(e) => Err(Error::from(e).into()), }); srv_head(builder, ext, expires, modified).streaming(stream) } // A helper method to produce responses with proper cache headers fn srv_head( mut builder: HttpResponseBuilder, ext: mime::Mime, expires: u32, modified: SystemTime, ) -> HttpResponseBuilder { builder .insert_header(LastModified(modified.into())) .insert_header(CacheControl(vec![ CacheDirective::Public, CacheDirective::MaxAge(expires), CacheDirective::Extension("immutable".to_owned(), None), ])) .insert_header((ACCEPT_RANGES, "bytes")) .content_type(ext.to_string()); builder } #[tracing::instrument(name = "Spawning variant cleanup", skip(repo, config))] async fn clean_variants( repo: web::Data, config: web::Data, ) -> Result { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } queue::cleanup_all_variants(&repo).await?; Ok(HttpResponse::NoContent().finish()) } #[derive(Debug, serde::Deserialize)] struct AliasQuery { alias: Serde, } #[tracing::instrument(name = "Setting 404 Image", skip(repo, config))] async fn set_not_found( json: web::Json, repo: web::Data, config: web::Data, ) -> Result { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } let alias = json.into_inner().alias; if repo.hash(&alias).await?.is_none() { return Ok(HttpResponse::BadRequest().json(serde_json::json!({ "msg": "No hash associated with provided alias" }))); } repo.set(NOT_FOUND_KEY, alias.to_bytes().into()).await?; Ok(HttpResponse::Created().json(serde_json::json!({ "msg": "ok", }))) } #[tracing::instrument(name = "Purging file", skip(repo, config))] async fn purge( query: web::Query, repo: web::Data, config: web::Data, ) -> Result { if config.server.read_only { return Err(UploadError::ReadOnly.into()); } let alias = query.into_inner().alias; let aliases = repo.aliases_from_alias(&alias).await?; let Some(hash) = repo.hash(&alias).await? else { return Ok(HttpResponse::BadRequest().json(&serde_json::json!({ "msg": "No images associated with provided alias", }))); }; queue::cleanup_hash(&repo, hash).await?; Ok(HttpResponse::Ok().json(&serde_json::json!({ "msg": "ok", "aliases": aliases.iter().map(|a| a.to_string()).collect::>() }))) } #[tracing::instrument(name = "Fetching aliases", skip(repo))] async fn aliases( query: web::Query, repo: web::Data, ) -> Result { let alias = query.into_inner().alias; let aliases = repo.aliases_from_alias(&alias).await?; Ok(HttpResponse::Ok().json(&serde_json::json!({ "msg": "ok", "aliases": aliases.iter().map(|a| a.to_string()).collect::>() }))) } #[tracing::instrument(name = "Fetching identifier", skip(repo))] async fn identifier( query: web::Query, repo: web::Data, ) -> Result { let alias = query.into_inner().alias; let Some(identifier) = repo.identifier_from_alias::(&alias).await? else { // Invalid alias return Ok(HttpResponse::NotFound().json(serde_json::json!({ "msg": "No identifiers associated with provided alias" }))); }; Ok(HttpResponse::Ok().json(&serde_json::json!({ "msg": "ok", "identifier": identifier.string_repr(), }))) } async fn healthz( repo: web::Data, store: web::Data, ) -> Result { repo.health_check().await?; store.health_check().await?; Ok(HttpResponse::Ok().finish()) } fn transform_error(error: actix_form_data::Error) -> actix_web::Error { let error: Error = error.into(); let error: actix_web::Error = error.into(); error } fn build_client(config: &Configuration) -> Result { let client = reqwest::Client::builder() .user_agent("pict-rs v0.5.0-main") .use_rustls_tls() .pool_max_idle_per_host(config.client.pool_size) .build() .map_err(UploadError::BuildClient)?; Ok(ClientBuilder::new(client) .with(TracingMiddleware::default()) .build()) } fn next_worker_id(config: &Configuration) -> String { static WORKER_ID: AtomicU64 = AtomicU64::new(0); let next_id = WORKER_ID.fetch_add(1, Ordering::Relaxed); format!("{}-{}", config.server.worker_id, next_id) } fn configure_endpoints< R: FullRepo + 'static, S: Store + 'static, F: Fn(&mut web::ServiceConfig), >( config: &mut web::ServiceConfig, repo: R, store: S, configuration: Configuration, client: ClientWithMiddleware, extra_config: F, ) { config .app_data(web::Data::new(repo)) .app_data(web::Data::new(store)) .app_data(web::Data::new(client)) .app_data(web::Data::new(configuration.clone())) .route("/healthz", web::get().to(healthz::)) .service( web::scope("/image") .service( web::resource("") .guard(guard::Post()) .route(web::post().to(upload::)), ) .service( web::scope("/backgrounded") .service( web::resource("") .guard(guard::Post()) .route(web::post().to(upload_backgrounded::)), ) .service( web::resource("/claim").route(web::get().to(claim_upload::)), ), ) .service(web::resource("/download").route(web::get().to(download::))) .service( web::resource("/delete/{delete_token}/{filename}") .route(web::delete().to(delete::)) .route(web::get().to(delete::)), ) .service( web::resource("/original/{filename}") .route(web::get().to(serve::)) .route(web::head().to(serve_head::)), ) .service( web::resource("/process.{ext}") .route(web::get().to(process::)) .route(web::head().to(process_head::)), ) .service( web::resource("/process_backgrounded.{ext}") .route(web::get().to(process_backgrounded::)), ) .service( web::scope("/details") .service( web::resource("/original/{filename}") .route(web::get().to(details::)), ) .service( web::resource("/process.{ext}") .route(web::get().to(process_details::)), ), ), ) .service( web::scope("/internal") .wrap(Internal( configuration.server.api_key.as_ref().map(|s| s.to_owned()), )) .service(web::resource("/import").route(web::post().to(import::))) .service(web::resource("/variants").route(web::delete().to(clean_variants::))) .service(web::resource("/purge").route(web::post().to(purge::))) .service(web::resource("/aliases").route(web::get().to(aliases::))) .service(web::resource("/identifier").route(web::get().to(identifier::))) .service(web::resource("/set_not_found").route(web::post().to(set_not_found::))) .configure(extra_config), ); } fn spawn_workers(repo: R, store: S, config: &Configuration, process_map: ProcessMap) where R: FullRepo + 'static, S: Store + 'static, { tracing::trace_span!(parent: None, "Spawn task").in_scope(|| { actix_rt::spawn(queue::process_cleanup( repo.clone(), store.clone(), next_worker_id(config), )) }); tracing::trace_span!(parent: None, "Spawn task").in_scope(|| { actix_rt::spawn(queue::process_images( repo, store, process_map, config.clone(), next_worker_id(config), )) }); } async fn launch_file_store( repo: R, store: FileStore, client: ClientWithMiddleware, config: Configuration, extra_config: F, ) -> std::io::Result<()> { let process_map = ProcessMap::new(); let address = config.server.address; HttpServer::new(move || { let client = client.clone(); let store = store.clone(); let repo = repo.clone(); let config = config.clone(); let extra_config = extra_config.clone(); spawn_workers(repo.clone(), store.clone(), &config, process_map.clone()); App::new() .wrap(TracingLogger::default()) .wrap(Deadline) .app_data(web::Data::new(process_map.clone())) .configure(move |sc| configure_endpoints(sc, repo, store, config, client, extra_config)) }) .bind(address)? .run() .await } async fn launch_object_store< R: FullRepo + 'static, F: Fn(&mut web::ServiceConfig) + Send + Clone, >( repo: R, store_config: ObjectStoreConfig, client: ClientWithMiddleware, config: Configuration, extra_config: F, ) -> std::io::Result<()> { let process_map = ProcessMap::new(); let address = config.server.address; HttpServer::new(move || { let client = client.clone(); let store = store_config.clone().build(client.clone()); let repo = repo.clone(); let config = config.clone(); let extra_config = extra_config.clone(); spawn_workers(repo.clone(), store.clone(), &config, process_map.clone()); App::new() .wrap(TracingLogger::default()) .wrap(Deadline) .app_data(web::Data::new(process_map.clone())) .configure(move |sc| configure_endpoints(sc, repo, store, config, client, extra_config)) }) .bind(address)? .run() .await } async fn migrate_inner( repo: Repo, client: ClientWithMiddleware, from: S1, to: config::primitives::Store, skip_missing_files: bool, ) -> color_eyre::Result<()> where S1: Store + 'static, { match to { config::primitives::Store::Filesystem(config::Filesystem { path }) => { let to = FileStore::build(path.clone(), repo.clone()).await?; match repo { Repo::Sled(repo) => migrate_store(repo, from, to, skip_missing_files).await?, } } config::primitives::Store::ObjectStorage(config::primitives::ObjectStorage { endpoint, bucket_name, use_path_style, region, access_key, secret_key, session_token, signature_duration, client_timeout, public_endpoint, }) => { let to = ObjectStore::build( endpoint.clone(), bucket_name, if use_path_style { UrlStyle::Path } else { UrlStyle::VirtualHost }, region, access_key, secret_key, session_token, signature_duration.unwrap_or(15), client_timeout.unwrap_or(30), public_endpoint, repo.clone(), ) .await? .build(client); match repo { Repo::Sled(repo) => migrate_store(repo, from, to, skip_missing_files).await?, } } } Ok(()) } impl, T: serde::Serialize> ConfigSource { /// Initialize the pict-rs configuration /// /// This takes an optional config_file path which is a valid pict-rs configuration file, and an /// optional save_to path, which the generated configuration will be saved into. Since many /// parameters have defaults, it can be useful to dump a valid configuration with default values to /// see what is available for tweaking. /// /// This function must be called before `run` or `install_tracing` /// /// When running pict-rs as a library, configuration is limited to environment variables and /// configuration files. Commandline options are not available. /// /// ```rust /// fn main() -> Result<(), Box> { /// pict_rs::ConfigSource::memory(serde_json::json!({ /// "server": { /// "address": "127.0.0.1:8080" /// }, /// "old_db": { /// "path": "./old" /// }, /// "repo": { /// "type": "sled", /// "path": "./sled-repo" /// }, /// "store": { /// "type": "filesystem", /// "path": "./files" /// } /// })).init::<&str>(None)?; /// /// Ok(()) /// } /// ``` pub fn init>( self, save_to: Option, ) -> color_eyre::Result { config::configure_without_clap(self, save_to) } } async fn export_handler(repo: web::Data) -> Result { repo.export().await?; Ok(HttpResponse::Created().json(&serde_json::json!({ "msg": "ok" }))) } fn sled_extra_config(sc: &mut web::ServiceConfig) { sc.service(web::resource("/export").route(web::post().to(export_handler))); } impl PictRsConfiguration { /// Build the pict-rs configuration from commandline arguments /// /// This is probably not useful for 3rd party applications that handle their own commandline pub fn build_default() -> color_eyre::Result { config::configure() } /// Install the default pict-rs tracer /// /// This is probably not useful for 3rd party applications that install their own tracing /// subscribers. pub fn install_tracing(self) -> color_eyre::Result { init_tracing(&self.config.tracing)?; Ok(self) } /// Run the pict-rs application /// /// This must be called after `init_config`, or else the default configuration builder will run and /// fail. pub async fn run(self) -> color_eyre::Result<()> { let PictRsConfiguration { config, operation } = self; let repo = Repo::open(config.repo.clone())?; repo.migrate_from_db(config.old_db.path.clone()).await?; let client = build_client(&config)?; match operation { Operation::Run => (), Operation::MigrateStore { skip_missing_files, from, to, } => { match from { config::primitives::Store::Filesystem(config::Filesystem { path }) => { let from = FileStore::build(path.clone(), repo.clone()).await?; migrate_inner(repo, client, from, to, skip_missing_files).await?; } config::primitives::Store::ObjectStorage( config::primitives::ObjectStorage { endpoint, bucket_name, use_path_style, region, access_key, secret_key, session_token, signature_duration, client_timeout, public_endpoint, }, ) => { let from = ObjectStore::build( endpoint, bucket_name, if use_path_style { UrlStyle::Path } else { UrlStyle::VirtualHost }, region, access_key, secret_key, session_token, signature_duration.unwrap_or(15), client_timeout.unwrap_or(30), public_endpoint, repo.clone(), ) .await? .build(client.clone()); migrate_inner(repo, client, from, to, skip_missing_files).await?; } } return Ok(()); } } if config.server.read_only { tracing::warn!("Launching in READ ONLY mode"); } match config.store.clone() { config::Store::Filesystem(config::Filesystem { path }) => { repo.migrate_identifiers().await?; let store = FileStore::build(path, repo.clone()).await?; match repo { Repo::Sled(sled_repo) => { sled_repo .requeue_in_progress(config.server.worker_id.as_bytes().to_vec()) .await?; launch_file_store(sled_repo, store, client, config, sled_extra_config) .await?; } } } config::Store::ObjectStorage(config::ObjectStorage { endpoint, bucket_name, use_path_style, region, access_key, secret_key, session_token, signature_duration, client_timeout, public_endpoint, }) => { let store = ObjectStore::build( endpoint, bucket_name, if use_path_style { UrlStyle::Path } else { UrlStyle::VirtualHost }, region, access_key, secret_key, session_token, signature_duration, client_timeout, public_endpoint, repo.clone(), ) .await?; match repo { Repo::Sled(sled_repo) => { sled_repo .requeue_in_progress(config.server.worker_id.as_bytes().to_vec()) .await?; launch_object_store(sled_repo, store, client, config, sled_extra_config) .await?; } } } } self::tmp_file::remove_tmp_dir().await?; Ok(()) } }