mirror of
https://github.com/LemmyNet/lemmy
synced 2024-10-30 15:21:20 +00:00
a610211557
* Try to fix docker/drone plugin * Trying to use one rust image. * Fixing drone 1. * Fixing drone 2. * Add drone notify. * Fixing drone 3. * Fixing drone 4. * Fix clippy. * Remove uninlined format lint. * Combine all cargo tasks * Fixing drone 5. * Fixing drone 6. * Fixing drone 7. * Fixing drone 8. * Fixing drone 9. * Fixing drone 10. * Fixing drone 12. * Fixing drone 13. * Fixing drone 14. * Fixing drone 15. * Fixing drone 16. * Fixing drone 17. * Fixing drone 18. * Fixing drone 19. * Fixing drone 20. * Fixing drone 21. * Fixing drone 22. * Fixing drone 23. * Fixing drone 24. * Fixing drone 25. * Fixing drone 26. * Fixing drone 27. * Fixing drone 28. * Fixing drone 29. * Fixing drone 30. * Fixing drone 31. * Fixing drone 32. * Fixing drone 33. * Fixing drone 34. * Fixing drone 35. * Fixing drone 36. * Fixing drone 37. * Fixing drone 38. * Fixing drone 39. * Fixing drone 40. * Fixing drone 41. * Fixing drone 43. * Fixing drone 44. * Fixing drone 45. * Last cleanup. * Fixing drone 46. * Separate ci steps (#2679) * separate ci steps * fix 1 * add comments * dont add rustfmt explicitly * Revert "dont add rustfmt explicitly" This reverts commit 358ce3302a134b7ac88d90a854079356995e9725. * dont use all features for tests --------- Co-authored-by: Nutomic <me@nutomic.com>
262 lines
7.1 KiB
Rust
262 lines
7.1 KiB
Rust
use actix_web::{
|
|
body::BodyStream,
|
|
error,
|
|
http::{
|
|
header::{HeaderName, ACCEPT_ENCODING, HOST},
|
|
StatusCode,
|
|
},
|
|
web,
|
|
Error,
|
|
HttpRequest,
|
|
HttpResponse,
|
|
};
|
|
use futures::stream::{Stream, StreamExt};
|
|
use lemmy_api_common::{context::LemmyContext, utils::get_local_user_view_from_jwt};
|
|
use lemmy_db_schema::source::local_site::LocalSite;
|
|
use lemmy_utils::{claims::Claims, rate_limit::RateLimitCell, REQWEST_TIMEOUT};
|
|
use reqwest::Body;
|
|
use reqwest_middleware::{ClientWithMiddleware, RequestBuilder};
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
pub fn config(
|
|
cfg: &mut web::ServiceConfig,
|
|
client: ClientWithMiddleware,
|
|
rate_limit: &RateLimitCell,
|
|
) {
|
|
cfg
|
|
.app_data(web::Data::new(client))
|
|
.service(
|
|
web::resource("/pictrs/image")
|
|
.wrap(rate_limit.image())
|
|
.route(web::post().to(upload)),
|
|
)
|
|
// This has optional query params: /image/{filename}?format=jpg&thumbnail=256
|
|
.service(web::resource("/pictrs/image/{filename}").route(web::get().to(full_res)))
|
|
.service(web::resource("/pictrs/image/delete/{token}/{filename}").route(web::get().to(delete)));
|
|
}
|
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
struct Image {
|
|
file: String,
|
|
delete_token: String,
|
|
}
|
|
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
struct Images {
|
|
msg: String,
|
|
files: Option<Vec<Image>>,
|
|
}
|
|
|
|
#[derive(Deserialize)]
|
|
struct PictrsParams {
|
|
format: Option<String>,
|
|
thumbnail: Option<i32>,
|
|
}
|
|
|
|
#[derive(Deserialize)]
|
|
enum PictrsPurgeParams {
|
|
#[serde(rename = "file")]
|
|
File(String),
|
|
#[serde(rename = "alias")]
|
|
Alias(String),
|
|
}
|
|
|
|
fn adapt_request(
|
|
request: &HttpRequest,
|
|
client: &ClientWithMiddleware,
|
|
url: String,
|
|
) -> RequestBuilder {
|
|
// remove accept-encoding header so that pictrs doesnt compress the response
|
|
const INVALID_HEADERS: &[HeaderName] = &[ACCEPT_ENCODING, HOST];
|
|
|
|
let client_request = client
|
|
.request(request.method().clone(), url)
|
|
.timeout(REQWEST_TIMEOUT);
|
|
|
|
request
|
|
.headers()
|
|
.iter()
|
|
.fold(client_request, |client_req, (key, value)| {
|
|
if INVALID_HEADERS.contains(key) {
|
|
client_req
|
|
} else {
|
|
client_req.header(key, value)
|
|
}
|
|
})
|
|
}
|
|
|
|
async fn upload(
|
|
req: HttpRequest,
|
|
body: web::Payload,
|
|
client: web::Data<ClientWithMiddleware>,
|
|
context: web::Data<LemmyContext>,
|
|
) -> Result<HttpResponse, Error> {
|
|
// TODO: check rate limit here
|
|
let jwt = req
|
|
.cookie("jwt")
|
|
.expect("No auth header for picture upload");
|
|
|
|
if Claims::decode(jwt.value(), &context.secret().jwt_secret).is_err() {
|
|
return Ok(HttpResponse::Unauthorized().finish());
|
|
};
|
|
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
let image_url = format!("{}image", pictrs_config.url);
|
|
|
|
let mut client_req = adapt_request(&req, &client, image_url);
|
|
|
|
if let Some(addr) = req.head().peer_addr {
|
|
client_req = client_req.header("X-Forwarded-For", addr.to_string())
|
|
};
|
|
|
|
let res = client_req
|
|
.body(Body::wrap_stream(make_send(body)))
|
|
.send()
|
|
.await
|
|
.map_err(error::ErrorBadRequest)?;
|
|
|
|
let status = res.status();
|
|
let images = res.json::<Images>().await.map_err(error::ErrorBadRequest)?;
|
|
|
|
Ok(HttpResponse::build(status).json(images))
|
|
}
|
|
|
|
async fn full_res(
|
|
filename: web::Path<String>,
|
|
web::Query(params): web::Query<PictrsParams>,
|
|
req: HttpRequest,
|
|
client: web::Data<ClientWithMiddleware>,
|
|
context: web::Data<LemmyContext>,
|
|
) -> Result<HttpResponse, Error> {
|
|
// block access to images if instance is private and unauthorized, public
|
|
let local_site = LocalSite::read(context.pool())
|
|
.await
|
|
.map_err(error::ErrorBadRequest)?;
|
|
if local_site.private_instance {
|
|
let jwt = req
|
|
.cookie("jwt")
|
|
.expect("No auth header for picture access");
|
|
if get_local_user_view_from_jwt(jwt.value(), context.pool(), context.secret())
|
|
.await
|
|
.is_err()
|
|
{
|
|
return Ok(HttpResponse::Unauthorized().finish());
|
|
};
|
|
}
|
|
let name = &filename.into_inner();
|
|
|
|
// If there are no query params, the URL is original
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
let url = if params.format.is_none() && params.thumbnail.is_none() {
|
|
format!("{}image/original/{}", pictrs_config.url, name,)
|
|
} else {
|
|
// Take file type from name, or jpg if nothing is given
|
|
let format = params
|
|
.format
|
|
.unwrap_or_else(|| name.split('.').last().unwrap_or("jpg").to_string());
|
|
|
|
let mut url = format!("{}image/process.{}?src={}", pictrs_config.url, format, name,);
|
|
|
|
if let Some(size) = params.thumbnail {
|
|
url = format!("{url}&thumbnail={size}",);
|
|
}
|
|
url
|
|
};
|
|
|
|
image(url, req, client).await
|
|
}
|
|
|
|
async fn image(
|
|
url: String,
|
|
req: HttpRequest,
|
|
client: web::Data<ClientWithMiddleware>,
|
|
) -> Result<HttpResponse, Error> {
|
|
let mut client_req = adapt_request(&req, &client, url);
|
|
|
|
if let Some(addr) = req.head().peer_addr {
|
|
client_req = client_req.header("X-Forwarded-For", addr.to_string());
|
|
}
|
|
|
|
if let Some(addr) = req.head().peer_addr {
|
|
client_req = client_req.header("X-Forwarded-For", addr.to_string());
|
|
}
|
|
|
|
let res = client_req.send().await.map_err(error::ErrorBadRequest)?;
|
|
|
|
if res.status() == StatusCode::NOT_FOUND {
|
|
return Ok(HttpResponse::NotFound().finish());
|
|
}
|
|
|
|
let mut client_res = HttpResponse::build(res.status());
|
|
|
|
for (name, value) in res.headers().iter().filter(|(h, _)| *h != "connection") {
|
|
client_res.insert_header((name.clone(), value.clone()));
|
|
}
|
|
|
|
Ok(client_res.body(BodyStream::new(res.bytes_stream())))
|
|
}
|
|
|
|
async fn delete(
|
|
components: web::Path<(String, String)>,
|
|
req: HttpRequest,
|
|
client: web::Data<ClientWithMiddleware>,
|
|
context: web::Data<LemmyContext>,
|
|
) -> Result<HttpResponse, Error> {
|
|
let (token, file) = components.into_inner();
|
|
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
let url = format!("{}image/delete/{}/{}", pictrs_config.url, &token, &file);
|
|
|
|
let mut client_req = adapt_request(&req, &client, url);
|
|
|
|
if let Some(addr) = req.head().peer_addr {
|
|
client_req = client_req.header("X-Forwarded-For", addr.to_string());
|
|
}
|
|
|
|
let res = client_req.send().await.map_err(error::ErrorBadRequest)?;
|
|
|
|
Ok(HttpResponse::build(res.status()).body(BodyStream::new(res.bytes_stream())))
|
|
}
|
|
|
|
fn make_send<S>(mut stream: S) -> impl Stream<Item = S::Item> + Send + Unpin + 'static
|
|
where
|
|
S: Stream + Unpin + 'static,
|
|
S::Item: Send,
|
|
{
|
|
// NOTE: the 8 here is arbitrary
|
|
let (tx, rx) = tokio::sync::mpsc::channel(8);
|
|
|
|
// NOTE: spawning stream into a new task can potentially hit this bug:
|
|
// - https://github.com/actix/actix-web/issues/1679
|
|
//
|
|
// Since 4.0.0-beta.2 this issue is incredibly less frequent. I have not personally reproduced it.
|
|
// That said, it is still technically possible to encounter.
|
|
actix_web::rt::spawn(async move {
|
|
while let Some(res) = stream.next().await {
|
|
if tx.send(res).await.is_err() {
|
|
break;
|
|
}
|
|
}
|
|
});
|
|
|
|
SendStream { rx }
|
|
}
|
|
|
|
struct SendStream<T> {
|
|
rx: tokio::sync::mpsc::Receiver<T>,
|
|
}
|
|
|
|
impl<T> Stream for SendStream<T>
|
|
where
|
|
T: Send,
|
|
{
|
|
type Item = T;
|
|
|
|
fn poll_next(
|
|
mut self: std::pin::Pin<&mut Self>,
|
|
cx: &mut std::task::Context<'_>,
|
|
) -> std::task::Poll<Option<Self::Item>> {
|
|
std::pin::Pin::new(&mut self.rx).poll_recv(cx)
|
|
}
|
|
}
|