ffplayout/src/api/routes.rs

352 lines
13 KiB
Rust
Raw Normal View History

use std::collections::HashMap;
2022-06-12 22:37:29 +02:00
use actix_web::{get, http::StatusCode, patch, post, put, web, Responder};
use actix_web_grants::{permissions::AuthDetails, proc_macro::has_any_role};
2022-06-10 16:12:30 +02:00
use argon2::{
password_hash::{rand_core::OsRng, PasswordHash, SaltString},
Argon2, PasswordHasher, PasswordVerifier,
};
2022-06-08 18:06:40 +02:00
use serde::Serialize;
2022-06-07 22:05:35 +02:00
use simplelog::*;
2022-06-06 23:07:11 +02:00
2022-06-09 18:59:14 +02:00
use crate::api::{
auth::{create_jwt, Claims},
control::{control_state, media_info, send_message},
2022-06-09 22:17:03 +02:00
errors::ServiceError,
2022-06-13 13:54:36 +02:00
handles::{
2022-06-16 19:34:43 +02:00
db_add_preset, db_add_user, db_get_presets, db_get_settings, db_login, db_role,
db_update_preset, db_update_settings, db_update_user,
2022-06-13 13:54:36 +02:00
},
2022-06-17 16:21:03 +02:00
models::{LoginUser, Settings, TextPreset, User},
utils::{read_playout_config, Role},
2022-06-09 18:59:14 +02:00
};
2022-06-06 23:07:11 +02:00
2022-06-15 17:32:39 +02:00
use crate::utils::PlayoutConfig;
2022-06-08 18:06:40 +02:00
#[derive(Serialize)]
struct ResponseObj<T> {
message: String,
status: i32,
data: Option<T>,
2022-06-07 18:11:46 +02:00
}
2022-06-08 18:06:40 +02:00
2022-06-12 22:37:29 +02:00
/// curl -X GET http://127.0.0.1:8080/api/settings/1 -H "Authorization: Bearer <TOKEN>"
#[get("/settings/{id}")]
2022-06-13 18:29:37 +02:00
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
2022-06-12 22:37:29 +02:00
async fn get_settings(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
if let Ok(settings) = db_get_settings(&id).await {
return Ok(web::Json(ResponseObj {
message: format!("Settings from {}", settings.channel_name),
status: 200,
data: Some(settings),
}));
}
Err(ServiceError::InternalServerError)
}
/// curl -X PATCH http://127.0.0.1:8080/api/settings/1 -H "Content-Type: application/json" \
/// --data '{"id":1,"channel_name":"Channel 1","preview_url":"http://localhost/live/stream.m3u8", \
/// "config_path":"/etc/ffplayout/ffplayout.yml","extra_extensions":".jpg,.jpeg,.png"}' \
/// -H "Authorization: Bearer <TOKEN>"
#[patch("/settings/{id}")]
2022-06-13 18:29:37 +02:00
#[has_any_role("Role::Admin", type = "Role")]
2022-06-12 22:37:29 +02:00
async fn patch_settings(
id: web::Path<i64>,
data: web::Json<Settings>,
) -> Result<impl Responder, ServiceError> {
2022-06-13 13:54:36 +02:00
if db_update_settings(*id, data.into_inner()).await.is_ok() {
2022-06-12 22:37:29 +02:00
return Ok("Update Success");
};
Err(ServiceError::InternalServerError)
2022-06-09 18:59:14 +02:00
}
/// curl -X GET http://localhost:8080/api/playout/config/1 --header 'Authorization: <TOKEN>'
2022-06-13 18:29:37 +02:00
#[get("/playout/config/{id}")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
async fn get_playout_config(
id: web::Path<i64>,
2022-06-15 17:32:39 +02:00
_details: AuthDetails<Role>,
) -> Result<impl Responder, ServiceError> {
2022-06-13 18:29:37 +02:00
if let Ok(settings) = db_get_settings(&id).await {
if let Ok(config) = read_playout_config(&settings.config_path) {
2022-06-15 17:32:39 +02:00
return Ok(web::Json(config));
}
2022-06-13 18:29:37 +02:00
};
Err(ServiceError::InternalServerError)
}
2022-06-15 17:32:39 +02:00
/// curl -X PUT http://localhost:8080/api/playout/config/1 -H "Content-Type: application/json" \
/// --data { <CONFIG DATA> } --header 'Authorization: <TOKEN>'
#[put("/playout/config/{id}")]
#[has_any_role("Role::Admin", type = "Role")]
async fn update_playout_config(
id: web::Path<i64>,
data: web::Json<PlayoutConfig>,
) -> Result<impl Responder, ServiceError> {
if let Ok(settings) = db_get_settings(&id).await {
if let Ok(f) = std::fs::OpenOptions::new()
.write(true)
.truncate(true)
.open(&settings.config_path)
{
serde_yaml::to_writer(f, &data).unwrap();
return Ok("Update playout config success.");
} else {
return Err(ServiceError::InternalServerError);
};
};
Err(ServiceError::InternalServerError)
}
2022-06-16 19:34:43 +02:00
/// curl -X PUT http://localhost:8080/api/presets/ --header 'Content-Type: application/json' \
/// --data '{"email": "<EMAIL>", "password": "<PASS>"}' --header 'Authorization: <TOKEN>'
#[get("/presets/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
async fn get_presets() -> Result<impl Responder, ServiceError> {
if let Ok(presets) = db_get_presets().await {
return Ok(web::Json(presets));
}
Err(ServiceError::InternalServerError)
}
/// curl -X PUT http://localhost:8080/api/presets/1 --header 'Content-Type: application/json' \
/// --data '{"name": "<PRESET NAME>", "text": "TEXT>", "x": "<X>", "y": "<Y>", "fontsize": 24, \
/// "line_spacing": 4, "fontcolor": "#ffffff", "box": 1, "boxcolor": "#000000", "boxborderw": 4, "alpha": 1.0}}' \
/// --header 'Authorization: <TOKEN>'
#[put("/presets/{id}")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
async fn update_preset(
id: web::Path<i64>,
2022-06-17 16:21:03 +02:00
data: web::Json<TextPreset>,
2022-06-16 19:34:43 +02:00
) -> Result<impl Responder, ServiceError> {
if db_update_preset(&id, data.into_inner()).await.is_ok() {
return Ok("Update Success");
}
Err(ServiceError::InternalServerError)
}
/// curl -X POST http://localhost:8080/api/presets/ --header 'Content-Type: application/json' \
/// --data '{"name": "<PRESET NAME>", "text": "TEXT>", "x": "<X>", "y": "<Y>", "fontsize": 24, \
/// "line_spacing": 4, "fontcolor": "#ffffff", "box": 1, "boxcolor": "#000000", "boxborderw": 4, "alpha": 1.0}}' \
/// --header 'Authorization: <TOKEN>'
#[post("/presets/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
2022-06-17 16:21:03 +02:00
async fn add_preset(data: web::Json<TextPreset>) -> Result<impl Responder, ServiceError> {
2022-06-16 19:34:43 +02:00
if db_add_preset(data.into_inner()).await.is_ok() {
return Ok("Add preset Success");
}
Err(ServiceError::InternalServerError)
}
2022-06-10 16:15:52 +02:00
/// curl -X PUT http://localhost:8080/api/user/1 --header 'Content-Type: application/json' \
/// --data '{"email": "<EMAIL>", "password": "<PASS>"}' --header 'Authorization: <TOKEN>'
2022-06-12 22:37:29 +02:00
#[put("/user/{id}")]
2022-06-13 18:29:37 +02:00
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
2022-06-09 22:17:03 +02:00
async fn update_user(
2022-06-12 22:37:29 +02:00
id: web::Path<i64>,
2022-06-09 22:17:03 +02:00
user: web::ReqData<LoginUser>,
data: web::Json<User>,
) -> Result<impl Responder, ServiceError> {
2022-06-12 22:37:29 +02:00
if id.into_inner() == user.id {
2022-06-10 16:12:30 +02:00
let mut fields = String::new();
if let Some(email) = data.email.clone() {
fields.push_str(format!("email = '{email}'").as_str());
}
if !data.password.is_empty() {
if !fields.is_empty() {
fields.push_str(", ");
}
let salt = SaltString::generate(&mut OsRng);
2022-06-13 13:54:36 +02:00
let password_hash = Argon2::default()
2022-06-10 16:12:30 +02:00
.hash_password(data.password.clone().as_bytes(), &salt)
.unwrap();
fields.push_str(format!("password = '{}', salt = '{salt}'", password_hash).as_str());
}
if db_update_user(user.id, fields).await.is_ok() {
return Ok("Update Success");
};
return Err(ServiceError::InternalServerError);
2022-06-09 18:59:14 +02:00
}
2022-06-09 22:17:03 +02:00
Err(ServiceError::Unauthorized)
2022-06-09 18:59:14 +02:00
}
2022-06-13 13:54:36 +02:00
/// curl -X POST 'http://localhost:8080/api/user/' --header 'Content-Type: application/json' \
/// -d '{"email": "<EMAIL>", "username": "<USER>", "password": "<PASS>", "role_id": 1}' \
/// --header 'Authorization: Bearer <TOKEN>'
#[post("/user/")]
2022-06-13 18:29:37 +02:00
#[has_any_role("Role::Admin", type = "Role")]
2022-06-13 13:54:36 +02:00
async fn add_user(data: web::Json<User>) -> Result<impl Responder, ServiceError> {
match db_add_user(data.into_inner()).await {
Ok(_) => Ok("Add User Success"),
Err(e) => {
error!("{e}");
Err(ServiceError::InternalServerError)
}
}
}
2022-06-10 16:15:52 +02:00
/// curl -X POST http://127.0.0.1:8080/auth/login/ -H "Content-Type: application/json" \
2022-06-13 13:54:36 +02:00
/// -d '{"username": "<USER>", "password": "<PASS>" }'
2022-06-07 18:11:46 +02:00
#[post("/auth/login/")]
2022-06-09 19:20:09 +02:00
pub async fn login(credentials: web::Json<User>) -> impl Responder {
2022-06-10 16:12:30 +02:00
match db_login(&credentials.username).await {
2022-06-08 18:06:40 +02:00
Ok(mut user) => {
let pass = user.password.clone();
2022-06-13 13:54:36 +02:00
let hash = PasswordHash::new(&pass).unwrap();
2022-06-08 18:06:40 +02:00
user.password = "".into();
user.salt = None;
2022-06-07 22:05:35 +02:00
if Argon2::default()
.verify_password(credentials.password.as_bytes(), &hash)
.is_ok()
{
2022-06-10 16:12:30 +02:00
let role = db_role(&user.role_id.unwrap_or_default())
2022-06-09 18:59:14 +02:00
.await
.unwrap_or_else(|_| "guest".to_string());
2022-06-13 18:29:37 +02:00
let claims = Claims::new(user.id, user.username.clone(), role.clone());
2022-06-09 18:59:14 +02:00
if let Ok(token) = create_jwt(claims) {
user.token = Some(token);
};
info!("user {} login, with role: {role}", credentials.username);
2022-06-07 18:11:46 +02:00
2022-06-08 18:06:40 +02:00
web::Json(ResponseObj {
message: "login correct!".into(),
status: 200,
data: Some(user),
})
2022-06-08 18:16:58 +02:00
.customize()
.with_status(StatusCode::OK)
2022-06-08 18:06:40 +02:00
} else {
error!("Wrong password for {}!", credentials.username);
web::Json(ResponseObj {
message: "Wrong password!".into(),
2022-06-13 13:54:36 +02:00
status: 403,
2022-06-08 18:06:40 +02:00
data: None,
})
2022-06-08 18:16:58 +02:00
.customize()
.with_status(StatusCode::FORBIDDEN)
2022-06-08 18:06:40 +02:00
}
}
Err(e) => {
error!("Login {} failed! {e}", credentials.username);
return web::Json(ResponseObj {
message: format!("Login {} failed!", credentials.username),
2022-06-08 18:16:58 +02:00
status: 400,
2022-06-08 18:06:40 +02:00
data: None,
2022-06-08 18:16:58 +02:00
})
.customize()
.with_status(StatusCode::BAD_REQUEST);
2022-06-08 18:06:40 +02:00
}
}
2022-06-07 18:11:46 +02:00
}
2022-06-17 16:21:03 +02:00
/// ----------------------------------------------------------------------------
/// ffplayout process controlling
///
/// here we communicate with the engine for:
/// - jump to last or next clip
/// - reset playlist state
/// - get infos about current, next, last clip
/// - send text the the engine, for overlaying it (as lower third etc.)
/// ----------------------------------------------------------------------------
/// curl -X POST http://localhost:8080/api/control/1/text/ \
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>' \
/// --data '{"text": "Hello from ffplayout", "x": "(w-text_w)/2", "y": "(h-text_h)/2", \
/// "fontsize": "24", "line_spacing": "4", "fontcolor": "#ffffff", "box": "1", \
/// "boxcolor": "#000000", "boxborderw": "4", "alpha": "1.0"}'
#[post("/control/{id}/text/")]
2022-06-17 16:21:03 +02:00
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn send_text_message(
id: web::Path<i64>,
data: web::Json<HashMap<String, String>>,
2022-06-17 16:21:03 +02:00
) -> Result<impl Responder, ServiceError> {
match send_message(*id, data.into_inner()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X POST http://localhost:8080/api/control/1/playout/next/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[post("/control/{id}/playout/next/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn jump_to_next(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match control_state(*id, "next".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X POST http://localhost:8080/api/control/1/playout/back/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[post("/control/{id}/playout/back/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn jump_to_last(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match control_state(*id, "back".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X POST http://localhost:8080/api/control/1/playout/reset/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[post("/control/{id}/playout/reset/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn reset_playout(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match control_state(*id, "reset".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X GET http://localhost:8080/api/control/1/media/current/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[get("/control/{id}/media/current/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn media_current(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match media_info(*id, "current".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X GET http://localhost:8080/api/control/1/media/next/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[get("/control/{id}/media/next/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn media_next(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match media_info(*id, "next".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}
/// curl -X GET http://localhost:8080/api/control/1/media/last/
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
#[get("/control/{id}/media/last/")]
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
pub async fn media_last(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
match media_info(*id, "last".into()).await {
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
Err(e) => Err(e),
}
}