2022-06-19 22:03:17 +02:00
|
|
|
use std::collections::HashMap;
|
|
|
|
|
2022-06-22 18:00:31 +02:00
|
|
|
use actix_multipart::Multipart;
|
|
|
|
use actix_web::{delete, get, http::StatusCode, patch, post, put, web, HttpResponse, Responder};
|
2022-06-14 12:09:31 +02:00
|
|
|
use actix_web_grants::{permissions::AuthDetails, proc_macro::has_any_role};
|
2022-06-10 16:12:30 +02:00
|
|
|
use argon2::{
|
|
|
|
password_hash::{rand_core::OsRng, PasswordHash, SaltString},
|
|
|
|
Argon2, PasswordHasher, PasswordVerifier,
|
|
|
|
};
|
2022-06-08 18:06:40 +02:00
|
|
|
use serde::Serialize;
|
2022-06-07 22:05:35 +02:00
|
|
|
use simplelog::*;
|
2022-06-06 23:07:11 +02:00
|
|
|
|
2022-06-21 23:10:38 +02:00
|
|
|
use crate::utils::{
|
|
|
|
auth::{create_jwt, Claims},
|
2022-06-24 17:41:55 +02:00
|
|
|
control::{control_service, control_state, media_info, send_message, Process},
|
2022-06-21 23:10:38 +02:00
|
|
|
errors::ServiceError,
|
2022-07-01 15:45:24 +02:00
|
|
|
files::{
|
|
|
|
browser, create_directory, remove_file_or_folder, rename_file, upload, MoveObject,
|
|
|
|
PathObject,
|
|
|
|
},
|
2022-06-21 23:10:38 +02:00
|
|
|
handles::{
|
2022-06-30 18:44:42 +02:00
|
|
|
db_add_preset, db_add_user, db_get_all_settings, db_get_presets, db_get_settings,
|
|
|
|
db_get_user, db_login, db_role, db_update_preset, db_update_settings, db_update_user,
|
2022-06-13 13:54:36 +02:00
|
|
|
},
|
2022-06-21 23:10:38 +02:00
|
|
|
models::{LoginUser, Settings, TextPreset, User},
|
|
|
|
playlist::{delete_playlist, generate_playlist, read_playlist, write_playlist},
|
2022-06-30 18:44:42 +02:00
|
|
|
read_log_file, read_playout_config, Role,
|
2022-06-09 18:59:14 +02:00
|
|
|
};
|
2022-06-21 23:10:38 +02:00
|
|
|
use ffplayout_lib::utils::{JsonPlaylist, PlayoutConfig};
|
2022-06-06 23:07:11 +02:00
|
|
|
|
2022-06-08 18:06:40 +02:00
|
|
|
#[derive(Serialize)]
|
|
|
|
struct ResponseObj<T> {
|
|
|
|
message: String,
|
|
|
|
status: i32,
|
|
|
|
data: Option<T>,
|
2022-06-07 18:11:46 +02:00
|
|
|
}
|
2022-06-08 18:06:40 +02:00
|
|
|
|
2022-06-30 18:44:42 +02:00
|
|
|
#[derive(Serialize)]
|
|
|
|
struct UserObj<T> {
|
|
|
|
message: String,
|
|
|
|
user: Option<T>,
|
|
|
|
}
|
|
|
|
|
2022-06-22 21:25:46 +02:00
|
|
|
/// curl -X POST http://127.0.0.1:8080/auth/login/ -H "Content-Type: application/json" \
|
|
|
|
/// -d '{"username": "<USER>", "password": "<PASS>" }'
|
|
|
|
#[post("/auth/login/")]
|
|
|
|
pub async fn login(credentials: web::Json<User>) -> impl Responder {
|
|
|
|
match db_login(&credentials.username).await {
|
|
|
|
Ok(mut user) => {
|
|
|
|
let pass = user.password.clone();
|
|
|
|
let hash = PasswordHash::new(&pass).unwrap();
|
|
|
|
user.password = "".into();
|
|
|
|
user.salt = None;
|
|
|
|
|
|
|
|
if Argon2::default()
|
|
|
|
.verify_password(credentials.password.as_bytes(), &hash)
|
|
|
|
.is_ok()
|
|
|
|
{
|
|
|
|
let role = db_role(&user.role_id.unwrap_or_default())
|
|
|
|
.await
|
|
|
|
.unwrap_or_else(|_| "guest".to_string());
|
|
|
|
let claims = Claims::new(user.id, user.username.clone(), role.clone());
|
|
|
|
|
|
|
|
if let Ok(token) = create_jwt(claims) {
|
|
|
|
user.token = Some(token);
|
|
|
|
};
|
|
|
|
|
|
|
|
info!("user {} login, with role: {role}", credentials.username);
|
|
|
|
|
2022-06-30 18:44:42 +02:00
|
|
|
web::Json(UserObj {
|
2022-06-22 21:25:46 +02:00
|
|
|
message: "login correct!".into(),
|
2022-06-30 18:44:42 +02:00
|
|
|
user: Some(user),
|
2022-06-22 21:25:46 +02:00
|
|
|
})
|
|
|
|
.customize()
|
|
|
|
.with_status(StatusCode::OK)
|
|
|
|
} else {
|
|
|
|
error!("Wrong password for {}!", credentials.username);
|
2022-06-30 18:44:42 +02:00
|
|
|
web::Json(UserObj {
|
2022-06-22 21:25:46 +02:00
|
|
|
message: "Wrong password!".into(),
|
2022-06-30 18:44:42 +02:00
|
|
|
user: None,
|
2022-06-22 21:25:46 +02:00
|
|
|
})
|
|
|
|
.customize()
|
|
|
|
.with_status(StatusCode::FORBIDDEN)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
error!("Login {} failed! {e}", credentials.username);
|
2022-06-30 18:44:42 +02:00
|
|
|
return web::Json(UserObj {
|
2022-06-22 21:25:46 +02:00
|
|
|
message: format!("Login {} failed!", credentials.username),
|
2022-06-30 18:44:42 +02:00
|
|
|
user: None,
|
2022-06-22 21:25:46 +02:00
|
|
|
})
|
|
|
|
.customize()
|
|
|
|
.with_status(StatusCode::BAD_REQUEST);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-30 18:44:42 +02:00
|
|
|
/// curl -X GET 'http://localhost:8080/api/user' --header 'Content-Type: application/json' \
|
|
|
|
/// --header 'Authorization: Bearer <TOKEN>'
|
|
|
|
#[get("/user")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
async fn get_user(user: web::ReqData<LoginUser>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match db_get_user(&user.username).await {
|
|
|
|
Ok(user) => Ok(web::Json(user)),
|
|
|
|
Err(e) => {
|
|
|
|
error!("{e}");
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-22 21:25:46 +02:00
|
|
|
/// curl -X PUT http://localhost:8080/api/user/1 --header 'Content-Type: application/json' \
|
2022-06-30 18:44:42 +02:00
|
|
|
/// --data '{"mail": "<MAIL>", "password": "<PASS>"}' --header 'Authorization: <TOKEN>'
|
2022-06-22 21:25:46 +02:00
|
|
|
#[put("/user/{id}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
async fn update_user(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
user: web::ReqData<LoginUser>,
|
|
|
|
data: web::Json<User>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
if id.into_inner() == user.id {
|
|
|
|
let mut fields = String::new();
|
|
|
|
|
2022-06-30 18:44:42 +02:00
|
|
|
if let Some(mail) = data.mail.clone() {
|
|
|
|
fields.push_str(format!("mail = '{mail}'").as_str());
|
2022-06-22 21:25:46 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if !data.password.is_empty() {
|
|
|
|
if !fields.is_empty() {
|
|
|
|
fields.push_str(", ");
|
|
|
|
}
|
|
|
|
|
|
|
|
let salt = SaltString::generate(&mut OsRng);
|
|
|
|
let password_hash = Argon2::default()
|
|
|
|
.hash_password(data.password.clone().as_bytes(), &salt)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
fields.push_str(format!("password = '{}', salt = '{salt}'", password_hash).as_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
if db_update_user(user.id, fields).await.is_ok() {
|
|
|
|
return Ok("Update Success");
|
|
|
|
};
|
|
|
|
|
|
|
|
return Err(ServiceError::InternalServerError);
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::Unauthorized)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X POST 'http://localhost:8080/api/user/' --header 'Content-Type: application/json' \
|
2022-06-30 18:44:42 +02:00
|
|
|
/// -d '{"mail": "<MAIL>", "username": "<USER>", "password": "<PASS>", "role_id": 1}' \
|
2022-06-22 21:25:46 +02:00
|
|
|
/// --header 'Authorization: Bearer <TOKEN>'
|
|
|
|
#[post("/user/")]
|
|
|
|
#[has_any_role("Role::Admin", type = "Role")]
|
|
|
|
async fn add_user(data: web::Json<User>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match db_add_user(data.into_inner()).await {
|
|
|
|
Ok(_) => Ok("Add User Success"),
|
|
|
|
Err(e) => {
|
|
|
|
error!("{e}");
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-12 22:37:29 +02:00
|
|
|
/// curl -X GET http://127.0.0.1:8080/api/settings/1 -H "Authorization: Bearer <TOKEN>"
|
|
|
|
#[get("/settings/{id}")]
|
2022-06-13 18:29:37 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
2022-06-12 22:37:29 +02:00
|
|
|
async fn get_settings(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
if let Ok(settings) = db_get_settings(&id).await {
|
2022-06-30 18:44:42 +02:00
|
|
|
return Ok(web::Json(settings));
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X GET http://127.0.0.1:8080/api/settings -H "Authorization: Bearer <TOKEN>"
|
|
|
|
#[get("/settings")]
|
|
|
|
#[has_any_role("Role::Admin", type = "Role")]
|
|
|
|
async fn get_all_settings() -> Result<impl Responder, ServiceError> {
|
|
|
|
if let Ok(settings) = db_get_all_settings().await {
|
|
|
|
return Ok(web::Json(settings));
|
2022-06-12 22:37:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X PATCH http://127.0.0.1:8080/api/settings/1 -H "Content-Type: application/json" \
|
|
|
|
/// --data '{"id":1,"channel_name":"Channel 1","preview_url":"http://localhost/live/stream.m3u8", \
|
|
|
|
/// "config_path":"/etc/ffplayout/ffplayout.yml","extra_extensions":".jpg,.jpeg,.png"}' \
|
|
|
|
/// -H "Authorization: Bearer <TOKEN>"
|
|
|
|
#[patch("/settings/{id}")]
|
2022-06-13 18:29:37 +02:00
|
|
|
#[has_any_role("Role::Admin", type = "Role")]
|
2022-06-12 22:37:29 +02:00
|
|
|
async fn patch_settings(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<Settings>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
2022-06-13 13:54:36 +02:00
|
|
|
if db_update_settings(*id, data.into_inner()).await.is_ok() {
|
2022-06-12 22:37:29 +02:00
|
|
|
return Ok("Update Success");
|
|
|
|
};
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
2022-06-09 18:59:14 +02:00
|
|
|
}
|
|
|
|
|
2022-06-14 12:09:31 +02:00
|
|
|
/// curl -X GET http://localhost:8080/api/playout/config/1 --header 'Authorization: <TOKEN>'
|
2022-06-13 18:29:37 +02:00
|
|
|
#[get("/playout/config/{id}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
2022-06-14 12:09:31 +02:00
|
|
|
async fn get_playout_config(
|
|
|
|
id: web::Path<i64>,
|
2022-06-15 17:32:39 +02:00
|
|
|
_details: AuthDetails<Role>,
|
2022-06-14 12:09:31 +02:00
|
|
|
) -> Result<impl Responder, ServiceError> {
|
2022-06-13 18:29:37 +02:00
|
|
|
if let Ok(settings) = db_get_settings(&id).await {
|
2022-06-14 12:09:31 +02:00
|
|
|
if let Ok(config) = read_playout_config(&settings.config_path) {
|
2022-06-15 17:32:39 +02:00
|
|
|
return Ok(web::Json(config));
|
2022-06-14 12:09:31 +02:00
|
|
|
}
|
2022-06-13 18:29:37 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
2022-06-22 21:25:46 +02:00
|
|
|
/// curl -X PUT http://localhost:8080/api/playout/config/1 -H "Content-Type: application/json" \
|
2022-06-15 17:32:39 +02:00
|
|
|
/// --data { <CONFIG DATA> } --header 'Authorization: <TOKEN>'
|
|
|
|
#[put("/playout/config/{id}")]
|
|
|
|
#[has_any_role("Role::Admin", type = "Role")]
|
|
|
|
async fn update_playout_config(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<PlayoutConfig>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
if let Ok(settings) = db_get_settings(&id).await {
|
|
|
|
if let Ok(f) = std::fs::OpenOptions::new()
|
|
|
|
.write(true)
|
|
|
|
.truncate(true)
|
|
|
|
.open(&settings.config_path)
|
|
|
|
{
|
|
|
|
serde_yaml::to_writer(f, &data).unwrap();
|
|
|
|
|
|
|
|
return Ok("Update playout config success.");
|
|
|
|
} else {
|
|
|
|
return Err(ServiceError::InternalServerError);
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
2022-06-22 21:25:46 +02:00
|
|
|
/// curl -X GET http://localhost:8080/api/presets/ --header 'Content-Type: application/json' \
|
2022-06-30 18:44:42 +02:00
|
|
|
/// --data '{"mail": "<MAIL>", "password": "<PASS>"}' --header 'Authorization: <TOKEN>'
|
|
|
|
#[get("/presets/{id}")]
|
2022-06-16 19:34:43 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
2022-06-30 18:44:42 +02:00
|
|
|
async fn get_presets(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
if let Ok(presets) = db_get_presets(*id).await {
|
2022-06-16 19:34:43 +02:00
|
|
|
return Ok(web::Json(presets));
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X PUT http://localhost:8080/api/presets/1 --header 'Content-Type: application/json' \
|
2022-06-22 21:25:46 +02:00
|
|
|
/// --data '{"name": "<PRESET NAME>", "text": "<TEXT>", "x": "<X>", "y": "<Y>", "fontsize": 24, \
|
|
|
|
/// "line_spacing": 4, "fontcolor": "#ffffff", "box": 1, "boxcolor": "#000000", "boxborderw": 4, "alpha": 1.0}' \
|
2022-06-16 19:34:43 +02:00
|
|
|
/// --header 'Authorization: <TOKEN>'
|
|
|
|
#[put("/presets/{id}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
async fn update_preset(
|
|
|
|
id: web::Path<i64>,
|
2022-06-17 16:21:03 +02:00
|
|
|
data: web::Json<TextPreset>,
|
2022-06-16 19:34:43 +02:00
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
if db_update_preset(&id, data.into_inner()).await.is_ok() {
|
|
|
|
return Ok("Update Success");
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X POST http://localhost:8080/api/presets/ --header 'Content-Type: application/json' \
|
|
|
|
/// --data '{"name": "<PRESET NAME>", "text": "TEXT>", "x": "<X>", "y": "<Y>", "fontsize": 24, \
|
|
|
|
/// "line_spacing": 4, "fontcolor": "#ffffff", "box": 1, "boxcolor": "#000000", "boxborderw": 4, "alpha": 1.0}}' \
|
|
|
|
/// --header 'Authorization: <TOKEN>'
|
|
|
|
#[post("/presets/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
2022-06-17 16:21:03 +02:00
|
|
|
async fn add_preset(data: web::Json<TextPreset>) -> Result<impl Responder, ServiceError> {
|
2022-06-16 19:34:43 +02:00
|
|
|
if db_add_preset(data.into_inner()).await.is_ok() {
|
|
|
|
return Ok("Add preset Success");
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(ServiceError::InternalServerError)
|
|
|
|
}
|
|
|
|
|
2022-06-17 16:21:03 +02:00
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
/// ffplayout process controlling
|
|
|
|
///
|
|
|
|
/// here we communicate with the engine for:
|
|
|
|
/// - jump to last or next clip
|
|
|
|
/// - reset playlist state
|
|
|
|
/// - get infos about current, next, last clip
|
|
|
|
/// - send text the the engine, for overlaying it (as lower third etc.)
|
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
|
2022-06-19 22:03:17 +02:00
|
|
|
/// curl -X POST http://localhost:8080/api/control/1/text/ \
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>' \
|
|
|
|
/// --data '{"text": "Hello from ffplayout", "x": "(w-text_w)/2", "y": "(h-text_h)/2", \
|
|
|
|
/// "fontsize": "24", "line_spacing": "4", "fontcolor": "#ffffff", "box": "1", \
|
|
|
|
/// "boxcolor": "#000000", "boxborderw": "4", "alpha": "1.0"}'
|
|
|
|
#[post("/control/{id}/text/")]
|
2022-06-17 16:21:03 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn send_text_message(
|
|
|
|
id: web::Path<i64>,
|
2022-06-19 22:03:17 +02:00
|
|
|
data: web::Json<HashMap<String, String>>,
|
2022-06-17 16:21:03 +02:00
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match send_message(*id, data.into_inner()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
2022-06-19 22:03:17 +02:00
|
|
|
|
|
|
|
/// curl -X POST http://localhost:8080/api/control/1/playout/next/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[post("/control/{id}/playout/next/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn jump_to_next(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match control_state(*id, "next".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X POST http://localhost:8080/api/control/1/playout/back/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[post("/control/{id}/playout/back/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn jump_to_last(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match control_state(*id, "back".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X POST http://localhost:8080/api/control/1/playout/reset/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[post("/control/{id}/playout/reset/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn reset_playout(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match control_state(*id, "reset".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X GET http://localhost:8080/api/control/1/media/current/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
2022-06-19 22:55:10 +02:00
|
|
|
#[get("/control/{id}/media/current")]
|
2022-06-19 22:03:17 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn media_current(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match media_info(*id, "current".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X GET http://localhost:8080/api/control/1/media/next/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
2022-06-19 22:55:10 +02:00
|
|
|
#[get("/control/{id}/media/next")]
|
2022-06-19 22:03:17 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn media_next(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match media_info(*id, "next".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X GET http://localhost:8080/api/control/1/media/last/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
2022-06-19 22:55:10 +02:00
|
|
|
#[get("/control/{id}/media/last")]
|
2022-06-19 22:03:17 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn media_last(id: web::Path<i64>) -> Result<impl Responder, ServiceError> {
|
|
|
|
match media_info(*id, "last".into()).await {
|
|
|
|
Ok(res) => return Ok(res.text().await.unwrap_or_else(|_| "Success".into())),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
2022-06-19 22:55:10 +02:00
|
|
|
|
2022-06-24 17:41:55 +02:00
|
|
|
/// curl -X GET http://localhost:8080/api/control/1/process/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
/// -d '{"command": "start"}'
|
|
|
|
#[post("/control/{id}/process/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn process_control(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
proc: web::Json<Process>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
control_service(*id, &proc.command).await
|
|
|
|
}
|
|
|
|
|
2022-06-19 22:55:10 +02:00
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
/// ffplayout playlist operations
|
|
|
|
///
|
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
/// curl -X GET http://localhost:8080/api/playlist/1/2022-06-20
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[get("/playlist/{id}/{date}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn get_playlist(
|
|
|
|
params: web::Path<(i64, String)>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match read_playlist(params.0, params.1.clone()).await {
|
|
|
|
Ok(playlist) => Ok(web::Json(playlist)),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
2022-06-20 18:11:27 +02:00
|
|
|
|
|
|
|
/// curl -X POST http://localhost:8080/api/playlist/1/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
/// -- data "{<JSON playlist data>}"
|
|
|
|
#[post("/playlist/{id}/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn save_playlist(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<JsonPlaylist>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match write_playlist(*id, data.into_inner()).await {
|
|
|
|
Ok(res) => Ok(res),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-21 17:56:10 +02:00
|
|
|
/// curl -X GET http://localhost:8080/api/playlist/1/generate/2022-06-20
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[get("/playlist/{id}/generate/{date}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn gen_playlist(
|
|
|
|
params: web::Path<(i64, String)>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match generate_playlist(params.0, params.1.clone()).await {
|
|
|
|
Ok(playlist) => Ok(web::Json(playlist)),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-20 18:11:27 +02:00
|
|
|
/// curl -X DELETE http://localhost:8080/api/playlist/1/2022-06-20
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[delete("/playlist/{id}/{date}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn del_playlist(
|
|
|
|
params: web::Path<(i64, String)>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match delete_playlist(params.0, ¶ms.1).await {
|
|
|
|
Ok(_) => Ok(format!("Delete playlist from {} success!", params.1)),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-30 18:44:42 +02:00
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
/// read log file
|
|
|
|
///
|
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
#[get("/log/{req:.*}")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn get_log(req: web::Path<String>) -> Result<impl Responder, ServiceError> {
|
|
|
|
let mut segments = req.split('/');
|
|
|
|
let id: i64 = segments.next().unwrap_or_default().parse().unwrap_or(0);
|
|
|
|
let date = segments.next().unwrap_or_default();
|
|
|
|
|
|
|
|
read_log_file(&id, date).await
|
|
|
|
}
|
|
|
|
|
2022-06-20 18:11:27 +02:00
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
/// file operations
|
|
|
|
///
|
|
|
|
/// ----------------------------------------------------------------------------
|
|
|
|
|
2022-06-22 18:00:31 +02:00
|
|
|
/// curl -X GET http://localhost:8080/api/file/1/browse/
|
2022-06-20 18:11:27 +02:00
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
#[post("/file/{id}/browse/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn file_browser(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<PathObject>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match browser(*id, &data.into_inner()).await {
|
2022-06-20 22:19:41 +02:00
|
|
|
Ok(obj) => Ok(web::Json(obj)),
|
2022-06-20 18:11:27 +02:00
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
2022-06-22 18:00:31 +02:00
|
|
|
|
2022-07-01 15:45:24 +02:00
|
|
|
/// curl -X POST http://localhost:8080/api/file/1/create-folder/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
/// -d '{"source": "<FOLDER PATH>"}'
|
|
|
|
#[post("/file/{id}/create-folder/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn add_dir(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<PathObject>,
|
|
|
|
) -> Result<HttpResponse, ServiceError> {
|
|
|
|
create_directory(*id, &data.into_inner()).await
|
|
|
|
}
|
|
|
|
|
2022-06-22 18:00:31 +02:00
|
|
|
/// curl -X POST http://localhost:8080/api/file/1/move/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
|
|
|
/// -d '{"source": "<SOURCE>", "target": "<TARGET>"}'
|
2022-07-03 21:21:46 +02:00
|
|
|
#[post("/file/{id}/rename/")]
|
2022-06-22 18:00:31 +02:00
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn move_rename(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<MoveObject>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match rename_file(*id, &data.into_inner()).await {
|
|
|
|
Ok(obj) => Ok(web::Json(obj)),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// curl -X DELETE http://localhost:8080/api/file/1/remove/
|
|
|
|
/// --header 'Content-Type: application/json' --header 'Authorization: <TOKEN>'
|
2022-06-22 21:25:46 +02:00
|
|
|
/// -d '{"source": "<SOURCE>"}'
|
2022-06-22 18:00:31 +02:00
|
|
|
#[delete("/file/{id}/remove/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
pub async fn remove(
|
|
|
|
id: web::Path<i64>,
|
|
|
|
data: web::Json<PathObject>,
|
|
|
|
) -> Result<impl Responder, ServiceError> {
|
|
|
|
match remove_file_or_folder(*id, &data.into_inner().source).await {
|
|
|
|
Ok(obj) => Ok(web::Json(obj)),
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[post("/file/{id}/upload/")]
|
|
|
|
#[has_any_role("Role::Admin", "Role::User", type = "Role")]
|
|
|
|
async fn save_file(id: web::Path<i64>, payload: Multipart) -> Result<HttpResponse, ServiceError> {
|
|
|
|
upload(*id, payload).await
|
|
|
|
}
|