mirror of
https://github.com/idanoo/GoScrobble.git
synced 2024-11-22 08:25:14 +00:00
282 lines
6.8 KiB
Go
282 lines
6.8 KiB
Go
package goscrobble
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/gorilla/mux"
|
|
"github.com/rs/cors"
|
|
)
|
|
|
|
// spaHandler - Handles Single Page Applications (React)
|
|
type spaHandler struct {
|
|
staticPath string
|
|
indexPath string
|
|
}
|
|
|
|
type jsonResponse struct {
|
|
Err string `json:"error,omitempty"`
|
|
Msg string `json:"message,omitempty"`
|
|
}
|
|
|
|
// Limits to 1 req / 10 sec
|
|
var heavyLimiter = NewIPRateLimiter(0.25, 2)
|
|
|
|
// Limits to 5 req / sec
|
|
var standardLimiter = NewIPRateLimiter(1, 5)
|
|
|
|
// List of Reverse proxies
|
|
var ReverseProxies []string
|
|
|
|
func enableCors(w *http.ResponseWriter) {
|
|
(*w).Header().Set("Access-Control-Allow-Origin", "*")
|
|
}
|
|
|
|
// HandleRequests - Boot HTTP!
|
|
func HandleRequests(port string) {
|
|
// Create a new router
|
|
r := mux.NewRouter().StrictSlash(true)
|
|
|
|
v1 := r.PathPrefix("/api/v1").Subrouter()
|
|
|
|
// Static Token for /ingress
|
|
v1.HandleFunc("/ingress/jellyfin", tokenMiddleware(handleIngress))
|
|
|
|
// JWT Auth
|
|
// v1.HandleFunc("/profile/{id}", jwtMiddleware(handleIngress))
|
|
|
|
// No Auth
|
|
v1.HandleFunc("/register", limitMiddleware(handleRegister, heavyLimiter)).Methods("POST")
|
|
v1.HandleFunc("/login", limitMiddleware(handleLogin, standardLimiter)).Methods("POST")
|
|
// For now just trash JWT in frontend until we have full state management "Good enough"
|
|
// v1.HandleFunc("/logout", handleIngress).Methods("POST")
|
|
|
|
// This just prevents it serving frontend stuff over /api
|
|
r.PathPrefix("/api")
|
|
|
|
// SERVE FRONTEND - NO AUTH
|
|
spa := spaHandler{staticPath: "web/build", indexPath: "index.html"}
|
|
r.PathPrefix("/").Handler(spa)
|
|
|
|
c := cors.New(cors.Options{
|
|
// Grrrr CORS
|
|
AllowedOrigins: []string{"*"},
|
|
AllowCredentials: true,
|
|
})
|
|
handler := c.Handler(r)
|
|
|
|
// Serve it up!
|
|
fmt.Printf("Goscrobble listening on port %s", port)
|
|
log.Fatal(http.ListenAndServe(":"+port, handler))
|
|
}
|
|
|
|
// MIDDLEWARE
|
|
// throwUnauthorized - Throws a 403
|
|
func throwUnauthorized(w http.ResponseWriter, m string) {
|
|
jr := jsonResponse{
|
|
Err: m,
|
|
}
|
|
js, _ := json.Marshal(&jr)
|
|
err := errors.New(string(js))
|
|
http.Error(w, err.Error(), http.StatusUnauthorized)
|
|
}
|
|
|
|
// throwUnauthorized - Throws a 403
|
|
func throwBadReq(w http.ResponseWriter, m string) {
|
|
jr := jsonResponse{
|
|
Err: m,
|
|
}
|
|
js, _ := json.Marshal(&jr)
|
|
err := errors.New(string(js))
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
}
|
|
|
|
// throwUnauthorized - Throws a 403
|
|
func throwOkMessage(w http.ResponseWriter, m string) {
|
|
jr := jsonResponse{
|
|
Err: m,
|
|
}
|
|
js, _ := json.Marshal(&jr)
|
|
err := errors.New(string(js))
|
|
http.Error(w, err.Error(), http.StatusOK)
|
|
}
|
|
|
|
// generateJsonMessage - Generates a message:str response
|
|
func generateJsonMessage(m string) []byte {
|
|
jr := jsonResponse{
|
|
Msg: m,
|
|
}
|
|
js, _ := json.Marshal(&jr)
|
|
return js
|
|
}
|
|
|
|
// generateJsonError - Generates a err:str response
|
|
func generateJsonError(m string) []byte {
|
|
jr := jsonResponse{
|
|
Err: m,
|
|
}
|
|
js, _ := json.Marshal(&jr)
|
|
return js
|
|
}
|
|
|
|
// tokenMiddleware - Validates token to a user
|
|
func tokenMiddleware(next http.HandlerFunc) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
fullToken := r.Header.Get("Authorization")
|
|
authToken := strings.Replace(fullToken, "Bearer ", "", 1)
|
|
if authToken == "" {
|
|
throwUnauthorized(w, "A token is required")
|
|
}
|
|
|
|
userUuid, err := getUserForToken(authToken)
|
|
if err != nil {
|
|
throwUnauthorized(w, err.Error())
|
|
return
|
|
}
|
|
|
|
// Lets tack this on the request for now..
|
|
r.Header.Set("UserUUID", userUuid)
|
|
next(w, r)
|
|
}
|
|
}
|
|
|
|
// jwtMiddleware - Validates middleware to a user
|
|
func jwtMiddleware(next http.HandlerFunc) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
throwUnauthorized(w, "Invalid JWT Token")
|
|
next(w, r)
|
|
}
|
|
}
|
|
|
|
// limitMiddleware - Rate limits important stuff
|
|
func limitMiddleware(next http.HandlerFunc, limiter *IPRateLimiter) http.HandlerFunc {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
limiter := limiter.GetLimiter(r.RemoteAddr)
|
|
if !limiter.Allow() {
|
|
msg := generateJsonMessage("Too many requests")
|
|
w.WriteHeader(http.StatusTooManyRequests)
|
|
w.Write(msg)
|
|
return
|
|
}
|
|
|
|
next(w, r)
|
|
})
|
|
}
|
|
|
|
// API ENDPOINT HANDLING
|
|
|
|
// handleRegister - Does as it says!
|
|
func handleRegister(w http.ResponseWriter, r *http.Request) {
|
|
regReq := RegisterRequest{}
|
|
decoder := json.NewDecoder(r.Body)
|
|
err := decoder.Decode(®Req)
|
|
if err != nil {
|
|
throwBadReq(w, err.Error())
|
|
return
|
|
}
|
|
|
|
ip := getUserIp(r)
|
|
err = createUser(®Req, ip)
|
|
if err != nil {
|
|
throwOkMessage(w, err.Error())
|
|
return
|
|
}
|
|
|
|
msg := generateJsonMessage("User created succesfully. You may now login")
|
|
w.WriteHeader(http.StatusCreated)
|
|
w.Write(msg)
|
|
}
|
|
|
|
// handleLogin - Does as it says!
|
|
func handleLogin(w http.ResponseWriter, r *http.Request) {
|
|
logReq := LoginRequest{}
|
|
decoder := json.NewDecoder(r.Body)
|
|
err := decoder.Decode(&logReq)
|
|
if err != nil {
|
|
throwBadReq(w, err.Error())
|
|
return
|
|
}
|
|
|
|
ip := getUserIp(r)
|
|
data, err := loginUser(&logReq, ip)
|
|
if err != nil {
|
|
throwOkMessage(w, err.Error())
|
|
return
|
|
}
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
w.Write(data)
|
|
}
|
|
|
|
// serveEndpoint - API stuffs
|
|
func handleIngress(w http.ResponseWriter, r *http.Request) {
|
|
bodyJson, err := decodeJson(r.Body)
|
|
if err != nil {
|
|
// If we can't decode. Lets tell them nicely.
|
|
http.Error(w, "{\"error\":\"Invalid JSON\"}", http.StatusBadRequest)
|
|
return
|
|
}
|
|
ingressType := strings.Replace(r.URL.Path, "/api/v1/ingress/", "", 1)
|
|
log.Println(ingressType)
|
|
switch ingressType {
|
|
case "jellyfin":
|
|
tx, _ := db.Begin()
|
|
ip := getUserIp(r)
|
|
err := ParseJellyfinInput(r.Header.Get("UserUUID"), bodyJson, ip, tx)
|
|
if err != nil {
|
|
log.Printf("Error inserting track: %+v", err)
|
|
tx.Rollback()
|
|
throwBadReq(w, err.Error())
|
|
return
|
|
}
|
|
err = tx.Commit()
|
|
if err != nil {
|
|
throwBadReq(w, err.Error())
|
|
return
|
|
}
|
|
|
|
throwOkMessage(w, "{}")
|
|
return
|
|
}
|
|
// Lets trick 'em for now ;) ;)
|
|
fmt.Fprintf(w, "{}")
|
|
}
|
|
|
|
// FRONTEND HANDLING
|
|
|
|
// ServerHTTP - Frontend server
|
|
func (h spaHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
// Get the absolute path to prevent directory traversal
|
|
path, err := filepath.Abs(r.URL.Path)
|
|
if err != nil {
|
|
// If we failed to get the absolute path respond with a 400 bad request and return
|
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// prepend the path with the path to the static directory
|
|
path = filepath.Join(h.staticPath, path)
|
|
|
|
// check whether a file exists at the given path
|
|
_, err = os.Stat(path)
|
|
if os.IsNotExist(err) {
|
|
// file does not exist, serve index.html
|
|
http.ServeFile(w, r, filepath.Join(h.staticPath, h.indexPath))
|
|
return
|
|
} else if err != nil {
|
|
// if we got an error (that wasn't that the file doesn't exist) stating the
|
|
// file, return a 500 internal server error and stop
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
// otherwise, use http.FileServer to serve the static dir
|
|
http.FileServer(http.Dir(h.staticPath)).ServeHTTP(w, r)
|
|
}
|