2024-01-29 20:11:57 +00:00
|
|
|
package s5
|
2024-01-12 04:13:10 +00:00
|
|
|
|
|
|
|
import (
|
2024-02-16 13:49:19 +00:00
|
|
|
"bytes"
|
2024-01-28 07:20:59 +00:00
|
|
|
"context"
|
|
|
|
"crypto/ed25519"
|
2024-02-16 13:49:19 +00:00
|
|
|
"crypto/rand"
|
2024-02-07 22:39:18 +00:00
|
|
|
_ "embed"
|
2024-02-16 13:49:19 +00:00
|
|
|
"encoding/base64"
|
|
|
|
"encoding/hex"
|
|
|
|
"errors"
|
2024-01-28 07:20:59 +00:00
|
|
|
"fmt"
|
2024-02-25 14:47:40 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/api/router"
|
2024-02-25 12:23:30 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/bao"
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/renter"
|
|
|
|
"github.com/aws/aws-sdk-go-v2/aws"
|
|
|
|
"github.com/aws/aws-sdk-go-v2/service/s3"
|
2024-02-16 13:49:19 +00:00
|
|
|
"io"
|
|
|
|
"math"
|
|
|
|
"mime/multipart"
|
2024-02-16 13:39:55 +00:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2024-02-16 13:49:19 +00:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2024-02-25 12:23:30 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/cron"
|
|
|
|
|
2024-02-22 07:09:31 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/config"
|
|
|
|
|
2024-02-17 08:05:22 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/api/swagger"
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/metadata"
|
|
|
|
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/storage"
|
|
|
|
|
2024-02-16 13:49:19 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/encoding"
|
2024-02-17 03:00:53 +00:00
|
|
|
s5libmetadata "git.lumeweb.com/LumeWeb/libs5-go/metadata"
|
2024-02-16 13:49:19 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/node"
|
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/protocol"
|
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/service"
|
|
|
|
storage2 "git.lumeweb.com/LumeWeb/libs5-go/storage"
|
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/storage/provider"
|
|
|
|
"git.lumeweb.com/LumeWeb/libs5-go/types"
|
|
|
|
"git.lumeweb.com/LumeWeb/portal/db/models"
|
|
|
|
"github.com/samber/lo"
|
|
|
|
"github.com/vmihailenco/msgpack/v5"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"gorm.io/gorm"
|
|
|
|
"nhooyr.io/websocket"
|
2024-02-16 13:39:55 +00:00
|
|
|
|
|
|
|
"github.com/julienschmidt/httprouter"
|
|
|
|
|
2024-01-28 07:20:59 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/account"
|
2024-01-19 22:08:05 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/api/middleware"
|
2024-01-28 07:20:59 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/api/registry"
|
|
|
|
protoRegistry "git.lumeweb.com/LumeWeb/portal/protocols/registry"
|
2024-01-29 20:11:57 +00:00
|
|
|
"git.lumeweb.com/LumeWeb/portal/protocols/s5"
|
2024-02-25 12:23:30 +00:00
|
|
|
"github.com/ddo/rq"
|
2024-02-25 14:47:40 +00:00
|
|
|
"github.com/dnslink-std/go"
|
2024-01-25 23:25:10 +00:00
|
|
|
"github.com/rs/cors"
|
2024-01-16 16:42:50 +00:00
|
|
|
"go.sia.tech/jape"
|
2024-01-28 07:20:59 +00:00
|
|
|
"go.uber.org/fx"
|
2024-01-12 04:13:10 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2024-02-25 14:47:40 +00:00
|
|
|
_ registry.API = (*S5API)(nil)
|
|
|
|
_ router.RoutableAPI = (*S5API)(nil)
|
2024-01-12 04:13:10 +00:00
|
|
|
)
|
|
|
|
|
2024-02-07 22:39:18 +00:00
|
|
|
//go:embed swagger.yaml
|
2024-02-17 08:05:22 +00:00
|
|
|
var swagSpec []byte
|
2024-02-08 00:18:11 +00:00
|
|
|
|
2024-01-12 04:13:10 +00:00
|
|
|
type S5API struct {
|
2024-02-22 07:09:31 +00:00
|
|
|
config *config.Manager
|
2024-02-17 03:00:53 +00:00
|
|
|
identity ed25519.PrivateKey
|
|
|
|
accounts *account.AccountServiceDefault
|
|
|
|
storage storage.StorageService
|
|
|
|
metadata metadata.MetadataService
|
|
|
|
db *gorm.DB
|
|
|
|
protocols []protoRegistry.Protocol
|
|
|
|
protocol *s5.S5Protocol
|
|
|
|
logger *zap.Logger
|
|
|
|
tusHandler *s5.TusHandler
|
2024-02-25 12:23:30 +00:00
|
|
|
cron *cron.CronServiceDefault
|
2024-01-12 04:13:10 +00:00
|
|
|
}
|
|
|
|
|
2024-01-29 20:11:57 +00:00
|
|
|
type APIParams struct {
|
2024-01-28 07:20:59 +00:00
|
|
|
fx.In
|
2024-02-22 07:09:31 +00:00
|
|
|
Config *config.Manager
|
2024-02-17 03:00:53 +00:00
|
|
|
Identity ed25519.PrivateKey
|
|
|
|
Accounts *account.AccountServiceDefault
|
|
|
|
Storage storage.StorageService
|
2024-02-18 04:27:37 +00:00
|
|
|
Metadata metadata.MetadataService
|
2024-02-17 03:00:53 +00:00
|
|
|
Db *gorm.DB
|
|
|
|
Protocols []protoRegistry.Protocol `group:"protocol"`
|
|
|
|
Logger *zap.Logger
|
|
|
|
TusHandler *s5.TusHandler
|
2024-02-25 12:23:30 +00:00
|
|
|
Cron *cron.CronServiceDefault
|
2024-01-12 04:13:10 +00:00
|
|
|
}
|
|
|
|
|
2024-01-28 07:20:59 +00:00
|
|
|
type S5ApiResult struct {
|
|
|
|
fx.Out
|
2024-01-28 09:01:36 +00:00
|
|
|
API registry.API `group:"api"`
|
|
|
|
S5API *S5API
|
2024-01-28 07:20:59 +00:00
|
|
|
}
|
|
|
|
|
2024-01-29 20:11:57 +00:00
|
|
|
func NewS5(params APIParams) (S5ApiResult, error) {
|
2024-01-28 09:01:36 +00:00
|
|
|
api := &S5API{
|
2024-02-17 03:00:53 +00:00
|
|
|
config: params.Config,
|
|
|
|
identity: params.Identity,
|
|
|
|
accounts: params.Accounts,
|
|
|
|
storage: params.Storage,
|
2024-02-18 04:27:37 +00:00
|
|
|
metadata: params.Metadata,
|
2024-02-17 03:00:53 +00:00
|
|
|
db: params.Db,
|
|
|
|
protocols: params.Protocols,
|
|
|
|
logger: params.Logger,
|
|
|
|
tusHandler: params.TusHandler,
|
2024-02-25 12:23:30 +00:00
|
|
|
cron: params.Cron,
|
2024-01-28 09:01:36 +00:00
|
|
|
}
|
2024-01-28 07:20:59 +00:00
|
|
|
return S5ApiResult{
|
2024-01-28 09:01:36 +00:00
|
|
|
API: api,
|
|
|
|
S5API: api,
|
2024-01-28 07:20:59 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2024-01-29 20:11:57 +00:00
|
|
|
var Module = fx.Module("s5_api",
|
2024-01-28 07:20:59 +00:00
|
|
|
fx.Provide(NewS5),
|
|
|
|
)
|
|
|
|
|
|
|
|
func (s *S5API) Init() error {
|
|
|
|
s5protocol := protoRegistry.FindProtocolByName("s5", s.protocols)
|
|
|
|
if s5protocol == nil {
|
|
|
|
return fmt.Errorf("s5 protocol not found")
|
|
|
|
}
|
|
|
|
|
2024-01-29 20:11:57 +00:00
|
|
|
s5protocolInstance := s5protocol.(*s5.S5Protocol)
|
2024-01-28 07:20:59 +00:00
|
|
|
s.protocol = s5protocolInstance
|
2024-01-12 04:13:10 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2024-01-16 16:42:50 +00:00
|
|
|
|
2024-01-28 07:20:59 +00:00
|
|
|
func (s S5API) Name() string {
|
|
|
|
return "s5"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s S5API) Start(ctx context.Context) error {
|
|
|
|
return s.protocol.Node().Start()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s S5API) Stop(ctx context.Context) error {
|
|
|
|
return nil
|
|
|
|
}
|
2024-01-19 22:08:05 +00:00
|
|
|
|
2024-02-17 08:05:22 +00:00
|
|
|
func (s *S5API) Routes() (*httprouter.Router, error) {
|
2024-02-14 03:25:50 +00:00
|
|
|
authMiddlewareOpts := middleware.AuthMiddlewareOptions{
|
|
|
|
Identity: s.identity,
|
|
|
|
Accounts: s.accounts,
|
|
|
|
Config: s.config,
|
|
|
|
Purpose: account.JWTPurposeLogin,
|
|
|
|
}
|
|
|
|
|
|
|
|
authMw := authMiddleware(authMiddlewareOpts)
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
tusHandler := BuildS5TusApi(authMw, s.tusHandler)
|
2024-01-19 22:08:05 +00:00
|
|
|
|
2024-02-04 01:11:47 +00:00
|
|
|
tusOptionsHandler := func(c jape.Context) {
|
|
|
|
c.ResponseWriter.WriteHeader(http.StatusOK)
|
|
|
|
}
|
|
|
|
|
|
|
|
tusCors := BuildTusCors()
|
|
|
|
|
2024-02-14 03:25:50 +00:00
|
|
|
wrappedTusHandler := middleware.ApplyMiddlewares(tusOptionsHandler, tusCors, authMw)
|
2024-02-04 01:11:47 +00:00
|
|
|
|
2024-02-16 13:39:55 +00:00
|
|
|
routes := map[string]jape.Handler{
|
2024-01-17 18:04:32 +00:00
|
|
|
// Account API
|
2024-02-16 13:49:19 +00:00
|
|
|
"GET /s5/account/register": s.accountRegisterChallenge,
|
|
|
|
"POST /s5/account/register": s.accountRegister,
|
|
|
|
"GET /s5/account/login": s.accountLoginChallenge,
|
|
|
|
"POST /s5/account/login": s.accountLogin,
|
|
|
|
"GET /s5/account": middleware.ApplyMiddlewares(s.accountInfo, authMw),
|
|
|
|
"GET /s5/account/stats": middleware.ApplyMiddlewares(s.accountStats, authMw),
|
|
|
|
"GET /s5/account/pins.bin": middleware.ApplyMiddlewares(s.accountPins, authMw),
|
2024-01-17 18:04:32 +00:00
|
|
|
|
|
|
|
// Upload API
|
2024-02-16 13:49:19 +00:00
|
|
|
"POST /s5/upload": middleware.ApplyMiddlewares(s.smallFileUpload, authMw),
|
|
|
|
"POST /s5/upload/directory": middleware.ApplyMiddlewares(s.directoryUpload, authMw),
|
2024-01-17 18:04:32 +00:00
|
|
|
|
2024-01-19 22:08:55 +00:00
|
|
|
// Tus API
|
2024-02-04 00:34:55 +00:00
|
|
|
"POST /s5/upload/tus": tusHandler,
|
2024-02-04 01:11:47 +00:00
|
|
|
"OPTIONS /s5/upload/tus": wrappedTusHandler,
|
2024-02-04 00:34:55 +00:00
|
|
|
"HEAD /s5/upload/tus/:id": tusHandler,
|
|
|
|
"POST /s5/upload/tus/:id": tusHandler,
|
|
|
|
"PATCH /s5/upload/tus/:id": tusHandler,
|
2024-02-04 01:11:47 +00:00
|
|
|
"OPTIONS /s5/upload/tus/:id": wrappedTusHandler,
|
2024-01-19 22:08:55 +00:00
|
|
|
|
2024-01-18 02:23:33 +00:00
|
|
|
// Download API
|
2024-02-16 13:49:19 +00:00
|
|
|
"GET /s5/blob/:cid": middleware.ApplyMiddlewares(s.downloadBlob, authMw),
|
|
|
|
"GET /s5/metadata/:cid": s.downloadMetadata,
|
|
|
|
"GET /s5/download/:cid": middleware.ApplyMiddlewares(s.downloadFile, cors.Default().Handler),
|
2024-01-18 02:23:33 +00:00
|
|
|
|
2024-01-17 18:04:32 +00:00
|
|
|
// Pins API
|
2024-02-16 13:49:19 +00:00
|
|
|
"POST /s5/pin/:cid": middleware.ApplyMiddlewares(s.accountPin, authMw),
|
|
|
|
"DELETE /s5/delete/:cid": middleware.ApplyMiddlewares(s.accountPinDelete, authMw),
|
2024-01-17 20:36:21 +00:00
|
|
|
|
|
|
|
// Debug API
|
2024-02-16 13:49:19 +00:00
|
|
|
"GET /s5/debug/download_urls/:cid": middleware.ApplyMiddlewares(s.debugDownloadUrls, authMw),
|
|
|
|
"GET /s5/debug/storage_locations/:hash": middleware.ApplyMiddlewares(s.debugStorageLocations, authMw),
|
2024-01-17 21:05:11 +00:00
|
|
|
|
2024-01-19 22:08:05 +00:00
|
|
|
// Registry API
|
2024-02-16 13:49:19 +00:00
|
|
|
"GET /s5/registry": middleware.ApplyMiddlewares(s.registryQuery, authMw),
|
|
|
|
"POST /s5/registry": middleware.ApplyMiddlewares(s.registrySet, authMw),
|
|
|
|
"GET /s5/registry/subscription": middleware.ApplyMiddlewares(s.registrySubscription, authMw),
|
2024-01-16 16:42:50 +00:00
|
|
|
}
|
2024-02-16 13:39:55 +00:00
|
|
|
|
2024-02-17 08:05:22 +00:00
|
|
|
routes, err := swagger.Swagger(swagSpec, routes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2024-02-16 13:39:55 +00:00
|
|
|
}
|
2024-02-17 08:05:22 +00:00
|
|
|
|
|
|
|
return s.protocol.Node().Services().HTTP().GetHttpRouter(routes), nil
|
2024-01-16 16:42:50 +00:00
|
|
|
}
|
2024-01-28 07:48:02 +00:00
|
|
|
|
2024-02-25 14:47:40 +00:00
|
|
|
func (s *S5API) Can(w http.ResponseWriter, r *http.Request) bool {
|
|
|
|
resolve, err := dnslink.Resolve(r.Host)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, ok := resolve.Links[s.Name()]; !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedCid, err := encoding.CIDFromString(resolve.Links[s.Name()][0].Identifier)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("Error decoding CID", zap.Error(err))
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
hash := decodedCid.Hash.HashBytes()
|
|
|
|
|
|
|
|
upload, err := s.metadata.GetUpload(r.Context(), hash)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if upload.Protocol != s.Name() {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
exists, _, err := s.accounts.DNSLinkExists(hash)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx := context.WithValue(r.Context(), "cid", decodedCid)
|
|
|
|
|
|
|
|
r = r.WithContext(ctx)
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) Handle(w http.ResponseWriter, r *http.Request) {
|
|
|
|
cidVal := r.Context().Value("cid")
|
|
|
|
|
|
|
|
if cidVal == nil {
|
|
|
|
w.WriteHeader(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cid := cidVal.(encoding.CID)
|
|
|
|
|
|
|
|
file := s.newFile(s.protocol, cid.Hash.HashBytes())
|
|
|
|
|
|
|
|
if !file.Exists() {
|
|
|
|
w.WriteHeader(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func(file io.ReadCloser) {
|
|
|
|
err := file.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error closing file", zap.Error(err))
|
|
|
|
}
|
|
|
|
}(file)
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", file.Mime())
|
|
|
|
|
|
|
|
http.ServeContent(w, r, file.Name(), file.Modtime(), file)
|
|
|
|
}
|
|
|
|
|
2024-01-28 07:48:02 +00:00
|
|
|
type s5TusJwtResponseWriter struct {
|
|
|
|
http.ResponseWriter
|
|
|
|
req *http.Request
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *s5TusJwtResponseWriter) WriteHeader(statusCode int) {
|
|
|
|
// Check if this is the specific route and status
|
|
|
|
if statusCode == http.StatusCreated {
|
|
|
|
location := w.Header().Get("Location")
|
|
|
|
authToken := middleware.ParseAuthTokenHeader(w.req.Header)
|
|
|
|
|
|
|
|
if authToken != "" && location != "" {
|
|
|
|
|
|
|
|
parsedUrl, _ := url.Parse(location)
|
|
|
|
|
|
|
|
query := parsedUrl.Query()
|
|
|
|
query.Set("auth_token", authToken)
|
|
|
|
parsedUrl.RawQuery = query.Encode()
|
|
|
|
|
|
|
|
w.Header().Set("Location", parsedUrl.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
w.ResponseWriter.WriteHeader(statusCode)
|
|
|
|
}
|
|
|
|
|
2024-02-04 01:11:47 +00:00
|
|
|
func BuildTusCors() func(h http.Handler) http.Handler {
|
|
|
|
mw :=
|
|
|
|
cors.New(cors.Options{
|
|
|
|
AllowedOrigins: []string{"*"},
|
|
|
|
AllowedMethods: []string{"GET", "POST", "PATCH", "DELETE", "HEAD", "OPTIONS"},
|
|
|
|
AllowedHeaders: []string{
|
|
|
|
"Authorization",
|
|
|
|
"Expires",
|
|
|
|
"Upload-Concat",
|
|
|
|
"Upload-Length",
|
|
|
|
"Upload-Offset",
|
|
|
|
"X-Requested-With",
|
|
|
|
"Tus-Version",
|
|
|
|
"Tus-Resumable",
|
|
|
|
"Tus-Extension",
|
|
|
|
"Tus-Max-Size",
|
|
|
|
"X-HTTP-Method-Override",
|
|
|
|
},
|
|
|
|
AllowCredentials: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
return mw.Handler
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
func BuildS5TusApi(authMw middleware.HttpMiddlewareFunc, handler *s5.TusHandler) jape.Handler {
|
2024-01-28 07:48:02 +00:00
|
|
|
// Create a jape.Handler for your tusHandler
|
|
|
|
tusJapeHandler := func(c jape.Context) {
|
2024-02-17 03:00:53 +00:00
|
|
|
tusHandler := handler.Tus()
|
2024-01-28 07:48:02 +00:00
|
|
|
tusHandler.ServeHTTP(c.ResponseWriter, c.Request)
|
|
|
|
}
|
|
|
|
|
|
|
|
protocolMiddleware := func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
ctx := context.WithValue(r.Context(), "protocol", "s5")
|
|
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
stripPrefix := func(next http.Handler) http.Handler {
|
|
|
|
return http.StripPrefix("/s5/upload/tus", next)
|
|
|
|
}
|
|
|
|
|
|
|
|
injectJwt := func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
res := w
|
|
|
|
if r.Method == http.MethodPost && r.URL.Path == "/s5/upload/tus" {
|
|
|
|
res = &s5TusJwtResponseWriter{ResponseWriter: w, req: r}
|
|
|
|
}
|
|
|
|
|
|
|
|
next.ServeHTTP(res, r)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Apply the middlewares to the tusJapeHandler
|
2024-02-14 03:25:50 +00:00
|
|
|
tusHandler := middleware.ApplyMiddlewares(tusJapeHandler, BuildTusCors(), authMw, injectJwt, protocolMiddleware, stripPrefix, middleware.ProxyMiddleware)
|
2024-01-28 07:48:02 +00:00
|
|
|
|
|
|
|
return tusHandler
|
|
|
|
}
|
2024-02-16 13:49:19 +00:00
|
|
|
|
|
|
|
type readSeekNopCloser struct {
|
|
|
|
*bytes.Reader
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rsnc readSeekNopCloser) Close() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) smallFileUpload(jc jape.Context) {
|
|
|
|
user := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
|
|
|
|
file, err := s.prepareFileUpload(jc)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func(file io.ReadSeekCloser) {
|
|
|
|
err := file.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("Error closing file", zap.Error(err))
|
|
|
|
}
|
|
|
|
}(file)
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
newUpload, err2 := s.storage.UploadObject(jc.Request.Context(), s5.GetStorageProtocol(s.protocol), file, nil, nil)
|
|
|
|
|
|
|
|
if err2 != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileUploadFailed, err2))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
newUpload.UserID = user
|
|
|
|
newUpload.UploaderIP = jc.Request.RemoteAddr
|
|
|
|
|
|
|
|
err2 = s.metadata.SaveUpload(jc.Request.Context(), *newUpload)
|
|
|
|
|
2024-02-16 13:49:19 +00:00
|
|
|
if err2 != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileUploadFailed, err2))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cid, err2 := encoding.CIDFromHash(newUpload.Hash, newUpload.Size, types.CIDTypeRaw, types.HashTypeBlake3)
|
|
|
|
if err2 != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileUploadFailed, err2))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cidStr, err2 := cid.ToString()
|
|
|
|
if err2 != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileUploadFailed, err2))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&SmallUploadResponse{
|
|
|
|
CID: cidStr,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) prepareFileUpload(jc jape.Context) (file io.ReadSeekCloser, s5Err *S5Error) {
|
|
|
|
r := jc.Request
|
|
|
|
contentType := r.Header.Get("Content-Type")
|
|
|
|
|
|
|
|
// Handle multipart form data uploads
|
|
|
|
if strings.HasPrefix(contentType, "multipart/form-data") {
|
2024-02-25 07:10:41 +00:00
|
|
|
if err := r.ParseMultipartForm(int64(s.config.Config().Core.PostUploadLimit)); err != nil {
|
2024-02-16 13:49:19 +00:00
|
|
|
return nil, NewS5Error(ErrKeyFileUploadFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
multipartFile, _, err := r.FormFile("file")
|
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyFileUploadFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return multipartFile, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handle raw body uploads
|
|
|
|
data, err := io.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyFileUploadFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer := readSeekNopCloser{bytes.NewReader(data)}
|
|
|
|
|
|
|
|
return buffer, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountRegisterChallenge(jc jape.Context) {
|
|
|
|
var pubkey string
|
|
|
|
if jc.DecodeForm("pubKey", &pubkey) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
challenge := make([]byte, 32)
|
|
|
|
_, err := rand.Read(challenge)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedKey, err := base64.RawURLEncoding.DecodeString(pubkey)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(decodedKey) != 33 || int(decodedKey[0]) != int(types.HashTypeEd25519) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyDataIntegrityError, fmt.Errorf("invalid public key format")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
result := s.db.Create(&models.S5Challenge{
|
|
|
|
Pubkey: pubkey,
|
|
|
|
Challenge: base64.RawURLEncoding.EncodeToString(challenge),
|
|
|
|
Type: "register",
|
|
|
|
})
|
|
|
|
|
|
|
|
if result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&AccountRegisterChallengeResponse{
|
|
|
|
Challenge: base64.RawURLEncoding.EncodeToString(challenge),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountRegister(jc jape.Context) {
|
|
|
|
var request AccountRegisterRequest
|
|
|
|
if jc.Decode(&request) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedKey, err := base64.RawURLEncoding.DecodeString(request.Pubkey)
|
|
|
|
if err != nil || len(decodedKey) != 33 || int(decodedKey[0]) != int(types.HashTypeEd25519) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
challenge := models.S5Challenge{
|
|
|
|
Pubkey: request.Pubkey,
|
|
|
|
Type: "register",
|
|
|
|
}
|
|
|
|
|
|
|
|
if result := s.db.Where(&challenge).First(&challenge); result.RowsAffected == 0 || result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceNotFound, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedResponse, err := base64.RawURLEncoding.DecodeString(request.Response)
|
|
|
|
if err != nil || len(decodedResponse) != 65 {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyDataIntegrityError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedChallenge, err := base64.RawURLEncoding.DecodeString(challenge.Challenge)
|
|
|
|
if err != nil || !bytes.Equal(decodedResponse[1:33], decodedChallenge) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedSignature, err := base64.RawURLEncoding.DecodeString(request.Signature)
|
|
|
|
if err != nil || !ed25519.Verify(decodedKey[1:], decodedResponse, decodedSignature) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyAuthorizationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if request.Email == "" {
|
|
|
|
request.Email = fmt.Sprintf("%s@%s", hex.EncodeToString(decodedKey[1:]), "example.com")
|
|
|
|
}
|
|
|
|
|
|
|
|
if accountExists, _, _ := s.accounts.EmailExists(request.Email); accountExists {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceLimitExceeded, fmt.Errorf("email already exists")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if pubkeyExists, _, _ := s.accounts.PubkeyExists(hex.EncodeToString(decodedKey[1:])); pubkeyExists {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceLimitExceeded, fmt.Errorf("pubkey already exists")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
passwd := make([]byte, 32)
|
|
|
|
if _, err = rand.Read(passwd); err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
newAccount, err := s.accounts.CreateAccount(request.Email, string(passwd))
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rawPubkey := hex.EncodeToString(decodedKey[1:])
|
|
|
|
if err = s.accounts.AddPubkeyToAccount(*newAccount, rawPubkey); err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jwt, err := s.accounts.LoginPubkey(rawPubkey)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyAuthenticationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if result := s.db.Delete(&challenge); result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
setAuthCookie(jwt, jc)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountLoginChallenge(jc jape.Context) {
|
|
|
|
var pubkey string
|
|
|
|
if jc.DecodeForm("pubKey", &pubkey) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
challenge := make([]byte, 32)
|
|
|
|
_, err := rand.Read(challenge)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedKey, err := base64.RawURLEncoding.DecodeString(pubkey)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(decodedKey) != 33 || int(decodedKey[0]) != int(types.HashTypeEd25519) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyUnsupportedFileType, fmt.Errorf("public key not supported")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pubkeyExists, _, _ := s.accounts.PubkeyExists(hex.EncodeToString(decodedKey[1:]))
|
|
|
|
if !pubkeyExists {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceNotFound, fmt.Errorf("public key does not exist")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
result := s.db.Create(&models.S5Challenge{
|
|
|
|
Pubkey: pubkey,
|
|
|
|
Challenge: base64.RawURLEncoding.EncodeToString(challenge),
|
|
|
|
Type: "login",
|
|
|
|
})
|
|
|
|
|
|
|
|
if result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&AccountLoginChallengeResponse{
|
|
|
|
Challenge: base64.RawURLEncoding.EncodeToString(challenge),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountLogin(jc jape.Context) {
|
|
|
|
var request AccountLoginRequest
|
|
|
|
if jc.Decode(&request) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedKey, err := base64.RawURLEncoding.DecodeString(request.Pubkey)
|
|
|
|
if err != nil || len(decodedKey) != 32 {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if int(decodedKey[0]) != int(types.HashTypeEd25519) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyUnsupportedFileType, fmt.Errorf("public key type not supported")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var challenge models.S5Challenge
|
|
|
|
result := s.db.Where(&models.S5Challenge{Pubkey: request.Pubkey, Type: "login"}).First(&challenge)
|
|
|
|
if result.RowsAffected == 0 || result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceNotFound, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedResponse, err := base64.RawURLEncoding.DecodeString(request.Response)
|
|
|
|
if err != nil || len(decodedResponse) != 65 {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedChallenge, err := base64.RawURLEncoding.DecodeString(challenge.Challenge)
|
|
|
|
if err != nil || !bytes.Equal(decodedResponse[1:33], decodedChallenge) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyDataIntegrityError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedSignature, err := base64.RawURLEncoding.DecodeString(request.Signature)
|
|
|
|
if err != nil || !ed25519.Verify(decodedKey[1:], decodedResponse, decodedSignature) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyAuthorizationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jwt, err := s.accounts.LoginPubkey(hex.EncodeToString(decodedKey[1:])) // Adjust based on how LoginPubkey is implemented
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyAuthenticationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if result := s.db.Delete(&challenge); result.Error != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, result.Error))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
setAuthCookie(jwt, jc)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountInfo(jc jape.Context) {
|
|
|
|
userID := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
_, user, _ := s.accounts.AccountExists(userID)
|
|
|
|
|
|
|
|
info := &AccountInfoResponse{
|
|
|
|
Email: user.Email,
|
|
|
|
QuotaExceeded: false,
|
|
|
|
EmailConfirmed: false,
|
|
|
|
IsRestricted: false,
|
|
|
|
Tier: AccountTier{
|
|
|
|
Id: 1,
|
|
|
|
Name: "default",
|
|
|
|
UploadBandwidth: math.MaxUint32,
|
|
|
|
StorageLimit: math.MaxUint32,
|
|
|
|
Scopes: []interface{}{},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(info)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountStats(jc jape.Context) {
|
|
|
|
userID := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
_, user, _ := s.accounts.AccountExists(userID)
|
|
|
|
|
|
|
|
info := &AccountStatsResponse{
|
|
|
|
AccountInfoResponse: AccountInfoResponse{
|
|
|
|
Email: user.Email,
|
|
|
|
QuotaExceeded: false,
|
|
|
|
EmailConfirmed: false,
|
|
|
|
IsRestricted: false,
|
|
|
|
Tier: AccountTier{
|
|
|
|
Id: 1,
|
|
|
|
Name: "default",
|
|
|
|
UploadBandwidth: math.MaxUint32,
|
|
|
|
StorageLimit: math.MaxUint32,
|
|
|
|
Scopes: []interface{}{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Stats: AccountStats{
|
|
|
|
Total: AccountStatsTotal{
|
|
|
|
UsedStorage: 0,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(info)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountPins(jc jape.Context) {
|
|
|
|
var cursor uint64
|
|
|
|
if err := jc.DecodeForm("cursor", &cursor); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
userID := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
|
|
|
|
pins, err := s.accounts.AccountPins(userID, cursor)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pinResponse := &AccountPinResponse{Cursor: cursor, Pins: pins}
|
|
|
|
result, err2 := msgpack.Marshal(pinResponse)
|
|
|
|
if err2 != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err2))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.Header().Set("Content-Type", "application/msgpack")
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusOK)
|
|
|
|
if _, err := jc.ResponseWriter.Write(result); err != nil {
|
|
|
|
s.logger.Error("failed to write account pins response", zap.Error(err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountPinDelete(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
if err := jc.DecodeParam("cid", &cid); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
user := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
|
|
|
|
decodedCid, err := encoding.CIDFromString(cid)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-02-18 04:06:27 +00:00
|
|
|
if err := s.accounts.DeletePinByHash(decodedCid.Hash.HashBytes(), user); err != nil {
|
2024-02-16 13:49:19 +00:00
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusNoContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) accountPin(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
if err := jc.DecodeParam("cid", &cid); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
userID := middleware.GetUserFromContext(jc.Request.Context())
|
|
|
|
|
|
|
|
decodedCid, err := encoding.CIDFromString(cid)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-02-25 12:23:30 +00:00
|
|
|
found := true
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
if err := s.accounts.PinByHash(decodedCid.Hash.HashBytes(), userID); err != nil {
|
2024-02-25 12:23:30 +00:00
|
|
|
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
found = false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !found {
|
|
|
|
dlUriProvider := s.newStorageLocationProvider(&decodedCid.Hash, types.StorageLocationTypeFull, types.StorageLocationTypeFile)
|
|
|
|
|
|
|
|
err = dlUriProvider.Start()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceNotFound, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if jc.Check("error starting search", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
next, err := dlUriProvider.Next()
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyResourceNotFound, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
r := rq.Head(next.Location().BytesURL())
|
|
|
|
httpReq, err := r.ParseRequest()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := http.DefaultClient.Do(httpReq)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileDownloadFailed, err))
|
|
|
|
}
|
|
|
|
defer func(Body io.ReadCloser) {
|
|
|
|
err := Body.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("Error closing response body", zap.Error(err))
|
|
|
|
}
|
|
|
|
}(res.Body)
|
|
|
|
|
|
|
|
contentLengthStr := res.Header.Get("Content-Length")
|
|
|
|
if contentLengthStr == "" {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileDownloadFailed, errors.New("content-length header is missing")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
contentLength, err := strconv.ParseInt(contentLengthStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileDownloadFailed, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if uint64(contentLength) != decodedCid.Size {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyFileDownloadFailed, errors.New("file size does not match CID expected size")))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cid64, err := decodedCid.ToBase64Url()
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jobName := fmt.Sprintf("pin-import-%s", cid64)
|
|
|
|
|
2024-02-25 12:50:59 +00:00
|
|
|
if job := s.cron.GetJobByName(jobName); job == nil {
|
|
|
|
job := s.cron.RetryableJob(
|
2024-02-25 12:47:43 +00:00
|
|
|
cron.RetryableJobParams{
|
2024-02-25 12:23:30 +00:00
|
|
|
Name: jobName,
|
|
|
|
Tags: nil,
|
2024-02-25 12:50:59 +00:00
|
|
|
Function: s.pinImportCronJob,
|
2024-02-25 12:23:30 +00:00
|
|
|
Args: []interface{}{cid64, next.Location().BytesURL(), next.Location().OutboardBytesURL(), userID},
|
|
|
|
Attempt: 0,
|
|
|
|
Limit: 10,
|
|
|
|
After: nil,
|
|
|
|
Error: nil,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2024-02-25 12:50:59 +00:00
|
|
|
_, err = s.cron.CreateJob(job)
|
2024-02-25 12:23:30 +00:00
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-02-16 13:49:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusNoContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) directoryUpload(jc jape.Context) {
|
|
|
|
// Decode form fields
|
|
|
|
var (
|
|
|
|
tryFiles []string
|
|
|
|
errorPages map[int]string
|
|
|
|
name string
|
|
|
|
)
|
|
|
|
|
|
|
|
if err := jc.DecodeForm("tryFiles", &tryFiles); err != nil || jc.DecodeForm("errorPages", &errorPages) != nil || jc.DecodeForm("name", &name) != nil {
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify content type
|
|
|
|
if contentType := jc.Request.Header.Get("Content-Type"); !strings.HasPrefix(contentType, "multipart/form-data") {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, fmt.Errorf("expected multipart/form-data content type, got %s", contentType)))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse multipart form with size limit from config
|
2024-02-25 07:10:41 +00:00
|
|
|
if err := jc.Request.ParseMultipartForm(int64(s.config.Config().Core.PostUploadLimit)); err != nil {
|
2024-02-16 13:49:19 +00:00
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
uploads, err := s.processMultipartFiles(jc.Request)
|
2024-02-16 13:49:19 +00:00
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
s.sendErrorResponse(jc, err)
|
2024-02-16 13:49:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate metadata for the directory upload
|
|
|
|
app, err := s.createAppMetadata(name, tryFiles, errorPages, uploads)
|
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
s.sendErrorResponse(jc, err)
|
2024-02-16 13:49:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Upload the metadata
|
2024-02-17 03:00:53 +00:00
|
|
|
cidStr, err := s.uploadAppMetadata(app, jc.Request)
|
2024-02-16 13:49:19 +00:00
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
s.sendErrorResponse(jc, err)
|
2024-02-16 13:49:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&AppUploadResponse{CID: cidStr})
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
func (s *S5API) processMultipartFiles(r *http.Request) (map[string]*metadata.UploadMetadata, error) {
|
|
|
|
uploadMap := make(map[string]*metadata.UploadMetadata)
|
|
|
|
user := middleware.GetUserFromContext(r.Context())
|
2024-02-16 13:49:19 +00:00
|
|
|
|
|
|
|
for _, files := range r.MultipartForm.File {
|
|
|
|
for _, fileHeader := range files {
|
|
|
|
file, err := fileHeader.Open()
|
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyStorageOperationFailed, err)
|
|
|
|
}
|
|
|
|
defer func(file multipart.File) {
|
|
|
|
err := file.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("Error closing file", zap.Error(err))
|
|
|
|
}
|
|
|
|
}(file)
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
upload, err := s.storage.UploadObject(r.Context(), s5.GetStorageProtocol(s.protocol), file, nil, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyStorageOperationFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
upload.UserID = user
|
|
|
|
upload.UploaderIP = r.RemoteAddr
|
|
|
|
|
|
|
|
err = s.metadata.SaveUpload(r.Context(), *upload)
|
2024-02-16 13:49:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyStorageOperationFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
uploadMap[fileHeader.Filename] = upload
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return uploadMap, nil
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
func (s *S5API) createAppMetadata(name string, tryFiles []string, errorPages map[int]string, uploads map[string]*metadata.UploadMetadata) (*s5libmetadata.WebAppMetadata, error) {
|
|
|
|
filesMap := make(map[string]s5libmetadata.WebAppMetadataFileReference, len(uploads))
|
2024-02-16 13:49:19 +00:00
|
|
|
|
|
|
|
for filename, upload := range uploads {
|
2024-02-17 03:00:53 +00:00
|
|
|
hash := upload.Hash
|
2024-02-16 13:49:19 +00:00
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
cid, err := encoding.CIDFromHash(hash, upload.Size, types.CIDTypeRaw, types.HashTypeBlake3)
|
2024-02-16 13:49:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, NewS5Error(ErrKeyInternalError, err, "Failed to create CID for file: "+filename)
|
|
|
|
}
|
2024-02-17 03:00:53 +00:00
|
|
|
filesMap[filename] = s5libmetadata.WebAppMetadataFileReference{
|
2024-02-16 13:49:19 +00:00
|
|
|
Cid: cid,
|
|
|
|
ContentType: upload.MimeType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
extraMetadataMap := make(map[int]interface{})
|
|
|
|
for statusCode, page := range errorPages {
|
|
|
|
extraMetadataMap[statusCode] = page
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
extraMetadata := s5libmetadata.NewExtraMetadata(extraMetadataMap)
|
2024-02-16 13:49:19 +00:00
|
|
|
// Create the web app metadata object
|
2024-02-17 03:00:53 +00:00
|
|
|
app := s5libmetadata.NewWebAppMetadata(
|
2024-02-16 13:49:19 +00:00
|
|
|
name,
|
|
|
|
tryFiles,
|
|
|
|
*extraMetadata,
|
|
|
|
errorPages,
|
|
|
|
filesMap,
|
|
|
|
)
|
|
|
|
|
|
|
|
return app, nil
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
func (s *S5API) uploadAppMetadata(appData *s5libmetadata.WebAppMetadata, r *http.Request) (string, *S5Error) {
|
|
|
|
userId := middleware.GetUserFromContext(r.Context())
|
|
|
|
|
2024-02-16 13:49:19 +00:00
|
|
|
appDataRaw, err := msgpack.Marshal(appData)
|
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
return "", NewS5Error(ErrKeyInternalError, err, "Failed to marshal app s5libmetadata")
|
2024-02-16 13:49:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
file := bytes.NewReader(appDataRaw)
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
upload, err := s.storage.UploadObject(r.Context(), s5.GetStorageProtocol(s.protocol), file, nil, nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", NewS5Error(ErrKeyStorageOperationFailed, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
upload.UserID = userId
|
|
|
|
upload.UploaderIP = r.RemoteAddr
|
|
|
|
|
|
|
|
err = s.metadata.SaveUpload(r.Context(), *upload)
|
2024-02-16 13:49:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", NewS5Error(ErrKeyStorageOperationFailed, err)
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
// Construct the CID for the newly uploaded s5libmetadata
|
2024-02-16 13:49:19 +00:00
|
|
|
cid, err := encoding.CIDFromHash(upload.Hash, uint64(len(appDataRaw)), types.CIDTypeMetadataWebapp, types.HashTypeBlake3)
|
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
return "", NewS5Error(ErrKeyInternalError, err, "Failed to create CID for new app s5libmetadata")
|
2024-02-16 13:49:19 +00:00
|
|
|
}
|
|
|
|
cidStr, err := cid.ToString()
|
|
|
|
if err != nil {
|
2024-02-17 03:00:53 +00:00
|
|
|
return "", NewS5Error(ErrKeyInternalError, err, "Failed to convert CID to string for new app s5libmetadata")
|
2024-02-16 13:49:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return cidStr, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) debugDownloadUrls(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
if err := jc.DecodeParam("cid", &cid); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedCid, err := encoding.CIDFromString(cid)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidOperation, err, "Failed to decode CID"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
node := s.getNode()
|
|
|
|
dlUriProvider := s.newStorageLocationProvider(&decodedCid.Hash, types.StorageLocationTypeFull, types.StorageLocationTypeFile, types.StorageLocationTypeBridge)
|
|
|
|
|
|
|
|
if err := dlUriProvider.Start(); err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err, "Failed to start URI provider"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
locations, err := node.Services().Storage().GetCachedStorageLocations(&decodedCid.Hash, []types.StorageLocationType{
|
|
|
|
types.StorageLocationTypeFull, types.StorageLocationTypeFile, types.StorageLocationTypeBridge,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err, "Failed to get cached storage locations"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
availableNodes := lo.Keys[string, storage2.StorageLocation](locations)
|
|
|
|
availableNodesIds := make([]*encoding.NodeId, len(availableNodes))
|
|
|
|
|
|
|
|
for i, nodeIdStr := range availableNodes {
|
|
|
|
nodeId, err := encoding.DecodeNodeId(nodeIdStr)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err, "Failed to decode node ID"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
availableNodesIds[i] = nodeId
|
|
|
|
}
|
|
|
|
|
|
|
|
sorted, err := node.Services().P2P().SortNodesByScore(availableNodesIds)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyNetworkError, err, "Failed to sort nodes by score"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
output := make([]string, len(sorted))
|
|
|
|
for i, nodeId := range sorted {
|
|
|
|
nodeIdStr, err := nodeId.ToString()
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInternalError, err, "Failed to convert node ID to string"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
output[i] = locations[nodeIdStr].BytesURL()
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusOK)
|
|
|
|
_, err = jc.ResponseWriter.Write([]byte(strings.Join(output, "\n")))
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("Failed to write response", zap.Error(err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) registryQuery(jc jape.Context) {
|
|
|
|
var pk string
|
|
|
|
if err := jc.DecodeForm("pk", &pk); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pkBytes, err := base64.RawURLEncoding.DecodeString(pk)
|
|
|
|
if err != nil {
|
|
|
|
s5Err := NewS5Error(ErrKeyInvalidFileFormat, err)
|
|
|
|
s.sendErrorResponse(jc, s5Err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
entry, err := s.getNode().Services().Registry().Get(pkBytes)
|
|
|
|
if err != nil {
|
|
|
|
s5ErrKey := ErrKeyStorageOperationFailed
|
|
|
|
s5Err := NewS5Error(s5ErrKey, err)
|
|
|
|
s.sendErrorResponse(jc, s5Err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if entry == nil {
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
response := RegistryQueryResponse{
|
|
|
|
Pk: base64.RawURLEncoding.EncodeToString(entry.PK()),
|
|
|
|
Revision: entry.Revision(),
|
|
|
|
Data: base64.RawURLEncoding.EncodeToString(entry.Data()),
|
|
|
|
Signature: base64.RawURLEncoding.EncodeToString(entry.Signature()),
|
|
|
|
}
|
|
|
|
jc.Encode(response)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) registrySet(jc jape.Context) {
|
|
|
|
var request RegistrySetRequest
|
|
|
|
|
|
|
|
if err := jc.Decode(&request); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pk, err := base64.RawURLEncoding.DecodeString(request.Pk)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err, "Error decoding public key"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := base64.RawURLEncoding.DecodeString(request.Data)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err, "Error decoding data"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
signature, err := base64.RawURLEncoding.DecodeString(request.Signature)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyInvalidFileFormat, err, "Error decoding signature"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
entry := protocol.NewSignedRegistryEntry(pk, request.Revision, data, signature)
|
|
|
|
|
|
|
|
err = s.getNode().Services().Registry().Set(entry, false, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.sendErrorResponse(jc, NewS5Error(ErrKeyStorageOperationFailed, err, "Error setting registry entry"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
func (s *S5API) registrySubscription(jc jape.Context) {
|
|
|
|
// Create a context for the WebSocket operations
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
var listeners []func()
|
|
|
|
|
|
|
|
// Accept the WebSocket connection
|
|
|
|
c, err := websocket.Accept(jc.ResponseWriter, jc.Request, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error accepting websocket connection", zap.Error(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
// Close the WebSocket connection gracefully
|
|
|
|
err := c.Close(websocket.StatusNormalClosure, "connection closed")
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error closing websocket connection", zap.Error(err))
|
|
|
|
}
|
|
|
|
// Clean up all listeners when the connection is closed
|
|
|
|
for _, listener := range listeners {
|
|
|
|
listener()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Main loop for reading messages
|
|
|
|
for {
|
|
|
|
_, data, err := c.Read(ctx)
|
|
|
|
if err != nil {
|
|
|
|
if websocket.CloseStatus(err) == websocket.StatusNormalClosure {
|
|
|
|
// Normal closure
|
|
|
|
s.logger.Info("websocket connection closed normally")
|
|
|
|
} else {
|
|
|
|
// Handle different types of errors
|
|
|
|
s.logger.Error("error in websocket connection", zap.Error(err))
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
decoder := msgpack.NewDecoder(bytes.NewReader(data))
|
|
|
|
|
|
|
|
// Assuming method indicates the type of operation, validate it
|
|
|
|
method, err := decoder.DecodeInt()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error decoding method", zap.Error(err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if method != 2 {
|
|
|
|
s.logger.Error("invalid method", zap.Int64("method", int64(method)))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
sre, err := decoder.DecodeBytes()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error decoding sre", zap.Error(err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Listen for updates on the registry entry and send updates via WebSocket
|
|
|
|
off, err := s.getNode().Services().Registry().Listen(sre, func(entry protocol.SignedRegistryEntry) {
|
|
|
|
encoded, err := msgpack.Marshal(entry)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error encoding entry", zap.Error(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write updates to the WebSocket connection
|
|
|
|
if err := c.Write(ctx, websocket.MessageBinary, encoded); err != nil {
|
|
|
|
s.logger.Error("error writing to websocket", zap.Error(err))
|
|
|
|
}
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error setting up listener for registry", zap.Error(err))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
listeners = append(listeners, off) // Add the listener's cleanup function to the list
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) getNode() *node.Node {
|
|
|
|
return s.protocol.Node()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) downloadBlob(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
|
|
|
|
if jc.DecodeParam("cid", &cid) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cid = strings.Split(cid, ".")[0]
|
|
|
|
|
|
|
|
cidDecoded, err := encoding.CIDFromString(cid)
|
|
|
|
if jc.Check("error decoding cid", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
dlUriProvider := s.newStorageLocationProvider(&cidDecoded.Hash, types.StorageLocationTypeFull, types.StorageLocationTypeFile, types.StorageLocationTypeBridge)
|
|
|
|
|
|
|
|
err = dlUriProvider.Start()
|
|
|
|
|
|
|
|
if jc.Check("error starting search", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
next, err := dlUriProvider.Next()
|
|
|
|
if jc.Check("error fetching blob", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
http.Redirect(jc.ResponseWriter, jc.Request, next.Location().BytesURL(), http.StatusFound)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) debugStorageLocations(jc jape.Context) {
|
|
|
|
var hash string
|
|
|
|
|
|
|
|
if jc.DecodeParam("hash", &hash) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var kinds string
|
|
|
|
|
|
|
|
if jc.DecodeForm("kinds", &kinds) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
decodedHash, err := encoding.MultihashFromBase64Url(hash)
|
|
|
|
if jc.Check("error decoding hash", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
typeList := strings.Split(kinds, ",")
|
|
|
|
typeIntList := make([]types.StorageLocationType, 0)
|
|
|
|
|
|
|
|
for _, typeStr := range typeList {
|
|
|
|
typeInt, err := strconv.Atoi(typeStr)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
typeIntList = append(typeIntList, types.StorageLocationType(typeInt))
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(typeIntList) == 0 {
|
|
|
|
typeIntList = []types.StorageLocationType{
|
|
|
|
types.StorageLocationTypeFull,
|
|
|
|
types.StorageLocationTypeFile,
|
|
|
|
types.StorageLocationTypeBridge,
|
|
|
|
types.StorageLocationTypeArchive,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dlUriProvider := s.newStorageLocationProvider(decodedHash, typeIntList...)
|
|
|
|
|
|
|
|
err = dlUriProvider.Start()
|
|
|
|
if jc.Check("error starting search", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = dlUriProvider.Next()
|
|
|
|
if jc.Check("error fetching locations", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
locations, err := s.getNode().Services().Storage().GetCachedStorageLocations(decodedHash, typeIntList)
|
|
|
|
if jc.Check("error getting cached locations", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
availableNodes := lo.Keys[string, storage2.StorageLocation](locations)
|
|
|
|
availableNodesIds := make([]*encoding.NodeId, len(availableNodes))
|
|
|
|
|
|
|
|
for i, nodeIdStr := range availableNodes {
|
|
|
|
nodeId, err := encoding.DecodeNodeId(nodeIdStr)
|
|
|
|
if jc.Check("error decoding node id", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
availableNodesIds[i] = nodeId
|
|
|
|
}
|
|
|
|
|
|
|
|
availableNodesIds, err = s.getNode().Services().P2P().SortNodesByScore(availableNodesIds)
|
|
|
|
|
|
|
|
if jc.Check("error sorting nodes", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
debugLocations := make([]DebugStorageLocation, len(availableNodes))
|
|
|
|
|
|
|
|
for i, nodeId := range availableNodesIds {
|
|
|
|
nodeIdStr, err := nodeId.ToBase58()
|
|
|
|
if jc.Check("error encoding node id", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
score, err := s.getNode().Services().P2P().GetNodeScore(nodeId)
|
|
|
|
|
|
|
|
if jc.Check("error getting node score", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
debugLocations[i] = DebugStorageLocation{
|
|
|
|
Type: locations[nodeIdStr].Type(),
|
|
|
|
Parts: locations[nodeIdStr].Parts(),
|
|
|
|
Expiry: locations[nodeIdStr].Expiry(),
|
|
|
|
NodeId: nodeIdStr,
|
|
|
|
Score: score,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&DebugStorageLocationsResponse{
|
|
|
|
Locations: debugLocations,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) downloadMetadata(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
|
|
|
|
if jc.DecodeParam("cid", &cid) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cidDecoded, err := encoding.CIDFromString(cid)
|
|
|
|
if jc.Check("error decoding cid", err) != nil {
|
|
|
|
s.logger.Error("error decoding cid", zap.Error(err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
switch cidDecoded.Type {
|
|
|
|
case types.CIDTypeRaw:
|
2024-02-17 03:00:53 +00:00
|
|
|
_ = jc.Error(errors.New("Raw CIDs do not have s5libmetadata"), http.StatusBadRequest)
|
2024-02-16 13:49:19 +00:00
|
|
|
return
|
|
|
|
|
|
|
|
case types.CIDTypeResolver:
|
|
|
|
_ = jc.Error(errors.New("Resolver CIDs not yet supported"), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
meta, err := s.getNode().Services().Storage().GetMetadataByCID(cidDecoded)
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
if jc.Check("error getting s5libmetadata", err) != nil {
|
|
|
|
s.logger.Error("error getting s5libmetadata", zap.Error(err))
|
2024-02-16 13:49:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if cidDecoded.Type != types.CIDTypeBridge {
|
|
|
|
jc.ResponseWriter.Header().Set("Cache-Control", "public, max-age=31536000")
|
|
|
|
} else {
|
|
|
|
jc.ResponseWriter.Header().Set("Cache-Control", "public, max-age=60")
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.Encode(&meta)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) downloadFile(jc jape.Context) {
|
|
|
|
var cid string
|
|
|
|
|
|
|
|
if jc.DecodeParam("cid", &cid) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var hashBytes []byte
|
|
|
|
isProof := false
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
if strings.HasSuffix(cid, storage.PROOF_EXTENSION) {
|
2024-02-16 13:49:19 +00:00
|
|
|
isProof = true
|
2024-02-17 03:00:53 +00:00
|
|
|
cid = strings.TrimSuffix(cid, storage.PROOF_EXTENSION)
|
2024-02-16 13:49:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cidDecoded, err := encoding.CIDFromString(cid)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
hashDecoded, err := encoding.MultihashFromBase64Url(cid)
|
|
|
|
|
|
|
|
if jc.Check("error decoding as cid or hash", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
hashBytes = hashDecoded.HashBytes()
|
|
|
|
} else {
|
|
|
|
hashBytes = cidDecoded.Hash.HashBytes()
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
file := s.newFile(s.protocol, hashBytes)
|
2024-02-16 13:49:19 +00:00
|
|
|
|
|
|
|
if !file.Exists() {
|
|
|
|
jc.ResponseWriter.WriteHeader(http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func(file io.ReadCloser) {
|
|
|
|
err := file.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error closing file", zap.Error(err))
|
|
|
|
}
|
|
|
|
}(file)
|
|
|
|
|
|
|
|
if isProof {
|
|
|
|
proof, err := file.Proof()
|
|
|
|
|
|
|
|
if jc.Check("error getting proof", err) != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.Header().Set("Content-Type", "application/octet-stream")
|
|
|
|
http.ServeContent(jc.ResponseWriter, jc.Request, fmt.Sprintf("%.obao", file.Name()), file.Modtime(), bytes.NewReader(proof))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
jc.ResponseWriter.Header().Set("Content-Type", file.Mime())
|
|
|
|
|
|
|
|
http.ServeContent(jc.ResponseWriter, jc.Request, file.Name(), file.Modtime(), file)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) sendErrorResponse(jc jape.Context, err error) {
|
|
|
|
var statusCode int
|
|
|
|
|
|
|
|
switch e := err.(type) {
|
|
|
|
case *S5Error:
|
|
|
|
statusCode = e.HttpStatus()
|
|
|
|
case *account.AccountError:
|
|
|
|
mappedCode, ok := account.ErrorCodeToHttpStatus[e.Key]
|
|
|
|
if !ok {
|
|
|
|
statusCode = http.StatusInternalServerError
|
|
|
|
} else {
|
|
|
|
statusCode = mappedCode
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
statusCode = http.StatusInternalServerError
|
|
|
|
err = errors.New("An internal server error occurred.")
|
|
|
|
}
|
|
|
|
|
|
|
|
_ = jc.Error(err, statusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *S5API) newStorageLocationProvider(hash *encoding.Multihash, types ...types.StorageLocationType) storage2.StorageLocationProvider {
|
|
|
|
return provider.NewStorageLocationProvider(provider.StorageLocationProviderParams{
|
|
|
|
Services: s.getNode().Services(),
|
|
|
|
Hash: hash,
|
|
|
|
LocationTypes: types,
|
|
|
|
ServiceParams: service.ServiceParams{
|
|
|
|
Logger: s.logger,
|
|
|
|
Config: s.getNode().Config(),
|
|
|
|
Db: s.getNode().Db(),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-02-17 03:00:53 +00:00
|
|
|
func (s *S5API) newFile(protocol *s5.S5Protocol, hash []byte) *S5File {
|
|
|
|
return NewFile(FileParams{
|
|
|
|
Protocol: protocol,
|
|
|
|
Hash: hash,
|
|
|
|
Metadata: s.metadata,
|
|
|
|
Storage: s.storage,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-02-25 12:50:59 +00:00
|
|
|
func (s *S5API) pinImportCronJob(cid string, url string, proofUrl string, userId uint) error {
|
2024-02-25 12:23:30 +00:00
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
// Parse CID early to avoid unnecessary operations if it fails.
|
|
|
|
parsedCid, err := encoding.CIDFromString(cid)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error parsing cid", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Function to streamline error handling and closing of response body.
|
|
|
|
closeBody := func(body io.ReadCloser) {
|
|
|
|
if err := body.Close(); err != nil {
|
|
|
|
s.logger.Error("error closing response body", zap.Error(err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Inline fetching and reading body, directly incorporating your checks.
|
|
|
|
fetchAndProcess := func(fetchUrl string) ([]byte, error) {
|
|
|
|
req, err := rq.Get(fetchUrl).ParseRequest()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error parsing request", zap.Error(err))
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error executing request", zap.Error(err))
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer closeBody(res.Body)
|
|
|
|
|
|
|
|
if res.StatusCode != http.StatusOK {
|
|
|
|
errMsg := "error fetching URL: " + fetchUrl
|
|
|
|
s.logger.Error(errMsg, zap.String("status", res.Status))
|
|
|
|
return nil, fmt.Errorf(errMsg+" with status: %s", res.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := io.ReadAll(res.Body)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error reading response body", zap.Error(err))
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
saveAndPin := func(upload *metadata.UploadMetadata) error {
|
|
|
|
upload.UserID = userId
|
|
|
|
if err := s.metadata.SaveUpload(ctx, *upload); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.accounts.PinByHash(parsedCid.Hash.HashBytes(), userId); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch proof.
|
|
|
|
proof, err := fetchAndProcess(proofUrl)
|
|
|
|
if err != nil {
|
|
|
|
return err // Error logged in fetchAndProcess
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch file and process if under post upload limit.
|
|
|
|
if parsedCid.Size <= s.config.Config().Core.PostUploadLimit {
|
|
|
|
fileData, err := fetchAndProcess(url)
|
|
|
|
if err != nil {
|
|
|
|
return err // Error logged in fetchAndProcess
|
|
|
|
}
|
|
|
|
|
|
|
|
hash, err := s.storage.HashObject(ctx, bytes.NewReader(fileData))
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error hashing object", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(hash.Hash, parsedCid.Hash.HashBytes()) {
|
|
|
|
return fmt.Errorf("hash mismatch")
|
|
|
|
}
|
|
|
|
|
|
|
|
upload, err := s.storage.UploadObject(ctx, s5.GetStorageProtocol(s.protocol), bytes.NewReader(fileData), nil, hash)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = saveAndPin(upload)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
baoProof := bao.Result{
|
|
|
|
Hash: parsedCid.Hash.HashBytes(),
|
|
|
|
Proof: proof,
|
|
|
|
Length: uint(parsedCid.Size),
|
|
|
|
}
|
|
|
|
|
|
|
|
client, err := s.storage.S3Client(ctx)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error getting s3 client", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err := rq.Get(url).ParseRequest()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error parsing request", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error executing request", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer closeBody(res.Body)
|
|
|
|
|
|
|
|
verifier := bao.NewVerifier(res.Body, baoProof)
|
|
|
|
defer func(Body io.ReadCloser) {
|
|
|
|
err := Body.Close()
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error closing verifier stream", zap.Error(err))
|
|
|
|
}
|
|
|
|
|
|
|
|
}(verifier)
|
|
|
|
|
|
|
|
_, err = client.PutObject(ctx, &s3.PutObjectInput{
|
|
|
|
Bucket: aws.String(s.config.Config().Core.Storage.S3.BufferBucket),
|
|
|
|
Key: aws.String(cid),
|
|
|
|
Body: verifier,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
upload, err := s.storage.UploadObject(ctx, s5.GetStorageProtocol(s.protocol), nil, &renter.MultiPartUploadParams{
|
|
|
|
ReaderFactory: func(start uint, end uint) (io.ReadCloser, error) {
|
|
|
|
rangeHeader := fmt.Sprintf("bytes=%d-%d", start, end)
|
|
|
|
object, err := client.GetObject(ctx, &s3.GetObjectInput{
|
|
|
|
Bucket: aws.String(s.config.Config().Core.Storage.S3.BufferBucket),
|
|
|
|
Key: aws.String(cid),
|
|
|
|
Range: aws.String(rangeHeader),
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return object.Body, nil
|
|
|
|
},
|
|
|
|
Bucket: s.config.Config().Core.Storage.S3.BufferBucket,
|
|
|
|
FileName: s5.GetStorageProtocol(s.protocol).EncodeFileName(parsedCid.Hash.HashBytes()),
|
|
|
|
Size: parsedCid.Size,
|
|
|
|
ExistingUploadID: "",
|
|
|
|
UploadIDHandler: nil,
|
|
|
|
}, &baoProof)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
s.logger.Error("error uploading object", zap.Error(err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = saveAndPin(upload)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-02-16 13:49:19 +00:00
|
|
|
func setAuthCookie(jwt string, jc jape.Context) {
|
|
|
|
authCookie := http.Cookie{
|
|
|
|
Name: "s5-auth-token",
|
|
|
|
Value: jwt,
|
|
|
|
Path: "/",
|
|
|
|
HttpOnly: true,
|
|
|
|
MaxAge: int(time.Hour.Seconds() * 24),
|
|
|
|
Secure: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
http.SetCookie(jc.ResponseWriter, &authCookie)
|
|
|
|
}
|