1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
|
use actix_multipart::Multipart;
use actix_web::http::header;
use actix_web::{middleware, web, App, HttpRequest, HttpResponse, HttpServer};
use chrono::Utc;
use futures::{StreamExt, TryStreamExt};
use rand::distributions::Alphanumeric;
use rand::{thread_rng, Rng};
use rusoto_core::Region;
use rusoto_s3::{PutObjectRequest, S3Client, S3};
use serde::{Deserialize, Serialize};
use std::collections::HashMap;
use std::fmt::Display;
use std::iter;
mod oauth;
// To make the timepart shorter, we'll offset it with a custom epoch.
const EPOCH: i64 = 631152000;
#[derive(Serialize, Deserialize)]
struct MicropubError {
error: String,
#[serde(skip_serializing_if = "Option::is_none")]
error_description: Option<String>,
}
impl MicropubError {
pub fn new<S>(err: S) -> Self
where
S: Into<String>,
{
MicropubError {
error: err.into(),
error_description: None,
}
}
pub fn with_description<S, D>(err: S, description: D) -> Self
where
S: Into<String>,
D: Display,
{
MicropubError {
error: err.into(),
error_description: Some(format!("{}", description)),
}
}
}
fn random_id() -> String {
let now = Utc::now();
// Generate the time part
let ts = now.timestamp() - EPOCH;
let offset = (ts.leading_zeros() / 8) as usize;
let time_part = base32::encode(
base32::Alphabet::RFC4648 { padding: false },
&ts.to_be_bytes()[offset..],
);
// Generate the random part
let mut rng = thread_rng();
let random_part: String = iter::repeat(())
.map(|()| rng.sample(Alphanumeric))
.take(7)
.collect();
format!("{}-{}", time_part, random_part)
}
async fn handle_upload(req: HttpRequest, mut payload: Multipart) -> HttpResponse {
let site = req
.app_data::<web::Data<SiteConfig>>()
.expect("Missing SiteConfig?");
let s3_client = req
.app_data::<web::Data<S3Client>>()
.expect("Missing S3Client?");
let verification_service = req
.app_data::<web::Data<oauth::VerificationService>>()
.expect("Missing VerificationService?");
let auth_header = match req
.headers()
.get(header::AUTHORIZATION)
.and_then(|s| s.to_str().ok())
{
Some(auth_header) => auth_header,
None => return HttpResponse::Unauthorized().json(MicropubError::new("unauthorized")),
};
let access_token = match verification_service.validate(auth_header).await {
Ok(token) => token,
Err(e) => {
return HttpResponse::Unauthorized()
.json(MicropubError::with_description("unauthorized", e))
}
};
if !access_token.scopes().any(|s| s == "media") {
return HttpResponse::Unauthorized().json(MicropubError::new("unauthorized"));
}
// iterate over multipart stream
if let Ok(Some(field)) = payload.try_next().await {
let content_disp = field.content_disposition().unwrap();
let content_type = field.content_type().clone();
let filename = content_disp.get_filename();
let ext = filename.and_then(|f| f.rsplit('.').next());
let (classification, sep, suffix) = match content_type.type_() {
mime::IMAGE => ("photo", '.', ext),
mime::AUDIO => ("audio", '.', ext),
mime::VIDEO => ("video", '.', ext),
_ => ("file", '/', filename),
};
// This will be the key in S3.
let key = match suffix {
Some(ext) => format!("{}/{}{}{}", classification, random_id(), sep, ext),
None => format!("{}/{}", classification, random_id()),
};
// This will be the publicly accessible URL for the file.
let url = format!("{}/{}", site.media_url, key);
let mut metadata: HashMap<String, String> = HashMap::new();
metadata.insert(
"client-id".to_string(),
access_token.client_id().to_string(),
);
metadata.insert("author".to_string(), access_token.me().to_string());
if let Some(f) = filename {
metadata.insert("filename".to_string(), f.to_string());
}
let body = field
.map(|b| b.map(|b| b.to_vec()))
.try_concat()
.await
.unwrap();
let put_request = PutObjectRequest {
bucket: site.s3_bucket().to_owned(),
key,
body: Some(body.into()),
metadata: Some(metadata),
content_type: Some(content_type.to_string()),
..Default::default()
};
match s3_client.put_object(put_request).await {
Ok(_) => {
return HttpResponse::Created()
.header(header::LOCATION, url)
.finish()
}
Err(e) => return HttpResponse::InternalServerError().body(format!("{}", e)),
};
}
HttpResponse::BadRequest().finish()
}
#[derive(Serialize, Deserialize, Clone)]
#[serde(rename_all = "PascalCase")]
pub struct SiteConfig {
bind: String,
token_endpoint: String,
s3_bucket: String,
media_url: String,
}
impl SiteConfig {
pub fn bind(&self) -> &str {
&self.bind
}
/// The URI to use to validate an access token.
pub fn token_endpoint(&self) -> &str {
&self.token_endpoint
}
/// S3 output bucket
pub fn s3_bucket(&self) -> &str {
&self.s3_bucket
}
/// Base URL for S3 bucket assets.
pub fn media_url(&self) -> &str {
&self.media_url
}
}
#[actix_rt::main]
async fn main() -> std::io::Result<()> {
std::env::set_var("RUST_LOG", "actix_web=info");
env_logger::init();
let site_config = SiteConfig {
bind: std::env::var("BIND").unwrap_or_else(|_| "127.0.0.1:8180".to_string()),
s3_bucket: std::env::var("S3_BUCKET").expect("Expected S3_BUCKET env var"),
media_url: std::env::var("MEDIA_URL").expect("Expected MEDIA_URL env var"),
token_endpoint: std::env::var("TOKEN_ENDPOINT").expect("Expected TOKEN_ENDPOINT env var"),
};
let bind = site_config.bind().to_string();
let s3_client = S3Client::new(Region::default());
let token_endpoint = site_config.token_endpoint().to_string();
HttpServer::new(move || {
App::new()
.wrap(middleware::Logger::default())
.data(site_config.clone())
.data(s3_client.clone())
.data(oauth::VerificationService::new(token_endpoint.clone()))
.service(web::resource("/micropub/media").route(web::post().to(handle_upload)))
})
.bind(bind)?
.run()
.await
}
|