forked from gorb/backend
165 lines
4.9 KiB
Rust
165 lines
4.9 KiB
Rust
use actix_cors::Cors;
|
|
use actix_web::{App, HttpServer, web};
|
|
use argon2::Argon2;
|
|
use clap::Parser;
|
|
use diesel_async::pooled_connection::AsyncDieselConnectionManager;
|
|
use diesel_async::pooled_connection::deadpool::Pool;
|
|
use error::Error;
|
|
use simple_logger::SimpleLogger;
|
|
use std::time::SystemTime;
|
|
use structs::MailClient;
|
|
mod config;
|
|
use config::{Config, ConfigBuilder};
|
|
use diesel_migrations::{EmbeddedMigrations, MigrationHarness, embed_migrations};
|
|
|
|
pub const MIGRATIONS: EmbeddedMigrations = embed_migrations!();
|
|
|
|
type Conn =
|
|
deadpool::managed::Object<AsyncDieselConnectionManager<diesel_async::AsyncPgConnection>>;
|
|
|
|
mod api;
|
|
pub mod error;
|
|
pub mod schema;
|
|
pub mod structs;
|
|
pub mod utils;
|
|
|
|
#[derive(Parser, Debug)]
|
|
#[command(version, about, long_about = None)]
|
|
struct Args {
|
|
#[arg(short, long, default_value_t = String::from("/etc/gorb/config.toml"))]
|
|
config: String,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
pub struct Data {
|
|
pub pool: deadpool::managed::Pool<
|
|
AsyncDieselConnectionManager<diesel_async::AsyncPgConnection>,
|
|
Conn,
|
|
>,
|
|
pub cache_pool: redis::Client,
|
|
pub config: Config,
|
|
pub argon2: Argon2<'static>,
|
|
pub start_time: SystemTime,
|
|
pub bunny_cdn: bunny_api_tokio::Client,
|
|
pub mail_client: MailClient,
|
|
}
|
|
|
|
#[tokio::main]
|
|
async fn main() -> Result<(), Error> {
|
|
SimpleLogger::new()
|
|
.with_level(log::LevelFilter::Info)
|
|
.with_colors(true)
|
|
.env()
|
|
.init()
|
|
.unwrap();
|
|
let args = Args::parse();
|
|
|
|
let config = ConfigBuilder::load(args.config).await?.build();
|
|
|
|
let web = config.web.clone();
|
|
|
|
// create a new connection pool with the default config
|
|
let pool_config =
|
|
AsyncDieselConnectionManager::<diesel_async::AsyncPgConnection>::new(config.database.url());
|
|
let pool = Pool::builder(pool_config).build()?;
|
|
|
|
let cache_pool = redis::Client::open(config.cache_database.url())?;
|
|
|
|
let mut bunny_cdn = bunny_api_tokio::Client::new("").await?;
|
|
|
|
let bunny = config.bunny.clone();
|
|
|
|
bunny_cdn
|
|
.storage
|
|
.init(bunny.api_key, bunny.endpoint, bunny.storage_zone)
|
|
.await?;
|
|
|
|
let mail = config.mail.clone();
|
|
|
|
let mail_client = MailClient::new(
|
|
mail.smtp.credentials(),
|
|
mail.smtp.server,
|
|
mail.address,
|
|
mail.tls,
|
|
)?;
|
|
|
|
let database_url = config.database.url();
|
|
|
|
tokio::task::spawn_blocking(move || {
|
|
use diesel::prelude::Connection;
|
|
use diesel_async::async_connection_wrapper::AsyncConnectionWrapper;
|
|
|
|
let mut conn =
|
|
AsyncConnectionWrapper::<diesel_async::AsyncPgConnection>::establish(&database_url)?;
|
|
|
|
conn.run_pending_migrations(MIGRATIONS)?;
|
|
Ok::<_, Box<dyn std::error::Error + Send + Sync>>(())
|
|
})
|
|
.await?
|
|
.unwrap();
|
|
|
|
/*
|
|
**Stored for later possible use**
|
|
|
|
CREATE TABLE IF NOT EXISTS emojis (
|
|
uuid uuid PRIMARY KEY NOT NULL,
|
|
name varchar(32) NOT NULL,
|
|
guild_uuid uuid REFERENCES guilds(uuid) ON DELETE SET NULL,
|
|
deleted boolean DEFAULT FALSE
|
|
);
|
|
CREATE TABLE IF NOT EXISTS message_reactions (
|
|
message_uuid uuid NOT NULL REFERENCES messages(uuid),
|
|
user_uuid uuid NOT NULL REFERENCES users(uuid),
|
|
emoji_uuid uuid NOT NULL REFERENCES emojis(uuid),
|
|
PRIMARY KEY (message_uuid, user_uuid, emoji_uuid)
|
|
)
|
|
*/
|
|
|
|
let data = Data {
|
|
pool,
|
|
cache_pool,
|
|
config,
|
|
// TODO: Possibly implement "pepper" into this (thinking it could generate one if it doesnt exist and store it on disk)
|
|
argon2: Argon2::default(),
|
|
start_time: SystemTime::now(),
|
|
bunny_cdn,
|
|
mail_client,
|
|
};
|
|
|
|
HttpServer::new(move || {
|
|
// Set CORS headers
|
|
let cors = Cors::default()
|
|
/*
|
|
Set Allowed-Control-Allow-Origin header to whatever
|
|
the request's Origin header is. Must be done like this
|
|
rather than setting it to "*" due to CORS not allowing
|
|
sending of credentials (cookies) with wildcard origin.
|
|
*/
|
|
.allowed_origin_fn(|_origin, _req_head| true)
|
|
/*
|
|
Allows any request method in CORS preflight requests.
|
|
This will be restricted to only ones actually in use later.
|
|
*/
|
|
.allow_any_method()
|
|
/*
|
|
Allows any header(s) in request in CORS preflight requests.
|
|
This wll be restricted to only ones actually in use later.
|
|
*/
|
|
.allow_any_header()
|
|
/*
|
|
Allows browser to include cookies in requests.
|
|
This is needed for receiving the secure HttpOnly refresh_token cookie.
|
|
*/
|
|
.supports_credentials();
|
|
|
|
App::new()
|
|
.app_data(web::Data::new(data.clone()))
|
|
.wrap(cors)
|
|
.service(api::web(&data.config.web.backend_url.path()))
|
|
})
|
|
.bind((web.ip, web.port))?
|
|
.run()
|
|
.await?;
|
|
|
|
Ok(())
|
|
}
|