application.rs 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. use std::{net::TcpListener, time::Duration};
  2. use actix::Actor;
  3. use actix_identity::{CookieIdentityPolicy, IdentityService};
  4. use actix_web::{dev::Server, middleware, web, web::Data, App, HttpServer, Scope};
  5. use sqlx::{postgres::PgPoolOptions, PgPool};
  6. use tokio::time::interval;
  7. use crate::{
  8. config::{
  9. env::{domain, secret, use_https},
  10. DatabaseSettings,
  11. Settings,
  12. },
  13. context::AppContext,
  14. service::{
  15. app::router as app,
  16. doc::router as doc,
  17. user::router as user,
  18. view::router as view,
  19. workspace::router as workspace,
  20. ws,
  21. ws::WsServer,
  22. },
  23. };
  24. pub struct Application {
  25. port: u16,
  26. server: Server,
  27. }
  28. impl Application {
  29. pub async fn build(configuration: Settings, app_ctx: AppContext) -> Result<Self, std::io::Error> {
  30. let address = format!("{}:{}", configuration.application.host, configuration.application.port);
  31. let listener = TcpListener::bind(&address)?;
  32. let port = listener.local_addr().unwrap().port();
  33. let server = run(listener, app_ctx)?;
  34. Ok(Self { port, server })
  35. }
  36. pub async fn run_until_stopped(self) -> Result<(), std::io::Error> { self.server.await }
  37. pub fn port(&self) -> u16 { self.port }
  38. }
  39. pub fn run(listener: TcpListener, app_ctx: AppContext) -> Result<Server, std::io::Error> {
  40. let domain = domain();
  41. let secret: String = secret();
  42. actix_rt::spawn(period_check(app_ctx.pg_pool.clone()));
  43. let server = HttpServer::new(move || {
  44. App::new()
  45. .wrap(middleware::Logger::default())
  46. .wrap(identify_service(&domain, &secret))
  47. .wrap(crate::middleware::default_cors())
  48. .wrap(crate::middleware::AuthenticationService)
  49. .app_data(web::JsonConfig::default().limit(4096))
  50. .service(ws_scope())
  51. .service(user_scope())
  52. .app_data(app_ctx.ws_server.clone())
  53. .app_data(app_ctx.pg_pool.clone())
  54. .app_data(app_ctx.ws_bizs.clone())
  55. .app_data(app_ctx.doc_biz.clone())
  56. .app_data(app_ctx.runtime.clone())
  57. })
  58. .listen(listener)?
  59. .run();
  60. Ok(server)
  61. }
  62. async fn period_check(_pool: Data<PgPool>) {
  63. let mut i = interval(Duration::from_secs(60));
  64. loop {
  65. i.tick().await;
  66. }
  67. }
  68. fn ws_scope() -> Scope { web::scope("/ws").service(ws::router::establish_ws_connection) }
  69. fn user_scope() -> Scope {
  70. // https://developer.mozilla.org/en-US/docs/Web/HTTP
  71. // TODO: replace GET body with query params
  72. web::scope("/api")
  73. // authentication
  74. .service(web::resource("/auth")
  75. .route(web::post().to(user::sign_in_handler))
  76. .route(web::delete().to(user::sign_out_handler))
  77. )
  78. .service(web::resource("/user")
  79. .route(web::patch().to(user::set_user_profile_handler))
  80. .route(web::get().to(user::get_user_profile_handler))
  81. )
  82. .service(web::resource("/register")
  83. .route(web::post().to(user::register_handler))
  84. )
  85. .service(web::resource("/workspace")
  86. .route(web::post().to(workspace::create_handler))
  87. .route(web::delete().to(workspace::delete_handler))
  88. .route(web::get().to(workspace::read_handler))
  89. .route(web::patch().to(workspace::update_handler))
  90. )
  91. .service(web::resource("/workspace_list/{user_id}")
  92. .route(web::get().to(workspace::workspace_list))
  93. )
  94. .service(web::resource("/app")
  95. .route(web::post().to(app::create_handler))
  96. .route(web::delete().to(app::delete_handler))
  97. .route(web::get().to(app::read_handler))
  98. .route(web::patch().to(app::update_handler))
  99. )
  100. .service(web::resource("/view")
  101. .route(web::post().to(view::create_handler))
  102. .route(web::delete().to(view::delete_handler))
  103. .route(web::get().to(view::read_handler))
  104. .route(web::patch().to(view::update_handler))
  105. )
  106. .service(web::resource("/doc")
  107. .route(web::get().to(doc::create_handler))
  108. .route(web::get().to(doc::read_handler))
  109. .route(web::patch().to(doc::update_handler))
  110. )
  111. // password
  112. .service(web::resource("/password_change")
  113. .route(web::post().to(user::change_password))
  114. )
  115. }
  116. pub async fn init_app_context(configuration: &Settings) -> AppContext {
  117. let _ = crate::service::log::Builder::new("flowy-server")
  118. .env_filter("Trace")
  119. .build();
  120. let pg_pool = get_connection_pool(&configuration.database).await.expect(&format!(
  121. "Failed to connect to Postgres at {:?}.",
  122. configuration.database
  123. ));
  124. let ws_server = WsServer::new().start();
  125. AppContext::new(ws_server, pg_pool)
  126. }
  127. pub fn identify_service(domain: &str, secret: &str) -> IdentityService<CookieIdentityPolicy> {
  128. IdentityService::new(
  129. CookieIdentityPolicy::new(secret.as_bytes())
  130. .name("auth")
  131. .path("/")
  132. .domain(domain)
  133. .max_age_secs(24 * 3600)
  134. .secure(use_https()),
  135. )
  136. }
  137. pub async fn get_connection_pool(configuration: &DatabaseSettings) -> Result<PgPool, sqlx::Error> {
  138. PgPoolOptions::new()
  139. .connect_timeout(std::time::Duration::from_secs(5))
  140. .connect_with(configuration.with_db())
  141. .await
  142. }