application.rs 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. use std::{net::TcpListener, time::Duration};
  2. use actix::Actor;
  3. use actix_identity::{CookieIdentityPolicy, IdentityService};
  4. use actix_web::{dev::Server, middleware, web, web::Data, App, HttpServer, Scope};
  5. use sqlx::{postgres::PgPoolOptions, PgPool};
  6. use tokio::time::interval;
  7. use crate::{
  8. config::{
  9. env::{domain, secret, use_https},
  10. DatabaseSettings,
  11. Settings,
  12. },
  13. context::AppContext,
  14. service::{
  15. app::router as app,
  16. doc::router as doc,
  17. trash::router as trash,
  18. user::router as user,
  19. view::router as view,
  20. workspace::router as workspace,
  21. ws,
  22. ws::WsServer,
  23. },
  24. };
  25. pub struct Application {
  26. port: u16,
  27. server: Server,
  28. }
  29. impl Application {
  30. pub async fn build(configuration: Settings, app_ctx: AppContext) -> Result<Self, std::io::Error> {
  31. let address = format!("{}:{}", configuration.application.host, configuration.application.port);
  32. let listener = TcpListener::bind(&address)?;
  33. let port = listener.local_addr().unwrap().port();
  34. let server = run(listener, app_ctx)?;
  35. Ok(Self { port, server })
  36. }
  37. pub async fn run_until_stopped(self) -> Result<(), std::io::Error> { self.server.await }
  38. pub fn port(&self) -> u16 { self.port }
  39. }
  40. pub fn run(listener: TcpListener, app_ctx: AppContext) -> Result<Server, std::io::Error> {
  41. let domain = domain();
  42. let secret: String = secret();
  43. actix_rt::spawn(period_check(app_ctx.pg_pool.clone()));
  44. let server = HttpServer::new(move || {
  45. App::new()
  46. .wrap(middleware::Logger::default())
  47. .wrap(identify_service(&domain, &secret))
  48. .wrap(crate::middleware::default_cors())
  49. .wrap(crate::middleware::AuthenticationService)
  50. .app_data(web::JsonConfig::default().limit(4096))
  51. .service(ws_scope())
  52. .service(user_scope())
  53. .app_data(app_ctx.ws_server.clone())
  54. .app_data(app_ctx.pg_pool.clone())
  55. .app_data(app_ctx.ws_bizs.clone())
  56. .app_data(app_ctx.doc_biz.clone())
  57. })
  58. .listen(listener)?
  59. .run();
  60. Ok(server)
  61. }
  62. async fn period_check(_pool: Data<PgPool>) {
  63. let mut i = interval(Duration::from_secs(60));
  64. loop {
  65. i.tick().await;
  66. }
  67. }
  68. fn ws_scope() -> Scope { web::scope("/ws").service(ws::router::establish_ws_connection) }
  69. fn user_scope() -> Scope {
  70. // https://developer.mozilla.org/en-US/docs/Web/HTTP
  71. // TODO: replace GET body with query params
  72. web::scope("/api")
  73. // authentication
  74. .service(web::resource("/auth")
  75. .route(web::post().to(user::sign_in_handler))
  76. .route(web::delete().to(user::sign_out_handler))
  77. )
  78. .service(web::resource("/user")
  79. .route(web::patch().to(user::set_user_profile_handler))
  80. .route(web::get().to(user::get_user_profile_handler))
  81. )
  82. .service(web::resource("/register")
  83. .route(web::post().to(user::register_handler))
  84. )
  85. .service(web::resource("/workspace")
  86. .route(web::post().to(workspace::create_handler))
  87. .route(web::delete().to(workspace::delete_handler))
  88. .route(web::get().to(workspace::read_handler))
  89. .route(web::patch().to(workspace::update_handler))
  90. )
  91. .service(web::resource("/workspace_list/{user_id}")
  92. .route(web::get().to(workspace::workspace_list))
  93. )
  94. .service(web::resource("/app")
  95. .route(web::post().to(app::create_handler))
  96. .route(web::get().to(app::read_handler))
  97. .route(web::delete().to(app::delete_handler))
  98. .route(web::patch().to(app::update_handler))
  99. )
  100. .service(web::resource("/view")
  101. .route(web::post().to(view::create_handler))
  102. .route(web::delete().to(view::delete_handler))
  103. .route(web::get().to(view::read_handler))
  104. .route(web::patch().to(view::update_handler))
  105. )
  106. .service(web::resource("/doc")
  107. .route(web::post().to(doc::create_handler))
  108. .route(web::get().to(doc::read_handler))
  109. .route(web::patch().to(doc::update_handler))
  110. )
  111. .service(web::resource("/trash")
  112. .route(web::post().to(trash::create_handler))
  113. .route(web::delete().to(trash::delete_handler))
  114. .route(web::get().to(trash::read_handler))
  115. )
  116. // password
  117. .service(web::resource("/password_change")
  118. .route(web::post().to(user::change_password))
  119. )
  120. }
  121. pub async fn init_app_context(configuration: &Settings) -> AppContext {
  122. let _ = crate::service::log::Builder::new("flowy-server")
  123. .env_filter("Trace")
  124. .build();
  125. let pg_pool = get_connection_pool(&configuration.database).await.expect(&format!(
  126. "Failed to connect to Postgres at {:?}.",
  127. configuration.database
  128. ));
  129. let ws_server = WsServer::new().start();
  130. AppContext::new(ws_server, pg_pool)
  131. }
  132. pub fn identify_service(domain: &str, secret: &str) -> IdentityService<CookieIdentityPolicy> {
  133. IdentityService::new(
  134. CookieIdentityPolicy::new(secret.as_bytes())
  135. .name("auth")
  136. .path("/")
  137. .domain(domain)
  138. .max_age_secs(24 * 3600)
  139. .secure(use_https()),
  140. )
  141. }
  142. pub async fn get_connection_pool(configuration: &DatabaseSettings) -> Result<PgPool, sqlx::Error> {
  143. PgPoolOptions::new()
  144. .connect_timeout(std::time::Duration::from_secs(5))
  145. .connect_with(configuration.with_db())
  146. .await
  147. }