application.rs 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. use std::{net::TcpListener, time::Duration};
  2. use actix::Actor;
  3. use actix_identity::{CookieIdentityPolicy, IdentityService};
  4. use actix_web::{dev::Server, middleware, web, web::Data, App, HttpServer, Scope};
  5. use sqlx::{postgres::PgPoolOptions, PgPool};
  6. use tokio::time::interval;
  7. use crate::{
  8. config::{
  9. env::{domain, secret, use_https},
  10. DatabaseSettings,
  11. Settings,
  12. },
  13. context::AppContext,
  14. service::{
  15. app::router as app,
  16. doc::router as doc,
  17. make_ws_biz_handlers,
  18. user::router as user,
  19. view::router as view,
  20. workspace::router as workspace,
  21. ws,
  22. ws::WsServer,
  23. },
  24. };
  25. pub struct Application {
  26. port: u16,
  27. server: Server,
  28. }
  29. impl Application {
  30. pub async fn build(configuration: Settings) -> Result<Self, std::io::Error> {
  31. let address = format!("{}:{}", configuration.application.host, configuration.application.port);
  32. let listener = TcpListener::bind(&address)?;
  33. let port = listener.local_addr().unwrap().port();
  34. let app_ctx = init_app_context(&configuration).await;
  35. let server = run(listener, app_ctx)?;
  36. Ok(Self { port, server })
  37. }
  38. pub async fn run_until_stopped(self) -> Result<(), std::io::Error> { self.server.await }
  39. pub fn port(&self) -> u16 { self.port }
  40. }
  41. pub fn run(listener: TcpListener, app_ctx: AppContext) -> Result<Server, std::io::Error> {
  42. let AppContext { ws_server, pg_pool } = app_ctx;
  43. let ws_server = Data::new(ws_server);
  44. let pg_pool = Data::new(pg_pool);
  45. let domain = domain();
  46. let secret: String = secret();
  47. let ws_biz_handlers = Data::new(make_ws_biz_handlers(pg_pool.clone()));
  48. actix_rt::spawn(period_check(pg_pool.clone()));
  49. let server = HttpServer::new(move || {
  50. App::new()
  51. .wrap(middleware::Logger::default())
  52. .wrap(identify_service(&domain, &secret))
  53. .wrap(crate::middleware::default_cors())
  54. .wrap(crate::middleware::AuthenticationService)
  55. .app_data(web::JsonConfig::default().limit(4096))
  56. .service(ws_scope())
  57. .service(user_scope())
  58. .app_data(ws_server.clone())
  59. .app_data(pg_pool.clone())
  60. .app_data(ws_biz_handlers.clone())
  61. })
  62. .listen(listener)?
  63. .run();
  64. Ok(server)
  65. }
  66. async fn period_check(_pool: Data<PgPool>) {
  67. let mut i = interval(Duration::from_secs(60));
  68. loop {
  69. i.tick().await;
  70. }
  71. }
  72. fn ws_scope() -> Scope { web::scope("/ws").service(ws::router::establish_ws_connection) }
  73. fn user_scope() -> Scope {
  74. // https://developer.mozilla.org/en-US/docs/Web/HTTP
  75. // TODO: replace GET body with query params
  76. web::scope("/api")
  77. // authentication
  78. .service(web::resource("/auth")
  79. .route(web::post().to(user::sign_in_handler))
  80. .route(web::delete().to(user::sign_out_handler))
  81. )
  82. .service(web::resource("/user")
  83. .route(web::patch().to(user::set_user_profile_handler))
  84. .route(web::get().to(user::get_user_profile_handler))
  85. )
  86. .service(web::resource("/register")
  87. .route(web::post().to(user::register_handler))
  88. )
  89. .service(web::resource("/workspace")
  90. .route(web::post().to(workspace::create_handler))
  91. .route(web::delete().to(workspace::delete_handler))
  92. .route(web::get().to(workspace::read_handler))
  93. .route(web::patch().to(workspace::update_handler))
  94. )
  95. .service(web::resource("/workspace_list/{user_id}")
  96. .route(web::get().to(workspace::workspace_list))
  97. )
  98. .service(web::resource("/app")
  99. .route(web::post().to(app::create_handler))
  100. .route(web::delete().to(app::delete_handler))
  101. .route(web::get().to(app::read_handler))
  102. .route(web::patch().to(app::update_handler))
  103. )
  104. .service(web::resource("/view")
  105. .route(web::post().to(view::create_handler))
  106. .route(web::delete().to(view::delete_handler))
  107. .route(web::get().to(view::read_handler))
  108. .route(web::patch().to(view::update_handler))
  109. )
  110. .service(web::resource("/doc")
  111. .route(web::get().to(doc::create_handler))
  112. .route(web::get().to(doc::read_handler))
  113. .route(web::patch().to(doc::update_handler))
  114. )
  115. // password
  116. .service(web::resource("/password_change")
  117. .route(web::post().to(user::change_password))
  118. )
  119. }
  120. async fn init_app_context(configuration: &Settings) -> AppContext {
  121. let _ = crate::service::log::Builder::new("flowy").env_filter("Trace").build();
  122. let pg_pool = get_connection_pool(&configuration.database).await.expect(&format!(
  123. "Failed to connect to Postgres at {:?}.",
  124. configuration.database
  125. ));
  126. let ws_server = WsServer::new().start();
  127. AppContext::new(ws_server, pg_pool)
  128. }
  129. pub fn identify_service(domain: &str, secret: &str) -> IdentityService<CookieIdentityPolicy> {
  130. IdentityService::new(
  131. CookieIdentityPolicy::new(secret.as_bytes())
  132. .name("auth")
  133. .path("/")
  134. .domain(domain)
  135. .max_age_secs(24 * 3600)
  136. .secure(use_https()),
  137. )
  138. }
  139. pub async fn get_connection_pool(configuration: &DatabaseSettings) -> Result<PgPool, sqlx::Error> {
  140. PgPoolOptions::new()
  141. .connect_timeout(std::time::Duration::from_secs(5))
  142. .connect_with(configuration.with_db())
  143. .await
  144. }