add authenticated media client api
Signed-off-by: Jason Volk <jason@zemos.net>
This commit is contained in:
parent
ea2343850f
commit
1638be0339
3 changed files with 243 additions and 21 deletions
|
@ -1,14 +1,37 @@
|
||||||
|
use std::time::Duration;
|
||||||
|
|
||||||
use axum::extract::State;
|
use axum::extract::State;
|
||||||
use axum_client_ip::InsecureClientIp;
|
use axum_client_ip::InsecureClientIp;
|
||||||
use conduit::{
|
use conduit::{
|
||||||
utils::{self, content_disposition::make_content_disposition},
|
err,
|
||||||
Result,
|
utils::{self, content_disposition::make_content_disposition, math::ruma_from_usize},
|
||||||
|
Err, Result,
|
||||||
|
};
|
||||||
|
use conduit_service::{
|
||||||
|
media::{Dim, FileMeta, CACHE_CONTROL_IMMUTABLE, CORP_CROSS_ORIGIN, MXC_LENGTH},
|
||||||
|
Services,
|
||||||
|
};
|
||||||
|
use ruma::{
|
||||||
|
api::client::{
|
||||||
|
authenticated_media::{
|
||||||
|
get_content, get_content_as_filename, get_content_thumbnail, get_media_config, get_media_preview,
|
||||||
|
},
|
||||||
|
media::create_content,
|
||||||
|
},
|
||||||
|
Mxc, UserId,
|
||||||
};
|
};
|
||||||
use conduit_service::media::MXC_LENGTH;
|
|
||||||
use ruma::{api::client::media::create_content, Mxc};
|
|
||||||
|
|
||||||
use crate::Ruma;
|
use crate::Ruma;
|
||||||
|
|
||||||
|
/// # `GET /_matrix/client/v1/media/config`
|
||||||
|
pub(crate) async fn get_media_config_route(
|
||||||
|
State(services): State<crate::State>, _body: Ruma<get_media_config::v1::Request>,
|
||||||
|
) -> Result<get_media_config::v1::Response> {
|
||||||
|
Ok(get_media_config::v1::Response {
|
||||||
|
upload_size: ruma_from_usize(services.globals.config.max_request_size),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
/// # `POST /_matrix/media/v3/upload`
|
/// # `POST /_matrix/media/v3/upload`
|
||||||
///
|
///
|
||||||
/// Permanently save media in the server.
|
/// Permanently save media in the server.
|
||||||
|
@ -20,8 +43,11 @@ pub(crate) async fn create_content_route(
|
||||||
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
||||||
body: Ruma<create_content::v3::Request>,
|
body: Ruma<create_content::v3::Request>,
|
||||||
) -> Result<create_content::v3::Response> {
|
) -> Result<create_content::v3::Response> {
|
||||||
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
|
let user = body.sender_user.as_ref().expect("user is authenticated");
|
||||||
let content_disposition = make_content_disposition(None, body.content_type.as_deref(), body.filename.as_deref());
|
|
||||||
|
let filename = body.filename.as_deref();
|
||||||
|
let content_type = body.content_type.as_deref();
|
||||||
|
let content_disposition = make_content_disposition(None, content_type, filename);
|
||||||
let mxc = Mxc {
|
let mxc = Mxc {
|
||||||
server_name: services.globals.server_name(),
|
server_name: services.globals.server_name(),
|
||||||
media_id: &utils::random_string(MXC_LENGTH),
|
media_id: &utils::random_string(MXC_LENGTH),
|
||||||
|
@ -29,17 +55,209 @@ pub(crate) async fn create_content_route(
|
||||||
|
|
||||||
services
|
services
|
||||||
.media
|
.media
|
||||||
.create(
|
.create(&mxc, Some(user), Some(&content_disposition), content_type, &body.file)
|
||||||
&mxc,
|
.await
|
||||||
Some(sender_user),
|
.map(|()| create_content::v3::Response {
|
||||||
Some(&content_disposition),
|
content_uri: mxc.to_string().into(),
|
||||||
body.content_type.as_deref(),
|
blurhash: None,
|
||||||
&body.file,
|
})
|
||||||
)
|
}
|
||||||
.await?;
|
|
||||||
|
|
||||||
Ok(create_content::v3::Response {
|
/// # `GET /_matrix/client/v1/media/thumbnail/{serverName}/{mediaId}`
|
||||||
content_uri: mxc.to_string().into(),
|
///
|
||||||
blurhash: None,
|
/// Load media thumbnail from our server or over federation.
|
||||||
|
#[tracing::instrument(skip_all, fields(%client), name = "media_thumbnail_get")]
|
||||||
|
pub(crate) async fn get_content_thumbnail_route(
|
||||||
|
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
||||||
|
body: Ruma<get_content_thumbnail::v1::Request>,
|
||||||
|
) -> Result<get_content_thumbnail::v1::Response> {
|
||||||
|
let user = body.sender_user.as_ref().expect("user is authenticated");
|
||||||
|
|
||||||
|
let dim = Dim::from_ruma(body.width, body.height, body.method.clone())?;
|
||||||
|
let mxc = Mxc {
|
||||||
|
server_name: &body.server_name,
|
||||||
|
media_id: &body.media_id,
|
||||||
|
};
|
||||||
|
|
||||||
|
let FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
} = fetch_thumbnail(&services, &mxc, user, body.timeout_ms, &dim).await?;
|
||||||
|
|
||||||
|
Ok(get_content_thumbnail::v1::Response {
|
||||||
|
file: content.expect("entire file contents"),
|
||||||
|
content_type: content_type.map(Into::into),
|
||||||
|
cross_origin_resource_policy: Some(CORP_CROSS_ORIGIN.into()),
|
||||||
|
cache_control: Some(CACHE_CONTROL_IMMUTABLE.into()),
|
||||||
|
content_disposition,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// # `GET /_matrix/client/v1/media/download/{serverName}/{mediaId}`
|
||||||
|
///
|
||||||
|
/// Load media from our server or over federation.
|
||||||
|
#[tracing::instrument(skip_all, fields(%client), name = "media_get")]
|
||||||
|
pub(crate) async fn get_content_route(
|
||||||
|
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
||||||
|
body: Ruma<get_content::v1::Request>,
|
||||||
|
) -> Result<get_content::v1::Response> {
|
||||||
|
let user = body.sender_user.as_ref().expect("user is authenticated");
|
||||||
|
|
||||||
|
let mxc = Mxc {
|
||||||
|
server_name: &body.server_name,
|
||||||
|
media_id: &body.media_id,
|
||||||
|
};
|
||||||
|
|
||||||
|
let FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
} = fetch_file(&services, &mxc, user, body.timeout_ms, None).await?;
|
||||||
|
|
||||||
|
Ok(get_content::v1::Response {
|
||||||
|
file: content.expect("entire file contents"),
|
||||||
|
content_type: content_type.map(Into::into),
|
||||||
|
cross_origin_resource_policy: Some(CORP_CROSS_ORIGIN.into()),
|
||||||
|
cache_control: Some(CACHE_CONTROL_IMMUTABLE.into()),
|
||||||
|
content_disposition,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # `GET /_matrix/client/v1/media/download/{serverName}/{mediaId}/{fileName}`
|
||||||
|
///
|
||||||
|
/// Load media from our server or over federation as fileName.
|
||||||
|
#[tracing::instrument(skip_all, fields(%client), name = "media_get_af")]
|
||||||
|
pub(crate) async fn get_content_as_filename_route(
|
||||||
|
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
||||||
|
body: Ruma<get_content_as_filename::v1::Request>,
|
||||||
|
) -> Result<get_content_as_filename::v1::Response> {
|
||||||
|
let user = body.sender_user.as_ref().expect("user is authenticated");
|
||||||
|
|
||||||
|
let mxc = Mxc {
|
||||||
|
server_name: &body.server_name,
|
||||||
|
media_id: &body.media_id,
|
||||||
|
};
|
||||||
|
|
||||||
|
let FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
} = fetch_file(&services, &mxc, user, body.timeout_ms, Some(&body.filename)).await?;
|
||||||
|
|
||||||
|
Ok(get_content_as_filename::v1::Response {
|
||||||
|
file: content.expect("entire file contents"),
|
||||||
|
content_type: content_type.map(Into::into),
|
||||||
|
cross_origin_resource_policy: Some(CORP_CROSS_ORIGIN.into()),
|
||||||
|
cache_control: Some(CACHE_CONTROL_IMMUTABLE.into()),
|
||||||
|
content_disposition,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # `GET /_matrix/client/v1/media/preview_url`
|
||||||
|
///
|
||||||
|
/// Returns URL preview.
|
||||||
|
#[tracing::instrument(skip_all, fields(%client), name = "url_preview")]
|
||||||
|
pub(crate) async fn get_media_preview_route(
|
||||||
|
State(services): State<crate::State>, InsecureClientIp(client): InsecureClientIp,
|
||||||
|
body: Ruma<get_media_preview::v1::Request>,
|
||||||
|
) -> Result<get_media_preview::v1::Response> {
|
||||||
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
|
||||||
|
|
||||||
|
let url = &body.url;
|
||||||
|
if !services.media.url_preview_allowed(url) {
|
||||||
|
return Err!(Request(Forbidden(
|
||||||
|
debug_warn!(%sender_user, %url, "URL is not allowed to be previewed")
|
||||||
|
)));
|
||||||
|
}
|
||||||
|
|
||||||
|
let preview = services.media.get_url_preview(url).await.map_err(|error| {
|
||||||
|
err!(Request(Unknown(
|
||||||
|
debug_error!(%sender_user, %url, ?error, "Failed to fetch URL preview.")
|
||||||
|
)))
|
||||||
|
})?;
|
||||||
|
|
||||||
|
serde_json::value::to_raw_value(&preview)
|
||||||
|
.map(get_media_preview::v1::Response::from_raw_value)
|
||||||
|
.map_err(|error| {
|
||||||
|
err!(Request(Unknown(
|
||||||
|
debug_error!(%sender_user, %url, ?error, "Failed to parse URL preview.")
|
||||||
|
)))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn fetch_thumbnail(
|
||||||
|
services: &Services, mxc: &Mxc<'_>, user: &UserId, timeout_ms: Duration, dim: &Dim,
|
||||||
|
) -> Result<FileMeta> {
|
||||||
|
let FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
} = fetch_thumbnail_meta(services, mxc, user, timeout_ms, dim).await?;
|
||||||
|
|
||||||
|
let content_disposition = Some(make_content_disposition(
|
||||||
|
content_disposition.as_ref(),
|
||||||
|
content_type.as_deref(),
|
||||||
|
None,
|
||||||
|
));
|
||||||
|
|
||||||
|
Ok(FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn fetch_file(
|
||||||
|
services: &Services, mxc: &Mxc<'_>, user: &UserId, timeout_ms: Duration, filename: Option<&str>,
|
||||||
|
) -> Result<FileMeta> {
|
||||||
|
let FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
} = fetch_file_meta(services, mxc, user, timeout_ms).await?;
|
||||||
|
|
||||||
|
let content_disposition = Some(make_content_disposition(
|
||||||
|
content_disposition.as_ref(),
|
||||||
|
content_type.as_deref(),
|
||||||
|
filename,
|
||||||
|
));
|
||||||
|
|
||||||
|
Ok(FileMeta {
|
||||||
|
content,
|
||||||
|
content_type,
|
||||||
|
content_disposition,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn fetch_thumbnail_meta(
|
||||||
|
services: &Services, mxc: &Mxc<'_>, user: &UserId, timeout_ms: Duration, dim: &Dim,
|
||||||
|
) -> Result<FileMeta> {
|
||||||
|
if let Some(filemeta) = services.media.get_thumbnail(mxc, dim).await? {
|
||||||
|
return Ok(filemeta);
|
||||||
|
}
|
||||||
|
|
||||||
|
if services.globals.server_is_ours(mxc.server_name) {
|
||||||
|
return Err!(Request(NotFound("Local thumbnail not found.")));
|
||||||
|
}
|
||||||
|
|
||||||
|
services
|
||||||
|
.media
|
||||||
|
.fetch_remote_thumbnail(mxc, Some(user), None, timeout_ms, dim)
|
||||||
|
.await
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn fetch_file_meta(services: &Services, mxc: &Mxc<'_>, user: &UserId, timeout_ms: Duration) -> Result<FileMeta> {
|
||||||
|
if let Some(filemeta) = services.media.get(mxc).await? {
|
||||||
|
return Ok(filemeta);
|
||||||
|
}
|
||||||
|
|
||||||
|
if services.globals.server_is_ours(mxc.server_name) {
|
||||||
|
return Err!(Request(NotFound("Local media not found.")));
|
||||||
|
}
|
||||||
|
|
||||||
|
services
|
||||||
|
.media
|
||||||
|
.fetch_remote_content(mxc, Some(user), None, timeout_ms)
|
||||||
|
.await
|
||||||
|
}
|
||||||
|
|
|
@ -42,6 +42,7 @@ pub(crate) async fn get_supported_versions_route(
|
||||||
"v1.3".to_owned(),
|
"v1.3".to_owned(),
|
||||||
"v1.4".to_owned(),
|
"v1.4".to_owned(),
|
||||||
"v1.5".to_owned(),
|
"v1.5".to_owned(),
|
||||||
|
"v1.11".to_owned(),
|
||||||
],
|
],
|
||||||
unstable_features: BTreeMap::from_iter([
|
unstable_features: BTreeMap::from_iter([
|
||||||
("org.matrix.e2e_cross_signing".to_owned(), true),
|
("org.matrix.e2e_cross_signing".to_owned(), true),
|
||||||
|
|
|
@ -139,6 +139,11 @@ pub fn build(router: Router<State>, server: &Server) -> Router<State> {
|
||||||
.ruma_route(client::turn_server_route)
|
.ruma_route(client::turn_server_route)
|
||||||
.ruma_route(client::send_event_to_device_route)
|
.ruma_route(client::send_event_to_device_route)
|
||||||
.ruma_route(client::create_content_route)
|
.ruma_route(client::create_content_route)
|
||||||
|
.ruma_route(client::get_content_thumbnail_route)
|
||||||
|
.ruma_route(client::get_content_route)
|
||||||
|
.ruma_route(client::get_content_as_filename_route)
|
||||||
|
.ruma_route(client::get_media_preview_route)
|
||||||
|
.ruma_route(client::get_media_config_route)
|
||||||
.ruma_route(client::get_devices_route)
|
.ruma_route(client::get_devices_route)
|
||||||
.ruma_route(client::get_device_route)
|
.ruma_route(client::get_device_route)
|
||||||
.ruma_route(client::update_device_route)
|
.ruma_route(client::update_device_route)
|
||||||
|
@ -247,8 +252,6 @@ async fn initial_sync(_uri: Uri) -> impl IntoResponse {
|
||||||
err!(Request(GuestAccessForbidden("Guest access not implemented")))
|
err!(Request(GuestAccessForbidden("Guest access not implemented")))
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn federation_disabled() -> impl IntoResponse { err!(Config("allow_federation", "Federation is disabled.")) }
|
async fn legacy_media_disabled() -> impl IntoResponse { err!(Request(Forbidden("Unauthenticated media is disabled."))) }
|
||||||
|
|
||||||
async fn legacy_media_disabled() -> impl IntoResponse {
|
async fn federation_disabled() -> impl IntoResponse { err!(Request(Forbidden("Federation is disabled."))) }
|
||||||
err!(Config("allow_legacy_media", "Unauthenticated media is disabled."))
|
|
||||||
}
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue