Compare commits
6 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| aa2d92a7ae | |||
| 786579a7d8 | |||
| af9359bbdf | |||
| b8c705554f | |||
| 826a3b59c9 | |||
| 22f9405229 |
Generated
+95
@@ -93,6 +93,18 @@ version = "1.0.98"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "e16d2d3311acee920a9eb8d33b8cbc1787ce4a264e85f964c2404b969bdcd487"
|
||||
|
||||
[[package]]
|
||||
name = "argon2"
|
||||
version = "0.5.3"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "3c3610892ee6e0cbce8ae2700349fcf8f98adb0dbfbee85aec3c9179d29cc072"
|
||||
dependencies = [
|
||||
"base64ct",
|
||||
"blake2",
|
||||
"cpufeatures",
|
||||
"password-hash",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "arrayvec"
|
||||
version = "0.7.6"
|
||||
@@ -143,6 +155,12 @@ version = "0.22.1"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6"
|
||||
|
||||
[[package]]
|
||||
name = "base64ct"
|
||||
version = "1.8.3"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "2af50177e190e07a26ab74f8b1efbfe2ef87da2116221318cb1c2e82baf7de06"
|
||||
|
||||
[[package]]
|
||||
name = "bindgen"
|
||||
version = "0.72.0"
|
||||
@@ -181,6 +199,15 @@ dependencies = [
|
||||
"wyz",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "blake2"
|
||||
version = "0.10.6"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "46502ad458c9a52b69d4d4d32775c788b7a1b85e8bc9d482d92250fc0e3f8efe"
|
||||
dependencies = [
|
||||
"digest",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "block-buffer"
|
||||
version = "0.10.4"
|
||||
@@ -531,6 +558,18 @@ dependencies = [
|
||||
"xxhash-rust",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "fallible-iterator"
|
||||
version = "0.3.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "2acce4a10f12dc2fb14a218589d4f1f62ef011b2d0cc4b3cb1bba8e94da14649"
|
||||
|
||||
[[package]]
|
||||
name = "fallible-streaming-iterator"
|
||||
version = "0.1.9"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "7360491ce676a36bf9bb3c56c1aa791658183a54d2744120f27285738d90465a"
|
||||
|
||||
[[package]]
|
||||
name = "fastrand"
|
||||
version = "2.3.0"
|
||||
@@ -553,6 +592,12 @@ version = "1.0.7"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
|
||||
|
||||
[[package]]
|
||||
name = "foldhash"
|
||||
version = "0.1.5"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "d9c4f5dac5e15c24eb999c26181a6ca40b39fe946cbe4c263c7209467bc83af2"
|
||||
|
||||
[[package]]
|
||||
name = "foreign-types"
|
||||
version = "0.3.2"
|
||||
@@ -677,6 +722,7 @@ name = "gamestream-webtransport-proxy"
|
||||
version = "0.1.0"
|
||||
dependencies = [
|
||||
"anyhow",
|
||||
"argon2",
|
||||
"directories",
|
||||
"flatbuffers",
|
||||
"getrandom 0.3.3",
|
||||
@@ -690,6 +736,7 @@ dependencies = [
|
||||
"openssl",
|
||||
"rand 0.9.1",
|
||||
"reqwest",
|
||||
"rusqlite",
|
||||
"salvo",
|
||||
"serde",
|
||||
"serde-xml-rs",
|
||||
@@ -834,6 +881,18 @@ name = "hashbrown"
|
||||
version = "0.15.4"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "5971ac85611da7067dbfcabef3c70ebb5606018acd9e2a3903a0da507521e0d5"
|
||||
dependencies = [
|
||||
"foldhash",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "hashlink"
|
||||
version = "0.10.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "7382cf6263419f2d8df38c55d7da83da5c18aef87fc7a7fc1fb1e344edfe14c1"
|
||||
dependencies = [
|
||||
"hashbrown 0.15.4",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "headers"
|
||||
@@ -1256,6 +1315,17 @@ dependencies = [
|
||||
"libc",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "libsqlite3-sys"
|
||||
version = "0.32.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "fbb8270bb4060bd76c6e96f20c52d80620f1d82a3470885694e41e0f81ef6fe7"
|
||||
dependencies = [
|
||||
"cc",
|
||||
"pkg-config",
|
||||
"vcpkg",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "linux-raw-sys"
|
||||
version = "0.9.4"
|
||||
@@ -1549,6 +1619,17 @@ dependencies = [
|
||||
"windows-targets 0.52.6",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "password-hash"
|
||||
version = "0.5.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "346f04948ba92c43e8469c1ee6736c7563d71012b17d40745260fe106aac2166"
|
||||
dependencies = [
|
||||
"base64ct",
|
||||
"rand_core 0.6.4",
|
||||
"subtle",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "path-slash"
|
||||
version = "0.2.1"
|
||||
@@ -1989,6 +2070,20 @@ dependencies = [
|
||||
"syn 1.0.109",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "rusqlite"
|
||||
version = "0.34.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "37e34486da88d8e051c7c0e23c3f15fd806ea8546260aa2fec247e97242ec143"
|
||||
dependencies = [
|
||||
"bitflags",
|
||||
"fallible-iterator",
|
||||
"fallible-streaming-iterator",
|
||||
"hashlink",
|
||||
"libsqlite3-sys",
|
||||
"smallvec",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "rust-embed"
|
||||
version = "8.6.0"
|
||||
|
||||
@@ -1,22 +1,67 @@
|
||||
<script lang="ts">
|
||||
//import Header from './Header.svelte';
|
||||
import { onMount } from 'svelte';
|
||||
import { goto } from '$app/navigation';
|
||||
import { page } from '$app/state';
|
||||
import { isAuthenticated, getToken, handleUnauthorized } from './stores/authStore.svelte';
|
||||
import '../app.css';
|
||||
|
||||
let { children } = $props();
|
||||
|
||||
let userProfile: { username: string; is_admin: boolean } | null = $state(null);
|
||||
let authChecked = $state(false);
|
||||
|
||||
onMount(async () => {
|
||||
const currentPath = page.url.pathname;
|
||||
|
||||
if (currentPath === '/login') {
|
||||
authChecked = true;
|
||||
return;
|
||||
}
|
||||
|
||||
if (!isAuthenticated()) {
|
||||
await goto('/login');
|
||||
authChecked = true;
|
||||
return;
|
||||
}
|
||||
|
||||
// Validate token by fetching user profile
|
||||
try {
|
||||
const response = await fetch('/api/auth/me', {
|
||||
headers: { Authorization: `Bearer ${getToken()}` }
|
||||
});
|
||||
|
||||
if (!response.ok) {
|
||||
handleUnauthorized();
|
||||
authChecked = true;
|
||||
return;
|
||||
}
|
||||
|
||||
userProfile = await response.json();
|
||||
} catch {
|
||||
handleUnauthorized();
|
||||
}
|
||||
|
||||
authChecked = true;
|
||||
});
|
||||
</script>
|
||||
|
||||
<div class="app">
|
||||
<!--<Header />-->
|
||||
{#if authChecked}
|
||||
{#if userProfile && page.url.pathname !== '/login'}
|
||||
<nav class="top-nav">
|
||||
<a href="/" class="nav-link">Apps</a>
|
||||
{#if userProfile.is_admin}
|
||||
<a href="/admin" class="nav-link">Admin</a>
|
||||
{/if}
|
||||
<span class="nav-spacer"></span>
|
||||
<span class="nav-user">{userProfile.username}</span>
|
||||
</nav>
|
||||
{/if}
|
||||
|
||||
<main>
|
||||
{@render children()}
|
||||
</main>
|
||||
|
||||
<!--<footer>
|
||||
<p>
|
||||
visit <a href="https://svelte.dev/docs/kit">svelte.dev/docs/kit</a> to learn about SvelteKit
|
||||
</p>
|
||||
</footer>-->
|
||||
<main>
|
||||
{@render children()}
|
||||
</main>
|
||||
{/if}
|
||||
</div>
|
||||
|
||||
<style>
|
||||
@@ -27,31 +72,39 @@
|
||||
}
|
||||
|
||||
main {
|
||||
/*flex: 1;*/
|
||||
/*display: flex;*/
|
||||
/*flex-direction: column;*/
|
||||
/*padding: 1rem;*/
|
||||
width: 100%;
|
||||
/*max-width: 64rem;*/
|
||||
margin: 0 auto;
|
||||
box-sizing: border-box;
|
||||
}
|
||||
|
||||
footer {
|
||||
.top-nav {
|
||||
display: flex;
|
||||
flex-direction: column;
|
||||
justify-content: center;
|
||||
align-items: center;
|
||||
padding: 12px;
|
||||
padding: 0.5rem 1rem;
|
||||
background-color: #1a1a2e;
|
||||
border-bottom: 1px solid #333;
|
||||
}
|
||||
|
||||
footer a {
|
||||
font-weight: bold;
|
||||
.nav-link {
|
||||
color: #aaa;
|
||||
text-decoration: none;
|
||||
padding: 0.4rem 0.8rem;
|
||||
border-radius: 4px;
|
||||
font-size: 0.9rem;
|
||||
}
|
||||
|
||||
@media (min-width: 480px) {
|
||||
footer {
|
||||
padding: 12px 0;
|
||||
}
|
||||
.nav-link:hover {
|
||||
color: #e0e0e0;
|
||||
background-color: #2a2a4e;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.nav-spacer {
|
||||
flex-grow: 1;
|
||||
}
|
||||
|
||||
.nav-user {
|
||||
color: #888;
|
||||
font-size: 0.85rem;
|
||||
}
|
||||
</style>
|
||||
|
||||
@@ -25,6 +25,7 @@
|
||||
streamStore.CertHash = streamData.CertHash;
|
||||
streamStore.Width = streamData.Width;
|
||||
streamStore.Height = streamData.Height;
|
||||
streamStore.StreamToken = streamData.StreamToken;
|
||||
|
||||
console.log(`Stream data retrieved. Navigating to /stream.`);
|
||||
await goto('/stream');
|
||||
|
||||
@@ -0,0 +1,535 @@
|
||||
<script lang="ts">
|
||||
import { onMount } from 'svelte';
|
||||
import { goto } from '$app/navigation';
|
||||
import { getToken, handleUnauthorized } from '../stores/authStore.svelte';
|
||||
import { fetchApps, type App } from '../apps';
|
||||
|
||||
interface User {
|
||||
id: string;
|
||||
username: string;
|
||||
is_admin: boolean;
|
||||
created_at: string;
|
||||
}
|
||||
|
||||
interface AppPermission {
|
||||
server: string;
|
||||
app_id: number;
|
||||
}
|
||||
|
||||
let users: User[] = $state([]);
|
||||
let allApps: Record<string, App[]> = $state({});
|
||||
let loading = $state(true);
|
||||
let error = $state('');
|
||||
|
||||
// Create user form
|
||||
let newUsername = $state('');
|
||||
let newPassword = $state('');
|
||||
let newIsAdmin = $state(false);
|
||||
let createError = $state('');
|
||||
|
||||
// Edit permissions
|
||||
let editingUserId: string | null = $state(null);
|
||||
let editingPermissions: Set<string> = $state(new Set());
|
||||
|
||||
// Edit user
|
||||
let editingUserDetails: string | null = $state(null);
|
||||
let editPassword = $state('');
|
||||
let editIsAdmin = $state(false);
|
||||
let editError = $state('');
|
||||
|
||||
function authHeaders(): Record<string, string> {
|
||||
return {
|
||||
'Authorization': `Bearer ${getToken()}`,
|
||||
'Content-Type': 'application/json'
|
||||
};
|
||||
}
|
||||
|
||||
async function authFetch(url: string, options: RequestInit = {}) {
|
||||
const response = await fetch(url, {
|
||||
...options,
|
||||
headers: { ...authHeaders(), ...(options.headers || {}) }
|
||||
});
|
||||
if (response.status === 401) {
|
||||
handleUnauthorized();
|
||||
throw new Error('Unauthorized');
|
||||
}
|
||||
return response;
|
||||
}
|
||||
|
||||
async function loadUsers() {
|
||||
const response = await authFetch('/api/admin/users');
|
||||
if (response.ok) {
|
||||
users = await response.json();
|
||||
}
|
||||
}
|
||||
|
||||
async function loadApps() {
|
||||
try {
|
||||
const data = await fetchApps();
|
||||
allApps = data.apps;
|
||||
} catch {
|
||||
// Apps may fail if no servers paired, that's ok
|
||||
}
|
||||
}
|
||||
|
||||
onMount(async () => {
|
||||
try {
|
||||
// Verify admin access
|
||||
const meResp = await authFetch('/api/auth/me');
|
||||
if (!meResp.ok) return;
|
||||
const me = await meResp.json();
|
||||
if (!me.is_admin) {
|
||||
await goto('/');
|
||||
return;
|
||||
}
|
||||
|
||||
await Promise.all([loadUsers(), loadApps()]);
|
||||
} catch (e) {
|
||||
error = 'Failed to load admin data';
|
||||
} finally {
|
||||
loading = false;
|
||||
}
|
||||
});
|
||||
|
||||
async function createUser() {
|
||||
createError = '';
|
||||
if (!newUsername || !newPassword) {
|
||||
createError = 'Username and password are required';
|
||||
return;
|
||||
}
|
||||
try {
|
||||
const response = await authFetch('/api/admin/users', {
|
||||
method: 'POST',
|
||||
body: JSON.stringify({
|
||||
username: newUsername,
|
||||
password: newPassword,
|
||||
is_admin: newIsAdmin
|
||||
})
|
||||
});
|
||||
if (!response.ok) {
|
||||
const data = await response.json().catch(() => null);
|
||||
createError = data?.description || 'Failed to create user';
|
||||
return;
|
||||
}
|
||||
newUsername = '';
|
||||
newPassword = '';
|
||||
newIsAdmin = false;
|
||||
await loadUsers();
|
||||
} catch {
|
||||
createError = 'Connection error';
|
||||
}
|
||||
}
|
||||
|
||||
async function deleteUser(userId: string, username: string) {
|
||||
if (!confirm(`Delete user "${username}"? This cannot be undone.`)) return;
|
||||
await authFetch(`/api/admin/users/${userId}`, { method: 'DELETE' });
|
||||
await loadUsers();
|
||||
}
|
||||
|
||||
function startEditUser(user: User) {
|
||||
editingUserDetails = user.id;
|
||||
editPassword = '';
|
||||
editIsAdmin = user.is_admin;
|
||||
editError = '';
|
||||
}
|
||||
|
||||
function cancelEditUser() {
|
||||
editingUserDetails = null;
|
||||
}
|
||||
|
||||
async function saveEditUser() {
|
||||
if (!editingUserDetails) return;
|
||||
editError = '';
|
||||
|
||||
const body: Record<string, unknown> = {};
|
||||
if (editPassword) body.password = editPassword;
|
||||
body.is_admin = editIsAdmin;
|
||||
|
||||
try {
|
||||
const response = await authFetch(`/api/admin/users/${editingUserDetails}`, {
|
||||
method: 'PUT',
|
||||
body: JSON.stringify(body)
|
||||
});
|
||||
if (!response.ok) {
|
||||
const data = await response.json().catch(() => null);
|
||||
editError = data?.description || 'Failed to update user';
|
||||
return;
|
||||
}
|
||||
editingUserDetails = null;
|
||||
await loadUsers();
|
||||
} catch {
|
||||
editError = 'Connection error';
|
||||
}
|
||||
}
|
||||
|
||||
async function startEditPermissions(userId: string) {
|
||||
editingUserId = userId;
|
||||
const response = await authFetch(`/api/admin/users/${userId}/permissions`);
|
||||
if (response.ok) {
|
||||
const perms: AppPermission[] = await response.json();
|
||||
editingPermissions = new Set(perms.map(p => `${p.server}:${p.app_id}`));
|
||||
}
|
||||
}
|
||||
|
||||
function cancelEditPermissions() {
|
||||
editingUserId = null;
|
||||
editingPermissions = new Set();
|
||||
}
|
||||
|
||||
function togglePermission(server: string, appId: number) {
|
||||
const key = `${server}:${appId}`;
|
||||
const next = new Set(editingPermissions);
|
||||
if (next.has(key)) {
|
||||
next.delete(key);
|
||||
} else {
|
||||
next.add(key);
|
||||
}
|
||||
editingPermissions = next;
|
||||
}
|
||||
|
||||
async function savePermissions() {
|
||||
if (!editingUserId) return;
|
||||
const permissions: AppPermission[] = Array.from(editingPermissions).map(key => {
|
||||
const [server, appId] = key.split(':');
|
||||
return { server, app_id: parseInt(appId) };
|
||||
});
|
||||
|
||||
await authFetch(`/api/admin/users/${editingUserId}/permissions`, {
|
||||
method: 'PUT',
|
||||
body: JSON.stringify({ permissions })
|
||||
});
|
||||
|
||||
editingUserId = null;
|
||||
editingPermissions = new Set();
|
||||
}
|
||||
|
||||
function permKey(server: string, appId: number): string {
|
||||
return `${server}:${appId}`;
|
||||
}
|
||||
</script>
|
||||
|
||||
<svelte:head>
|
||||
<title>Admin</title>
|
||||
</svelte:head>
|
||||
|
||||
<div class="admin-container">
|
||||
<h1>User Management</h1>
|
||||
|
||||
{#if loading}
|
||||
<p class="loading">Loading...</p>
|
||||
{:else if error}
|
||||
<p class="error">{error}</p>
|
||||
{:else}
|
||||
<!-- Create User -->
|
||||
<div class="section">
|
||||
<h2>Create User</h2>
|
||||
<form class="create-form" onsubmit={(e) => { e.preventDefault(); createUser(); }}>
|
||||
<input type="text" placeholder="Username" bind:value={newUsername} />
|
||||
<input type="password" placeholder="Password" bind:value={newPassword} />
|
||||
<label class="checkbox-label">
|
||||
<input type="checkbox" bind:checked={newIsAdmin} />
|
||||
Admin
|
||||
</label>
|
||||
<button type="submit">Create</button>
|
||||
</form>
|
||||
{#if createError}
|
||||
<p class="error">{createError}</p>
|
||||
{/if}
|
||||
</div>
|
||||
|
||||
<!-- User List -->
|
||||
<div class="section">
|
||||
<h2>Users</h2>
|
||||
<table>
|
||||
<thead>
|
||||
<tr>
|
||||
<th>Username</th>
|
||||
<th>Role</th>
|
||||
<th>Actions</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
{#each users as user}
|
||||
<tr>
|
||||
<td>{user.username}</td>
|
||||
<td>
|
||||
<span class="role-badge" class:admin={user.is_admin}>
|
||||
{user.is_admin ? 'Admin' : 'User'}
|
||||
</span>
|
||||
</td>
|
||||
<td class="actions">
|
||||
<button class="btn-sm" onclick={() => startEditUser(user)}>Edit</button>
|
||||
<button class="btn-sm" onclick={() => startEditPermissions(user.id)}>Permissions</button>
|
||||
<button class="btn-sm btn-danger" onclick={() => deleteUser(user.id, user.username)}>Delete</button>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<!-- Edit User Inline -->
|
||||
{#if editingUserDetails === user.id}
|
||||
<tr class="edit-row">
|
||||
<td colspan="3">
|
||||
<div class="edit-form">
|
||||
<div class="field-row">
|
||||
<label>New Password (leave blank to keep)</label>
|
||||
<input type="password" bind:value={editPassword} placeholder="New password" />
|
||||
</div>
|
||||
<div class="field-row">
|
||||
<label class="checkbox-label">
|
||||
<input type="checkbox" bind:checked={editIsAdmin} />
|
||||
Admin
|
||||
</label>
|
||||
</div>
|
||||
{#if editError}
|
||||
<p class="error">{editError}</p>
|
||||
{/if}
|
||||
<div class="button-row">
|
||||
<button class="btn-sm" onclick={saveEditUser}>Save</button>
|
||||
<button class="btn-sm" onclick={cancelEditUser}>Cancel</button>
|
||||
</div>
|
||||
</div>
|
||||
</td>
|
||||
</tr>
|
||||
{/if}
|
||||
|
||||
<!-- Edit Permissions Inline -->
|
||||
{#if editingUserId === user.id}
|
||||
<tr class="edit-row">
|
||||
<td colspan="3">
|
||||
<div class="permissions-editor">
|
||||
<h3>App Permissions for {user.username}</h3>
|
||||
{#if Object.keys(allApps).length === 0}
|
||||
<p class="muted">No servers paired. Pair a server first to manage app permissions.</p>
|
||||
{:else}
|
||||
{#each Object.entries(allApps) as [serverName, apps]}
|
||||
<div class="server-group">
|
||||
<h4>{serverName}</h4>
|
||||
{#each apps as app}
|
||||
<label class="perm-checkbox">
|
||||
<input
|
||||
type="checkbox"
|
||||
checked={editingPermissions.has(permKey(serverName, app.id))}
|
||||
onchange={() => togglePermission(serverName, app.id)}
|
||||
/>
|
||||
{app.title}
|
||||
</label>
|
||||
{/each}
|
||||
</div>
|
||||
{/each}
|
||||
{/if}
|
||||
<div class="button-row">
|
||||
<button class="btn-sm" onclick={savePermissions}>Save Permissions</button>
|
||||
<button class="btn-sm" onclick={cancelEditPermissions}>Cancel</button>
|
||||
</div>
|
||||
</div>
|
||||
</td>
|
||||
</tr>
|
||||
{/if}
|
||||
{/each}
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
{/if}
|
||||
</div>
|
||||
|
||||
<style>
|
||||
.admin-container {
|
||||
max-width: 800px;
|
||||
margin: 2rem auto;
|
||||
padding: 0 1rem;
|
||||
}
|
||||
|
||||
h1 {
|
||||
color: #e0e0e0;
|
||||
font-size: 1.5rem;
|
||||
margin-bottom: 1.5rem;
|
||||
}
|
||||
|
||||
h2 {
|
||||
color: #ccc;
|
||||
font-size: 1.1rem;
|
||||
margin-bottom: 0.8rem;
|
||||
}
|
||||
|
||||
h3 {
|
||||
color: #ccc;
|
||||
font-size: 1rem;
|
||||
margin: 0 0 0.5rem 0;
|
||||
}
|
||||
|
||||
h4 {
|
||||
color: #aaa;
|
||||
font-size: 0.9rem;
|
||||
margin: 0.5rem 0 0.3rem 0;
|
||||
}
|
||||
|
||||
.section {
|
||||
margin-bottom: 2rem;
|
||||
}
|
||||
|
||||
.loading, .error {
|
||||
color: #aaa;
|
||||
}
|
||||
|
||||
.error {
|
||||
color: #ff4444;
|
||||
font-size: 0.85rem;
|
||||
}
|
||||
|
||||
.muted {
|
||||
color: #666;
|
||||
font-size: 0.85rem;
|
||||
}
|
||||
|
||||
.create-form {
|
||||
display: flex;
|
||||
gap: 0.5rem;
|
||||
align-items: center;
|
||||
flex-wrap: wrap;
|
||||
}
|
||||
|
||||
.create-form input[type="text"],
|
||||
.create-form input[type="password"] {
|
||||
padding: 0.4rem 0.6rem;
|
||||
border: 1px solid #444;
|
||||
border-radius: 4px;
|
||||
background-color: #0f0f23;
|
||||
color: #e0e0e0;
|
||||
font-size: 0.9rem;
|
||||
}
|
||||
|
||||
.create-form button {
|
||||
padding: 0.4rem 1rem;
|
||||
border: none;
|
||||
border-radius: 4px;
|
||||
background-color: #00aaff;
|
||||
color: white;
|
||||
cursor: pointer;
|
||||
font-size: 0.9rem;
|
||||
}
|
||||
|
||||
.create-form button:hover {
|
||||
background-color: #0088cc;
|
||||
}
|
||||
|
||||
.checkbox-label {
|
||||
display: flex;
|
||||
align-items: center;
|
||||
gap: 0.3rem;
|
||||
color: #ccc;
|
||||
font-size: 0.9rem;
|
||||
cursor: pointer;
|
||||
}
|
||||
|
||||
table {
|
||||
width: 100%;
|
||||
border-collapse: collapse;
|
||||
}
|
||||
|
||||
th, td {
|
||||
padding: 0.6rem 0.8rem;
|
||||
text-align: left;
|
||||
border-bottom: 1px solid #333;
|
||||
}
|
||||
|
||||
th {
|
||||
color: #888;
|
||||
font-size: 0.8rem;
|
||||
text-transform: uppercase;
|
||||
font-weight: normal;
|
||||
}
|
||||
|
||||
td {
|
||||
color: #ddd;
|
||||
font-size: 0.9rem;
|
||||
}
|
||||
|
||||
.role-badge {
|
||||
padding: 0.15rem 0.5rem;
|
||||
border-radius: 3px;
|
||||
font-size: 0.8rem;
|
||||
background-color: #2a2a4e;
|
||||
color: #aaa;
|
||||
}
|
||||
|
||||
.role-badge.admin {
|
||||
background-color: #1a3a2a;
|
||||
color: #4ade80;
|
||||
}
|
||||
|
||||
.actions {
|
||||
display: flex;
|
||||
gap: 0.3rem;
|
||||
}
|
||||
|
||||
.btn-sm {
|
||||
padding: 0.25rem 0.6rem;
|
||||
border: 1px solid #444;
|
||||
border-radius: 3px;
|
||||
background-color: transparent;
|
||||
color: #ccc;
|
||||
cursor: pointer;
|
||||
font-size: 0.8rem;
|
||||
}
|
||||
|
||||
.btn-sm:hover {
|
||||
background-color: #2a2a4e;
|
||||
}
|
||||
|
||||
.btn-danger {
|
||||
border-color: #662222;
|
||||
color: #ff6666;
|
||||
}
|
||||
|
||||
.btn-danger:hover {
|
||||
background-color: #331111;
|
||||
}
|
||||
|
||||
.edit-row td {
|
||||
background-color: #111122;
|
||||
border-bottom: 1px solid #333;
|
||||
}
|
||||
|
||||
.edit-form, .permissions-editor {
|
||||
padding: 0.5rem 0;
|
||||
}
|
||||
|
||||
.field-row {
|
||||
margin-bottom: 0.5rem;
|
||||
}
|
||||
|
||||
.field-row label {
|
||||
display: block;
|
||||
color: #888;
|
||||
font-size: 0.8rem;
|
||||
margin-bottom: 0.2rem;
|
||||
}
|
||||
|
||||
.field-row input[type="password"] {
|
||||
padding: 0.3rem 0.5rem;
|
||||
border: 1px solid #444;
|
||||
border-radius: 4px;
|
||||
background-color: #0f0f23;
|
||||
color: #e0e0e0;
|
||||
font-size: 0.85rem;
|
||||
}
|
||||
|
||||
.button-row {
|
||||
display: flex;
|
||||
gap: 0.3rem;
|
||||
margin-top: 0.5rem;
|
||||
}
|
||||
|
||||
.server-group {
|
||||
margin-bottom: 0.5rem;
|
||||
}
|
||||
|
||||
.perm-checkbox {
|
||||
display: flex;
|
||||
align-items: center;
|
||||
gap: 0.3rem;
|
||||
color: #ccc;
|
||||
font-size: 0.85rem;
|
||||
padding: 0.15rem 0;
|
||||
cursor: pointer;
|
||||
}
|
||||
</style>
|
||||
@@ -1,3 +1,5 @@
|
||||
import { getToken, handleUnauthorized } from './stores/authStore.svelte';
|
||||
|
||||
export interface App {
|
||||
title: string;
|
||||
id: number;
|
||||
@@ -12,7 +14,15 @@ export interface AppsResponse {
|
||||
|
||||
export async function fetchApps() {
|
||||
console.log('Getting apps');
|
||||
const response = await fetch('/api/apps');
|
||||
const response = await fetch('/api/apps', {
|
||||
headers: { 'Authorization': `Bearer ${getToken()}` }
|
||||
});
|
||||
|
||||
if (response.status === 401) {
|
||||
handleUnauthorized();
|
||||
throw new Error('Unauthorized');
|
||||
}
|
||||
|
||||
console.log(response);
|
||||
const data = (await response.json()) as AppsResponse;
|
||||
console.log(data);
|
||||
|
||||
@@ -1,8 +1,11 @@
|
||||
import { getToken, handleUnauthorized } from './stores/authStore.svelte';
|
||||
|
||||
type StreamData = {
|
||||
Url: string,
|
||||
CertHash: Array<number>,
|
||||
Width: number,
|
||||
Height: number,
|
||||
StreamToken: string,
|
||||
}
|
||||
|
||||
export async function getStreamData(appId: number, server_name: string): Promise<StreamData> {
|
||||
@@ -34,10 +37,16 @@ export async function getStreamData(appId: number, server_name: string): Promise
|
||||
method: 'POST',
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Authorization': `Bearer ${getToken()}`,
|
||||
},
|
||||
body: JSON.stringify(payload)
|
||||
});
|
||||
|
||||
if (response.status === 401) {
|
||||
handleUnauthorized();
|
||||
throw new Error('Unauthorized');
|
||||
}
|
||||
|
||||
if (!response.ok) {
|
||||
throw new Error(`HTTP error! status: ${response.status}: ${await response.text()}`);
|
||||
}
|
||||
@@ -45,15 +54,17 @@ export async function getStreamData(appId: number, server_name: string): Promise
|
||||
const streamDataResp = await response.json();
|
||||
console.log('Stream started:', streamDataResp);
|
||||
|
||||
let streamData: StreamData = { Url: streamDataResp.url, CertHash: streamDataResp.cert_hash, Width: width, Height: height };
|
||||
let streamData: StreamData = {
|
||||
Url: streamDataResp.url,
|
||||
CertHash: streamDataResp.cert_hash,
|
||||
Width: width,
|
||||
Height: height,
|
||||
StreamToken: streamDataResp.stream_token,
|
||||
};
|
||||
return streamData;
|
||||
|
||||
|
||||
} catch (error) {
|
||||
console.error('Error getting stream data: ', error);
|
||||
throw new Error('Failed to start stream: ' + error);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -0,0 +1,166 @@
|
||||
<script lang="ts">
|
||||
import { goto } from '$app/navigation';
|
||||
import { setToken, isAuthenticated } from '../stores/authStore.svelte';
|
||||
import { onMount } from 'svelte';
|
||||
|
||||
let username = $state('');
|
||||
let password = $state('');
|
||||
let error = $state('');
|
||||
let loading = $state(false);
|
||||
|
||||
onMount(() => {
|
||||
if (isAuthenticated()) {
|
||||
goto('/');
|
||||
}
|
||||
});
|
||||
|
||||
async function handleLogin(event: Event) {
|
||||
event.preventDefault();
|
||||
error = '';
|
||||
loading = true;
|
||||
|
||||
try {
|
||||
const response = await fetch('/api/auth/login', {
|
||||
method: 'POST',
|
||||
headers: { 'Content-Type': 'application/json' },
|
||||
body: JSON.stringify({ username, password })
|
||||
});
|
||||
|
||||
if (!response.ok) {
|
||||
const data = await response.json().catch(() => null);
|
||||
error = data?.description || 'Invalid username or password';
|
||||
return;
|
||||
}
|
||||
|
||||
const data = await response.json();
|
||||
setToken(data.token);
|
||||
await goto('/');
|
||||
} catch (e) {
|
||||
error = 'Connection error. Please try again.';
|
||||
} finally {
|
||||
loading = false;
|
||||
}
|
||||
}
|
||||
</script>
|
||||
|
||||
<svelte:head>
|
||||
<title>Login</title>
|
||||
</svelte:head>
|
||||
|
||||
<div class="login-container">
|
||||
<div class="login-box">
|
||||
<h1>GameStream</h1>
|
||||
<form onsubmit={handleLogin}>
|
||||
<div class="field">
|
||||
<label for="username">Username</label>
|
||||
<input
|
||||
id="username"
|
||||
type="text"
|
||||
bind:value={username}
|
||||
autocomplete="username"
|
||||
required
|
||||
disabled={loading}
|
||||
/>
|
||||
</div>
|
||||
<div class="field">
|
||||
<label for="password">Password</label>
|
||||
<input
|
||||
id="password"
|
||||
type="password"
|
||||
bind:value={password}
|
||||
autocomplete="current-password"
|
||||
required
|
||||
disabled={loading}
|
||||
/>
|
||||
</div>
|
||||
{#if error}
|
||||
<div class="error">{error}</div>
|
||||
{/if}
|
||||
<button type="submit" disabled={loading}>
|
||||
{loading ? 'Signing in...' : 'Sign in'}
|
||||
</button>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<style>
|
||||
.login-container {
|
||||
display: flex;
|
||||
justify-content: center;
|
||||
align-items: center;
|
||||
min-height: 100vh;
|
||||
}
|
||||
|
||||
.login-box {
|
||||
background-color: #1a1a2e;
|
||||
border: 1px solid #333;
|
||||
border-radius: 12px;
|
||||
padding: 2.5rem;
|
||||
width: 100%;
|
||||
max-width: 380px;
|
||||
}
|
||||
|
||||
h1 {
|
||||
color: #e0e0e0;
|
||||
margin: 0 0 1.5rem 0;
|
||||
font-size: 1.5rem;
|
||||
}
|
||||
|
||||
.field {
|
||||
margin-bottom: 1rem;
|
||||
}
|
||||
|
||||
label {
|
||||
display: block;
|
||||
color: #aaa;
|
||||
font-size: 0.85rem;
|
||||
margin-bottom: 0.3rem;
|
||||
}
|
||||
|
||||
input {
|
||||
width: 100%;
|
||||
padding: 0.6rem 0.8rem;
|
||||
border: 1px solid #444;
|
||||
border-radius: 6px;
|
||||
background-color: #0f0f23;
|
||||
color: #e0e0e0;
|
||||
font-size: 1rem;
|
||||
box-sizing: border-box;
|
||||
}
|
||||
|
||||
input:focus {
|
||||
outline: none;
|
||||
border-color: #00aaff;
|
||||
}
|
||||
|
||||
input:disabled {
|
||||
opacity: 0.6;
|
||||
}
|
||||
|
||||
.error {
|
||||
color: #ff4444;
|
||||
font-size: 0.85rem;
|
||||
margin-bottom: 1rem;
|
||||
}
|
||||
|
||||
button {
|
||||
width: 100%;
|
||||
padding: 0.7rem;
|
||||
border: none;
|
||||
border-radius: 6px;
|
||||
background-color: #00aaff;
|
||||
color: white;
|
||||
font-size: 1rem;
|
||||
cursor: pointer;
|
||||
transition: background-color 0.2s;
|
||||
}
|
||||
|
||||
button:hover:not(:disabled) {
|
||||
background-color: #0088cc;
|
||||
}
|
||||
|
||||
button:disabled {
|
||||
opacity: 0.6;
|
||||
cursor: not-allowed;
|
||||
}
|
||||
</style>
|
||||
@@ -0,0 +1,43 @@
|
||||
import { goto } from '$app/navigation';
|
||||
|
||||
interface AuthState {
|
||||
token: string | null;
|
||||
}
|
||||
|
||||
function loadToken(): string | null {
|
||||
if (typeof window === 'undefined') return null;
|
||||
return localStorage.getItem('auth_token');
|
||||
}
|
||||
|
||||
export const authStore: AuthState = $state({
|
||||
token: loadToken()
|
||||
});
|
||||
|
||||
export function getToken(): string | null {
|
||||
return authStore.token;
|
||||
}
|
||||
|
||||
export function setToken(token: string) {
|
||||
authStore.token = token;
|
||||
localStorage.setItem('auth_token', token);
|
||||
}
|
||||
|
||||
export function clearToken() {
|
||||
authStore.token = null;
|
||||
localStorage.removeItem('auth_token');
|
||||
}
|
||||
|
||||
export function isAuthenticated(): boolean {
|
||||
return authStore.token !== null;
|
||||
}
|
||||
|
||||
export function requireAuth() {
|
||||
if (!isAuthenticated()) {
|
||||
goto('/login');
|
||||
}
|
||||
}
|
||||
|
||||
export function handleUnauthorized() {
|
||||
clearToken();
|
||||
goto('/login');
|
||||
}
|
||||
@@ -3,4 +3,5 @@ export const streamStore = $state({
|
||||
CertHash: [0],
|
||||
Width: 0,
|
||||
Height: 0,
|
||||
StreamToken: '',
|
||||
});
|
||||
|
||||
@@ -6,6 +6,7 @@
|
||||
$: certHash = streamStore.CertHash;
|
||||
$: width = streamStore.Width;
|
||||
$: height = streamStore.Height;
|
||||
$: streamToken = streamStore.StreamToken;
|
||||
</script>
|
||||
|
||||
<svelte:head>
|
||||
@@ -13,9 +14,7 @@
|
||||
<meta name="description" content="Streaming game" />
|
||||
</svelte:head>
|
||||
|
||||
<!--<section>
|
||||
</section>-->
|
||||
<Stream {url} {certHash} {width} {height} />
|
||||
<Stream {url} {certHash} {width} {height} {streamToken} />
|
||||
|
||||
<style>
|
||||
section {
|
||||
|
||||
@@ -8,17 +8,20 @@
|
||||
certHash: Array<number>;
|
||||
width: number;
|
||||
height: number;
|
||||
streamToken: string;
|
||||
}
|
||||
|
||||
let { url, certHash, width, height }: Props = $props();
|
||||
let { url, certHash, width, height, streamToken }: Props = $props();
|
||||
let loading = $state(true);
|
||||
let fullscreen = $state(false);
|
||||
let gameplayView: HTMLDivElement;
|
||||
let gameplayCanvas: HTMLCanvasElement;
|
||||
|
||||
async function startStream() {
|
||||
// Append stream token to URL for proxy authentication
|
||||
const authenticatedUrl = url + (url.includes('?') ? '&' : '?') + 'token=' + encodeURIComponent(streamToken);
|
||||
await startWebtransportStream(
|
||||
url,
|
||||
authenticatedUrl,
|
||||
certHash,
|
||||
width,
|
||||
height,
|
||||
|
||||
@@ -5,6 +5,7 @@ edition = "2024"
|
||||
|
||||
[dependencies]
|
||||
anyhow = "1.0.98"
|
||||
argon2 = "0.5"
|
||||
directories = "6.0.0"
|
||||
flatbuffers = "25.2.10"
|
||||
getrandom = { version = "0.3.3", features = ["std"] }
|
||||
@@ -17,6 +18,7 @@ libc = "0.2.174"
|
||||
moonlight-common-c-sys = { path = "../moonlight-common-c-sys" }
|
||||
openssl = "0.10.73"
|
||||
rand = "0.9.1"
|
||||
rusqlite = { version = "0.34", features = ["bundled"] }
|
||||
reqwest = { version = "0.12.20", features = [
|
||||
"rustls-tls",
|
||||
"native-tls",
|
||||
|
||||
@@ -5,6 +5,7 @@ use serde::{Deserialize, Serialize};
|
||||
use tracing::{debug, error};
|
||||
|
||||
use crate::{
|
||||
auth,
|
||||
common,
|
||||
common::{AppError, AppResult},
|
||||
responses,
|
||||
@@ -45,7 +46,17 @@ struct GetAppsResponse {
|
||||
#[craft]
|
||||
impl crate::backend::Backend {
|
||||
#[craft(endpoint(status_codes(StatusCode::OK, StatusCode::INTERNAL_SERVER_ERROR)))]
|
||||
pub async fn get_apps(self: ::std::sync::Arc<Self>) -> AppResult<Json<GetAppsResponse>> {
|
||||
pub async fn get_apps(self: ::std::sync::Arc<Self>, depot: &mut Depot) -> AppResult<Json<GetAppsResponse>> {
|
||||
let user = match auth::get_user_from_depot(depot) {
|
||||
Some(u) => u.clone(),
|
||||
None => {
|
||||
error!("get_apps reached without authenticated user in depot");
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::UNAUTHORIZED,
|
||||
description: "Not authenticated".to_string(),
|
||||
});
|
||||
}
|
||||
};
|
||||
let standard_error = Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "failed to get available apps".to_string(),
|
||||
@@ -143,6 +154,19 @@ impl crate::backend::Backend {
|
||||
get_apps_resp.apps.insert(server.name, resp_vec);
|
||||
}
|
||||
|
||||
// Filter apps by user permissions (admins see everything)
|
||||
if !user.is_admin {
|
||||
let permissions = self.db.get_permissions(&user.id).unwrap_or_default();
|
||||
for (server_name, apps) in get_apps_resp.apps.iter_mut() {
|
||||
apps.retain(|app| {
|
||||
permissions.iter().any(|p| {
|
||||
p.server == *server_name && p.app_id == app.id as i64
|
||||
})
|
||||
});
|
||||
}
|
||||
get_apps_resp.apps.retain(|_, apps| !apps.is_empty());
|
||||
}
|
||||
|
||||
Ok(Json(get_apps_resp))
|
||||
}
|
||||
}
|
||||
|
||||
@@ -0,0 +1,326 @@
|
||||
use std::sync::Arc;
|
||||
|
||||
use salvo::prelude::*;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use tracing::error;
|
||||
|
||||
use crate::common::{AppError, AppResult};
|
||||
use crate::db::{AppPermission, Db, User};
|
||||
|
||||
const SESSION_MAX_AGE_SECONDS: i64 = 7 * 24 * 3600; // 7 days
|
||||
|
||||
// Key used to store the authenticated user in the Salvo Depot
|
||||
const USER_DEPOT_KEY: &str = "authenticated_user";
|
||||
|
||||
pub fn get_user_from_depot(depot: &Depot) -> Option<&User> {
|
||||
depot.get::<User>(USER_DEPOT_KEY).ok()
|
||||
}
|
||||
|
||||
// -- Middleware --
|
||||
|
||||
pub struct SessionAuthMiddleware {
|
||||
pub db: Arc<Db>,
|
||||
}
|
||||
|
||||
#[handler]
|
||||
impl SessionAuthMiddleware {
|
||||
async fn handle(&self, req: &mut Request, depot: &mut Depot, res: &mut Response, ctrl: &mut FlowCtrl) {
|
||||
let token = req
|
||||
.headers()
|
||||
.get("authorization")
|
||||
.and_then(|v| v.to_str().ok())
|
||||
.and_then(|v| v.strip_prefix("Bearer "));
|
||||
|
||||
let token = match token {
|
||||
Some(t) => t,
|
||||
None => {
|
||||
res.status_code(StatusCode::UNAUTHORIZED);
|
||||
Json(serde_json::json!({"description": "Missing or invalid Authorization header"})).render(res);
|
||||
ctrl.skip_rest();
|
||||
return;
|
||||
}
|
||||
};
|
||||
|
||||
match self.db.validate_session(token) {
|
||||
Ok(Some(user)) => {
|
||||
depot.insert(USER_DEPOT_KEY, user);
|
||||
}
|
||||
Ok(None) => {
|
||||
res.status_code(StatusCode::UNAUTHORIZED);
|
||||
Json(serde_json::json!({"description": "Invalid or expired session"})).render(res);
|
||||
ctrl.skip_rest();
|
||||
return;
|
||||
}
|
||||
Err(e) => {
|
||||
error!("Session validation error: {e}");
|
||||
res.status_code(StatusCode::INTERNAL_SERVER_ERROR);
|
||||
Json(serde_json::json!({"description": "Internal server error"})).render(res);
|
||||
ctrl.skip_rest();
|
||||
return;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub struct AdminCheckMiddleware;
|
||||
|
||||
#[handler]
|
||||
impl AdminCheckMiddleware {
|
||||
async fn handle(&self, _req: &mut Request, depot: &mut Depot, res: &mut Response, ctrl: &mut FlowCtrl) {
|
||||
let user = match get_user_from_depot(depot) {
|
||||
Some(u) => u,
|
||||
None => {
|
||||
res.status_code(StatusCode::UNAUTHORIZED);
|
||||
Json(serde_json::json!({"description": "Not authenticated"})).render(res);
|
||||
ctrl.skip_rest();
|
||||
return;
|
||||
}
|
||||
};
|
||||
|
||||
if !user.is_admin {
|
||||
res.status_code(StatusCode::FORBIDDEN);
|
||||
Json(serde_json::json!({"description": "Admin access required"})).render(res);
|
||||
ctrl.skip_rest();
|
||||
return;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// -- Request/Response types --
|
||||
|
||||
#[derive(Deserialize, ToSchema)]
|
||||
pub struct LoginRequest {
|
||||
pub username: String,
|
||||
pub password: String,
|
||||
}
|
||||
|
||||
#[derive(Serialize, ToSchema)]
|
||||
pub struct LoginResponse {
|
||||
pub token: String,
|
||||
}
|
||||
|
||||
#[derive(Serialize, ToSchema)]
|
||||
pub struct MeResponse {
|
||||
pub username: String,
|
||||
pub is_admin: bool,
|
||||
pub permissions: Vec<AppPermission>,
|
||||
}
|
||||
|
||||
#[derive(Deserialize, ToSchema)]
|
||||
pub struct CreateUserRequest {
|
||||
pub username: String,
|
||||
pub password: String,
|
||||
pub is_admin: bool,
|
||||
}
|
||||
|
||||
#[derive(Deserialize, ToSchema)]
|
||||
pub struct UpdateUserRequest {
|
||||
pub password: Option<String>,
|
||||
pub is_admin: Option<bool>,
|
||||
}
|
||||
|
||||
#[derive(Deserialize, ToSchema)]
|
||||
pub struct SetPermissionsRequest {
|
||||
pub permissions: Vec<AppPermission>,
|
||||
}
|
||||
|
||||
// -- Auth endpoint handlers --
|
||||
|
||||
#[craft]
|
||||
impl crate::backend::Backend {
|
||||
#[craft(handler)]
|
||||
pub async fn login(
|
||||
self: Arc<Self>,
|
||||
body: salvo::oapi::extract::JsonBody<LoginRequest>,
|
||||
) -> AppResult<Json<LoginResponse>> {
|
||||
let user = match self.db.verify_password(&body.username, &body.password) {
|
||||
Ok(Some(u)) => u,
|
||||
Ok(None) => {
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::UNAUTHORIZED,
|
||||
description: "Invalid username or password".to_string(),
|
||||
});
|
||||
}
|
||||
Err(e) => {
|
||||
error!("Login error: {e}");
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Internal server error".to_string(),
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
let token = match self.db.create_session(&user.id, SESSION_MAX_AGE_SECONDS) {
|
||||
Ok(t) => t,
|
||||
Err(e) => {
|
||||
error!("Session creation error: {e}");
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Internal server error".to_string(),
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
Ok(Json(LoginResponse { token }))
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn logout(self: Arc<Self>, req: &mut Request) -> AppResult<Json<serde_json::Value>> {
|
||||
let token = req
|
||||
.headers()
|
||||
.get("authorization")
|
||||
.and_then(|v| v.to_str().ok())
|
||||
.and_then(|v| v.strip_prefix("Bearer "))
|
||||
.unwrap_or("");
|
||||
|
||||
let _ = self.db.delete_session(token);
|
||||
|
||||
Ok(Json(serde_json::json!({"status": "ok"})))
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn me(self: Arc<Self>, depot: &mut Depot) -> AppResult<Json<MeResponse>> {
|
||||
let user = match get_user_from_depot(depot) {
|
||||
Some(u) => u.clone(),
|
||||
None => {
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::UNAUTHORIZED,
|
||||
description: "Not authenticated".to_string(),
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
let permissions = self.db.get_permissions(&user.id).unwrap_or_default();
|
||||
|
||||
Ok(Json(MeResponse {
|
||||
username: user.username,
|
||||
is_admin: user.is_admin,
|
||||
permissions,
|
||||
}))
|
||||
}
|
||||
|
||||
// -- Admin endpoint handlers --
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_list_users(self: Arc<Self>) -> AppResult<Json<Vec<User>>> {
|
||||
match self.db.list_users() {
|
||||
Ok(users) => Ok(Json(users)),
|
||||
Err(e) => {
|
||||
error!("List users error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Failed to list users".to_string(),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_create_user(
|
||||
self: Arc<Self>,
|
||||
body: salvo::oapi::extract::JsonBody<CreateUserRequest>,
|
||||
) -> AppResult<Json<User>> {
|
||||
match self
|
||||
.db
|
||||
.create_user(&body.username, &body.password, body.is_admin)
|
||||
{
|
||||
Ok(user) => Ok(Json(user)),
|
||||
Err(e) => {
|
||||
error!("Create user error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::BAD_REQUEST,
|
||||
description: format!("Failed to create user: {e}"),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_update_user(
|
||||
self: Arc<Self>,
|
||||
req: &mut Request,
|
||||
body: salvo::oapi::extract::JsonBody<UpdateUserRequest>,
|
||||
) -> AppResult<Json<serde_json::Value>> {
|
||||
let user_id = req.param::<String>("id").unwrap_or_default();
|
||||
|
||||
match self
|
||||
.db
|
||||
.update_user(&user_id, body.password.as_deref(), body.is_admin)
|
||||
{
|
||||
Ok(true) => Ok(Json(serde_json::json!({"status": "ok"}))),
|
||||
Ok(false) => Err(AppError {
|
||||
status_code: StatusCode::NOT_FOUND,
|
||||
description: "User not found".to_string(),
|
||||
}),
|
||||
Err(e) => {
|
||||
error!("Update user error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Failed to update user".to_string(),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_delete_user(
|
||||
self: Arc<Self>,
|
||||
req: &mut Request,
|
||||
) -> AppResult<Json<serde_json::Value>> {
|
||||
let user_id = req.param::<String>("id").unwrap_or_default();
|
||||
|
||||
match self.db.delete_user(&user_id) {
|
||||
Ok(true) => Ok(Json(serde_json::json!({"status": "ok"}))),
|
||||
Ok(false) => Err(AppError {
|
||||
status_code: StatusCode::NOT_FOUND,
|
||||
description: "User not found".to_string(),
|
||||
}),
|
||||
Err(e) => {
|
||||
error!("Delete user error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Failed to delete user".to_string(),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_get_permissions(
|
||||
self: Arc<Self>,
|
||||
req: &mut Request,
|
||||
) -> AppResult<Json<Vec<AppPermission>>> {
|
||||
let user_id = req.param::<String>("id").unwrap_or_default();
|
||||
|
||||
match self.db.get_permissions(&user_id) {
|
||||
Ok(perms) => Ok(Json(perms)),
|
||||
Err(e) => {
|
||||
error!("Get permissions error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Failed to get permissions".to_string(),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[craft(handler)]
|
||||
pub async fn admin_set_permissions(
|
||||
self: Arc<Self>,
|
||||
req: &mut Request,
|
||||
body: salvo::oapi::extract::JsonBody<SetPermissionsRequest>,
|
||||
) -> AppResult<Json<serde_json::Value>> {
|
||||
let user_id = req.param::<String>("id").unwrap_or_default();
|
||||
|
||||
match self.db.set_permissions(&user_id, &body.permissions) {
|
||||
Ok(()) => Ok(Json(serde_json::json!({"status": "ok"}))),
|
||||
Err(e) => {
|
||||
error!("Set permissions error: {e}");
|
||||
Err(AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Failed to set permissions".to_string(),
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -5,6 +5,7 @@ use salvo::oapi::ToSchema;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use tokio::sync::RwLock;
|
||||
|
||||
use crate::db::Db;
|
||||
use crate::state::StateFile;
|
||||
|
||||
#[derive(Debug, Clone, Deserialize, Serialize)]
|
||||
@@ -89,14 +90,25 @@ pub struct Backend {
|
||||
pub state: StateFile,
|
||||
pub streams: RwLock<HashMap<uuid::Uuid, Stream>>,
|
||||
pub port: u16,
|
||||
pub db: Db,
|
||||
}
|
||||
|
||||
impl Backend {
|
||||
pub fn new(port: u16) -> Result<Self> {
|
||||
let project_dirs =
|
||||
directories::ProjectDirs::from("xyz", "ohea", "gamestream-webtransport-proxy")
|
||||
.ok_or(anyhow::anyhow!("Could not get project dirs"))?;
|
||||
let data_dir = project_dirs.data_dir();
|
||||
std::fs::create_dir_all(data_dir)?;
|
||||
let db_path = data_dir.join("auth.db");
|
||||
|
||||
let db = Db::open(&db_path)?;
|
||||
|
||||
Ok(Backend {
|
||||
state: StateFile::new()?,
|
||||
streams: RwLock::new(HashMap::new()),
|
||||
port,
|
||||
db,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
@@ -0,0 +1,659 @@
|
||||
use std::path::Path;
|
||||
use std::sync::Mutex;
|
||||
|
||||
use anyhow::{Context, Result};
|
||||
use argon2::{
|
||||
Argon2,
|
||||
password_hash::{PasswordHash, PasswordHasher, PasswordVerifier, SaltString, rand_core::OsRng},
|
||||
};
|
||||
use salvo::oapi::ToSchema;
|
||||
use serde::{Deserialize, Serialize};
|
||||
|
||||
#[derive(Debug, Clone, Serialize, Deserialize, ToSchema)]
|
||||
pub struct User {
|
||||
pub id: String,
|
||||
pub username: String,
|
||||
pub is_admin: bool,
|
||||
pub created_at: String,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, Serialize, Deserialize, ToSchema)]
|
||||
pub struct AppPermission {
|
||||
pub server: String,
|
||||
pub app_id: i64,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct Session {
|
||||
pub token: String,
|
||||
pub user_id: String,
|
||||
pub created_at: String,
|
||||
pub expires_at: String,
|
||||
}
|
||||
|
||||
pub struct Db {
|
||||
conn: Mutex<rusqlite::Connection>,
|
||||
}
|
||||
|
||||
impl Db {
|
||||
pub fn open(path: &Path) -> Result<Self> {
|
||||
let conn = rusqlite::Connection::open(path)?;
|
||||
let db = Db {
|
||||
conn: Mutex::new(conn),
|
||||
};
|
||||
db.init()?;
|
||||
Ok(db)
|
||||
}
|
||||
|
||||
fn init(&self) -> Result<()> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
conn.execute_batch("PRAGMA foreign_keys = ON;")?;
|
||||
conn.execute_batch(
|
||||
"CREATE TABLE IF NOT EXISTS users (
|
||||
id TEXT PRIMARY KEY,
|
||||
username TEXT UNIQUE NOT NULL,
|
||||
password TEXT NOT NULL,
|
||||
is_admin INTEGER NOT NULL DEFAULT 0,
|
||||
created_at TEXT NOT NULL
|
||||
);
|
||||
|
||||
CREATE TABLE IF NOT EXISTS user_app_permissions (
|
||||
user_id TEXT NOT NULL REFERENCES users(id) ON DELETE CASCADE,
|
||||
server TEXT NOT NULL,
|
||||
app_id INTEGER NOT NULL,
|
||||
PRIMARY KEY (user_id, server, app_id)
|
||||
);
|
||||
|
||||
CREATE TABLE IF NOT EXISTS sessions (
|
||||
token TEXT PRIMARY KEY,
|
||||
user_id TEXT NOT NULL REFERENCES users(id) ON DELETE CASCADE,
|
||||
created_at TEXT NOT NULL,
|
||||
expires_at TEXT NOT NULL
|
||||
);",
|
||||
)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn seed_admin_if_needed(&self) -> Result<Option<(String, String)>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let count: i64 = conn.query_row("SELECT COUNT(*) FROM users", [], |row| row.get(0))?;
|
||||
if count > 0 {
|
||||
return Ok(None);
|
||||
}
|
||||
drop(conn);
|
||||
|
||||
let password = generate_random_password();
|
||||
let user = self.create_user("admin", &password, true)?;
|
||||
Ok(Some((user.username, password)))
|
||||
}
|
||||
|
||||
pub fn create_user(&self, username: &str, password: &str, is_admin: bool) -> Result<User> {
|
||||
let id = uuid::Uuid::new_v4().to_string();
|
||||
let password_hash = hash_password(password)?;
|
||||
let created_at = now_iso8601();
|
||||
|
||||
let conn = self.conn.lock().unwrap();
|
||||
conn.execute(
|
||||
"INSERT INTO users (id, username, password, is_admin, created_at) VALUES (?1, ?2, ?3, ?4, ?5)",
|
||||
rusqlite::params![id, username, password_hash, is_admin as i32, created_at],
|
||||
).context("Failed to create user (username may already exist)")?;
|
||||
|
||||
Ok(User {
|
||||
id,
|
||||
username: username.to_string(),
|
||||
is_admin,
|
||||
created_at,
|
||||
})
|
||||
}
|
||||
|
||||
pub fn verify_password(&self, username: &str, password: &str) -> Result<Option<User>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let mut stmt = conn.prepare(
|
||||
"SELECT id, username, password, is_admin, created_at FROM users WHERE username = ?1",
|
||||
)?;
|
||||
|
||||
let mut rows = stmt.query(rusqlite::params![username])?;
|
||||
let row = match rows.next()? {
|
||||
Some(r) => r,
|
||||
None => return Ok(None),
|
||||
};
|
||||
|
||||
let id: String = row.get(0)?;
|
||||
let uname: String = row.get(1)?;
|
||||
let stored_hash: String = row.get(2)?;
|
||||
let is_admin: bool = row.get::<_, i32>(3)? != 0;
|
||||
let created_at: String = row.get(4)?;
|
||||
|
||||
let parsed_hash =
|
||||
PasswordHash::new(&stored_hash).map_err(|e| anyhow::anyhow!("Invalid hash: {e}"))?;
|
||||
if Argon2::default()
|
||||
.verify_password(password.as_bytes(), &parsed_hash)
|
||||
.is_err()
|
||||
{
|
||||
return Ok(None);
|
||||
}
|
||||
|
||||
Ok(Some(User {
|
||||
id,
|
||||
username: uname,
|
||||
is_admin,
|
||||
created_at,
|
||||
}))
|
||||
}
|
||||
|
||||
pub fn get_user(&self, user_id: &str) -> Result<Option<User>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let mut stmt = conn.prepare(
|
||||
"SELECT id, username, is_admin, created_at FROM users WHERE id = ?1",
|
||||
)?;
|
||||
|
||||
let mut rows = stmt.query(rusqlite::params![user_id])?;
|
||||
match rows.next()? {
|
||||
Some(row) => Ok(Some(User {
|
||||
id: row.get(0)?,
|
||||
username: row.get(1)?,
|
||||
is_admin: row.get::<_, i32>(2)? != 0,
|
||||
created_at: row.get(3)?,
|
||||
})),
|
||||
None => Ok(None),
|
||||
}
|
||||
}
|
||||
|
||||
pub fn list_users(&self) -> Result<Vec<User>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let mut stmt =
|
||||
conn.prepare("SELECT id, username, is_admin, created_at FROM users ORDER BY username")?;
|
||||
let users = stmt
|
||||
.query_map([], |row| {
|
||||
Ok(User {
|
||||
id: row.get(0)?,
|
||||
username: row.get(1)?,
|
||||
is_admin: row.get::<_, i32>(2)? != 0,
|
||||
created_at: row.get(3)?,
|
||||
})
|
||||
})?
|
||||
.collect::<std::result::Result<Vec<_>, _>>()?;
|
||||
Ok(users)
|
||||
}
|
||||
|
||||
pub fn update_user(
|
||||
&self,
|
||||
user_id: &str,
|
||||
new_password: Option<&str>,
|
||||
new_is_admin: Option<bool>,
|
||||
) -> Result<bool> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
|
||||
if let Some(password) = new_password {
|
||||
let hash = hash_password(password)?;
|
||||
conn.execute(
|
||||
"UPDATE users SET password = ?1 WHERE id = ?2",
|
||||
rusqlite::params![hash, user_id],
|
||||
)?;
|
||||
}
|
||||
|
||||
if let Some(is_admin) = new_is_admin {
|
||||
conn.execute(
|
||||
"UPDATE users SET is_admin = ?1 WHERE id = ?2",
|
||||
rusqlite::params![is_admin as i32, user_id],
|
||||
)?;
|
||||
}
|
||||
|
||||
let changed = conn.changes() > 0;
|
||||
Ok(changed)
|
||||
}
|
||||
|
||||
pub fn delete_user(&self, user_id: &str) -> Result<bool> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
conn.execute("PRAGMA foreign_keys = ON;", [])?;
|
||||
let rows = conn.execute("DELETE FROM users WHERE id = ?1", rusqlite::params![user_id])?;
|
||||
Ok(rows > 0)
|
||||
}
|
||||
|
||||
// Session management
|
||||
|
||||
pub fn create_session(&self, user_id: &str, max_age_seconds: i64) -> Result<String> {
|
||||
let token = generate_session_token();
|
||||
let created_at = now_iso8601();
|
||||
let expires_at = future_iso8601(max_age_seconds);
|
||||
|
||||
let conn = self.conn.lock().unwrap();
|
||||
conn.execute(
|
||||
"INSERT INTO sessions (token, user_id, created_at, expires_at) VALUES (?1, ?2, ?3, ?4)",
|
||||
rusqlite::params![token, user_id, created_at, expires_at],
|
||||
)?;
|
||||
|
||||
Ok(token)
|
||||
}
|
||||
|
||||
pub fn validate_session(&self, token: &str) -> Result<Option<User>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let now = now_iso8601();
|
||||
|
||||
let mut stmt = conn.prepare(
|
||||
"SELECT u.id, u.username, u.is_admin, u.created_at
|
||||
FROM sessions s
|
||||
JOIN users u ON s.user_id = u.id
|
||||
WHERE s.token = ?1 AND s.expires_at > ?2",
|
||||
)?;
|
||||
|
||||
let mut rows = stmt.query(rusqlite::params![token, now])?;
|
||||
match rows.next()? {
|
||||
Some(row) => Ok(Some(User {
|
||||
id: row.get(0)?,
|
||||
username: row.get(1)?,
|
||||
is_admin: row.get::<_, i32>(2)? != 0,
|
||||
created_at: row.get(3)?,
|
||||
})),
|
||||
None => Ok(None),
|
||||
}
|
||||
}
|
||||
|
||||
pub fn delete_session(&self, token: &str) -> Result<bool> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let rows = conn.execute(
|
||||
"DELETE FROM sessions WHERE token = ?1",
|
||||
rusqlite::params![token],
|
||||
)?;
|
||||
Ok(rows > 0)
|
||||
}
|
||||
|
||||
pub fn cleanup_expired_sessions(&self) -> Result<usize> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let now = now_iso8601();
|
||||
let rows = conn.execute(
|
||||
"DELETE FROM sessions WHERE expires_at <= ?1",
|
||||
rusqlite::params![now],
|
||||
)?;
|
||||
Ok(rows)
|
||||
}
|
||||
|
||||
// Permission management
|
||||
|
||||
pub fn set_permissions(&self, user_id: &str, permissions: &[AppPermission]) -> Result<()> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
conn.execute(
|
||||
"DELETE FROM user_app_permissions WHERE user_id = ?1",
|
||||
rusqlite::params![user_id],
|
||||
)?;
|
||||
|
||||
let mut stmt = conn.prepare(
|
||||
"INSERT INTO user_app_permissions (user_id, server, app_id) VALUES (?1, ?2, ?3)",
|
||||
)?;
|
||||
for perm in permissions {
|
||||
stmt.execute(rusqlite::params![user_id, perm.server, perm.app_id])?;
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn get_permissions(&self, user_id: &str) -> Result<Vec<AppPermission>> {
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let mut stmt = conn.prepare(
|
||||
"SELECT server, app_id FROM user_app_permissions WHERE user_id = ?1",
|
||||
)?;
|
||||
let perms = stmt
|
||||
.query_map(rusqlite::params![user_id], |row| {
|
||||
Ok(AppPermission {
|
||||
server: row.get(0)?,
|
||||
app_id: row.get(1)?,
|
||||
})
|
||||
})?
|
||||
.collect::<std::result::Result<Vec<_>, _>>()?;
|
||||
Ok(perms)
|
||||
}
|
||||
|
||||
pub fn check_app_permission(
|
||||
&self,
|
||||
user_id: &str,
|
||||
server: &str,
|
||||
app_id: i64,
|
||||
) -> Result<bool> {
|
||||
// Check if user is admin first
|
||||
let conn = self.conn.lock().unwrap();
|
||||
let is_admin: i32 = conn.query_row(
|
||||
"SELECT is_admin FROM users WHERE id = ?1",
|
||||
rusqlite::params![user_id],
|
||||
|row| row.get(0),
|
||||
)?;
|
||||
if is_admin != 0 {
|
||||
return Ok(true);
|
||||
}
|
||||
|
||||
let count: i64 = conn.query_row(
|
||||
"SELECT COUNT(*) FROM user_app_permissions WHERE user_id = ?1 AND server = ?2 AND app_id = ?3",
|
||||
rusqlite::params![user_id, server, app_id],
|
||||
|row| row.get(0),
|
||||
)?;
|
||||
Ok(count > 0)
|
||||
}
|
||||
}
|
||||
|
||||
fn hash_password(password: &str) -> Result<String> {
|
||||
let salt = SaltString::generate(&mut OsRng);
|
||||
let hash = Argon2::default()
|
||||
.hash_password(password.as_bytes(), &salt)
|
||||
.map_err(|e| anyhow::anyhow!("Failed to hash password: {e}"))?;
|
||||
Ok(hash.to_string())
|
||||
}
|
||||
|
||||
fn generate_session_token() -> String {
|
||||
let mut bytes = [0u8; 32];
|
||||
openssl::rand::rand_bytes(&mut bytes).expect("Failed to generate random bytes");
|
||||
hex::encode(bytes)
|
||||
}
|
||||
|
||||
fn generate_random_password() -> String {
|
||||
let mut bytes = [0u8; 16];
|
||||
openssl::rand::rand_bytes(&mut bytes).expect("Failed to generate random bytes");
|
||||
hex::encode(bytes)
|
||||
}
|
||||
|
||||
fn now_iso8601() -> String {
|
||||
std::time::SystemTime::now()
|
||||
.duration_since(std::time::UNIX_EPOCH)
|
||||
.unwrap()
|
||||
.as_secs()
|
||||
.to_string()
|
||||
}
|
||||
|
||||
fn future_iso8601(seconds_from_now: i64) -> String {
|
||||
let now = std::time::SystemTime::now()
|
||||
.duration_since(std::time::UNIX_EPOCH)
|
||||
.unwrap()
|
||||
.as_secs();
|
||||
(now as i64 + seconds_from_now).to_string()
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
|
||||
fn test_db() -> Db {
|
||||
let conn = rusqlite::Connection::open_in_memory().unwrap();
|
||||
let db = Db {
|
||||
conn: Mutex::new(conn),
|
||||
};
|
||||
db.init().unwrap();
|
||||
db
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_create_and_get_user() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("alice", "password123", false).unwrap();
|
||||
assert_eq!(user.username, "alice");
|
||||
assert!(!user.is_admin);
|
||||
|
||||
let fetched = db.get_user(&user.id).unwrap().unwrap();
|
||||
assert_eq!(fetched.username, "alice");
|
||||
assert_eq!(fetched.id, user.id);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_verify_correct_password() {
|
||||
let db = test_db();
|
||||
db.create_user("bob", "secret", false).unwrap();
|
||||
|
||||
let result = db.verify_password("bob", "secret").unwrap();
|
||||
assert!(result.is_some());
|
||||
assert_eq!(result.unwrap().username, "bob");
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_verify_wrong_password() {
|
||||
let db = test_db();
|
||||
db.create_user("bob", "secret", false).unwrap();
|
||||
|
||||
let result = db.verify_password("bob", "wrong").unwrap();
|
||||
assert!(result.is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_verify_nonexistent_user() {
|
||||
let db = test_db();
|
||||
let result = db.verify_password("nobody", "pass").unwrap();
|
||||
assert!(result.is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_duplicate_username_rejected() {
|
||||
let db = test_db();
|
||||
db.create_user("alice", "pass1", false).unwrap();
|
||||
let result = db.create_user("alice", "pass2", false);
|
||||
assert!(result.is_err());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_list_users() {
|
||||
let db = test_db();
|
||||
db.create_user("charlie", "pass", false).unwrap();
|
||||
db.create_user("alice", "pass", true).unwrap();
|
||||
|
||||
let users = db.list_users().unwrap();
|
||||
assert_eq!(users.len(), 2);
|
||||
assert_eq!(users[0].username, "alice"); // sorted
|
||||
assert_eq!(users[1].username, "charlie");
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_update_user_password() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("dave", "oldpass", false).unwrap();
|
||||
|
||||
db.update_user(&user.id, Some("newpass"), None).unwrap();
|
||||
|
||||
assert!(db.verify_password("dave", "oldpass").unwrap().is_none());
|
||||
assert!(db.verify_password("dave", "newpass").unwrap().is_some());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_update_user_admin_status() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("eve", "pass", false).unwrap();
|
||||
assert!(!user.is_admin);
|
||||
|
||||
db.update_user(&user.id, None, Some(true)).unwrap();
|
||||
let updated = db.get_user(&user.id).unwrap().unwrap();
|
||||
assert!(updated.is_admin);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_delete_user() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("frank", "pass", false).unwrap();
|
||||
assert!(db.delete_user(&user.id).unwrap());
|
||||
assert!(db.get_user(&user.id).unwrap().is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_delete_nonexistent_user() {
|
||||
let db = test_db();
|
||||
assert!(!db.delete_user("nonexistent-id").unwrap());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_create_and_validate_session() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("grace", "pass", false).unwrap();
|
||||
|
||||
let token = db.create_session(&user.id, 3600).unwrap();
|
||||
let validated = db.validate_session(&token).unwrap();
|
||||
assert!(validated.is_some());
|
||||
assert_eq!(validated.unwrap().username, "grace");
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_expired_session_rejected() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("heidi", "pass", false).unwrap();
|
||||
|
||||
// Create session that expired 10 seconds ago
|
||||
let token = db.create_session(&user.id, -10).unwrap();
|
||||
let validated = db.validate_session(&token).unwrap();
|
||||
assert!(validated.is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_invalid_token_rejected() {
|
||||
let db = test_db();
|
||||
let validated = db.validate_session("bogus-token").unwrap();
|
||||
assert!(validated.is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_delete_session() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("ivan", "pass", false).unwrap();
|
||||
let token = db.create_session(&user.id, 3600).unwrap();
|
||||
|
||||
assert!(db.delete_session(&token).unwrap());
|
||||
assert!(db.validate_session(&token).unwrap().is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_delete_user_cascades_sessions() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("judy", "pass", false).unwrap();
|
||||
let token = db.create_session(&user.id, 3600).unwrap();
|
||||
|
||||
db.delete_user(&user.id).unwrap();
|
||||
assert!(db.validate_session(&token).unwrap().is_none());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_delete_user_cascades_permissions() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("karl", "pass", false).unwrap();
|
||||
db.set_permissions(
|
||||
&user.id,
|
||||
&[AppPermission {
|
||||
server: "srv".to_string(),
|
||||
app_id: 1,
|
||||
}],
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
db.delete_user(&user.id).unwrap();
|
||||
// Permissions table should be empty for this user
|
||||
let perms = db.get_permissions(&user.id).unwrap();
|
||||
assert!(perms.is_empty());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_set_and_get_permissions() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("laura", "pass", false).unwrap();
|
||||
|
||||
let perms = vec![
|
||||
AppPermission {
|
||||
server: "server1".to_string(),
|
||||
app_id: 10,
|
||||
},
|
||||
AppPermission {
|
||||
server: "server1".to_string(),
|
||||
app_id: 20,
|
||||
},
|
||||
];
|
||||
db.set_permissions(&user.id, &perms).unwrap();
|
||||
|
||||
let fetched = db.get_permissions(&user.id).unwrap();
|
||||
assert_eq!(fetched.len(), 2);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_set_permissions_replaces_existing() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("mike", "pass", false).unwrap();
|
||||
|
||||
db.set_permissions(
|
||||
&user.id,
|
||||
&[AppPermission {
|
||||
server: "s1".to_string(),
|
||||
app_id: 1,
|
||||
}],
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
db.set_permissions(
|
||||
&user.id,
|
||||
&[AppPermission {
|
||||
server: "s2".to_string(),
|
||||
app_id: 2,
|
||||
}],
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
let perms = db.get_permissions(&user.id).unwrap();
|
||||
assert_eq!(perms.len(), 1);
|
||||
assert_eq!(perms[0].server, "s2");
|
||||
assert_eq!(perms[0].app_id, 2);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_check_app_permission_allowed() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("nancy", "pass", false).unwrap();
|
||||
db.set_permissions(
|
||||
&user.id,
|
||||
&[AppPermission {
|
||||
server: "srv".to_string(),
|
||||
app_id: 42,
|
||||
}],
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
assert!(db.check_app_permission(&user.id, "srv", 42).unwrap());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_check_app_permission_denied() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("oscar", "pass", false).unwrap();
|
||||
|
||||
assert!(!db.check_app_permission(&user.id, "srv", 42).unwrap());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_check_app_permission_admin_bypass() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("pat", "pass", true).unwrap();
|
||||
// Admin has no explicit permissions but should pass
|
||||
assert!(db.check_app_permission(&user.id, "srv", 42).unwrap());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_cleanup_expired_sessions() {
|
||||
let db = test_db();
|
||||
let user = db.create_user("quinn", "pass", false).unwrap();
|
||||
|
||||
let _expired = db.create_session(&user.id, -10).unwrap();
|
||||
let valid = db.create_session(&user.id, 3600).unwrap();
|
||||
|
||||
let cleaned = db.cleanup_expired_sessions().unwrap();
|
||||
assert_eq!(cleaned, 1);
|
||||
|
||||
// Valid session should still work
|
||||
assert!(db.validate_session(&valid).unwrap().is_some());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_seed_admin_if_needed() {
|
||||
let db = test_db();
|
||||
|
||||
// First call should create admin
|
||||
let result = db.seed_admin_if_needed().unwrap();
|
||||
assert!(result.is_some());
|
||||
let (username, password) = result.unwrap();
|
||||
assert_eq!(username, "admin");
|
||||
assert!(!password.is_empty());
|
||||
|
||||
// Verify can login with generated password
|
||||
let user = db.verify_password("admin", &password).unwrap().unwrap();
|
||||
assert!(user.is_admin);
|
||||
|
||||
// Second call should be a no-op
|
||||
let result = db.seed_admin_if_needed().unwrap();
|
||||
assert!(result.is_none());
|
||||
}
|
||||
}
|
||||
@@ -3,9 +3,11 @@ use salvo::logging::Logger;
|
||||
use salvo::prelude::*;
|
||||
|
||||
mod apps;
|
||||
mod auth;
|
||||
mod backend;
|
||||
mod certs;
|
||||
mod common;
|
||||
mod db;
|
||||
mod gamestream;
|
||||
mod pair;
|
||||
mod proxy;
|
||||
@@ -40,12 +42,70 @@ fn create_static_handler() -> impl Handler {
|
||||
|
||||
async fn run_backend(port: u16) -> Result<()> {
|
||||
let backend = backend::Backend::new(port)?;
|
||||
|
||||
// Seed default admin user if no users exist
|
||||
if let Some((username, password)) = backend.db.seed_admin_if_needed()? {
|
||||
tracing::info!("Created default admin user: {username}");
|
||||
println!("===========================================");
|
||||
println!(" Default admin credentials:");
|
||||
println!(" Username: {username}");
|
||||
println!(" Password: {password}");
|
||||
println!("===========================================");
|
||||
}
|
||||
|
||||
// Clean up expired sessions on startup
|
||||
if let Ok(cleaned) = backend.db.cleanup_expired_sessions() {
|
||||
if cleaned > 0 {
|
||||
tracing::info!("Cleaned up {cleaned} expired sessions");
|
||||
}
|
||||
}
|
||||
|
||||
let backend_arc = std::sync::Arc::new(backend);
|
||||
|
||||
let auth_middleware = auth::SessionAuthMiddleware {
|
||||
db: std::sync::Arc::new(
|
||||
db::Db::open(
|
||||
&directories::ProjectDirs::from("xyz", "ohea", "gamestream-webtransport-proxy")
|
||||
.ok_or(anyhow!("Could not get project dirs"))?
|
||||
.data_dir()
|
||||
.join("auth.db"),
|
||||
)?,
|
||||
),
|
||||
};
|
||||
|
||||
let router = Router::new()
|
||||
.push(Router::with_path("api/pair").post(backend_arc.post_pair()))
|
||||
.push(Router::with_path("api/apps").get(backend_arc.get_apps()))
|
||||
.push(Router::with_path("api/stream/start").post(backend_arc.post_stream_start()))
|
||||
// Public auth routes
|
||||
.push(Router::with_path("api/auth/login").post(backend_arc.login()))
|
||||
// Authenticated routes
|
||||
.push(
|
||||
Router::with_path("api")
|
||||
.hoop(auth_middleware)
|
||||
.push(Router::with_path("auth/logout").post(backend_arc.logout()))
|
||||
.push(Router::with_path("auth/me").get(backend_arc.me()))
|
||||
.push(Router::with_path("pair").post(backend_arc.post_pair()))
|
||||
.push(Router::with_path("apps").get(backend_arc.get_apps()))
|
||||
.push(Router::with_path("stream/start").post(backend_arc.post_stream_start()))
|
||||
// Admin-only routes
|
||||
.push(
|
||||
Router::with_path("admin")
|
||||
.hoop(auth::AdminCheckMiddleware)
|
||||
.push(
|
||||
Router::with_path("users")
|
||||
.get(backend_arc.admin_list_users())
|
||||
.post(backend_arc.admin_create_user()),
|
||||
)
|
||||
.push(
|
||||
Router::with_path("users/<id>")
|
||||
.put(backend_arc.admin_update_user())
|
||||
.delete(backend_arc.admin_delete_user()),
|
||||
)
|
||||
.push(
|
||||
Router::with_path("users/<id>/permissions")
|
||||
.get(backend_arc.admin_get_permissions())
|
||||
.put(backend_arc.admin_set_permissions()),
|
||||
),
|
||||
),
|
||||
)
|
||||
.push(Router::with_path("{*path}").get(create_static_handler()));
|
||||
let doc = OpenApi::new("test api", "0.0.1").merge_router(&router);
|
||||
let router = router
|
||||
@@ -64,11 +124,9 @@ async fn run_backend(port: u16) -> Result<()> {
|
||||
Ok(())
|
||||
}
|
||||
|
||||
async fn run_proxy(port: u16, stream_id: uuid::Uuid) -> Result<()> {
|
||||
async fn run_proxy(port: u16, stream_id: uuid::Uuid, stream_token: String) -> Result<()> {
|
||||
let (config, cert_hash) = certs::get_webtransport_stream_config(stream_id)?;
|
||||
//let config = certs::get_http_stream_config()?;
|
||||
//let cert_hash = [0; 32];
|
||||
let proxy = proxy::Proxy::new(cert_hash);
|
||||
let proxy = proxy::Proxy::new(cert_hash, stream_token);
|
||||
let proxy_arc = std::sync::Arc::new(proxy);
|
||||
|
||||
let router = Router::new()
|
||||
@@ -108,8 +166,11 @@ async fn main() -> anyhow::Result<()> {
|
||||
.nth(3)
|
||||
.ok_or(anyhow!("Cert ID argument missing"))?,
|
||||
)?;
|
||||
let stream_token = std::env::args()
|
||||
.nth(4)
|
||||
.ok_or(anyhow!("Stream token argument missing"))?;
|
||||
|
||||
run_proxy(port, stream_id).await
|
||||
run_proxy(port, stream_id, stream_token).await
|
||||
}
|
||||
_ => Err(anyhow!("Unknown mode: {mode}")),
|
||||
}
|
||||
|
||||
@@ -85,6 +85,18 @@ impl crate::proxy::Proxy {
|
||||
description: "Could not start stream".to_string(),
|
||||
});
|
||||
|
||||
// Validate single-use stream token via the shared helper so this
|
||||
// handler and its unit tests exercise the same code path.
|
||||
let provided_token = req.query::<String>("token").unwrap_or_default();
|
||||
if let Err(msg) = super::validate_stream_token(&self, &provided_token).await {
|
||||
error!("Stream token validation failed: {msg}");
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::UNAUTHORIZED,
|
||||
description: msg,
|
||||
});
|
||||
}
|
||||
info!("Stream token validated and consumed");
|
||||
|
||||
info!("WebTransport connection initiated");
|
||||
let (wt_stream_send, wt_stream_recv, wt_datagram_send) = match setup_webtransport(req).await
|
||||
{
|
||||
|
||||
@@ -11,16 +11,16 @@ mod video;
|
||||
|
||||
pub struct Proxy {
|
||||
pub cert_hash: [u8; 32],
|
||||
//pub cert_hash: String,
|
||||
pub stream: RwLock<Option<backend::Stream>>,
|
||||
pub stream_token: RwLock<Option<String>>,
|
||||
}
|
||||
|
||||
impl Proxy {
|
||||
pub fn new(cert_hash: [u8; 32]) -> Self {
|
||||
//pub fn new(cert_hash: String) -> Self {
|
||||
pub fn new(cert_hash: [u8; 32], stream_token: String) -> Self {
|
||||
Proxy {
|
||||
stream: RwLock::new(None),
|
||||
cert_hash,
|
||||
stream_token: RwLock::new(Some(stream_token)),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -78,6 +78,22 @@ async fn proxy_main(
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Validate a provided token against the stored token. Consumes the token on success (single-use).
|
||||
/// Returns Ok(()) if valid, Err with description if invalid or already consumed.
|
||||
pub async fn validate_stream_token(proxy: &Proxy, provided: &str) -> std::result::Result<(), String> {
|
||||
let mut token_guard = proxy.stream_token.write().await;
|
||||
match token_guard.take() {
|
||||
Some(expected) if expected == provided => Ok(()),
|
||||
Some(_) => {
|
||||
// Wrong token: still consumed by the `take()` above. Any validation
|
||||
// attempt — correct or not — invalidates the token, so a wrong
|
||||
// guess cannot be followed by a correct one.
|
||||
Err("Invalid stream token".to_string())
|
||||
}
|
||||
None => Err("Stream token already used".to_string()),
|
||||
}
|
||||
}
|
||||
|
||||
async fn spawn_gamestream(stream: backend::Stream) -> Result<Channels> {
|
||||
let (tx, rx) = tokio::sync::oneshot::channel();
|
||||
let (stop_tx, stop_rx) = tokio::sync::oneshot::channel::<()>();
|
||||
@@ -99,3 +115,59 @@ async fn spawn_gamestream(stream: backend::Stream) -> Result<Channels> {
|
||||
.context("Could not get gamestream communication channels")?,
|
||||
})
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
|
||||
fn make_proxy(token: &str) -> Proxy {
|
||||
Proxy {
|
||||
cert_hash: [0u8; 32],
|
||||
stream: RwLock::new(None),
|
||||
stream_token: RwLock::new(Some(token.to_string())),
|
||||
}
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn test_valid_token_accepted() {
|
||||
let proxy = make_proxy("abc123");
|
||||
let result = validate_stream_token(&proxy, "abc123").await;
|
||||
assert!(result.is_ok());
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn test_wrong_token_rejected() {
|
||||
let proxy = make_proxy("abc123");
|
||||
let result = validate_stream_token(&proxy, "wrong").await;
|
||||
assert!(result.is_err());
|
||||
assert_eq!(result.unwrap_err(), "Invalid stream token");
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn test_missing_token_rejected() {
|
||||
let proxy = make_proxy("abc123");
|
||||
let result = validate_stream_token(&proxy, "").await;
|
||||
assert!(result.is_err());
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn test_token_consumed_after_use() {
|
||||
let proxy = make_proxy("abc123");
|
||||
let first = validate_stream_token(&proxy, "abc123").await;
|
||||
assert!(first.is_ok());
|
||||
|
||||
let second = validate_stream_token(&proxy, "abc123").await;
|
||||
assert!(second.is_err());
|
||||
assert_eq!(second.unwrap_err(), "Stream token already used");
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn test_wrong_attempt_consumes_token() {
|
||||
let proxy = make_proxy("abc123");
|
||||
// Wrong token attempt should consume it
|
||||
let _ = validate_stream_token(&proxy, "wrong").await;
|
||||
// Correct token should also fail now
|
||||
let result = validate_stream_token(&proxy, "abc123").await;
|
||||
assert!(result.is_err());
|
||||
}
|
||||
}
|
||||
|
||||
@@ -7,6 +7,7 @@ use serde::{Deserialize, Serialize};
|
||||
use tracing::{debug, error, info};
|
||||
|
||||
use crate::{
|
||||
auth,
|
||||
common::{AppError, AppResult, get_url},
|
||||
proxy, responses,
|
||||
state::{GamestreamServer, StateReadAccess, StateReader},
|
||||
@@ -24,7 +25,7 @@ struct PostStreamStartParams {
|
||||
struct PostStreamStartResponse {
|
||||
url: String,
|
||||
cert_hash: [u8; 32],
|
||||
//cert_hash: String,
|
||||
stream_token: String,
|
||||
}
|
||||
|
||||
#[derive(Deserialize)]
|
||||
@@ -81,12 +82,40 @@ impl crate::backend::Backend {
|
||||
self: ::std::sync::Arc<Self>,
|
||||
body: salvo::oapi::extract::JsonBody<PostStreamStartParams>,
|
||||
req: &mut Request,
|
||||
depot: &mut Depot,
|
||||
) -> AppResult<Json<PostStreamStartResponse>> {
|
||||
let standard_error = Err(crate::common::AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Could not start stream".to_string(),
|
||||
});
|
||||
|
||||
// Check app permission
|
||||
let user = match auth::get_user_from_depot(depot) {
|
||||
Some(u) => u.clone(),
|
||||
None => {
|
||||
error!("post_stream_start reached without authenticated user in depot");
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::UNAUTHORIZED,
|
||||
description: "Not authenticated".to_string(),
|
||||
});
|
||||
}
|
||||
};
|
||||
if !user.is_admin {
|
||||
match self.db.check_app_permission(&user.id, &body.server, body.id as i64) {
|
||||
Ok(true) => {}
|
||||
Ok(false) => {
|
||||
return Err(AppError {
|
||||
status_code: StatusCode::FORBIDDEN,
|
||||
description: "You do not have permission to access this application".to_string(),
|
||||
});
|
||||
}
|
||||
Err(e) => {
|
||||
error!("Permission check error: {e}");
|
||||
return standard_error;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
let reader = self.state.read().await;
|
||||
|
||||
let server = match get_server(&reader, &body.server) {
|
||||
@@ -272,6 +301,19 @@ impl crate::backend::Backend {
|
||||
|
||||
let port = self.port + <u16>::try_from((*writer).len()).unwrap();
|
||||
|
||||
// Generate single-use stream token for proxy authentication
|
||||
let stream_token = {
|
||||
let mut bytes = [0u8; 32];
|
||||
openssl::rand::rand_bytes(&mut bytes).map_err(|e| {
|
||||
error!("Failed to generate stream token: {e}");
|
||||
AppError {
|
||||
status_code: StatusCode::INTERNAL_SERVER_ERROR,
|
||||
description: "Could not start stream".to_string(),
|
||||
}
|
||||
})?;
|
||||
hex::encode(bytes)
|
||||
};
|
||||
|
||||
// Spawn WebTransport proxy
|
||||
let binary_path = match std::env::current_exe() {
|
||||
Ok(b) => b,
|
||||
@@ -285,7 +327,7 @@ impl crate::backend::Backend {
|
||||
stream_id, port
|
||||
);
|
||||
match tokio::process::Command::new(binary_path)
|
||||
.args(["proxy", &port.to_string(), &stream_id.to_string()])
|
||||
.args(["proxy", &port.to_string(), &stream_id.to_string(), &stream_token])
|
||||
.spawn()
|
||||
{
|
||||
Ok(_) => (),
|
||||
@@ -326,6 +368,7 @@ impl crate::backend::Backend {
|
||||
let post_stream_response = PostStreamStartResponse {
|
||||
url: webtransport_url,
|
||||
cert_hash: setup_resp.cert_hash,
|
||||
stream_token,
|
||||
};
|
||||
|
||||
Ok(Json(post_stream_response))
|
||||
|
||||
Reference in New Issue
Block a user