mirror of
https://github.com/owncast/owncast.git
synced 2024-10-10 19:16:02 +00:00

* Support webfinger requests for the live account. Closes https://github.com/owncast/owncast/issues/1193 * Support for actor requests. Returns response for live actor. Closes https://github.com/owncast/owncast/issues/1203 * Handle follow and unfollow requests. Closes https://github.com/owncast/owncast/issues/1191 and https://github.com/owncast/owncast/issues/1205 and https://github.com/owncast/owncast/issues/1206 and https://github.com/owncast/owncast/issues/1194 * Add basic support for sending out text activities. For https://github.com/owncast/owncast/issues/1192 * Some error handling and passing of dynamic local account names. * Add hardcoded example image attachment to test post * Centralize the map of accounts and inboxes * No longer disable the preview generator based on YP toggle * Send a federated message to followers when stream starts. For https://github.com/owncast/owncast/issues/1192 * Placeholder for attaching tags * Add image description * Save and get to outbox persistence. Return using outbox endpoint for actor * Pass payloads to be handled through the gochan * Handle undo follow requests explitly, not all undo requests * Add API for manually sending simple federated messages. Closes #1215 * Verify inbox requests. Closes #1321 * Add route to fetch a single AP object by ID. For #1329 * Add responses to fediverse nodeinfo requests * Set and get federation config values for admin * Handle host-meta requests * Do not send out message if disabled. Use saved go live message. * Require AP-compatible content types for AP-related requests * Rename ap models to apmodels for clarity * Change how content type matching takes place. * io -> ioutil * Add stub delete activity callback * Handle likes and announces to surface engagement in chat. Part of #1229 * Append url to go live posts * Do not require specific content types for nodeinfo requests * Add follow engagement chat message via AP * add owncast user-agent to requests * Set note visibility to public (for now) * Fix saving/fetching a single object * Add support for x-nodeinfo2 responses * Point to the dev admin branch for ap * Bundle in dev admin for testing * Add error logging * Add AP middleware back * Point to the new external compatible logo endpoint * Clean up more AP logging to help testing * Tweak go live text and link hashtags * Fix bug in fetching init time * Send update actor activities when server details/profile is updated * Add federation config overview to web client config * Add additional actor properties * Make the AP middleware checking more flexible when looking at types * First pass at remote fediverse follow flow. For #1371 * Added a basic AP actor followers endpoint * WIP client followers API * Add profile-page reference to webfinger response * Add aliases to webfinger response * Fix content-type returned to be expected activitypub+json * First pass at followers api * Point at local dev copy of go-fed/activity * Add custom toot Hashtag objects to posts * Store additional user details to followers table * Fix AP followers endpoint. Closes #1204 * Add owncast hashtag as an invisible tag to go live posts * Reject AP requests when it is disabled * Add actor util for generating full account user from person object * Verify inbox requests before performing any other work * Accept actor update requests * Fix linter errors in federation branch * Migrate AP SQL to sqlc for type safe queries * Use the @unclearParadigm REST parameter helper * Fix verifying post ID on AP engagement * WIP privacy/request approval * Style the remote follow modal * First pass at a followers list component w/ mock data. #1370 * Revert "Use the @unclearParadigm REST parameter helper" This reverts commit c8af8a413f6f53e7d1a15a7d823ff28be2db3c23. * Fix get followers API * Add support for requiring approval. Closes https://github.com/owncast/owncast/issues/1208 * Handle Applications as Actors partly for PeerTube support * add temp todo list * check route on load, this might change later * style followers * account for just 1 tab case * Remove mock data. Allow showing follow button even when there are no external actions defined * Point to actual followers API * Support fallback img for follower views * Remove duplicate verification. Add some additional verbose logging * Bundle dev admin * Add type to host-meta webfinger template response * Tweak remote follow modal content * WIP federation followers refactor * Do not send pointer to middleware * Update admin * Add setting for toggling displaying fediverse engagement. Closes #1404 * Add in-development admin * Do not enable cors on admin followers api * Add db migration for updating messages table * Enable empty string go live messages to disable * Remove debug messages * Rework some ActivityPub handling. Create new Actor->Person handling. Create new Actor->Service handling. Add engagement handlers to send chat events and store event objects. Store inbound activities to new ap_inbound_activities table. * Support federated engagement events. Store them in the messages table and surface them via chat events. * Support federated event engatement in the chat * Tweak web UI followers handling * Point go.mod at remote fork instead of local * Update admin * Merged in develop. Couple fixes * Update dev admin * Update fedi engagement posts. - Fix incorrect action text. - Add action icons. * Set public as to instead of cc for ap msg * Updated styling for federated actions in chat * Add support for blocking federated domains. Closes #1209 * Force checking of https in verify step * Update dev admin * Return user scopes in chat history api. Closes #1586 * Update dev admin * Add AP outbound request worker pool. Closes #1571 * Disable (temporarily?) owncast tag on AP posts * Consolidate creating activity+notes in outbound AP messages * Add inbox worker pool. Closes #1570 * Update dev admin bundle * Clean up some logs * Re-enable inbound verfication * Save full IRI to outbox instead of path * Reject if full IRI is not found in outbox * Use full ActivityPub user account in chat event * Fix and expand follower APIs - Add missing IDs to AP follower endpoints - Split AP follower endpoints into initial request and pages. - Support pagination in AP requests. * Include IRI in error message * Hide chat toggle when chat is hidden. Closes #1606 * Updates to followers pagination * Set default go live message * Remove log * indirect -> direct import * Updates for inbound federated event handling. - Keep track of existing events and reject duplicates. - Change what is sent to chat for surfing federated engagement. - Keep track if outbound events are automated "go live" events or not. * Update chat federated engagement. * Update dev admin. * Move from being a person to a bot (service). Closes #1619 * Only set server init date if not already set * Only save notes to outbox able * Rework private-mode followers/approvals * API for returning a list of federated actions for #1573 * Fix too-small follower cells and jumpy tabs. Closes #1616 and closes #1516 * Fix shortcuts getting fired on inputs. Fixes #1489 and #1201 * Add spinner, autoclose + other fixes to follow modal. Fixes #1593 * Fix fetching a single object by IRI * SendFederationMessage -> SendFederatedMessage * Autolink and create tag objects from manual posts. Closes #1620 * Update dev admin bundle * Handle engagement from non-automated/live posts * Reject federated engagement actions if they do not match a local post * Update dev admin bundle * A bunch of cleanup * Fix unused assignments and logic * Remove unused function * Add content warning and sentive content flag if stream is NSFW. Closes #1624 * Disable fetching objects by IRI when in private mode. Closes #1623 * Update the error message of the remote follow dialog. closes #1622 * Update dev admin * Fix NREs throwing in test content * Fix query that wasn't properly filtering out hidden messages * Test against user being disabled instead of message visibility * Fix automated test NRE * Update comment * Adjust federated engagement chat views. Closes #1617 * Add additional index to users table * Add support for removing followers/requests. Closes #1630 * Reject federated actions from blocked actors. #1631 * Use fallback avatar if it fails to load. Closes #1635 * Fix styling of follower list. Closes #1636 * Add basic blurb stating they should follow the server. Closes #1641 * Update dev admin * Set default go live message in migration. Closes #1642 * Reset the messages table on 0.0.11 schema migration * Fix js error with moderation actions. Closes #1621 * Add a bit more clarification on follow modal. Closes #1599 * Remove todos * Split out actor and domain blocking checks * Check for errors on default values being set * Clean up actor rejection due to being blocked * Update dev admin * Add colon to error to make it easier to read * Remove markdown rendering of go live message. Reorganize text. Remove content warning. Closes #1645 * Break out the sort+render messages logic so it can be fired on visibility change. Closes #1643 * Do not send profile updates if federation is disabled * Save follow references to inbound activities table * Update dev admin * Add blocked actor test * Remove the overloaded term of Follow from social links * Fix test running in memory only * Remove "just" in engagement messags * Replace star with heart for like action. * Update dev admin * Explicitly set cc as public * Remove overly using the stream name in fediverse engagement messages * Some federated/follow UI tweaks * Remove explicit cc and bcc as they are not required * Explicitly set the audience * Remove extra margin * Add Join Fediverse button to follow modal. Closes #1651 * Do not allow multiple follows to send multiple events. Closes #1650 * Give events a min height * Do not allow old posts to be liked/shared. Closes #1652 * Remove value from log message * Alert followers on private mode toggle * Ignore clicks to follow button if disabled * Remove underline from action buttons * Add moderator icon to join message * Update admin * Post-merge remove unused var * Remove pointing at feature branch Co-authored-by: Ginger Wong <omqmail@gmail.com>
697 lines
19 KiB
Go
697 lines
19 KiB
Go
package admin
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"reflect"
|
|
"strings"
|
|
|
|
"github.com/owncast/owncast/activitypub/outbox"
|
|
"github.com/owncast/owncast/controllers"
|
|
"github.com/owncast/owncast/core/chat"
|
|
"github.com/owncast/owncast/core/data"
|
|
"github.com/owncast/owncast/core/user"
|
|
"github.com/owncast/owncast/models"
|
|
"github.com/owncast/owncast/utils"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// ConfigValue is a container object that holds a value, is encoded, and saved to the database.
|
|
type ConfigValue struct {
|
|
Value interface{} `json:"value"`
|
|
}
|
|
|
|
// SetTags will handle the web config request to set tags.
|
|
func SetTags(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValues, success := getValuesFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
tagStrings := make([]string, 0)
|
|
for _, tag := range configValues {
|
|
tagStrings = append(tagStrings, strings.TrimLeft(tag.Value.(string), "#"))
|
|
}
|
|
|
|
if err := data.SetServerMetadataTags(tagStrings); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetStreamTitle will handle the web config request to set the current stream title.
|
|
func SetStreamTitle(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
value := configValue.Value.(string)
|
|
|
|
if err := data.SetStreamTitle(value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
if value != "" {
|
|
sendSystemChatAction(fmt.Sprintf("Stream title changed to **%s**", value), true)
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// ExternalSetStreamTitle will change the stream title on behalf of an external integration API request.
|
|
func ExternalSetStreamTitle(integration user.ExternalAPIUser, w http.ResponseWriter, r *http.Request) {
|
|
SetStreamTitle(w, r)
|
|
}
|
|
|
|
func sendSystemChatAction(messageText string, ephemeral bool) {
|
|
if err := chat.SendSystemAction(messageText, ephemeral); err != nil {
|
|
log.Errorln(err)
|
|
}
|
|
}
|
|
|
|
// SetServerName will handle the web config request to set the server's name.
|
|
func SetServerName(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerName(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetServerSummary will handle the web config request to set the about/summary text.
|
|
func SetServerSummary(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerSummary(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetServerWelcomeMessage will handle the web config request to set the welcome message text.
|
|
func SetServerWelcomeMessage(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerWelcomeMessage(strings.TrimSpace(configValue.Value.(string))); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetExtraPageContent will handle the web config request to set the page markdown content.
|
|
func SetExtraPageContent(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetExtraPageBodyContent(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetStreamKey will handle the web config request to set the server stream key.
|
|
func SetStreamKey(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamKey(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetLogo will handle a new logo image file being uploaded.
|
|
func SetLogo(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
s := strings.SplitN(configValue.Value.(string), ",", 2)
|
|
if len(s) < 2 {
|
|
controllers.WriteSimpleResponse(w, false, "Error splitting base64 image data.")
|
|
return
|
|
}
|
|
bytes, err := base64.StdEncoding.DecodeString(s[1])
|
|
if err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
splitHeader := strings.Split(s[0], ":")
|
|
if len(splitHeader) < 2 {
|
|
controllers.WriteSimpleResponse(w, false, "Error splitting base64 image header.")
|
|
return
|
|
}
|
|
contentType := strings.Split(splitHeader[1], ";")[0]
|
|
extension := ""
|
|
if contentType == "image/svg+xml" {
|
|
extension = ".svg"
|
|
} else if contentType == "image/gif" {
|
|
extension = ".gif"
|
|
} else if contentType == "image/png" {
|
|
extension = ".png"
|
|
} else if contentType == "image/jpeg" {
|
|
extension = ".jpeg"
|
|
}
|
|
|
|
if extension == "" {
|
|
controllers.WriteSimpleResponse(w, false, "Missing or invalid contentType in base64 image.")
|
|
return
|
|
}
|
|
|
|
imgPath := filepath.Join("data", "logo"+extension)
|
|
if err := os.WriteFile(imgPath, bytes, 0600); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetLogoPath("logo" + extension); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetNSFW will handle the web config request to set the NSFW flag.
|
|
func SetNSFW(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetNSFW(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetFfmpegPath will handle the web config request to validate and set an updated copy of ffmpg.
|
|
func SetFfmpegPath(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
path := configValue.Value.(string)
|
|
if err := utils.VerifyFFMpegPath(path); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetFfmpegPath(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetWebServerPort will handle the web config request to set the server's HTTP port.
|
|
func SetWebServerPort(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if port, ok := configValue.Value.(float64); ok {
|
|
if (port < 1) || (port > 65535) {
|
|
controllers.WriteSimpleResponse(w, false, "Port number must be between 1 and 65535")
|
|
return
|
|
}
|
|
if err := data.SetHTTPPortNumber(port); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "HTTP port set")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, false, "Invalid type or value, port must be a number")
|
|
}
|
|
|
|
// SetWebServerIP will handle the web config request to set the server's HTTP listen address.
|
|
func SetWebServerIP(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if input, ok := configValue.Value.(string); ok {
|
|
if ip := net.ParseIP(input); ip != nil {
|
|
if err := data.SetHTTPListenAddress(ip.String()); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "HTTP listen address set")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, false, "Invalid IP address")
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, false, "Invalid type or value, IP address must be a string")
|
|
}
|
|
|
|
// SetRTMPServerPort will handle the web config request to set the inbound RTMP port.
|
|
func SetRTMPServerPort(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetRTMPPortNumber(configValue.Value.(float64)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "rtmp port set")
|
|
}
|
|
|
|
// SetServerURL will handle the web config request to set the full server URL.
|
|
func SetServerURL(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerURL(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "server url set")
|
|
}
|
|
|
|
// SetDirectoryEnabled will handle the web config request to enable or disable directory registration.
|
|
func SetDirectoryEnabled(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetDirectoryEnabled(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "directory state changed")
|
|
}
|
|
|
|
// SetStreamLatencyLevel will handle the web config request to set the stream latency level.
|
|
func SetStreamLatencyLevel(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamLatencyLevel(configValue.Value.(float64)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "error setting stream latency "+err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "set stream latency")
|
|
}
|
|
|
|
// SetS3Configuration will handle the web config request to set the storage configuration.
|
|
func SetS3Configuration(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type s3ConfigurationRequest struct {
|
|
Value models.S3 `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var newS3Config s3ConfigurationRequest
|
|
if err := decoder.Decode(&newS3Config); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update s3 config with provided values")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Enabled {
|
|
if newS3Config.Value.Endpoint == "" || !utils.IsValidURL((newS3Config.Value.Endpoint)) {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires an endpoint")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.AccessKey == "" || newS3Config.Value.Secret == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires an access key and secret")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Region == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires a region and endpoint")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Bucket == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires a bucket created for storing public video segments")
|
|
return
|
|
}
|
|
}
|
|
|
|
if err := data.SetS3Config(newS3Config.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "storage configuration changed")
|
|
}
|
|
|
|
// SetStreamOutputVariants will handle the web config request to set the video output stream variants.
|
|
func SetStreamOutputVariants(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type streamOutputVariantRequest struct {
|
|
Value []models.StreamOutputVariant `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var videoVariants streamOutputVariantRequest
|
|
if err := decoder.Decode(&videoVariants); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update video config with provided values "+err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamOutputVariants(videoVariants.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update video config with provided values "+err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "stream output variants updated")
|
|
}
|
|
|
|
// SetSocialHandles will handle the web config request to set the external social profile links.
|
|
func SetSocialHandles(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type socialHandlesRequest struct {
|
|
Value []models.SocialHandle `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var socialHandles socialHandlesRequest
|
|
if err := decoder.Decode(&socialHandles); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update social handles with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetSocialHandles(socialHandles.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update social handles with provided values")
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "social handles updated")
|
|
}
|
|
|
|
// SetChatDisabled will disable chat functionality.
|
|
func SetChatDisabled(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update chat disabled")
|
|
return
|
|
}
|
|
|
|
if err := data.SetChatDisabled(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "chat disabled status updated")
|
|
}
|
|
|
|
// SetVideoCodec will change the codec used for video encoding.
|
|
func SetVideoCodec(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to change video codec")
|
|
return
|
|
}
|
|
|
|
if err := data.SetVideoCodec(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update codec")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "video codec updated")
|
|
}
|
|
|
|
// SetExternalActions will set the 3rd party actions for the web interface.
|
|
func SetExternalActions(w http.ResponseWriter, r *http.Request) {
|
|
type externalActionsRequest struct {
|
|
Value []models.ExternalAction `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var actions externalActionsRequest
|
|
if err := decoder.Decode(&actions); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update external actions with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetExternalActions(actions.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update external actions with provided values")
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "external actions update")
|
|
}
|
|
|
|
// SetCustomStyles will set the CSS string we insert into the page.
|
|
func SetCustomStyles(w http.ResponseWriter, r *http.Request) {
|
|
customStyles, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update custom styles")
|
|
return
|
|
}
|
|
|
|
if err := data.SetCustomStyles(customStyles.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "custom styles updated")
|
|
}
|
|
|
|
// SetForbiddenUsernameList will set the list of usernames we do not allow to use.
|
|
func SetForbiddenUsernameList(w http.ResponseWriter, r *http.Request) {
|
|
type forbiddenUsernameListRequest struct {
|
|
Value []string `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var request forbiddenUsernameListRequest
|
|
if err := decoder.Decode(&request); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update forbidden usernames with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetForbiddenUsernameList(request.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "forbidden username list updated")
|
|
}
|
|
|
|
// SetSuggestedUsernameList will set the list of suggested usernames that newly registered users are assigned if it isn't inferred otherwise (i.e. through a proxy).
|
|
func SetSuggestedUsernameList(w http.ResponseWriter, r *http.Request) {
|
|
type suggestedUsernameListRequest struct {
|
|
Value []string `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var request suggestedUsernameListRequest
|
|
|
|
if err := decoder.Decode(&request); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update suggested usernames with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetSuggestedUsernamesList(request.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "suggested username list updated")
|
|
}
|
|
|
|
func requirePOST(w http.ResponseWriter, r *http.Request) bool {
|
|
if r.Method != controllers.POST {
|
|
controllers.WriteSimpleResponse(w, false, r.Method+" not supported")
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func getValueFromRequest(w http.ResponseWriter, r *http.Request) (ConfigValue, bool) {
|
|
decoder := json.NewDecoder(r.Body)
|
|
var configValue ConfigValue
|
|
if err := decoder.Decode(&configValue); err != nil {
|
|
log.Warnln(err)
|
|
controllers.WriteSimpleResponse(w, false, "unable to parse new value")
|
|
return configValue, false
|
|
}
|
|
|
|
return configValue, true
|
|
}
|
|
|
|
func getValuesFromRequest(w http.ResponseWriter, r *http.Request) ([]ConfigValue, bool) {
|
|
var values []ConfigValue
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var configValue ConfigValue
|
|
if err := decoder.Decode(&configValue); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to parse array of values")
|
|
return values, false
|
|
}
|
|
|
|
object := reflect.ValueOf(configValue.Value)
|
|
|
|
for i := 0; i < object.Len(); i++ {
|
|
values = append(values, ConfigValue{Value: object.Index(i).Interface()})
|
|
}
|
|
|
|
return values, true
|
|
}
|