mirror of
https://github.com/owncast/owncast.git
synced 2024-10-10 19:16:02 +00:00
* Support webfinger requests for the live account. Closes https://github.com/owncast/owncast/issues/1193
* Support for actor requests. Returns response for live actor. Closes https://github.com/owncast/owncast/issues/1203
* Handle follow and unfollow requests. Closes
https://github.com/owncast/owncast/issues/1191 and https://github.com/owncast/owncast/issues/1205 and https://github.com/owncast/owncast/issues/1206 and https://github.com/owncast/owncast/issues/1194
* Add basic support for sending out text activities. For https://github.com/owncast/owncast/issues/1192
* Some error handling and passing of dynamic local account names.
* Add hardcoded example image attachment to test post
* Centralize the map of accounts and inboxes
* No longer disable the preview generator based on YP toggle
* Send a federated message to followers when stream starts. For https://github.com/owncast/owncast/issues/1192
* Placeholder for attaching tags
* Add image description
* Save and get to outbox persistence. Return using outbox endpoint for actor
* Pass payloads to be handled through the gochan
* Handle undo follow requests explitly, not all undo requests
* Add API for manually sending simple federated messages. Closes #1215
* Verify inbox requests. Closes #1321
* Add route to fetch a single AP object by ID. For #1329
* Add responses to fediverse nodeinfo requests
* Set and get federation config values for admin
* Handle host-meta requests
* Do not send out message if disabled. Use saved go live message.
* Require AP-compatible content types for AP-related requests
* Rename ap models to apmodels for clarity
* Change how content type matching takes place.
* io -> ioutil
* Add stub delete activity callback
* Handle likes and announces to surface engagement in chat. Part of #1229
* Append url to go live posts
* Do not require specific content types for nodeinfo requests
* Add follow engagement chat message via AP
* add owncast user-agent to requests
* Set note visibility to public (for now)
* Fix saving/fetching a single object
* Add support for x-nodeinfo2 responses
* Point to the dev admin branch for ap
* Bundle in dev admin for testing
* Add error logging
* Add AP middleware back
* Point to the new external compatible logo endpoint
* Clean up more AP logging to help testing
* Tweak go live text and link hashtags
* Fix bug in fetching init time
* Send update actor activities when server details/profile is updated
* Add federation config overview to web client config
* Add additional actor properties
* Make the AP middleware checking more flexible when looking at types
* First pass at remote fediverse follow flow. For #1371
* Added a basic AP actor followers endpoint
* WIP client followers API
* Add profile-page reference to webfinger response
* Add aliases to webfinger response
* Fix content-type returned to be expected activitypub+json
* First pass at followers api
* Point at local dev copy of go-fed/activity
* Add custom toot Hashtag objects to posts
* Store additional user details to followers table
* Fix AP followers endpoint. Closes #1204
* Add owncast hashtag as an invisible tag to go live posts
* Reject AP requests when it is disabled
* Add actor util for generating full account user from person object
* Verify inbox requests before performing any other work
* Accept actor update requests
* Fix linter errors in federation branch
* Migrate AP SQL to sqlc for type safe queries
* Use the @unclearParadigm REST parameter helper
* Fix verifying post ID on AP engagement
* WIP privacy/request approval
* Style the remote follow modal
* First pass at a followers list component w/ mock data. #1370
* Revert "Use the @unclearParadigm REST parameter helper"
This reverts commit c8af8a413f.
* Fix get followers API
* Add support for requiring approval. Closes https://github.com/owncast/owncast/issues/1208
* Handle Applications as Actors partly for PeerTube support
* add temp todo list
* check route on load, this might change later
* style followers
* account for just 1 tab case
* Remove mock data. Allow showing follow button even when there are no external actions defined
* Point to actual followers API
* Support fallback img for follower views
* Remove duplicate verification. Add some additional verbose logging
* Bundle dev admin
* Add type to host-meta webfinger template response
* Tweak remote follow modal content
* WIP federation followers refactor
* Do not send pointer to middleware
* Update admin
* Add setting for toggling displaying fediverse engagement. Closes #1404
* Add in-development admin
* Do not enable cors on admin followers api
* Add db migration for updating messages table
* Enable empty string go live messages to disable
* Remove debug messages
* Rework some ActivityPub handling.
Create new Actor->Person handling.
Create new Actor->Service handling.
Add engagement handlers to send chat events and store event objects.
Store inbound activities to new ap_inbound_activities table.
* Support federated engagement events.
Store them in the messages table and surface them via chat events.
* Support federated event engatement in the chat
* Tweak web UI followers handling
* Point go.mod at remote fork instead of local
* Update admin
* Merged in develop. Couple fixes
* Update dev admin
* Update fedi engagement posts.
- Fix incorrect action text.
- Add action icons.
* Set public as to instead of cc for ap msg
* Updated styling for federated actions in chat
* Add support for blocking federated domains. Closes #1209
* Force checking of https in verify step
* Update dev admin
* Return user scopes in chat history api. Closes #1586
* Update dev admin
* Add AP outbound request worker pool. Closes #1571
* Disable (temporarily?) owncast tag on AP posts
* Consolidate creating activity+notes in outbound AP messages
* Add inbox worker pool. Closes #1570
* Update dev admin bundle
* Clean up some logs
* Re-enable inbound verfication
* Save full IRI to outbox instead of path
* Reject if full IRI is not found in outbox
* Use full ActivityPub user account in chat event
* Fix and expand follower APIs
- Add missing IDs to AP follower endpoints
- Split AP follower endpoints into initial request and pages.
- Support pagination in AP requests.
* Include IRI in error message
* Hide chat toggle when chat is hidden. Closes #1606
* Updates to followers pagination
* Set default go live message
* Remove log
* indirect -> direct import
* Updates for inbound federated event handling.
- Keep track of existing events and reject duplicates.
- Change what is sent to chat for surfing federated engagement.
- Keep track if outbound events are automated "go live" events or not.
* Update chat federated engagement.
* Update dev admin.
* Move from being a person to a bot (service). Closes #1619
* Only set server init date if not already set
* Only save notes to outbox able
* Rework private-mode followers/approvals
* API for returning a list of federated actions for #1573
* Fix too-small follower cells and jumpy tabs. Closes #1616 and closes #1516
* Fix shortcuts getting fired on inputs. Fixes #1489 and #1201
* Add spinner, autoclose + other fixes to follow modal. Fixes #1593
* Fix fetching a single object by IRI
* SendFederationMessage -> SendFederatedMessage
* Autolink and create tag objects from manual posts. Closes #1620
* Update dev admin bundle
* Handle engagement from non-automated/live posts
* Reject federated engagement actions if they do not match a local post
* Update dev admin bundle
* A bunch of cleanup
* Fix unused assignments and logic
* Remove unused function
* Add content warning and sentive content flag if stream is NSFW. Closes #1624
* Disable fetching objects by IRI when in private mode. Closes #1623
* Update the error message of the remote follow dialog. closes #1622
* Update dev admin
* Fix NREs throwing in test content
* Fix query that wasn't properly filtering out hidden messages
* Test against user being disabled instead of message visibility
* Fix automated test NRE
* Update comment
* Adjust federated engagement chat views. Closes #1617
* Add additional index to users table
* Add support for removing followers/requests. Closes #1630
* Reject federated actions from blocked actors. #1631
* Use fallback avatar if it fails to load. Closes #1635
* Fix styling of follower list. Closes #1636
* Add basic blurb stating they should follow the server. Closes #1641
* Update dev admin
* Set default go live message in migration. Closes #1642
* Reset the messages table on 0.0.11 schema migration
* Fix js error with moderation actions. Closes #1621
* Add a bit more clarification on follow modal. Closes #1599
* Remove todos
* Split out actor and domain blocking checks
* Check for errors on default values being set
* Clean up actor rejection due to being blocked
* Update dev admin
* Add colon to error to make it easier to read
* Remove markdown rendering of go live message. Reorganize text. Remove content warning. Closes #1645
* Break out the sort+render messages logic so it can be fired on visibility change. Closes #1643
* Do not send profile updates if federation is disabled
* Save follow references to inbound activities table
* Update dev admin
* Add blocked actor test
* Remove the overloaded term of Follow from social links
* Fix test running in memory only
* Remove "just" in engagement messags
* Replace star with heart for like action.
* Update dev admin
* Explicitly set cc as public
* Remove overly using the stream name in fediverse engagement messages
* Some federated/follow UI tweaks
* Remove explicit cc and bcc as they are not required
* Explicitly set the audience
* Remove extra margin
* Add Join Fediverse button to follow modal. Closes #1651
* Do not allow multiple follows to send multiple events. Closes #1650
* Give events a min height
* Do not allow old posts to be liked/shared. Closes #1652
* Remove value from log message
* Alert followers on private mode toggle
* Ignore clicks to follow button if disabled
* Remove underline from action buttons
* Add moderator icon to join message
* Update admin
* Post-merge remove unused var
* Remove pointing at feature branch
Co-authored-by: Ginger Wong <omqmail@gmail.com>
697 lines
19 KiB
Go
697 lines
19 KiB
Go
package admin
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"reflect"
|
|
"strings"
|
|
|
|
"github.com/owncast/owncast/activitypub/outbox"
|
|
"github.com/owncast/owncast/controllers"
|
|
"github.com/owncast/owncast/core/chat"
|
|
"github.com/owncast/owncast/core/data"
|
|
"github.com/owncast/owncast/core/user"
|
|
"github.com/owncast/owncast/models"
|
|
"github.com/owncast/owncast/utils"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// ConfigValue is a container object that holds a value, is encoded, and saved to the database.
|
|
type ConfigValue struct {
|
|
Value interface{} `json:"value"`
|
|
}
|
|
|
|
// SetTags will handle the web config request to set tags.
|
|
func SetTags(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValues, success := getValuesFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
tagStrings := make([]string, 0)
|
|
for _, tag := range configValues {
|
|
tagStrings = append(tagStrings, strings.TrimLeft(tag.Value.(string), "#"))
|
|
}
|
|
|
|
if err := data.SetServerMetadataTags(tagStrings); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetStreamTitle will handle the web config request to set the current stream title.
|
|
func SetStreamTitle(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
value := configValue.Value.(string)
|
|
|
|
if err := data.SetStreamTitle(value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
if value != "" {
|
|
sendSystemChatAction(fmt.Sprintf("Stream title changed to **%s**", value), true)
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// ExternalSetStreamTitle will change the stream title on behalf of an external integration API request.
|
|
func ExternalSetStreamTitle(integration user.ExternalAPIUser, w http.ResponseWriter, r *http.Request) {
|
|
SetStreamTitle(w, r)
|
|
}
|
|
|
|
func sendSystemChatAction(messageText string, ephemeral bool) {
|
|
if err := chat.SendSystemAction(messageText, ephemeral); err != nil {
|
|
log.Errorln(err)
|
|
}
|
|
}
|
|
|
|
// SetServerName will handle the web config request to set the server's name.
|
|
func SetServerName(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerName(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetServerSummary will handle the web config request to set the about/summary text.
|
|
func SetServerSummary(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerSummary(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetServerWelcomeMessage will handle the web config request to set the welcome message text.
|
|
func SetServerWelcomeMessage(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerWelcomeMessage(strings.TrimSpace(configValue.Value.(string))); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetExtraPageContent will handle the web config request to set the page markdown content.
|
|
func SetExtraPageContent(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetExtraPageBodyContent(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetStreamKey will handle the web config request to set the server stream key.
|
|
func SetStreamKey(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamKey(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetLogo will handle a new logo image file being uploaded.
|
|
func SetLogo(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
s := strings.SplitN(configValue.Value.(string), ",", 2)
|
|
if len(s) < 2 {
|
|
controllers.WriteSimpleResponse(w, false, "Error splitting base64 image data.")
|
|
return
|
|
}
|
|
bytes, err := base64.StdEncoding.DecodeString(s[1])
|
|
if err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
splitHeader := strings.Split(s[0], ":")
|
|
if len(splitHeader) < 2 {
|
|
controllers.WriteSimpleResponse(w, false, "Error splitting base64 image header.")
|
|
return
|
|
}
|
|
contentType := strings.Split(splitHeader[1], ";")[0]
|
|
extension := ""
|
|
if contentType == "image/svg+xml" {
|
|
extension = ".svg"
|
|
} else if contentType == "image/gif" {
|
|
extension = ".gif"
|
|
} else if contentType == "image/png" {
|
|
extension = ".png"
|
|
} else if contentType == "image/jpeg" {
|
|
extension = ".jpeg"
|
|
}
|
|
|
|
if extension == "" {
|
|
controllers.WriteSimpleResponse(w, false, "Missing or invalid contentType in base64 image.")
|
|
return
|
|
}
|
|
|
|
imgPath := filepath.Join("data", "logo"+extension)
|
|
if err := os.WriteFile(imgPath, bytes, 0600); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetLogoPath("logo" + extension); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetNSFW will handle the web config request to set the NSFW flag.
|
|
func SetNSFW(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetNSFW(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetFfmpegPath will handle the web config request to validate and set an updated copy of ffmpg.
|
|
func SetFfmpegPath(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
path := configValue.Value.(string)
|
|
if err := utils.VerifyFFMpegPath(path); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetFfmpegPath(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "changed")
|
|
}
|
|
|
|
// SetWebServerPort will handle the web config request to set the server's HTTP port.
|
|
func SetWebServerPort(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if port, ok := configValue.Value.(float64); ok {
|
|
if (port < 1) || (port > 65535) {
|
|
controllers.WriteSimpleResponse(w, false, "Port number must be between 1 and 65535")
|
|
return
|
|
}
|
|
if err := data.SetHTTPPortNumber(port); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "HTTP port set")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, false, "Invalid type or value, port must be a number")
|
|
}
|
|
|
|
// SetWebServerIP will handle the web config request to set the server's HTTP listen address.
|
|
func SetWebServerIP(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if input, ok := configValue.Value.(string); ok {
|
|
if ip := net.ParseIP(input); ip != nil {
|
|
if err := data.SetHTTPListenAddress(ip.String()); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "HTTP listen address set")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, false, "Invalid IP address")
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, false, "Invalid type or value, IP address must be a string")
|
|
}
|
|
|
|
// SetRTMPServerPort will handle the web config request to set the inbound RTMP port.
|
|
func SetRTMPServerPort(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetRTMPPortNumber(configValue.Value.(float64)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "rtmp port set")
|
|
}
|
|
|
|
// SetServerURL will handle the web config request to set the full server URL.
|
|
func SetServerURL(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetServerURL(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "server url set")
|
|
}
|
|
|
|
// SetDirectoryEnabled will handle the web config request to enable or disable directory registration.
|
|
func SetDirectoryEnabled(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetDirectoryEnabled(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "directory state changed")
|
|
}
|
|
|
|
// SetStreamLatencyLevel will handle the web config request to set the stream latency level.
|
|
func SetStreamLatencyLevel(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamLatencyLevel(configValue.Value.(float64)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "error setting stream latency "+err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "set stream latency")
|
|
}
|
|
|
|
// SetS3Configuration will handle the web config request to set the storage configuration.
|
|
func SetS3Configuration(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type s3ConfigurationRequest struct {
|
|
Value models.S3 `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var newS3Config s3ConfigurationRequest
|
|
if err := decoder.Decode(&newS3Config); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update s3 config with provided values")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Enabled {
|
|
if newS3Config.Value.Endpoint == "" || !utils.IsValidURL((newS3Config.Value.Endpoint)) {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires an endpoint")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.AccessKey == "" || newS3Config.Value.Secret == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires an access key and secret")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Region == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires a region and endpoint")
|
|
return
|
|
}
|
|
|
|
if newS3Config.Value.Bucket == "" {
|
|
controllers.WriteSimpleResponse(w, false, "s3 support requires a bucket created for storing public video segments")
|
|
return
|
|
}
|
|
}
|
|
|
|
if err := data.SetS3Config(newS3Config.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
controllers.WriteSimpleResponse(w, true, "storage configuration changed")
|
|
}
|
|
|
|
// SetStreamOutputVariants will handle the web config request to set the video output stream variants.
|
|
func SetStreamOutputVariants(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type streamOutputVariantRequest struct {
|
|
Value []models.StreamOutputVariant `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var videoVariants streamOutputVariantRequest
|
|
if err := decoder.Decode(&videoVariants); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update video config with provided values "+err.Error())
|
|
return
|
|
}
|
|
|
|
if err := data.SetStreamOutputVariants(videoVariants.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update video config with provided values "+err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "stream output variants updated")
|
|
}
|
|
|
|
// SetSocialHandles will handle the web config request to set the external social profile links.
|
|
func SetSocialHandles(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
type socialHandlesRequest struct {
|
|
Value []models.SocialHandle `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var socialHandles socialHandlesRequest
|
|
if err := decoder.Decode(&socialHandles); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update social handles with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetSocialHandles(socialHandles.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update social handles with provided values")
|
|
return
|
|
}
|
|
|
|
// Update Fediverse followers about this change.
|
|
if err := outbox.UpdateFollowersWithAccountUpdates(); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "social handles updated")
|
|
}
|
|
|
|
// SetChatDisabled will disable chat functionality.
|
|
func SetChatDisabled(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update chat disabled")
|
|
return
|
|
}
|
|
|
|
if err := data.SetChatDisabled(configValue.Value.(bool)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "chat disabled status updated")
|
|
}
|
|
|
|
// SetVideoCodec will change the codec used for video encoding.
|
|
func SetVideoCodec(w http.ResponseWriter, r *http.Request) {
|
|
if !requirePOST(w, r) {
|
|
return
|
|
}
|
|
|
|
configValue, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to change video codec")
|
|
return
|
|
}
|
|
|
|
if err := data.SetVideoCodec(configValue.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update codec")
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "video codec updated")
|
|
}
|
|
|
|
// SetExternalActions will set the 3rd party actions for the web interface.
|
|
func SetExternalActions(w http.ResponseWriter, r *http.Request) {
|
|
type externalActionsRequest struct {
|
|
Value []models.ExternalAction `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var actions externalActionsRequest
|
|
if err := decoder.Decode(&actions); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update external actions with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetExternalActions(actions.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update external actions with provided values")
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "external actions update")
|
|
}
|
|
|
|
// SetCustomStyles will set the CSS string we insert into the page.
|
|
func SetCustomStyles(w http.ResponseWriter, r *http.Request) {
|
|
customStyles, success := getValueFromRequest(w, r)
|
|
if !success {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update custom styles")
|
|
return
|
|
}
|
|
|
|
if err := data.SetCustomStyles(customStyles.Value.(string)); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
return
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "custom styles updated")
|
|
}
|
|
|
|
// SetForbiddenUsernameList will set the list of usernames we do not allow to use.
|
|
func SetForbiddenUsernameList(w http.ResponseWriter, r *http.Request) {
|
|
type forbiddenUsernameListRequest struct {
|
|
Value []string `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var request forbiddenUsernameListRequest
|
|
if err := decoder.Decode(&request); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update forbidden usernames with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetForbiddenUsernameList(request.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "forbidden username list updated")
|
|
}
|
|
|
|
// SetSuggestedUsernameList will set the list of suggested usernames that newly registered users are assigned if it isn't inferred otherwise (i.e. through a proxy).
|
|
func SetSuggestedUsernameList(w http.ResponseWriter, r *http.Request) {
|
|
type suggestedUsernameListRequest struct {
|
|
Value []string `json:"value"`
|
|
}
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var request suggestedUsernameListRequest
|
|
|
|
if err := decoder.Decode(&request); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to update suggested usernames with provided values")
|
|
return
|
|
}
|
|
|
|
if err := data.SetSuggestedUsernamesList(request.Value); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, err.Error())
|
|
}
|
|
|
|
controllers.WriteSimpleResponse(w, true, "suggested username list updated")
|
|
}
|
|
|
|
func requirePOST(w http.ResponseWriter, r *http.Request) bool {
|
|
if r.Method != controllers.POST {
|
|
controllers.WriteSimpleResponse(w, false, r.Method+" not supported")
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func getValueFromRequest(w http.ResponseWriter, r *http.Request) (ConfigValue, bool) {
|
|
decoder := json.NewDecoder(r.Body)
|
|
var configValue ConfigValue
|
|
if err := decoder.Decode(&configValue); err != nil {
|
|
log.Warnln(err)
|
|
controllers.WriteSimpleResponse(w, false, "unable to parse new value")
|
|
return configValue, false
|
|
}
|
|
|
|
return configValue, true
|
|
}
|
|
|
|
func getValuesFromRequest(w http.ResponseWriter, r *http.Request) ([]ConfigValue, bool) {
|
|
var values []ConfigValue
|
|
|
|
decoder := json.NewDecoder(r.Body)
|
|
var configValue ConfigValue
|
|
if err := decoder.Decode(&configValue); err != nil {
|
|
controllers.WriteSimpleResponse(w, false, "unable to parse array of values")
|
|
return values, false
|
|
}
|
|
|
|
object := reflect.ValueOf(configValue.Value)
|
|
|
|
for i := 0; i < object.Len(); i++ {
|
|
values = append(values, ConfigValue{Value: object.Index(i).Interface()})
|
|
}
|
|
|
|
return values, true
|
|
}
|