mirror of
https://github.com/Drop-OSS/drop-app.git
synced 2025-11-18 10:41:15 +10:00
commit3b09dcfb73Author: quexeky <git@quexeky.dev> Date: Mon Oct 13 08:10:52 2025 +1100 fix: #159 Signed-off-by: quexeky <git@quexeky.dev> commit2859a59622Author: quexeky <git@quexeky.dev> Date: Mon Oct 13 08:03:49 2025 +1100 Squashed commit of the following: commit0f48f3fb44Author: quexeky <git@quexeky.dev> Date: Sun Oct 12 19:35:04 2025 +1100 chore: Run cargo clippy && cargo fmt Signed-off-by: quexeky <git@quexeky.dev> commit974666efe2Author: quexeky <git@quexeky.dev> Date: Sun Oct 12 19:17:40 2025 +1100 refactor: Finish refactor Signed-off-by: quexeky <git@quexeky.dev> commit9e1bf9852fAuthor: quexeky <git@quexeky.dev> Date: Sun Oct 12 18:33:43 2025 +1100 refactor: Builds, but some logic still left to move back Signed-off-by: quexeky <git@quexeky.dev> commit5d22b883d5Author: quexeky <git@quexeky.dev> Date: Sun Oct 12 17:04:27 2025 +1100 refactor: Improvements to src-tauri Signed-off-by: quexeky <git@quexeky.dev> commit62a2561539Author: quexeky <git@quexeky.dev> Date: Sat Oct 11 09:51:04 2025 +1100 fix: Remote tauri dependency from process Signed-off-by: quexeky <git@quexeky.dev> commit59f040bc8bAuthor: quexeky <git@quexeky.dev> Date: Thu Oct 9 07:46:17 2025 +1100 chore: Major refactoring Still needs a massive go-over because there shouldn't be anything referencing tauri in any of the workspaces except the original one. Process manager has been refactored as an example Signed-off-by: quexeky <git@quexeky.dev> Signed-off-by: quexeky <git@quexeky.dev> Signed-off-by: quexeky <git@quexeky.dev>
202 lines
5.8 KiB
Rust
202 lines
5.8 KiB
Rust
use std::{sync::nonpoison::Mutex, time::Duration};
|
|
|
|
use client::app_status::AppStatus;
|
|
use database::{borrow_db_checked, borrow_db_mut_checked};
|
|
use futures_lite::StreamExt;
|
|
use log::{debug, warn};
|
|
use remote::{
|
|
auth::{auth_initiate_logic, generate_authorization_header},
|
|
cache::{cache_object, get_cached_object},
|
|
error::RemoteAccessError,
|
|
requests::generate_url,
|
|
setup,
|
|
utils::{DROP_CLIENT_ASYNC, DROP_CLIENT_WS_CLIENT, DropHealthcheck},
|
|
};
|
|
use reqwest_websocket::{Message, RequestBuilderExt};
|
|
use serde::Deserialize;
|
|
use tauri::{AppHandle, Manager};
|
|
use url::Url;
|
|
use utils::{app_emit, webbrowser_open::webbrowser_open};
|
|
|
|
use crate::{AppState, recieve_handshake};
|
|
|
|
#[tauri::command]
|
|
pub async fn use_remote(
|
|
url: String,
|
|
state: tauri::State<'_, Mutex<AppState>>,
|
|
) -> Result<(), RemoteAccessError> {
|
|
debug!("connecting to url {url}");
|
|
let base_url = Url::parse(&url)?;
|
|
|
|
// Test Drop url
|
|
let test_endpoint = base_url.join("/api/v1")?;
|
|
let client = DROP_CLIENT_ASYNC.clone();
|
|
let response = client
|
|
.get(test_endpoint.to_string())
|
|
.timeout(Duration::from_secs(3))
|
|
.send()
|
|
.await?;
|
|
|
|
let result: DropHealthcheck = response.json().await?;
|
|
|
|
if result.app_name() != "Drop" {
|
|
warn!("user entered drop endpoint that connected, but wasn't identified as Drop");
|
|
return Err(RemoteAccessError::InvalidEndpoint);
|
|
}
|
|
|
|
let mut app_state = state.lock();
|
|
app_state.status = AppStatus::SignedOut;
|
|
drop(app_state);
|
|
|
|
let mut db_state = borrow_db_mut_checked();
|
|
db_state.base_url = base_url.to_string();
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub fn gen_drop_url(path: String) -> Result<String, RemoteAccessError> {
|
|
let base_url = {
|
|
let handle = borrow_db_checked();
|
|
|
|
Url::parse(&handle.base_url).map_err(RemoteAccessError::ParsingError)?
|
|
};
|
|
|
|
let url = base_url.join(&path)?;
|
|
|
|
Ok(url.to_string())
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub fn fetch_drop_object(path: String) -> Result<Vec<u8>, RemoteAccessError> {
|
|
let _drop_url = gen_drop_url(path.clone())?;
|
|
let req = generate_url(&[&path], &[])?;
|
|
let req = remote::utils::DROP_CLIENT_SYNC
|
|
.get(req)
|
|
.header("Authorization", generate_authorization_header())
|
|
.send();
|
|
|
|
match req {
|
|
Ok(data) => {
|
|
let data = data.bytes()?.to_vec();
|
|
cache_object(&path, &data)?;
|
|
Ok(data)
|
|
}
|
|
Err(e) => {
|
|
debug!("{e}");
|
|
get_cached_object::<Vec<u8>>(&path)
|
|
}
|
|
}
|
|
}
|
|
#[tauri::command]
|
|
pub fn sign_out(app: AppHandle) {
|
|
// Clear auth from database
|
|
{
|
|
let mut handle = borrow_db_mut_checked();
|
|
handle.auth = None;
|
|
}
|
|
|
|
// Update app state
|
|
{
|
|
let state = app.state::<Mutex<AppState>>();
|
|
let mut app_state_handle = state.lock();
|
|
app_state_handle.status = AppStatus::SignedOut;
|
|
app_state_handle.user = None;
|
|
}
|
|
|
|
// Emit event for frontend
|
|
app_emit!(&app, "auth/signedout", ());
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub async fn retry_connect(state: tauri::State<'_, Mutex<AppState>>) -> Result<(), ()> {
|
|
let (app_status, user) = setup().await;
|
|
|
|
let mut guard = state.lock();
|
|
guard.status = app_status;
|
|
guard.user = user;
|
|
drop(guard);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub fn auth_initiate() -> Result<(), RemoteAccessError> {
|
|
let base_url = {
|
|
let db_lock = borrow_db_checked();
|
|
Url::parse(&db_lock.base_url.clone())?
|
|
};
|
|
|
|
let redir_url = auth_initiate_logic("callback".to_string())?;
|
|
let complete_redir_url = base_url.join(&redir_url)?;
|
|
|
|
debug!("opening web browser to continue authentication");
|
|
webbrowser_open(complete_redir_url.as_ref());
|
|
Ok(())
|
|
}
|
|
|
|
#[derive(Deserialize)]
|
|
struct CodeWebsocketResponse {
|
|
#[serde(rename = "type")]
|
|
response_type: String,
|
|
value: String,
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub fn auth_initiate_code(app: AppHandle) -> Result<String, RemoteAccessError> {
|
|
let base_url = {
|
|
let db_lock = borrow_db_checked();
|
|
Url::parse(&db_lock.base_url.clone())?.clone()
|
|
};
|
|
|
|
let code = auth_initiate_logic("code".to_string())?;
|
|
let header_code = code.clone();
|
|
|
|
println!("using code: {code} to sign in");
|
|
|
|
tauri::async_runtime::spawn(async move {
|
|
let load = async || -> Result<(), RemoteAccessError> {
|
|
let ws_url = base_url.join("/api/v1/client/auth/code/ws")?;
|
|
let response = DROP_CLIENT_WS_CLIENT
|
|
.get(ws_url)
|
|
.header("Authorization", header_code)
|
|
.upgrade()
|
|
.send()
|
|
.await?;
|
|
|
|
let mut websocket = response.into_websocket().await?;
|
|
|
|
while let Some(token) = websocket.try_next().await? {
|
|
if let Message::Text(response) = token {
|
|
let response = serde_json::from_str::<CodeWebsocketResponse>(&response)
|
|
.map_err(|e| RemoteAccessError::UnparseableResponse(e.to_string()))?;
|
|
match response.response_type.as_str() {
|
|
"token" => {
|
|
let recieve_app = app.clone();
|
|
manual_recieve_handshake(recieve_app, response.value).await;
|
|
return Ok(());
|
|
}
|
|
_ => return Err(RemoteAccessError::HandshakeFailed(response.value)),
|
|
}
|
|
}
|
|
}
|
|
Err(RemoteAccessError::HandshakeFailed(
|
|
"Failed to connect to websocket".to_string(),
|
|
))
|
|
};
|
|
|
|
let result = load().await;
|
|
if let Err(err) = result {
|
|
warn!("{err}");
|
|
app_emit!(&app, "auth/failed", err.to_string());
|
|
}
|
|
});
|
|
|
|
Ok(code)
|
|
}
|
|
|
|
#[tauri::command]
|
|
pub async fn manual_recieve_handshake(app: AppHandle, token: String) {
|
|
recieve_handshake(app, format!("handshake/{token}")).await;
|
|
}
|