123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671 |
- package server
- import (
- "bytes"
- "context"
- "encoding/json"
- "fmt"
- "io"
- "mime"
- "net/http"
- "net/url"
- "os"
- "path"
- "path/filepath"
- "regexp"
- "strconv"
- "strings"
- "sync/atomic"
- "time"
- "github.com/disintegration/imaging"
- "github.com/labstack/echo/v4"
- "github.com/pkg/errors"
- "github.com/usememos/memos/api"
- "github.com/usememos/memos/common"
- "github.com/usememos/memos/common/log"
- "github.com/usememos/memos/plugin/storage/s3"
- "github.com/usememos/memos/store"
- "go.uber.org/zap"
- )
- const (
- // The upload memory buffer is 32 MiB.
- // It should be kept low, so RAM usage doesn't get out of control.
- // This is unrelated to maximum upload size limit, which is now set through system setting.
- maxUploadBufferSizeBytes = 32 << 20
- MebiByte = 1024 * 1024
- // thumbnailImagePath is the directory to store image thumbnails.
- thumbnailImagePath = ".thumbnail_cache"
- )
- var fileKeyPattern = regexp.MustCompile(`\{[a-z]{1,9}\}`)
- func (s *Server) registerResourceRoutes(g *echo.Group) {
- g.POST("/resource", func(c echo.Context) error {
- ctx := c.Request().Context()
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if !ok {
- return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
- }
- resourceCreate := &api.ResourceCreate{}
- if err := json.NewDecoder(c.Request().Body).Decode(resourceCreate); err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Malformatted post resource request").SetInternal(err)
- }
- resourceCreate.CreatorID = userID
- if resourceCreate.ExternalLink != "" {
- // Only allow those external links scheme with http/https
- linkURL, err := url.Parse(resourceCreate.ExternalLink)
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Invalid external link").SetInternal(err)
- }
- if linkURL.Scheme != "http" && linkURL.Scheme != "https" {
- return echo.NewHTTPError(http.StatusBadRequest, "Invalid external link scheme")
- }
- if resourceCreate.DownloadToLocal {
- resp, err := http.Get(linkURL.String())
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to request "+resourceCreate.ExternalLink)
- }
- defer resp.Body.Close()
- blob, err := io.ReadAll(resp.Body)
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to read "+resourceCreate.ExternalLink)
- }
- resourceCreate.Blob = blob
- mediaType, _, err := mime.ParseMediaType(resp.Header.Get("Content-Type"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to read mime from "+resourceCreate.ExternalLink)
- }
- resourceCreate.Type = mediaType
- filename := path.Base(linkURL.Path)
- if path.Ext(filename) == "" {
- extensions, _ := mime.ExtensionsByType(mediaType)
- if len(extensions) > 0 {
- filename += extensions[0]
- }
- }
- resourceCreate.Filename = filename
- resourceCreate.PublicID = common.GenUUID()
- resourceCreate.ExternalLink = ""
- }
- }
- resource, err := s.Store.CreateResource(ctx, resourceCreate)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create resource").SetInternal(err)
- }
- if err := createResourceCreateActivity(c.Request().Context(), s.Store, resource); err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create activity").SetInternal(err)
- }
- return c.JSON(http.StatusOK, composeResponse(resource))
- })
- g.POST("/resource/blob", func(c echo.Context) error {
- ctx := c.Request().Context()
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if !ok {
- return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
- }
- // This is the backend default max upload size limit.
- maxUploadSetting := s.Store.GetSystemSettingValueOrDefault(&ctx, api.SystemSettingMaxUploadSizeMiBName, "32")
- var settingMaxUploadSizeBytes int
- if settingMaxUploadSizeMiB, err := strconv.Atoi(maxUploadSetting); err == nil {
- settingMaxUploadSizeBytes = settingMaxUploadSizeMiB * MebiByte
- } else {
- log.Warn("Failed to parse max upload size", zap.Error(err))
- settingMaxUploadSizeBytes = 0
- }
- file, err := c.FormFile("file")
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to get uploading file").SetInternal(err)
- }
- if file == nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Upload file not found").SetInternal(err)
- }
- if file.Size > int64(settingMaxUploadSizeBytes) {
- message := fmt.Sprintf("File size exceeds allowed limit of %d MiB", settingMaxUploadSizeBytes/MebiByte)
- return echo.NewHTTPError(http.StatusBadRequest, message).SetInternal(err)
- }
- if err := c.Request().ParseMultipartForm(maxUploadBufferSizeBytes); err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to parse upload data").SetInternal(err)
- }
- filetype := file.Header.Get("Content-Type")
- size := file.Size
- sourceFile, err := file.Open()
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to open file").SetInternal(err)
- }
- defer sourceFile.Close()
- var resourceCreate *api.ResourceCreate
- systemSettingStorageServiceID, err := s.Store.FindSystemSetting(ctx, &api.SystemSettingFind{Name: api.SystemSettingStorageServiceIDName})
- if err != nil && common.ErrorCode(err) != common.NotFound {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find storage").SetInternal(err)
- }
- storageServiceID := api.DatabaseStorage
- if systemSettingStorageServiceID != nil {
- err = json.Unmarshal([]byte(systemSettingStorageServiceID.Value), &storageServiceID)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal storage service id").SetInternal(err)
- }
- }
- publicID := common.GenUUID()
- if storageServiceID == api.DatabaseStorage {
- fileBytes, err := io.ReadAll(sourceFile)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to read file").SetInternal(err)
- }
- resourceCreate = &api.ResourceCreate{
- CreatorID: userID,
- Filename: file.Filename,
- Type: filetype,
- Size: size,
- Blob: fileBytes,
- }
- } else if storageServiceID == api.LocalStorage {
- // filepath.Join() should be used for local file paths,
- // as it handles the os-specific path separator automatically.
- // path.Join() always uses '/' as path separator.
- systemSettingLocalStoragePath, err := s.Store.FindSystemSetting(ctx, &api.SystemSettingFind{Name: api.SystemSettingLocalStoragePathName})
- if err != nil && common.ErrorCode(err) != common.NotFound {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find local storage path setting").SetInternal(err)
- }
- localStoragePath := "assets/{publicid}"
- if systemSettingLocalStoragePath != nil && systemSettingLocalStoragePath.Value != "" {
- err = json.Unmarshal([]byte(systemSettingLocalStoragePath.Value), &localStoragePath)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal local storage path setting").SetInternal(err)
- }
- }
- filePath := filepath.FromSlash(localStoragePath)
- if !strings.Contains(filePath, "{publicid}") {
- filePath = filepath.Join(filePath, "{publicid}")
- }
- filePath = filepath.Join(s.Profile.Data, replacePathTemplate(filePath, file.Filename, publicID+filepath.Ext(file.Filename)))
- dir := filepath.Dir(filePath)
- if err = os.MkdirAll(dir, os.ModePerm); err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create directory").SetInternal(err)
- }
- dst, err := os.Create(filePath)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create file").SetInternal(err)
- }
- defer dst.Close()
- _, err = io.Copy(dst, sourceFile)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to copy file").SetInternal(err)
- }
- resourceCreate = &api.ResourceCreate{
- CreatorID: userID,
- Filename: file.Filename,
- Type: filetype,
- Size: size,
- InternalPath: filePath,
- }
- } else {
- storage, err := s.Store.FindStorage(ctx, &api.StorageFind{ID: &storageServiceID})
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find storage").SetInternal(err)
- }
- if storage.Type == api.StorageS3 {
- s3Config := storage.Config.S3Config
- s3Client, err := s3.NewClient(ctx, &s3.Config{
- AccessKey: s3Config.AccessKey,
- SecretKey: s3Config.SecretKey,
- EndPoint: s3Config.EndPoint,
- Region: s3Config.Region,
- Bucket: s3Config.Bucket,
- URLPrefix: s3Config.URLPrefix,
- URLSuffix: s3Config.URLSuffix,
- })
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to new s3 client").SetInternal(err)
- }
- filePath := s3Config.Path
- if !strings.Contains(filePath, "{publicid}") {
- filePath = path.Join(filePath, "{publicid}")
- }
- filePath = replacePathTemplate(filePath, file.Filename, publicID+filepath.Ext(file.Filename))
- _, filename := filepath.Split(filePath)
- link, err := s3Client.UploadFile(ctx, filePath, filetype, sourceFile)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upload via s3 client").SetInternal(err)
- }
- resourceCreate = &api.ResourceCreate{
- CreatorID: userID,
- Filename: filename,
- Type: filetype,
- Size: size,
- ExternalLink: link,
- }
- } else {
- return echo.NewHTTPError(http.StatusInternalServerError, "Unsupported storage type")
- }
- }
- resourceCreate.PublicID = publicID
- resource, err := s.Store.CreateResource(ctx, resourceCreate)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create resource").SetInternal(err)
- }
- if err := createResourceCreateActivity(c.Request().Context(), s.Store, resource); err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create activity").SetInternal(err)
- }
- return c.JSON(http.StatusOK, composeResponse(resource))
- })
- g.GET("/resource", func(c echo.Context) error {
- ctx := c.Request().Context()
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if !ok {
- return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
- }
- resourceFind := &api.ResourceFind{
- CreatorID: &userID,
- }
- if limit, err := strconv.Atoi(c.QueryParam("limit")); err == nil {
- resourceFind.Limit = &limit
- }
- if offset, err := strconv.Atoi(c.QueryParam("offset")); err == nil {
- resourceFind.Offset = &offset
- }
- list, err := s.Store.FindResourceList(ctx, resourceFind)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch resource list").SetInternal(err)
- }
- return c.JSON(http.StatusOK, composeResponse(list))
- })
- g.PATCH("/resource/:resourceId", func(c echo.Context) error {
- ctx := c.Request().Context()
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if !ok {
- return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
- }
- resourceID, err := strconv.Atoi(c.Param("resourceId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
- }
- resourceFind := &api.ResourceFind{
- ID: &resourceID,
- }
- resource, err := s.Store.FindResource(ctx, resourceFind)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find resource").SetInternal(err)
- }
- if resource.CreatorID != userID {
- return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
- }
- currentTs := time.Now().Unix()
- resourcePatch := &api.ResourcePatch{
- UpdatedTs: ¤tTs,
- }
- if err := json.NewDecoder(c.Request().Body).Decode(resourcePatch); err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Malformatted patch resource request").SetInternal(err)
- }
- if resourcePatch.ResetPublicID != nil && *resourcePatch.ResetPublicID {
- publicID := common.GenUUID()
- resourcePatch.PublicID = &publicID
- }
- resourcePatch.ID = resourceID
- resource, err = s.Store.PatchResource(ctx, resourcePatch)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to patch resource").SetInternal(err)
- }
- return c.JSON(http.StatusOK, composeResponse(resource))
- })
- g.DELETE("/resource/:resourceId", func(c echo.Context) error {
- ctx := c.Request().Context()
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if !ok {
- return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
- }
- resourceID, err := strconv.Atoi(c.Param("resourceId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
- }
- resource, err := s.Store.FindResource(ctx, &api.ResourceFind{
- ID: &resourceID,
- CreatorID: &userID,
- })
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find resource").SetInternal(err)
- }
- if resource.CreatorID != userID {
- return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
- }
- if resource.InternalPath != "" {
- if err := os.Remove(resource.InternalPath); err != nil {
- log.Warn(fmt.Sprintf("failed to delete local file with path %s", resource.InternalPath), zap.Error(err))
- }
- }
- ext := filepath.Ext(resource.Filename)
- thumbnailPath := path.Join(s.Profile.Data, thumbnailImagePath, fmt.Sprintf("%d-%s%s", resource.ID, resource.PublicID, ext))
- if err := os.Remove(thumbnailPath); err != nil {
- log.Warn(fmt.Sprintf("failed to delete local thumbnail with path %s", thumbnailPath), zap.Error(err))
- }
- resourceDelete := &api.ResourceDelete{
- ID: resourceID,
- }
- if err := s.Store.DeleteResource(ctx, resourceDelete); err != nil {
- if common.ErrorCode(err) == common.NotFound {
- return echo.NewHTTPError(http.StatusNotFound, fmt.Sprintf("Resource ID not found: %d", resourceID))
- }
- return echo.NewHTTPError(http.StatusInternalServerError, "Failed to delete resource").SetInternal(err)
- }
- return c.JSON(http.StatusOK, true)
- })
- }
- func (s *Server) registerResourcePublicRoutes(g *echo.Group) {
- // (DEPRECATED) use /r/:resourceId/:publicId/:filename instead.
- g.GET("/r/:resourceId/:publicId", func(c echo.Context) error {
- ctx := c.Request().Context()
- resourceID, err := strconv.Atoi(c.Param("resourceId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
- }
- resourceVisibility, err := CheckResourceVisibility(ctx, s.Store, resourceID)
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to get resource visibility").SetInternal(err)
- }
- // Protected resource require a logined user
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if resourceVisibility == store.Protected && (!ok || userID <= 0) {
- return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
- }
- publicID, err := url.QueryUnescape(c.Param("publicId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("publicID is invalid: %s", c.Param("publicId"))).SetInternal(err)
- }
- resourceFind := &api.ResourceFind{
- ID: &resourceID,
- PublicID: &publicID,
- GetBlob: true,
- }
- resource, err := s.Store.FindResource(ctx, resourceFind)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find resource by ID: %v", resourceID)).SetInternal(err)
- }
- // Private resource require logined user is the creator
- if resourceVisibility == store.Private && (!ok || userID != resource.CreatorID) {
- return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
- }
- blob := resource.Blob
- if resource.InternalPath != "" {
- src, err := os.Open(resource.InternalPath)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to open the local resource: %s", resource.InternalPath)).SetInternal(err)
- }
- defer src.Close()
- blob, err = io.ReadAll(src)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to read the local resource: %s", resource.InternalPath)).SetInternal(err)
- }
- }
- c.Response().Writer.Header().Set(echo.HeaderCacheControl, "max-age=31536000, immutable")
- c.Response().Writer.Header().Set(echo.HeaderContentSecurityPolicy, "default-src 'self'")
- resourceType := strings.ToLower(resource.Type)
- if strings.HasPrefix(resourceType, "text") {
- resourceType = echo.MIMETextPlainCharsetUTF8
- } else if strings.HasPrefix(resourceType, "video") || strings.HasPrefix(resourceType, "audio") {
- http.ServeContent(c.Response(), c.Request(), resource.Filename, time.Unix(resource.UpdatedTs, 0), bytes.NewReader(blob))
- return nil
- }
- return c.Stream(http.StatusOK, resourceType, bytes.NewReader(blob))
- })
- g.GET("/r/:resourceId/:publicId/:filename", func(c echo.Context) error {
- ctx := c.Request().Context()
- resourceID, err := strconv.Atoi(c.Param("resourceId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
- }
- resourceVisibility, err := CheckResourceVisibility(ctx, s.Store, resourceID)
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, "Failed to get resource visibility").SetInternal(err)
- }
- // Protected resource require a logined user
- userID, ok := c.Get(getUserIDContextKey()).(int)
- if resourceVisibility == store.Protected && (!ok || userID <= 0) {
- return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
- }
- publicID, err := url.QueryUnescape(c.Param("publicId"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("publicID is invalid: %s", c.Param("publicId"))).SetInternal(err)
- }
- filename, err := url.QueryUnescape(c.Param("filename"))
- if err != nil {
- return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("filename is invalid: %s", c.Param("filename"))).SetInternal(err)
- }
- resourceFind := &api.ResourceFind{
- ID: &resourceID,
- PublicID: &publicID,
- Filename: &filename,
- GetBlob: true,
- }
- resource, err := s.Store.FindResource(ctx, resourceFind)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find resource by ID: %v", resourceID)).SetInternal(err)
- }
- // Private resource require logined user is the creator
- if resourceVisibility == store.Private && (!ok || userID != resource.CreatorID) {
- return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
- }
- blob := resource.Blob
- if resource.InternalPath != "" {
- resourcePath := resource.InternalPath
- src, err := os.Open(resourcePath)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to open the local resource: %s", resourcePath)).SetInternal(err)
- }
- defer src.Close()
- blob, err = io.ReadAll(src)
- if err != nil {
- return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to read the local resource: %s", resourcePath)).SetInternal(err)
- }
- }
- if c.QueryParam("thumbnail") == "1" && common.HasPrefixes(resource.Type, "image/png", "image/jpeg") {
- ext := filepath.Ext(filename)
- thumbnailPath := path.Join(s.Profile.Data, thumbnailImagePath, fmt.Sprintf("%d-%s%s", resource.ID, resource.PublicID, ext))
- thumbnailBlob, err := getOrGenerateThumbnailImage(blob, thumbnailPath)
- if err != nil {
- log.Warn(fmt.Sprintf("failed to get or generate local thumbnail with path %s", thumbnailPath), zap.Error(err))
- } else {
- blob = thumbnailBlob
- }
- }
- c.Response().Writer.Header().Set(echo.HeaderCacheControl, "max-age=31536000, immutable")
- c.Response().Writer.Header().Set(echo.HeaderContentSecurityPolicy, "default-src 'self'")
- resourceType := strings.ToLower(resource.Type)
- if strings.HasPrefix(resourceType, "text") {
- resourceType = echo.MIMETextPlainCharsetUTF8
- } else if strings.HasPrefix(resourceType, "video") || strings.HasPrefix(resourceType, "audio") {
- http.ServeContent(c.Response(), c.Request(), resource.Filename, time.Unix(resource.UpdatedTs, 0), bytes.NewReader(blob))
- return nil
- }
- return c.Stream(http.StatusOK, resourceType, bytes.NewReader(blob))
- })
- }
- func createResourceCreateActivity(ctx context.Context, store *store.Store, resource *api.Resource) error {
- payload := api.ActivityResourceCreatePayload{
- Filename: resource.Filename,
- Type: resource.Type,
- Size: resource.Size,
- }
- payloadBytes, err := json.Marshal(payload)
- if err != nil {
- return errors.Wrap(err, "failed to marshal activity payload")
- }
- activity, err := store.CreateActivity(ctx, &api.ActivityCreate{
- CreatorID: resource.CreatorID,
- Type: api.ActivityResourceCreate,
- Level: api.ActivityInfo,
- Payload: string(payloadBytes),
- })
- if err != nil || activity == nil {
- return errors.Wrap(err, "failed to create activity")
- }
- return err
- }
- func replacePathTemplate(path, filename, publicID string) string {
- t := time.Now()
- path = fileKeyPattern.ReplaceAllStringFunc(path, func(s string) string {
- switch s {
- case "{publicid}":
- return publicID
- case "{filename}":
- return filename
- case "{timestamp}":
- return fmt.Sprintf("%d", t.Unix())
- case "{year}":
- return fmt.Sprintf("%d", t.Year())
- case "{month}":
- return fmt.Sprintf("%02d", t.Month())
- case "{day}":
- return fmt.Sprintf("%02d", t.Day())
- case "{hour}":
- return fmt.Sprintf("%02d", t.Hour())
- case "{minute}":
- return fmt.Sprintf("%02d", t.Minute())
- case "{second}":
- return fmt.Sprintf("%02d", t.Second())
- }
- return s
- })
- return path
- }
- var availableGeneratorAmount int32 = 32
- func getOrGenerateThumbnailImage(srcBlob []byte, dstPath string) ([]byte, error) {
- if _, err := os.Stat(dstPath); err != nil {
- if !errors.Is(err, os.ErrNotExist) {
- return nil, errors.Wrap(err, "failed to check thumbnail image stat")
- }
- if atomic.LoadInt32(&availableGeneratorAmount) <= 0 {
- return nil, errors.New("not enough available generator amount")
- }
- atomic.AddInt32(&availableGeneratorAmount, -1)
- defer func() {
- atomic.AddInt32(&availableGeneratorAmount, 1)
- }()
- reader := bytes.NewReader(srcBlob)
- src, err := imaging.Decode(reader)
- if err != nil {
- return nil, errors.Wrap(err, "failed to decode thumbnail image")
- }
- thumbnailImage := imaging.Resize(src, 512, 0, imaging.Lanczos)
- dstDir := path.Dir(dstPath)
- if err := os.MkdirAll(dstDir, os.ModePerm); err != nil {
- return nil, errors.Wrap(err, "failed to create thumbnail dir")
- }
- if err := imaging.Save(thumbnailImage, dstPath); err != nil {
- return nil, errors.Wrap(err, "failed to resize thumbnail image")
- }
- }
- dstFile, err := os.Open(dstPath)
- if err != nil {
- return nil, errors.Wrap(err, "failed to open the local resource")
- }
- defer dstFile.Close()
- dstBlob, err := io.ReadAll(dstFile)
- if err != nil {
- return nil, errors.Wrap(err, "failed to read the local resource")
- }
- return dstBlob, nil
- }
- func CheckResourceVisibility(ctx context.Context, s *store.Store, resourceID int) (store.Visibility, error) {
- memoResourceFind := &api.MemoResourceFind{
- ResourceID: &resourceID,
- }
- memoResources, err := s.FindMemoResourceList(ctx, memoResourceFind)
- if err != nil {
- return store.Private, err
- }
- // If resource is belongs to no memo, it'll always PRIVATE
- if len(memoResources) == 0 {
- return store.Private, nil
- }
- memoIDs := make([]int, 0, len(memoResources))
- for _, memoResource := range memoResources {
- memoIDs = append(memoIDs, memoResource.MemoID)
- }
- visibilityList, err := s.FindMemosVisibilityList(ctx, memoIDs)
- if err != nil {
- return store.Private, err
- }
- var isProtected bool
- for _, visibility := range visibilityList {
- // If any memo is PUBLIC, resource do
- if visibility == store.Public {
- return store.Public, nil
- }
- if visibility == store.Protected {
- isProtected = true
- }
- }
- // If no memo is PUBLIC, but any memo is PROTECTED, resource do
- if isProtected {
- return store.Protected, nil
- }
- // If all memo is PRIVATE, the resource do
- return store.Private, nil
- }
|