2021-07-27 22:01:06 +08:00
|
|
|
#![allow(rustdoc::private_intra_doc_links)]
|
2021-06-15 23:55:27 +08:00
|
|
|
#[macro_use]
|
2020-12-12 20:32:06 +08:00
|
|
|
pub mod error;
|
2021-06-24 20:22:12 +08:00
|
|
|
#[macro_use]
|
2021-06-23 20:56:02 +08:00
|
|
|
pub mod extractors;
|
2021-09-08 18:34:56 +08:00
|
|
|
#[cfg(all(not(debug_assertions), feature = "analytics"))]
|
|
|
|
pub mod analytics;
|
2020-12-12 20:32:06 +08:00
|
|
|
pub mod helpers;
|
2021-03-16 01:11:10 +08:00
|
|
|
pub mod option;
|
|
|
|
pub mod routes;
|
2021-09-29 00:10:09 +08:00
|
|
|
use std::path::Path;
|
|
|
|
use std::time::Duration;
|
|
|
|
|
2021-09-08 18:34:56 +08:00
|
|
|
use crate::extractors::authentication::AuthConfig;
|
2021-03-16 01:11:10 +08:00
|
|
|
pub use option::Opt;
|
2021-03-10 18:56:51 +08:00
|
|
|
|
2021-06-23 20:56:02 +08:00
|
|
|
use actix_web::web;
|
|
|
|
|
2021-06-24 20:22:12 +08:00
|
|
|
use extractors::authentication::policies::*;
|
2021-06-24 22:25:52 +08:00
|
|
|
use extractors::payload::PayloadConfig;
|
2021-09-21 19:23:22 +08:00
|
|
|
use meilisearch_lib::MeiliSearch;
|
2021-09-20 21:31:03 +08:00
|
|
|
use sha2::Digest;
|
2021-06-23 19:21:48 +08:00
|
|
|
|
2021-09-20 21:31:03 +08:00
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct ApiKeys {
|
|
|
|
pub public: Option<String>,
|
|
|
|
pub private: Option<String>,
|
|
|
|
pub master: Option<String>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ApiKeys {
|
|
|
|
pub fn generate_missing_api_keys(&mut self) {
|
|
|
|
if let Some(master_key) = &self.master {
|
|
|
|
if self.private.is_none() {
|
|
|
|
let key = format!("{}-private", master_key);
|
|
|
|
let sha = sha2::Sha256::digest(key.as_bytes());
|
|
|
|
self.private = Some(format!("{:x}", sha));
|
|
|
|
}
|
|
|
|
if self.public.is_none() {
|
|
|
|
let key = format!("{}-public", master_key);
|
|
|
|
let sha = sha2::Sha256::digest(key.as_bytes());
|
|
|
|
self.public = Some(format!("{:x}", sha));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-29 00:10:09 +08:00
|
|
|
pub fn setup_meilisearch(opt: &Opt) -> anyhow::Result<MeiliSearch> {
|
|
|
|
let mut meilisearch = MeiliSearch::builder();
|
|
|
|
meilisearch
|
|
|
|
.set_max_index_size(opt.max_index_size.get_bytes() as usize)
|
|
|
|
.set_max_update_store_size(opt.max_udb_size.get_bytes() as usize)
|
|
|
|
.set_ignore_missing_snapshot(opt.ignore_missing_snapshot)
|
|
|
|
.set_ignore_snapshot_if_db_exists(opt.ignore_snapshot_if_db_exists)
|
|
|
|
.set_dump_dst(opt.dumps_dir.clone())
|
|
|
|
.set_snapshot_interval(Duration::from_secs(opt.snapshot_interval_sec))
|
|
|
|
.set_snapshot_dir(opt.snapshot_dir.clone());
|
|
|
|
|
|
|
|
if let Some(ref path) = opt.import_snapshot {
|
|
|
|
meilisearch.set_import_snapshot(path.clone());
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(ref path) = opt.import_dump {
|
|
|
|
meilisearch.set_dump_src(path.clone());
|
|
|
|
}
|
|
|
|
|
|
|
|
if opt.schedule_snapshot {
|
|
|
|
meilisearch.set_schedule_snapshot();
|
|
|
|
}
|
|
|
|
|
|
|
|
meilisearch.build(opt.db_path.clone(), opt.indexer_options.clone())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Cleans and setup the temporary file folder in the database directory. This must be done after
|
|
|
|
/// the meilisearch instance has been created, to not interfere with the snapshot and dump loading.
|
|
|
|
pub fn setup_temp_dir(db_path: impl AsRef<Path>) -> anyhow::Result<()> {
|
|
|
|
// Set the tempfile directory in the current db path, to avoid cross device references. Also
|
|
|
|
// remove the previous outstanding files found there
|
|
|
|
//
|
|
|
|
// TODO: if two processes open the same db, one might delete the other tmpdir. Need to make
|
|
|
|
// sure that no one is using it before deleting it.
|
|
|
|
let temp_path = db_path.as_ref().join("tmp");
|
|
|
|
// Ignore error if tempdir doesn't exist
|
|
|
|
let _ = std::fs::remove_dir_all(&temp_path);
|
|
|
|
std::fs::create_dir_all(&temp_path)?;
|
|
|
|
if cfg!(windows) {
|
|
|
|
std::env::set_var("TMP", temp_path);
|
|
|
|
} else {
|
|
|
|
std::env::set_var("TMPDIR", temp_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-09-29 04:22:59 +08:00
|
|
|
pub fn configure_data(config: &mut web::ServiceConfig, data: MeiliSearch, opt: &Opt) {
|
2021-09-20 21:31:03 +08:00
|
|
|
let http_payload_size_limit = opt.http_payload_size_limit.get_bytes() as usize;
|
2021-06-23 19:21:48 +08:00
|
|
|
config
|
2021-06-24 20:22:12 +08:00
|
|
|
.app_data(data)
|
2021-06-23 19:21:48 +08:00
|
|
|
.app_data(
|
|
|
|
web::JsonConfig::default()
|
2021-06-23 21:02:00 +08:00
|
|
|
.limit(http_payload_size_limit)
|
2021-06-23 19:21:48 +08:00
|
|
|
.content_type(|_mime| true) // Accept all mime types
|
|
|
|
.error_handler(|err, _req| error::payload_error_handler(err).into()),
|
|
|
|
)
|
2021-06-23 19:58:22 +08:00
|
|
|
.app_data(PayloadConfig::new(http_payload_size_limit))
|
2021-06-23 19:21:48 +08:00
|
|
|
.app_data(
|
|
|
|
web::QueryConfig::default()
|
|
|
|
.error_handler(|err, _req| error::payload_error_handler(err).into()),
|
|
|
|
);
|
|
|
|
}
|
2021-03-10 18:56:51 +08:00
|
|
|
|
2021-09-20 21:31:03 +08:00
|
|
|
pub fn configure_auth(config: &mut web::ServiceConfig, opts: &Opt) {
|
|
|
|
let mut keys = ApiKeys {
|
|
|
|
master: opts.master_key.clone(),
|
|
|
|
private: None,
|
|
|
|
public: None,
|
2021-09-29 04:22:59 +08:00
|
|
|
};
|
2021-09-20 21:31:03 +08:00
|
|
|
|
2021-09-29 04:22:59 +08:00
|
|
|
keys.generate_missing_api_keys();
|
2021-09-20 21:31:03 +08:00
|
|
|
|
2021-06-24 22:25:52 +08:00
|
|
|
let auth_config = if let Some(ref master_key) = keys.master {
|
2021-06-24 20:22:12 +08:00
|
|
|
let private_key = keys.private.as_ref().unwrap();
|
|
|
|
let public_key = keys.public.as_ref().unwrap();
|
|
|
|
let mut policies = init_policies!(Public, Private, Admin);
|
|
|
|
create_users!(
|
|
|
|
policies,
|
|
|
|
master_key.as_bytes() => { Admin, Private, Public },
|
|
|
|
private_key.as_bytes() => { Private, Public },
|
|
|
|
public_key.as_bytes() => { Public }
|
|
|
|
);
|
|
|
|
AuthConfig::Auth(policies)
|
|
|
|
} else {
|
|
|
|
AuthConfig::NoAuth
|
|
|
|
};
|
|
|
|
|
2021-09-29 04:22:59 +08:00
|
|
|
config.app_data(auth_config).app_data(keys);
|
2021-06-24 01:35:26 +08:00
|
|
|
}
|
|
|
|
|
2021-06-23 19:21:48 +08:00
|
|
|
#[cfg(feature = "mini-dashboard")]
|
|
|
|
pub fn dashboard(config: &mut web::ServiceConfig, enable_frontend: bool) {
|
2021-06-23 19:55:16 +08:00
|
|
|
use actix_web::HttpResponse;
|
2021-06-24 22:25:52 +08:00
|
|
|
use actix_web_static_files::Resource;
|
2021-04-21 19:49:21 +08:00
|
|
|
|
2021-06-23 20:48:33 +08:00
|
|
|
mod generated {
|
2021-06-23 19:21:48 +08:00
|
|
|
include!(concat!(env!("OUT_DIR"), "/generated.rs"));
|
|
|
|
}
|
2021-04-21 19:49:21 +08:00
|
|
|
|
2021-06-23 19:21:48 +08:00
|
|
|
if enable_frontend {
|
2021-06-23 20:48:33 +08:00
|
|
|
let generated = generated::generate();
|
2021-06-24 22:25:52 +08:00
|
|
|
let mut scope = web::scope("/");
|
|
|
|
// Generate routes for mini-dashboard assets
|
|
|
|
for (path, resource) in generated.into_iter() {
|
|
|
|
let Resource {
|
|
|
|
mime_type, data, ..
|
|
|
|
} = resource;
|
|
|
|
// Redirect index.html to /
|
|
|
|
if path == "index.html" {
|
|
|
|
config.service(web::resource("/").route(
|
|
|
|
web::get().to(move || HttpResponse::Ok().content_type(mime_type).body(data)),
|
|
|
|
));
|
|
|
|
} else {
|
|
|
|
scope = scope.service(web::resource(path).route(
|
|
|
|
web::get().to(move || HttpResponse::Ok().content_type(mime_type).body(data)),
|
|
|
|
));
|
2021-06-23 19:21:48 +08:00
|
|
|
}
|
2021-06-24 22:25:52 +08:00
|
|
|
}
|
|
|
|
config.service(scope);
|
2021-06-23 19:21:48 +08:00
|
|
|
} else {
|
2021-06-25 01:02:28 +08:00
|
|
|
config.service(web::resource("/").route(web::get().to(routes::running)));
|
2021-06-23 19:21:48 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(not(feature = "mini-dashboard"))]
|
|
|
|
pub fn dashboard(config: &mut web::ServiceConfig, _enable_frontend: bool) {
|
2021-06-25 01:02:28 +08:00
|
|
|
config.service(web::resource("/").route(web::get().to(routes::running)));
|
2021-06-23 19:21:48 +08:00
|
|
|
}
|
2021-04-21 19:49:21 +08:00
|
|
|
|
2021-06-23 19:21:48 +08:00
|
|
|
#[macro_export]
|
|
|
|
macro_rules! create_app {
|
2021-09-20 21:31:03 +08:00
|
|
|
($data:expr, $enable_frontend:expr, $opt:expr) => {{
|
2021-06-23 19:21:48 +08:00
|
|
|
use actix_cors::Cors;
|
|
|
|
use actix_web::middleware::TrailingSlash;
|
|
|
|
use actix_web::App;
|
|
|
|
use actix_web::{middleware, web};
|
2021-07-05 20:29:20 +08:00
|
|
|
use meilisearch_http::routes;
|
2021-06-24 22:25:52 +08:00
|
|
|
use meilisearch_http::{configure_auth, configure_data, dashboard};
|
2021-04-21 19:49:21 +08:00
|
|
|
|
2021-06-23 19:21:48 +08:00
|
|
|
App::new()
|
2021-09-20 21:31:03 +08:00
|
|
|
.configure(|s| configure_data(s, $data.clone(), &$opt))
|
|
|
|
.configure(|s| configure_auth(s, &$opt))
|
2021-07-05 20:29:20 +08:00
|
|
|
.configure(routes::configure)
|
2021-06-23 19:21:48 +08:00
|
|
|
.configure(|s| dashboard(s, $enable_frontend))
|
|
|
|
.wrap(
|
2021-06-23 03:48:51 +08:00
|
|
|
Cors::default()
|
2021-06-23 20:48:33 +08:00
|
|
|
.send_wildcard()
|
|
|
|
.allowed_headers(vec!["content-type", "x-meili-api-key"])
|
|
|
|
.allow_any_origin()
|
|
|
|
.allow_any_method()
|
|
|
|
.max_age(86_400), // 24h
|
2021-06-23 03:48:51 +08:00
|
|
|
)
|
2021-06-23 19:21:48 +08:00
|
|
|
.wrap(middleware::Logger::default())
|
|
|
|
.wrap(middleware::Compress::default())
|
2021-06-23 20:48:33 +08:00
|
|
|
.wrap(middleware::NormalizePath::new(
|
|
|
|
middleware::TrailingSlash::Trim,
|
|
|
|
))
|
2021-06-23 19:21:48 +08:00
|
|
|
}};
|
2021-03-10 18:56:51 +08:00
|
|
|
}
|