This commit is contained in:
minish 2023-01-30 18:11:30 -05:00 committed by minish
parent 64a515be8b
commit 03de6f4283
14 changed files with 844 additions and 498 deletions

5
.dockerignore Normal file
View File

@ -0,0 +1,5 @@
# git repository
/.git
# binaries
/target

217
Cargo.lock generated
View File

@ -13,6 +13,23 @@ dependencies = [
"version_check", "version_check",
] ]
[[package]]
name = "aho-corasick"
version = "0.7.20"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "cc936419f96fa211c1b9166887b38e5e40b19958e5b895be7c1f93adec7071ac"
dependencies = [
"memchr",
]
[[package]]
name = "archived"
version = "0.2.0"
dependencies = [
"bytes",
"once_cell",
]
[[package]] [[package]]
name = "async-recursion" name = "async-recursion"
version = "1.0.0" version = "1.0.0"
@ -112,17 +129,16 @@ checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a"
[[package]] [[package]]
name = "breeze" name = "breeze"
version = "0.1.0" version = "0.1.1"
dependencies = [ dependencies = [
"archived",
"async-recursion", "async-recursion",
"axum", "axum",
"bytes", "bytes",
"env_logger",
"hyper", "hyper",
"log", "log",
"memory-cache-rs",
"mime_guess",
"rand", "rand",
"simplelog",
"tokio", "tokio",
"tokio-stream", "tokio-stream",
"tokio-util", "tokio-util",
@ -136,12 +152,52 @@ version = "1.3.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "dfb24e866b15a1af2a1b663f10c6b6b8f397a84aadb828f12e5b289ec23a3a3c" checksum = "dfb24e866b15a1af2a1b663f10c6b6b8f397a84aadb828f12e5b289ec23a3a3c"
[[package]]
name = "cc"
version = "1.0.79"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "50d30906286121d95be3d479533b458f87493b30a4b5f79a607db8f5d11aa91f"
[[package]] [[package]]
name = "cfg-if" name = "cfg-if"
version = "1.0.0" version = "1.0.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd"
[[package]]
name = "env_logger"
version = "0.10.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "85cdab6a89accf66733ad5a1693a4dcced6aeff64602b634530dd73c1f3ee9f0"
dependencies = [
"humantime",
"is-terminal",
"log",
"regex",
"termcolor",
]
[[package]]
name = "errno"
version = "0.2.8"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f639046355ee4f37944e44f60642c6f3a7efa3cf6b78c78a0d989a8ce6c396a1"
dependencies = [
"errno-dragonfly",
"libc",
"winapi",
]
[[package]]
name = "errno-dragonfly"
version = "0.1.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "aa68f1b12764fab894d2755d2518754e71b4fd80ecfb822714a1206c2aab39bf"
dependencies = [
"cc",
"libc",
]
[[package]] [[package]]
name = "fnv" name = "fnv"
version = "1.0.7" version = "1.0.7"
@ -269,6 +325,15 @@ dependencies = [
"libc", "libc",
] ]
[[package]]
name = "hermit-abi"
version = "0.2.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "ee512640fe35acbfb4bb779db6f0d80704c2cacfa2e39b601ef3e3f47d1ae4c7"
dependencies = [
"libc",
]
[[package]] [[package]]
name = "http" name = "http"
version = "0.2.8" version = "0.2.8"
@ -309,6 +374,12 @@ version = "1.0.2"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c4a1e36c821dbe04574f602848a19f742f4fb3c98d40449f11bcad18d6b17421" checksum = "c4a1e36c821dbe04574f602848a19f742f4fb3c98d40449f11bcad18d6b17421"
[[package]]
name = "humantime"
version = "2.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9a3a5bfb195931eeb336b2a7b4d761daec841b97f947d34394601737a7bba5e4"
[[package]] [[package]]
name = "hyper" name = "hyper"
version = "0.14.23" version = "0.14.23"
@ -343,6 +414,28 @@ dependencies = [
"hashbrown", "hashbrown",
] ]
[[package]]
name = "io-lifetimes"
version = "1.0.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "e7d6c6f8c91b4b9ed43484ad1a938e393caf35960fce7f82a040497207bd8e9e"
dependencies = [
"libc",
"windows-sys",
]
[[package]]
name = "is-terminal"
version = "0.4.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "28dfb6c8100ccc63462345b67d1bbc3679177c75ee4bf59bf29c8b1d110b8189"
dependencies = [
"hermit-abi 0.2.6",
"io-lifetimes",
"rustix",
"windows-sys",
]
[[package]] [[package]]
name = "itoa" name = "itoa"
version = "1.0.4" version = "1.0.4"
@ -355,6 +448,12 @@ version = "0.2.137"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "fc7fcc620a3bff7cdd7a365be3376c97191aeaccc2a603e600951e452615bf89" checksum = "fc7fcc620a3bff7cdd7a365be3376c97191aeaccc2a603e600951e452615bf89"
[[package]]
name = "linux-raw-sys"
version = "0.1.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f051f77a7c8e6957c0696eac88f26b0117e54f52d3fc682ab19397a8812846a4"
[[package]] [[package]]
name = "lock_api" name = "lock_api"
version = "0.4.9" version = "0.4.9"
@ -386,31 +485,12 @@ version = "2.5.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "2dffe52ecf27772e601905b7522cb4ef790d2cc203488bbd0e2fe85fcb74566d" checksum = "2dffe52ecf27772e601905b7522cb4ef790d2cc203488bbd0e2fe85fcb74566d"
[[package]]
name = "memory-cache-rs"
version = "0.2.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1a4098b4f50a8fe57ad06b9a125812c9b1e04b3f226f29642b7219e75ba33b1d"
dependencies = [
"once_cell",
]
[[package]] [[package]]
name = "mime" name = "mime"
version = "0.3.16" version = "0.3.16"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "2a60c7ce501c71e03a9c9c0d35b861413ae925bd979cc7a4e30d060069aaac8d" checksum = "2a60c7ce501c71e03a9c9c0d35b861413ae925bd979cc7a4e30d060069aaac8d"
[[package]]
name = "mime_guess"
version = "2.0.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "4192263c238a5f0d0c6bfd21f336a313a4ce1c450542449ca191bb657b4642ef"
dependencies = [
"mime",
"unicase",
]
[[package]] [[package]]
name = "mio" name = "mio"
version = "0.8.5" version = "0.8.5"
@ -429,16 +509,7 @@ version = "1.14.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "f6058e64324c71e02bc2b150e4f3bc8286db6c83092132ffa3f6b1eab0f9def5" checksum = "f6058e64324c71e02bc2b150e4f3bc8286db6c83092132ffa3f6b1eab0f9def5"
dependencies = [ dependencies = [
"hermit-abi", "hermit-abi 0.1.19",
"libc",
]
[[package]]
name = "num_threads"
version = "0.1.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "2819ce041d2ee131036f4fc9d6ae7ae125a3a40e97ba64d04fe799ad9dabbb44"
dependencies = [
"libc", "libc",
] ]
@ -572,6 +643,37 @@ dependencies = [
"bitflags", "bitflags",
] ]
[[package]]
name = "regex"
version = "1.7.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "48aaa5748ba571fb95cd2c85c09f629215d3a6ece942baa100950af03a34f733"
dependencies = [
"aho-corasick",
"memchr",
"regex-syntax",
]
[[package]]
name = "regex-syntax"
version = "0.6.28"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "456c603be3e8d448b072f410900c09faf164fbce2d480456f50eea6e25f9c848"
[[package]]
name = "rustix"
version = "0.36.7"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d4fdebc4b395b7fbb9ab11e462e20ed9051e7b16e42d24042c776eca0ac81b03"
dependencies = [
"bitflags",
"errno",
"io-lifetimes",
"libc",
"linux-raw-sys",
"windows-sys",
]
[[package]] [[package]]
name = "rustversion" name = "rustversion"
version = "1.0.9" version = "1.0.9"
@ -646,17 +748,6 @@ dependencies = [
"libc", "libc",
] ]
[[package]]
name = "simplelog"
version = "0.12.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "48dfff04aade74dd495b007c831cd6f4e0cee19c344dd9dc0884c0289b70a786"
dependencies = [
"log",
"termcolor",
"time",
]
[[package]] [[package]]
name = "slab" name = "slab"
version = "0.4.7" version = "0.4.7"
@ -708,35 +799,6 @@ dependencies = [
"winapi-util", "winapi-util",
] ]
[[package]]
name = "time"
version = "0.3.17"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "a561bf4617eebd33bca6434b988f39ed798e527f51a1e797d0ee4f61c0a38376"
dependencies = [
"itoa",
"libc",
"num_threads",
"serde",
"time-core",
"time-macros",
]
[[package]]
name = "time-core"
version = "0.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "2e153e1f1acaef8acc537e68b44906d2db6436e2b35ac2c6b42640fff91f00fd"
[[package]]
name = "time-macros"
version = "0.2.6"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d967f99f534ca7e495c575c62638eebc2898a8c84c119b89e250477bc4ba16b2"
dependencies = [
"time-core",
]
[[package]] [[package]]
name = "tokio" name = "tokio"
version = "1.22.0" version = "1.22.0"
@ -871,15 +933,6 @@ version = "0.2.3"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642" checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
[[package]]
name = "unicase"
version = "2.6.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6"
dependencies = [
"version_check",
]
[[package]] [[package]]
name = "unicode-ident" name = "unicode-ident"
version = "1.0.5" version = "1.0.5"

View File

@ -1,6 +1,6 @@
[package] [package]
name = "breeze" name = "breeze"
version = "0.1.0" version = "0.1.1"
edition = "2021" edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
@ -17,6 +17,5 @@ rand = "0.8.5"
async-recursion = "1.0.0" async-recursion = "1.0.0"
walkdir = "2" walkdir = "2"
log = "0.4" log = "0.4"
simplelog = "^0.12.0" env_logger = "0.10.0"
mime_guess = "2.0.4" archived = { path = "./archived" }
memory-cache-rs = "0.2.0"

10
Dockerfile Normal file
View File

@ -0,0 +1,10 @@
FROM rust:1.67.0 as builder
WORKDIR /usr/src/breeze
COPY . .
RUN [ "cargo", "install", "--path", "." ]
FROM debian:bullseye-slim
COPY --from=builder /usr/local/cargo/bin/breeze /usr/local/bin/breeze
ENTRYPOINT [ "breeze" ]

2
archived/.gitignore vendored Normal file
View File

@ -0,0 +1,2 @@
.idea
target

23
archived/Cargo.lock generated Normal file
View File

@ -0,0 +1,23 @@
# This file is automatically @generated by Cargo.
# It is not intended for manual editing.
version = 3
[[package]]
name = "archived"
version = "0.2.0"
dependencies = [
"bytes",
"once_cell",
]
[[package]]
name = "bytes"
version = "1.3.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "dfb24e866b15a1af2a1b663f10c6b6b8f397a84aadb828f12e5b289ec23a3a3c"
[[package]]
name = "once_cell"
version = "1.3.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "b1c601810575c99596d4afc46f78a678c80105117c379eb3650cf99b8a21ce5b"

9
archived/Cargo.toml Normal file
View File

@ -0,0 +1,9 @@
[package]
name = "archived"
version = "0.2.0"
edition = "2018"
license = "MIT"
[dependencies]
bytes = "1.3.0"
once_cell = "1.3.1"

26
archived/src/entry.rs Normal file
View File

@ -0,0 +1,26 @@
use std::time::{Duration, SystemTime};
/// Represents a set of eviction and expiration details for a specific cache entry.
pub(crate) struct CacheEntry<B> {
/// Entry value.
pub(crate) value: B,
/// Expiration time.
///
/// - [`None`] if the value must be kept forever.
pub(crate) expiration_time: SystemTime,
}
impl<B> CacheEntry<B> {
pub(crate) fn new(value: B, lifetime: Duration) -> Self {
Self {
expiration_time: SystemTime::now() + lifetime,
value,
}
}
/// Check if a entry is expired.
pub(crate) fn is_expired(&self, current_time: SystemTime) -> bool {
current_time >= self.expiration_time
}
}

173
archived/src/lib.rs Normal file
View File

@ -0,0 +1,173 @@
mod entry;
use bytes::Bytes;
use crate::entry::*;
use std::collections::hash_map::Entry;
use std::collections::HashMap;
use std::time::{Duration, SystemTime};
pub struct Archive {
cache_table: HashMap<String, CacheEntry<Bytes>>,
full_scan_frequency: Option<Duration>,
created_time: SystemTime,
last_scan_time: Option<SystemTime>,
entry_lifetime: Duration,
capacity: usize,
length: usize,
}
impl Archive {
/* pub fn new(capacity: usize) -> Self {
Self {
cache_table: HashMap::new(),
full_scan_frequency: None,
created_time: SystemTime::now(),
last_scan_time: None,
capacity,
length: 0,
}
} */
pub fn with_full_scan(full_scan_frequency: Duration, entry_lifetime: Duration, capacity: usize) -> Self {
Self {
cache_table: HashMap::with_capacity(256),
full_scan_frequency: Some(full_scan_frequency),
created_time: SystemTime::now(),
last_scan_time: None,
entry_lifetime,
capacity,
length: 0,
}
}
pub fn contains_key(&self, key: &String) -> bool {
let now = SystemTime::now();
self.cache_table
.get(key)
.filter(|cache_entry| !cache_entry.is_expired(now))
.is_some()
}
pub fn get_last_scan_time(&self) -> Option<SystemTime> {
self.last_scan_time
}
pub fn get_full_scan_frequency(&self) -> Option<Duration> {
self.full_scan_frequency
}
pub fn get(&self, key: &String) -> Option<&Bytes> {
let now = SystemTime::now();
self.cache_table
.get(key)
.filter(|cache_entry| !cache_entry.is_expired(now))
.map(|cache_entry| &cache_entry.value)
}
pub fn get_or_insert<F>(
&mut self,
key: String,
factory: F,
) -> &Bytes
where
F: Fn() -> Bytes,
{
let now = SystemTime::now();
self.try_full_scan_expired_items(now);
match self.cache_table.entry(key) {
Entry::Occupied(mut occupied) => {
if occupied.get().is_expired(now) {
occupied.insert(CacheEntry::new(factory(), self.entry_lifetime));
}
&occupied.into_mut().value
}
Entry::Vacant(vacant) => &vacant.insert(CacheEntry::new(factory(), self.entry_lifetime)).value,
}
}
pub fn insert(
&mut self,
key: String,
value: Bytes,
) -> Option<Bytes> {
let now = SystemTime::now();
self.try_full_scan_expired_items(now);
if value.len() + self.length > self.capacity {
return None;
}
self.length += value.len();
self.cache_table
.insert(key, CacheEntry::new(value, self.entry_lifetime))
.filter(|cache_entry| !cache_entry.is_expired(now))
.map(|cache_entry| cache_entry.value)
}
pub fn remove(&mut self, key: &String) -> Option<Bytes> {
let now = SystemTime::now();
self.try_full_scan_expired_items(now);
let mut removed_len: usize = 0;
let result = self
.cache_table
.remove(key)
.filter(|cache_entry| !cache_entry.is_expired(now))
.and_then(|o| {
removed_len += o.value.len();
return Some(o);
})
.map(|cache_entry| cache_entry.value);
self.length -= removed_len;
return result;
}
pub fn renew(&mut self, key: &String) -> Option<()> {
let now = SystemTime::now();
self.try_full_scan_expired_items(now);
let entry = self.cache_table.get_mut(key);
if entry.is_some() {
let mut entry = entry.unwrap();
entry.expiration_time = now + self.entry_lifetime;
return Some(());
} else {
return None;
}
}
fn try_full_scan_expired_items(&mut self, current_time: SystemTime) {
if let Some(full_scan_frequency) = self.full_scan_frequency {
let since = current_time
.duration_since(self.last_scan_time.unwrap_or(self.created_time))
.unwrap();
if since >= full_scan_frequency {
let mut removed_len = 0;
self.cache_table.retain(|_, cache_entry| {
if cache_entry.is_expired(current_time) {
removed_len += cache_entry.value.len();
return false;
}
return true;
});
self.length -= removed_len;
self.last_scan_time = Some(current_time);
}
}
}
}

View File

@ -5,17 +5,17 @@ use std::{
time::Duration, time::Duration,
}; };
use archived::Archive;
use axum::extract::BodyStream; use axum::extract::BodyStream;
use bytes::{BufMut, Bytes, BytesMut}; use bytes::{BufMut, Bytes, BytesMut};
use hyper::StatusCode; use hyper::StatusCode;
use memory_cache::MemoryCache;
use rand::Rng; use rand::Rng;
use tokio::{ use tokio::{
fs::File, fs::File,
io::{AsyncReadExt, AsyncWriteExt}, io::{AsyncReadExt, AsyncWriteExt},
sync::{ sync::{
mpsc::{self, Receiver, Sender}, mpsc::{self, Receiver, Sender},
Mutex, RwLock,
}, },
}; };
use tokio_stream::StreamExt; use tokio_stream::StreamExt;
@ -25,15 +25,14 @@ use crate::view::ViewResponse;
pub struct Engine { pub struct Engine {
// state // state
cache: Mutex<MemoryCache<String, Bytes>>, // in-memory cache. note/ i plan to lock the cache specifically only when needed rather than locking the whole struct cache: RwLock<Archive>, // in-memory cache. note/ i plan to lock the cache specifically only when needed rather than locking the whole struct
pub upl_count: AtomicUsize, // cached count of uploaded files pub upl_count: AtomicUsize, // cached count of uploaded files
// config // config
pub base_url: String, // base url for formatting upload urls pub base_url: String, // base url for formatting upload urls
save_path: PathBuf, // where uploads are saved to disk save_path: PathBuf, // where uploads are saved to disk
cache_max_length: usize, // if an upload is bigger than this size, it won't be cached cache_max_length: usize, // if an upload is bigger than this size, it won't be cached
cache_keep_alive: Duration, // amount of time a file should last in cache
} }
impl Engine { impl Engine {
@ -42,18 +41,22 @@ impl Engine {
base_url: String, base_url: String,
save_path: PathBuf, save_path: PathBuf,
cache_max_length: usize, cache_max_length: usize,
cache_keep_alive: Duration, cache_lifetime: Duration,
cache_full_scan_freq: Duration, // how often the cache will be scanned for expired items cache_full_scan_freq: Duration, // how often the cache will be scanned for expired items
cache_mem_capacity: usize,
) -> Self { ) -> Self {
Self { Self {
cache: Mutex::new(MemoryCache::with_full_scan(cache_full_scan_freq)), cache: RwLock::new(Archive::with_full_scan(
cache_full_scan_freq,
cache_lifetime,
cache_mem_capacity,
)),
upl_count: AtomicUsize::new(WalkDir::new(&save_path).into_iter().count()), // count the amount of files in the save path and initialise our cached count with it upl_count: AtomicUsize::new(WalkDir::new(&save_path).into_iter().count()), // count the amount of files in the save path and initialise our cached count with it
base_url, base_url,
save_path, save_path,
cache_max_length, cache_max_length,
cache_keep_alive,
} }
} }
@ -63,9 +66,9 @@ impl Engine {
// checks in cache or disk for an upload using a pathbuf // checks in cache or disk for an upload using a pathbuf
pub async fn upload_exists(&self, path: &PathBuf) -> bool { pub async fn upload_exists(&self, path: &PathBuf) -> bool {
let cache = self.cache.lock().await; let cache = self.cache.read().await;
// Check if upload is in cache // check if upload is in cache
let name = path let name = path
.file_name() .file_name()
.and_then(OsStr::to_str) .and_then(OsStr::to_str)
@ -76,7 +79,7 @@ impl Engine {
return true; return true;
} }
// Check if upload is on disk // check if upload is on disk
if path.exists() { if path.exists() {
return true; return true;
} }
@ -101,6 +104,7 @@ impl Engine {
.unwrap_or_default() .unwrap_or_default()
.to_string(); .to_string();
// path on disk
let mut path = self.save_path.clone(); let mut path = self.save_path.clone();
path.push(&id); path.push(&id);
path.set_extension(original_extension); path.set_extension(original_extension);
@ -124,11 +128,6 @@ impl Engine {
// if the upload size is smaller than the specified maximum, we use the cache! // if the upload size is smaller than the specified maximum, we use the cache!
let mut use_cache = self.will_use_cache(content_length); let mut use_cache = self.will_use_cache(content_length);
// create file to save upload to
let mut file = File::create(path)
.await
.expect("could not open file! make sure your upload path exists");
// if we're using cache, make some space to store the upload in // if we're using cache, make some space to store the upload in
let mut data = if use_cache { let mut data = if use_cache {
BytesMut::with_capacity(content_length) BytesMut::with_capacity(content_length)
@ -140,6 +139,11 @@ impl Engine {
let (tx, mut rx): (Sender<Bytes>, Receiver<Bytes>) = mpsc::channel(1); let (tx, mut rx): (Sender<Bytes>, Receiver<Bytes>) = mpsc::channel(1);
tokio::spawn(async move { tokio::spawn(async move {
// create file to save upload to
let mut file = File::create(path)
.await
.expect("could not open file! make sure your upload path exists");
// receive chunks and save them to file // receive chunks and save them to file
while let Some(chunk) = rx.recv().await { while let Some(chunk) = rx.recv().await {
debug!(target: "process_upload", "writing chunk to disk (length: {})", chunk.len()); debug!(target: "process_upload", "writing chunk to disk (length: {})", chunk.len());
@ -175,84 +179,104 @@ impl Engine {
// insert upload into cache if necessary // insert upload into cache if necessary
if use_cache { if use_cache {
let mut cache = self.cache.lock().await; let mut cache = self.cache.write().await;
info!(target: "process_upload", "caching upload!"); info!(target: "process_upload", "caching upload!");
cache.insert(name, data.freeze(), Some(self.cache_keep_alive)); cache.insert(name, data.freeze());
} }
// if all goes well, increment the cached upload counter // if all goes well, increment the cached upload counter
self.upl_count.fetch_add(1, Ordering::Relaxed); self.upl_count.fetch_add(1, Ordering::Relaxed);
} }
// read an upload from cache, if it exists
// previously, this would lock the cache as writable to renew the upload's cache lifespan
// locking the cache as readable allows multiple concurrent readers, which allows me to handle multiple views concurrently
async fn read_cached_upload(&self, name: &String) -> Option<Bytes> { async fn read_cached_upload(&self, name: &String) -> Option<Bytes> {
let mut cache = self.cache.lock().await; let cache = self.cache.read().await;
if !cache.contains_key(&name) { if !cache.contains_key(&name) {
return None; return None;
} }
// fetch upload data from cache
let data = cache let data = cache
.get(&name) .get(&name)
.expect("failed to read get upload data from cache") .expect("failed to read get upload data from cache")
.to_owned(); .to_owned();
cache.insert(name.to_string(), data.clone(), Some(self.cache_keep_alive));
Some(data) Some(data)
} }
pub async fn get_upload(&self, original_path: &PathBuf) -> Result<ViewResponse, StatusCode> { pub async fn get_upload(&self, original_path: &PathBuf) -> Result<ViewResponse, StatusCode> {
// extract upload file name
let name = original_path let name = original_path
.file_name() .file_name()
.and_then(OsStr::to_str) .and_then(OsStr::to_str)
.unwrap_or_default() .unwrap_or_default()
.to_string(); .to_string();
// path on disk
let mut path = self.save_path.clone(); let mut path = self.save_path.clone();
path.push(&name); path.push(&name);
// check if the upload exists // check if the upload exists, if not then 404
if !self.upload_exists(&path).await { if !self.upload_exists(&path).await {
return Err(StatusCode::NOT_FOUND); return Err(StatusCode::NOT_FOUND);
} }
// attempt to read upload from cache
let cached_data = self.read_cached_upload(&name).await; let cached_data = self.read_cached_upload(&name).await;
match cached_data { if let Some(data) = cached_data {
Some(data) => { info!(target: "get_upload", "got upload from cache!!");
info!(target: "get_upload", "got upload from cache!!");
return Ok(ViewResponse::FromCache(path, data)); return Ok(ViewResponse::FromCache(data));
} } else {
None => { let mut file = File::open(&path).await.unwrap();
let mut file = File::open(&path).await.unwrap();
let length = file // read upload length from disk
.metadata() let length = file
.await .metadata()
.expect("failed to read upload file metadata") .await
.len() as usize; .expect("failed to read upload file metadata")
.len() as usize;
debug!(target: "get_upload", "read upload from disk, size = {}", length); debug!(target: "get_upload", "read upload from disk, size = {}", length);
if self.will_use_cache(length) { // if the upload is okay to cache, recache it and send a fromcache response
let mut data = BytesMut::with_capacity(length); if self.will_use_cache(length) {
while file.read_buf(&mut data).await.unwrap() != 0 {} // read file from disk
let data = data.freeze(); let mut data = BytesMut::with_capacity(length);
let mut cache = self.cache.lock().await; // read file from disk and if it fails at any point, return 500
cache.insert(name, data.clone(), Some(self.cache_keep_alive)); loop {
match file.read_buf(&mut data).await {
info!(target: "get_upload", "recached upload from disk!"); Ok(n) => {
if n == 0 {
return Ok(ViewResponse::FromCache(path, data)); break;
}
}
Err(_) => {
return Err(StatusCode::INTERNAL_SERVER_ERROR);
},
}
} }
info!(target: "get_upload", "got upload from disk!"); let data = data.freeze();
return Ok(ViewResponse::FromDisk(file)); // re-insert it into cache
let mut cache = self.cache.write().await;
cache.insert(name, data.clone());
info!(target: "get_upload", "recached upload from disk!");
return Ok(ViewResponse::FromCache(data));
} }
info!(target: "get_upload", "got upload from disk!");
return Ok(ViewResponse::FromDisk(file));
} }
} }
} }

View File

@ -2,7 +2,7 @@ use std::sync::{atomic::Ordering, Arc};
use axum::extract::State; use axum::extract::State;
// show index status page // show index status page with amount of uploaded files
pub async fn index(State(engine): State<Arc<crate::engine::Engine>>) -> String { pub async fn index(State(engine): State<Arc<crate::engine::Engine>>) -> String {
let count = engine.upl_count.load(Ordering::Relaxed); let count = engine.upl_count.load(Ordering::Relaxed);

View File

@ -1,19 +1,17 @@
use std::{sync::Arc, path::PathBuf, time::Duration, process::exit}; use std::{env, path::PathBuf, sync::Arc, time::Duration};
extern crate axum; extern crate axum;
#[macro_use] #[macro_use]
extern crate log; extern crate log;
extern crate simplelog;
use engine::Engine; use engine::Engine;
use axum::{ use axum::{
routing::{get, post}, routing::{get, post},
Router, Router,
}; };
use simplelog::*; use tokio::signal;
mod engine; mod engine;
mod index; mod index;
@ -22,39 +20,75 @@ mod view;
#[tokio::main] #[tokio::main]
async fn main() { async fn main() {
// Initialise logger // initialise logger
TermLogger::init( env_logger::init();
LevelFilter::Warn,
Config::default(),
TerminalMode::Mixed,
ColorChoice::Auto,
)
.unwrap();
// Create engine // read env vars
let engine = Engine::new( // TODO: Read config from env vars let base_url = env::var("BRZ_BASE_URL").expect("missing BRZ_BASE_URL! base url for upload urls (ex: http://127.0.0.1:8000 for http://127.0.0.1:8000/p/abcdef.png, http://picture.wtf for http://picture.wtf/p/abcdef.png)");
"http://127.0.0.1:8000".to_string(), let save_path = env::var("BRZ_SAVE_PATH").expect("missing BRZ_SAVE_PATH! this should be a path where uploads are saved to disk (ex: /srv/uploads, C:\\brzuploads)");
PathBuf::from("./uploads/"), let cache_max_length = env::var("BRZ_CACHE_UPL_MAX_LENGTH").expect("missing BRZ_CACHE_UPL_MAX_LENGTH! this is the max length an upload can be in bytes before it won't be cached (ex: 80000000 for 80MB)");
80_000_000, // Main instance is going to use this let cache_upl_lifetime = env::var("BRZ_CACHE_UPL_LIFETIME").expect("missing BRZ_CACHE_UPL_LIFETIME! this indicates how long an upload will stay in cache (ex: 1800 for 30 minutes, 60 for 1 minute)");
Duration::from_secs(8), // CHANGE THIS!!!!!!! let cache_scan_freq = env::var("BRZ_CACHE_SCAN_FREQ").expect("missing BRZ_CACHE_SCAN_FREQ! this is the frequency of full cache scans, which scan for and remove expired uploads (ex: 60 for 1 minute)");
Duration::from_secs(1), // THIS TOO!!!!!!!!!!!!!!! let cache_mem_capacity = env::var("BRZ_CACHE_MEM_CAPACITY").expect("missing BRZ_CACHE_MEM_CAPACITY! this is the amount of memory the cache will hold before dropping entries");
// parse env vars
let save_path = PathBuf::from(save_path);
let cache_max_length = usize::from_str_radix(&cache_max_length, 10).expect("failed parsing BRZ_CACHE_UPL_MAX_LENGTH! it should be a positive number without any separators");
let cache_upl_lifetime = Duration::from_secs(u64::from_str_radix(&cache_upl_lifetime, 10).expect("failed parsing BRZ_CACHE_UPL_LIFETIME! it should be a positive number without any separators"));
let cache_scan_freq = Duration::from_secs(u64::from_str_radix(&cache_scan_freq, 10).expect("failed parsing BRZ_CACHE_SCAN_FREQ! it should be a positive number without any separators"));
let cache_mem_capacity = usize::from_str_radix(&cache_mem_capacity, 10).expect("failed parsing BRZ_CACHE_MEM_CAPACITY! it should be a positive number without any separators");
if !save_path.exists() || !save_path.is_dir() {
panic!("the save path does not exist or is not a directory. this is invalid");
}
// create engine
let engine = Engine::new(
base_url,
save_path,
cache_max_length,
cache_upl_lifetime,
cache_scan_freq,
cache_mem_capacity,
); );
// Build main router // build main router
let app = Router::new() let app = Router::new()
.route("/new", post(new::new)) .route("/new", post(new::new))
.route("/p/:name", get(view::view)) .route("/p/:name", get(view::view))
.route("/", get(index::index)) .route("/", get(index::index))
.route("/exit", get(exit_abc))
.with_state(Arc::new(engine)); .with_state(Arc::new(engine));
// Start web server // start web server
axum::Server::bind(&"127.0.0.1:8000".parse().unwrap()) // don't forget to change this! it's local for now axum::Server::bind(&"0.0.0.0:8000".parse().unwrap())
.serve(app.into_make_service()) .serve(app.into_make_service())
.with_graceful_shutdown(shutdown_signal())
.await .await
.unwrap(); .unwrap();
} }
async fn exit_abc() { async fn shutdown_signal() {
exit(123); let ctrl_c = async {
signal::ctrl_c()
.await
.expect("failed to add ctrl-c handler");
};
#[cfg(unix)]
let terminate = async {
signal::unix::signal(signal::unix::SignalKind::terminate())
.expect("failed to add SIGTERM handler")
.recv()
.await;
};
#[cfg(not(unix))]
let terminate = std::future::pending::<()>();
tokio::select! {
_ = ctrl_c => {},
_ = terminate => {},
}
info!("shutting down!");
} }

View File

@ -6,48 +6,36 @@ use std::{
use axum::{ use axum::{
body::StreamBody, body::StreamBody,
extract::{Path, State}, extract::{Path, State},
http::HeaderValue,
response::{IntoResponse, Response}, response::{IntoResponse, Response},
}; };
use bytes::Bytes; use bytes::Bytes;
use hyper::StatusCode; use hyper::StatusCode;
use mime_guess::mime;
use tokio::fs::File; use tokio::fs::File;
use tokio_util::io::ReaderStream; use tokio_util::io::ReaderStream;
pub enum ViewResponse { pub enum ViewResponse {
FromDisk(File), FromDisk(File),
FromCache(PathBuf, Bytes), FromCache(Bytes),
} }
impl IntoResponse for ViewResponse { impl IntoResponse for ViewResponse {
fn into_response(self) -> Response { fn into_response(self) -> Response {
match self { match self {
ViewResponse::FromDisk(file) => { ViewResponse::FromDisk(file) => {
// create a streamed body response (we want to stream larger files)
let reader = ReaderStream::new(file); let reader = ReaderStream::new(file);
let stream = StreamBody::new(reader); let stream = StreamBody::new(reader);
stream.into_response() stream.into_response()
} }
ViewResponse::FromCache(original_path, data) => { ViewResponse::FromCache(data) => {
// guess the content-type using the original path
// (axum handles this w/ streamed file responses but caches are octet-stream by default)
let content_type = mime_guess::from_path(original_path)
.first()
.unwrap_or(mime::APPLICATION_OCTET_STREAM)
.to_string();
// extract mutable headers from the response // extract mutable headers from the response
let mut res = data.into_response(); let mut res = data.into_response();
let headers = res.headers_mut(); let headers = res.headers_mut();
// clear the headers and add our content-type // clear the headers, let the browser imply it
headers.clear(); headers.clear();
headers.insert(
"content-type",
HeaderValue::from_str(content_type.as_str()).unwrap(),
);
res res
} }
@ -66,7 +54,7 @@ pub async fn view(
.into_iter() .into_iter()
.any(|x| !matches!(x, Component::Normal(_))) .any(|x| !matches!(x, Component::Normal(_)))
{ {
error!(target: "view", "a request attempted path traversal"); warn!(target: "view", "a request attempted path traversal");
return Err(StatusCode::NOT_FOUND); return Err(StatusCode::NOT_FOUND);
} }