mirror of
https://github.com/EasyTier/EasyTier.git
synced 2026-04-22 16:17:23 +08:00
185 lines
5.9 KiB
Rust
185 lines
5.9 KiB
Rust
use axum::{
|
|
Json, Router,
|
|
extract::{Path, State},
|
|
http::StatusCode,
|
|
routing::post,
|
|
};
|
|
use axum_login::AuthUser as _;
|
|
use easytier::proto::rpc_types::controller::BaseController;
|
|
|
|
use crate::db::UserIdInDb;
|
|
|
|
use super::{AppState, HttpHandleError, other_error};
|
|
|
|
#[derive(Debug, serde::Deserialize)]
|
|
pub struct ProxyRpcRequest {
|
|
pub service_name: String,
|
|
pub method_name: String,
|
|
pub payload: serde_json::Value,
|
|
}
|
|
|
|
macro_rules! match_service {
|
|
($factory:ty, $method_name:expr, $payload:expr, $session:expr) => {{
|
|
let client = $session.scoped_client::<$factory>();
|
|
client
|
|
.json_call_method(BaseController::default(), &$method_name, $payload)
|
|
.await
|
|
}};
|
|
}
|
|
|
|
async fn handle_proxy_rpc_by_session(
|
|
session: &crate::client_manager::session::Session,
|
|
req: ProxyRpcRequest,
|
|
) -> Result<Json<serde_json::Value>, HttpHandleError> {
|
|
let ProxyRpcRequest {
|
|
service_name,
|
|
method_name,
|
|
payload,
|
|
} = req;
|
|
|
|
let resp = match service_name.as_str() {
|
|
"api.manage.WebClientService" => match_service!(
|
|
easytier::proto::api::manage::WebClientServiceClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.PeerManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::PeerManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.PeerCenterManageRpcService" => match_service!(
|
|
easytier::proto::peer_rpc::PeerCenterRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.ConnectorManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::ConnectorManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.MappedListenerManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::MappedListenerManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.VpnPortalRpcService" => match_service!(
|
|
easytier::proto::api::instance::VpnPortalRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.TcpProxyRpcService" => match_service!(
|
|
easytier::proto::api::instance::TcpProxyRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.AclManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::AclManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.PortForwardManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::PortForwardManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.StatsRpcService" => match_service!(
|
|
easytier::proto::api::instance::StatsRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.instance.CredentialManageRpcService" => match_service!(
|
|
easytier::proto::api::instance::CredentialManageRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.logger.LoggerRpcService" => match_service!(
|
|
easytier::proto::api::logger::LoggerRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
"api.config.ConfigRpcService" => match_service!(
|
|
easytier::proto::api::config::ConfigRpcClientFactory<BaseController>,
|
|
method_name,
|
|
payload,
|
|
session
|
|
),
|
|
_ => {
|
|
return Err((
|
|
StatusCode::BAD_REQUEST,
|
|
other_error(format!("Unknown service: {}", service_name)).into(),
|
|
));
|
|
}
|
|
};
|
|
|
|
match resp {
|
|
Ok(v) => Ok(Json(v)),
|
|
Err(e) => Err((
|
|
StatusCode::INTERNAL_SERVER_ERROR,
|
|
other_error(format!("RPC Error: {:?}", e)).into(),
|
|
)),
|
|
}
|
|
}
|
|
|
|
pub async fn handle_proxy_rpc(
|
|
auth_session: super::users::AuthSession,
|
|
State(client_mgr): AppState,
|
|
Path(machine_id): Path<uuid::Uuid>,
|
|
Json(req): Json<ProxyRpcRequest>,
|
|
) -> Result<Json<serde_json::Value>, HttpHandleError> {
|
|
let user_id = auth_session
|
|
.user
|
|
.as_ref()
|
|
.ok_or((StatusCode::UNAUTHORIZED, other_error("Unauthorized").into()))?
|
|
.id();
|
|
|
|
let session = client_mgr
|
|
.get_session_by_machine_id(user_id, &machine_id)
|
|
.ok_or((
|
|
StatusCode::NOT_FOUND,
|
|
other_error("Session not found").into(),
|
|
))?;
|
|
handle_proxy_rpc_by_session(session.as_ref(), req).await
|
|
}
|
|
|
|
pub fn router() -> Router<super::AppStateInner> {
|
|
Router::new().route(
|
|
"/api/v1/machines/:machine-id/proxy-rpc",
|
|
post(handle_proxy_rpc),
|
|
)
|
|
}
|
|
|
|
/// Internal proxy-rpc handler: no AuthSession, resolves the active session by machine_id.
|
|
pub async fn handle_proxy_rpc_internal(
|
|
State(client_mgr): AppState,
|
|
Path((user_id, machine_id)): Path<(UserIdInDb, uuid::Uuid)>,
|
|
Json(req): Json<ProxyRpcRequest>,
|
|
) -> Result<Json<serde_json::Value>, HttpHandleError> {
|
|
let session = client_mgr
|
|
.get_session_by_machine_id(user_id, &machine_id)
|
|
.ok_or((
|
|
StatusCode::NOT_FOUND,
|
|
other_error("Session not found").into(),
|
|
))?;
|
|
handle_proxy_rpc_by_session(session.as_ref(), req).await
|
|
}
|
|
|
|
pub fn router_internal() -> Router<super::AppStateInner> {
|
|
Router::new().route(
|
|
"/api/internal/users/:user-id/machines/:machine-id/proxy-rpc",
|
|
post(handle_proxy_rpc_internal),
|
|
)
|
|
}
|