2020-10-31 06:16:21 +13:00
|
|
|
package room
|
|
|
|
|
|
|
|
import (
|
2021-09-17 10:58:50 +12:00
|
|
|
"context"
|
2021-01-09 11:42:53 +13:00
|
|
|
"net/http"
|
|
|
|
|
2022-03-27 11:20:38 +13:00
|
|
|
"github.com/rs/zerolog/log"
|
|
|
|
|
2022-03-20 23:43:00 +13:00
|
|
|
"gitlab.com/demodesk/neko/server/pkg/auth"
|
|
|
|
"gitlab.com/demodesk/neko/server/pkg/types"
|
|
|
|
"gitlab.com/demodesk/neko/server/pkg/utils"
|
2020-10-31 06:16:21 +13:00
|
|
|
)
|
|
|
|
|
|
|
|
type RoomHandler struct {
|
2020-12-09 02:31:15 +13:00
|
|
|
sessions types.SessionManager
|
|
|
|
desktop types.DesktopManager
|
|
|
|
capture types.CaptureManager
|
2022-03-27 11:20:38 +13:00
|
|
|
|
|
|
|
privateModeImage []byte
|
2020-10-31 06:16:21 +13:00
|
|
|
}
|
|
|
|
|
|
|
|
func New(
|
|
|
|
sessions types.SessionManager,
|
2020-11-02 04:54:06 +13:00
|
|
|
desktop types.DesktopManager,
|
|
|
|
capture types.CaptureManager,
|
2020-10-31 06:16:21 +13:00
|
|
|
) *RoomHandler {
|
2022-03-27 11:20:38 +13:00
|
|
|
h := &RoomHandler{
|
2020-12-09 02:31:15 +13:00
|
|
|
sessions: sessions,
|
|
|
|
desktop: desktop,
|
|
|
|
capture: capture,
|
2020-10-31 06:16:21 +13:00
|
|
|
}
|
2022-03-27 11:20:38 +13:00
|
|
|
|
|
|
|
// generate fallback image for private mode when needed
|
2022-03-27 12:08:06 +13:00
|
|
|
sessions.OnSettingsChanged(func(new types.Settings, old types.Settings) {
|
|
|
|
if old.PrivateMode && !new.PrivateMode {
|
2022-03-27 11:20:38 +13:00
|
|
|
log.Debug().Msg("clearing private mode fallback image")
|
|
|
|
h.privateModeImage = nil
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-03-27 12:08:06 +13:00
|
|
|
if !old.PrivateMode && new.PrivateMode {
|
|
|
|
img := h.desktop.GetScreenshotImage()
|
|
|
|
bytes, err := utils.CreateJPGImage(img, 90)
|
|
|
|
if err != nil {
|
|
|
|
log.Err(err).Msg("could not generate private mode fallback image")
|
|
|
|
return
|
|
|
|
}
|
2022-03-27 11:20:38 +13:00
|
|
|
|
2022-03-27 12:08:06 +13:00
|
|
|
log.Debug().Msg("using private mode fallback image")
|
|
|
|
h.privateModeImage = bytes
|
|
|
|
}
|
2022-03-27 11:20:38 +13:00
|
|
|
})
|
|
|
|
|
|
|
|
return h
|
2020-10-31 06:16:21 +13:00
|
|
|
}
|
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
func (h *RoomHandler) Route(r types.Router) {
|
|
|
|
r.With(auth.AdminsOnly).Route("/broadcast", func(r types.Router) {
|
2020-11-19 10:35:50 +13:00
|
|
|
r.Get("/", h.broadcastStatus)
|
|
|
|
r.Post("/start", h.boradcastStart)
|
|
|
|
r.Post("/stop", h.boradcastStop)
|
2020-10-31 22:48:24 +13:00
|
|
|
})
|
2020-10-31 06:16:21 +13:00
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
r.With(auth.CanAccessClipboardOnly).With(auth.HostsOnly).Route("/clipboard", func(r types.Router) {
|
2021-01-30 08:05:13 +13:00
|
|
|
r.Get("/", h.clipboardGetText)
|
|
|
|
r.Post("/", h.clipboardSetText)
|
|
|
|
r.Get("/image.png", h.clipboardGetImage)
|
|
|
|
|
|
|
|
// TODO: Refactor. xclip is failing to set propper target type
|
|
|
|
// and this content is sent back to client as text in another
|
|
|
|
// clipboard update. Therefore endpoint is not usable!
|
2021-01-29 12:03:22 +13:00
|
|
|
//r.Post("/image", h.clipboardSetImage)
|
2021-02-03 06:28:32 +13:00
|
|
|
|
2021-01-30 08:05:13 +13:00
|
|
|
// TODO: Refactor. If there would be implemented custom target
|
|
|
|
// retrieval, this endpoint would be useful.
|
|
|
|
//r.Get("/targets", h.clipboardGetTargets)
|
2020-11-01 00:35:02 +13:00
|
|
|
})
|
2020-11-17 10:48:20 +13:00
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
r.With(auth.CanHostOnly).Route("/keyboard", func(r types.Router) {
|
2021-01-16 04:53:03 +13:00
|
|
|
r.Get("/map", h.keyboardMapGet)
|
|
|
|
r.With(auth.HostsOnly).Post("/map", h.keyboardMapSet)
|
2021-01-13 11:35:46 +13:00
|
|
|
|
|
|
|
r.Get("/modifiers", h.keyboardModifiersGet)
|
|
|
|
r.With(auth.HostsOnly).Post("/modifiers", h.keyboardModifiersSet)
|
2020-11-19 09:56:42 +13:00
|
|
|
})
|
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
r.With(auth.CanHostOnly).Route("/control", func(r types.Router) {
|
2020-11-19 11:14:28 +13:00
|
|
|
r.Get("/", h.controlStatus)
|
2020-11-19 10:35:50 +13:00
|
|
|
r.Post("/request", h.controlRequest)
|
|
|
|
r.Post("/release", h.controlRelease)
|
2020-11-19 09:10:40 +13:00
|
|
|
|
2020-11-19 10:35:50 +13:00
|
|
|
r.With(auth.AdminsOnly).Post("/take", h.controlTake)
|
|
|
|
r.With(auth.AdminsOnly).Post("/give", h.controlGive)
|
2020-11-30 03:58:26 +13:00
|
|
|
r.With(auth.AdminsOnly).Post("/reset", h.controlReset)
|
2020-11-17 10:48:20 +13:00
|
|
|
})
|
2020-11-19 09:34:39 +13:00
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
r.With(auth.CanWatchOnly).Route("/screen", func(r types.Router) {
|
2021-03-22 09:26:53 +13:00
|
|
|
r.Get("/", h.screenConfiguration)
|
2020-11-19 10:35:50 +13:00
|
|
|
r.With(auth.AdminsOnly).Post("/", h.screenConfigurationChange)
|
|
|
|
r.With(auth.AdminsOnly).Get("/configurations", h.screenConfigurationsList)
|
2021-03-22 09:26:53 +13:00
|
|
|
|
|
|
|
r.Get("/cast.jpg", h.screenCastGet)
|
|
|
|
r.With(auth.AdminsOnly).Get("/shot.jpg", h.screenShotGet)
|
2020-11-19 09:53:06 +13:00
|
|
|
})
|
2021-01-07 06:57:50 +13:00
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
r.With(h.uploadMiddleware).Route("/upload", func(r types.Router) {
|
2021-01-08 06:28:23 +13:00
|
|
|
r.Post("/drop", h.uploadDrop)
|
2021-01-18 22:34:33 +13:00
|
|
|
r.Post("/dialog", h.uploadDialogPost)
|
|
|
|
r.Delete("/dialog", h.uploadDialogClose)
|
2021-01-07 06:57:50 +13:00
|
|
|
})
|
2020-10-31 06:16:21 +13:00
|
|
|
}
|
2021-01-09 11:42:53 +13:00
|
|
|
|
2021-09-17 10:58:50 +12:00
|
|
|
func (h *RoomHandler) uploadMiddleware(w http.ResponseWriter, r *http.Request) (context.Context, error) {
|
|
|
|
session, ok := auth.GetSession(r)
|
2022-03-27 12:08:06 +13:00
|
|
|
if !ok || (!session.IsHost() && (!session.Profile().CanHost || !h.sessions.Settings().ImplicitHosting)) {
|
2021-09-17 10:58:50 +12:00
|
|
|
return nil, utils.HttpForbidden("without implicit hosting, only host can upload files")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
2021-01-09 11:42:53 +13:00
|
|
|
}
|