|
|
|
package model
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/synctv-org/synctv/utils"
|
|
|
|
"gorm.io/gorm"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Consul struct {
|
|
|
|
ServiceName string `gorm:"type:varchar(64)" json:"serviceName"`
|
|
|
|
Token string `gorm:"type:varchar(256)" json:"token"`
|
|
|
|
PathPrefix string `gorm:"type:varchar(64)" json:"pathPrefix"`
|
|
|
|
Namespace string `gorm:"type:varchar(64)" json:"namespace"`
|
|
|
|
Partition string `gorm:"type:varchar(64)" json:"partition"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type Etcd struct {
|
|
|
|
ServiceName string `gorm:"type:varchar(64)" json:"serviceName"`
|
|
|
|
Username string `gorm:"type:varchar(64)" json:"username"`
|
|
|
|
Password string `gorm:"type:varchar(256)" json:"password"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type Backend struct {
|
|
|
|
Endpoint string `gorm:"primaryKey;type:varchar(512)" json:"endpoint"`
|
|
|
|
Comment string `gorm:"type:text" json:"comment"`
|
|
|
|
Tls bool `gorm:"default:false" json:"tls"`
|
|
|
|
JwtSecret string `gorm:"type:varchar(256)" json:"jwtSecret"`
|
|
|
|
CustomCA string `gorm:"type:text" json:"customCA"`
|
|
|
|
TimeOut string `gorm:"default:10s" json:"timeOut"`
|
|
|
|
|
|
|
|
Consul Consul `gorm:"embedded;embeddedPrefix:consul_" json:"consul"`
|
|
|
|
Etcd Etcd `gorm:"embedded;embeddedPrefix:etcd_" json:"etcd"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) Validate() error {
|
|
|
|
if b.Endpoint == "" {
|
|
|
|
return errors.New("new http client failed, endpoint is empty")
|
|
|
|
}
|
|
|
|
if b.Consul.ServiceName != "" && b.Etcd.ServiceName != "" {
|
|
|
|
return errors.New("new grpc client failed, consul and etcd can't be used at the same time")
|
|
|
|
}
|
|
|
|
if b.TimeOut != "" {
|
|
|
|
if _, err := time.ParseDuration(b.TimeOut); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type VendorBackend struct {
|
|
|
|
Backend Backend `gorm:"embedded;embeddedPrefix:backend_" json:"backend"`
|
|
|
|
Enabled bool `gorm:"default:true" json:"enabled"`
|
|
|
|
UsedBy BackendUsedBy `gorm:"embedded;embeddedPrefix:used_by_" json:"usedBy"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type BackendUsedBy struct {
|
|
|
|
Bilibili bool `gorm:"default:false" json:"bilibili"`
|
|
|
|
BilibiliBackendName string `gorm:"type:varchar(64)" json:"bilibiliBackendName"`
|
|
|
|
Alist bool `gorm:"default:false" json:"alist"`
|
|
|
|
AlistBackendName string `gorm:"type:varchar(64)" json:"alistBackendName"`
|
|
|
|
Emby bool `gorm:"default:false" json:"emby"`
|
|
|
|
EmbyBackendName string `gorm:"type:varchar(64)" json:"embyBackendName"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *VendorBackend) BeforeSave(tx *gorm.DB) error {
|
|
|
|
key := []byte(v.Backend.Endpoint)
|
|
|
|
var err error
|
|
|
|
if v.Backend.JwtSecret != "" {
|
|
|
|
if v.Backend.JwtSecret, err = utils.CryptoToBase64([]byte(v.Backend.JwtSecret), key); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.Consul.Token != "" {
|
|
|
|
if v.Backend.Consul.Token, err = utils.CryptoToBase64([]byte(v.Backend.Consul.Token), key); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.Etcd.Password != "" {
|
|
|
|
if v.Backend.Etcd.Password, err = utils.CryptoToBase64([]byte(v.Backend.Etcd.Password), key); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.CustomCA != "" {
|
|
|
|
if v.Backend.CustomCA, err = utils.CryptoToBase64([]byte(v.Backend.CustomCA), key); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *VendorBackend) AfterSave(tx *gorm.DB) error {
|
|
|
|
key := []byte(v.Backend.Endpoint)
|
|
|
|
var (
|
|
|
|
err error
|
|
|
|
data []byte
|
|
|
|
)
|
|
|
|
if v.Backend.JwtSecret != "" {
|
|
|
|
if data, err = utils.DecryptoFromBase64(v.Backend.JwtSecret, key); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
v.Backend.JwtSecret = string(data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.Consul.Token != "" {
|
|
|
|
if data, err = utils.DecryptoFromBase64(v.Backend.Consul.Token, key); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
v.Backend.Consul.Token = string(data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.Etcd.Password != "" {
|
|
|
|
if data, err = utils.DecryptoFromBase64(v.Backend.Etcd.Password, key); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
v.Backend.Etcd.Password = string(data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v.Backend.CustomCA != "" {
|
|
|
|
if data, err = utils.DecryptoFromBase64(v.Backend.CustomCA, key); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
v.Backend.CustomCA = string(data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *VendorBackend) AfterFind(tx *gorm.DB) error {
|
|
|
|
return v.AfterSave(tx)
|
|
|
|
}
|