Skip to content

Commit 4762c5a

Browse files
committed
v0.11.3: Admin Web UI, restricted accounts
1 parent 6951476 commit 4762c5a

File tree

7 files changed

+67
-7
lines changed

7 files changed

+67
-7
lines changed

CHANGELOG.md

+8
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,11 @@
1+
## 0.11.3
2+
3+
- Add basic Admin Web UI for account management (`/s5/admin/app`)
4+
- Accounts can now be restricted to disable all upload endpoints
5+
- Add some new Admin API methods (`/accounts/full` and `/accounts/set_restricted_status`)
6+
- Fix Docker image build
7+
- Fix bug in the `/debug/download_urls` API (thanks @parajbs-dev)
8+
19
## 0.11.0
210

311
- Add support for WebSocket p2p connections and use them by default if a domain is configured

lib/accounts/account.dart

+3
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,20 @@ class Account {
22
final int id;
33
final int createdAt;
44
final String? email;
5+
final bool isRestricted;
56
int get tier => 1;
67

78
Account({
89
required this.id,
910
required this.createdAt,
1011
required this.email,
12+
required this.isRestricted,
1113
});
1214
toJson() => {
1315
'id': id,
1416
'createdAt': createdAt,
1517
'email': email,
1618
'tier': tier,
19+
'isRestricted': isRestricted,
1720
};
1821
}

lib/constants.dart

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
// ! S5 node version
2-
const nodeVersion = '0.11.0';
2+
const nodeVersion = '0.11.3';
33

44
// ! default chunk size for hashes
55
const defaultChunkSize = 256 * 1024;

lib/http_api/admin.dart

+25
Original file line numberDiff line numberDiff line change
@@ -44,13 +44,38 @@ class AdminAPI {
4444
};
4545
});
4646

47+
app.get('/s5/admin/accounts/full', (req, res) async {
48+
checkAuth(req);
49+
final res = await node.accounts!.getAllAccounts();
50+
final accountsFull = <Map>[];
51+
for (final account in res) {
52+
final map = account.toJson();
53+
map['stats'] = await node.accounts!.getStatsForAccount(account.id);
54+
accountsFull.add(
55+
map,
56+
);
57+
}
58+
return {
59+
'accounts': accountsFull,
60+
};
61+
});
62+
4763
app.post('/s5/admin/accounts', (req, res) async {
4864
checkAuth(req);
4965
final id =
5066
await node.accounts!.createAccount(req.uri.queryParameters['email']!);
5167
return {'id': id};
5268
});
5369

70+
app.post('/s5/admin/accounts/set_restricted_status', (req, res) async {
71+
checkAuth(req);
72+
await node.accounts!.setRestrictedStatus(
73+
int.parse(req.uri.queryParameters['id']!),
74+
req.requestedUri.queryParameters['status'] == 'true',
75+
);
76+
return '';
77+
});
78+
5479
app.post('/s5/admin/accounts/new_auth_token', (req, res) async {
5580
checkAuth(req);
5681
final accountId = int.parse(req.uri.queryParameters['id']!);

lib/http_api/http_api.dart

+12-5
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ class HttpAPIServer {
7878

7979
app.post('/s5/upload/directory', (req, res) async {
8080
final auth = await node.checkAuth(req, 's5/upload/directory');
81-
if (auth.denied) return res.unauthorized(auth);
81+
if (auth.denied || auth.restricted) return res.unauthorized(auth);
8282

8383
if (node.store == null) {
8484
throw 'No store configured, uploads not possible';
@@ -119,7 +119,7 @@ class HttpAPIServer {
119119

120120
app.post('/s5/upload', (req, res) async {
121121
final auth = await node.checkAuth(req, 's5/upload');
122-
if (auth.denied) return res.unauthorized(auth);
122+
if (auth.denied || auth.restricted) return res.unauthorized(auth);
123123

124124
if (node.store == null) {
125125
throw 'No store configured, uploads not possible';
@@ -223,7 +223,7 @@ class HttpAPIServer {
223223
// TODO Add ?routingHints=
224224
app.post('/s5/pin/:cid', (req, res) async {
225225
final auth = await node.checkAuth(req, 's5/pin');
226-
if (auth.denied) return res.unauthorized(auth);
226+
if (auth.denied || auth.restricted) return res.unauthorized(auth);
227227

228228
final cid = CID.decode(req.params['cid']);
229229

@@ -330,7 +330,7 @@ class HttpAPIServer {
330330

331331
app.post('/s5/upload/tus', (req, res) async {
332332
final auth = await node.checkAuth(req, 's5/upload/tus');
333-
if (auth.denied) return res.unauthorized(auth);
333+
if (auth.denied || auth.restricted) return res.unauthorized(auth);
334334

335335
final uploadLength = int.parse(req.headers.value('upload-length')!);
336336

@@ -380,7 +380,7 @@ class HttpAPIServer {
380380

381381
app.post('/s5/import/http', (req, res) async {
382382
final auth = await node.checkAuth(req, 's5/import/http');
383-
if (auth.denied) return res.unauthorized(auth);
383+
if (auth.denied || auth.restricted) return res.unauthorized(auth);
384384

385385
if (node.store == null) {
386386
throw 'No store configured, uploads not possible';
@@ -708,6 +708,8 @@ class HttpAPIServer {
708708

709709
final map = node.getCachedStorageLocations(hash, [
710710
storageLocationTypeFull,
711+
storageLocationTypeFile,
712+
storageLocationTypeBridge,
711713
]);
712714

713715
final availableNodes = map.keys.toList();
@@ -914,6 +916,11 @@ class HttpAPIServer {
914916
}
915917
}
916918

919+
if (cid == null && request.uri.path.startsWith('/s5/admin/app')) {
920+
// ! Admin Web UI
921+
cid = CID.decode('zrjD3HKdKj56sTsHcFd5XhcVf72SGFVZQnMDq2RuYCe7Hiw');
922+
}
923+
917924
if (cid == null) {
918925
try {
919926
cid = CID.decode(parts[0]);

lib/service/accounts.dart

+17
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ class AuthResponse {
1616
final bool denied;
1717
final String? error;
1818

19+
bool get restricted => account?.isRestricted ?? false;
20+
1921
AuthResponse({
2022
required this.account,
2123
required this.denied,
@@ -357,6 +359,7 @@ class AccountsService {
357359
"createdAt": auth.account!.createdAt,
358360
"quotaExceeded": false,
359361
"emailConfirmed": false,
362+
"isRestricted": auth.account!.isRestricted,
360363
"tier": tiers[auth.account!.tier],
361364
};
362365
});
@@ -372,6 +375,7 @@ class AccountsService {
372375
"createdAt": auth.account!.createdAt,
373376
"quotaExceeded": false,
374377
"emailConfirmed": false,
378+
"isRestricted": auth.account!.isRestricted,
375379
"tier": tiers[auth.account!.tier],
376380
"stats": stats,
377381
};
@@ -527,10 +531,12 @@ WHERE object_hash = ?''',
527531
whereArgs: [id],
528532
);
529533
final account = res.first;
534+
530535
return Account(
531536
id: id,
532537
createdAt: account['created_at'] as int,
533538
email: account['email'] as String?,
539+
isRestricted: account['is_restricted'] == 1,
534540
);
535541
}
536542

@@ -543,6 +549,7 @@ WHERE object_hash = ?''',
543549
id: account['id'] as int,
544550
createdAt: account['created_at'] as int,
545551
email: account['email'] as String?,
552+
isRestricted: account['is_restricted'] == 1,
546553
))
547554
.toList();
548555
}
@@ -565,6 +572,7 @@ WHERE ID = (
565572
id: account['id'] as int,
566573
createdAt: account['created_at'] as int,
567574
email: account['email'] as String?,
575+
isRestricted: account['is_restricted'] == 1,
568576
);
569577
}
570578

@@ -589,6 +597,15 @@ WHERE ID = (
589597
});
590598
return authToken;
591599
}
600+
601+
Future<void> setRestrictedStatus(int id, bool restricted) async {
602+
await sql.db.update(
603+
'Account',
604+
{'is_restricted': restricted ? 1 : 0},
605+
where: 'id = ?',
606+
whereArgs: [id],
607+
);
608+
}
592609
}
593610

594611
extension UnauthorizedExtension on HttpResponse {

pubspec.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: s5_server
22
description: Decentralized content-addressed storage network
33
publish_to: none
4-
version: 0.11.0
4+
version: 0.11.3
55

66
environment:
77
sdk: ^3.0.0

0 commit comments

Comments
 (0)