diff options
author | metamuffin <metamuffin@disroot.org> | 2023-12-22 23:57:03 +0100 |
---|---|---|
committer | metamuffin <metamuffin@disroot.org> | 2023-12-22 23:57:03 +0100 |
commit | 75949cebdd61dd8f0d06f2e47081c460e2a442f0 (patch) | |
tree | ea0fc2ff003b7694ee06555d731bce1f08199136 /server/src/routes/stream.rs | |
parent | c4682c231cbfa2bd4b44e14548800a64cc9cdbb8 (diff) | |
download | jellything-75949cebdd61dd8f0d06f2e47081c460e2a442f0.tar jellything-75949cebdd61dd8f0d06f2e47081c460e2a442f0.tar.bz2 jellything-75949cebdd61dd8f0d06f2e47081c460e2a442f0.tar.zst |
rework import system pt. 8: federated streams & change jhls
Diffstat (limited to 'server/src/routes/stream.rs')
-rw-r--r-- | server/src/routes/stream.rs | 75 |
1 files changed, 47 insertions, 28 deletions
diff --git a/server/src/routes/stream.rs b/server/src/routes/stream.rs index 14db462..8d16ded 100644 --- a/server/src/routes/stream.rs +++ b/server/src/routes/stream.rs @@ -11,7 +11,11 @@ use jellybase::{ permission::{NodePermissionExt, PermissionSetExt}, CONF, }; -use jellycommon::{stream::StreamSpec, user::UserPermission, TrackSource}; +use jellycommon::{ + stream::StreamSpec, + user::{CreateSessionParams, UserPermission}, + TrackSource, +}; use log::{info, warn}; use rocket::{ get, head, @@ -58,36 +62,51 @@ pub async fn r_stream( .as_ref() .ok_or(anyhow!("item does not contain media"))?; - // TODO federated streams - // if let MediaSource::Remote { host, remote_id } = source { - // session - // .user - // .permissions - // .assert(&UserPermission::FederatedContent)?; + // TODO its unclear how requests with multiple tracks should be handled. + if spec.tracks.len() == 1 { + let ti = spec.tracks[0]; + if let TrackSource::Remote(remote_index) = source[ti] { + session + .user + .permissions + .assert(&UserPermission::FederatedContent)?; + + let track = &node.public.media.ok_or(anyhow!("no media"))?.tracks[ti]; + let host = track + .federated + .last() + .ok_or(anyhow!("federation inconsistent"))?; - // let (username, password, _) = CONF - // .remote_credentials - // .get(host) - // .ok_or(anyhow!("no credentials on the server-side"))?; + let (username, password, _) = CONF + .remote_credentials + .get(host) + .ok_or(anyhow!("no credentials on the server-side"))?; - // info!("creating session on {host}"); - // let instance = federation.get_instance(&host)?.to_owned(); - // let session = instance - // .login(LoginDetails { - // username: username.to_owned(), - // password: password.to_owned(), - // expire: Some(60), - // drop_permissions: Some(HashSet::from_iter([ - // UserPermission::ManageSelf, - // UserPermission::Admin, // in case somebody federated the admin :))) - // ])), - // }) - // .await?; + info!("creating session on {host}"); + let instance = federation.get_instance(&host)?.to_owned(); + let session = instance + .login(CreateSessionParams { + username: username.to_owned(), + password: password.to_owned(), + expire: Some(60), + drop_permissions: Some(HashSet::from_iter([ + UserPermission::ManageSelf, + UserPermission::Admin, // in case somebody federated the admin :))) + ])), + }) + .await?; - // let uri = session.stream(&remote_id, &spec); - // info!("federation redirect"); - // return Ok(Either::Right(RedirectResponse(uri))); - // } + let uri = session.stream( + node.public.id.as_ref().unwrap(), + &StreamSpec { + tracks: vec![remote_index], + ..spec + }, + ); + info!("federation redirect"); + return Ok(Either::Right(RedirectResponse(uri))); + } + } info!( "stream request (range={})", |