754 lines
25 KiB
Go
754 lines
25 KiB
Go
package router
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"math/rand"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/gorilla/mux"
|
|
|
|
"github.com/Masterminds/semver"
|
|
"github.com/klauspost/compress/gzip"
|
|
"openreplay/backend/internal/http/util"
|
|
"openreplay/backend/internal/http/uuid"
|
|
"openreplay/backend/pkg/db/postgres"
|
|
"openreplay/backend/pkg/featureflags"
|
|
"openreplay/backend/pkg/flakeid"
|
|
. "openreplay/backend/pkg/messages"
|
|
"openreplay/backend/pkg/sessions"
|
|
"openreplay/backend/pkg/token"
|
|
"openreplay/backend/pkg/uxtesting"
|
|
)
|
|
|
|
func (e *Router) readBody(w http.ResponseWriter, r *http.Request, limit int64) ([]byte, error) {
|
|
body := http.MaxBytesReader(w, r.Body, limit)
|
|
var (
|
|
bodyBytes []byte
|
|
err error
|
|
)
|
|
|
|
// Check if body is gzipped and decompress it
|
|
if r.Header.Get("Content-Encoding") == "gzip" {
|
|
reader, err := gzip.NewReader(body)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("can't create gzip reader: %s", err)
|
|
}
|
|
bodyBytes, err = io.ReadAll(reader)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("can't read gzip body: %s", err)
|
|
}
|
|
if err := reader.Close(); err != nil {
|
|
e.log.Warn(r.Context(), "can't close gzip reader: %s", err)
|
|
}
|
|
} else {
|
|
bodyBytes, err = io.ReadAll(body)
|
|
}
|
|
|
|
// Close body
|
|
if closeErr := body.Close(); closeErr != nil {
|
|
e.log.Warn(r.Context(), "error while closing request body: %s", closeErr)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return bodyBytes, nil
|
|
}
|
|
|
|
func checkMobileTrackerVersion(ver string) bool {
|
|
c, err := semver.NewConstraint(">=1.0.9")
|
|
if err != nil {
|
|
return false
|
|
}
|
|
// Check for beta version
|
|
parts := strings.Split(ver, "-")
|
|
if len(parts) > 1 {
|
|
ver = parts[0]
|
|
}
|
|
v, err := semver.NewVersion(ver)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return c.Check(v)
|
|
}
|
|
|
|
func getSessionTimestamp(req *StartSessionRequest, startTimeMili int64) (ts uint64) {
|
|
ts = uint64(req.Timestamp)
|
|
if req.IsOffline {
|
|
return
|
|
}
|
|
c, err := semver.NewConstraint(">=4.1.6")
|
|
if err != nil {
|
|
return
|
|
}
|
|
ver := req.TrackerVersion
|
|
parts := strings.Split(ver, "-")
|
|
if len(parts) > 1 {
|
|
ver = parts[0]
|
|
}
|
|
v, err := semver.NewVersion(ver)
|
|
if err != nil {
|
|
return
|
|
}
|
|
if c.Check(v) {
|
|
ts = uint64(startTimeMili)
|
|
if req.BufferDiff > 0 && req.BufferDiff < 5*60*1000 {
|
|
ts -= req.BufferDiff
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func (e *Router) startSessionHandlerWeb(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check request body
|
|
if r.Body == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, errors.New("request body is empty"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
bodyBytes, err := e.readBody(w, r, e.cfg.JsonSizeLimit)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusRequestEntityTooLarge, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
// Parse request body
|
|
req := &StartSessionRequest{}
|
|
if err := json.Unmarshal(bodyBytes, req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add tracker version to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "tracker", req.TrackerVersion))
|
|
|
|
// Handler's logic
|
|
if req.ProjectKey == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, errors.New("ProjectKey value required"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
p, err := e.services.Projects.GetProjectByKey(*req.ProjectKey)
|
|
if err != nil {
|
|
if postgres.IsNoRowsErr(err) {
|
|
logErr := fmt.Errorf("project doesn't exist or is not active, key: %s", *req.ProjectKey)
|
|
e.ResponseWithError(r.Context(), w, http.StatusNotFound, logErr, startTime, r.URL.Path, bodySize)
|
|
} else {
|
|
e.log.Error(r.Context(), "failed to get project by key: %s, err: %s", *req.ProjectKey, err)
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, errors.New("can't find a project"), startTime, r.URL.Path, bodySize)
|
|
}
|
|
return
|
|
}
|
|
|
|
// Add projectID to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", p.ProjectID)))
|
|
|
|
// Check if the project supports mobile sessions
|
|
if !p.IsWeb() {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, errors.New("project doesn't support web sessions"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
ua := e.services.UaParser.ParseFromHTTPRequest(r)
|
|
if ua == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, fmt.Errorf("browser not recognized, user-agent: %s", r.Header.Get("User-Agent")), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
geoInfo := e.ExtractGeoData(r)
|
|
|
|
userUUID := uuid.GetUUID(req.UserUUID)
|
|
tokenData, err := e.services.Tokenizer.Parse(req.Token)
|
|
if err != nil || req.Reset { // Starting the new one
|
|
dice := byte(rand.Intn(100))
|
|
// Use condition rate if it's set
|
|
if req.Condition != "" {
|
|
rate, err := e.services.Conditions.GetRate(p.ProjectID, req.Condition, int(p.SampleRate))
|
|
if err != nil {
|
|
e.log.Warn(r.Context(), "can't get condition rate, condition: %s, err: %s", req.Condition, err)
|
|
} else {
|
|
p.SampleRate = byte(rate)
|
|
}
|
|
}
|
|
if dice >= p.SampleRate {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, fmt.Errorf("capture rate miss, rate: %d", p.SampleRate), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
startTimeMili := startTime.UnixMilli()
|
|
sessionID, err := e.services.Flaker.Compose(uint64(startTimeMili))
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
expTime := startTime.Add(time.Duration(p.MaxSessionDuration) * time.Millisecond)
|
|
tokenData = &token.TokenData{
|
|
ID: sessionID,
|
|
Delay: startTimeMili - req.Timestamp,
|
|
ExpTime: expTime.UnixMilli(),
|
|
}
|
|
|
|
// Add sessionID to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionID)))
|
|
|
|
if recordSession(req) {
|
|
sessionStart := &SessionStart{
|
|
Timestamp: getSessionTimestamp(req, startTimeMili),
|
|
ProjectID: uint64(p.ProjectID),
|
|
TrackerVersion: req.TrackerVersion,
|
|
RevID: req.RevID,
|
|
UserUUID: userUUID,
|
|
UserAgent: r.Header.Get("User-Agent"),
|
|
UserOS: ua.OS,
|
|
UserOSVersion: ua.OSVersion,
|
|
UserBrowser: ua.Browser,
|
|
UserBrowserVersion: ua.BrowserVersion,
|
|
UserDevice: ua.Device,
|
|
UserDeviceType: ua.DeviceType,
|
|
UserCountry: geoInfo.Pack(),
|
|
UserDeviceMemorySize: req.DeviceMemory,
|
|
UserDeviceHeapSize: req.JsHeapSizeLimit,
|
|
UserID: req.UserID,
|
|
}
|
|
|
|
// Save sessionStart to db
|
|
if err := e.services.Sessions.Add(&sessions.Session{
|
|
SessionID: sessionID,
|
|
Platform: "web",
|
|
Timestamp: sessionStart.Timestamp,
|
|
Timezone: req.Timezone,
|
|
ProjectID: uint32(sessionStart.ProjectID),
|
|
TrackerVersion: sessionStart.TrackerVersion,
|
|
RevID: sessionStart.RevID,
|
|
UserUUID: sessionStart.UserUUID,
|
|
UserOS: sessionStart.UserOS,
|
|
UserOSVersion: sessionStart.UserOSVersion,
|
|
UserDevice: sessionStart.UserDevice,
|
|
UserCountry: geoInfo.Country,
|
|
UserState: geoInfo.State,
|
|
UserCity: geoInfo.City,
|
|
UserAgent: sessionStart.UserAgent,
|
|
UserBrowser: sessionStart.UserBrowser,
|
|
UserBrowserVersion: sessionStart.UserBrowserVersion,
|
|
UserDeviceType: sessionStart.UserDeviceType,
|
|
UserDeviceMemorySize: sessionStart.UserDeviceMemorySize,
|
|
UserDeviceHeapSize: sessionStart.UserDeviceHeapSize,
|
|
UserID: &sessionStart.UserID,
|
|
ScreenWidth: req.Width,
|
|
ScreenHeight: req.Height,
|
|
}); err != nil {
|
|
e.log.Warn(r.Context(), "can't insert sessionStart to DB: %s", err)
|
|
}
|
|
|
|
// Send sessionStart message to kafka
|
|
if err := e.services.Producer.Produce(e.cfg.TopicRawWeb, tokenData.ID, sessionStart.Encode()); err != nil {
|
|
e.log.Error(r.Context(), "can't send sessionStart to queue: %s", err)
|
|
}
|
|
}
|
|
} else {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", tokenData.ID)))
|
|
}
|
|
|
|
// Save information about session beacon size
|
|
e.addBeaconSize(tokenData.ID, p.BeaconSize)
|
|
|
|
startResponse := &StartSessionResponse{
|
|
Token: e.services.Tokenizer.Compose(*tokenData),
|
|
UserUUID: userUUID,
|
|
UserOS: ua.OS,
|
|
UserDevice: ua.Device,
|
|
UserBrowser: ua.Browser,
|
|
UserCountry: geoInfo.Country,
|
|
UserState: geoInfo.State,
|
|
UserCity: geoInfo.City,
|
|
SessionID: strconv.FormatUint(tokenData.ID, 10),
|
|
ProjectID: strconv.FormatUint(uint64(p.ProjectID), 10),
|
|
BeaconSizeLimit: e.getBeaconSize(tokenData.ID),
|
|
CompressionThreshold: e.getCompressionThreshold(),
|
|
StartTimestamp: int64(flakeid.ExtractTimestamp(tokenData.ID)),
|
|
Delay: tokenData.Delay,
|
|
CanvasEnabled: e.cfg.RecordCanvas,
|
|
CanvasImageQuality: e.cfg.CanvasQuality,
|
|
CanvasFrameRate: e.cfg.CanvasFps,
|
|
Features: e.features,
|
|
}
|
|
modifyResponse(req, startResponse)
|
|
|
|
e.ResponseWithJSON(r.Context(), w, startResponse, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) pushMessagesHandlerWeb(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Get debug header with batch info
|
|
if batch := r.URL.Query().Get("batch"); batch != "" {
|
|
r = r.WithContext(context.WithValue(r.Context(), "batch", batch))
|
|
}
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
tokenJustExpired := false
|
|
if err != nil {
|
|
if errors.Is(err, token.JUST_EXPIRED) {
|
|
tokenJustExpired = true
|
|
} else {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
// Check request body
|
|
if r.Body == nil {
|
|
errCode := http.StatusBadRequest
|
|
if tokenJustExpired {
|
|
errCode = http.StatusUnauthorized
|
|
}
|
|
e.ResponseWithError(r.Context(), w, errCode, errors.New("request body is empty"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
bodyBytes, err := e.readBody(w, r, e.getBeaconSize(sessionData.ID))
|
|
if err != nil {
|
|
errCode := http.StatusRequestEntityTooLarge
|
|
if tokenJustExpired {
|
|
errCode = http.StatusUnauthorized
|
|
}
|
|
e.ResponseWithError(r.Context(), w, errCode, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
// Send processed messages to queue as array of bytes
|
|
err = e.services.Producer.Produce(e.cfg.TopicRawWeb, sessionData.ID, bodyBytes)
|
|
if err != nil {
|
|
e.log.Error(r.Context(), "can't send messages batch to queue: %s", err)
|
|
errCode := http.StatusInternalServerError
|
|
if tokenJustExpired {
|
|
errCode = http.StatusUnauthorized
|
|
}
|
|
e.ResponseWithError(r.Context(), w, errCode, errors.New("can't save message, try again"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
if tokenJustExpired {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, errors.New("token expired"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
e.ResponseOK(r.Context(), w, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) notStartedHandlerWeb(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
if r.Body == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, errors.New("request body is empty"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodyBytes, err := e.readBody(w, r, e.cfg.JsonSizeLimit)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusRequestEntityTooLarge, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
req := &NotStartedRequest{}
|
|
if err := json.Unmarshal(bodyBytes, req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add tracker version to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "tracker", req.TrackerVersion))
|
|
|
|
// Handler's logic
|
|
if req.ProjectKey == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, errors.New("projectKey value required"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
p, err := e.services.Projects.GetProjectByKey(*req.ProjectKey)
|
|
if err != nil {
|
|
if postgres.IsNoRowsErr(err) {
|
|
logErr := fmt.Errorf("project doesn't exist or is not active, key: %s", *req.ProjectKey)
|
|
e.ResponseWithError(r.Context(), w, http.StatusNotFound, logErr, startTime, r.URL.Path, bodySize)
|
|
} else {
|
|
e.log.Error(r.Context(), "can't find a project: %s", err)
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, errors.New("can't find a project"), startTime, r.URL.Path, bodySize)
|
|
}
|
|
return
|
|
}
|
|
|
|
// Add projectID to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", p.ProjectID)))
|
|
|
|
ua := e.services.UaParser.ParseFromHTTPRequest(r)
|
|
if ua == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, fmt.Errorf("browser not recognized, user-agent: %s", r.Header.Get("User-Agent")), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
geoInfo := e.ExtractGeoData(r)
|
|
err = e.services.Sessions.AddUnStarted(&sessions.UnStartedSession{
|
|
ProjectKey: *req.ProjectKey,
|
|
TrackerVersion: req.TrackerVersion,
|
|
DoNotTrack: req.DoNotTrack,
|
|
Platform: "web",
|
|
UserAgent: r.Header.Get("User-Agent"),
|
|
UserOS: ua.OS,
|
|
UserOSVersion: ua.OSVersion,
|
|
UserBrowser: ua.Browser,
|
|
UserBrowserVersion: ua.BrowserVersion,
|
|
UserDevice: ua.Device,
|
|
UserDeviceType: ua.DeviceType,
|
|
UserCountry: geoInfo.Country,
|
|
UserState: geoInfo.State,
|
|
UserCity: geoInfo.City,
|
|
})
|
|
if err != nil {
|
|
e.log.Warn(r.Context(), "can't insert un-started session: %s", err)
|
|
}
|
|
// response ok anyway
|
|
e.ResponseOK(r.Context(), w, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) featureFlagsHandlerWeb(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
if r.Body == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, errors.New("request body is empty"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodyBytes, err := e.readBody(w, r, e.cfg.JsonSizeLimit)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusRequestEntityTooLarge, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
// Parse request body
|
|
req := &featureflags.FeatureFlagsRequest{}
|
|
if err := json.Unmarshal(bodyBytes, req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
computedFlags, err := e.services.FeatureFlags.ComputeFlagsForSession(req)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
resp := &featureflags.FeatureFlagsResponse{
|
|
Flags: computedFlags,
|
|
}
|
|
e.ResponseWithJSON(r.Context(), w, resp, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) getUXTestInfo(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
sess, err := e.services.Sessions.Get(sessionData.ID)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add projectID to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", sess.ProjectID)))
|
|
|
|
// Get taskID
|
|
vars := mux.Vars(r)
|
|
id := vars["id"]
|
|
|
|
// Get task info
|
|
info, err := e.services.UXTesting.GetInfo(id)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
if sess.ProjectID != info.ProjectID {
|
|
e.ResponseWithError(r.Context(), w, http.StatusForbidden, errors.New("project mismatch"), startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
type TaskInfoResponse struct {
|
|
Task *uxtesting.UXTestInfo `json:"test"`
|
|
}
|
|
e.ResponseWithJSON(r.Context(), w, &TaskInfoResponse{Task: info}, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) sendUXTestSignal(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
bodyBytes, err := e.readBody(w, r, e.cfg.JsonSizeLimit)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusRequestEntityTooLarge, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
// Parse request body
|
|
req := &uxtesting.TestSignal{}
|
|
|
|
if err := json.Unmarshal(bodyBytes, req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
req.SessionID = sessionData.ID
|
|
|
|
// Save test signal
|
|
if err := e.services.UXTesting.SetTestSignal(req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
e.ResponseOK(r.Context(), w, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) sendUXTaskSignal(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
bodyBytes, err := e.readBody(w, r, e.cfg.JsonSizeLimit)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusRequestEntityTooLarge, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
bodySize = len(bodyBytes)
|
|
|
|
// Parse request body
|
|
req := &uxtesting.TaskSignal{}
|
|
|
|
if err := json.Unmarshal(bodyBytes, req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
req.SessionID = sessionData.ID
|
|
|
|
// Save test signal
|
|
if err := e.services.UXTesting.SetTaskSignal(req); err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
e.ResponseOK(r.Context(), w, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
func (e *Router) getUXUploadUrl(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
key := fmt.Sprintf("%d/ux_webcam_record.webm", sessionData.ID)
|
|
url, err := e.services.ObjStorage.GetPreSignedUploadUrl(key)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
type UrlResponse struct {
|
|
URL string `json:"url"`
|
|
}
|
|
e.ResponseWithJSON(r.Context(), w, &UrlResponse{URL: url}, startTime, r.URL.Path, bodySize)
|
|
}
|
|
|
|
type ScreenshotMessage struct {
|
|
Name string
|
|
Data []byte
|
|
}
|
|
|
|
func (e *Router) imagesUploaderHandlerWeb(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil { // Should accept expired token?
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, 0)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
if info, err := e.services.Sessions.Get(sessionData.ID); err == nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", info.ProjectID)))
|
|
}
|
|
|
|
if r.Body == nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusBadRequest, errors.New("request body is empty"), startTime, r.URL.Path, 0)
|
|
return
|
|
}
|
|
r.Body = http.MaxBytesReader(w, r.Body, e.cfg.FileSizeLimit)
|
|
defer r.Body.Close()
|
|
|
|
// Parse the multipart form
|
|
err = r.ParseMultipartForm(10 << 20) // Max upload size 10 MB
|
|
if err == http.ErrNotMultipart || err == http.ErrMissingBoundary {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnsupportedMediaType, err, startTime, r.URL.Path, 0)
|
|
return
|
|
} else if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, 0)
|
|
return
|
|
}
|
|
|
|
// Iterate over uploaded files
|
|
for _, fileHeaderList := range r.MultipartForm.File {
|
|
for _, fileHeader := range fileHeaderList {
|
|
file, err := fileHeader.Open()
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, 0)
|
|
return
|
|
}
|
|
|
|
// Read the file content
|
|
fileBytes, err := io.ReadAll(file)
|
|
if err != nil {
|
|
file.Close()
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, 0)
|
|
return
|
|
}
|
|
file.Close()
|
|
|
|
fileName := util.SafeString(fileHeader.Filename)
|
|
|
|
// Create a message to send to Kafka
|
|
msg := ScreenshotMessage{
|
|
Name: fileName,
|
|
Data: fileBytes,
|
|
}
|
|
data, err := json.Marshal(&msg)
|
|
if err != nil {
|
|
e.log.Warn(r.Context(), "can't marshal screenshot message, err: %s", err)
|
|
continue
|
|
}
|
|
|
|
// Send the message to queue
|
|
if err := e.services.Producer.Produce(e.cfg.TopicCanvasImages, sessionData.ID, data); err != nil {
|
|
e.log.Warn(r.Context(), "can't send screenshot message to queue, err: %s", err)
|
|
}
|
|
}
|
|
}
|
|
e.ResponseOK(r.Context(), w, startTime, r.URL.Path, 0)
|
|
}
|
|
|
|
func (e *Router) getTags(w http.ResponseWriter, r *http.Request) {
|
|
startTime := time.Now()
|
|
bodySize := 0
|
|
|
|
// Check authorization
|
|
sessionData, err := e.services.Tokenizer.ParseFromHTTPRequest(r)
|
|
if sessionData != nil {
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
}
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
sessInfo, err := e.services.Sessions.Get(sessionData.ID)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusUnauthorized, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
|
|
// Add sessionID and projectID to context
|
|
r = r.WithContext(context.WithValue(r.Context(), "sessionID", fmt.Sprintf("%d", sessionData.ID)))
|
|
r = r.WithContext(context.WithValue(r.Context(), "projectID", fmt.Sprintf("%d", sessInfo.ProjectID)))
|
|
|
|
// Get tags
|
|
tags, err := e.services.Tags.Get(sessInfo.ProjectID)
|
|
if err != nil {
|
|
e.ResponseWithError(r.Context(), w, http.StatusInternalServerError, err, startTime, r.URL.Path, bodySize)
|
|
return
|
|
}
|
|
type UrlResponse struct {
|
|
Tags interface{} `json:"tags"`
|
|
}
|
|
e.ResponseWithJSON(r.Context(), w, &UrlResponse{Tags: tags}, startTime, r.URL.Path, bodySize)
|
|
}
|