Compare commits

...

6 commits
0.0.5 ... main

Author SHA1 Message Date
7905faa411
Release 0.0.8
All checks were successful
Run Tests on Code / run-tests (push) Successful in 42s
Build and release binary file and packages / test (push) Successful in 44s
Build and release binary file and packages / build (push) Successful in 41s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 13s
2024-08-07 23:01:22 +02:00
838414f9d6
Use Authorization Header instead of Bearer Auth Header
All checks were successful
Run Tests on Code / run-tests (push) Successful in 20s
2024-08-07 23:01:12 +02:00
a9245c1a3c
Release 0.0.7
All checks were successful
Run Tests on Code / run-tests (push) Successful in 42s
Build and release binary file and packages / test (push) Successful in 40s
Build and release binary file and packages / build (push) Successful in 41s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 8s
2024-08-07 22:50:12 +02:00
3e27cad6a8
Fix Scan Trigger by providing JWT Auth
All checks were successful
Run Tests on Code / run-tests (push) Successful in 15s
2024-08-07 22:50:02 +02:00
3abca4c124
Release 0.0.6
All checks were successful
Run Tests on Code / run-tests (push) Successful in 36s
Build and release binary file and packages / test (push) Successful in 37s
Build and release binary file and packages / build (push) Successful in 40s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 9s
2024-08-07 22:34:21 +02:00
37ec615cbd
Hotfix 2024-08-07 22:34:10 +02:00
3 changed files with 47 additions and 23 deletions

2
Cargo.lock generated
View file

@ -34,7 +34,7 @@ dependencies = [
[[package]] [[package]]
name = "api-backend" name = "api-backend"
version = "0.0.5" version = "0.0.8"
dependencies = [ dependencies = [
"axum", "axum",
"chrono", "chrono",

View file

@ -1,7 +1,7 @@
[package] [package]
authors = ["Neshura"] authors = ["Neshura"]
name = "api-backend" name = "api-backend"
version = "0.0.5" version = "0.0.8"
edition = "2021" edition = "2021"
description = "API Backend For Easier Uploading To Kavita" description = "API Backend For Easier Uploading To Kavita"
license = "GPL-3.0-or-later" license = "GPL-3.0-or-later"

View file

@ -1,7 +1,6 @@
mod logging; mod logging;
use std::collections::HashMap; use std::collections::HashMap;
use std::fmt::format;
use std::path::{Path, PathBuf}; use std::path::{Path, PathBuf};
use axum::body::BodyDataStream; use axum::body::BodyDataStream;
use axum::extract::{Request, State}; use axum::extract::{Request, State};
@ -11,8 +10,7 @@ use axum::routing::post;
use dotenv::{dotenv, var}; use dotenv::{dotenv, var};
use futures::TryStreamExt; use futures::TryStreamExt;
use log::LevelFilter; use log::LevelFilter;
use reqwest::{Error, Response}; use serde::{Deserialize, Serialize};
use serde::Serialize;
use systemd_journal_logger::JournalLog; use systemd_journal_logger::JournalLog;
use tokio::fs::File; use tokio::fs::File;
use tokio::{fs, io}; use tokio::{fs, io};
@ -200,10 +198,15 @@ async fn upload_file(state: &mut App, request: Request) {
///$KAVITA_URL/api/Library/scan-folder ///$KAVITA_URL/api/Library/scan-folder
let client = reqwest::Client::new(); let client = reqwest::Client::new();
let jwt_url = format!("{}/api/Plugin/authenticate?apiKey={}&pluginName=kwm-api", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file"), var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file"));
match client.post(jwt_url).send().await {
Ok(data) => {
let auth: PluginAuthResponse = serde_json::from_str(&data.text().await.unwrap()).unwrap();
let url = format!("{}/api/Library/scan-folder", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file")); let url = format!("{}/api/Library/scan-folder", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file"));
let request_body = LibraryScanBody { let request_body = LibraryScanBody {
directory: file.format, folder_path: file.format,
api_key: var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file") api_key: var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file")
}; };
@ -211,6 +214,7 @@ async fn upload_file(state: &mut App, request: Request) {
let res = client let res = client
.post(url) .post(url)
.header(reqwest::header::AUTHORIZATION, auth.token)
.body(body) .body(body)
.send() .send()
.await; .await;
@ -223,6 +227,14 @@ async fn upload_file(state: &mut App, request: Request) {
state.log.error(format!("Error Triggering Library Scan: {e}")); state.log.error(format!("Error Triggering Library Scan: {e}"));
} }
} }
}
Err(e) => {
}
}
} }
async fn stream_to_file(path: &PathBuf, stream: BodyDataStream) -> Result<(), (StatusCode, String)> async fn stream_to_file(path: &PathBuf, stream: BodyDataStream) -> Result<(), (StatusCode, String)>
@ -249,6 +261,18 @@ async fn stream_to_file(path: &PathBuf, stream: BodyDataStream) -> Result<(), (S
#[derive(Serialize)] #[derive(Serialize)]
#[serde(rename_all="camelCase")] #[serde(rename_all="camelCase")]
struct LibraryScanBody { struct LibraryScanBody {
directory: String, folder_path: String,
api_key: String, api_key: String,
} }
#[derive(Deserialize)]
#[serde(rename_all="camelCase")]
struct PluginAuthResponse {
username: String,
token: String,
refresh_token: String,
api_key: String,
preferences: serde_json::Value,
age_restriction: serde_json::Value,
kavita_version: String
}