Compare commits

...

6 commits
0.0.5 ... main

Author SHA1 Message Date
7905faa411
Release 0.0.8
All checks were successful
Run Tests on Code / run-tests (push) Successful in 42s
Build and release binary file and packages / test (push) Successful in 44s
Build and release binary file and packages / build (push) Successful in 41s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 13s
2024-08-07 23:01:22 +02:00
838414f9d6
Use Authorization Header instead of Bearer Auth Header
All checks were successful
Run Tests on Code / run-tests (push) Successful in 20s
2024-08-07 23:01:12 +02:00
a9245c1a3c
Release 0.0.7
All checks were successful
Run Tests on Code / run-tests (push) Successful in 42s
Build and release binary file and packages / test (push) Successful in 40s
Build and release binary file and packages / build (push) Successful in 41s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 8s
2024-08-07 22:50:12 +02:00
3e27cad6a8
Fix Scan Trigger by providing JWT Auth
All checks were successful
Run Tests on Code / run-tests (push) Successful in 15s
2024-08-07 22:50:02 +02:00
3abca4c124
Release 0.0.6
All checks were successful
Run Tests on Code / run-tests (push) Successful in 36s
Build and release binary file and packages / test (push) Successful in 37s
Build and release binary file and packages / build (push) Successful in 40s
Build and release binary file and packages / upload-generic-package (push) Successful in 1s
Build and release binary file and packages / upload-debian-package (push) Successful in 2s
Build and release binary file and packages / create-release (push) Successful in 9s
2024-08-07 22:34:21 +02:00
37ec615cbd
Hotfix 2024-08-07 22:34:10 +02:00
3 changed files with 47 additions and 23 deletions

2
Cargo.lock generated
View file

@ -34,7 +34,7 @@ dependencies = [
[[package]]
name = "api-backend"
version = "0.0.5"
version = "0.0.8"
dependencies = [
"axum",
"chrono",

View file

@ -1,7 +1,7 @@
[package]
authors = ["Neshura"]
name = "api-backend"
version = "0.0.5"
version = "0.0.8"
edition = "2021"
description = "API Backend For Easier Uploading To Kavita"
license = "GPL-3.0-or-later"

View file

@ -1,7 +1,6 @@
mod logging;
use std::collections::HashMap;
use std::fmt::format;
use std::path::{Path, PathBuf};
use axum::body::BodyDataStream;
use axum::extract::{Request, State};
@ -11,8 +10,7 @@ use axum::routing::post;
use dotenv::{dotenv, var};
use futures::TryStreamExt;
use log::LevelFilter;
use reqwest::{Error, Response};
use serde::Serialize;
use serde::{Deserialize, Serialize};
use systemd_journal_logger::JournalLog;
use tokio::fs::File;
use tokio::{fs, io};
@ -200,29 +198,43 @@ async fn upload_file(state: &mut App, request: Request) {
///$KAVITA_URL/api/Library/scan-folder
let client = reqwest::Client::new();
let url = format!("{}/api/Library/scan-folder", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file"));
let jwt_url = format!("{}/api/Plugin/authenticate?apiKey={}&pluginName=kwm-api", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file"), var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file"));
let request_body = LibraryScanBody {
directory: file.format,
api_key: var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file")
};
match client.post(jwt_url).send().await {
Ok(data) => {
let auth: PluginAuthResponse = serde_json::from_str(&data.text().await.unwrap()).unwrap();
let url = format!("{}/api/Library/scan-folder", var("KAVITA_URL").expect("KAVITA_URL needs to be set in the .env file"));
let body = serde_json::to_string::<LibraryScanBody>(&request_body).expect("Unable to Parse LibraryScanBody");
let request_body = LibraryScanBody {
folder_path: file.format,
api_key: var("KAVITA_API_KEY").expect("KAVITA_API_KEY needs to be set in the .env file")
};
let res = client
.post(url)
.body(body)
.send()
.await;
let body = serde_json::to_string::<LibraryScanBody>(&request_body).expect("Unable to Parse LibraryScanBody");
match res {
Ok(_) => {
state.log.info("Scan Triggered".to_string());
let res = client
.post(url)
.header(reqwest::header::AUTHORIZATION, auth.token)
.body(body)
.send()
.await;
match res {
Ok(_) => {
state.log.info("Scan Triggered".to_string());
}
Err(e) => {
state.log.error(format!("Error Triggering Library Scan: {e}"));
}
}
}
Err(e) => {
state.log.error(format!("Error Triggering Library Scan: {e}"));
}
}
}
async fn stream_to_file(path: &PathBuf, stream: BodyDataStream) -> Result<(), (StatusCode, String)>
@ -249,6 +261,18 @@ async fn stream_to_file(path: &PathBuf, stream: BodyDataStream) -> Result<(), (S
#[derive(Serialize)]
#[serde(rename_all="camelCase")]
struct LibraryScanBody {
directory: String,
folder_path: String,
api_key: String,
}
#[derive(Deserialize)]
#[serde(rename_all="camelCase")]
struct PluginAuthResponse {
username: String,
token: String,
refresh_token: String,
api_key: String,
preferences: serde_json::Value,
age_restriction: serde_json::Value,
kavita_version: String
}