twitch-manager/api.go
Knut Ahlers dd4203c187
Switch to eventsub after webhook deprecation
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2021-09-22 20:47:42 +02:00

309 lines
7.6 KiB
Go

package main
import (
"crypto/sha256"
"encoding/json"
"fmt"
"net/http"
"strings"
"sync"
"time"
"github.com/gofrs/uuid"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus"
"github.com/gorilla/mux"
"github.com/gorilla/websocket"
)
const (
msgTypeAlert string = "alert"
msgTypeBits string = "bits"
msgTypeCustom string = "custom"
msgTypeDonation string = "donation"
msgTypeFollow string = "follow"
msgTypeHost string = "host"
msgTypeRaid string = "raid"
msgTypeStore string = "store"
msgTypeSub string = "sub"
msgTypeSubGift string = "subgift"
msgTypeReplay string = "replay"
)
var subscriptions = newSubscriptionStore()
type socketMessage struct {
Payload interface{} `json:"payload"`
Replay bool `json:"replay"`
Time *time.Time `json:"time,omitempty"`
Type string `json:"type"`
Version string `json:"version"`
}
type subcriptionStore struct {
socketSubscriptions map[string]func(socketMessage) error
socketSubscriptionsLock *sync.RWMutex
}
func newSubscriptionStore() *subcriptionStore {
return &subcriptionStore{
socketSubscriptions: map[string]func(socketMessage) error{},
socketSubscriptionsLock: new(sync.RWMutex),
}
}
func (s subcriptionStore) SendAllSockets(msgType string, msg interface{}, replay, storeEvent bool) error {
s.socketSubscriptionsLock.RLock()
defer s.socketSubscriptionsLock.RUnlock()
for _, hdl := range s.socketSubscriptions {
if err := hdl(compileSocketMessage(msgType, msg, replay, nil)); err != nil {
return errors.Wrap(err, "submit message")
}
}
if replay || !storeEvent {
return nil
}
if err := store.WithModLock(func() error {
data, err := json.Marshal(msg)
if err != nil {
return errors.Wrap(err, "marshalling message")
}
store.Events = append(store.Events, storedEvent{
Time: time.Now(),
Type: msgType,
Message: data,
})
return nil
}); err != nil {
return errors.Wrap(err, "storing event")
}
return errors.Wrap(store.Save(cfg.StoreFile), "saving store")
}
func (s *subcriptionStore) SubscribeSocket(id string, hdl func(socketMessage) error) {
s.socketSubscriptionsLock.Lock()
defer s.socketSubscriptionsLock.Unlock()
s.socketSubscriptions[id] = hdl
}
func (s *subcriptionStore) UnsubscribeSocket(id string) {
s.socketSubscriptionsLock.Lock()
defer s.socketSubscriptionsLock.Unlock()
delete(s.socketSubscriptions, id)
}
func compileSocketMessage(msgType string, msg interface{}, replay bool, overrideTime *time.Time) socketMessage {
versionParts := []string{version}
for _, asset := range assetVersions.Keys() {
versionParts = append(versionParts, assetVersions.Get(asset))
}
hash := sha256.New()
hash.Write([]byte(strings.Join(versionParts, "/")))
ver := fmt.Sprintf("%x", hash.Sum(nil))
out := socketMessage{
Payload: msg,
Replay: replay,
Type: msgType,
Version: ver,
}
if overrideTime != nil {
out.Time = overrideTime
}
return out
}
var upgrader = websocket.Upgrader{
ReadBufferSize: 1024,
WriteBufferSize: 1024,
}
func registerAPI(r *mux.Router) {
r.HandleFunc("/api/custom-alert", handleCustomAlert).Methods(http.MethodPost)
r.HandleFunc("/api/custom-event", handleCustomEvent).Methods(http.MethodPost)
r.HandleFunc("/api/demo/{event}", handleDemoAlert).Methods(http.MethodPut)
r.HandleFunc("/api/follows/clear-last", handleSetLastFollower).Methods(http.MethodPut)
r.HandleFunc("/api/follows/set-last/{name}", handleSetLastFollower).Methods(http.MethodPut)
r.HandleFunc("/api/subscribe", handleUpdateSocket).Methods(http.MethodGet)
r.HandleFunc("/api/webhook/{type}", handleWebHookPush)
r.HandleFunc("/api/eventsys", handleEventsubPush)
}
func handleCustomAlert(w http.ResponseWriter, r *http.Request) {
var alert struct {
Sound *string `json:"sound"`
Text string `json:"text"`
Title string `json:"title"`
Variant *string `json:"variant"`
}
if err := json.NewDecoder(r.Body).Decode(&alert); err != nil {
http.Error(w, errors.Wrap(err, "parse request body").Error(), http.StatusBadRequest)
return
}
if alert.Title == "" || alert.Text == "" {
http.Error(w, "empty title or text", http.StatusBadRequest)
return
}
if err := subscriptions.SendAllSockets(msgTypeAlert, alert, false, true); err != nil {
http.Error(w, errors.Wrap(err, "send to sockets").Error(), http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusCreated)
}
func handleCustomEvent(w http.ResponseWriter, r *http.Request) {
var event struct {
Data string `json:"data"`
}
if err := json.NewDecoder(r.Body).Decode(&event); err != nil {
http.Error(w, errors.Wrap(err, "parse request body").Error(), http.StatusBadRequest)
return
}
if err := subscriptions.SendAllSockets(msgTypeCustom, event, false, true); err != nil {
http.Error(w, errors.Wrap(err, "send to sockets").Error(), http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusCreated)
}
func handleSetLastFollower(w http.ResponseWriter, r *http.Request) {
name := mux.Vars(r)["name"]
if name == "" {
store.Followers.Last = nil
} else {
store.Followers.Last = &name
}
if err := store.Save(cfg.StoreFile); err != nil {
log.WithError(err).Error("Unable to update persistent store")
}
if err := subscriptions.SendAllSockets(msgTypeStore, store, false, false); err != nil {
log.WithError(err).Error("Unable to send update to all sockets")
}
w.WriteHeader(http.StatusAccepted)
}
func handleUpdateSocket(w http.ResponseWriter, r *http.Request) {
// Upgrade connection to socket
conn, err := upgrader.Upgrade(w, r, nil)
if err != nil {
log.WithError(err).Error("Unable to upgrade socket")
return
}
defer conn.Close()
// Register listener
var (
connLock = new(sync.Mutex)
id = uuid.Must(uuid.NewV4()).String()
)
subscriptions.SubscribeSocket(id, func(msg socketMessage) error {
connLock.Lock()
defer connLock.Unlock()
return conn.WriteJSON(msg)
})
defer subscriptions.UnsubscribeSocket(id)
keepAlive := time.NewTicker(5 * time.Second)
defer keepAlive.Stop()
go func() {
for range keepAlive.C {
connLock.Lock()
if err := conn.WriteMessage(websocket.PingMessage, nil); err != nil {
log.WithError(err).Error("Unable to send ping message")
connLock.Unlock()
conn.Close()
return
}
connLock.Unlock()
}
}()
connLock.Lock()
if err := conn.WriteJSON(compileSocketMessage(msgTypeStore, store, false, nil)); err != nil {
log.WithError(err).Error("Unable to send initial state")
return
}
connLock.Unlock()
// Handle socket
for {
messageType, p, err := conn.ReadMessage()
if err != nil {
log.WithError(err).Error("Unable to read from socket")
return
}
switch messageType {
case websocket.TextMessage:
// This is fine and expected
case websocket.BinaryMessage:
// Wat?
log.Warn("Got binary message from socket, disconnecting...")
return
case websocket.CloseMessage:
// They want to go? Fine, have it that way!
return
default:
log.Debug("Got unhandled message from socket: %d", messageType)
continue
}
var recvMsg socketMessage
if err = json.Unmarshal(p, &recvMsg); err != nil {
log.Warn("Got unreadable message from socket, disconnecting...")
return
}
switch recvMsg.Type {
case msgTypeReplay:
if err = store.WithModRLock(func() error {
connLock.Lock()
defer connLock.Unlock()
for _, evt := range store.Events {
if err := conn.WriteJSON(compileSocketMessage(evt.Type, evt.Message, true, &evt.Time)); err != nil {
return errors.Wrap(err, "sending replay message")
}
}
return nil
}); err != nil {
log.WithError(err).Error("Unable to replay messages")
}
default:
log.WithField("type", recvMsg.Type).Warn("Got unexpected message type from frontend")
}
}
}