mirror of
https://github.com/mountain-loop/yaak.git
synced 2026-02-23 02:54:58 +01:00
811 lines
28 KiB
Rust
811 lines
28 KiB
Rust
use crate::error::Error::{
|
|
AuthPluginNotFound, ClientNotInitializedErr, PluginErr, PluginNotFoundErr, UnknownEventErr,
|
|
};
|
|
use crate::error::Result;
|
|
use crate::events::{
|
|
BootRequest, CallGrpcRequestActionRequest, CallHttpAuthenticationActionArgs,
|
|
CallHttpAuthenticationActionRequest, CallHttpAuthenticationRequest,
|
|
CallHttpAuthenticationResponse, CallHttpRequestActionRequest, CallTemplateFunctionArgs,
|
|
CallTemplateFunctionRequest, CallTemplateFunctionResponse, EmptyPayload, ErrorResponse,
|
|
FilterRequest, FilterResponse, GetGrpcRequestActionsResponse,
|
|
GetHttpAuthenticationConfigRequest, GetHttpAuthenticationConfigResponse,
|
|
GetHttpAuthenticationSummaryResponse, GetHttpRequestActionsResponse,
|
|
GetTemplateFunctionsResponse, GetThemesRequest, GetThemesResponse, ImportRequest,
|
|
ImportResponse, InternalEvent, InternalEventPayload, JsonPrimitive, PluginWindowContext,
|
|
RenderPurpose,
|
|
};
|
|
use crate::native_template_functions::template_function_secure;
|
|
use crate::nodejs::start_nodejs_plugin_runtime;
|
|
use crate::plugin_handle::PluginHandle;
|
|
use crate::server_ws::PluginRuntimeServerWebsocket;
|
|
use log::{error, info, warn};
|
|
use std::collections::HashMap;
|
|
use std::env;
|
|
use std::path::{Path, PathBuf};
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
use tauri::path::BaseDirectory;
|
|
use tauri::{AppHandle, Manager, Runtime, WebviewWindow, is_dev};
|
|
use tokio::fs::read_dir;
|
|
use tokio::net::TcpListener;
|
|
use tokio::sync::{Mutex, mpsc};
|
|
use tokio::time::{Instant, timeout};
|
|
use yaak_models::query_manager::QueryManagerExt;
|
|
use yaak_models::util::generate_id;
|
|
use yaak_templates::error::Error::RenderError;
|
|
use yaak_templates::error::Result as TemplateResult;
|
|
|
|
#[derive(Clone)]
|
|
pub struct PluginManager {
|
|
subscribers: Arc<Mutex<HashMap<String, mpsc::Sender<InternalEvent>>>>,
|
|
plugins: Arc<Mutex<Vec<PluginHandle>>>,
|
|
kill_tx: tokio::sync::watch::Sender<bool>,
|
|
ws_service: Arc<PluginRuntimeServerWebsocket>,
|
|
vendored_plugin_dir: PathBuf,
|
|
pub(crate) installed_plugin_dir: PathBuf,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct PluginCandidate {
|
|
dir: String,
|
|
}
|
|
|
|
impl PluginManager {
|
|
pub fn new<R: Runtime>(app_handle: AppHandle<R>) -> PluginManager {
|
|
let (events_tx, mut events_rx) = mpsc::channel(128);
|
|
let (kill_server_tx, kill_server_rx) = tokio::sync::watch::channel(false);
|
|
|
|
let (client_disconnect_tx, mut client_disconnect_rx) = mpsc::channel(128);
|
|
let (client_connect_tx, mut client_connect_rx) = tokio::sync::watch::channel(false);
|
|
let ws_service =
|
|
PluginRuntimeServerWebsocket::new(events_tx, client_disconnect_tx, client_connect_tx);
|
|
|
|
let vendored_plugin_dir = app_handle
|
|
.path()
|
|
.resolve("vendored/plugins", BaseDirectory::Resource)
|
|
.expect("failed to resolve plugin directory resource");
|
|
|
|
let installed_plugin_dir = app_handle
|
|
.path()
|
|
.app_data_dir()
|
|
.expect("failed to get app data dir")
|
|
.join("installed-plugins");
|
|
|
|
let plugin_manager = PluginManager {
|
|
plugins: Default::default(),
|
|
subscribers: Default::default(),
|
|
ws_service: Arc::new(ws_service.clone()),
|
|
kill_tx: kill_server_tx,
|
|
vendored_plugin_dir,
|
|
installed_plugin_dir,
|
|
};
|
|
|
|
// Forward events to subscribers
|
|
let subscribers = plugin_manager.subscribers.clone();
|
|
tauri::async_runtime::spawn(async move {
|
|
while let Some(event) = events_rx.recv().await {
|
|
for (tx_id, tx) in subscribers.lock().await.iter_mut() {
|
|
if let Err(e) = tx.try_send(event.clone()) {
|
|
warn!("Failed to send event to subscriber {tx_id} {e:?}");
|
|
}
|
|
}
|
|
}
|
|
});
|
|
|
|
// Handle when client plugin runtime disconnects
|
|
tauri::async_runtime::spawn(async move {
|
|
while let Some(_) = client_disconnect_rx.recv().await {
|
|
// Happens when the app is closed
|
|
info!("Plugin runtime client disconnected");
|
|
}
|
|
});
|
|
|
|
let listen_addr = match option_env!("YAAK_PLUGIN_SERVER_PORT") {
|
|
Some(port) => format!("127.0.0.1:{port}"),
|
|
None => "127.0.0.1:0".to_string(),
|
|
};
|
|
let listener = tauri::async_runtime::block_on(async move {
|
|
TcpListener::bind(listen_addr).await.expect("Failed to bind TCP listener")
|
|
});
|
|
let addr = listener.local_addr().expect("Failed to get local address");
|
|
|
|
// 1. Reload all plugins when the Node.js runtime connects
|
|
let init_plugins_task = {
|
|
let plugin_manager = plugin_manager.clone();
|
|
let app_handle = app_handle.clone();
|
|
tauri::async_runtime::spawn(async move {
|
|
match client_connect_rx.changed().await {
|
|
Ok(_) => {
|
|
info!("Plugin runtime client connected!");
|
|
plugin_manager
|
|
.initialize_all_plugins(&app_handle, &PluginWindowContext::None)
|
|
.await
|
|
.expect("Failed to reload plugins");
|
|
}
|
|
Err(e) => {
|
|
warn!("Failed to receive from client connection rx {e:?}");
|
|
}
|
|
}
|
|
})
|
|
};
|
|
|
|
// 1. Spawn server in the background
|
|
info!("Starting plugin server on {addr}");
|
|
tauri::async_runtime::spawn(async move {
|
|
ws_service.listen(listener).await;
|
|
});
|
|
|
|
// 2. Start Node.js runtime and initialize plugins
|
|
tauri::async_runtime::block_on(async move {
|
|
start_nodejs_plugin_runtime(&app_handle, addr, &kill_server_rx).await.unwrap();
|
|
info!("Waiting for plugins to initialize");
|
|
init_plugins_task.await.unwrap();
|
|
});
|
|
|
|
// 3. Block waiting for plugins to initialize
|
|
tauri::async_runtime::block_on(async move {});
|
|
|
|
plugin_manager
|
|
}
|
|
|
|
async fn list_plugin_dirs<R: Runtime>(
|
|
&self,
|
|
app_handle: &AppHandle<R>,
|
|
) -> Vec<PluginCandidate> {
|
|
let plugins_dir = if is_dev() {
|
|
// Use plugins directly for easy development
|
|
env::current_dir()
|
|
.map(|cwd| cwd.join("../plugins").canonicalize().unwrap())
|
|
.unwrap_or_else(|_| self.vendored_plugin_dir.to_path_buf())
|
|
} else {
|
|
self.vendored_plugin_dir.to_path_buf()
|
|
};
|
|
|
|
info!("Loading bundled plugins from {plugins_dir:?}");
|
|
|
|
let bundled_plugin_dirs: Vec<PluginCandidate> = read_plugins_dir(&plugins_dir)
|
|
.await
|
|
.expect(format!("Failed to read plugins dir: {:?}", plugins_dir).as_str())
|
|
.iter()
|
|
.map(|d| PluginCandidate { dir: d.into() })
|
|
.collect();
|
|
|
|
let plugins = app_handle.db().list_plugins().unwrap_or_default();
|
|
let installed_plugin_dirs: Vec<PluginCandidate> = plugins
|
|
.iter()
|
|
.map(|p| PluginCandidate {
|
|
dir: p.directory.to_owned(),
|
|
})
|
|
.collect();
|
|
|
|
[bundled_plugin_dirs, installed_plugin_dirs].concat()
|
|
}
|
|
|
|
pub async fn uninstall(&self, window_context: &PluginWindowContext, dir: &str) -> Result<()> {
|
|
let plugin = self.get_plugin_by_dir(dir).await.ok_or(PluginNotFoundErr(dir.to_string()))?;
|
|
self.remove_plugin(window_context, &plugin).await
|
|
}
|
|
|
|
async fn remove_plugin(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
plugin: &PluginHandle,
|
|
) -> Result<()> {
|
|
// Terminate the plugin
|
|
plugin.terminate(window_context).await?;
|
|
|
|
// Remove the plugin from the list
|
|
let mut plugins = self.plugins.lock().await;
|
|
let pos = plugins.iter().position(|p| p.ref_id == plugin.ref_id);
|
|
if let Some(pos) = pos {
|
|
plugins.remove(pos);
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn add_plugin_by_dir(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
dir: &str,
|
|
) -> Result<()> {
|
|
info!("Adding plugin by dir {dir}");
|
|
|
|
let maybe_tx = self.ws_service.app_to_plugin_events_tx.lock().await;
|
|
let tx = match &*maybe_tx {
|
|
None => return Err(ClientNotInitializedErr),
|
|
Some(tx) => tx,
|
|
};
|
|
let plugin_handle = PluginHandle::new(dir, tx.clone())?;
|
|
let dir_path = Path::new(dir);
|
|
let is_vendored = dir_path.starts_with(self.vendored_plugin_dir.as_path());
|
|
let is_installed = dir_path.starts_with(self.installed_plugin_dir.as_path());
|
|
|
|
// Boot the plugin
|
|
let event = timeout(
|
|
Duration::from_secs(5),
|
|
self.send_to_plugin_and_wait(
|
|
window_context,
|
|
&plugin_handle,
|
|
&InternalEventPayload::BootRequest(BootRequest {
|
|
dir: dir.to_string(),
|
|
watch: !is_vendored && !is_installed,
|
|
}),
|
|
),
|
|
)
|
|
.await??;
|
|
|
|
let mut plugins = self.plugins.lock().await;
|
|
|
|
// Remove the existing plugin (if exists) before adding this one
|
|
plugins.retain(|p| p.dir != dir);
|
|
plugins.push(plugin_handle.clone());
|
|
|
|
let _ = match event.payload {
|
|
InternalEventPayload::BootResponse(resp) => resp,
|
|
_ => return Err(UnknownEventErr),
|
|
};
|
|
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn initialize_all_plugins<R: Runtime>(
|
|
&self,
|
|
app_handle: &AppHandle<R>,
|
|
window_context: &PluginWindowContext,
|
|
) -> Result<()> {
|
|
let start = Instant::now();
|
|
let candidates = self.list_plugin_dirs(app_handle).await;
|
|
for candidate in candidates.clone() {
|
|
// First remove the plugin if it exists
|
|
if let Some(plugin) = self.get_plugin_by_dir(candidate.dir.as_str()).await {
|
|
if let Err(e) = self.remove_plugin(window_context, &plugin).await {
|
|
error!("Failed to remove plugin {} {e:?}", candidate.dir);
|
|
continue;
|
|
}
|
|
}
|
|
if let Err(e) = self.add_plugin_by_dir(window_context, candidate.dir.as_str()).await {
|
|
warn!("Failed to add plugin {} {e:?}", candidate.dir);
|
|
}
|
|
}
|
|
|
|
let plugins = self.plugins.lock().await;
|
|
let names = plugins.iter().map(|p| p.dir.to_string()).collect::<Vec<String>>();
|
|
info!(
|
|
"Initialized {} plugins in {:?}:\n - {}",
|
|
plugins.len(),
|
|
start.elapsed(),
|
|
names.join("\n - "),
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn subscribe(&self, label: &str) -> (String, mpsc::Receiver<InternalEvent>) {
|
|
let (tx, rx) = mpsc::channel(128);
|
|
let rx_id = format!("{label}_{}", generate_id());
|
|
self.subscribers.lock().await.insert(rx_id.clone(), tx);
|
|
(rx_id, rx)
|
|
}
|
|
|
|
pub async fn unsubscribe(&self, rx_id: &str) {
|
|
self.subscribers.lock().await.remove(rx_id);
|
|
}
|
|
|
|
pub async fn terminate(&self) {
|
|
self.kill_tx.send_replace(true);
|
|
|
|
// Give it a bit of time to kill
|
|
tokio::time::sleep(Duration::from_millis(500)).await;
|
|
}
|
|
|
|
pub async fn reply(
|
|
&self,
|
|
source_event: &InternalEvent,
|
|
payload: &InternalEventPayload,
|
|
) -> Result<()> {
|
|
let window_context = source_event.to_owned().window_context;
|
|
let reply_id = Some(source_event.to_owned().id);
|
|
let plugin = self
|
|
.get_plugin_by_ref_id(source_event.plugin_ref_id.as_str())
|
|
.await
|
|
.ok_or(PluginNotFoundErr(source_event.plugin_ref_id.to_string()))?;
|
|
let event = plugin.build_event_to_send_raw(&window_context, &payload, reply_id);
|
|
plugin.send(&event).await
|
|
}
|
|
|
|
pub async fn get_plugin_by_ref_id(&self, ref_id: &str) -> Option<PluginHandle> {
|
|
self.plugins.lock().await.iter().find(|p| p.ref_id == ref_id).cloned()
|
|
}
|
|
|
|
pub async fn get_plugin_by_dir(&self, dir: &str) -> Option<PluginHandle> {
|
|
self.plugins.lock().await.iter().find(|p| p.dir == dir).cloned()
|
|
}
|
|
|
|
pub async fn get_plugin_by_name(&self, name: &str) -> Option<PluginHandle> {
|
|
for plugin in self.plugins.lock().await.iter().cloned() {
|
|
let info = plugin.info();
|
|
if info.name == name {
|
|
return Some(plugin);
|
|
}
|
|
}
|
|
None
|
|
}
|
|
|
|
async fn send_to_plugin_and_wait(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
plugin: &PluginHandle,
|
|
payload: &InternalEventPayload,
|
|
) -> Result<InternalEvent> {
|
|
let events =
|
|
self.send_to_plugins_and_wait(window_context, payload, vec![plugin.to_owned()]).await?;
|
|
Ok(events.first().unwrap().to_owned())
|
|
}
|
|
|
|
async fn send_and_wait(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
payload: &InternalEventPayload,
|
|
) -> Result<Vec<InternalEvent>> {
|
|
let plugins = { self.plugins.lock().await.clone() };
|
|
self.send_to_plugins_and_wait(window_context, payload, plugins).await
|
|
}
|
|
|
|
async fn send_to_plugins_and_wait(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
payload: &InternalEventPayload,
|
|
plugins: Vec<PluginHandle>,
|
|
) -> Result<Vec<InternalEvent>> {
|
|
let label = format!("wait[{}]", plugins.len());
|
|
let (rx_id, mut rx) = self.subscribe(label.as_str()).await;
|
|
|
|
// 1. Build the events with IDs and everything
|
|
let events_to_send = plugins
|
|
.iter()
|
|
.map(|p| p.build_event_to_send(window_context, payload, None))
|
|
.collect::<Vec<InternalEvent>>();
|
|
|
|
// 2. Spawn thread to subscribe to incoming events and check reply ids
|
|
let sub_events_fut = {
|
|
let events_to_send = events_to_send.clone();
|
|
|
|
tokio::spawn(async move {
|
|
let mut found_events = Vec::new();
|
|
|
|
while let Some(event) = rx.recv().await {
|
|
let matched_sent_event = events_to_send
|
|
.iter()
|
|
.find(|e| Some(e.id.to_owned()) == event.reply_id)
|
|
.is_some();
|
|
if matched_sent_event {
|
|
found_events.push(event.clone());
|
|
};
|
|
|
|
let found_them_all = found_events.len() == events_to_send.len();
|
|
if found_them_all {
|
|
break;
|
|
}
|
|
}
|
|
|
|
found_events
|
|
})
|
|
};
|
|
|
|
// 3. Send the events
|
|
for event in events_to_send {
|
|
let plugin = plugins
|
|
.iter()
|
|
.find(|p| p.ref_id == event.plugin_ref_id)
|
|
.expect("Didn't find plugin in list");
|
|
plugin.send(&event).await?
|
|
}
|
|
|
|
// 4. Join on the spawned thread
|
|
let events = sub_events_fut.await.expect("Thread didn't succeed");
|
|
|
|
// 5. Unsubscribe
|
|
self.unsubscribe(rx_id.as_str()).await;
|
|
|
|
Ok(events)
|
|
}
|
|
|
|
pub async fn get_themes<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
) -> Result<Vec<GetThemesResponse>> {
|
|
let reply_events = self
|
|
.send_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::GetThemesRequest(GetThemesRequest {}),
|
|
)
|
|
.await?;
|
|
|
|
let mut themes = Vec::new();
|
|
for event in reply_events {
|
|
if let InternalEventPayload::GetThemesResponse(resp) = event.payload {
|
|
themes.push(resp.clone());
|
|
}
|
|
}
|
|
|
|
Ok(themes)
|
|
}
|
|
|
|
pub async fn get_grpc_request_actions<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
) -> Result<Vec<GetGrpcRequestActionsResponse>> {
|
|
let reply_events = self
|
|
.send_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::GetGrpcRequestActionsRequest(EmptyPayload {}),
|
|
)
|
|
.await?;
|
|
|
|
let mut all_actions = Vec::new();
|
|
for event in reply_events {
|
|
if let InternalEventPayload::GetGrpcRequestActionsResponse(resp) = event.payload {
|
|
all_actions.push(resp.clone());
|
|
}
|
|
}
|
|
|
|
Ok(all_actions)
|
|
}
|
|
|
|
pub async fn get_http_request_actions<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
) -> Result<Vec<GetHttpRequestActionsResponse>> {
|
|
let reply_events = self
|
|
.send_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::GetHttpRequestActionsRequest(EmptyPayload {}),
|
|
)
|
|
.await?;
|
|
|
|
let mut all_actions = Vec::new();
|
|
for event in reply_events {
|
|
if let InternalEventPayload::GetHttpRequestActionsResponse(resp) = event.payload {
|
|
all_actions.push(resp.clone());
|
|
}
|
|
}
|
|
|
|
Ok(all_actions)
|
|
}
|
|
|
|
pub async fn get_template_functions<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
) -> Result<Vec<GetTemplateFunctionsResponse>> {
|
|
self.get_template_functions_with_context(&PluginWindowContext::new(&window)).await
|
|
}
|
|
|
|
pub async fn get_template_functions_with_context(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
) -> Result<Vec<GetTemplateFunctionsResponse>> {
|
|
let reply_events = self
|
|
.send_and_wait(window_context, &InternalEventPayload::GetTemplateFunctionsRequest)
|
|
.await?;
|
|
|
|
let mut result = Vec::new();
|
|
for event in reply_events {
|
|
if let InternalEventPayload::GetTemplateFunctionsResponse(resp) = event.payload {
|
|
result.push(resp.clone());
|
|
}
|
|
}
|
|
|
|
// Add Rust-based functions
|
|
result.push(GetTemplateFunctionsResponse {
|
|
plugin_ref_id: "__NATIVE__".to_string(), // Meh
|
|
functions: vec![template_function_secure()],
|
|
});
|
|
|
|
Ok(result)
|
|
}
|
|
|
|
pub async fn call_http_request_action<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
req: CallHttpRequestActionRequest,
|
|
) -> Result<()> {
|
|
let ref_id = req.plugin_ref_id.clone();
|
|
let plugin =
|
|
self.get_plugin_by_ref_id(ref_id.as_str()).await.ok_or(PluginNotFoundErr(ref_id))?;
|
|
let event = plugin.build_event_to_send(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::CallHttpRequestActionRequest(req),
|
|
None,
|
|
);
|
|
plugin.send(&event).await?;
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn call_grpc_request_action<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
req: CallGrpcRequestActionRequest,
|
|
) -> Result<()> {
|
|
let ref_id = req.plugin_ref_id.clone();
|
|
let plugin =
|
|
self.get_plugin_by_ref_id(ref_id.as_str()).await.ok_or(PluginNotFoundErr(ref_id))?;
|
|
let event = plugin.build_event_to_send(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::CallGrpcRequestActionRequest(req),
|
|
None,
|
|
);
|
|
plugin.send(&event).await?;
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn get_http_authentication_summaries<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
) -> Result<Vec<(PluginHandle, GetHttpAuthenticationSummaryResponse)>> {
|
|
let window_context = PluginWindowContext::new(window);
|
|
let reply_events = self
|
|
.send_and_wait(
|
|
&window_context,
|
|
&InternalEventPayload::GetHttpAuthenticationSummaryRequest(EmptyPayload {}),
|
|
)
|
|
.await?;
|
|
|
|
let mut results = Vec::new();
|
|
for event in reply_events {
|
|
if let InternalEventPayload::GetHttpAuthenticationSummaryResponse(resp) = event.payload
|
|
{
|
|
let plugin = self
|
|
.get_plugin_by_ref_id(&event.plugin_ref_id)
|
|
.await
|
|
.ok_or(PluginNotFoundErr(event.plugin_ref_id))?;
|
|
results.push((plugin, resp.clone()));
|
|
}
|
|
}
|
|
|
|
Ok(results)
|
|
}
|
|
|
|
pub async fn get_http_authentication_config<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
auth_name: &str,
|
|
values: HashMap<String, JsonPrimitive>,
|
|
request_id: &str,
|
|
) -> Result<GetHttpAuthenticationConfigResponse> {
|
|
let results = self.get_http_authentication_summaries(window).await?;
|
|
let plugin = results
|
|
.iter()
|
|
.find_map(|(p, r)| if r.name == auth_name { Some(p) } else { None })
|
|
.ok_or(PluginNotFoundErr(auth_name.into()))?;
|
|
|
|
let context_id = format!("{:x}", md5::compute(request_id.to_string()));
|
|
let event = self
|
|
.send_to_plugin_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&plugin,
|
|
&InternalEventPayload::GetHttpAuthenticationConfigRequest(
|
|
GetHttpAuthenticationConfigRequest { values, context_id },
|
|
),
|
|
)
|
|
.await?;
|
|
match event.payload {
|
|
InternalEventPayload::GetHttpAuthenticationConfigResponse(resp) => Ok(resp),
|
|
InternalEventPayload::EmptyResponse(_) => {
|
|
Err(PluginErr("Auth plugin returned empty".to_string()))
|
|
}
|
|
InternalEventPayload::ErrorResponse(e) => Err(PluginErr(e.error)),
|
|
e => Err(PluginErr(format!("Auth plugin returned invalid event {:?}", e))),
|
|
}
|
|
}
|
|
|
|
pub async fn call_http_authentication_action<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
auth_name: &str,
|
|
action_index: i32,
|
|
values: HashMap<String, JsonPrimitive>,
|
|
model_id: &str,
|
|
) -> Result<()> {
|
|
let results = self.get_http_authentication_summaries(window).await?;
|
|
let plugin = results
|
|
.iter()
|
|
.find_map(|(p, r)| if r.name == auth_name { Some(p) } else { None })
|
|
.ok_or(PluginNotFoundErr(auth_name.into()))?;
|
|
|
|
let context_id = format!("{:x}", md5::compute(model_id.to_string()));
|
|
self.send_to_plugin_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&plugin,
|
|
&InternalEventPayload::CallHttpAuthenticationActionRequest(
|
|
CallHttpAuthenticationActionRequest {
|
|
index: action_index,
|
|
plugin_ref_id: plugin.clone().ref_id,
|
|
args: CallHttpAuthenticationActionArgs { context_id, values },
|
|
},
|
|
),
|
|
)
|
|
.await?;
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn call_http_authentication<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
auth_name: &str,
|
|
req: CallHttpAuthenticationRequest,
|
|
) -> Result<CallHttpAuthenticationResponse> {
|
|
let disabled = match req.values.get("disabled") {
|
|
Some(JsonPrimitive::Boolean(v)) => v.clone(),
|
|
_ => false,
|
|
};
|
|
|
|
// Auth is disabled, so don't do anything
|
|
if disabled {
|
|
info!("Not applying disabled auth {:?}", auth_name);
|
|
return Ok(CallHttpAuthenticationResponse {
|
|
set_headers: None,
|
|
set_query_parameters: None,
|
|
});
|
|
}
|
|
|
|
let handlers = self.get_http_authentication_summaries(window).await?;
|
|
let (plugin, _) = handlers
|
|
.iter()
|
|
.find(|(_, a)| a.name == auth_name)
|
|
.ok_or(AuthPluginNotFound(auth_name.to_string()))?;
|
|
|
|
let event = self
|
|
.send_to_plugin_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&plugin,
|
|
&InternalEventPayload::CallHttpAuthenticationRequest(req),
|
|
)
|
|
.await?;
|
|
match event.payload {
|
|
InternalEventPayload::CallHttpAuthenticationResponse(resp) => Ok(resp),
|
|
InternalEventPayload::EmptyResponse(_) => {
|
|
Err(PluginErr("Auth plugin returned empty".to_string()))
|
|
}
|
|
InternalEventPayload::ErrorResponse(e) => Err(PluginErr(e.error)),
|
|
e => Err(PluginErr(format!("Auth plugin returned invalid event {:?}", e))),
|
|
}
|
|
}
|
|
|
|
pub async fn call_template_function(
|
|
&self,
|
|
window_context: &PluginWindowContext,
|
|
fn_name: &str,
|
|
values: HashMap<String, serde_json::Value>,
|
|
purpose: RenderPurpose,
|
|
) -> TemplateResult<String> {
|
|
let req = CallTemplateFunctionRequest {
|
|
name: fn_name.to_string(),
|
|
args: CallTemplateFunctionArgs { purpose, values },
|
|
};
|
|
|
|
let events = self
|
|
.send_and_wait(window_context, &InternalEventPayload::CallTemplateFunctionRequest(req))
|
|
.await
|
|
.map_err(|e| RenderError(format!("Failed to call template function {e:}")))?;
|
|
|
|
let value = events.into_iter().find_map(|e| match e.payload {
|
|
// Error returned
|
|
InternalEventPayload::CallTemplateFunctionResponse(CallTemplateFunctionResponse {
|
|
error: Some(error),
|
|
..
|
|
}) => Some(Err(error)),
|
|
// Value or null returned
|
|
InternalEventPayload::CallTemplateFunctionResponse(CallTemplateFunctionResponse {
|
|
value,
|
|
..
|
|
}) => Some(Ok(value.unwrap_or_default())),
|
|
// Generic error returned
|
|
InternalEventPayload::ErrorResponse(ErrorResponse { error }) => Some(Err(error)),
|
|
_ => None,
|
|
});
|
|
|
|
match value {
|
|
None => Err(RenderError(format!("Template function {fn_name}(…) not found "))),
|
|
Some(Ok(v)) => Ok(v),
|
|
Some(Err(e)) => Err(RenderError(e)),
|
|
}
|
|
}
|
|
|
|
pub async fn import_data<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
content: &str,
|
|
) -> Result<ImportResponse> {
|
|
let reply_events = self
|
|
.send_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&InternalEventPayload::ImportRequest(ImportRequest {
|
|
content: content.to_string(),
|
|
}),
|
|
)
|
|
.await?;
|
|
|
|
// TODO: Don't just return the first valid response
|
|
let result = reply_events.into_iter().find_map(|e| match e.payload {
|
|
InternalEventPayload::ImportResponse(resp) => Some(resp),
|
|
_ => None,
|
|
});
|
|
|
|
match result {
|
|
None => Err(PluginErr("No importers found for file contents".to_string())),
|
|
Some(resp) => Ok(resp),
|
|
}
|
|
}
|
|
|
|
pub async fn filter_data<R: Runtime>(
|
|
&self,
|
|
window: &WebviewWindow<R>,
|
|
filter: &str,
|
|
content: &str,
|
|
content_type: &str,
|
|
) -> Result<FilterResponse> {
|
|
let plugin_name = if content_type.to_lowercase().contains("json") {
|
|
"@yaak/filter-jsonpath"
|
|
} else {
|
|
"@yaak/filter-xpath"
|
|
};
|
|
|
|
let plugin = self
|
|
.get_plugin_by_name(plugin_name)
|
|
.await
|
|
.ok_or(PluginNotFoundErr(plugin_name.to_string()))?;
|
|
|
|
let event = self
|
|
.send_to_plugin_and_wait(
|
|
&PluginWindowContext::new(window),
|
|
&plugin,
|
|
&InternalEventPayload::FilterRequest(FilterRequest {
|
|
filter: filter.to_string(),
|
|
content: content.to_string(),
|
|
}),
|
|
)
|
|
.await?;
|
|
|
|
match event.payload {
|
|
InternalEventPayload::FilterResponse(resp) => Ok(resp),
|
|
InternalEventPayload::EmptyResponse(_) => {
|
|
Err(PluginErr("Filter returned empty".to_string()))
|
|
}
|
|
e => Err(PluginErr(format!("Export returned invalid event {:?}", e))),
|
|
}
|
|
}
|
|
}
|
|
|
|
async fn read_plugins_dir(dir: &PathBuf) -> Result<Vec<String>> {
|
|
let mut result = read_dir(dir).await?;
|
|
let mut dirs: Vec<String> = vec![];
|
|
while let Ok(Some(entry)) = result.next_entry().await {
|
|
if entry.path().is_dir() {
|
|
#[cfg(target_os = "windows")]
|
|
dirs.push(fix_windows_paths(&entry.path()));
|
|
#[cfg(not(target_os = "windows"))]
|
|
dirs.push(entry.path().to_string_lossy().to_string());
|
|
}
|
|
}
|
|
Ok(dirs)
|
|
}
|
|
|
|
#[cfg(target_os = "windows")]
|
|
fn fix_windows_paths(p: &PathBuf) -> String {
|
|
use dunce;
|
|
use path_slash::PathBufExt;
|
|
use regex::Regex;
|
|
|
|
// 1. Remove UNC prefix for Windows paths to pass to sidecar
|
|
let safe_path = dunce::simplified(p.as_path()).to_string_lossy().to_string();
|
|
|
|
// 2. Remove the drive letter
|
|
let safe_path = Regex::new("^[a-zA-Z]:").unwrap().replace(safe_path.as_str(), "");
|
|
|
|
// 3. Convert backslashes to forward
|
|
let safe_path = PathBuf::from(safe_path.to_string()).to_slash_lossy().to_string();
|
|
|
|
safe_path
|
|
}
|