agi.go 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
  1. package main
  2. import (
  3. "log"
  4. "net/http"
  5. agi "imuslab.com/arozos/mod/agi"
  6. "imuslab.com/arozos/mod/common"
  7. )
  8. var (
  9. AGIGateway *agi.Gateway
  10. )
  11. func AGIInit() {
  12. //Create new AGI Gateway object
  13. gw, err := agi.NewGateway(agi.AgiSysInfo{
  14. BuildVersion: build_version,
  15. InternalVersion: internal_version,
  16. LoadedModule: moduleHandler.GetModuleNameList(),
  17. ReservedTables: []string{"auth", "permisson", "register", "desktop"},
  18. ModuleRegisterParser: moduleHandler.RegisterModuleFromAGI,
  19. PackageManager: packageManager,
  20. UserHandler: userHandler,
  21. StartupRoot: "./web",
  22. ActivateScope: []string{"./web", "./subservice"},
  23. FileSystemRender: thumbRenderHandler,
  24. ShareManager: shareManager,
  25. NightlyManager: nightlyManager,
  26. })
  27. if err != nil {
  28. log.Println("AGI Gateway Initialization Failed")
  29. }
  30. //Register user request handler endpoint
  31. http.HandleFunc("/system/ajgi/interface", func(w http.ResponseWriter, r *http.Request) {
  32. //Require login check
  33. authAgent.HandleCheckAuth(w, r, func(w http.ResponseWriter, r *http.Request) {
  34. //API Call from actual human users
  35. thisuser, _ := gw.Option.UserHandler.GetUserInfoFromRequest(w, r)
  36. gw.InterfaceHandler(w, r, thisuser)
  37. })
  38. })
  39. //Register external API request handler endpoint
  40. http.HandleFunc("/api/ajgi/interface", func(w http.ResponseWriter, r *http.Request) {
  41. //Check if token exists
  42. token, err := common.Mv(r, "token", true)
  43. if err != nil {
  44. w.WriteHeader(http.StatusUnauthorized)
  45. w.Write([]byte("401 - Unauthorized (token is empty)"))
  46. return
  47. }
  48. //Validate Token
  49. if authAgent.TokenValid(token) == true {
  50. //Valid
  51. thisUsername, err := gw.Option.UserHandler.GetAuthAgent().GetTokenOwner(token)
  52. if err != nil {
  53. log.Println(err)
  54. w.WriteHeader(http.StatusInternalServerError)
  55. w.Write([]byte("500 - Internal Server Error"))
  56. return
  57. }
  58. thisuser, _ := gw.Option.UserHandler.GetUserInfoFromUsername(thisUsername)
  59. gw.APIHandler(w, r, thisuser)
  60. } else {
  61. w.WriteHeader(http.StatusUnauthorized)
  62. w.Write([]byte("401 - Unauthorized (Invalid / expired token)"))
  63. return
  64. }
  65. })
  66. http.HandleFunc("/api/ajgi/exec", gw.HandleAgiExecutionRequestWithToken)
  67. AGIGateway = gw
  68. }