forked from coracle/caravel
Compare commits
1 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 49d7786e93 |
@@ -4,7 +4,7 @@ PORT=3000
|
|||||||
ALLOW_ORIGINS= # Optional comma-separated allowed CORS origins; empty = permissive
|
ALLOW_ORIGINS= # Optional comma-separated allowed CORS origins; empty = permissive
|
||||||
|
|
||||||
# Auth
|
# Auth
|
||||||
ADMINS= # Comma-separated hex pubkeys with admin access
|
ADMINS= # Comma-separated admin keys (hex pubkey or npub)
|
||||||
|
|
||||||
# Database
|
# Database
|
||||||
DATABASE_URL=sqlite://data/caravel.db
|
DATABASE_URL=sqlite://data/caravel.db
|
||||||
|
|||||||
+1
-1
@@ -35,7 +35,7 @@ Environment variables:
|
|||||||
| `DATABASE_URL` | SQLite URL. Relative paths are resolved under `backend/`. | `sqlite://<backend>/data/caravel.db` |
|
| `DATABASE_URL` | SQLite URL. Relative paths are resolved under `backend/`. | `sqlite://<backend>/data/caravel.db` |
|
||||||
| `HOST` | API bind host (also used for NIP-98 `u` host check) | `127.0.0.1` |
|
| `HOST` | API bind host (also used for NIP-98 `u` host check) | `127.0.0.1` |
|
||||||
| `PORT` | API bind port | `3000` |
|
| `PORT` | API bind port | `3000` |
|
||||||
| `ADMINS` | Comma-separated admin pubkeys (hex) | _optional_ |
|
| `ADMINS` | Comma-separated admin pubkeys (`hex` or `npub`) | _optional_ |
|
||||||
| `ALLOW_ORIGINS` | Comma-separated CORS origins. If empty, CORS is permissive. | _optional_ |
|
| `ALLOW_ORIGINS` | Comma-separated CORS origins. If empty, CORS is permissive. | _optional_ |
|
||||||
| `ZOOID_API_URL` | Zooid API base URL used by infra worker | _required for infra sync_ |
|
| `ZOOID_API_URL` | Zooid API base URL used by infra worker | _required for infra sync_ |
|
||||||
| `ZOOID_API_SECRET` | Nostr secret key used for authentication of requests to the zooid API | _required_ |
|
| `ZOOID_API_SECRET` | Nostr secret key used for authentication of requests to the zooid API | _required_ |
|
||||||
|
|||||||
+51
-16
@@ -9,7 +9,7 @@ use axum::{
|
|||||||
routing::{get, post},
|
routing::{get, post},
|
||||||
};
|
};
|
||||||
use base64::Engine;
|
use base64::Engine;
|
||||||
use nostr_sdk::{Event, JsonUtil, Kind};
|
use nostr_sdk::{Event, JsonUtil, Keys, Kind, PublicKey};
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
use crate::billing::Billing;
|
use crate::billing::Billing;
|
||||||
@@ -90,8 +90,7 @@ impl Api {
|
|||||||
let admins = std::env::var("ADMINS")
|
let admins = std::env::var("ADMINS")
|
||||||
.unwrap_or_default()
|
.unwrap_or_default()
|
||||||
.split(',')
|
.split(',')
|
||||||
.map(|v| v.trim().to_lowercase())
|
.filter_map(parse_admin_pubkey)
|
||||||
.filter(|v| !v.is_empty())
|
|
||||||
.collect();
|
.collect();
|
||||||
Self {
|
Self {
|
||||||
host,
|
host,
|
||||||
@@ -122,7 +121,10 @@ impl Api {
|
|||||||
.route("/tenants/:pubkey/invoices", get(list_tenant_invoices))
|
.route("/tenants/:pubkey/invoices", get(list_tenant_invoices))
|
||||||
.route("/invoices/:id", get(get_invoice))
|
.route("/invoices/:id", get(get_invoice))
|
||||||
.route("/invoices/:id/bolt11", get(get_invoice_bolt11))
|
.route("/invoices/:id/bolt11", get(get_invoice_bolt11))
|
||||||
.route("/tenants/:pubkey/stripe/session", get(create_stripe_session))
|
.route(
|
||||||
|
"/tenants/:pubkey/stripe/session",
|
||||||
|
get(create_stripe_session),
|
||||||
|
)
|
||||||
.route("/stripe/webhook", post(stripe_webhook))
|
.route("/stripe/webhook", post(stripe_webhook))
|
||||||
.with_state(state)
|
.with_state(state)
|
||||||
}
|
}
|
||||||
@@ -252,6 +254,24 @@ impl Api {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn parse_admin_pubkey(value: &str) -> Option<String> {
|
||||||
|
let value = value.trim();
|
||||||
|
if value.is_empty() {
|
||||||
|
return None;
|
||||||
|
}
|
||||||
|
|
||||||
|
if let Ok(pubkey) = PublicKey::parse(value) {
|
||||||
|
return Some(pubkey.to_hex());
|
||||||
|
}
|
||||||
|
|
||||||
|
// Allow nsec values by deriving their pubkey so admin matching still works.
|
||||||
|
if let Ok(keys) = Keys::parse(value) {
|
||||||
|
return Some(keys.public_key().to_hex());
|
||||||
|
}
|
||||||
|
|
||||||
|
None
|
||||||
|
}
|
||||||
|
|
||||||
fn ok<T: Serialize>(status: StatusCode, data: T) -> Response {
|
fn ok<T: Serialize>(status: StatusCode, data: T) -> Response {
|
||||||
(status, Json(OkResponse { data, code: "ok" })).into_response()
|
(status, Json(OkResponse { data, code: "ok" })).into_response()
|
||||||
}
|
}
|
||||||
@@ -393,13 +413,7 @@ async fn get_identity(
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
Ok(ok(
|
Ok(ok(StatusCode::OK, IdentityResponse { pubkey, is_admin }))
|
||||||
StatusCode::OK,
|
|
||||||
IdentityResponse {
|
|
||||||
pubkey,
|
|
||||||
is_admin,
|
|
||||||
},
|
|
||||||
))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn get_plan(Path(id): Path<String>) -> Response {
|
async fn get_plan(Path(id): Path<String>) -> Response {
|
||||||
@@ -489,14 +503,27 @@ async fn list_relay_activity(
|
|||||||
let relay = match state.api.query.get_relay(&id).await {
|
let relay = match state.api.query.get_relay(&id).await {
|
||||||
Ok(Some(r)) => r,
|
Ok(Some(r)) => r,
|
||||||
Ok(None) => return Ok(err(StatusCode::NOT_FOUND, "not-found", "relay not found")),
|
Ok(None) => return Ok(err(StatusCode::NOT_FOUND, "not-found", "relay not found")),
|
||||||
Err(e) => return Ok(err(StatusCode::INTERNAL_SERVER_ERROR, "internal", &e.to_string())),
|
Err(e) => {
|
||||||
|
return Ok(err(
|
||||||
|
StatusCode::INTERNAL_SERVER_ERROR,
|
||||||
|
"internal",
|
||||||
|
&e.to_string(),
|
||||||
|
));
|
||||||
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
state.api.require_admin_or_tenant(&auth, &relay.tenant)?;
|
state.api.require_admin_or_tenant(&auth, &relay.tenant)?;
|
||||||
|
|
||||||
match state.api.query.list_activity_for_relay(&id).await {
|
match state.api.query.list_activity_for_relay(&id).await {
|
||||||
Ok(activity) => Ok(ok(StatusCode::OK, serde_json::json!({ "activity": activity }))),
|
Ok(activity) => Ok(ok(
|
||||||
Err(e) => Ok(err(StatusCode::INTERNAL_SERVER_ERROR, "internal", &e.to_string())),
|
StatusCode::OK,
|
||||||
|
serde_json::json!({ "activity": activity }),
|
||||||
|
)),
|
||||||
|
Err(e) => Ok(err(
|
||||||
|
StatusCode::INTERNAL_SERVER_ERROR,
|
||||||
|
"internal",
|
||||||
|
&e.to_string(),
|
||||||
|
)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -773,7 +800,11 @@ async fn get_invoice(
|
|||||||
Path(id): Path<String>,
|
Path(id): Path<String>,
|
||||||
) -> std::result::Result<Response, ApiError> {
|
) -> std::result::Result<Response, ApiError> {
|
||||||
let auth = state.api.extract_auth_pubkey(&headers)?;
|
let auth = state.api.extract_auth_pubkey(&headers)?;
|
||||||
let (invoice, tenant) = state.api.billing.get_invoice_with_tenant(&id).await
|
let (invoice, tenant) = state
|
||||||
|
.api
|
||||||
|
.billing
|
||||||
|
.get_invoice_with_tenant(&id)
|
||||||
|
.await
|
||||||
.map_err(|e| ApiError::Internal(e.to_string()))?;
|
.map_err(|e| ApiError::Internal(e.to_string()))?;
|
||||||
state.api.require_admin_or_tenant(&auth, &tenant.pubkey)?;
|
state.api.require_admin_or_tenant(&auth, &tenant.pubkey)?;
|
||||||
|
|
||||||
@@ -786,7 +817,11 @@ async fn get_invoice_bolt11(
|
|||||||
Path(id): Path<String>,
|
Path(id): Path<String>,
|
||||||
) -> std::result::Result<Response, ApiError> {
|
) -> std::result::Result<Response, ApiError> {
|
||||||
let auth = state.api.extract_auth_pubkey(&headers)?;
|
let auth = state.api.extract_auth_pubkey(&headers)?;
|
||||||
let (invoice, tenant) = state.api.billing.get_invoice_with_tenant(&id).await
|
let (invoice, tenant) = state
|
||||||
|
.api
|
||||||
|
.billing
|
||||||
|
.get_invoice_with_tenant(&id)
|
||||||
|
.await
|
||||||
.map_err(|e| ApiError::Internal(e.to_string()))?;
|
.map_err(|e| ApiError::Internal(e.to_string()))?;
|
||||||
state.api.require_admin_or_tenant(&auth, &tenant.pubkey)?;
|
state.api.require_admin_or_tenant(&auth, &tenant.pubkey)?;
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user