13 Commits

50 changed files with 3281 additions and 241 deletions

View File

@@ -36,21 +36,8 @@ services:
networks: networks:
- snoopBack - snoopBack
vault:
image: hashicorp/vault:1.16
environment:
VAULT_API_ADDR: http://0.0.0.0:8200
VAULT_TOKEN: root
ports:
- 8200:8200
cap_add:
- IPC_LOCK
volumes:
- vault-data:/vault/data
networks:
- snoopBack
snoop-api: snoop-api:
restart: unless-stopped
build: build:
context: ./server context: ./server
dockerfile: Dockerfile dockerfile: Dockerfile
@@ -61,6 +48,7 @@ services:
VAULT_TOKEN: "root" VAULT_TOKEN: "root"
VAULT_KV_PATH: "kv/data/snoop" VAULT_KV_PATH: "kv/data/snoop"
MINIO_ENDPOINT: "http://minio:9000" MINIO_ENDPOINT: "http://minio:9000"
JWT_SECRET: ${JWT_SECRET}
env_file: env_file:
- .env - .env
depends_on: depends_on:
@@ -75,6 +63,7 @@ services:
web: web:
restart: unless-stopped
build: build:
context: ./management-ui context: ./management-ui
dockerfile: Dockerfile dockerfile: Dockerfile
@@ -90,17 +79,84 @@ services:
- snoop-api - snoop-api
ports: ports:
- "80:80" - "80:80"
- "443:443"
volumes: volumes:
- ./nginx/dev.conf:/etc/nginx/conf.d/default.conf:ro,Z - ./nginx/dev.conf:/etc/nginx/conf.d/default.conf:ro,Z
# - ./nginx/nginx_ssl/fullchain.pem:/etc/nginx/ssl/certs/fullchain.pem
# - ./nginx/nginx_ssl/privkey.pem:/etc/nginx/ssl/certs/privkey.pem
- ./nginx/nginx_ssl:/etc/nginx/ssl/certs/:ro,Z
- ./nginx/nginx_ssl/iot_int_cert.pem:/etc/nginx/ssl/iot_int_cert.pem:ro,Z
- ./nginx/nginx_ssl/iot.crl:/etc/nginx/ssl/iot.crl:ro,Z
networks: networks:
- proxy - proxy
mediamtx:
image: bluenviron/mediamtx:latest
# restart: unless-stopped
# Expose default listeners for all common protocols
ports:
- "8554:8554" # RTSP
- "1935:1935" # RTMP
- "8888:8888" # HLS / LL-HLS (HTTP)
- "8889:8889" # WebRTC HTTP (WHIP/WHEP/pages)
- "8189:8189/udp" # WebRTC ICE UDP
- "8890:8890/udp" # SRT
- "9997:9997" # Control API (enabled in config below; map if you want to access from host)
volumes:
- ./mediamtx/mediamtx.yml:/mediamtx.yml:ro,Z
- mediamtx-recordings:/recordings
networks:
- proxy
- snoopBack
rclone:
image: rclone/rclone:latest
command: rcd --rc-addr=:5572 --rc-no-auth
environment:
RCLONE_CONFIG_MINIO_TYPE: s3
RCLONE_CONFIG_MINIO_PROVIDER: Minio
RCLONE_CONFIG_MINIO_ENDPOINT: http://minio:9000
RCLONE_CONFIG_MINIO_ACCESS_KEY_ID: minioadmin
RCLONE_CONFIG_MINIO_SECRET_ACCESS_KEY: minioadmin
RCLONE_CONFIG_MINIO_REGION: us-east-1
RCLONE_CONFIG_MINIO_FORCE_PATH_STYLE: "true"
volumes:
- mediamtx-recordings:/recordings
networks:
- snoopBack
- proxy
# NEW: EMQX MQTT broker
emqx:
image: emqx/emqx:latest # EMQX 5.x
restart: unless-stopped
environment:
# set a fixed node name (nice when you later add clustering)
EMQX_NODE__NAME: emqx@node1
# set dashboard admin user/pass (change these in prod!)
EMQX_DASHBOARD__DEFAULT_USERNAME: admin
EMQX_DASHBOARD__DEFAULT_PASSWORD: changeme123
# optional: enable WebSocket listener on 8083 (on by default in 5.x)
# EMQX_LISTENERS__WS__DEFAULT__ENABLE: "true"
volumes:
- emqx-data:/opt/emqx/data
- emqx-log:/opt/emqx/log
ports:
- "1883:1883" # MQTT (TCP)
- "8083:8083" # MQTT over WebSocket (WS)
# - "8883:8883" # MQTT over TLS (uncomment when you add certs)
# - "8084:8084" # WSS (uncomment with TLS)
- "18083:18083" # Dashboard
networks:
- snoopBack
- proxy # so Nginx can reverse-proxy WS at /mqtt/ws
volumes: volumes:
pgdata: pgdata:
miniodata: miniodata:
vault-data: mediamtx-recordings:
emqx-data:
emqx-log:
networks: networks:
proxy: proxy:

View File

@@ -14,6 +14,7 @@
"axios": "^1.11.0", "axios": "^1.11.0",
"class-variance-authority": "^0.7.1", "class-variance-authority": "^0.7.1",
"clsx": "^2.1.1", "clsx": "^2.1.1",
"leaflet": "^1.9.4",
"lucide-vue-next": "^0.525.0", "lucide-vue-next": "^0.525.0",
"reka-ui": "^2.5.0", "reka-ui": "^2.5.0",
"tailwind-merge": "^3.3.1", "tailwind-merge": "^3.3.1",
@@ -28,6 +29,7 @@
"devDependencies": { "devDependencies": {
"@iconify-json/radix-icons": "^1.2.2", "@iconify-json/radix-icons": "^1.2.2",
"@iconify/vue": "^5.0.0", "@iconify/vue": "^5.0.0",
"@types/leaflet": "^1.9.20",
"@types/node": "^24.1.0", "@types/node": "^24.1.0",
"@vitejs/plugin-vue": "^6.0.0", "@vitejs/plugin-vue": "^6.0.0",
"@vue/tsconfig": "^0.7.0", "@vue/tsconfig": "^0.7.0",
@@ -1273,6 +1275,23 @@
"integrity": "sha512-dWHzHa2WqEXI/O1E9OjrocMTKJl2mSrEolh1Iomrv6U+JuNwaHXsXx9bLu5gG7BUWFIN0skIQJQ/L1rIex4X6w==", "integrity": "sha512-dWHzHa2WqEXI/O1E9OjrocMTKJl2mSrEolh1Iomrv6U+JuNwaHXsXx9bLu5gG7BUWFIN0skIQJQ/L1rIex4X6w==",
"license": "MIT" "license": "MIT"
}, },
"node_modules/@types/geojson": {
"version": "7946.0.16",
"resolved": "https://registry.npmjs.org/@types/geojson/-/geojson-7946.0.16.tgz",
"integrity": "sha512-6C8nqWur3j98U6+lXDfTUWIfgvZU+EumvpHKcYjujKH7woYyLj2sUmff0tRhrqM7BohUw7Pz3ZB1jj2gW9Fvmg==",
"dev": true,
"license": "MIT"
},
"node_modules/@types/leaflet": {
"version": "1.9.20",
"resolved": "https://registry.npmjs.org/@types/leaflet/-/leaflet-1.9.20.tgz",
"integrity": "sha512-rooalPMlk61LCaLOvBF2VIf9M47HgMQqi5xQ9QRi7c8PkdIe0WrIi5IxXUXQjAdL0c+vcQ01mYWbthzmp9GHWw==",
"dev": true,
"license": "MIT",
"dependencies": {
"@types/geojson": "*"
}
},
"node_modules/@types/node": { "node_modules/@types/node": {
"version": "24.1.0", "version": "24.1.0",
"resolved": "https://registry.npmjs.org/@types/node/-/node-24.1.0.tgz", "resolved": "https://registry.npmjs.org/@types/node/-/node-24.1.0.tgz",
@@ -1996,6 +2015,12 @@
"jiti": "lib/jiti-cli.mjs" "jiti": "lib/jiti-cli.mjs"
} }
}, },
"node_modules/leaflet": {
"version": "1.9.4",
"resolved": "https://registry.npmjs.org/leaflet/-/leaflet-1.9.4.tgz",
"integrity": "sha512-nxS1ynzJOmOlHp+iL3FyWqK89GtNL8U8rvlMOsQdTTssxZwCXh8N2NB3GDQOL+YR3XnWyZAxwQixURb+FA74PA==",
"license": "BSD-2-Clause"
},
"node_modules/lightningcss": { "node_modules/lightningcss": {
"version": "1.30.1", "version": "1.30.1",
"resolved": "https://registry.npmjs.org/lightningcss/-/lightningcss-1.30.1.tgz", "resolved": "https://registry.npmjs.org/lightningcss/-/lightningcss-1.30.1.tgz",

View File

@@ -15,6 +15,7 @@
"axios": "^1.11.0", "axios": "^1.11.0",
"class-variance-authority": "^0.7.1", "class-variance-authority": "^0.7.1",
"clsx": "^2.1.1", "clsx": "^2.1.1",
"leaflet": "^1.9.4",
"lucide-vue-next": "^0.525.0", "lucide-vue-next": "^0.525.0",
"reka-ui": "^2.5.0", "reka-ui": "^2.5.0",
"tailwind-merge": "^3.3.1", "tailwind-merge": "^3.3.1",
@@ -29,6 +30,7 @@
"devDependencies": { "devDependencies": {
"@iconify-json/radix-icons": "^1.2.2", "@iconify-json/radix-icons": "^1.2.2",
"@iconify/vue": "^5.0.0", "@iconify/vue": "^5.0.0",
"@types/leaflet": "^1.9.20",
"@types/node": "^24.1.0", "@types/node": "^24.1.0",
"@vitejs/plugin-vue": "^6.0.0", "@vitejs/plugin-vue": "^6.0.0",
"@vue/tsconfig": "^0.7.0", "@vue/tsconfig": "^0.7.0",

View File

@@ -1,24 +1,49 @@
<script setup lang="ts"> <script setup lang="ts">
import { DropdownMenu, DropdownMenuItem, import { ref } from 'vue'
DropdownMenuTrigger, DropdownMenuContent } from '@/components/ui/dropdown-menu'; import {
import { Ellipsis } from 'lucide-vue-next'; DropdownMenu, DropdownMenuItem,
import EditDeviceDialog from './EditDeviceDialog.vue'; DropdownMenuTrigger, DropdownMenuContent
import DeleteDeviceDialog from './DeleteDeviceDialog.vue'; } from '@/components/ui/dropdown-menu'
import { ref } from 'vue'; import EditDeviceDialog from './EditDeviceDialog.vue'
import DeleteDeviceDialog from './DeleteDeviceDialog.vue'
import DeviceCertificateDialog from './DeviceCertificateDialog.vue'
import DeviceTasksDialog from './DeviceTasksDialog.vue'
import { Ellipsis } from 'lucide-vue-next'
import type { Device, Users } from '@/lib/interfaces'
// import { api } from '@/lib/api'
const props = defineProps<{ row: Device; allUsers?: Users[] }>()
const isEditOpen = ref(false) const isEditOpen = ref(false)
const isDeleteOpen = ref(false) const isDeleteOpen = ref(false)
const isTasksOpen = ref(false)
const itCertsOpen = ref(false)
const emit = defineEmits<{
(e: 'updated', payload: { name: string; userIds: string[] }): void
(e: 'deleted'): void
}>()
// your actual delete logic
function onDeleteConfirmed() { function onDeleteConfirmed() {
// e.g. await api.deleteUser(props.userId) // await api.delete(`/devices/${encodeURIComponent(props.row.guid)}`)
isDeleteOpen.value = false isDeleteOpen.value = false
emit('deleted')
} }
function onEditConfirm() { function onEditConfirm(_payload: { name: string; userIds: string[] }) {
isEditOpen.value = false isEditOpen.value = false
emit('updated', _payload)
} }
function onTaskConfirm() {
isTasksOpen.value = false
}
function onCertsConfirm() {
itCertsOpen.value = false
}
</script> </script>
<template> <template>
<DropdownMenu> <DropdownMenu>
<DropdownMenuTrigger asChild> <DropdownMenuTrigger asChild>
@@ -27,14 +52,15 @@ function onEditConfirm() {
</button> </button>
</DropdownMenuTrigger> </DropdownMenuTrigger>
<DropdownMenuContent align="end" class="w-[160px]"> <DropdownMenuContent align="end" class="w-[160px]">
<DropdownMenuItem @click.prevent="isEditOpen = true"> <DropdownMenuItem @click.prevent="isEditOpen = true">Rename</DropdownMenuItem>
Rename <DropdownMenuItem @click.prevent="isTasksOpen = true">Tasks</DropdownMenuItem>
</DropdownMenuItem> <DropdownMenuItem @click.prevent="itCertsOpen = true">Certificates</DropdownMenuItem>
<DropdownMenuItem @click.prevent="isDeleteOpen = true"> <DropdownMenuItem class="text-destructive" @click.prevent="isDeleteOpen = true">Delete</DropdownMenuItem>
Delete
</DropdownMenuItem>
</DropdownMenuContent> </DropdownMenuContent>
</DropdownMenu> </DropdownMenu>
<EditDeviceDialog v-model:modelValue="isEditOpen"@confirm="onEditConfirm()" />
<DeleteDeviceDialog v-model:modelValue="isDeleteOpen" @confirm="onDeleteConfirmed" /> <EditDeviceDialog v-model:modelValue="isEditOpen" :device="props.row" :all-users="props.allUsers" @updated="onEditConfirm" />
<DeleteDeviceDialog v-model:modelValue="isDeleteOpen" :device="props.row" @confirm="onDeleteConfirmed" />
<DeviceCertificateDialog v-model:modelValue="itCertsOpen" :device="props.row" @confirm="onCertsConfirm" />
<DeviceTasksDialog v-model:modelValue="isTasksOpen" :device="props.row" @confirm="onTaskConfirm" />
</template> </template>

View File

@@ -0,0 +1,66 @@
<script setup lang="ts">
import { ref } from 'vue'
import {
DropdownMenu, DropdownMenuItem,
DropdownMenuTrigger, DropdownMenuContent
} from '@/components/ui/dropdown-menu'
import EditTrackerDialog from './EditTrackerDialog.vue'
import DeleteDeviceDialog from './DeleteDeviceDialog.vue'
import DeviceCertificateDialog from './DeviceCertificateDialog.vue'
import DeviceTasksDialog from './DeviceTasksDialog.vue'
import { Ellipsis } from 'lucide-vue-next'
import type { Device, Users } from '@/lib/interfaces'
// import { api } from '@/lib/api'
const props = defineProps<{ row: Device; allUsers?: Users[] }>()
const isEditOpen = ref(false)
const isDeleteOpen = ref(false)
const isTasksOpen = ref(false)
const itCertsOpen = ref(false)
const emit = defineEmits<{
(e: 'updated', payload: { name: string; userIds: string[] }): void
(e: 'deleted'): void
}>()
function onDeleteConfirmed() {
// await api.delete(`/devices/${encodeURIComponent(props.row.guid)}`)
isDeleteOpen.value = false
emit('deleted')
}
function onEditConfirm(_payload: { name: string; userIds: string[] }) {
isEditOpen.value = false
emit('updated', _payload)
}
function onTaskConfirm() {
isTasksOpen.value = false
}
function onCertsConfirm() {
itCertsOpen.value = false
}
</script>
<template>
<DropdownMenu>
<DropdownMenuTrigger asChild>
<button class="p-2 rounded hover:bg-muted">
<Ellipsis />
</button>
</DropdownMenuTrigger>
<DropdownMenuContent align="end" class="w-[160px]">
<DropdownMenuItem @click.prevent="isEditOpen = true">Rename</DropdownMenuItem>
<DropdownMenuItem @click.prevent="isTasksOpen = true">Tasks</DropdownMenuItem>
<DropdownMenuItem @click.prevent="itCertsOpen = true">Certificates</DropdownMenuItem>
<DropdownMenuItem class="text-destructive" @click.prevent="isDeleteOpen = true">Delete</DropdownMenuItem>
</DropdownMenuContent>
</DropdownMenu>
<EditTrackerDialog v-model:modelValue="isEditOpen" :device="props.row" :all-users="props.allUsers" @updated="onEditConfirm" />
<DeleteDeviceDialog v-model:modelValue="isDeleteOpen" :device="props.row" @confirm="onDeleteConfirmed" />
<DeviceCertificateDialog v-model:modelValue="itCertsOpen" :device="props.row" @confirm="onCertsConfirm" />
<DeviceTasksDialog v-model:modelValue="isTasksOpen" :device="props.row" @confirm="onTaskConfirm" />
</template>

View File

@@ -1,16 +1,16 @@
<script setup lang="ts"> <script setup lang="ts">
import { ref } from 'vue'
import { import {
DropdownMenu, DropdownMenuItem, DropdownMenu, DropdownMenuItem,
DropdownMenuTrigger, DropdownMenuContent DropdownMenuTrigger, DropdownMenuContent
} from '@/components/ui/dropdown-menu' } from '@/components/ui/dropdown-menu'
import EditUserDialog from './EditUserDialog.vue' import EditUserDialog from './EditUserDialog.vue'
import DeleteUserDialog from './DeleteUserDialog.vue' import DeleteUserDialog from './DeleteUserDialog.vue'
import { Ellipsis } from 'lucide-vue-next' import { Ellipsis } from 'lucide-vue-next'
import { ref } from 'vue' import { api } from '@/lib/api'
import { api } from '@/lib/api' // <-- use your axios/fetch wrapper import type { Users } from '@/lib/interfaces'
const props = defineProps<{ userId: string }>() const props = defineProps<{ row: Users }>() // ← accept full row
const emit = defineEmits<{ const emit = defineEmits<{
(e: 'deleted', id: string): void (e: 'deleted', id: string): void
(e: 'error', err: unknown): void (e: 'error', err: unknown): void
@@ -20,18 +20,17 @@ const isEditOpen = ref(false)
const isDeleteOpen = ref(false) const isDeleteOpen = ref(false)
const deleting = ref(false) const deleting = ref(false)
// DELETE /users/:id
async function onDeleteConfirmed() { async function onDeleteConfirmed() {
try { try {
deleting.value = true deleting.value = true
await api.delete(`/users/${encodeURIComponent(props.userId)}`) await api.delete(`/users/${encodeURIComponent(String(props.row.id))}`)
emit('deleted', props.userId) emit('deleted', String(props.row.id))
} catch (err) { } catch (err) {
console.error(err) console.error(err)
emit('error', err) emit('error', err)
} finally { } finally {
deleting.value = false deleting.value = false
// The dialog already closes itself on confirm; nothing else required. // DeleteUserDialog closes itself after confirm
} }
} }
@@ -49,21 +48,13 @@ function onEditConfirm() {
</DropdownMenuTrigger> </DropdownMenuTrigger>
<DropdownMenuContent align="end" class="w-[160px]"> <DropdownMenuContent align="end" class="w-[160px]">
<DropdownMenuItem @click.prevent="isEditOpen = true"> <DropdownMenuItem @click.prevent="isEditOpen = true">Edit</DropdownMenuItem>
Edit
</DropdownMenuItem>
<DropdownMenuItem @click.prevent="isDeleteOpen = true" :disabled="deleting"> <DropdownMenuItem @click.prevent="isDeleteOpen = true" :disabled="deleting">
Delete Delete
</DropdownMenuItem> </DropdownMenuItem>
</DropdownMenuContent> </DropdownMenuContent>
</DropdownMenu> </DropdownMenu>
<EditUserDialog v-model:modelValue="isEditOpen" @confirm="onEditConfirm()" /> <EditUserDialog v-model:modelValue="isEditOpen" @confirm="onEditConfirm" />
<DeleteUserDialog v-model:modelValue="isDeleteOpen" :loading="deleting" @confirm="onDeleteConfirmed" />
<!-- pass 'deleting' to disable the confirm button during request -->
<DeleteUserDialog
v-model:modelValue="isDeleteOpen"
:loading="deleting"
@confirm="onDeleteConfirmed"
/>
</template> </template>

View File

@@ -1,38 +1,34 @@
<script setup lang="ts"> <script setup lang="ts">
import { Tabs, TabsContent, TabsTrigger, TabsList } from '@/components/ui/tabs'; import { Tabs, TabsContent, TabsTrigger, TabsList } from '@/components/ui/tabs'
import DataTableNoCheckbox from './DataTableNoCheckbox.vue'; import DataTableNoCheckbox from './DataTableNoCheckbox.vue'
import AdminUserDropdonw from './AdminUserDropdonw.vue'; import AdminUserDropdonw from './AdminUserDropdonw.vue'
import AdminDeviceDropdown from './AdminDeviceDropdown.vue'; import AdminDeviceDropdown from './AdminDeviceDropdown.vue'
import type { Device, Users } from '@/lib/interfaces'; import AdminTrackerDropdown from './AdminTrackerDropdown.vue'
import { Button } from '@/components/ui/button'; import type { Device, Users } from '@/lib/interfaces'
import { onBeforeUnmount, onMounted, ref } from 'vue'; import { Button } from '@/components/ui/button'
import { api } from '@/lib/api'; import { onBeforeUnmount, onMounted, ref, computed } from 'vue'
import { api } from '@/lib/api'
// ---------------- Users ----------------
const user_columns = [ const user_columns = [
{ accessorKey: 'id', header: 'ID' }, { accessorKey: 'id', header: 'ID' },
{ accessorKey: 'username', header: 'Username' }, { accessorKey: 'username', header: 'Username' },
{ accessorKey: 'role', header: 'Role' }, { accessorKey: 'role', header: 'Role' },
] ]
const user_data = ref<Users[]>([]) const user_data = ref<Users[]>([])
const usersLoading = ref(false) const usersLoading = ref(false)
const usersError = ref<string | null>(null) const usersError = ref<string | null>(null)
function isUsersArray(data: unknown): data is Users[] { function isUsersArray(data: unknown): data is Users[] {
return Array.isArray(data) && data.every( return Array.isArray(data) && data.every(
(u) => (u) => u && typeof u === 'object'
u && && typeof (u as any).id === 'number'
typeof u === 'object' && && typeof (u as any).username === 'string'
typeof (u as any).id === 'number' && && typeof (u as any).role === 'string'
typeof (u as any).username === 'string' &&
typeof (u as any).role === 'string'
) )
} }
let ctrl: AbortController | null = null let ctrl: AbortController | null = null
async function loadUsers() { async function loadUsers() {
usersError.value = null usersError.value = null
usersLoading.value = true usersLoading.value = true
@@ -40,27 +36,23 @@ async function loadUsers() {
ctrl?.abort() ctrl?.abort()
ctrl = new AbortController() ctrl = new AbortController()
const { data } = await api.get('/users', { signal: ctrl.signal }) const { data } = await api.get('/users', { signal: ctrl.signal })
if (!isUsersArray(data)) throw new Error('Unexpected response shape')
if (!isUsersArray(data)) {
throw new Error('Unexpected response shape')
}
user_data.value = data user_data.value = data
} catch (e: any) { } catch (e: any) {
// keep error generic; specifics are logged server-side
if (e?.name === 'CanceledError' || e?.message === 'canceled') return if (e?.name === 'CanceledError' || e?.message === 'canceled') return
if (e?.response?.status === 403) { usersError.value = e?.response?.status === 403 ? 'Access denied.' : 'Failed to load users.'
usersError.value = 'Access denied.'
} else {
usersError.value = 'Failed to load users.'
}
} finally { } finally {
usersLoading.value = false usersLoading.value = false
} }
} }
// Helper to map ids -> usernames (for immediate UI update after dialog save)
const idToName = computed(() => new Map(user_data.value.map(u => [String(u.id), u.username])))
function usernamesFromIds(ids: string[]): string {
return ids.map(id => idToName.value.get(String(id))).filter(Boolean).join(', ')
}
// ---------- Devices (NEW) ---------- // ---------------- Devices ----------------
type ApiDeviceUser = { id: number; username: string; role: string } type ApiDeviceUser = { id: number; username: string; role: string }
type ApiDevice = { guid: string; name: string; users?: ApiDeviceUser[] } type ApiDevice = { guid: string; name: string; users?: ApiDeviceUser[] }
type DevicesResponse = { devices: ApiDevice[]; offset: number; limit: number; total: number } type DevicesResponse = { devices: ApiDevice[]; offset: number; limit: number; total: number }
@@ -69,29 +61,22 @@ function isDevicesResponse(d: unknown): d is DevicesResponse {
const x = d as any const x = d as any
return !!x && Array.isArray(x.devices) && return !!x && Array.isArray(x.devices) &&
x.devices.every((dev: any) => x.devices.every((dev: any) =>
dev && dev && typeof dev.guid === 'string' && typeof dev.name === 'string' &&
typeof dev.guid === 'string' && (dev.users === undefined ||
typeof dev.name === 'string' && (Array.isArray(dev.users) && dev.users.every((u: any) => u && typeof u.username === 'string')))
(
dev.users === undefined ||
(
Array.isArray(dev.users) &&
dev.users.every((u: any) => u && typeof u.username === 'string')
)
)
) )
} }
const device_data = ref<Device[]>([])
const devicesLoading = ref(false)
const devicesError = ref<string | null>(null)
const device_columns = [ const device_columns = [
{ accessorKey: 'guid', header: 'GUID' }, { accessorKey: 'guid', header: 'GUID' },
{ accessorKey: 'devicename', header: 'Device' }, { accessorKey: 'devicename', header: 'Device' },
{ accessorKey: 'assigned_users', header: 'Users' }, { accessorKey: 'assigned_users', header: 'Users' },
] ]
const device_data = ref<Device[]>([])
const devicesLoading = ref(false)
const devicesError = ref<string | null>(null)
let devicesCtrl: AbortController | null = null let devicesCtrl: AbortController | null = null
async function loadDevices() { async function loadDevices() {
devicesError.value = null devicesError.value = null
@@ -100,10 +85,7 @@ async function loadDevices() {
devicesCtrl?.abort() devicesCtrl?.abort()
devicesCtrl = new AbortController() devicesCtrl = new AbortController()
const { data } = await api.get('/devices', { signal: devicesCtrl.signal }) const { data } = await api.get('/devices', { signal: devicesCtrl.signal })
if (!isDevicesResponse(data)) throw new Error('Unexpected devices response') if (!isDevicesResponse(data)) throw new Error('Unexpected devices response')
// Transform API -> table shape
device_data.value = data.devices.map((d) => ({ device_data.value = data.devices.map((d) => ({
guid: d.guid, guid: d.guid,
devicename: d.name, devicename: d.name,
@@ -117,38 +99,131 @@ async function loadDevices() {
} }
} }
// ---------------- Trackers ----------------
type ApiTracker = { guid: string; name: string; users?: ApiDeviceUser[] }
type TrackersResponse = { trackers: ApiTracker[]; offset: number; limit: number; total: number }
function isTrackersResponse(t: unknown): t is TrackersResponse {
const x = t as any
return !!x && Array.isArray(x.trackers) &&
x.trackers.every((dev: any) =>
dev && typeof dev.guid === 'string' && typeof dev.name === 'string' &&
(dev.users === undefined ||
(Array.isArray(dev.users) && dev.users.every((u: any) => u && typeof u.username === 'string')))
)
}
const tracker_columns = [
{ accessorKey: 'guid', header: 'GUID' },
{ accessorKey: 'devicename', header: 'Tracker' },
{ accessorKey: 'assigned_users', header: 'Users' },
]
const trackers_data = ref<Device[]>([])
const trackersLoading = ref(false)
const trackersError = ref<string | null>(null)
let treckerCtrl: AbortController | null = null
async function loadTrackers() {
trackersError.value = null
trackersLoading.value = true
try {
treckerCtrl?.abort()
treckerCtrl = new AbortController()
const { data } = await api.get('/trackers', { signal: treckerCtrl.signal })
if (!isTrackersResponse(data)) throw new Error('Unexpected trackers response')
trackers_data.value = data.trackers.map((d) => ({
guid: d.guid,
devicename: d.name,
assigned_users: Array.isArray(d.users) ? d.users.map(u => u.username).join(', ') : '',
}))
} catch (e: any) {
if (e?.name === 'CanceledError' || e?.message === 'canceled') return
trackersError.value = 'Failed to load trackers.'
} finally {
trackersLoading.value = false
}
}
// ---------------- Immediate UI updates from dropdown dialogs ----------------
function handleDeviceUpdated(row: Device, payload: { name: string; userIds: string[] }) {
const guid = row.guid
const usersStr = usernamesFromIds(payload.userIds)
device_data.value = device_data.value.map(d =>
d.guid === guid ? { ...d, devicename: payload.name, assigned_users: usersStr } : d
)
}
function handleDeviceDeleted(row: Device) {
const guid = row.guid
device_data.value = device_data.value.filter(d => d.guid !== guid)
}
// If trackers use the same dropdown to edit, keep these too:
function handleTrackerUpdated(row: Device, payload: { name: string; userIds: string[] }) {
const guid = row.guid
const usersStr = usernamesFromIds(payload.userIds)
trackers_data.value = trackers_data.value.map(d =>
d.guid === guid ? { ...d, devicename: payload.name, assigned_users: usersStr } : d
)
}
function handleTrackerDeleted(row: Device) {
const guid = row.guid
trackers_data.value = trackers_data.value.filter(d => d.guid !== guid)
}
// ---------------- lifecycle ----------------
onMounted(() => { onMounted(() => {
loadUsers() loadUsers()
loadDevices() loadDevices()
loadTrackers()
}) })
onBeforeUnmount(() => { onBeforeUnmount(() => {
ctrl?.abort() ctrl?.abort()
devicesCtrl?.abort() devicesCtrl?.abort()
treckerCtrl?.abort()
}) })
</script> </script>
<template> <template>
<a href="/create"> <a href="/create">
<Button> <Button>Create</Button>
Create
</Button>
</a> </a>
<Tabs default-value="users"> <Tabs default-value="users">
<TabsList class="space-x-8"> <TabsList class="space-x-8">
<TabsTrigger value="users"> <TabsTrigger value="users">Users</TabsTrigger>
Users <TabsTrigger value="devices">Devices</TabsTrigger>
</TabsTrigger> <TabsTrigger value="trackers">Trackers</TabsTrigger>
<TabsTrigger value="devices">
Devices
</TabsTrigger>
</TabsList> </TabsList>
<TabsContent value="users"> <TabsContent value="users">
<DataTableNoCheckbox :columns="user_columns" :data="user_data" :dropdownComponent="AdminUserDropdonw" /> <DataTableNoCheckbox
:columns="user_columns"
:data="user_data"
:dropdownComponent="AdminUserDropdonw"
/>
</TabsContent> </TabsContent>
<TabsContent value="devices"> <TabsContent value="devices">
<DataTableNoCheckbox :columns="device_columns" :data="device_data" <DataTableNoCheckbox
:dropdownComponent="AdminDeviceDropdown" /> :columns="device_columns"
:data="device_data"
:dropdownComponent="AdminDeviceDropdown"
@row-updated="handleDeviceUpdated"
@row-deleted="handleDeviceDeleted"
:dropdownProps="{ allUsers: user_data }"
/>
</TabsContent>
<TabsContent value="trackers">
<DataTableNoCheckbox
:columns="tracker_columns"
:data="trackers_data"
:dropdownComponent="AdminTrackerDropdown"
@row-updated="handleTrackerUpdated"
@row-deleted="handleTrackerDeleted"
:dropdownProps="{ allUsers: user_data }"
/>
</TabsContent> </TabsContent>
</Tabs> </Tabs>
</template> </template>

View File

@@ -1,6 +1,6 @@
<script setup lang="ts"> <script setup lang="ts">
import { useFilter } from 'reka-ui' import { useFilter } from 'reka-ui'
import { computed, ref, onMounted, onBeforeUnmount } from 'vue' import { computed, ref, onMounted, onBeforeUnmount, watch } from 'vue'
import { import {
Combobox, ComboboxAnchor, ComboboxEmpty, ComboboxGroup, Combobox, ComboboxAnchor, ComboboxEmpty, ComboboxGroup,
ComboboxInput, ComboboxItem, ComboboxList ComboboxInput, ComboboxItem, ComboboxList
@@ -11,63 +11,52 @@ import {
import type { Users } from '@/lib/interfaces' import type { Users } from '@/lib/interfaces'
import { api } from '@/lib/api' import { api } from '@/lib/api'
// ——— v-model plumbing ———
const props = defineProps<{ const props = defineProps<{
modelValue: string[] // selected user IDs (strings) modelValue: string[] // selected user IDs
}>() allUsers?: Users[] // OPTIONAL: full users list provided by parent
const emit = defineEmits<{
(e: 'update:modelValue', v: string[]): void
}>() }>()
const emit = defineEmits<{ (e:'update:modelValue', v:string[]):void }>()
// computed proxy to v-model // computed proxy
const selected = computed<string[]>({ const selected = computed<string[]>({
get: () => props.modelValue ?? [], get: () => props.modelValue ?? [],
set: (v) => emit('update:modelValue', v), set: (v) => emit('update:modelValue', v),
}) })
// ——— local state ———
const open = ref(false) const open = ref(false)
const searchTerm = ref('') const searchTerm = ref('')
const loading = ref(false)
const error = ref<string | null>(null)
const allUsers = ref<Users[]>([]) /** SOURCE of truth for users used by the combobox */
const internalUsers = ref<Users[]>([]) // used only when parent didn't pass allUsers
const usingExternal = computed(() => Array.isArray(props.allUsers))
const effectiveUsers = computed<Users[]>(() => usingExternal.value ? (props.allUsers as Users[]) : internalUsers.value)
// self-fetch only when parent didn't provide allUsers
let ctrl: AbortController | null = null let ctrl: AbortController | null = null
async function loadUsers() { async function loadUsers() {
error.value = null if (usingExternal.value) return
loading.value = true
try { try {
ctrl?.abort() ctrl?.abort()
ctrl = new AbortController() ctrl = new AbortController()
const { data } = await api.get<Users[]>('/users', { signal: ctrl.signal }) const { data } = await api.get<Users[]>('/users', { signal: ctrl.signal })
if (!Array.isArray(data)) throw new Error('Unexpected response') if (Array.isArray(data)) {
allUsers.value = data.filter( internalUsers.value = data.filter((u:any) => typeof u?.id === 'number' && typeof u?.username === 'string')
(u: any) => typeof u?.id === 'number' && typeof u?.username === 'string'
)
} catch (e: any) {
if (e?.name === 'CanceledError' || e?.message === 'canceled') return
error.value = 'Failed to load users.'
} finally {
loading.value = false
} }
} catch { /* ignore */ }
} }
onMounted(loadUsers) onMounted(loadUsers)
onBeforeUnmount(() => ctrl?.abort()) onBeforeUnmount(() => ctrl?.abort())
type UserOption = { value: string; label: string } type UserOption = { value: string; label: string }
const users = computed<UserOption[]>(() => const users = computed<UserOption[]>(() =>
allUsers.value.map(u => ({ value: String(u.id), label: u.username })) effectiveUsers.value.map(u => ({ value: String(u.id), label: u.username }))
) )
const { contains } = useFilter({ sensitivity: 'base' }) const { contains } = useFilter({ sensitivity: 'base' })
const filteredUsers = computed(() => { const filteredUsers = computed(() => {
const selectedSet = new Set(selected.value) const selectedSet = new Set(selected.value)
const options = users.value.filter(o => !selectedSet.has(o.value)) const options = users.value.filter(o => !selectedSet.has(o.value))
return searchTerm.value return searchTerm.value ? options.filter(o => contains(o.label, searchTerm.value)) : options
? options.filter(o => contains(o.label, searchTerm.value))
: options
}) })
function userLabelById(id: string) { function userLabelById(id: string) {
@@ -77,21 +66,30 @@ function userLabelById(id: string) {
function onSelect(ev: CustomEvent) { function onSelect(ev: CustomEvent) {
const val = String((ev as any).detail?.value ?? '') const val = String((ev as any).detail?.value ?? '')
if (!val) return if (!val) return
if (!selected.value.includes(val)) { if (!selected.value.includes(val)) selected.value = [...selected.value, val]
// assign a new array so v-model updates properly
selected.value = [...selected.value, val]
}
searchTerm.value = '' searchTerm.value = ''
if (filteredUsers.value.length === 0) { if (filteredUsers.value.length === 0) open.value = false
open.value = false
}
} }
// When parent switches between external/internal data at runtime, refetch if needed.
watch(() => props.allUsers, () => { if (!usingExternal.value) loadUsers() })
// Debug: whenever modelValue changes (from dialog)
watch(() => props.modelValue, (v) => {
console.log('[AssignDevice:props.modelValue]', v)
}, { immediate: true })
// Debug: when effective users list is ready
watch(() => effectiveUsers.value, (v) => {
console.log('[AssignDevice:effectiveUsers]', v?.length, 'items')
})
</script> </script>
<template> <template>
<Combobox v-model="selected" v-model:open="open" :ignore-filter="true"> <Combobox v-model="selected" v-model:open="open" :ignore-filter="true">
<ComboboxAnchor as-child> <ComboboxAnchor as-child>
<TagsInput v-model="selected" class="px-2 gap-2 w-90"> <div class="relative w-full">
<TagsInput v-model="selected" class="w-full px-2 gap-2">
<div class="flex gap-2 flex-wrap items-center"> <div class="flex gap-2 flex-wrap items-center">
<TagsInputItem v-for="id in selected" :key="id" :value="id"> <TagsInputItem v-for="id in selected" :key="id" :value="id">
<span class="px-1">{{ userLabelById(id) }}</span> <span class="px-1">{{ userLabelById(id) }}</span>
@@ -102,23 +100,19 @@ function onSelect(ev: CustomEvent) {
<ComboboxInput v-model="searchTerm" as-child> <ComboboxInput v-model="searchTerm" as-child>
<TagsInputInput <TagsInputInput
placeholder="User..." placeholder="User..."
class="min-w-[300px] w-full p-0 border-none focus-visible:ring-0 h-auto" class="min-w-[200px] w-full p-0 border-none focus-visible:ring-0 h-auto"
@keydown.enter.prevent @keydown.enter.prevent
/> />
</ComboboxInput> </ComboboxInput>
</TagsInput> </TagsInput>
<!-- match input width --> <ComboboxList class="w-[--reka-popper-anchor-width] w-full min-w-[350px]">
<ComboboxList
class="w-[--reka-popper-anchor-width] min-w-[350px]"
>
<ComboboxEmpty> <ComboboxEmpty>
<span v-if="loading">Loading</span> <span v-if="!usingExternal && !effectiveUsers.length">Loading</span>
<span v-else-if="error">{{ error }}</span> <span v-else-if="!users.length">No users found.</span>
<span v-else>No users found.</span>
</ComboboxEmpty> </ComboboxEmpty>
<ComboboxGroup v-if="!loading && !error && filteredUsers.length"> <ComboboxGroup v-if="filteredUsers.length">
<ComboboxItem <ComboboxItem
v-for="usr in filteredUsers" v-for="usr in filteredUsers"
:key="usr.value" :key="usr.value"
@@ -129,6 +123,7 @@ function onSelect(ev: CustomEvent) {
</ComboboxItem> </ComboboxItem>
</ComboboxGroup> </ComboboxGroup>
</ComboboxList> </ComboboxList>
</div>
</ComboboxAnchor> </ComboboxAnchor>
</Combobox> </Combobox>
</template> </template>

View File

@@ -34,6 +34,13 @@ const props = defineProps<{
* /> * />
*/ */
dropdownComponent?: DefineComponent<{ row: TData }, any, any> dropdownComponent?: DefineComponent<{ row: TData }, any, any>
// dropdownComponent?: DefineComponent<{ row: TData } & {
// onRowUpdated?: (row: TData, payload: any) => void
// onRowDeleted?: (row: TData) => void
// }, any, any>
// onRowUpdated?: (row: TData, payload: any) => void // <-- NEW
// onRowDeleted?: (row: TData) => void // <-- NEW
dropdownProps?: Record<string, any> // <-- NEW
}>() }>()
// ——— Table setup ——— // ——— Table setup ———
@@ -42,6 +49,11 @@ const table = useVueTable({
get columns() { return props.columns }, get columns() { return props.columns },
getCoreRowModel: getCoreRowModel(), getCoreRowModel: getCoreRowModel(),
}) })
const emit = defineEmits<{
(e: 'row-updated', row: TData, payload: any): void
(e: 'row-deleted', row: TData): void
}>()
</script> </script>
<template> <template>
@@ -93,9 +105,19 @@ const table = useVueTable({
<!-- dropdown cell --> <!-- dropdown cell -->
<TableCell v-if="props.dropdownComponent" class="text-right"> <TableCell v-if="props.dropdownComponent" class="text-right">
<!-- <component
:is="props.dropdownComponent"
:row="row.original"
:key="row.id"
:on-row-updated="props.onRowUpdated"
:on-row-deleted="props.onRowDeleted"
/> -->
<component <component
:is="props.dropdownComponent" :is="props.dropdownComponent"
:row="row.original" :row="row.original"
v-bind="props.dropdownProps"
@updated="(payload: any) => emit('row-updated', row.original, payload)"
@deleted="() => emit('row-deleted', row.original)"
/> />
</TableCell> </TableCell>
</TableRow> </TableRow>

View File

@@ -26,7 +26,7 @@ const emit = defineEmits<{
<template> <template>
<AlertDialog <AlertDialog
:open="props.modelValue" :open="props.modelValue"
@openChange="(v: boolean) => emit('update:modelValue', v)" @update:open="(v: boolean) => emit('update:modelValue', v)"
> >
<AlertDialogContent> <AlertDialogContent>
<AlertDialogHeader> <AlertDialogHeader>

View File

@@ -24,7 +24,7 @@ const emit = defineEmits<{
<template> <template>
<AlertDialog <AlertDialog
:open="props.modelValue" :open="props.modelValue"
@openChange="(v: boolean) => emit('update:modelValue', v)" @update:open="(v: boolean) => emit('update:modelValue', v)"
> >
<AlertDialogContent> <AlertDialogContent>
<AlertDialogHeader> <AlertDialogHeader>

View File

@@ -0,0 +1,49 @@
<script setup lang="ts">
import {
Dialog,
DialogContent,
DialogHeader,
DialogTitle,
DialogDescription,
DialogFooter,
} from '@/components/ui/dialog'
import { Button } from '@/components/ui/button'
import type { Device } from '@/lib/interfaces';
import type { PropType } from 'vue';
const props = defineProps({
modelValue: {
type: Boolean as PropType<boolean>,
required: true,
},
device: { type: Object as PropType<Device>, required: false },
})
const emit = defineEmits<{
(e: 'update:modelValue', v: boolean): void
(e: 'confirm'): void
}>()
function onSave() {
emit('confirm')
// close the dialog
emit('update:modelValue', false)
}
</script>
<template>
<Dialog :open="props.modelValue" @update:open="(v: boolean) => emit('update:modelValue', v)">
<DialogContent class="sm:min-w-[800px]">
<DialogHeader>
<DialogTitle>List of certificates</DialogTitle>
<DialogDescription>
{{ props.device?.guid }}
</DialogDescription>
</DialogHeader>
<DialogFooter>
<Button @click="onSave">Close</Button>
</DialogFooter>
</DialogContent>
</Dialog>
</template>

View File

@@ -32,7 +32,7 @@ const usrIDs = selectedUserIds.value
Dashboard Dashboard
</CardTitle> </CardTitle>
</CardHeader> </CardHeader>
<CardContent class="flex-1 space-y-6"> <CardContent class="flex-1 grid gap-4 py-4">
<div class="grid gap-5"> <div class="grid gap-5">
<div class="grid space-y-2 grid-cols-4 items-center"> <div class="grid space-y-2 grid-cols-4 items-center">
<Label for="users">Allowed users</Label> <Label for="users">Allowed users</Label>

View File

@@ -0,0 +1,48 @@
<script setup lang="ts">
import {
Dialog,
DialogContent,
DialogHeader,
DialogTitle,
DialogDescription,
DialogFooter,
} from '@/components/ui/dialog'
import { Button } from '@/components/ui/button'
import type { Device } from '@/lib/interfaces';
import type { PropType } from 'vue';
const props = defineProps({
modelValue: {
type: Boolean as PropType<boolean>,
required: true,
},
device: { type: Object as PropType<Device>, required: false },
})
const emit = defineEmits<{
(e: 'update:modelValue', v: boolean): void
(e: 'confirm'): void
}>()
function onSave() {
emit('confirm')
// close the dialog
emit('update:modelValue', false)
}
</script>
<template>
<Dialog :open="props.modelValue" @update:open="(v: boolean) => emit('update:modelValue', v)">
<DialogContent class="sm:min-w-[800px]">
<DialogHeader>
<DialogTitle>Tasks</DialogTitle>
<DialogDescription>
{{ props.device?.guid }}
</DialogDescription>
</DialogHeader>
<DialogFooter>
<Button @click="onSave">Close</Button>
</DialogFooter>
</DialogContent>
</Dialog>
</template>

View File

@@ -1,70 +1,218 @@
<script setup lang="ts"> <script setup lang="ts">
import { import {
Dialog, Dialog, DialogContent, DialogHeader, DialogTitle, DialogDescription, DialogFooter,
DialogContent,
DialogHeader,
DialogTitle,
DialogDescription,
DialogFooter,
} from '@/components/ui/dialog' } from '@/components/ui/dialog'
import { Button } from '@/components/ui/button' import { Button } from '@/components/ui/button'
import { Input } from '@/components/ui/input' import { Input } from '@/components/ui/input'
import { Label } from '@/components/ui/label' import { Label } from '@/components/ui/label'
import { defineProps, defineEmits } from 'vue'
import type { PropType } from 'vue'
import AssignDevice from './AssignDevice.vue' import AssignDevice from './AssignDevice.vue'
import type { Device, Users } from '@/lib/interfaces'
import { defineProps, defineEmits, ref, watch, computed } from 'vue'
import type { PropType } from 'vue'
import { api } from '@/lib/api'
type DeviceWithUsers =
& Partial<Device>
& { guid?: string; name?: string; devicename?: string; assigned_users?: string }
& { users?: Array<{ id: number; username: string; role?: string }> }
// 1) runtime props so Vue + TS agree
const props = defineProps({ const props = defineProps({
modelValue: { modelValue: { type: Boolean as PropType<boolean>, required: true },
type: Boolean as PropType<boolean>, device: { type: Object as PropType<DeviceWithUsers>, required: true },
required: true, allUsers: { type: Array as PropType<Users[]>, required: false },
},
}) })
// 2) two emits: v-model and confirm
const emit = defineEmits<{ const emit = defineEmits<{
(e: 'update:modelValue', v: boolean): void (e: 'update:modelValue', v: boolean): void
(e: 'confirm'): void (e: 'updated', payload: { name: string; userIds: string[] }): void
}>() }>()
function onSave() { const guid = computed(() => String(props.device?.guid ?? ''))
emit('confirm') const originalName = computed(() => (props.device?.devicename ?? props.device?.name ?? ''))
// close the dialog
const originalIds = ref<string[]>([]) // baseline for compare
const name = ref('')
const selectedUserIds = ref<string[]>([]) // live edited selection
// ----- init control: only init once per open/guid -----
const initedForGuid = ref<string | null>(null)
function usernameToId(u: string): string | null {
const id = props.allUsers?.find(x => x.username === u)?.id
return typeof id === 'number' ? String(id) : null
}
function initFromDevice() {
const dev = props.device
name.value = originalName.value
if (Array.isArray(dev?.users) && dev!.users.length) {
originalIds.value = dev!.users.map(u => String(u.id))
} else {
// Map from assigned_users (comma-separated usernames) -> ids (requires allUsers)
const usernames = (dev?.assigned_users ?? '')
.split(',')
.map(s => s.trim())
.filter(Boolean)
if (usernames.length && props.allUsers?.length) {
originalIds.value = usernames
.map(usernameToId)
.filter((x): x is string => !!x)
} else {
originalIds.value = []
}
}
selectedUserIds.value = [...originalIds.value]
initedForGuid.value = guid.value
}
// When dialog opens, initialize once for this guid
watch(
() => props.modelValue,
(open) => {
if (open && guid.value && initedForGuid.value !== guid.value) {
initFromDevice()
}
if (!open) {
// reset flag so next open re-inits
initedForGuid.value = null
}
},
{ immediate: true }
)
// If allUsers arrives later, and we couldn't map on first init, map now.
watch(
() => props.allUsers,
() => {
if (!props.modelValue || !guid.value) return
const dev = props.device
const hasUsersArray = Array.isArray(dev?.users) && dev!.users.length > 0
const hasAssigned = typeof dev?.assigned_users === 'string' && dev!.assigned_users.trim().length > 0
const canMapNow = Array.isArray(props.allUsers) && props.allUsers.length > 0
// Only re-map if we *didn't* have users[], we *do* have assigned usernames,
// we *couldn't* map earlier (originalIds is empty), and now we have allUsers.
if (!hasUsersArray && hasAssigned && originalIds.value.length === 0 && canMapNow) {
const usernames = dev!.assigned_users!
.split(',')
.map(s => s.trim())
.filter(Boolean)
const mapped = usernames
.map(u => {
const id = props.allUsers!.find(x => x.username === u)?.id
return typeof id === 'number' ? String(id) : null
})
.filter((x): x is string => !!x)
if (mapped.length > 0) {
originalIds.value = mapped
selectedUserIds.value = [...mapped]
}
}
},
{ immediate: false }
)
// ---------- Save ----------
const saving = ref(false)
const errorText = ref<string | null>(null)
function changedName() {
return name.value.trim() !== originalName.value.trim()
}
function changedUsers() {
const a = new Set(originalIds.value)
const b = new Set(selectedUserIds.value)
if (a.size !== b.size) return true
for (const id of a) if (!b.has(id)) return true
return false
}
async function onSave() {
if (!guid.value) return
errorText.value = null
saving.value = true
try {
const ops: Promise<any>[] = []
const nameChanged = changedName()
const usersChanged = changedUsers()
console.log('[EditDeviceDialog:onSave]', { nameChanged, usersChanged, name: name.value })
if (nameChanged) {
ops.push(api.post(`/devices/${encodeURIComponent(guid.value)}/rename`, {
name: name.value.trim(),
} as { name: string }))
}
if (usersChanged) {
const userIdsNum = selectedUserIds.value
.map(v => Number(v))
.filter(n => Number.isFinite(n)) as number[]
ops.push(api.post(`/devices/${encodeURIComponent(guid.value)}/set_users`, {
userIds: userIdsNum,
} as { userIds: number[] }))
}
if (ops.length > 0) {
await Promise.all(ops)
}
emit('updated', { name: name.value, userIds: [...selectedUserIds.value] })
emit('update:modelValue', false) emit('update:modelValue', false)
} catch (err: any) {
errorText.value = err?.response?.data?.message || 'Failed to save changes.'
} finally {
saving.value = false
}
} }
</script> </script>
<template> <template>
<Dialog <Dialog :open="props.modelValue" @update:open="(v:boolean)=>emit('update:modelValue', v)">
:open="props.modelValue" <DialogContent class="sm:min-w-[500px]">
@openChange="(v: boolean) => emit('update:modelValue', v)"
>
<DialogContent class="sm:max-w-[425px]">
<DialogHeader> <DialogHeader>
<DialogTitle>Edit device</DialogTitle> <DialogTitle>Edit device</DialogTitle>
<DialogDescription> <DialogDescription>Make changes to device settings below.</DialogDescription>
Make changes to device settings below.
</DialogDescription>
</DialogHeader> </DialogHeader>
<div class="grid gap-4 py-4"> <div class="grid gap-4 py-4">
<div class="grid grid-cols-4 items-center gap-4"> <div class="grid grid-cols-4 items-center gap-4">
<Label for="guid" class="text-right">GUID</Label> <Label for="guid" class="text-right">GUID</Label>
<Input id="guid" class="col-span-3" /> <p id="guid" class="col-span-3 break-all text-muted-foreground">{{ guid }}</p>
</div> </div>
<div class="grid grid-cols-4 items-center gap-4"> <div class="grid grid-cols-4 items-center gap-4">
<Label for="name" class="text-right">Name</Label> <Label for="name" class="text-right">Name</Label>
<Input id="name" class="col-span-3" /> <Input id="name" class="col-span-3" v-model="name" :disabled="saving" placeholder="Device name" />
</div> </div>
<div class="grid grid-cols-4 items-center gap-4"> <div class="grid grid-cols-4 items-center gap-4">
<Label for="users" class="text-right">Allowed users</Label> <Label for="users" class="text-right">Allowed users</Label>
<AssignDevice id="users"/> <AssignDevice
id="users"
class="col-span-3 w-full"
v-model="selectedUserIds"
:all-users="props.allUsers"
/>
</div> </div>
<p v-if="errorText" class="text-sm text-red-600 mt-1 col-span-4">{{ errorText }}</p>
</div> </div>
<DialogFooter> <DialogFooter>
<Button @click="onSave">Save changes</Button> <Button :disabled="saving" @click="onSave">
{{ saving ? 'Saving' : 'Save changes' }}
</Button>
</DialogFooter> </DialogFooter>
</DialogContent> </DialogContent>
</Dialog> </Dialog>

View File

@@ -0,0 +1,216 @@
<script setup lang="ts">
import {
Dialog, DialogContent, DialogHeader, DialogTitle, DialogDescription, DialogFooter,
} from '@/components/ui/dialog'
import { Button } from '@/components/ui/button'
import { Input } from '@/components/ui/input'
import { Label } from '@/components/ui/label'
import AssignDevice from './AssignDevice.vue'
import type { Device, Users } from '@/lib/interfaces'
import { defineProps, defineEmits, ref, watch, computed } from 'vue'
import type { PropType } from 'vue'
import { api } from '@/lib/api'
type DeviceWithUsers =
& Partial<Device>
& { guid?: string; name?: string; devicename?: string; assigned_users?: string }
& { users?: Array<{ id: number; username: string; role?: string }> }
const props = defineProps({
modelValue: { type: Boolean as PropType<boolean>, required: true },
device: { type: Object as PropType<DeviceWithUsers>, required: true },
allUsers: { type: Array as PropType<Users[]>, required: false },
})
const emit = defineEmits<{
(e: 'update:modelValue', v: boolean): void
(e: 'updated', payload: { name: string; userIds: string[] }): void
}>()
const guid = computed(() => String(props.device?.guid ?? ''))
const originalName = computed(() => (props.device?.devicename ?? props.device?.name ?? ''))
const originalIds = ref<string[]>([]) // baseline for compare
const name = ref('')
const selectedUserIds = ref<string[]>([]) // live edited selection
// ----- init control: only init once per open/guid -----
const initedForGuid = ref<string | null>(null)
function usernameToId(u: string): string | null {
const id = props.allUsers?.find(x => x.username === u)?.id
return typeof id === 'number' ? String(id) : null
}
function initFromDevice() {
const dev = props.device
name.value = originalName.value
if (Array.isArray(dev?.users) && dev!.users.length) {
originalIds.value = dev!.users.map(u => String(u.id))
} else {
// Map from assigned_users (comma-separated usernames) -> ids (requires allUsers)
const usernames = (dev?.assigned_users ?? '')
.split(',')
.map(s => s.trim())
.filter(Boolean)
if (usernames.length && props.allUsers?.length) {
originalIds.value = usernames
.map(usernameToId)
.filter((x): x is string => !!x)
} else {
originalIds.value = []
}
}
selectedUserIds.value = [...originalIds.value]
initedForGuid.value = guid.value
}
// When dialog opens, initialize once for this guid
watch(
() => props.modelValue,
(open) => {
if (open && guid.value && initedForGuid.value !== guid.value) {
initFromDevice()
}
if (!open) {
// reset flag so next open re-inits
initedForGuid.value = null
}
},
{ immediate: true }
)
// If allUsers arrives later, and we couldn't map on first init, map now.
watch(
() => props.allUsers,
() => {
if (!props.modelValue || !guid.value) return
const dev = props.device
const hasUsersArray = Array.isArray(dev?.users) && dev!.users.length > 0
const hasAssigned = typeof dev?.assigned_users === 'string' && dev!.assigned_users.trim().length > 0
const canMapNow = Array.isArray(props.allUsers) && props.allUsers.length > 0
// Only re-map if we *didn't* have users[], we *do* have assigned usernames,
// we *couldn't* map earlier (originalIds is empty), and now we have allUsers.
if (!hasUsersArray && hasAssigned && originalIds.value.length === 0 && canMapNow) {
const usernames = dev!.assigned_users!
.split(',')
.map(s => s.trim())
.filter(Boolean)
const mapped = usernames
.map(u => {
const id = props.allUsers!.find(x => x.username === u)?.id
return typeof id === 'number' ? String(id) : null
})
.filter((x): x is string => !!x)
if (mapped.length > 0) {
originalIds.value = mapped
selectedUserIds.value = [...mapped]
}
}
},
{ immediate: false }
)
// ---------- Save ----------
const saving = ref(false)
const errorText = ref<string | null>(null)
function changedName() {
return name.value.trim() !== originalName.value.trim()
}
function changedUsers() {
const a = new Set(originalIds.value)
const b = new Set(selectedUserIds.value)
if (a.size !== b.size) return true
for (const id of a) if (!b.has(id)) return true
return false
}
async function onSave() {
if (!guid.value) return
errorText.value = null
saving.value = true
try {
const ops: Promise<any>[] = []
const nameChanged = changedName()
const usersChanged = changedUsers()
if (nameChanged) {
ops.push(api.post(`/trackers/${encodeURIComponent(guid.value)}/rename`, {
name: name.value.trim(),
} as { name: string }))
}
if (usersChanged) {
const userIdsNum = selectedUserIds.value
.map(v => Number(v))
.filter(n => Number.isFinite(n)) as number[]
ops.push(api.post(`/trackers/${encodeURIComponent(guid.value)}/set_users`, {
userIds: userIdsNum,
} as { userIds: number[] }))
}
if (ops.length > 0) {
await Promise.all(ops)
}
emit('updated', { name: name.value, userIds: [...selectedUserIds.value] })
emit('update:modelValue', false)
} catch (err: any) {
errorText.value = err?.response?.data?.message || 'Failed to save changes.'
} finally {
saving.value = false
}
}
</script>
<template>
<Dialog :open="props.modelValue" @update:open="(v:boolean)=>emit('update:modelValue', v)">
<DialogContent class="sm:min-w-[500px]">
<DialogHeader>
<DialogTitle>Edit tracker</DialogTitle>
<DialogDescription>Make changes to tracker settings below.</DialogDescription>
</DialogHeader>
<div class="grid gap-4 py-4">
<div class="grid grid-cols-4 items-center gap-4">
<Label for="guid" class="text-right">GUID</Label>
<p id="guid" class="col-span-3 break-all text-muted-foreground">{{ guid }}</p>
</div>
<div class="grid grid-cols-4 items-center gap-4">
<Label for="name" class="text-right">Name</Label>
<Input id="name" class="col-span-3" v-model="name" :disabled="saving" placeholder="Tracker name" />
</div>
<div class="grid grid-cols-4 items-center gap-4">
<Label for="users" class="text-right">Allowed users</Label>
<AssignDevice
id="users"
class="col-span-3 w-full"
v-model="selectedUserIds"
:all-users="props.allUsers"
/>
</div>
<p v-if="errorText" class="text-sm text-red-600 mt-1 col-span-4">{{ errorText }}</p>
</div>
<DialogFooter>
<Button :disabled="saving" @click="onSave">
{{ saving ? 'Saving' : 'Save changes' }}
</Button>
</DialogFooter>
</DialogContent>
</Dialog>
</template>

View File

@@ -38,7 +38,7 @@ function onSave() {
<template> <template>
<Dialog <Dialog
:open="props.modelValue" :open="props.modelValue"
@openChange="(v: boolean) => emit('update:modelValue', v)" @update:open="(v: boolean) => emit('update:modelValue', v)"
> >
<DialogContent class="sm:max-w-[425px]"> <DialogContent class="sm:max-w-[425px]">
<DialogHeader> <DialogHeader>

View File

@@ -44,6 +44,13 @@ function navLinkClass(prefix: string) {
> >
Devices Devices
</RouterLink> </RouterLink>
<RouterLink
to="/trackers"
:class="navLinkClass('/trackers')"
:aria-current="isActive('/trackers') ? 'page' : undefined"
>
Trackers
</RouterLink>
</nav> </nav>
<DropdownMenu> <DropdownMenu>

View File

@@ -0,0 +1,58 @@
<script setup lang="ts">
import { Tabs, TabsContent, TabsList, TabsTrigger } from '@/components/ui/tabs';
import { Button } from '@/components/ui/button';
import TrackerDashboard from './TrackerDashboard.vue';
import { nextTick, onMounted, ref, type PropType } from 'vue';
import { Card, CardContent, CardHeader } from '@/components/ui/card';
import L, {
Map as LeafletMap,
} from 'leaflet';
import 'leaflet/dist/leaflet.css'
const props = defineProps({
guid: { type: String as PropType<string>, required: true },
})
const mapContainer = ref<HTMLDivElement | null>(null)
onMounted(async () => {
// wait until the flex layout has settled
await nextTick()
if (!mapContainer.value) return
const map = L.map(mapContainer.value).setView([48.38, 31.17], 6)
L.tileLayer('https://{s}.tile.openstreetmap.org/{z}/{x}/{y}.png', {
maxZoom: 19,
attribution: '&copy; OpenStreetMap contributors',
}).addTo(map)
// force Leaflet to recalc its size
map.invalidateSize()
})
</script>
<template>
<Tabs default-value="records">
<TabsList class="space-x-8">
<TabsTrigger value="dashboard">
Dashboard
</TabsTrigger>
<TabsTrigger value="locations">
Locations
</TabsTrigger>
</TabsList>
<TabsContent value="dashboard">
<TrackerDashboard />
</TabsContent>
<TabsContent value="locations">
<div class="flex h-full">
<Card class="w-1/2 p-4 flex flex-col">
</Card>
<div class="w-1/2 p-4">
<div ref="mapContainer" class="w-full h-full rounded-lg shadow-inner">
</div>
</div>
</div>
</TabsContent>
</Tabs>
</template>

View File

@@ -0,0 +1,77 @@
<script setup lang="ts">
import {
Card,
CardContent,
CardDescription,
CardFooter,
CardHeader,
CardTitle,
} from "@/components/ui/card";
import { Input } from "@/components/ui/input";
import { Label } from "@/components/ui/label";
import { Button } from "@/components/ui/button";
import {
NumberField,
NumberFieldContent,
NumberFieldDecrement,
NumberFieldIncrement,
NumberFieldInput,
} from '@/components/ui/number-field'
import AssignDevice from "./AssignDevice.vue";
import { ref } from "vue";
import Separator from "@/components/ui/separator/Separator.vue";
import DataRangePicker from "./DataRangePicker.vue";
const selectedUserIds = ref<string[]>([])
const usrIDs = selectedUserIds.value
</script>
<template>
<Card class="flex w-full max-w-4xl mx-auto">
<CardHeader class="pb-4">
<CardTitle>
Dashboard
</CardTitle>
</CardHeader>
<CardContent class="flex-1 space-y-6">
<div class="grid gap-5">
<div class="grid space-y-2 grid-cols-4 items-center">
<Label for="users">Allowed users</Label>
<AssignDevice v-model="usrIDs" class="col-span-3 w-full"></AssignDevice>
</div>
</div>
<div class="flex space-x-4 pt-2 gap-4">
<Button>Start</Button>
<Button>Stop</Button>
</div>
<Separator class="my-6">Communication settings</Separator>
<div class="grid grid-cols-1 md:grid-cols-2 gap-6">
<div class="space-y-2">
<NumberField id="polling" :default-value="60" :min="30">
<Label for="polling"> Timeout interwal in seconds </Label>
<NumberFieldContent>
<NumberFieldDecrement></NumberFieldDecrement>
<NumberFieldInput></NumberFieldInput>
<NumberFieldIncrement></NumberFieldIncrement>
</NumberFieldContent>
</NumberField>
</div>
<div class="space-y-2">
<NumberField id="jitter" :default-value="10" :min="5">
<Label for="jitter"> Jitter in seconds </Label>
<NumberFieldContent>
<NumberFieldDecrement></NumberFieldDecrement>
<NumberFieldInput></NumberFieldInput>
<NumberFieldIncrement></NumberFieldIncrement>
</NumberFieldContent>
</NumberField>
</div>
</div>
<Separator></Separator>
<div class="space-y-2 gap-4">
<Label for="sleepdate">Date/time to sleep</Label>
<DataRangePicker id="sleepdate"></DataRangePicker>
</div>
</CardContent>
</Card>
</template>

View File

@@ -0,0 +1,104 @@
<script setup lang="ts">
import { defineProps, onBeforeUnmount, onMounted, ref } from 'vue'
import { Card, CardHeader, CardTitle, CardContent } from '@/components/ui/card'
import type { Device } from '@/lib/interfaces'
import { api } from '@/lib/api';
const props = defineProps<{
}>()
// ----- API response models (same as before) -----
type ApiDeviceUser = { id: number; username: string; role: string }
type ApiTracker = { guid: string; name: string; users?: ApiDeviceUser[] }
type TrackersResponse = { trackers: ApiTracker[]; offset: number; limit: number; total: number }
function isTrackersResponse(t: unknown): t is TrackersResponse {
const x = t as any
return !!x && Array.isArray(x.trackers) &&
x.trackers.every((dev: any) =>
dev &&
typeof dev.guid === 'string' &&
typeof dev.name === 'string' &&
(
dev.users === undefined ||
(
Array.isArray(dev.users) &&
dev.users.every((u: any) => u && typeof u.username === 'string')
)
)
)
}
const trackers_data = ref<Device[]>([])
const loading = ref(false)
const error = ref<string | null>(null)
const tracker_columns = [
{ accessorKey: 'guid', header: 'GUID' },
{ accessorKey: 'devicename', header: 'Tracker' },
{ accessorKey: 'assigned_users', header: 'Users' },
]
let treckerCtrl: AbortController | null = null
async function loadTrackers() {
error.value = null
loading.value = true
try {
treckerCtrl?.abort()
treckerCtrl = new AbortController()
const { data } = await api.get('/trackers', { signal: treckerCtrl.signal })
if (!isTrackersResponse(data)) throw new Error('Unexpected trackers response')
// Transform API -> table shape
trackers_data.value = data.trackers.map((d) => ({
guid: d.guid,
devicename: d.name,
assigned_users: Array.isArray(d.users) ? d.users.map(u => u.username).join(', ') : '',
}))
} catch (e: any) {
if (e?.name === 'CanceledError' || e?.message === 'canceled') return
error.value = 'Failed to load trackers.'
} finally {
loading.value = false
}
}
onMounted(loadTrackers)
onBeforeUnmount(() => treckerCtrl?.abort())
</script>
<template>
<div class="space-y-4">
<div v-if="loading">Loading trackers</div>
<div v-else-if="error" class="text-red-600">{{ error }}</div>
<div v-else class="grid grid-cols-1 sm:grid-cols-2 md:grid-cols-3 lg:grid-cols-4 gap-6">
<router-link v-for="device in trackers_data" :key="device.guid"
:to="{ name: 'TrackerView', params: { guid: device.guid } }" class="block group hover:no-underline">
<Card class="h-full transition-shadow group-hover:shadow-lg">
<CardHeader class="bg-primary/5">
<CardTitle class="text-lg">
{{ device.devicename }}
</CardTitle>
</CardHeader>
<CardContent>
<p class="text-sm text-muted-foreground mb-2">
<span class="font-medium">GUID:</span> {{ device.guid }}
</p>
<p class="text-sm">
<span class="font-medium">Assigned Users:</span><br />
{{ device.assigned_users || '—' }}
</p>
</CardContent>
</Card>
</router-link>
</div>
</div>
</template>
<style scoped>
/* ensure cards stretch to fill the anchor height */
a>.Card {
display: flex;
flex-direction: column;
}
</style>

View File

@@ -27,6 +27,11 @@ type CreateUserPayload = {
role: string // 'admin' | 'user' role: string // 'admin' | 'user'
} }
type CreateTrackerPayload = {
guid: string
name: string
userIds: number[]
}
const router = useRouter() const router = useRouter()
@@ -49,6 +54,11 @@ const user_form = reactive({
isAdmin: false, isAdmin: false,
}) })
const tracker_form = reactive({
guid: uuidv4(),
name: '',
})
// userIds from AssignDevice (expects v-model of string[] ids) // userIds from AssignDevice (expects v-model of string[] ids)
const selectedUserIds = ref<string[]>([]) const selectedUserIds = ref<string[]>([])
@@ -65,6 +75,8 @@ watch(
userError.value = null userError.value = null
userSubmitting.value = false userSubmitting.value = false
userSuccess.value = null userSuccess.value = null
// tracker_form.guid = uuidv4()
// tracker_form.name = ''
} }
} }
) )
@@ -151,6 +163,35 @@ async function submitUser() {
userSubmitting.value = false userSubmitting.value = false
} }
} }
async function submitTracker() {
errorMsg.value = null
if (!canSubmit.value) {
errorMsg.value = 'Please provide a valid GUID and name.'
return
}
const userIds: number[] = selectedUserIds.value
.map((s) => Number(s))
.filter((n) => Number.isFinite(n) && n >= 0)
const payload: CreateDevicePayload = {
guid: device_form.guid,
name: device_form.name.trim(),
userIds,
}
submitting.value = true
try {
await api.post('/trackers/create', payload)
router.replace('/admin')
} catch (e: any) {
// keep client error generic
errorMsg.value = e?.response?.status === 403 ? 'Access denied.' : 'Failed to create device.'
} finally {
submitting.value = false
}
}
</script> </script>
<template> <template>
@@ -239,6 +280,43 @@ async function submitUser() {
</Button> </Button>
</CardFooter> </CardFooter>
</Card> </Card>
<Card class="h-full flex flex-col">
<CardHeader>
<CardTitle>Create tracker</CardTitle>
</CardHeader>
<CardContent class="flex-1">
<!-- add vertical spacing between rows -->
<div class="grid gap-5">
<div class="grid grid-cols-4 items-center gap-4">
<Label for="guid" class="text-right">GUID</Label>
<Input id="guid" class="col-span-3 w-full" v-model="device_form.guid" />
</div>
<div class="grid grid-cols-4 items-center gap-4">
<Label for="name" class="text-right">Name</Label>
<Input id="name" class="col-span-3 w-full" v-model="device_form.name" />
</div>
<div class="grid grid-cols-4 items-center gap-4">
<Label for="users" class="text-right">Allowed users</Label>
<!-- make the component span and fill -->
<AssignDevice id="users" class="col-span-3 w-full" v-model="selectedUserIds" />
</div>
<p v-if="errorMsg" class="text-sm text-red-600" aria-live="assertive">
{{ errorMsg }}
</p>
</div>
</CardContent>
<CardFooter>
<Button :disabled="!canSubmit" @click="submitTracker">
{{ submitting ? 'Saving' : 'Save' }}
</Button>
</CardFooter>
</Card>
</div> </div>
</div> </div>
</div> </div>

View File

@@ -0,0 +1,16 @@
<script setup lang="ts">
import { useColorMode } from '@vueuse/core'
import Navbar from '@/customcompometns/Navbar.vue';
import { useRoute } from 'vue-router';
import { computed } from 'vue';
import TrackerComponent from '@/customcompometns/TrackerComponent.vue';
const mode = useColorMode()
const route = useRoute()
const guid = computed(() => String(route.params.guid ?? route.query.guid ?? ''))
</script>
<template>
<Navbar>
<TrackerComponent :guid="guid"></TrackerComponent>
</Navbar>
</template>

View File

@@ -0,0 +1,14 @@
<script setup lang="ts">
import { useColorMode } from '@vueuse/core'
import Navbar from '@/customcompometns/Navbar.vue';
import DevicesGrid from '@/customcompometns/DevicesGrid.vue';
import TrackerGrid from '@/customcompometns/TrackerGrid.vue';
const mode = useColorMode()
</script>
<template>
<Navbar>
<TrackerGrid />
</Navbar>
</template>

View File

@@ -7,6 +7,8 @@ import Devices from '@/pages/Devices.vue';
import DeviceView from './pages/DeviceView.vue'; import DeviceView from './pages/DeviceView.vue';
import Forbidden from './pages/Forbidden.vue'; import Forbidden from './pages/Forbidden.vue';
import Create from './pages/Create.vue'; import Create from './pages/Create.vue';
import Trackers from '@/pages/Trackers.vue';
import TrackerViev from '@/pages/TrackerViev.vue';
import { auth } from './lib/auth'; import { auth } from './lib/auth';
@@ -64,7 +66,20 @@ const routes = [
name: 'Create', name: 'Create',
component: Create, component: Create,
meta: { requiresAuth: true, roles: ['admin'] } meta: { requiresAuth: true, roles: ['admin'] }
} },
{
path: '/trackers',
name: 'Trackers',
component: Trackers,
meta: { requiresAuth: true }
},
{
path: '/tracker/:guid', // ← new dynamic segment
name: 'TrackerView',
component: TrackerViev,
props: true, // so `guid` shows up as a prop
meta: { requiresAuth: true }
},
] ]
const router = createRouter({ const router = createRouter({

76
mediamtx/mediamtx.yml Normal file
View File

@@ -0,0 +1,76 @@
logLevel: info
# Enable Control API (useful for debugging; bound to localhost by default)
api: yes
apiAddress: :9997
# RTSP / RTMP / HLS
rtsp: yes
rtspAddress: :8554
rtmp: yes
rtmpAddress: :1935
hls: yes
hlsAddress: :8888
hlsVariant: lowLatency
# WebRTC (browser-friendly)
webrtc: yes
webrtcAddress: :8889
webrtcLocalUDPAddress: :8189
# Optional: add a STUN server if behind NAT
# webrtcICEServers2:
# - url: stun:stun.l.google.com:19302
# SRT (for resilient ingest)
srt: yes
srtAddress: :8890
authMethod: http
authHTTPAddress: http://snoop-api:8080/mediamtx/auth
authHTTPExclude:
- action: api
- action: metrics
- action: pprof
# Recording (optional)
pathDefaults:
# record settings (per concurrent path/stream)
record: yes
recordFormat: fmp4
recordPath: /recordings/%path/%Y-%m-%d_%H-%M-%S-%f
recordSegmentDuration: 10m
recordDeleteAfter: 7d
# upload each completed segment to MinIO under:
# livestream/<device-guid>/<filename>
# runOnRecordSegmentComplete: >
# sh -c 'd="$(dirname "$MTX_SEGMENT_PATH")";
# f="$(basename "$MTX_SEGMENT_PATH")";
# curl -s -H "Content-Type: application/json"
# -X POST "http://rclone:5572/operations/copyfile?_async=true"
# -d "{\"srcFs\":\"$d\",\"srcRemote\":\"$f\",
# \"dstFs\":\"minio:livestream\",
# \"dstRemote\":\"$MTX_PATH/$f\"}"'
runOnRecordSegmentCreate: >
sh -c 'd="$(dirname "$MTX_SEGMENT_PATH")";
f="$(basename "$MTX_SEGMENT_PATH")";
curl -s -H "Content-Type: application/json"
-X POST "http://rclone:5572/operations/copyfile?_async=true"
-d "{\"srcFs\":\"$d\",\"srcRemote\":\"$f\",
\"dstFs\":\"minio:livestream\",
\"dstRemote\":\"$MTX_PATH/$f\"}"'
authInternalUsers:
- user: any
pass:
ips: ['127.0.0.1','::1']
permissions:
- action: api
- action: metrics
- action: pprof
# Allow all paths by default
paths:
all:
source: publisher

View File

@@ -40,4 +40,122 @@ server {
proxy_read_timeout 3600s; proxy_read_timeout 3600s;
proxy_send_timeout 3600s; proxy_send_timeout 3600s;
} }
# --- MQTT over WebSocket (EMQX) ---
# Clients connect to ws://<host>/mqtt/ws
location /mqtt/ws {
proxy_pass http://emqx:8083/mqtt; # EMQX WS path is /mqtt
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
proxy_read_timeout 3600s;
proxy_send_timeout 3600s;
}
}
# ==============================================
# HTTPS :443 — mTLS enforced only on listed paths
# ==============================================
server {
listen 443 ssl http2;
server_name _;
ssl_certificate /etc/nginx/ssl/certs/fullchain.pem;
ssl_certificate_key /etc/nginx/ssl/certs/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
# mTLS trust chain (from Vault)
ssl_client_certificate /etc/nginx/ssl/iot_int_cert.pem;
ssl_verify_client optional; # locations below require SUCCESS
ssl_verify_depth 3;
# Client cert revocation (optional)
# ssl_crl /etc/nginx/ssl/iot.crl;
# Forward client cert details upstream
proxy_set_header X-SSL-Client-Verify $ssl_client_verify;
proxy_set_header X-SSL-Client-Serial $ssl_client_serial;
proxy_set_header X-SSL-Client-Issuer $ssl_client_i_dn;
proxy_set_header X-SSL-Client-DN $ssl_client_s_dn;
proxy_set_header X-SSL-Client-Cert $ssl_client_escaped_cert;
proxy_read_timeout 3600s;
proxy_send_timeout 3600s;
error_page 495 = @mtls_error;
# location @mtls_error {
# return 403 "ERR_SSL_VERSION_OR_CIPHER_MISMATCH \n";
# }
location @mtls_error {
return 403 "mTLS required or client certificate invalid.\n";
}
location = /_mtls_check {
return 200 "$ssl_client_verify\n$ssl_client_s_dn\n$ssl_client_i_dn\n";
}
# ---- mTLS-protected paths ----
location ^~ /records {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://snoop-api:8080;
}
location ^~ /tasks {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://snoop-api:8080;
}
location ^~ /renew {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://snoop-api:8080;
}
# MediaMTX HLS
location ^~ /hls/ {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://mediamtx:8888/;
}
# MediaMTX WebRTC (WHIP/WHEP/test)
location ^~ /webrtc/ {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://mediamtx:8889/;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
}
# MQTT WS entry points (guarded by mTLS)
location = /loc {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://emqx:8083/mqtt;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
}
location = /gtasks {
if ($ssl_client_verify != SUCCESS) {
return 495;
}
proxy_pass http://emqx:8083/mqtt;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
}
} }

View File

@@ -20,9 +20,10 @@ vault kv put kv/snoop \
minio_presign_ttl_seconds="900" minio_presign_ttl_seconds="900"
``` ```
Unseal Key: gQrvvJBaGR4CpmkoVq93tWqk5dTpioMAHtNHKMWNlH0= Unseal Key 1: XdERN+/hxR9RjLC/S8c+y0omToYvB7Qs1jaUenZQvphD
Unseal Key 2: VBhPBtYcq1GAk7ByPfAsamxV4tJOZ49chAYxxOvc49Oj
Root Token: root Initial Root Token: hvs.tZ4eh9P18sCZ5c1PZIz59EmH
{ {
@@ -36,3 +37,89 @@ Root Token: root
"minio_livestream_bucket": "livestream", "minio_livestream_bucket": "livestream",
"minio_presign_ttl_seconds": "900" "minio_presign_ttl_seconds": "900"
} }
### Stand up internal CA (root + intermediate)
```bash
# Enable PKI backends (root + intermediate)
vault secrets enable -path=pki_root pki
vault secrets tune -max-lease-ttl=87600h pki_root # 10y
vault write pki_root/root/generate/internal \
common_name="Snoop Root CA" key_type=ec key_bits=256 ttl=87600h
vault secrets enable -path=pki_iot pki
vault secrets tune -max-lease-ttl=17520h pki_iot # 2y
# Create an intermediate CSR
vault write -field=csr pki_iot/intermediate/generate/internal \
common_name="Snoop IoT Intermediate" key_type=ec key_bits=256 ttl=17520h > iot_int.csr
# Sign intermediate with root
vault write -field=certificate pki_root/root/sign-intermediate csr=@iot_int.csr \
format=pem_bundle ttl=17520h > iot_int_signed.pem
vault write -field=issuing_ca pki_root/root/sign-intermediate \
csr=@iot_int.csr format=pem_bundle ttl=17520h > root_ca.pem
# Set the signed intermediate in Vault
vault write pki_iot/intermediate/set-signed certificate=@iot_int_signed.pem
```
### Configure URLs + a role for devices
```bash
# Publish issuing + CRL URLs (Nginx will fetch CRL periodically)
vault write pki_iot/config/urls \
issuing_certificates="https://vault.example.local/v1/pki_iot/ca" \
crl_distribution_points="https://vault.example.local/v1/pki_iot/crl"
# Role that limits cert subjects to your device GUIDs
vault write pki_iot/roles/device \
allow_any_name=true \
allowed_uri_sans="urn:device:*" \
allowed_other_sans="" \
require_cn=false \
cn_validations= \
allow_ip_sans=false \
allowed_domains="" \
enforce_hostnames=false \
key_type=ec \
key_bits=256 \
max_ttl=720h ttl=720h # 30 days
```
### Enrollment flow (device CSR → signed cert)
- Device side
- Generate keypair on the device (never export private key).
- Create CSR with CN=<GUID> and URI SAN urn:device:<GUID>.
- Server side
- Backend verifies a one-time enrollment token (or pre-shared bootstrap secret), calls:
```bash
vault write pki_iot/sign/device \
csr=@device.csr \
uri_sans="urn:device:<GUID>" \
ttl=720h > device_cert.pem
```
### Revocation
- Immediate kill: your backend stores bad serials; deny in app logic.
- CRL: `vault write pki_iot/revoke serial_number="<SERIAL>"`.
- Fetch CRL periodically to a local file for Nginx:
```bash
curl -fsSL https://vault.example.local/v1/pki_iot/crl -o /etc/nginx/iot.crl
nginx -s reload
```
- Automate via systemd timer/cron (e.g., every 1015 min).
- Nginx fix for DER CRL format
```bash
# sed -i 's/\r$//' ./nginx/nginx_ssl/int_iot.crl
curl http://vault.local:8200/v1/pki_iot/crl -o nginx/nginx_ssl/int_iot.crl
openssl crl -in ./nginx/nginx_ssl/int_iot.crl -out ./nginx/nginx_ssl/int_iot.crl.clean -outform PEM
mv ./nginx/nginx_ssl/int_iot.crl.clean ./nginx/nginx_ssl/int_iot.crl
curl http://vault.local:8200/v1/pki_root/crl -o nginx/nginx_ssl/root_iot.crl
openssl crl -in ./nginx/nginx_ssl/root_iot.crl -out ./nginx/nginx_ssl/root_iot.crl.clean -outform PEM
mv ./nginx/nginx_ssl/root_iot.crl.clean ./nginx/nginx_ssl/root_iot.crl
(sed 's/\r$//' ./nginx/nginx_ssl/int_iot.crl; echo; sed 's/\r$//' ./nginx/nginx_ssl/root_iot.crl; echo) \
> ./nginx/nginx_ssl/iot.crl
```

View File

@@ -10,6 +10,13 @@ import (
"smoop-api/internal/vault" "smoop-api/internal/vault"
) )
type MediaMTXConfig struct {
APIBase string // e.g. "http://mediamtx:9997"
WebRTCBaseURL string // e.g. "http://mediamtx:8889"
PublicBaseURL string // e.g. "https://your-host" (for HLS/WHEP URLs returned to SPA)
TokenTTL time.Duration // default ~180s
}
type Config struct { type Config struct {
DB struct { DB struct {
DSN string DSN string
@@ -23,7 +30,9 @@ type Config struct {
LivestreamBucket string LivestreamBucket string
PresignTTL time.Duration PresignTTL time.Duration
} }
MediaMTX MediaMTXConfig
JWTSecret []byte JWTSecret []byte
PkiIot vault.PKIClient
} }
func Load() (*Config, error) { func Load() (*Config, error) {
@@ -48,6 +57,10 @@ func Load() (*Config, error) {
return nil, fmt.Errorf("VAULT_ADDR, VAULT_TOKEN, VAULT_KV_MOUNT and VAULT_KV_KEY must be set (or provide legacy VAULT_KV_PATH)") return nil, fmt.Errorf("VAULT_ADDR, VAULT_TOKEN, VAULT_KV_MOUNT and VAULT_KV_KEY must be set (or provide legacy VAULT_KV_PATH)")
} }
pki, err := vault.NewPKI(addr, token, "pki_iot", "device", 30*time.Second)
if err != nil {
return nil, err
}
raw, err := vault.ReadKVv2(addr, token, mount, key) raw, err := vault.ReadKVv2(addr, token, mount, key)
if err != nil { if err != nil {
return nil, err return nil, err
@@ -60,6 +73,12 @@ func Load() (*Config, error) {
} }
return v, nil return v, nil
} }
// getStrOpt := func(k, def string) string {
// if v, ok := raw[k].(string); ok && v != "" {
// return v
// }
// return def
// }
getBool := func(k string) (bool, error) { getBool := func(k string) (bool, error) {
v, ok := raw[k] v, ok := raw[k]
if !ok { if !ok {
@@ -77,6 +96,32 @@ func Load() (*Config, error) {
return false, fmt.Errorf("invalid bool for key %s", k) return false, fmt.Errorf("invalid bool for key %s", k)
} }
} }
getTTL := func(k string, def time.Duration) time.Duration {
if v, ok := raw[k].(string); ok && strings.TrimSpace(v) != "" {
if n, err := strconv.Atoi(strings.TrimSpace(v)); err == nil && n > 0 {
return time.Duration(n) * time.Second
}
}
return def
}
// --- NEW: MediaMTX config FROM ENV (NOT from Vault)
getRequiredEnv := func(k string) (string, error) {
v := strings.TrimSpace(os.Getenv(k))
if v == "" {
return "", fmt.Errorf("missing required env %s", k)
}
return v, nil
}
getIntEnv := func(k string, def int) int {
if v := strings.TrimSpace(os.Getenv(k)); v != "" {
if n, err := strconv.Atoi(v); err == nil {
return n
}
}
return def
}
dbDSN, err := getStr("db_dsn") dbDSN, err := getStr("db_dsn")
if err != nil { if err != nil {
@@ -111,14 +156,29 @@ func Load() (*Config, error) {
if v, ok := raw["minio_livestream_bucket"].(string); ok && v != "" { if v, ok := raw["minio_livestream_bucket"].(string); ok && v != "" {
liveBucket = v liveBucket = v
} }
presignTTL := 15 * time.Minute // presignTTL := 15 * time.Minute
if v, ok := raw["minio_presign_ttl_seconds"].(string); ok && v != "" { // if v, ok := raw["minio_presign_ttl_seconds"].(string); ok && v != "" {
var sec int // var sec int
fmt.Sscanf(v, "%d", &sec) // fmt.Sscanf(v, "%d", &sec)
if sec > 0 { // if sec > 0 {
presignTTL = time.Duration(sec) * time.Second // presignTTL = time.Duration(sec) * time.Second
// }
// }
presignTTL := getTTL("minio_presign_ttl_seconds", 15*time.Minute)
apiBase, err := getRequiredEnv("MEDIAMTX_API_BASE")
if err != nil {
return nil, err
} }
webrtcBase, err := getRequiredEnv("MEDIAMTX_WEBRTC_BASE_URL")
if err != nil {
return nil, err
} }
publicBase, err := getRequiredEnv("PUBLIC_BASE_URL")
if err != nil {
return nil, err
}
tokenTTL := getIntEnv("MEDIAMTX_TOKEN_TTL_SECONDS", 180)
cfg := &Config{} cfg := &Config{}
cfg.DB.DSN = dbDSN cfg.DB.DSN = dbDSN
@@ -130,6 +190,15 @@ func Load() (*Config, error) {
cfg.MinIO.LivestreamBucket = liveBucket cfg.MinIO.LivestreamBucket = liveBucket
cfg.MinIO.PresignTTL = presignTTL cfg.MinIO.PresignTTL = presignTTL
cfg.JWTSecret = []byte(jwt) cfg.JWTSecret = []byte(jwt)
cfg.MediaMTX = MediaMTXConfig{
APIBase: apiBase,
WebRTCBaseURL: webrtcBase,
PublicBaseURL: publicBase,
TokenTTL: time.Duration(tokenTTL),
}
cfg.PkiIot = *pki
return cfg, nil return cfg, nil
} }
@@ -141,6 +210,15 @@ func LoadDev() (*Config, error) {
} }
return v, nil return v, nil
} }
addr := os.Getenv("VAULT_ADDR")
token := os.Getenv("VAULT_TOKEN")
pki, err := vault.NewPKI(addr, token, "pki_iot", "device", 30*time.Second)
if err != nil {
return nil, err
}
getBoolEnv := func(k string, def bool) bool { getBoolEnv := func(k string, def bool) bool {
v := strings.ToLower(strings.TrimSpace(os.Getenv(k))) v := strings.ToLower(strings.TrimSpace(os.Getenv(k)))
if v == "true" || v == "1" || v == "yes" { if v == "true" || v == "1" || v == "yes" {
@@ -191,6 +269,21 @@ func LoadDev() (*Config, error) {
} }
presignTTL := time.Duration(getIntEnv("MINIO_PRESIGN_TTL_SECONDS", 900)) * time.Second presignTTL := time.Duration(getIntEnv("MINIO_PRESIGN_TTL_SECONDS", 900)) * time.Second
// NEW: MediaMTX envs
apiBase, err := getRequired("MEDIAMTX_API_BASE")
if err != nil {
return nil, err
}
webrtcBase, err := getRequired("MEDIAMTX_WEBRTC_BASE_URL")
if err != nil {
return nil, err
}
publicBase, err := getRequired("PUBLIC_BASE_URL")
if err != nil {
return nil, err
}
tokenTTL := getIntEnv("MEDIAMTX_TOKEN_TTL_SECONDS", 180)
cfg := &Config{} cfg := &Config{}
cfg.DB.DSN = dbDSN cfg.DB.DSN = dbDSN
cfg.MinIO.Endpoint = endpoint cfg.MinIO.Endpoint = endpoint
@@ -201,5 +294,14 @@ func LoadDev() (*Config, error) {
cfg.MinIO.LivestreamBucket = liveBucket cfg.MinIO.LivestreamBucket = liveBucket
cfg.MinIO.PresignTTL = presignTTL cfg.MinIO.PresignTTL = presignTTL
cfg.JWTSecret = []byte(jwt) cfg.JWTSecret = []byte(jwt)
cfg.MediaMTX = MediaMTXConfig{
APIBase: apiBase,
WebRTCBaseURL: webrtcBase,
PublicBaseURL: publicBase,
TokenTTL: time.Duration(tokenTTL),
}
cfg.PkiIot = *pki
return cfg, nil return cfg, nil
} }

View File

@@ -1,8 +1,11 @@
package crypto package crypto
import ( import (
"fmt"
"time" "time"
"smoop-api/internal/dto"
"github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5"
) )
@@ -28,3 +31,33 @@ func (j *JWTManager) Generate(userID uint, username, role string) (string, error
func (j *JWTManager) Parse(tok string) (*jwt.Token, error) { func (j *JWTManager) Parse(tok string) (*jwt.Token, error) {
return jwt.Parse(tok, func(t *jwt.Token) (interface{}, error) { return j.secret, nil }) return jwt.Parse(tok, func(t *jwt.Token) (interface{}, error) { return j.secret, nil })
} }
func (j *JWTManager) GenerateMediaToken(sub uint, act, path string, ttl time.Duration) (string, error) {
now := time.Now()
claims := dto.MediaClaims{
Act: act,
Path: path,
RegisteredClaims: jwt.RegisteredClaims{
Subject: fmt.Sprintf("%d", sub),
IssuedAt: jwt.NewNumericDate(now),
ExpiresAt: jwt.NewNumericDate(now.Add(ttl)),
},
}
t := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
return t.SignedString([]byte(j.secret))
}
// NEW: parse a media token into typed claims
func (j *JWTManager) ParseMedia(tokenStr string) (*dto.MediaClaims, error) {
tok, err := jwt.ParseWithClaims(tokenStr, &dto.MediaClaims{}, func(t *jwt.Token) (interface{}, error) {
return []byte(j.secret), nil
})
if err != nil {
return nil, err
}
mc, ok := tok.Claims.(*dto.MediaClaims)
if !ok || !tok.Valid {
return nil, fmt.Errorf("invalid media token")
}
return mc, nil
}

View File

@@ -17,5 +17,10 @@ func AutoMigrate(db *gorm.DB) error {
&models.Device{}, &models.Device{},
&models.Record{}, &models.Record{},
&models.UserDevice{}, &models.UserDevice{},
&models.Tracker{},
&models.UserTracker{},
&models.DEviceTask{},
&models.DeviceCertificate{},
&models.RevokedSerial{},
) )
} }

View File

@@ -0,0 +1,45 @@
package dto
import "github.com/golang-jwt/jwt/v5"
type MediaClaims struct {
Act string `json:"act"` // "publish" or "read"
Path string `json:"path"` // e.g. "live/<guid>"
jwt.RegisteredClaims
}
// MediaMTX external-auth POST body (exact keys per mediamtx.yml sample)
type MediaMTXAuthReq struct {
User string `json:"user"` // optional
Password string `json:"password"` // optional
Token string `json:"token"` // from Authorization: Bearer or query (?token=)
IP string `json:"ip"`
Action string `json:"action"` // publish|read|playback|api|metrics|pprof
Path string `json:"path"` // e.g. "live/<guid>"
Protocol string `json:"protocol"` // rtsp|rtmp|hls|webrtc|srt
ID string `json:"id"` // session id
Query string `json:"query"` // raw query string
}
type MediaMTXAuthResp struct {
// empty 200 means allowed; add fields if you want to return JSON
// to mediamtx (not required)
}
// Token minting
type PublishTokenReq struct {
GUID string `json:"guid" binding:"required,uuid4"`
}
type PublishTokenResp struct {
WHIP string `json:"whipUrl"` // http://mediamtx:8889/whip/live/<guid>?token=...
}
type ReadTokenReq struct {
GUID string `json:"guid" binding:"required,uuid4"`
}
type ReadTokenResp struct {
HLS string `json:"hlsUrl"` // http://<host>/hls/live/<guid>/index.m3u8?token=...
WHEP string `json:"whepUrl"` // http://<host>/webrtc/play/live/<guid>?token=...
}

View File

@@ -0,0 +1,57 @@
package dto
import (
"smoop-api/internal/models"
"time"
)
type TaskDto struct {
ID uint `json:"id"`
DeviceGUID string `json:"deviceGuid"`
Type models.DeviceTaskType `json:"type"`
Payload string `json:"payload"` // raw JSON string
Status models.TaskStatus `json:"status"`
ErrorMsg string `json:"error,omitempty"`
Result string `json:"result,omitempty"`
CreatedAt time.Time `json:"createdAt"`
StartedAt *time.Time `json:"startedAt,omitempty"`
FinishedAt *time.Time `json:"finishedAt,omitempty"`
}
func MapTask(t models.DEviceTask) TaskDto {
return TaskDto{
ID: t.ID,
DeviceGUID: t.DeviceGUID,
Type: t.Type,
Payload: t.Payload,
Status: t.Status,
ErrorMsg: t.ErrorMsg,
Result: t.Result,
CreatedAt: t.CreatedAt,
StartedAt: t.StartedAt,
FinishedAt: t.FinishedAt,
}
}
// Create a new task (server/user -> device)
type CreateTaskDto struct {
Type models.DeviceTaskType `json:"type" binding:"required,oneof=start_stream stop_stream start_recording stop_recording update_config set_deep_sleep"`
// Pass raw JSON string as payload (e.g. {"sleepTimeout":5,"jitterMs":50,"recordingDurationSec":60})
// Keep it string to let device/server evolve freely.
Payload string `json:"payload" binding:"required"`
}
// Device polls: single next task
type NextTaskResponseDto struct {
HasTask bool `json:"hasTask"`
Task *TaskDto `json:"task,omitempty"`
}
// Device posts result
type TaskResultDto struct {
TaskID uint `json:"taskId" binding:"required"`
// success=true => Finished, success=false => Error
Success bool `json:"success"`
Result string `json:"result"` // raw JSON result from device
ErrorMsg string `json:"error"` // device-side reason if !Success
}

View File

@@ -0,0 +1,44 @@
package dto
import "smoop-api/internal/models"
type TrackerDto struct {
GUID string `json:"guid"`
Name string `json:"name"`
Users []UserDto `json:"users,omitempty"`
}
type TrackerListDto struct {
Trackers []TrackerDto `json:"trackers"`
Offset int `json:"offset"`
Limit int `json:"limit"`
Total int64 `json:"total"`
}
type CreateTrackerDto struct {
GUID string `json:"guid" binding:"required"`
Name string `json:"name" binding:"required"`
UserIDs []uint `json:"userIds"`
}
type RenameTrackerDto struct {
Name string `json:"name" binding:"required"`
}
type SetTrackerUsersDto struct {
UserIDs []uint `json:"userIds"`
}
func MapTracker(t models.Tracker) TrackerDto {
out := TrackerDto{
GUID: t.GUID,
Name: t.Name,
}
if len(t.Users) > 0 {
out.Users = make([]UserDto, 0, len(t.Users))
for _, u := range t.Users {
out.Users = append(out.Users, MapUser(u))
}
}
return out
}

View File

@@ -0,0 +1,200 @@
package handlers
import (
"context"
"crypto/x509"
"encoding/pem"
"errors"
"io"
"net/http"
"net/url"
"reflect"
"strings"
"time"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"smoop-api/internal/models"
"smoop-api/internal/vault"
)
type CertsHandler struct {
db *gorm.DB
pki *vault.PKIClient
ttl string // e.g. "720h"
}
func NewCertsHandler(db *gorm.DB, pki *vault.PKIClient, ttl string) *CertsHandler {
return &CertsHandler{db: db, pki: pki, ttl: ttl}
}
// ---- helpers ----------------------------------------------------------------
func readCSRFromRequest(c *gin.Context) (string, error) {
// Accept: multipart/form with file "csr", or JSON {"csr":"PEM..."} or text/plain body
// 1) multipart file
if f, err := c.FormFile("csr"); err == nil && f != nil {
ff, err := f.Open()
if err != nil {
return "", err
}
defer ff.Close()
b, err := io.ReadAll(ff)
return string(b), err
}
// 2) JSON
var body struct {
CSR string `json:"csr"`
}
if err := c.ShouldBindJSON(&body); err == nil && body.CSR != "" {
return body.CSR, nil
}
// 3) raw text
b, _ := io.ReadAll(c.Request.Body)
if len(b) > 0 {
return string(b), nil
}
return "", errors.New("csr required")
}
func parseLeafPEM(pemStr string) (*x509.Certificate, error) {
block, _ := pem.Decode([]byte(pemStr))
if block == nil {
return nil, errors.New("pem decode failed")
}
return x509.ParseCertificate(block.Bytes)
}
func parseClientCertFromHeader(escaped string) (*x509.Certificate, error) {
if escaped == "" {
return nil, errors.New("empty client cert header")
}
raw, err := url.QueryUnescape(escaped)
if err != nil {
// Some Nginx builds already space-escape; still try raw
raw = escaped
}
block, _ := pem.Decode([]byte(raw))
if block == nil {
return nil, errors.New("failed to decode PEM in client cert header")
}
return x509.ParseCertificate(block.Bytes)
}
// ---- enroll (no mTLS, just device exists) -----------------------------------
// POST /enroll/:guid
func (h *CertsHandler) Enroll(c *gin.Context) {
guid := c.Param("guid")
// ensure device exists
var dev models.Device
if err := h.db.First(&dev, "guid = ?", guid).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
c.JSON(http.StatusNotFound, gin.H{"error": "device not found"})
return
}
c.JSON(http.StatusInternalServerError, gin.H{"error": "lookup failed"})
return
}
csr, err := readCSRFromRequest(c)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
// sign in Vault
ctx, cancel := context.WithTimeout(c, 30*time.Second)
defer cancel()
sign, err := h.pki.SignCSR(ctx, csr, "urn:device:"+guid, h.ttl)
if err != nil {
c.JSON(http.StatusBadGateway, gin.H{"error": "vault sign failed"})
return
}
// persist cert metadata
leaf, err := parseLeafPEM(sign.Certificate)
if err == nil {
_ = h.db.Create(&models.DeviceCertificate{
DeviceGUID: guid,
SerialHex: strings.ToUpper(leaf.SerialNumber.Text(16)),
IssuerCN: leaf.Issuer.CommonName,
SubjectDN: leaf.Subject.String(),
NotBefore: leaf.NotBefore,
NotAfter: leaf.NotAfter,
PemCert: sign.Certificate,
}).Error
}
// response bundle
c.JSON(http.StatusOK, gin.H{
"certificate": sign.Certificate,
"issuing_ca": sign.IssuingCA,
"ca_chain": sign.CAChain,
})
}
// ---- renew (mTLS; cert must not be revoked; CSR pubkey must match current) --
// POST /renew/:guid
func (h *CertsHandler) Renew(c *gin.Context) {
guidAny, _ := c.Get("mtlsDeviceGUID")
serialAny, _ := c.Get("mtlsSerialHex")
guid := guidAny.(string)
currentSerial := serialAny.(string)
csr, err := readCSRFromRequest(c)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
// Check CSR pubkey == current client cert pubkey (strong binding)
clientCert, err := parseClientCertFromHeader(c.GetHeader("X-SSL-Client-Cert"))
if err != nil {
c.JSON(http.StatusUnauthorized, gin.H{"error": "invalid client cert"})
return
}
csrBlock, _ := pem.Decode([]byte(csr))
if csrBlock == nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "csr decode failed"})
return
}
parsedCSR, err := x509.ParseCertificateRequest(csrBlock.Bytes)
if err != nil || parsedCSR.PublicKey == nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "csr parse failed"})
return
}
if !reflect.DeepEqual(parsedCSR.PublicKey, clientCert.PublicKey) {
c.JSON(http.StatusForbidden, gin.H{"error": "csr key does not match current certificate key"})
return
}
// sign
ctx, cancel := context.WithTimeout(c, 30*time.Second)
defer cancel()
sign, err := h.pki.SignCSR(ctx, csr, "urn:device:"+guid, h.ttl)
if err != nil {
c.JSON(http.StatusBadGateway, gin.H{"error": "vault sign failed"})
return
}
leaf, _ := parseLeafPEM(sign.Certificate)
if leaf != nil {
_ = h.db.Create(&models.DeviceCertificate{
DeviceGUID: guid,
SerialHex: strings.ToUpper(leaf.SerialNumber.Text(16)),
IssuerCN: leaf.Issuer.CommonName,
SubjectDN: leaf.Subject.String(),
NotBefore: leaf.NotBefore,
NotAfter: leaf.NotAfter,
PemCert: sign.Certificate,
}).Error
}
c.JSON(http.StatusOK, gin.H{
"certificate": sign.Certificate,
"issuing_ca": sign.IssuingCA,
"ca_chain": sign.CAChain,
"old_serial": currentSerial,
})
}

View File

@@ -0,0 +1,51 @@
package handlers
import (
"context"
"net/http"
"strings"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"smoop-api/internal/models"
"smoop-api/internal/vault"
)
type CertsAdminHandler struct {
db *gorm.DB
pki *vault.PKIClient
}
func NewCertsAdminHandler(db *gorm.DB, pki *vault.PKIClient) *CertsAdminHandler {
return &CertsAdminHandler{db: db, pki: pki}
}
type RevokeReq struct {
Serial string `json:"serial" binding:"required"` // hex
Reason string `json:"reason"`
}
func (h *CertsAdminHandler) Revoke(c *gin.Context) {
var req RevokeReq
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
serial := strings.ToUpper(strings.TrimSpace(req.Serial))
if serial == "" {
c.JSON(http.StatusBadRequest, gin.H{"error": "serial required"})
return
}
// store locally (instant kill)
if err := h.db.Create(&models.RevokedSerial{SerialHex: serial, Reason: req.Reason}).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "db save failed"})
return
}
// trigger CRL refresh in Vault (best-effort)
_ = h.pki.RebuildCRL(context.Background())
c.JSON(http.StatusOK, gin.H{"revoked": serial})
}

View File

@@ -289,3 +289,18 @@ func (h *DevicesHandler) fetchUsers(ids []uint) ([]models.User, error) {
} }
return users, nil return users, nil
} }
func (h *DevicesHandler) ListCertsByDevice(c *gin.Context) {
guid := c.Param("guid")
var d models.Device
if err := h.db.Where("guid = ?", guid).First(&d).Error; err != nil {
c.JSON(http.StatusNotFound, gin.H{"error": "device not found"})
return
}
var list []models.DeviceCertificate
if err := h.db.Where("device_guid = ?", guid).Order("id desc").Find(&list).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "query failed"})
return
}
c.JSON(http.StatusOK, gin.H{"certs": list})
}

View File

@@ -0,0 +1,256 @@
package handlers
import (
"encoding/json"
"fmt"
"net/http"
"net/url"
"smoop-api/internal/config"
"smoop-api/internal/crypto"
"smoop-api/internal/dto"
"smoop-api/internal/models"
"strings"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
)
type MediaMTXHandler struct {
jwtMgr *crypto.JWTManager
db *gorm.DB
cfg config.MediaMTXConfig
}
func NewMediaMTXHandler(db *gorm.DB, jwt *crypto.JWTManager, c config.MediaMTXConfig) *MediaMTXHandler {
return &MediaMTXHandler{db: db, jwtMgr: jwt, cfg: c}
}
// --- 3.1 External auth endpoint called by MediaMTX
// POST /mediamtx/auth
func (h *MediaMTXHandler) Auth(c *gin.Context) {
var req dto.MediaMTXAuthReq
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "bad auth body"})
return
}
// token can come from Authorization: Bearer or from query (?token=)
tok := extractBearer(c.GetHeader("Authorization"))
if tok == "" {
tok = tokenFromQuery(req.Query)
}
if tok == "" {
c.JSON(http.StatusUnauthorized, gin.H{"error": "missing token"})
return
}
// parse & validate media token
// parsed, err := h.jwtMgr.Parse(tok)
// if err != nil || !parsed.Valid {
// c.JSON(http.StatusUnauthorized, gin.H{"error": "invalid token"})
// return
// }
// var mc dto.MediaClaims
// if err := jwt.MapClaims(parsed.Claims.(jwt.MapClaims)).Decode(&mc); err != nil {
// c.JSON(http.StatusUnauthorized, gin.H{"error": "invalid claims"})
// return
// }
// // enforce act/path
// if mc.Act != req.Action {
// c.JSON(http.StatusForbidden, gin.H{"error": "action mismatch"})
// return
// }
// if mc.Path != req.Path {
// c.JSON(http.StatusForbidden, gin.H{"error": "path mismatch"})
// return
// }
// // Optional: permission checks by role/device
// // READ: admins can read anything; users only devices assigned
// // PUBLISH: allow devices (sub=0 or special) or admins
// switch req.Action {
// case "read":
// if !h.canRead(mc.Subject, req.Path) {
// c.JSON(http.StatusForbidden, gin.H{"error": "no read permission"})
// return
// }
// case "publish":
// if !h.canPublish(mc.Subject, req.Path) {
// c.JSON(http.StatusForbidden, gin.H{"error": "no publish permission"})
// return
// }
// }
// parse & validate media token
mc, err := h.jwtMgr.ParseMedia(tok)
if err != nil {
c.JSON(http.StatusUnauthorized, gin.H{"error": "invalid token"})
return
}
// enforce act/path
if mc.Act != req.Action {
c.JSON(http.StatusForbidden, gin.H{"error": "action mismatch"})
return
}
if mc.Path != req.Path {
c.JSON(http.StatusForbidden, gin.H{"error": "path mismatch"})
return
}
sub := mc.Subject // from RegisteredClaims.Subject
switch req.Action {
case "read":
if !h.canRead(sub, req.Path) {
c.JSON(http.StatusForbidden, gin.H{"error": "no read permission"})
return
}
case "publish":
if !h.canPublish(sub, req.Path) {
c.JSON(http.StatusForbidden, gin.H{"error": "no publish permission"})
return
}
}
// allowed
c.Status(http.StatusOK)
}
func extractBearer(h string) string {
if strings.HasPrefix(strings.ToLower(h), "bearer ") {
return strings.TrimSpace(h[7:])
}
return ""
}
func tokenFromQuery(raw string) string {
if raw == "" {
return ""
}
q, _ := url.ParseQuery(raw)
return q.Get("token")
}
// naive helpers: replace with real queries to users/devices tables
func (h *MediaMTXHandler) canRead(sub, path string) bool {
// path is "live/<guid>"
parts := strings.SplitN(path, "/", 2)
if len(parts) != 2 {
return false
}
guid := parts[1]
// Find the user; admins -> allow; else check user_devices join
var u models.User
if err := h.db.Where("id = ?", sub).First(&u).Error; err == nil && u.Role == models.RoleAdmin {
return true
}
// check assignment
var count int64
_ = h.db.Table("user_devices").
Where("user_id = ? AND device_guid = ?", sub, guid).
Count(&count).Error
return count > 0
}
func (h *MediaMTXHandler) canPublish(sub, path string) bool {
// For devices you may use sub=0 or map to a device row; here: allow admins only
var u models.User
if err := h.db.Where("id = ?", sub).First(&u).Error; err == nil && u.Role == models.RoleAdmin {
return true
}
return false
}
// --- 3.2 Mint publish token (device flow) -> returns WHIP URL
// POST /mediamtx/token/publish {guid}
func (h *MediaMTXHandler) MintPublish(c *gin.Context) {
var req dto.PublishTokenReq
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "bad request"})
return
}
path := "live/" + req.GUID
tok, _ := h.jwtMgr.GenerateMediaToken(0, "publish", path, h.cfg.TokenTTL) // sub=0 (device)
whip := fmt.Sprintf("%s/whip/%s?token=%s", strings.TrimRight(h.cfg.WebRTCBaseURL, "/"), path, url.QueryEscape(tok))
c.JSON(http.StatusCreated, dto.PublishTokenResp{WHIP: whip})
}
// --- 3.3 Mint read token (user flow) -> returns HLS + WHEP URLs
// POST /mediamtx/token/read {guid}
func (h *MediaMTXHandler) MintRead(c *gin.Context) {
user, ok := GetUserContext(c)
if !ok {
c.JSON(http.StatusUnauthorized, gin.H{"error": "unauthorized"})
return
}
var req dto.ReadTokenReq
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "bad request"})
return
}
path := "live/" + req.GUID
// check permission before minting
if user.Role != models.RoleAdmin {
var count int64
_ = h.db.Table("user_devices").
Where("user_id = ? AND device_guid = ?", user.ID, req.GUID).
Count(&count).Error
if count == 0 {
c.JSON(http.StatusForbidden, gin.H{"error": "not allowed for this device"})
return
}
}
tok, _ := h.jwtMgr.GenerateMediaToken(user.ID, "read", path, h.cfg.TokenTTL)
pub := strings.TrimRight(h.cfg.PublicBaseURL, "/")
resp := dto.ReadTokenResp{
HLS: fmt.Sprintf("%s/hls/%s/index.m3u8?token=%s", pub, path, url.QueryEscape(tok)),
WHEP: fmt.Sprintf("%s/webrtc/play/%s?token=%s", pub, path, url.QueryEscape(tok)),
}
c.JSON(http.StatusCreated, resp)
}
// --- 3.4 Admin "controls" using MediaMTX Control API (v3)
type pathsListRes struct {
Items []struct {
Name string `json:"name"`
} `json:"items"`
}
func (h *MediaMTXHandler) ListPaths(c *gin.Context) {
// GET {apiBase}/v3/paths/list
resp, err := http.Get(strings.TrimRight(h.cfg.APIBase, "/") + "/v3/paths/list")
if err != nil {
c.JSON(http.StatusBadGateway, gin.H{"error": "mtx api unreachable"})
return
}
defer resp.Body.Close()
if resp.StatusCode != 200 {
c.JSON(resp.StatusCode, gin.H{"error": "mtx api error"})
return
}
var pl pathsListRes
if err := json.NewDecoder(resp.Body).Decode(&pl); err != nil {
c.JSON(http.StatusBadGateway, gin.H{"error": "decode error"})
return
}
c.JSON(200, pl)
}
func (h *MediaMTXHandler) KickWebRTC(c *gin.Context) {
// POST {apiBase}/v3/webrtcsessions/kick/{id}
id := c.Param("id")
reqURL := strings.TrimRight(h.cfg.APIBase, "/") + "/v3/webrtcsessions/kick/" + url.PathEscape(id)
httpResp, err := http.Post(reqURL, "application/json", http.NoBody)
if err != nil {
c.JSON(http.StatusBadGateway, gin.H{"error": "mtx api unreachable"})
return
}
defer httpResp.Body.Close()
if httpResp.StatusCode/100 != 2 {
c.JSON(httpResp.StatusCode, gin.H{"error": "kick failed"})
return
}
c.Status(http.StatusNoContent)
}

View File

@@ -0,0 +1,251 @@
package handlers
import (
"errors"
"net/http"
"strconv"
"time"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"smoop-api/internal/dto"
"smoop-api/internal/models"
)
type TasksHandler struct {
db *gorm.DB
}
func NewTasksHandler(db *gorm.DB) *TasksHandler { return &TasksHandler{db: db} }
// -----------------------------------------------------------------------------
// 1) Device heartbeat + fetch next task
// GET /tasks/:guid
// Returns 204 (no task) OR next pending task (and marks it Running)
// -----------------------------------------------------------------------------
func (h *TasksHandler) DeviceNextTask(c *gin.Context) {
guid := c.Param("guid")
// Optional: verify device exists to avoid orphan tasks
var dev models.Device
if err := h.db.First(&dev, "guid = ?", guid).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
c.JSON(http.StatusNotFound, gin.H{"error": "device not found"})
return
}
c.JSON(http.StatusInternalServerError, gin.H{"error": "lookup failed"})
return
}
var task models.DEviceTask
now := time.Now()
// Atomically pick the oldest pending task for device and mark Running
err := h.db.Transaction(func(tx *gorm.DB) error {
// FOR UPDATE SKIP LOCKED emulation is not universal in GORM;
// simplest: select oldest pending, then optimistic update.
if err := tx.
// NOTE: if using Postgres, you can append `Clauses(clause.Locking{Strength: "UPDATE SKIP LOCKED"})`
// for better concurrency. Keeping generic here.
Where("device_guid = ? AND status = ?", guid, models.TaskStatusPending).
Order("created_at ASC").
Take(&task).Error; err != nil {
return err
}
task.Status = models.TaskStatusRunning
task.StartedAt = &now
return tx.Save(&task).Error
})
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
// Heartbeat: no task right now
c.Status(http.StatusNoContent)
return
}
c.JSON(http.StatusInternalServerError, gin.H{"error": "update failed"})
return
}
c.JSON(http.StatusOK, dto.NextTaskResponseDto{
HasTask: true,
Task: ptr(dto.MapTask(task)),
})
}
// -----------------------------------------------------------------------------
// 2) Device posts result
// POST /tasks/:guid
// -----------------------------------------------------------------------------
func (h *TasksHandler) DevicePostResult(c *gin.Context) {
guid := c.Param("guid")
var req dto.TaskResultDto
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
var task models.DEviceTask
if err := h.db.Where("id = ? AND device_guid = ?", req.TaskID, guid).First(&task).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
c.JSON(http.StatusNotFound, gin.H{"error": "task not found"})
return
}
c.JSON(http.StatusInternalServerError, gin.H{"error": "lookup failed"})
return
}
// Only Running tasks can be completed
if task.Status != models.TaskStatusRunning {
c.JSON(http.StatusConflict, gin.H{"error": "task not in running state"})
return
}
now := time.Now()
if req.Success {
task.Status = models.TaskStatusFinished
task.Result = req.Result
task.ErrorMsg = ""
} else {
task.Status = models.TaskStatusError
task.Result = req.Result
task.ErrorMsg = req.ErrorMsg
}
task.FinishedAt = &now
if err := h.db.Save(&task).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "save failed"})
return
}
c.JSON(http.StatusOK, dto.MapTask(task))
}
// -----------------------------------------------------------------------------
// 3) Create task for device (user/admin creates work item)
// POST /device/:guid/task
// -----------------------------------------------------------------------------
func (h *TasksHandler) CreateTask(c *gin.Context) {
guid := c.Param("guid")
// Permission check: device must be visible for user (DeviceAccessFilter already applied)
if err := h.requireDeviceVisible(c, guid); err != nil {
// err already wrote response
return
}
var req dto.CreateTaskDto
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
// Validate that device exists
var d models.Device
if err := h.db.Where("guid = ?", guid).First(&d).Error; err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
c.JSON(http.StatusNotFound, gin.H{"error": "device not found"})
return
}
c.JSON(http.StatusInternalServerError, gin.H{"error": "lookup failed"})
return
}
task := models.DEviceTask{
DeviceGUID: guid,
Type: req.Type,
Payload: req.Payload, // raw JSON string
Status: models.TaskStatusPending,
}
if err := h.db.Create(&task).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "create failed"})
return
}
c.JSON(http.StatusCreated, dto.MapTask(task))
}
// -----------------------------------------------------------------------------
// 4) List tasks for device (with status & pagination)
// GET /device/:guid/tasks?offset=0&limit=50&status=pending|running|finished|error
// -----------------------------------------------------------------------------
func (h *TasksHandler) ListDeviceTasks(c *gin.Context) {
guid := c.Param("guid")
// Permission check
if err := h.requireDeviceVisible(c, guid); err != nil {
return
}
offset := atoiDefault(c.DefaultQuery("offset", "0"), 0)
limit := atoiDefault(c.DefaultQuery("limit", "50"), 50)
if limit <= 0 || limit > 200 {
limit = 50
}
filterStatus := c.Query("status") // optional
q := h.db.Model(&models.DEviceTask{}).Where("device_guid = ?", guid)
if filterStatus != "" {
q = q.Where("status = ?", filterStatus)
}
var total int64
if err := q.Count(&total).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "count failed"})
return
}
var tasks []models.DEviceTask
if err := q.Order("id DESC").Offset(offset).Limit(limit).Find(&tasks).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "query failed"})
return
}
out := make([]dto.TaskDto, 0, len(tasks))
for _, t := range tasks {
out = append(out, dto.MapTask(t))
}
c.JSON(http.StatusOK, gin.H{
"tasks": out,
"offset": offset,
"limit": limit,
"total": total,
})
}
// --- helpers -----------------------------------------------------------------
func (h *TasksHandler) requireDeviceVisible(c *gin.Context, guid string) error {
// Admins can always see it; regular users must be assigned
uc, ok := GetUserContext(c)
if !ok {
c.JSON(http.StatusUnauthorized, gin.H{"error": "unauthorized"})
return errors.New("unauthorized")
}
if uc.Role == models.RoleAdmin {
return nil
}
// check assignment
var cnt int64
if err := h.db.Table("user_devices").
Where("user_id = ? AND device_guid = ?", uc.ID, guid).
Count(&cnt).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "permission check failed"})
return err
}
if cnt == 0 {
c.JSON(http.StatusForbidden, gin.H{"error": "forbidden"})
return errors.New("forbidden")
}
return nil
}
func atoiDefault(s string, def int) int {
n, err := strconv.Atoi(s)
if err != nil {
return def
}
return n
}
func ptr[T any](v T) *T { return &v }

View File

@@ -0,0 +1,212 @@
package handlers
import (
"fmt"
"net/http"
"strconv"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"smoop-api/internal/dto"
"smoop-api/internal/models"
)
type TrackersHandler struct {
db *gorm.DB
}
func NewTrackersHandler(db *gorm.DB) *TrackersHandler { return &TrackersHandler{db: db} }
// GET /trackers — list trackers available for user (admin: all)
func (h *TrackersHandler) List(c *gin.Context) {
offset, _ := strconv.Atoi(c.DefaultQuery("offset", "0"))
limit, _ := strconv.Atoi(c.DefaultQuery("limit", "50"))
if limit <= 0 || limit > 200 {
limit = 50
}
// Default behavior (fallback if middleware not present): use user context
isFilter := true
var userID uint
if v, ok := c.Get("filterTrackers"); ok {
if b, ok2 := v.(bool); ok2 {
isFilter = b
}
}
if v, ok := c.Get("userID"); ok {
if id, ok2 := v.(uint); ok2 {
userID = id
}
}
// Fallback to claims if middleware wasnt applied
if _, exists := c.Get("filterTrackers"); !exists {
if uc, ok := GetUserContext(c); ok {
if uc.Role == models.RoleAdmin {
isFilter = false
} else {
isFilter = true
userID = uc.ID
}
} else {
c.JSON(http.StatusUnauthorized, gin.H{"error": "unauthorized"})
return
}
}
var (
total int64
list []models.Tracker
err error
)
if !isFilter {
// Admin: all trackers
err = h.db.Model(&models.Tracker{}).Count(&total).Error
if err == nil {
err = h.db.Preload("Users").Offset(offset).Limit(limit).Find(&list).Error
}
} else {
// Filtered by userID
q := h.db.Model(&models.Tracker{}).
Joins("JOIN user_trackers ut ON ut.tracker_guid = trackers.guid").
Where("ut.user_id = ?", userID)
if err = q.Count(&total).Error; err == nil {
err = h.db.Preload("Users").
Joins("JOIN user_trackers ut ON ut.tracker_guid = trackers.guid").
Where("ut.user_id = ?", userID).
Offset(offset).Limit(limit).
Find(&list).Error
}
}
if err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "query failed: " + err.Error()})
return
}
out := make([]dto.TrackerDto, 0, len(list))
for _, t := range list {
out = append(out, dto.MapTracker(t))
}
c.JSON(http.StatusOK, dto.TrackerListDto{
Trackers: out, Offset: offset, Limit: limit, Total: total,
})
}
// POST /trackers/create — create tracker; optional initial user assignments
func (h *TrackersHandler) Create(c *gin.Context) {
var req dto.CreateTrackerDto
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
t := models.Tracker{GUID: req.GUID, Name: req.Name}
if err := h.db.Create(&t).Error; err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "tracker exists?"})
return
}
// optional users
if len(req.UserIDs) > 0 {
users, err := h.fetchUsers(req.UserIDs)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
if err := h.db.Model(&t).Association("Users").Append(&users); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "link failed"})
return
}
}
var withUsers models.Tracker
if err := h.db.Preload("Users").Where("guid = ?", t.GUID).First(&withUsers).Error; err != nil {
c.JSON(http.StatusCreated, dto.TrackerDto{GUID: t.GUID, Name: t.Name})
return
}
c.JSON(http.StatusCreated, dto.MapTracker(withUsers))
}
// POST /trackers/:guid/rename — rename tracker
func (h *TrackersHandler) Rename(c *gin.Context) {
guid := c.Param("guid")
var t models.Tracker
if err := h.db.Where("guid = ?", guid).First(&t).Error; err != nil {
c.JSON(http.StatusNotFound, gin.H{"error": "tracker not found"})
return
}
var req dto.RenameTrackerDto
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
t.Name = req.Name
if err := h.db.Save(&t).Error; err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "save failed"})
return
}
c.JSON(http.StatusCreated, dto.TrackerDto{GUID: t.GUID, Name: t.Name})
}
// POST /trackers/:guid/set_users — replace full user list (admin)
func (h *TrackersHandler) SetUsers(c *gin.Context) {
guid := c.Param("guid")
var t models.Tracker
if err := h.db.Where("guid = ?", guid).First(&t).Error; err != nil {
c.JSON(http.StatusNotFound, gin.H{"error": "tracker not found"})
return
}
var req dto.SetTrackerUsersDto
if err := c.ShouldBindJSON(&req); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
users := []models.User{}
if len(req.UserIDs) > 0 {
found, err := h.fetchUsers(req.UserIDs)
if err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
return
}
users = found
}
if err := h.db.Model(&t).Association("Users").Clear(); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "clear failed"})
return
}
if len(users) > 0 {
if err := h.db.Model(&t).Association("Users").Append(&users); err != nil {
c.JSON(http.StatusInternalServerError, gin.H{"error": "link failed"})
return
}
}
var withUsers models.Tracker
_ = h.db.Preload("Users").Where("guid = ?", t.GUID).First(&withUsers).Error
c.JSON(http.StatusCreated, dto.MapTracker(withUsers))
}
// local helper (same as devices.go)
func (h *TrackersHandler) fetchUsers(ids []uint) ([]models.User, error) {
unique := make(map[uint]struct{}, len(ids))
clean := make([]uint, 0, len(ids))
for _, id := range ids {
if id != 0 {
if _, ok := unique[id]; !ok {
unique[id] = struct{}{}
clean = append(clean, id)
}
}
}
if len(clean) == 0 {
return nil, nil
}
var users []models.User
if err := h.db.Find(&users, clean).Error; err != nil {
return nil, err
}
if len(users) != len(clean) {
return nil, fmt.Errorf("some users not found")
}
return users, nil
}

View File

@@ -35,3 +35,32 @@ func DeviceAccessFilter() gin.HandlerFunc {
c.Next() c.Next()
} }
} }
// TrackerAccessFilter middleware sets filtering context for tracker access
func TrackerAccessFilter() gin.HandlerFunc {
return func(c *gin.Context) {
userContext, exists := c.Get("user")
if !exists {
c.JSON(401, gin.H{"error": "unauthorized"})
c.Abort()
return
}
user, ok := userContext.(handlers.UserContext)
if !ok {
c.JSON(401, gin.H{"error": "invalid user data"})
c.Abort()
return
}
// Set filter flag and user ID in context (mirrors devices)
if user.Role == models.RoleAdmin {
c.Set("filterTrackers", false) // Admin sees all trackers
} else {
c.Set("filterTrackers", true) // Regular user needs filtering
c.Set("userID", user.ID) // Store user ID for filtering (same key as devices)
}
c.Next()
}
}

View File

@@ -0,0 +1,152 @@
package middleware
import (
"crypto/x509"
"encoding/hex"
"encoding/pem"
"errors"
"net/url"
"strings"
"github.com/gin-gonic/gin"
"gorm.io/gorm"
"smoop-api/internal/models"
)
// Common helpers ---------------------------------------------------------------
func getHeader(c *gin.Context, k string) string {
return strings.TrimSpace(c.GetHeader(k))
}
func parseClientCertFromHeader(escaped string) (*x509.Certificate, error) {
if escaped == "" {
return nil, errors.New("empty client cert header")
}
raw, err := url.QueryUnescape(escaped)
if err != nil {
// Some Nginx builds already space-escape; still try raw
raw = escaped
}
block, _ := pem.Decode([]byte(raw))
if block == nil {
return nil, errors.New("failed to decode PEM in client cert header")
}
return x509.ParseCertificate(block.Bytes)
}
func extractGuidFromSAN(cert *x509.Certificate) (string, bool) {
for _, u := range cert.URIs {
if strings.EqualFold(u.Scheme, "urn") {
// urn:device:<GUID> => u.Opaque == "device:<GUID>"
parts := strings.SplitN(u.Opaque, ":", 2)
if len(parts) == 2 && strings.EqualFold(parts[0], "device") {
return parts[1], true
}
}
}
return "", false
}
func normalizeSerialHex(b []byte) string {
h := strings.ToUpper(hex.EncodeToString(b))
// remove leading zeros normalization optional, keep as-is
return h
}
func isSerialRevoked(db *gorm.DB, serialHex string) (bool, error) {
var cnt int64
if err := db.Model(&models.RevokedSerial{}).Where("serial_hex = ?", serialHex).Count(&cnt).Error; err != nil {
return false, err
}
return cnt > 0, nil
}
// Guard for /tasks/:guid and /renew/:guid -------------------------------------
// Requires Nginx to forward:
//
// X-SSL-Client-Verify, X-SSL-Client-Serial, X-SSL-Client-Cert
func MTLSGuard(db *gorm.DB) gin.HandlerFunc {
return func(c *gin.Context) {
if getHeader(c, "X-SSL-Client-Verify") != "SUCCESS" {
c.AbortWithStatus(401)
return
}
// Parse client cert (for GUID extraction) and serial
cert, err := parseClientCertFromHeader(getHeader(c, "X-SSL-Client-Cert"))
if err != nil {
c.AbortWithStatusJSON(401, gin.H{"error": "invalid client cert"})
return
}
pathGuid := strings.TrimSpace(c.Param("guid"))
certGuid, ok := extractGuidFromSAN(cert)
if !ok || certGuid == "" {
c.AbortWithStatusJSON(403, gin.H{"error": "guid not present in SAN"})
return
}
if pathGuid == "" || !strings.EqualFold(pathGuid, certGuid) {
c.AbortWithStatusJSON(403, gin.H{"error": "guid mismatch"})
return
}
serialHex := normalizeSerialHex(cert.SerialNumber.Bytes())
rev, err := isSerialRevoked(db, serialHex)
if err != nil {
c.AbortWithStatusJSON(500, gin.H{"error": "revocation check failed"})
return
}
if rev {
c.AbortWithStatus(403)
return
}
// Stash for downstream (device + serial)
c.Set("mtlsDeviceGUID", certGuid)
c.Set("mtlsSerialHex", serialHex)
c.Next()
}
}
// Guard for /records/upload (guid comes as form field instead of path)
func MTLSGuardUpload(db *gorm.DB) gin.HandlerFunc {
return func(c *gin.Context) {
if getHeader(c, "X-SSL-Client-Verify") != "SUCCESS" {
c.AbortWithStatus(401)
return
}
cert, err := parseClientCertFromHeader(getHeader(c, "X-SSL-Client-Cert"))
if err != nil {
c.AbortWithStatusJSON(401, gin.H{"error": "invalid client cert"})
return
}
certGuid, ok := extractGuidFromSAN(cert)
if !ok || certGuid == "" {
c.AbortWithStatusJSON(403, gin.H{"error": "guid not present in SAN"})
return
}
formGuid := strings.TrimSpace(c.PostForm("guid"))
if formGuid == "" {
// allow query fallback if you want
formGuid = strings.TrimSpace(c.Query("guid"))
}
if !strings.EqualFold(formGuid, certGuid) {
c.AbortWithStatusJSON(403, gin.H{"error": "guid mismatch"})
return
}
serialHex := normalizeSerialHex(cert.SerialNumber.Bytes())
rev, err := isSerialRevoked(db, serialHex)
if err != nil {
c.AbortWithStatusJSON(500, gin.H{"error": "revocation check failed"})
return
}
if rev {
c.AbortWithStatus(403)
return
}
c.Set("mtlsDeviceGUID", certGuid)
c.Set("mtlsSerialHex", serialHex)
c.Next()
}
}

View File

@@ -0,0 +1,24 @@
package models
import "time"
// Link a device GUID to issued client certificates.
type DeviceCertificate struct {
ID uint `gorm:"primaryKey"`
DeviceGUID string `gorm:"index;not null"` // GUID
SerialHex string `gorm:"uniqueIndex;size:128;not null"` // hex (upper or lower; normalize)
IssuerCN string `gorm:"size:255"`
SubjectDN string `gorm:"size:1024"`
NotBefore time.Time
NotAfter time.Time
PemCert string `gorm:"type:text"` // PEM of leaf cert
CreatedAt time.Time
}
// “Instant kill” list checked by the mTLS guard before allowing access.
type RevokedSerial struct {
ID uint `gorm:"primaryKey"`
SerialHex string `gorm:"uniqueIndex;size:128;not null"`
Reason string `gorm:"size:1024"`
CreatedAt time.Time
}

View File

@@ -0,0 +1,51 @@
package models
import "time"
type TaskStatus string
type DeviceTaskType string
const (
TaskStatusPending TaskStatus = "pending"
TaskStatusRunning TaskStatus = "running"
TaskStatusFinished TaskStatus = "finished"
TaskStatusError TaskStatus = "error"
)
const (
// 1. start/stop audiostream
TaskTypeStartStream DeviceTaskType = "start_stream"
TaskTypeStopStream DeviceTaskType = "stop_stream"
// 2. start/stop recording
TaskTypeStartRecording DeviceTaskType = "start_recording"
TaskTypeStopRecording DeviceTaskType = "stop_recording"
// 3. change configuration (sleep timeout, jitter, recording duration)
TaskTypeUpdateConfig DeviceTaskType = "update_config"
// 4. set deep sleep duration (minutes)
TaskTypeSetDeepSleep DeviceTaskType = "set_deep_sleep"
)
type DEviceTask struct {
ID uint `gorm:"primaryKey"`
DeviceGUID string `gorm:"index;not null"`
Type DeviceTaskType `gorm:"type:varchar(64);not null"`
// JSON payload from server to device (parameters)
Payload string `gorm:"type:text;not null;default:'{}'"`
Status TaskStatus `gorm:"type:varchar(16);not null;index"`
// Optional error/reason from server or device
ErrorMsg string `gorm:"type:text"`
// Raw result JSON from device (success path)
Result string `gorm:"type:text"`
// State timing
CreatedAt time.Time
UpdatedAt time.Time
StartedAt *time.Time // when device fetched/acknowledged (Running)
FinishedAt *time.Time // when device posted result (Finished/Error)
// Optional: small attempt/lease system if you ever need retries/timeouts
// Attempts int `gorm:"not null;default:0"`
}

View File

@@ -0,0 +1,11 @@
package models
import "time"
type Tracker struct {
GUID string `gorm:"primaryKey"`
Name string `gorm:"size:255;not null"`
Users []User `gorm:"many2many:user_trackers;constraint:OnDelete:CASCADE;"`
CreatedAt time.Time
UpdatedAt time.Time
}

View File

@@ -15,6 +15,7 @@ type User struct {
Password string `gorm:"not null"` Password string `gorm:"not null"`
Role Role `gorm:"type:varchar(16);not null;default:'user'"` Role Role `gorm:"type:varchar(16);not null;default:'user'"`
Devices []Device `gorm:"many2many:user_devices;constraint:OnDelete:CASCADE;"` Devices []Device `gorm:"many2many:user_devices;constraint:OnDelete:CASCADE;"`
Trackers []Tracker `gorm:"many2many:user_trackers;constraint:OnDelete:CASCADE;"`
CreatedAt time.Time CreatedAt time.Time
UpdatedAt time.Time UpdatedAt time.Time
} }

View File

@@ -0,0 +1,12 @@
package models
import "time"
type UserTracker struct {
UserID uint `gorm:"primaryKey;index;not null"`
TrackerGUID string `gorm:"primaryKey;size:64;index;not null"`
CreatedAt time.Time
User User `gorm:"constraint:OnDelete:CASCADE;"`
Tracker Tracker `gorm:"constraint:OnDelete:CASCADE;foreignKey:TrackerGUID;references:GUID"`
}

View File

@@ -26,6 +26,15 @@ func Build(db *gorm.DB, minio *minio.Client, cfg *config.Config) *gin.Engine {
recH := handlers.NewRecordsHandler(db, minio, cfg.MinIO.RecordsBucket, cfg.MinIO.PresignTTL) recH := handlers.NewRecordsHandler(db, minio, cfg.MinIO.RecordsBucket, cfg.MinIO.PresignTTL)
liveH := handlers.NewLivestreamHandler(minio, cfg.MinIO.LivestreamBucket) liveH := handlers.NewLivestreamHandler(minio, cfg.MinIO.LivestreamBucket)
// --- MediaMTX handler
mediamtxH := handlers.NewMediaMTXHandler(db, jwtMgr, cfg.MediaMTX)
/// --- GPS tracker handler
trackersH := handlers.NewTrackersHandler(db)
tasksH := handlers.NewTasksHandler(db)
certsH := handlers.NewCertsHandler(db, &cfg.PkiIot, "720h")
certsAdminH := handlers.NewCertsAdminHandler(db, &cfg.PkiIot)
// --- Public auth // --- Public auth
r.POST("/auth/signup", authH.SignUp) r.POST("/auth/signup", authH.SignUp)
r.POST("/auth/signin", authH.SignIn) r.POST("/auth/signin", authH.SignIn)
@@ -44,13 +53,17 @@ func Build(db *gorm.DB, minio *minio.Client, cfg *config.Config) *gin.Engine {
r.DELETE("/users/:id", authMW, adminOnly, usersH.Delete) r.DELETE("/users/:id", authMW, adminOnly, usersH.Delete)
r.GET("/devices", authMW, middleware.DeviceAccessFilter(), devH.List) r.GET("/devices", authMW, middleware.DeviceAccessFilter(), devH.List)
r.POST("/devices/create", authMW, devH.Create) r.POST("/devices/create", authMW, adminOnly, devH.Create)
r.POST("/devices/:guid/rename", authMW, devH.Rename) r.POST("/devices/:guid/rename", authMW, devH.Rename)
r.POST("/devices/:guid/add_to_user", authMW, devH.AddToUser) r.POST("/devices/:guid/add_to_user", authMW, devH.AddToUser)
r.POST("/devices/:guid/set_users", authMW, adminOnly, devH.SetUsers) r.POST("/devices/:guid/set_users", authMW, adminOnly, devH.SetUsers)
r.POST("/devices/:guid/remove_from_user", authMW, devH.RemoveFromUser) r.POST("/devices/:guid/remove_from_user", authMW, devH.RemoveFromUser)
r.POST("/device/:guid/task", authMW, middleware.DeviceAccessFilter(), tasksH.CreateTask)
r.GET("/device/:guid/tasks", authMW, middleware.DeviceAccessFilter(), tasksH.ListDeviceTasks)
r.GET("/device/:guid/certs", authMW, adminOnly, devH.ListCertsByDevice)
r.POST("/certs/revoke", authMW, adminOnly, certsAdminH.Revoke)
r.POST("/records/upload", recH.Upload) r.POST("/records/upload", middleware.MTLSGuardUpload(db), recH.Upload)
r.GET("/records", authMW, recH.List) r.GET("/records", authMW, recH.List)
r.GET("/records/:id/file", authMW, recH.File) r.GET("/records/:id/file", authMW, recH.File)
@@ -60,6 +73,27 @@ func Build(db *gorm.DB, minio *minio.Client, cfg *config.Config) *gin.Engine {
// health // health
r.GET("/healthz", func(c *gin.Context) { c.String(http.StatusOK, "ok") }) r.GET("/healthz", func(c *gin.Context) { c.String(http.StatusOK, "ok") })
// --- NEW: MediaMTX integration routes
// External auth (called by MediaMTX)
r.POST("/mediamtx/auth", mediamtxH.Auth)
// Token minting for device/user flows
r.POST("/mediamtx/token/publish", mediamtxH.MintPublish)
r.POST("/mediamtx/token/read", authMW, mediamtxH.MintRead)
// Admin controls
r.GET("/mediamtx/paths", authMW, adminOnly, mediamtxH.ListPaths)
r.POST("/mediamtx/webrtc/kick/:id", authMW, adminOnly, mediamtxH.KickWebRTC)
r.GET("/trackers", authMW, middleware.TrackerAccessFilter(), trackersH.List)
r.POST("/trackers/create", authMW, trackersH.Create)
r.POST("/trackers/:guid/rename", authMW, trackersH.Rename)
r.POST("/trackers/:guid/set_users", authMW, adminOnly, trackersH.SetUsers)
// --- Device Job/Task API
r.GET("/tasks/:guid", middleware.MTLSGuard(db), tasksH.DeviceNextTask) // heartbeat + fetch next task
r.POST("/tasks/:guid", middleware.MTLSGuard(db), tasksH.DevicePostResult) // device posts result
r.POST("/enroll/:guid", certsH.Enroll) // simple device-exists check is inside handler
r.POST("/renew/:guid", middleware.MTLSGuard(db), certsH.Renew)
// sensible defaults // sensible defaults
r.MaxMultipartMemory = 64 << 20 // 64 MiB r.MaxMultipartMemory = 64 << 20 // 64 MiB
_ = time.Now() // appease linters _ = time.Now() // appease linters

View File

@@ -0,0 +1,86 @@
package vault
import (
"context"
"encoding/json"
"fmt"
"time"
vault "github.com/hashicorp/vault-client-go"
)
type PKIClient struct {
client *vault.Client
mount string // e.g. "pki_iot"
role string // e.g. "device"
}
type SignResponse struct {
Certificate string `json:"certificate"`
IssuingCA string `json:"issuing_ca"`
CAChain []string `json:"ca_chain"`
PrivateKey string `json:"private_key,omitempty"`
PrivateKeyType string `json:"private_key_type,omitempty"`
SerialNumber string `json:"serial_number"`
}
func NewPKI(addr, token, mount, role string, timeout time.Duration) (*PKIClient, error) {
client, err := vault.New(
vault.WithAddress(addr),
vault.WithRequestTimeout(timeout),
)
if err != nil {
return nil, fmt.Errorf("vault new: %w", err)
}
if err := client.SetToken(token); err != nil {
return nil, fmt.Errorf("set token: %w", err)
}
return &PKIClient{client: client, mount: mount, role: role}, nil
}
// SignCSR calls: /v1/<mount>/sign/<role>
func (p *PKIClient) SignCSR(ctx context.Context, csrPEM, uriSAN string, ttl string) (*SignResponse, error) {
if p.client == nil {
return nil, fmt.Errorf("vault client is nil")
}
path := fmt.Sprintf("/%s/sign/%s", p.mount, p.role)
req := map[string]any{
"csr": csrPEM,
"uri_sans": uriSAN, // e.g. "urn:device:<GUID>"
}
if ttl != "" {
req["ttl"] = ttl // e.g. "720h"
}
resp, err := p.client.Write(ctx, path, req)
if err != nil {
return nil, err
}
if resp == nil || resp.Data == nil {
return nil, fmt.Errorf("vault sign: empty response")
}
// resp.Data contains the fields we need
var out SignResponse
if err := mapToStruct(resp.Data, &out); err != nil {
return nil, err
}
return &out, nil
}
// RebuildCRL triggers CRL regeneration (rotate).
// HCP: POST /v1/<mount>/crl/rotate or read /crl to force render; well call rotate when available,
// else read to ensure CRL is (re)generated.
func (p *PKIClient) RebuildCRL(ctx context.Context) error {
_, _ = p.client.Write(ctx, fmt.Sprintf("/%s/crl/rotate", p.mount), nil) // best effort
_, err := p.client.Read(ctx, fmt.Sprintf("/%s/crl", p.mount))
return err
}
func mapToStruct(m map[string]any, out any) error {
b, err := json.Marshal(m)
if err != nil {
return err
}
return json.Unmarshal(b, out)
}