magnetico/cmd/magneticow/main.go

347 lines
9.8 KiB
Go
Raw Normal View History

package main
import (
2018-07-12 09:58:39 +02:00
"bufio"
"bytes"
2018-04-16 17:40:54 +02:00
"encoding/hex"
"fmt"
"html/template"
2018-07-12 09:58:39 +02:00
"io"
"net/http"
"os"
2018-07-12 09:58:39 +02:00
"os/signal"
"path"
"regexp"
"sync"
"syscall"
"time"
2019-09-18 02:21:30 +02:00
"github.com/pkg/errors"
2018-07-12 09:58:39 +02:00
"github.com/Wessie/appdirs"
"github.com/dustin/go-humanize"
"github.com/gorilla/mux"
"github.com/gorilla/schema"
2018-07-12 09:58:39 +02:00
"github.com/jessevdk/go-flags"
"go.uber.org/zap"
"go.uber.org/zap/zapcore"
2018-07-12 09:58:39 +02:00
"golang.org/x/crypto/bcrypt"
2018-04-16 17:40:54 +02:00
"github.com/boramalper/magnetico/pkg/persistence"
)
2018-12-25 16:35:11 +01:00
var compiledOn string
// Set a Decoder instance as a package global, because it caches
// meta-data about structs, and an instance can be shared safely.
var decoder = schema.NewDecoder()
var templates map[string]*template.Template
var database persistence.Database
var opts struct {
Addr string
Database string
// Credentials is nil when no-auth cmd-line flag is supplied.
Credentials map[string][]byte // TODO: encapsulate credentials and mutex for safety
2018-07-12 09:58:39 +02:00
CredentialsRWMutex sync.RWMutex
// CredentialsPath is nil when no-auth is supplied.
CredentialsPath string
Verbosity int
}
func main() {
loggerLevel := zap.NewAtomicLevel()
// Logging levels: ("debug", "info", "warn", "error", "dpanic", "panic", and "fatal").
logger := zap.New(zapcore.NewCore(
zapcore.NewConsoleEncoder(zap.NewDevelopmentEncoderConfig()),
zapcore.Lock(os.Stderr),
loggerLevel,
))
defer logger.Sync()
zap.ReplaceGlobals(logger)
2019-09-18 02:21:30 +02:00
zap.L().Info("magneticow v0.8.2 has been started.")
zap.L().Info("Copyright (C) 2017-2019 Mert Bora ALPER <bora@boramalper.org>.")
zap.L().Info("Dedicated to Cemile Binay, in whose hands I thrived.")
2018-12-25 16:35:11 +01:00
zap.S().Infof("Compiled on %s", compiledOn)
2018-07-12 09:58:39 +02:00
if err := parseFlags(); err != nil {
2018-12-30 17:39:41 +01:00
zap.S().Errorf("error while parsing flags: %s", err.Error())
2018-07-12 09:58:39 +02:00
return
}
2018-12-25 16:35:11 +01:00
switch opts.Verbosity {
case 0:
loggerLevel.SetLevel(zap.WarnLevel)
case 1:
loggerLevel.SetLevel(zap.InfoLevel)
default: // Default: i.e. in case of 2 or more.
// TODO: print the caller (function)'s name and line number!
loggerLevel.SetLevel(zap.DebugLevel)
}
zap.ReplaceGlobals(logger)
2018-07-12 09:58:39 +02:00
// Reload credentials when you receive SIGHUP
sighupChan := make(chan os.Signal, 1)
signal.Notify(sighupChan, syscall.SIGHUP)
go func() {
for range sighupChan {
opts.CredentialsRWMutex.Lock()
if opts.Credentials == nil {
zap.L().Warn("Ignoring SIGHUP since `no-auth` was supplied")
continue
}
opts.Credentials = make(map[string][]byte) // Clear opts.Credentials
2018-07-12 09:58:39 +02:00
opts.CredentialsRWMutex.Unlock()
if err := loadCred(opts.CredentialsPath); err != nil { // Reload credentials
2018-07-12 09:58:39 +02:00
zap.L().Warn("couldn't load credentials", zap.Error(err))
}
}
}()
2018-07-12 09:58:39 +02:00
router := mux.NewRouter()
router.HandleFunc("/",
BasicAuth(rootHandler, "magneticow"))
2018-07-12 09:58:39 +02:00
router.HandleFunc("/api/v0.1/statistics",
BasicAuth(apiStatistics, "magneticow"))
2018-07-12 09:58:39 +02:00
router.HandleFunc("/api/v0.1/torrents",
BasicAuth(apiTorrents, "magneticow"))
2018-07-12 09:58:39 +02:00
router.HandleFunc("/api/v0.1/torrents/{infohash:[a-f0-9]{40}}",
BasicAuth(apiTorrent, "magneticow"))
router.HandleFunc("/api/v0.1/torrents/{infohash:[a-f0-9]{40}}/filelist",
BasicAuth(apiFilelist, "magneticow"))
2018-07-12 09:58:39 +02:00
router.HandleFunc("/feed",
BasicAuth(feedHandler, "magneticow"))
router.PathPrefix("/static").HandlerFunc(
BasicAuth(staticHandler, "magneticow"))
router.HandleFunc("/statistics",
BasicAuth(statisticsHandler, "magneticow"))
router.HandleFunc("/torrents",
BasicAuth(torrentsHandler, "magneticow"))
router.HandleFunc("/torrents/{infohash:[a-f0-9]{40}}",
BasicAuth(torrentsInfohashHandler, "magneticow"))
templateFunctions := template.FuncMap{
"add": func(augend int, addends int) int {
return augend + addends
},
"subtract": func(minuend int, subtrahend int) int {
return minuend - subtrahend
},
"bytesToHex": func(bytes []byte) string {
return hex.EncodeToString(bytes)
},
"unixTimeToYearMonthDay": func(s int64) string {
tm := time.Unix(s, 0)
// > Format and Parse use example-based layouts. Usually you’ll use a constant from time
// > for these layouts, but you can also supply custom layouts. Layouts must use the
// > reference time Mon Jan 2 15:04:05 MST 2006 to show the pattern with which to
// > format/parse a given time/string. The example time must be exactly as shown: the
// > year 2006, 15 for the hour, Monday for the day of the week, etc.
// https://gobyexample.com/time-formatting-parsing
// Why you gotta be so weird Go?
return tm.Format("02/01/2006")
},
"humanizeSize": func(s uint64) string {
return humanize.IBytes(s)
},
"humanizeSizeF": func(s int64) string {
if s < 0 {
return ""
}
return humanize.IBytes(uint64(s))
},
"comma": func(s uint) string {
return humanize.Comma(int64(s))
},
}
templates = make(map[string]*template.Template)
2018-07-01 17:16:17 +02:00
templates["feed"] = template.Must(template.New("feed").Funcs(templateFunctions).Parse(string(mustAsset("templates/feed.xml"))))
templates["homepage"] = template.Must(template.New("homepage").Funcs(templateFunctions).Parse(string(mustAsset("templates/homepage.html"))))
var err error
2018-07-12 09:58:39 +02:00
database, err = persistence.MakeDatabase(opts.Database, logger)
if err != nil {
2018-12-24 19:30:07 +01:00
zap.L().Fatal("could not access to database", zap.Error(err))
}
decoder.IgnoreUnknownKeys(false)
decoder.ZeroEmpty(true)
zap.S().Infof("magneticow is ready to serve on %s!", opts.Addr)
2018-07-12 09:58:39 +02:00
err = http.ListenAndServe(opts.Addr, router)
if err != nil {
zap.L().Error("ListenAndServe error", zap.Error(err))
}
}
// TODO: I think there is a standard lib. function for this
func respondError(w http.ResponseWriter, statusCode int, format string, a ...interface{}) {
w.WriteHeader(statusCode)
w.Write([]byte(fmt.Sprintf(format, a...)))
}
2018-07-12 09:58:39 +02:00
func mustAsset(name string) []byte {
data, err := Asset(name)
if err != nil {
2018-12-24 19:30:07 +01:00
zap.L().Panic("Could NOT access the requested resource! THIS IS A BUG, PLEASE REPORT",
zap.String("name", name), zap.Error(err))
}
2018-07-12 09:58:39 +02:00
return data
}
2018-07-12 09:58:39 +02:00
func parseFlags() error {
var cmdFlags struct {
Addr string `short:"a" long:"addr" description:"Address (host:port) to serve on" default:":8080"`
Database string `short:"d" long:"database" description:"URL of the (magneticod) database"`
Cred string `short:"c" long:"credentials" description:"Path to the credentials file"`
NoAuth bool ` long:"no-auth" description:"Disables authorisation"`
2018-12-25 16:35:11 +01:00
Verbose []bool `short:"v" long:"verbose" description:"Increases verbosity."`
}
2018-07-12 09:58:39 +02:00
if _, err := flags.Parse(&cmdFlags); err != nil {
return err
}
2018-07-12 09:58:39 +02:00
if cmdFlags.Cred != "" && cmdFlags.NoAuth {
return fmt.Errorf("`credentials` and `no-auth` cannot be supplied together")
}
2018-07-12 09:58:39 +02:00
opts.Addr = cmdFlags.Addr
2018-07-12 09:58:39 +02:00
if cmdFlags.Database == "" {
opts.Database =
"sqlite3://" +
appdirs.UserDataDir("magneticod", "", "", false) +
"/database.sqlite3" +
"?_journal_mode=WAL" // https://github.com/mattn/go-sqlite3#connection-string
} else {
opts.Database = cmdFlags.Database
2018-07-01 17:16:17 +02:00
}
if !cmdFlags.NoAuth {
// Set opts.CredentialsPath to either the default value (computed by appdirs pkg) or to the one
// supplied by the user.
if cmdFlags.Cred == "" {
opts.CredentialsPath = path.Join(
appdirs.UserConfigDir("magneticow", "", "", false),
"credentials",
)
} else {
opts.CredentialsPath = cmdFlags.Cred
}
2018-07-12 09:58:39 +02:00
opts.Credentials = make(map[string][]byte)
if err := loadCred(opts.CredentialsPath); err != nil {
return err
}
2018-07-01 17:16:17 +02:00
}
2018-12-25 16:35:11 +01:00
opts.Verbosity = len(cmdFlags.Verbose)
2018-07-12 09:58:39 +02:00
return nil
}
2018-07-01 17:16:17 +02:00
2018-07-12 09:58:39 +02:00
func loadCred(cred string) error {
file, err := os.Open(cred)
2018-07-01 17:16:17 +02:00
if err != nil {
2018-07-12 09:58:39 +02:00
return err
2018-07-01 17:16:17 +02:00
}
2018-07-12 09:58:39 +02:00
opts.CredentialsRWMutex.Lock()
defer opts.CredentialsRWMutex.Unlock()
2018-07-12 09:58:39 +02:00
reader := bufio.NewReader(file)
for lineno := 1; true; lineno++ {
line, err := reader.ReadBytes('\n')
if err != nil {
if err == io.EOF {
break
2018-07-12 09:58:39 +02:00
}
2018-12-24 19:30:07 +01:00
return errors.Wrapf(err, "while reading line %d", lineno)
2018-07-12 09:58:39 +02:00
}
line = line[:len(line)-1] // strip '\n'
2018-07-12 09:58:39 +02:00
/* The following regex checks if the line satisfies the following conditions:
*
* <USERNAME>:<BCRYPT HASH>
*
* where
* <USERNAME> must start with a small-case a-z character, might contain non-consecutive
* underscores in-between, and consists of small-case a-z characters and digits 0-9.
*
* <BCRYPT HASH> is the output of the well-known bcrypt function.
*/
re := regexp.MustCompile(`^[a-z](?:_?[a-z0-9])*:\$2[aby]?\$\d{1,2}\$[./A-Za-z0-9]{53}$`)
if !re.Match(line) {
2019-09-18 02:21:30 +02:00
return fmt.Errorf("on line %d: format should be: <USERNAME>:<BCRYPT HASH>, instead got: %s", lineno, line)
2018-07-12 09:58:39 +02:00
}
tokens := bytes.Split(line, []byte(":"))
opts.Credentials[string(tokens[0])] = tokens[1]
}
2018-07-12 09:58:39 +02:00
return nil
}
// BasicAuth wraps a handler requiring HTTP basic auth for it using the given
// username and password and the specified realm, which shouldn't contain quotes.
//
// Most web browser display a dialog with something like:
//
// The website says: "<realm>"
//
// Which is really stupid so you may want to set the realm to a message rather than
// an actual realm.
//
// Source: https://stackoverflow.com/a/39591234/4466589
func BasicAuth(handler http.HandlerFunc, realm string) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
if opts.Credentials == nil { // --no-auth is supplied by the user.
handler(w, r)
return
}
2018-07-12 09:58:39 +02:00
username, password, ok := r.BasicAuth()
if !ok { // No credentials provided
2018-07-12 09:58:39 +02:00
authenticate(w, realm)
return
}
opts.CredentialsRWMutex.RLock()
hashedPassword, ok := opts.Credentials[username]
opts.CredentialsRWMutex.RUnlock()
if !ok { // User not found
2018-07-12 09:58:39 +02:00
authenticate(w, realm)
return
}
if err := bcrypt.CompareHashAndPassword(hashedPassword, []byte(password)); err != nil { // Wrong password
2018-07-12 09:58:39 +02:00
authenticate(w, realm)
return
}
handler(w, r)
}
}
2018-07-12 09:58:39 +02:00
func authenticate(w http.ResponseWriter, realm string) {
w.Header().Set("WWW-Authenticate", `Basic realm="`+realm+`"`)
w.WriteHeader(401)
2018-12-24 19:30:07 +01:00
_, _ = w.Write([]byte("Unauthorised.\n"))
}