use listenfd::ListenFd;
use actix_files as fs;
-use actix_web::{web, middleware, App, HttpServer, HttpResponse, Responder, Result, web::Query};
+use actix_web::{web, middleware, App, HttpServer, HttpResponse, Result, web::Query};
use askama::Template;
use std::io::prelude::*;
m: Option<String>
}
-fn main_page(query: Query<Request>) -> Result<HttpResponse> {
+fn main_page(query: Query<Request>, key: &str) -> Result<HttpResponse> {
let m =
match &query.m {
Some(b) =>
- match crypto::decrypt(KEY, b) {
+ match crypto::decrypt(key, b) {
Ok(m) => m,
Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error.
},
fn get_exe_name() -> String {
let first_arg = std::env::args().nth(0).unwrap();
- //dbg!(&first_arg);
let sep: &[_] = &['\\', '/'];
first_arg[first_arg.rfind(sep).unwrap()+1..].to_string()
}
+
fn read_key() -> String {
let mut key = String::new();
File::open(consts::FILE_KEY)
- .expect(&format!("Failed to open key file: {}", consts::FILE_KEY))
+ .unwrap_or_else(|_| panic!("Failed to open key file: {}", consts::FILE_KEY))
.read_to_string(&mut key)
- .expect(&format!("Failed to read key file: {}", consts::FILE_KEY));
+ .unwrap_or_else(|_| panic!("Failed to read key file: {}", consts::FILE_KEY));
String::from(
- percent_encoding::percent_decode(key.as_bytes())
+ percent_encoding::percent_decode(key.replace('\n', "").as_bytes())
.decode_utf8()
- .expect(&format!("Failed to decode key file: {}", consts::FILE_KEY))
+ .unwrap_or_else(|_| panic!("Failed to decode key file: {}", consts::FILE_KEY))
)
}
fn main() -> std::io::Result<()> {
-
let key = read_key();
if process_args(&key) { return Ok(()) }
println!("Starting RUP as web server...");
let config: Config = {
- let f = File::open(consts::FILE_CONF).expect(&format!("Failed to open configuration file {}", consts::FILE_CONF));
+ let f = File::open(consts::FILE_CONF).unwrap_or_else(|_| panic!("Failed to open configuration file {}", consts::FILE_CONF));
match from_reader(f) {
Ok(c) => c,
Err(e) => panic!("Failed to load config: {}", e)
let mut listenfd = ListenFd::from_env();
let mut server =
HttpServer::new(
- || {
+ move || {
+ let key = key.clone(); // Is this neccessary??
+
App::new()
.wrap(middleware::Compress::default())
.wrap(middleware::Logger::default())
- .service(web::resource("/").to(main_page))
+ .service(web::resource("/").to(move |query| main_page(query, &key)))
.service(fs::Files::new("/static", "static").show_files_listing())
}
);
server.run()
}
-fn process_args(key: &String) -> bool {
+fn process_args(key: &str) -> bool {
fn print_usage() {
println!("Usage:");
println!(" {} [--help] [--encrypt <plain-text>|--decrypt <cipher-text>]", get_exe_name());
print_usage();
return true
} else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") {
- match args.iter().nth(position_arg_encrypt + 1) {
+ match args.get(position_arg_encrypt + 1) {
Some(mess_to_encrypt) => {
match crypto::encrypt(&key, mess_to_encrypt) {
Ok(encrypted_mess) => {
return true
} else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") {
- match args.iter().nth(position_arg_decrypt + 1) {
+ match args.get(position_arg_decrypt + 1) {
Some(cipher_text) => {
let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
match crypto::decrypt(&key, &cipher_text_decoded) {
return true
}
- return false
+ false
}