Cleaning+comments.
[rup.git] / src / main.rs
1 extern crate actix_web;
2 extern crate listenfd;
3 extern crate askama;
4 extern crate percent_encoding;
5
6 use listenfd::ListenFd;
7 use actix_files as fs;
8 use actix_web::{web, middleware, App, HttpServer, HttpResponse, Responder, Result, web::Query};
9 use askama::Template;
10
11 use std::io::prelude::*;
12 use ron::de::from_reader;
13 use serde::Deserialize;
14 use std::{fs::File, env::args};
15
16 use itertools::Itertools;
17
18 mod consts;
19 mod crypto;
20
21 #[derive(Template)]
22 #[template(path = "main.html")]
23 struct MainTemplate<'a> {
24 sentence: &'a str,
25 }
26
27 #[derive(Deserialize)]
28 pub struct Request {
29 m: Option<String>
30 }
31
32 fn main_page(query: Query<Request>) -> Result<HttpResponse> {
33 let m =
34 match &query.m {
35 Some(b) =>
36 match crypto::decrypt(KEY, b) {
37 Ok(m) => m,
38 Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error.
39 },
40 None => String::from(consts::DEFAULT_MESSAGE)
41 };
42
43 let hello = MainTemplate { sentence: &m };
44
45 let s = hello.render().unwrap();
46 Ok(HttpResponse::Ok().content_type("text/html").body(s))
47 }
48
49 #[derive(Debug, Deserialize)]
50 struct Config {
51 port: u16
52 }
53
54 fn get_exe_name() -> String {
55 let first_arg = std::env::args().nth(0).unwrap();
56 //dbg!(&first_arg);
57 let sep: &[_] = &['\\', '/'];
58 first_arg[first_arg.rfind(sep).unwrap()+1..].to_string()
59 }
60 fn read_key() -> String {
61 let mut key = String::new();
62 File::open(consts::FILE_KEY)
63 .expect(&format!("Failed to open key file: {}", consts::FILE_KEY))
64 .read_to_string(&mut key)
65 .expect(&format!("Failed to read key file: {}", consts::FILE_KEY));
66
67 String::from(
68 percent_encoding::percent_decode(key.as_bytes())
69 .decode_utf8()
70 .expect(&format!("Failed to decode key file: {}", consts::FILE_KEY))
71 )
72 }
73
74 fn main() -> std::io::Result<()> {
75
76 let key = read_key();
77
78 if process_args(&key) { return Ok(()) }
79
80 println!("Starting RUP as web server...");
81
82 let config: Config = {
83 let f = File::open(consts::FILE_CONF).expect(&format!("Failed to open configuration file {}", consts::FILE_CONF));
84 match from_reader(f) {
85 Ok(c) => c,
86 Err(e) => panic!("Failed to load config: {}", e)
87 }
88 };
89
90 println!("Configuration: {:?}", config);
91
92 let mut listenfd = ListenFd::from_env();
93 let mut server =
94 HttpServer::new(
95 || {
96 App::new()
97 .wrap(middleware::Compress::default())
98 .wrap(middleware::Logger::default())
99 .service(web::resource("/").to(main_page))
100 .service(fs::Files::new("/static", "static").show_files_listing())
101 }
102 );
103
104 server =
105 if let Some(l) = listenfd.take_tcp_listener(0).unwrap() {
106 server.listen(l).unwrap()
107 } else {
108 server.bind(&format!("0.0.0.0:{}", config.port)).unwrap()
109 };
110
111 server.run()
112 }
113
114 fn process_args(key: &String) -> bool {
115 fn print_usage() {
116 println!("Usage:");
117 println!(" {} [--help] [--encrypt <plain-text>|--decrypt <cipher-text>]", get_exe_name());
118 }
119
120 let args: Vec<String> = args().collect();
121
122 if args.iter().any(|arg| arg == "--help") {
123 print_usage();
124 return true
125 } else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") {
126 match args.iter().nth(position_arg_encrypt + 1) {
127 Some(mess_to_encrypt) => {
128 match crypto::encrypt(&key, mess_to_encrypt) {
129 Ok(encrypted_mess) => {
130 let encrypted_mess_encoded = percent_encoding::utf8_percent_encode(&encrypted_mess, percent_encoding::NON_ALPHANUMERIC).to_string();
131 println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded); },
132 Err(error) =>
133 println!("Unable to encrypt: {:?}", error)
134 }
135 }
136 None => print_usage()
137 }
138
139 return true
140 } else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") {
141 match args.iter().nth(position_arg_decrypt + 1) {
142 Some(cipher_text) => {
143 let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
144 match crypto::decrypt(&key, &cipher_text_decoded) {
145 Ok(plain_text) =>
146 println!("Decrypted message: {}", plain_text),
147 Err(error) =>
148 println!("Unable to decrypt: {:?}", error)
149 }
150 }
151 None => print_usage()
152 }
153
154 return true
155 }
156
157 return false
158 }