Cleaning
[rup.git] / src / main.rs
1 extern crate actix_web;
2 extern crate listenfd;
3 extern crate askama;
4 extern crate percent_encoding;
5
6 use listenfd::ListenFd;
7 use actix_files as fs;
8 use actix_web::{web, middleware, App, HttpServer, HttpResponse, Responder, Result, web::Query};
9 use askama::Template;
10
11 use std::io::prelude::*;
12 use ron::de::from_reader;
13 use serde::Deserialize;
14 use std::{fs::File, env::args};
15
16 use itertools::Itertools;
17
18 mod consts;
19 mod crypto;
20
21 #[derive(Template)]
22 #[template(path = "main.html")]
23 struct MainTemplate<'a> {
24 sentence: &'a str,
25 }
26
27 #[derive(Deserialize)]
28 pub struct Request {
29 m: Option<String>
30 }
31
32 fn main_page(query: Query<Request>, key: &str) -> Result<HttpResponse> {
33 let m =
34 match &query.m {
35 Some(b) =>
36 match crypto::decrypt(key, b) {
37 Ok(m) => m,
38 Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error.
39 },
40 None => String::from(consts::DEFAULT_MESSAGE)
41 };
42
43 let hello = MainTemplate { sentence: &m };
44
45 let s = hello.render().unwrap();
46 Ok(HttpResponse::Ok().content_type("text/html").body(s))
47 }
48
49 #[derive(Debug, Deserialize)]
50 struct Config {
51 port: u16
52 }
53
54 fn get_exe_name() -> String {
55 let first_arg = std::env::args().nth(0).unwrap();
56 let sep: &[_] = &['\\', '/'];
57 first_arg[first_arg.rfind(sep).unwrap()+1..].to_string()
58 }
59
60 fn read_key() -> String {
61 let mut key = String::new();
62 File::open(consts::FILE_KEY)
63 .expect(&format!("Failed to open key file: {}", consts::FILE_KEY))
64 .read_to_string(&mut key)
65 .expect(&format!("Failed to read key file: {}", consts::FILE_KEY));
66
67 String::from(
68 percent_encoding::percent_decode(key.replace('\n', "").as_bytes())
69 .decode_utf8()
70 .expect(&format!("Failed to decode key file: {}", consts::FILE_KEY))
71 )
72 }
73
74 fn main() -> std::io::Result<()> {
75 let key = read_key();
76
77 if process_args(&key) { return Ok(()) }
78
79 println!("Starting RUP as web server...");
80
81 let config: Config = {
82 let f = File::open(consts::FILE_CONF).expect(&format!("Failed to open configuration file {}", consts::FILE_CONF));
83 match from_reader(f) {
84 Ok(c) => c,
85 Err(e) => panic!("Failed to load config: {}", e)
86 }
87 };
88
89 println!("Configuration: {:?}", config);
90
91 let mut listenfd = ListenFd::from_env();
92 let mut server =
93 HttpServer::new(
94 move || {
95 let key = key.clone(); // Is this neccessary??
96
97 App::new()
98 .wrap(middleware::Compress::default())
99 .wrap(middleware::Logger::default())
100 .service(web::resource("/").to(move |query| main_page(query, &key)))
101 .service(fs::Files::new("/static", "static").show_files_listing())
102 }
103 );
104
105 server =
106 if let Some(l) = listenfd.take_tcp_listener(0).unwrap() {
107 server.listen(l).unwrap()
108 } else {
109 server.bind(&format!("0.0.0.0:{}", config.port)).unwrap()
110 };
111
112 server.run()
113 }
114
115 fn process_args(key: &String) -> bool {
116 fn print_usage() {
117 println!("Usage:");
118 println!(" {} [--help] [--encrypt <plain-text>|--decrypt <cipher-text>]", get_exe_name());
119 }
120
121 let args: Vec<String> = args().collect();
122
123 if args.iter().any(|arg| arg == "--help") {
124 print_usage();
125 return true
126 } else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") {
127 match args.iter().nth(position_arg_encrypt + 1) {
128 Some(mess_to_encrypt) => {
129 match crypto::encrypt(&key, mess_to_encrypt) {
130 Ok(encrypted_mess) => {
131 let encrypted_mess_encoded = percent_encoding::utf8_percent_encode(&encrypted_mess, percent_encoding::NON_ALPHANUMERIC).to_string();
132 println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded); },
133 Err(error) =>
134 println!("Unable to encrypt: {:?}", error)
135 }
136 }
137 None => print_usage()
138 }
139
140 return true
141 } else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") {
142 match args.iter().nth(position_arg_decrypt + 1) {
143 Some(cipher_text) => {
144 let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
145 match crypto::decrypt(&key, &cipher_text_decoded) {
146 Ok(plain_text) =>
147 println!("Decrypted message: {}", plain_text),
148 Err(error) =>
149 println!("Unable to decrypt: {:?}", error)
150 }
151 }
152 None => print_usage()
153 }
154
155 return true
156 }
157
158 return false
159 }