extern crate actix_web;
extern crate listenfd;
extern crate askama;
+extern crate percent_encoding;
use listenfd::ListenFd;
use actix_files as fs;
use actix_web::{web, middleware, App, HttpServer, HttpResponse, Responder, Result, web::Query};
use askama::Template;
-use serde::{Deserialize};
+
+use std::io::prelude::*;
+use ron::de::from_reader;
+use serde::Deserialize;
+use std::{fs::File, env::args};
+
+use itertools::Itertools;
+
+mod consts;
+mod crypto;
#[derive(Template)]
#[template(path = "main.html")]
fn main_page(query: Query<Request>) -> Result<HttpResponse> {
let m =
match &query.m {
- Some(b) => &b,
- None => "Marc, roule un pet'!"
+ Some(b) =>
+ match crypto::decrypt(KEY, b) {
+ Ok(m) => m,
+ Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error.
+ },
+ None => String::from(consts::DEFAULT_MESSAGE)
};
- let hello = MainTemplate { sentence: m };
+ let hello = MainTemplate { sentence: &m };
let s = hello.render().unwrap();
Ok(HttpResponse::Ok().content_type("text/html").body(s))
}
+#[derive(Debug, Deserialize)]
+struct Config {
+ port: u16
+}
+
+fn get_exe_name() -> String {
+ let first_arg = std::env::args().nth(0).unwrap();
+ //dbg!(&first_arg);
+ let sep: &[_] = &['\\', '/'];
+ first_arg[first_arg.rfind(sep).unwrap()+1..].to_string()
+}
+fn read_key() -> String {
+ let mut key = String::new();
+ File::open(consts::FILE_KEY)
+ .expect(&format!("Failed to open key file: {}", consts::FILE_KEY))
+ .read_to_string(&mut key)
+ .expect(&format!("Failed to read key file: {}", consts::FILE_KEY));
+
+ String::from(
+ percent_encoding::percent_decode(key.as_bytes())
+ .decode_utf8()
+ .expect(&format!("Failed to decode key file: {}", consts::FILE_KEY))
+ )
+}
+
fn main() -> std::io::Result<()> {
+
+ let key = read_key();
+
+ if process_args(&key) { return Ok(()) }
+
+ println!("Starting RUP as web server...");
+
+ let config: Config = {
+ let f = File::open(consts::FILE_CONF).expect(&format!("Failed to open configuration file {}", consts::FILE_CONF));
+ match from_reader(f) {
+ Ok(c) => c,
+ Err(e) => panic!("Failed to load config: {}", e)
+ }
+ };
+
+ println!("Configuration: {:?}", config);
+
let mut listenfd = ListenFd::from_env();
let mut server =
HttpServer::new(
if let Some(l) = listenfd.take_tcp_listener(0).unwrap() {
server.listen(l).unwrap()
} else {
- server.bind("0.0.0.0:8082").unwrap()
+ server.bind(&format!("0.0.0.0:{}", config.port)).unwrap()
};
server.run()
}
+
+fn process_args(key: &String) -> bool {
+ fn print_usage() {
+ println!("Usage:");
+ println!(" {} [--help] [--encrypt <plain-text>|--decrypt <cipher-text>]", get_exe_name());
+ }
+
+ let args: Vec<String> = args().collect();
+
+ if args.iter().any(|arg| arg == "--help") {
+ print_usage();
+ return true
+ } else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") {
+ match args.iter().nth(position_arg_encrypt + 1) {
+ Some(mess_to_encrypt) => {
+ match crypto::encrypt(&key, mess_to_encrypt) {
+ Ok(encrypted_mess) => {
+ let encrypted_mess_encoded = percent_encoding::utf8_percent_encode(&encrypted_mess, percent_encoding::NON_ALPHANUMERIC).to_string();
+ println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded); },
+ Err(error) =>
+ println!("Unable to encrypt: {:?}", error)
+ }
+ }
+ None => print_usage()
+ }
+
+ return true
+ } else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") {
+ match args.iter().nth(position_arg_decrypt + 1) {
+ Some(cipher_text) => {
+ let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
+ match crypto::decrypt(&key, &cipher_text_decoded) {
+ Ok(plain_text) =>
+ println!("Decrypted message: {}", plain_text),
+ Err(error) =>
+ println!("Unable to decrypt: {:?}", error)
+ }
+ }
+ None => print_usage()
+ }
+
+ return true
+ }
+
+ return false
+}