X-Git-Url: http://git.euphorik.ch/?p=rup.git;a=blobdiff_plain;f=src%2Fmain.rs;h=6c9ab2796d0fd05fe379d71719f2ba2fda43902b;hp=a64950dc5e2237e189241c64d2fe0e8901b6bf2a;hb=6cc0700aa5b90500b620ca8dd5b2976892aee0a7;hpb=c8ff7a48a92d1de8957ef1150296aa4648f3b3af diff --git a/src/main.rs b/src/main.rs index a64950d..6c9ab27 100644 --- a/src/main.rs +++ b/src/main.rs @@ -1,10 +1,22 @@ extern crate actix_web; +extern crate listenfd; extern crate askama; +extern crate percent_encoding; +use listenfd::ListenFd; use actix_files as fs; use actix_web::{web, middleware, App, HttpServer, HttpResponse, Responder, Result, web::Query}; use askama::Template; -use serde::{Deserialize}; + +use std::io::prelude::*; +use ron::de::from_reader; +use serde::Deserialize; +use std::{fs::File, env::args}; + +use itertools::Itertools; + +mod consts; +mod crypto; #[derive(Template)] #[template(path = "main.html")] @@ -17,30 +29,131 @@ pub struct Request { m: Option } -fn main_page(query: Query) -> Result { +fn main_page(query: Query, key: &str) -> Result { let m = match &query.m { - Some(b) => &b, - None => "Marc, roule un pet'!" + Some(b) => + match crypto::decrypt(key, b) { + Ok(m) => m, + Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error. + }, + None => String::from(consts::DEFAULT_MESSAGE) }; - let hello = MainTemplate { sentence: m }; + let hello = MainTemplate { sentence: &m }; let s = hello.render().unwrap(); Ok(HttpResponse::Ok().content_type("text/html").body(s)) } +#[derive(Debug, Deserialize)] +struct Config { + port: u16 +} + +fn get_exe_name() -> String { + let first_arg = std::env::args().nth(0).unwrap(); + //dbg!(&first_arg); + let sep: &[_] = &['\\', '/']; + first_arg[first_arg.rfind(sep).unwrap()+1..].to_string() +} +fn read_key() -> String { + let mut key = String::new(); + File::open(consts::FILE_KEY) + .expect(&format!("Failed to open key file: {}", consts::FILE_KEY)) + .read_to_string(&mut key) + .expect(&format!("Failed to read key file: {}", consts::FILE_KEY)); + + String::from( + percent_encoding::percent_decode(key.replace('\n', "").as_bytes()) + .decode_utf8() + .expect(&format!("Failed to decode key file: {}", consts::FILE_KEY)) + ) +} + fn main() -> std::io::Result<()> { - HttpServer::new( - || { - App::new() - .wrap(middleware::Compress::default()) - .wrap(middleware::Logger::default()) - .service(web::resource("/").to(main_page)) - .service(fs::Files::new("/static", "static").show_files_listing()) + let key = read_key(); + + if process_args(&key) { return Ok(()) } + + println!("Starting RUP as web server..."); + + let config: Config = { + let f = File::open(consts::FILE_CONF).expect(&format!("Failed to open configuration file {}", consts::FILE_CONF)); + match from_reader(f) { + Ok(c) => c, + Err(e) => panic!("Failed to load config: {}", e) } - ) - .bind("0.0.0.0:8082") - .expect("Can not bind to port 8082") - .run() + }; + + println!("Configuration: {:?}", config); + + let mut listenfd = ListenFd::from_env(); + let mut server = + HttpServer::new( + move || { + let key = key.clone(); // Is this neccessary?? + + App::new() + .wrap(middleware::Compress::default()) + .wrap(middleware::Logger::default()) + .service(web::resource("/").to(move |query| main_page(query, &key))) + .service(fs::Files::new("/static", "static").show_files_listing()) + } + ); + + server = + if let Some(l) = listenfd.take_tcp_listener(0).unwrap() { + server.listen(l).unwrap() + } else { + server.bind(&format!("0.0.0.0:{}", config.port)).unwrap() + }; + + server.run() +} + +fn process_args(key: &String) -> bool { + fn print_usage() { + println!("Usage:"); + println!(" {} [--help] [--encrypt |--decrypt ]", get_exe_name()); + } + + let args: Vec = args().collect(); + + if args.iter().any(|arg| arg == "--help") { + print_usage(); + return true + } else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") { + match args.iter().nth(position_arg_encrypt + 1) { + Some(mess_to_encrypt) => { + match crypto::encrypt(&key, mess_to_encrypt) { + Ok(encrypted_mess) => { + let encrypted_mess_encoded = percent_encoding::utf8_percent_encode(&encrypted_mess, percent_encoding::NON_ALPHANUMERIC).to_string(); + println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded); }, + Err(error) => + println!("Unable to encrypt: {:?}", error) + } + } + None => print_usage() + } + + return true + } else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") { + match args.iter().nth(position_arg_decrypt + 1) { + Some(cipher_text) => { + let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text"); + match crypto::decrypt(&key, &cipher_text_decoded) { + Ok(plain_text) => + println!("Decrypted message: {}", plain_text), + Err(error) => + println!("Unable to decrypt: {:?}", error) + } + } + None => print_usage() + } + + return true + } + + return false }