1 extern crate actix_web
;
4 extern crate percent_encoding
;
6 use listenfd
::ListenFd
;
8 use actix_web
::{web
, middleware
, App
, HttpServer
, HttpResponse
, Responder
, Result
, web
::Query
};
11 use std
::io
::prelude
::*;
12 use ron
::de
::from_reader
;
13 use serde
::Deserialize
;
14 use std
::{fs
::File
, env
::args
};
16 use itertools
::Itertools
;
22 #[template(path = "main.html")]
23 struct MainTemplate
<'a
> {
27 #[derive(Deserialize)]
32 fn main_page(query
: Query
<Request
>) -> Result
<HttpResponse
> {
36 match crypto
::decrypt(KEY
, b
) {
38 Err(_e
) => String
::from(consts
::DEFAULT_MESSAGE
) // TODO: log error.
40 None
=> String
::from(consts
::DEFAULT_MESSAGE
)
43 let hello
= MainTemplate
{ sentence
: &m
};
45 let s
= hello
.render().unwrap();
46 Ok(HttpResponse
::Ok().content_type("text/html").body(s
))
49 #[derive(Debug, Deserialize)]
54 fn get_exe_name() -> String
{
55 let first_arg
= std
::env
::args().nth(0).unwrap();
57 let sep
: &[_
] = &['
\\'
, '
/'
];
58 first_arg
[first_arg
.rfind(sep
).unwrap()+1..].to_string()
60 fn read_key() -> String
{
61 let mut key
= String
::new();
62 File
::open(consts
::FILE_KEY
)
63 .expect(&format!("Failed to open key file: {}", consts
::FILE_KEY
))
64 .read_to_string(&mut key
)
65 .expect(&format!("Failed to read key file: {}", consts
::FILE_KEY
));
68 percent_encoding
::percent_decode(key
.as_bytes())
70 .expect(&format!("Failed to decode key file: {}", consts
::FILE_KEY
))
74 fn main() -> std
::io
::Result
<()> {
78 if process_args(&key
) { return Ok(()) }
80 println!("Starting RUP as web server...");
82 let config
: Config
= {
83 let f
= File
::open(consts
::FILE_CONF
).expect(&format!("Failed to open configuration file {}", consts
::FILE_CONF
));
84 match from_reader(f
) {
86 Err(e
) => panic!("Failed to load config: {}", e
)
90 println!("Configuration: {:?}", config
);
92 let mut listenfd
= ListenFd
::from_env();
97 .wrap(middleware
::Compress
::default())
98 .wrap(middleware
::Logger
::default())
99 .service(web
::resource("/").to(main_page
))
100 .service(fs
::Files
::new("/static", "static").show_files_listing())
105 if let Some(l
) = listenfd
.take_tcp_listener(0).unwrap() {
106 server
.listen(l
).unwrap()
108 server
.bind(&format!("0.0.0.0:{}", config
.port
)).unwrap()
114 fn process_args(key
: &String
) -> bool
{
117 println!(" {} [--help] [--encrypt <plain-text>|--decrypt <cipher-text>]", get_exe_name());
120 let args
: Vec
<String
> = args().collect();
122 if args
.iter().any(|arg
| arg
== "--help") {
125 } else if let Some((position_arg_encrypt
, _
)) = args
.iter().find_position(|arg
| arg
== &"--encrypt") {
126 match args
.iter().nth(position_arg_encrypt
+ 1) {
127 Some(mess_to_encrypt
) => {
128 match crypto
::encrypt(&key
, mess_to_encrypt
) {
129 Ok(encrypted_mess
) => {
130 let encrypted_mess_encoded
= percent_encoding
::utf8_percent_encode(&encrypted_mess
, percent_encoding
::NON_ALPHANUMERIC
).to_string();
131 println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded
); },
133 println!("Unable to encrypt: {:?}", error
)
136 None
=> print_usage()
140 } else if let Some((position_arg_decrypt
, _
)) = args
.iter().find_position(|arg
| arg
== &"--decrypt") {
141 match args
.iter().nth(position_arg_decrypt
+ 1) {
142 Some(cipher_text
) => {
143 let cipher_text_decoded
= percent_encoding
::percent_decode(cipher_text
.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
144 match crypto
::decrypt(&key
, &cipher_text_decoded
) {
146 println!("Decrypted message: {}", plain_text
),
148 println!("Unable to decrypt: {:?}", error
)
151 None
=> print_usage()