--- /dev/null
+
+extern crate listenfd;
+extern crate askama;
+extern crate percent_encoding;
+
+use listenfd::ListenFd;
+use actix_files as fs;
+use actix_web::{ web, middleware, App, HttpServer, HttpResponse, web::Query };
+use askama::Template;
+
+use std::{ fs::File, path::Path, env::args, io::prelude::* };
+use ron::{ de::from_reader, ser::{ to_string_pretty, PrettyConfig } };
+use serde::{ Deserialize, Serialize };
+
+use itertools::Itertools;
+
+mod consts;
+mod crypto;
+
+#[derive(Template)]
+#[template(path = "main.html")]
+struct MainTemplate<'a> {
+ sentence: &'a str,
+}
+
+#[derive(Deserialize)]
+pub struct Request {
+ m: Option<String>
+}
+
+fn main_page(query: Query<Request>, key: &str) -> HttpResponse {
+ let m =
+ match &query.m {
+ Some(b) =>
+ match crypto::decrypt(key, b) {
+ Ok(m) => m,
+ Err(_e) => String::from(consts::DEFAULT_MESSAGE) // TODO: log error.
+ },
+ None => String::from(consts::DEFAULT_MESSAGE)
+ };
+
+ let hello = MainTemplate { sentence: &m };
+
+ let s = hello.render().unwrap();
+ HttpResponse::Ok().content_type("text/html").body(s)
+}
+
+#[derive(Debug, Deserialize, Serialize)]
+struct Config {
+ port: u16
+}
+
+const DEFAULT_CONFIG: Config = Config { port: 8082 };
+
+fn get_exe_name() -> String {
+ let first_arg = std::env::args().next().unwrap();
+ let sep: &[_] = &['\\', '/'];
+ first_arg[first_arg.rfind(sep).unwrap()+1..].to_string()
+}
+
+fn load_config() -> Config {
+ // unwrap_or_else(|_| panic!("Failed to open configuration file {}", consts::FILE_CONF));
+ match File::open(consts::FILE_CONF) {
+ Ok(file) => from_reader(file).unwrap_or_else(|_| panic!("Failed to open configuration file {}", consts::FILE_CONF)),
+ Err(_) => {
+ let mut file = File::create(consts::FILE_CONF) .unwrap();
+ file.write_all(to_string_pretty(&DEFAULT_CONFIG, PrettyConfig::new()).unwrap().as_bytes()).unwrap(); // We do not use 'to_writer' because it can't pretty format the output.
+ DEFAULT_CONFIG
+ }
+ }
+}
+
+fn read_key() -> String {
+ let mut key = String::new();
+ File::open(consts::FILE_KEY)
+ .unwrap_or_else(|_| panic!("Failed to open key file: {}", consts::FILE_KEY))
+ .read_to_string(&mut key)
+ .unwrap_or_else(|_| panic!("Failed to read key file: {}", consts::FILE_KEY));
+
+ String::from(
+ percent_encoding::percent_decode(key.replace('\n', "").as_bytes())
+ .decode_utf8()
+ .unwrap_or_else(|_| panic!("Failed to decode key file: {}", consts::FILE_KEY))
+ )
+}
+
+fn write_key(key : &str) {
+ let percent_encoded = percent_encoding::utf8_percent_encode(key, percent_encoding::NON_ALPHANUMERIC).to_string();
+ let mut file = File::create(consts::FILE_KEY).unwrap();
+ file.write_all(percent_encoded.as_bytes()).unwrap();
+}
+
+#[actix_rt::main]
+async fn main() -> std::io::Result<()> {
+ let key = {
+ // If the key file doesn't exist then create a new one with a random key in it.
+ if !Path::new(consts::FILE_KEY).exists() {
+ let new_key = crypto::generate_key();
+ write_key(&new_key);
+ println!("A key has been generated here: {}", consts::FILE_KEY);
+ new_key
+ } else {
+ read_key()
+ }
+ };
+
+ if process_args(&key) { return Ok(()) }
+
+ println!("Starting RUP as web server...");
+
+ let config = load_config();
+
+ println!("Configuration: {:?}", config);
+
+ let mut listenfd = ListenFd::from_env();
+ let mut server =
+ HttpServer::new(
+ move || {
+ let key = key.clone(); // Is this neccessary??
+
+ App::new()
+ .wrap(middleware::Compress::default())
+ .wrap(middleware::Logger::default())
+ .service(web::resource("/").to(move |query| main_page(query, &key)))
+ .service(fs::Files::new("/static", "static").show_files_listing())
+ }
+ );
+
+ server =
+ if let Some(l) = listenfd.take_tcp_listener(0).unwrap() {
+ server.listen(l).unwrap()
+ } else {
+ server.bind(&format!("0.0.0.0:{}", config.port)).unwrap()
+ };
+
+ server.run().await
+}
+
+fn process_args(key: &str) -> bool {
+ fn print_usage() {
+ println!("Usage:");
+ println!(" {} [--help] [--encrypt <plain-text> | --decrypt <cipher-text>]", get_exe_name());
+ }
+
+ let args: Vec<String> = args().collect();
+
+ if args.iter().any(|arg| arg == "--help") {
+ print_usage();
+ return true
+ } else if let Some((position_arg_encrypt, _)) = args.iter().find_position(|arg| arg == &"--encrypt") {
+ match args.get(position_arg_encrypt + 1) {
+ Some(mess_to_encrypt) => {
+ // Encrypt to version 2 (version 1 is obsolete).
+ match crypto::encrypt(&key, mess_to_encrypt, 2) {
+ Ok(encrypted_mess) => {
+ let encrypted_mess_encoded = percent_encoding::utf8_percent_encode(&encrypted_mess, percent_encoding::NON_ALPHANUMERIC).to_string();
+ println!("Encrypted message percent-encoded: {}", encrypted_mess_encoded); },
+ Err(error) =>
+ println!("Unable to encrypt: {:?}", error)
+ }
+ }
+ None => print_usage()
+ }
+
+ return true
+ } else if let Some((position_arg_decrypt, _)) = args.iter().find_position(|arg| arg == &"--decrypt") {
+ match args.get(position_arg_decrypt + 1) {
+ Some(cipher_text) => {
+ let cipher_text_decoded = percent_encoding::percent_decode(cipher_text.as_bytes()).decode_utf8().expect("Unable to decode encoded cipher text");
+ match crypto::decrypt(&key, &cipher_text_decoded) {
+ Ok(plain_text) =>
+ println!("Decrypted message: {}", plain_text),
+ Err(error) =>
+ println!("Unable to decrypt: {:?}", error)
+ }
+ }
+ None => print_usage()
+ }
+
+ return true
+ }
+
+ false
+}