2022-01-09 05:27:18 +01:00
package main
import (
2022-09-30 08:32:13 +02:00
"crypto/sha256"
"crypto/subtle"
"encoding/hex"
2022-01-09 05:27:18 +01:00
"encoding/json"
"fmt"
2022-04-06 08:31:24 +02:00
"io/ioutil"
2022-04-07 03:18:46 +02:00
"log"
2022-01-09 05:27:18 +01:00
"net/http"
2022-04-08 05:59:40 +02:00
"os"
2022-04-28 19:56:59 +02:00
"os/user"
2022-04-22 07:02:28 +02:00
"strconv"
2022-04-09 21:50:01 +02:00
"strings"
2022-04-09 08:47:13 +02:00
"time"
2022-01-09 05:27:18 +01:00
2022-01-09 06:59:28 +01:00
"github.com/ddworken/hishtory/shared"
2022-03-30 06:56:28 +02:00
_ "github.com/lib/pq"
2022-10-01 08:38:35 +02:00
"github.com/rodaine/table"
2022-03-30 06:56:28 +02:00
"gorm.io/driver/postgres"
2022-04-06 08:31:24 +02:00
"gorm.io/driver/sqlite"
2022-03-30 06:56:28 +02:00
"gorm.io/gorm"
)
const (
2022-04-09 09:33:20 +02:00
// This password is for the postgres cluster running in my k8s cluster that is not publicly accessible. Some day I'll migrate it out of the code and rotate the password, but until then, this is fine.
2022-09-28 07:15:31 +02:00
// TODO: Migrate this
2022-04-09 07:37:03 +02:00
PostgresDb = "postgresql://postgres:O74Ji4735C@postgres-postgresql.default.svc.cluster.local:5432/hishtory?sslmode=disable"
2022-01-09 06:59:28 +01:00
)
2022-01-09 05:27:18 +01:00
2022-04-09 07:37:03 +02:00
var (
GLOBAL_DB * gorm . DB
ReleaseVersion string = "UNKNOWN"
)
2022-04-03 07:27:20 +02:00
2022-04-16 20:37:43 +02:00
type UsageData struct {
2022-09-30 08:32:13 +02:00
UserId string ` json:"user_id" gorm:"not null; uniqueIndex:usageDataUniqueIndex" `
DeviceId string ` json:"device_id" gorm:"not null; uniqueIndex:usageDataUniqueIndex" `
LastUsed time . Time ` json:"last_used" `
2022-09-30 08:51:45 +02:00
LastIp string ` json:"last_ip" `
2022-09-30 08:32:13 +02:00
NumEntriesHandled int ` json:"num_entries_handled" `
2022-10-01 08:38:35 +02:00
LastQueried time . Time ` json:"last_queried" `
NumQueries int ` json:"num_queries" `
2022-04-16 20:37:43 +02:00
}
2022-10-01 08:38:35 +02:00
// TODO: Audit this file for queries that don't check result.Error
2022-06-05 08:03:05 +02:00
func getRequiredQueryParam ( r * http . Request , queryParam string ) string {
val := r . URL . Query ( ) . Get ( queryParam )
if val == "" {
panic ( fmt . Sprintf ( "request to %s is missing required query param=%#v" , r . URL , queryParam ) )
}
return val
}
2022-10-01 08:38:35 +02:00
func updateUsageData ( r * http . Request , userId , deviceId string , numEntriesHandled int , isQuery bool ) {
2022-04-16 20:37:43 +02:00
var usageData [ ] UsageData
GLOBAL_DB . Where ( "user_id = ? AND device_id = ?" , userId , deviceId ) . Find ( & usageData )
if len ( usageData ) == 0 {
2022-10-01 08:38:35 +02:00
GLOBAL_DB . Create ( & UsageData { UserId : userId , DeviceId : deviceId , LastUsed : time . Now ( ) , NumEntriesHandled : numEntriesHandled } )
2022-04-16 20:37:43 +02:00
} else {
2022-09-30 08:51:45 +02:00
GLOBAL_DB . Model ( & UsageData { } ) . Where ( "user_id = ? AND device_id = ?" , userId , deviceId ) . Update ( "last_used" , time . Now ( ) ) . Update ( "last_ip" , getRemoteAddr ( r ) )
2022-10-01 08:38:35 +02:00
if numEntriesHandled > 0 {
GLOBAL_DB . Exec ( "UPDATE usage_data SET num_entries_handled = COALESCE(num_entries_handled, 0) + ? WHERE user_id = ? AND device_id = ?" , numEntriesHandled , userId , deviceId )
2022-09-30 08:32:13 +02:00
}
}
2022-10-01 08:38:35 +02:00
if isQuery {
GLOBAL_DB . Exec ( "UPDATE usage_data SET num_queries = COALESCE(num_queries, 0) + 1, last_queried = ? WHERE user_id = ? AND device_id = ?" , time . Now ( ) , userId , deviceId )
}
2022-09-30 08:32:13 +02:00
}
func usageStatsHandler ( w http . ResponseWriter , r * http . Request ) {
query := `
SELECT
MIN ( devices . registration_date ) as registration_date ,
COUNT ( DISTINCT devices . device_id ) as num_devices ,
SUM ( usage_data . num_entries_handled ) as num_history_entries ,
2022-09-30 08:51:45 +02:00
MAX ( usage_data . last_used ) as last_active ,
2022-10-01 08:38:35 +02:00
COALESCE ( STRING_AGG ( DISTINCT usage_data . last_ip , ' ' ) FILTER ( WHERE usage_data . last_ip != ' Unknown ' ) , ' Unknown ' ) as ip_addresses ,
COALESCE ( SUM ( usage_data . num_queries ) , 0 ) as num_queries ,
COALESCE ( MAX ( usage_data . last_queried ) , ' January 1 , 1970 ' ) as last_queried
2022-09-30 08:32:13 +02:00
FROM devices
INNER JOIN usage_data ON devices . device_id = usage_data . device_id
GROUP BY devices . user_id
ORDER BY registration_date
`
rows , err := GLOBAL_DB . Raw ( query ) . Rows ( )
if err != nil {
panic ( err )
}
2022-10-01 08:38:35 +02:00
tbl := table . New ( "Registration Date" , "Num Devices" , "Num Entries" , "Num Queries" , "Last Active" , "Last Query" , "IPs" )
tbl . WithWriter ( w )
2022-09-30 08:32:13 +02:00
for rows . Next ( ) {
var registrationDate time . Time
var numDevices int
var numEntries int
var lastUsedDate time . Time
2022-09-30 08:51:45 +02:00
var ipAddresses string
2022-10-01 08:38:35 +02:00
var numQueries int
var lastQueried time . Time
err = rows . Scan ( & registrationDate , & numDevices , & numEntries , & lastUsedDate , & ipAddresses , & numQueries , & lastQueried )
2022-09-30 08:32:13 +02:00
if err != nil {
panic ( err )
}
2022-10-01 08:38:35 +02:00
tbl . AddRow ( registrationDate . Format ( "2006-01-02" ) , numDevices , numEntries , numQueries , lastUsedDate . Format ( "2006-01-02" ) , lastQueried . Format ( "2006-01-02" ) , ipAddresses )
2022-04-16 20:37:43 +02:00
}
2022-10-01 08:38:35 +02:00
tbl . Print ( )
2022-04-16 20:37:43 +02:00
}
2022-04-28 19:56:59 +02:00
func apiSubmitHandler ( w http . ResponseWriter , r * http . Request ) {
2022-04-06 08:31:24 +02:00
data , err := ioutil . ReadAll ( r . Body )
2022-03-30 06:56:28 +02:00
if err != nil {
panic ( err )
}
2022-04-06 08:31:24 +02:00
var entries [ ] shared . EncHistoryEntry
err = json . Unmarshal ( data , & entries )
if err != nil {
panic ( fmt . Sprintf ( "body=%#v, err=%v" , data , err ) )
}
2022-04-28 19:56:59 +02:00
fmt . Printf ( "apiSubmitHandler: received request containg %d EncHistoryEntry\n" , len ( entries ) )
2022-04-03 07:27:20 +02:00
for _ , entry := range entries {
2022-10-01 08:38:35 +02:00
updateUsageData ( r , entry . UserId , entry . DeviceId , 1 , false )
2022-04-03 19:08:18 +02:00
tx := GLOBAL_DB . Where ( "user_id = ?" , entry . UserId )
2022-04-04 05:55:37 +02:00
var devices [ ] * shared . Device
2022-04-03 19:08:18 +02:00
result := tx . Find ( & devices )
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
2022-04-04 05:55:37 +02:00
if len ( devices ) == 0 {
2022-04-08 06:40:22 +02:00
panic ( fmt . Errorf ( "found no devices associated with user_id=%s, can't save history entry" , entry . UserId ) )
2022-04-03 19:08:18 +02:00
}
2022-04-28 19:56:59 +02:00
fmt . Printf ( "apiSubmitHandler: Found %d devices\n" , len ( devices ) )
2022-04-03 19:08:18 +02:00
for _ , device := range devices {
2022-04-04 05:55:37 +02:00
entry . DeviceId = device . DeviceId
2022-04-07 07:43:07 +02:00
result := GLOBAL_DB . Create ( & entry )
if result . Error != nil {
panic ( result . Error )
}
2022-04-03 19:08:18 +02:00
}
2022-04-03 07:27:20 +02:00
}
}
2022-04-28 20:26:55 +02:00
func apiBootstrapHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
userId := getRequiredQueryParam ( r , "user_id" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-10-01 08:38:35 +02:00
updateUsageData ( r , userId , deviceId , 0 , false )
2022-04-28 20:05:56 +02:00
tx := GLOBAL_DB . Where ( "user_id = ?" , userId )
var historyEntries [ ] * shared . EncHistoryEntry
result := tx . Find ( & historyEntries )
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
resp , err := json . Marshal ( historyEntries )
if err != nil {
panic ( err )
}
w . Write ( resp )
}
2022-04-28 19:56:59 +02:00
func apiQueryHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
userId := getRequiredQueryParam ( r , "user_id" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-10-01 08:38:35 +02:00
updateUsageData ( r , userId , deviceId , 0 , true )
2022-04-04 05:55:37 +02:00
// Increment the count
2022-09-21 06:13:59 +02:00
result := GLOBAL_DB . Exec ( "UPDATE enc_history_entries SET read_count = read_count + 1 WHERE device_id = ?" , deviceId )
if result . Error != nil {
panic ( result . Error )
}
2022-04-03 07:27:20 +02:00
2022-09-21 06:15:20 +02:00
// Delete any entries that match a pending deletion request
2022-09-21 06:28:49 +02:00
var deletionRequests [ ] * shared . DeletionRequest
GLOBAL_DB . Where ( "destination_device_id = ? AND user_id = ?" , deviceId , userId ) . Find ( & deletionRequests )
for _ , request := range deletionRequests {
_ , err := applyDeletionRequestsToBackend ( * request )
if err != nil {
panic ( err )
}
}
2022-09-21 06:15:20 +02:00
2022-04-03 07:27:20 +02:00
// Then retrieve, to avoid a race condition
2022-04-16 19:30:39 +02:00
tx := GLOBAL_DB . Where ( "device_id = ? AND read_count < 5" , deviceId )
2022-04-03 07:27:20 +02:00
var historyEntries [ ] * shared . EncHistoryEntry
2022-09-21 06:13:59 +02:00
result = tx . Find ( & historyEntries )
2022-04-03 07:27:20 +02:00
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
2022-09-23 06:45:20 +02:00
fmt . Printf ( "apiQueryHandler: Found %d entries for %s\n" , len ( historyEntries ) , r . URL )
2022-04-03 07:27:20 +02:00
resp , err := json . Marshal ( historyEntries )
if err != nil {
panic ( err )
}
w . Write ( resp )
}
2022-09-30 08:51:45 +02:00
func getRemoteAddr ( r * http . Request ) string {
addr , ok := r . Header [ "X-Real-Ip" ]
if ! ok || len ( addr ) == 0 {
return "Unknown"
}
return addr [ 0 ]
}
2022-04-28 19:56:59 +02:00
func apiRegisterHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
userId := getRequiredQueryParam ( r , "user_id" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-05-23 04:45:46 +02:00
var existingDevicesCount int64 = - 1
result := GLOBAL_DB . Model ( & shared . Device { } ) . Where ( "user_id = ?" , userId ) . Count ( & existingDevicesCount )
fmt . Printf ( "apiRegisterHandler: existingDevicesCount=%d\n" , existingDevicesCount )
if result . Error != nil {
panic ( result . Error )
}
2022-09-30 08:51:45 +02:00
GLOBAL_DB . Create ( & shared . Device { UserId : userId , DeviceId : deviceId , RegistrationIp : getRemoteAddr ( r ) , RegistrationDate : time . Now ( ) } )
2022-05-23 04:45:46 +02:00
if existingDevicesCount > 0 {
GLOBAL_DB . Create ( & shared . DumpRequest { UserId : userId , RequestingDeviceId : deviceId , RequestTime : time . Now ( ) } )
}
2022-10-01 08:38:35 +02:00
updateUsageData ( r , userId , deviceId , 0 , false )
2022-04-28 19:56:59 +02:00
}
func apiGetPendingDumpRequestsHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
userId := getRequiredQueryParam ( r , "user_id" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-04-28 20:46:14 +02:00
var dumpRequests [ ] * shared . DumpRequest
// Filter out ones requested by the hishtory instance that sent this request
result := GLOBAL_DB . Where ( "user_id = ? AND requesting_device_id != ?" , userId , deviceId ) . Find ( & dumpRequests )
2022-04-03 07:27:20 +02:00
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
2022-04-28 19:56:59 +02:00
respBody , err := json . Marshal ( dumpRequests )
2022-01-09 05:27:18 +01:00
if err != nil {
2022-04-28 19:56:59 +02:00
panic ( fmt . Errorf ( "failed to JSON marshall the dump requests: %v" , err ) )
2022-01-09 05:27:18 +01:00
}
2022-04-28 19:56:59 +02:00
w . Write ( respBody )
2022-04-03 07:27:20 +02:00
}
2022-04-28 19:56:59 +02:00
func apiSubmitDumpHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
userId := getRequiredQueryParam ( r , "user_id" )
2022-09-30 08:32:13 +02:00
srcDeviceId := getRequiredQueryParam ( r , "source_device_id" )
2022-06-05 08:03:05 +02:00
requestingDeviceId := getRequiredQueryParam ( r , "requesting_device_id" )
2022-04-28 19:56:59 +02:00
data , err := ioutil . ReadAll ( r . Body )
if err != nil {
panic ( err )
}
var entries [ ] shared . EncHistoryEntry
err = json . Unmarshal ( data , & entries )
if err != nil {
panic ( fmt . Sprintf ( "body=%#v, err=%v" , data , err ) )
}
fmt . Printf ( "apiSubmitDumpHandler: received request containg %d EncHistoryEntry\n" , len ( entries ) )
err = GLOBAL_DB . Transaction ( func ( tx * gorm . DB ) error {
for _ , entry := range entries {
entry . DeviceId = requestingDeviceId
if entry . UserId != userId {
return fmt . Errorf ( "batch contains an entry with UserId=%#v, when the query param contained the user_id=%#v" , entry . UserId , userId )
}
result := tx . Create ( & entry )
if result . Error != nil {
return fmt . Errorf ( "failed to create entry: %v" , err )
}
}
return nil
} )
if err != nil {
panic ( fmt . Errorf ( "failed to execute transaction to add dumped DB: %v" , err ) )
}
2022-04-28 20:46:14 +02:00
result := GLOBAL_DB . Delete ( & shared . DumpRequest { } , "user_id = ? AND requesting_device_id = ?" , userId , requestingDeviceId )
2022-04-28 19:56:59 +02:00
if result . Error != nil {
panic ( fmt . Errorf ( "failed to clear the dump request: %v" , err ) )
}
2022-10-01 08:38:35 +02:00
updateUsageData ( r , userId , srcDeviceId , len ( entries ) , false )
2022-01-09 05:27:18 +01:00
}
2022-04-07 07:43:07 +02:00
func apiBannerHandler ( w http . ResponseWriter , r * http . Request ) {
2022-06-05 08:03:05 +02:00
commitHash := getRequiredQueryParam ( r , "commit_hash" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-04-07 07:43:07 +02:00
forcedBanner := r . URL . Query ( ) . Get ( "forced_banner" )
fmt . Printf ( "apiBannerHandler: commit_hash=%#v, device_id=%#v, forced_banner=%#v\n" , commitHash , deviceId , forcedBanner )
w . Write ( [ ] byte ( forcedBanner ) )
}
2022-09-20 07:49:48 +02:00
func getDeletionRequestsHandler ( w http . ResponseWriter , r * http . Request ) {
userId := getRequiredQueryParam ( r , "user_id" )
deviceId := getRequiredQueryParam ( r , "device_id" )
2022-09-21 06:13:59 +02:00
// Increment the ReadCount
2022-09-21 06:15:20 +02:00
result := GLOBAL_DB . Exec ( "UPDATE deletion_requests SET read_count = read_count + 1 WHERE destination_device_id = ? AND user_id = ?" , deviceId , userId )
2022-09-21 06:13:59 +02:00
if result . Error != nil {
panic ( result . Error )
}
// Return all the deletion requests
2022-09-20 07:49:48 +02:00
var deletionRequests [ ] * shared . DeletionRequest
2022-09-21 06:13:59 +02:00
result = GLOBAL_DB . Where ( "user_id = ? AND destination_device_id = ?" , userId , deviceId ) . Find ( & deletionRequests )
2022-09-20 07:49:48 +02:00
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
respBody , err := json . Marshal ( deletionRequests )
if err != nil {
panic ( fmt . Errorf ( "failed to JSON marshall the dump requests: %v" , err ) )
}
w . Write ( respBody )
}
func addDeletionRequestHandler ( w http . ResponseWriter , r * http . Request ) {
data , err := ioutil . ReadAll ( r . Body )
if err != nil {
panic ( err )
}
var request shared . DeletionRequest
err = json . Unmarshal ( data , & request )
if err != nil {
panic ( fmt . Sprintf ( "body=%#v, err=%v" , data , err ) )
}
2022-09-22 06:46:46 +02:00
request . ReadCount = 0
2022-09-20 07:49:48 +02:00
fmt . Printf ( "addDeletionRequestHandler: received request containg %d messages to be deleted\n" , len ( request . Messages . Ids ) )
// Store the deletion request so all the devices will get it
tx := GLOBAL_DB . Where ( "user_id = ?" , request . UserId )
var devices [ ] * shared . Device
result := tx . Find ( & devices )
if result . Error != nil {
panic ( fmt . Errorf ( "DB query error: %v" , result . Error ) )
}
if len ( devices ) == 0 {
panic ( fmt . Errorf ( "found no devices associated with user_id=%s, can't save history entry" , request . UserId ) )
}
fmt . Printf ( "addDeletionRequestHandler: Found %d devices\n" , len ( devices ) )
for _ , device := range devices {
request . DestinationDeviceId = device . DeviceId
result := GLOBAL_DB . Create ( & request )
if result . Error != nil {
panic ( result . Error )
}
}
// Also delete anything currently in the DB matching it
2022-09-21 06:28:49 +02:00
numDeleted , err := applyDeletionRequestsToBackend ( request )
if err != nil {
panic ( err )
}
fmt . Printf ( "addDeletionRequestHandler: Deleted %d rows in the backend\n" , numDeleted )
}
func applyDeletionRequestsToBackend ( request shared . DeletionRequest ) ( int , error ) {
2022-09-21 06:36:02 +02:00
tx := GLOBAL_DB . Where ( "false" )
2022-09-20 07:49:48 +02:00
for _ , message := range request . Messages . Ids {
2022-09-21 06:36:02 +02:00
tx = tx . Or ( GLOBAL_DB . Where ( "user_id = ? AND device_id = ? AND date = ?" , request . UserId , message . DeviceId , message . Date ) )
}
result := tx . Delete ( & shared . EncHistoryEntry { } )
if result . Error != nil {
return 0 , result . Error
2022-09-20 07:49:48 +02:00
}
2022-09-21 06:36:02 +02:00
return int ( result . RowsAffected ) , nil
2022-09-20 07:49:48 +02:00
}
2022-05-02 04:37:26 +02:00
func wipeDbHandler ( w http . ResponseWriter , r * http . Request ) {
result := GLOBAL_DB . Exec ( "DELETE FROM enc_history_entries" )
if result . Error != nil {
panic ( result . Error )
}
}
2022-04-08 05:59:40 +02:00
func isTestEnvironment ( ) bool {
2022-04-28 19:56:59 +02:00
u , err := user . Current ( )
if err != nil {
panic ( err )
}
return os . Getenv ( "HISHTORY_TEST" ) != "" || u . Username == "david"
2022-04-08 05:59:40 +02:00
}
2022-03-30 06:56:28 +02:00
func OpenDB ( ) ( * gorm . DB , error ) {
2022-04-08 05:59:40 +02:00
if isTestEnvironment ( ) {
2022-04-06 08:31:24 +02:00
db , err := gorm . Open ( sqlite . Open ( "file::memory:?cache=shared" ) , & gorm . Config { } )
if err != nil {
return nil , fmt . Errorf ( "failed to connect to the DB: %v" , err )
}
db . AutoMigrate ( & shared . EncHistoryEntry { } )
db . AutoMigrate ( & shared . Device { } )
2022-04-16 20:37:43 +02:00
db . AutoMigrate ( & UsageData { } )
2022-04-28 20:46:14 +02:00
db . AutoMigrate ( & shared . DumpRequest { } )
2022-09-20 07:49:48 +02:00
db . AutoMigrate ( & shared . DeletionRequest { } )
2022-04-28 19:56:59 +02:00
db . Exec ( "PRAGMA journal_mode = WAL" )
2022-04-06 08:31:24 +02:00
return db , nil
2022-03-30 06:56:28 +02:00
}
2022-04-09 07:37:03 +02:00
db , err := gorm . Open ( postgres . Open ( PostgresDb ) , & gorm . Config { } )
2022-03-30 06:56:28 +02:00
if err != nil {
return nil , fmt . Errorf ( "failed to connect to the DB: %v" , err )
}
2022-04-03 07:27:20 +02:00
db . AutoMigrate ( & shared . EncHistoryEntry { } )
db . AutoMigrate ( & shared . Device { } )
2022-04-16 20:37:43 +02:00
db . AutoMigrate ( & UsageData { } )
2022-04-28 20:46:14 +02:00
db . AutoMigrate ( & shared . DumpRequest { } )
2022-09-20 07:49:48 +02:00
db . AutoMigrate ( & shared . DeletionRequest { } )
2022-03-30 06:56:28 +02:00
return db , nil
}
2022-04-03 07:27:20 +02:00
func init ( ) {
2022-04-09 08:47:13 +02:00
if ReleaseVersion == "UNKNOWN" && ! isTestEnvironment ( ) {
2022-04-09 07:37:03 +02:00
panic ( "server.go was built without a ReleaseVersion!" )
}
2022-04-03 07:54:09 +02:00
InitDB ( )
2022-04-16 20:37:43 +02:00
go runBackgroundJobs ( )
2022-04-03 07:54:09 +02:00
}
2022-04-17 01:28:53 +02:00
func cron ( ) error {
err := updateReleaseVersion ( )
if err != nil {
fmt . Println ( err )
}
err = cleanDatabase ( )
if err != nil {
fmt . Println ( err )
}
return nil
}
2022-04-16 20:37:43 +02:00
func runBackgroundJobs ( ) {
2022-04-28 19:56:59 +02:00
time . Sleep ( 5 * time . Second )
2022-04-09 08:47:13 +02:00
for {
2022-04-17 01:28:53 +02:00
err := cron ( )
2022-04-09 21:57:58 +02:00
if err != nil {
2022-04-17 01:28:53 +02:00
fmt . Printf ( "Cron failure: %v" , err )
2022-04-16 20:37:43 +02:00
}
2022-04-09 08:47:13 +02:00
time . Sleep ( 10 * time . Minute )
}
}
2022-04-17 01:28:53 +02:00
func triggerCronHandler ( w http . ResponseWriter , r * http . Request ) {
err := cron ( )
if err != nil {
panic ( err )
}
}
2022-04-09 08:47:13 +02:00
type releaseInfo struct {
Name string ` json:"name" `
}
2022-04-09 21:57:58 +02:00
func updateReleaseVersion ( ) error {
2022-04-09 08:47:13 +02:00
resp , err := http . Get ( "https://api.github.com/repos/ddworken/hishtory/releases/latest" )
if err != nil {
2022-04-09 22:02:30 +02:00
return fmt . Errorf ( "failed to get latest release version: %v" , err )
2022-04-09 08:47:13 +02:00
}
respBody , err := ioutil . ReadAll ( resp . Body )
if err != nil {
2022-04-09 22:02:30 +02:00
return fmt . Errorf ( "failed to read github API response body: %v" , err )
2022-04-09 08:47:13 +02:00
}
2022-04-09 21:50:01 +02:00
if resp . StatusCode == 403 && strings . Contains ( string ( respBody ) , "API rate limit exceeded for " ) {
2022-04-09 21:57:58 +02:00
return nil
2022-04-09 21:50:01 +02:00
}
if resp . StatusCode != 200 {
2022-04-09 22:02:30 +02:00
return fmt . Errorf ( "failed to call github API, status_code=%d, body=%#v" , resp . StatusCode , string ( respBody ) )
2022-04-09 21:50:01 +02:00
}
2022-04-09 08:47:13 +02:00
var info releaseInfo
err = json . Unmarshal ( respBody , & info )
if err != nil {
2022-04-09 21:57:58 +02:00
return fmt . Errorf ( "failed to parse github API response: %v" , err )
2022-04-09 08:47:13 +02:00
}
2022-04-22 07:02:28 +02:00
latestVersionTag := info . Name
ReleaseVersion = decrementVersionIfInvalid ( latestVersionTag )
return nil
}
func decrementVersionIfInvalid ( initialVersion string ) string {
// Decrements the version up to 5 times if the version doesn't have valid binaries yet.
version := initialVersion
for i := 0 ; i < 5 ; i ++ {
updateInfo := buildUpdateInfo ( version )
err := assertValidUpdate ( updateInfo )
if err == nil {
fmt . Printf ( "Found a valid version: %v\n" , version )
return version
}
fmt . Printf ( "Found %s to be an invalid version: %v\n" , version , err )
version , err = decrementVersion ( version )
if err != nil {
fmt . Printf ( "Failed to decrement version after finding the latest version was invalid: %v\n" , err )
return initialVersion
}
}
fmt . Printf ( "Decremented the version 5 times and failed to find a valid version version number, initial version number: %v, last checked version number: %v\n" , initialVersion , version )
return initialVersion
}
func assertValidUpdate ( updateInfo shared . UpdateInfo ) error {
2022-05-27 08:45:08 +02:00
urls := [ ] string { updateInfo . LinuxAmd64Url , updateInfo . LinuxAmd64AttestationUrl ,
updateInfo . DarwinAmd64Url , updateInfo . DarwinAmd64UnsignedUrl , updateInfo . DarwinAmd64AttestationUrl ,
updateInfo . DarwinArm64Url , updateInfo . DarwinArm64UnsignedUrl , updateInfo . DarwinArm64AttestationUrl }
2022-04-22 07:02:28 +02:00
for _ , url := range urls {
resp , err := http . Get ( url )
if err != nil {
return fmt . Errorf ( "failed to retrieve URL %#v: %v" , url , err )
}
if resp . StatusCode == 404 {
return fmt . Errorf ( "URL %#v returned 404" , url )
}
}
2022-04-09 21:57:58 +02:00
return nil
2022-04-09 08:47:13 +02:00
}
2022-04-03 07:54:09 +02:00
func InitDB ( ) {
2022-04-03 07:27:20 +02:00
var err error
GLOBAL_DB , err = OpenDB ( )
2022-01-09 05:27:18 +01:00
if err != nil {
panic ( err )
}
2022-04-03 07:27:20 +02:00
tx , err := GLOBAL_DB . DB ( )
if err != nil {
panic ( err )
}
err = tx . Ping ( )
if err != nil {
panic ( err )
}
}
2022-04-22 07:02:28 +02:00
func decrementVersion ( version string ) ( string , error ) {
if version == "UNKNOWN" {
return "" , fmt . Errorf ( "cannot decrement UNKNOWN" )
}
parts := strings . Split ( version , "." )
if len ( parts ) != 2 {
return "" , fmt . Errorf ( "invalid version: %s" , version )
2022-04-17 01:34:09 +02:00
}
2022-04-22 07:02:28 +02:00
versionNumber , err := strconv . Atoi ( parts [ 1 ] )
if err != nil {
return "" , fmt . Errorf ( "invalid version: %s" , version )
}
return parts [ 0 ] + "." + strconv . Itoa ( versionNumber - 1 ) , nil
}
func buildUpdateInfo ( version string ) shared . UpdateInfo {
return shared . UpdateInfo {
2022-06-05 05:36:34 +02:00
LinuxAmd64Url : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-linux-amd64" , version ) ,
LinuxAmd64AttestationUrl : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-linux-amd64.intoto.jsonl" , version ) ,
DarwinAmd64Url : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-amd64" , version ) ,
DarwinAmd64UnsignedUrl : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-amd64-unsigned" , version ) ,
DarwinAmd64AttestationUrl : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-amd64.intoto.jsonl" , version ) ,
DarwinArm64Url : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-arm64" , version ) ,
DarwinArm64UnsignedUrl : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-arm64-unsigned" , version ) ,
DarwinArm64AttestationUrl : fmt . Sprintf ( "https://github.com/ddworken/hishtory/releases/download/%s/hishtory-darwin-arm64.intoto.jsonl" , version ) ,
2022-04-22 07:02:28 +02:00
Version : version ,
}
}
func apiDownloadHandler ( w http . ResponseWriter , r * http . Request ) {
updateInfo := buildUpdateInfo ( ReleaseVersion )
2022-04-17 01:34:09 +02:00
resp , err := json . Marshal ( updateInfo )
if err != nil {
panic ( err )
}
w . Write ( resp )
}
2022-04-16 09:44:47 +02:00
type loggedResponseData struct {
size int
}
type loggingResponseWriter struct {
http . ResponseWriter
responseData * loggedResponseData
}
func ( r * loggingResponseWriter ) Write ( b [ ] byte ) ( int , error ) {
size , err := r . ResponseWriter . Write ( b )
r . responseData . size += size
return size , err
}
func ( r * loggingResponseWriter ) WriteHeader ( statusCode int ) {
r . ResponseWriter . WriteHeader ( statusCode )
}
func withLogging ( h func ( http . ResponseWriter , * http . Request ) ) http . Handler {
2022-04-16 08:19:39 +02:00
logFn := func ( rw http . ResponseWriter , r * http . Request ) {
2022-04-16 09:44:47 +02:00
var responseData loggedResponseData
lrw := loggingResponseWriter {
ResponseWriter : rw ,
responseData : & responseData ,
}
2022-04-16 08:19:39 +02:00
start := time . Now ( )
2022-04-16 09:44:47 +02:00
h ( & lrw , r )
2022-04-16 08:19:39 +02:00
duration := time . Since ( start )
2022-10-01 18:50:06 +02:00
fmt . Printf ( "%s %s %#v %s %s %s\n" , r . RemoteAddr , r . Method , r . RequestURI , r . Header . Get ( "X-Hishtory-Version" ) , duration . String ( ) , byteCountToString ( responseData . size ) )
2022-04-16 08:19:39 +02:00
}
return http . HandlerFunc ( logFn )
}
2022-04-16 09:44:47 +02:00
func byteCountToString ( b int ) string {
const unit = 1000
if b < unit {
return fmt . Sprintf ( "%d B" , b )
}
div , exp := int64 ( unit ) , 0
for n := b / unit ; n >= unit ; n /= unit {
div *= unit
exp ++
}
return fmt . Sprintf ( "%.1f %cB" , float64 ( b ) / float64 ( div ) , "kMG" [ exp ] )
}
2022-04-16 20:37:43 +02:00
func cleanDatabase ( ) error {
result := GLOBAL_DB . Exec ( "DELETE FROM enc_history_entries WHERE read_count > 10" )
if result . Error != nil {
return result . Error
}
2022-09-21 06:13:59 +02:00
result = GLOBAL_DB . Exec ( "DELETE FROM deletion_requests WHERE read_count > 100" )
if result . Error != nil {
return result . Error
}
2022-09-23 03:22:06 +02:00
// TODO(optimization): Clean the database by deleting entries for users that haven't been used in X amount of time
2022-04-16 20:37:43 +02:00
return nil
}
2022-04-03 07:27:20 +02:00
func main ( ) {
2022-01-09 05:27:18 +01:00
fmt . Println ( "Listening on localhost:8080" )
2022-04-28 19:56:59 +02:00
http . Handle ( "/api/v1/submit" , withLogging ( apiSubmitHandler ) )
http . Handle ( "/api/v1/get-dump-requests" , withLogging ( apiGetPendingDumpRequestsHandler ) )
http . Handle ( "/api/v1/submit-dump" , withLogging ( apiSubmitDumpHandler ) )
http . Handle ( "/api/v1/query" , withLogging ( apiQueryHandler ) )
2022-04-28 20:26:55 +02:00
http . Handle ( "/api/v1/bootstrap" , withLogging ( apiBootstrapHandler ) )
2022-04-28 19:56:59 +02:00
http . Handle ( "/api/v1/register" , withLogging ( apiRegisterHandler ) )
2022-04-16 08:19:39 +02:00
http . Handle ( "/api/v1/banner" , withLogging ( apiBannerHandler ) )
2022-04-17 01:34:09 +02:00
http . Handle ( "/api/v1/download" , withLogging ( apiDownloadHandler ) )
2022-04-28 19:56:59 +02:00
http . Handle ( "/api/v1/trigger-cron" , withLogging ( triggerCronHandler ) )
2022-09-20 07:49:48 +02:00
http . Handle ( "/api/v1/get-deletion-requests" , withLogging ( getDeletionRequestsHandler ) )
http . Handle ( "/api/v1/add-deletion-request" , withLogging ( addDeletionRequestHandler ) )
2022-09-30 08:32:13 +02:00
http . Handle ( "/internal/api/v1/usage-stats" , withLogging ( basicAuth ( usageStatsHandler ) ) )
2022-05-02 04:37:26 +02:00
if isTestEnvironment ( ) {
http . Handle ( "/api/v1/wipe-db" , withLogging ( wipeDbHandler ) )
}
2022-01-09 05:27:18 +01:00
log . Fatal ( http . ListenAndServe ( ":8080" , nil ) )
}
2022-09-22 04:59:31 +02:00
2022-09-30 08:32:13 +02:00
func basicAuth ( next http . HandlerFunc ) http . HandlerFunc {
return http . HandlerFunc ( func ( w http . ResponseWriter , r * http . Request ) {
username , password , ok := r . BasicAuth ( )
if ok {
// sha256sum of a random 32 byte hard coded password that I use for accessing the internal routes. Good luck brute forcing this :)
unencodedHash := sha256 . Sum256 ( [ ] byte ( password ) )
passwordHash := hex . EncodeToString ( unencodedHash [ : ] )
expectedPasswordHash := "137d125ff03808cf8306244aa9c018b570f504fdb94b3c98fd817b5a97a4bb80"
usernameMatch := username == "ddworken"
passwordMatch := ( subtle . ConstantTimeCompare ( [ ] byte ( passwordHash ) , [ ] byte ( expectedPasswordHash ) ) == 1 )
if usernameMatch && passwordMatch {
next . ServeHTTP ( w , r )
return
}
}
w . Header ( ) . Set ( "WWW-Authenticate" , ` Basic realm="restricted", charset="UTF-8" ` )
http . Error ( w , "Unauthorized" , http . StatusUnauthorized )
} )
}
2022-09-23 03:22:06 +02:00
// TODO(optimization): Maybe optimize the endpoints a bit to reduce the number of round trips required?