19 Commits

Author SHA1 Message Date
bde2a38931 Improve filestore test
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-24 16:38:17 +01:00
1a3ebcb1df Allow metadata when uploading files
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-24 16:29:34 +01:00
17a484db91 Add filesize to file metadata
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-24 15:52:15 +01:00
889894a737 Reorganize api tests
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-23 17:22:16 +01:00
0e76cad5d7 Add readme
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-22 10:27:21 +01:00
f664c886eb Add test for api user create
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-22 10:19:18 +01:00
121b0396fa Update pipeline 2022-01-22 09:55:24 +01:00
6822cd6bfe Fix Dockerfile
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-21 18:03:49 +01:00
db41f565ca Add list to api
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-21 14:11:47 +01:00
20cb97f90f Add user list 2022-01-21 14:04:41 +01:00
ed4a10c966 Add delete
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-21 07:17:52 +01:00
ff8c6aca64 Add save/load for client config
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-21 02:40:33 +01:00
d583db5450 use client for user create action
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-20 23:31:09 +01:00
88d9a76785 use client for login action 2022-01-20 23:20:01 +01:00
193b0d3926 Use client for upload action 2022-01-20 23:17:09 +01:00
733c0410fe Remove print from client
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
2022-01-20 17:58:25 +01:00
8e88f09709 Merge pull request 'Add client package' (#6) from feature/client-package into master
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
Reviewed-on: #6
2022-01-20 16:55:45 +00:00
d44801b0ae Fix pipeline
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
ci/woodpecker/pr/woodpecker Pipeline was successful
2022-01-20 17:52:52 +01:00
a4bf701ac3 Add client package
Some checks failed
ci/woodpecker/push/woodpecker Pipeline was successful
ci/woodpecker/pr/woodpecker Pipeline failed
2022-01-20 17:50:56 +01:00
23 changed files with 988 additions and 268 deletions

View File

@@ -2,9 +2,9 @@ pipeline:
test: test:
image: golang:latest image: golang:latest
commands: commands:
- go build ./cmd/client/client.go - go build -o gpaste-client ./cmd/client/client.go
- go build ./cmd/server/server.go - go build -o gpaste-server ./cmd/server/server.go
- go test -v ./... - go test -cover ./...
- go vet ./... - go vet ./...
when: when:
branch: master branch: master

View File

@@ -10,4 +10,5 @@ RUN go build -o gpaste-server ./cmd/server/server.go
FROM alpine:latest FROM alpine:latest
COPY --from=builder /src/gpaste /bin/gpaste COPY --from=builder /src/gpaste /bin/gpaste
COPY --from=builder /src/gpaste-server /bin/gpaste-server COPY --from=builder /src/gpaste-server /bin/gpaste-server
EXPOSE 8080
CMD ["/bin/gpaste-server"] CMD ["/bin/gpaste-server"]

35
README.md Normal file
View File

@@ -0,0 +1,35 @@
![status-badge](https://ci.t-juice.club/api/badges/torjus/gpaste/status.svg)
# gpaste
Simple pastebin-style webapp.
## Build
### gpaste-server
```text
go build -o gpaste-server cmd/server/server.go
```
### gpaste-client
```text
go build -o gpaste cmd/client/client.go
```
## Run using docker
### From registry
```text
docker pull registry.t-juice.club/gpaste:latest
docker run --rm -it -p 8080:8080 registry.t-juice.club/gpaste:latest
```
### From Dockerfile
```text
docker build -t gpaste:latest .
docker run --rm -it p 8080:8080 gpaste:latest
```

View File

@@ -4,7 +4,9 @@ import (
"encoding/json" "encoding/json"
"io" "io"
"net/http" "net/http"
"strconv"
"strings" "strings"
"time"
"git.t-juice.club/torjus/gpaste" "git.t-juice.club/torjus/gpaste"
"git.t-juice.club/torjus/gpaste/files" "git.t-juice.club/torjus/gpaste/files"
@@ -37,7 +39,7 @@ func NewHTTPServer(cfg *gpaste.ServerConfig) *HTTPServer {
// Create initial user // Create initial user
// TODO: Do properly // TODO: Do properly
user := &users.User{Username: "admin"} user := &users.User{Username: "admin", Role: users.RoleAdmin}
user.SetPassword("admin") user.SetPassword("admin")
srv.Users.Store(user) srv.Users.Store(user)
@@ -49,6 +51,7 @@ func NewHTTPServer(cfg *gpaste.ServerConfig) *HTTPServer {
r.Get("/", srv.HandlerIndex) r.Get("/", srv.HandlerIndex)
r.Post("/api/file", srv.HandlerAPIFilePost) r.Post("/api/file", srv.HandlerAPIFilePost)
r.Get("/api/file/{id}", srv.HandlerAPIFileGet) r.Get("/api/file/{id}", srv.HandlerAPIFileGet)
r.Delete("/api/file/{id}", srv.HandlerAPIFileDelete)
r.Post("/api/login", srv.HandlerAPILogin) r.Post("/api/login", srv.HandlerAPILogin)
r.Post("/api/user", srv.HandlerAPIUserCreate) r.Post("/api/user", srv.HandlerAPIUserCreate)
srv.Handler = r srv.Handler = r
@@ -61,10 +64,6 @@ func (s *HTTPServer) HandlerIndex(w http.ResponseWriter, r *http.Request) {
} }
func (s *HTTPServer) HandlerAPIFilePost(w http.ResponseWriter, r *http.Request) { func (s *HTTPServer) HandlerAPIFilePost(w http.ResponseWriter, r *http.Request) {
f := &files.File{
ID: uuid.Must(uuid.NewRandom()).String(),
Body: r.Body,
}
reqID := middleware.GetReqID(r.Context()) reqID := middleware.GetReqID(r.Context())
// Check if multipart form // Check if multipart form
@@ -73,6 +72,11 @@ func (s *HTTPServer) HandlerAPIFilePost(w http.ResponseWriter, r *http.Request)
s.processMultiPartFormUpload(w, r) s.processMultiPartFormUpload(w, r)
return return
} }
f := fileFromParams(r)
f.ID = uuid.NewString()
f.Body = r.Body
err := s.Files.Store(f) err := s.Files.Store(f)
if err != nil { if err != nil {
w.WriteHeader(http.StatusInternalServerError) w.WriteHeader(http.StatusInternalServerError)
@@ -117,15 +121,27 @@ func (s *HTTPServer) HandlerAPIFileGet(w http.ResponseWriter, r *http.Request) {
} }
} }
func (s *HTTPServer) processMultiPartFormUpload(w http.ResponseWriter, r *http.Request) { func (s *HTTPServer) HandlerAPIFileDelete(w http.ResponseWriter, r *http.Request) {
reqID := middleware.GetReqID(r.Context()) // TODO: Require auth
type resp struct { id := chi.URLParam(r, "id")
Message string `json:"message"` if id == "" {
ID string `json:"id"` w.WriteHeader(http.StatusBadRequest)
URL string `json:"url"` return
} }
var responses []resp err := s.Files.Delete(id)
if err != nil {
w.WriteHeader(http.StatusBadRequest)
return
}
reqID := middleware.GetReqID(r.Context())
s.Logger.Infow("Deleted file", "id", id, "req_id", reqID)
}
func (s *HTTPServer) processMultiPartFormUpload(w http.ResponseWriter, r *http.Request) {
reqID := middleware.GetReqID(r.Context())
var responses []ResponseAPIFilePost
if err := r.ParseMultipartForm(1024 * 1024 * 10); err != nil { if err := r.ParseMultipartForm(1024 * 1024 * 10); err != nil {
s.Logger.Warnw("Error parsing multipart form.", "req_id", reqID, "err", err) s.Logger.Warnw("Error parsing multipart form.", "req_id", reqID, "err", err)
@@ -136,11 +152,10 @@ func (s *HTTPServer) processMultiPartFormUpload(w http.ResponseWriter, r *http.R
s.Logger.Warnw("Error reading file from multipart form.", "req_id", reqID, "error", err) s.Logger.Warnw("Error reading file from multipart form.", "req_id", reqID, "error", err)
return return
} }
f := &files.File{ f := fileFromParams(r)
ID: uuid.Must(uuid.NewRandom()).String(), f.ID = uuid.NewString()
OriginalFilename: fh.Filename, f.OriginalFilename = fh.Filename
Body: ff, f.Body = ff
}
if err := s.Files.Store(f); err != nil { if err := s.Files.Store(f); err != nil {
w.WriteHeader(http.StatusInternalServerError) w.WriteHeader(http.StatusInternalServerError)
@@ -149,7 +164,7 @@ func (s *HTTPServer) processMultiPartFormUpload(w http.ResponseWriter, r *http.R
} }
s.Logger.Infow("Stored file.", "req_id", reqID, "id", f.ID, "filename", f.OriginalFilename, "remote_addr", r.RemoteAddr) s.Logger.Infow("Stored file.", "req_id", reqID, "id", f.ID, "filename", f.OriginalFilename, "remote_addr", r.RemoteAddr)
responses = append(responses, resp{Message: "OK", ID: f.ID, URL: "TODO"}) responses = append(responses, ResponseAPIFilePost{Message: "OK", ID: f.ID, URL: "TODO"})
} }
@@ -162,10 +177,7 @@ func (s *HTTPServer) processMultiPartFormUpload(w http.ResponseWriter, r *http.R
func (s *HTTPServer) HandlerAPILogin(w http.ResponseWriter, r *http.Request) { func (s *HTTPServer) HandlerAPILogin(w http.ResponseWriter, r *http.Request) {
reqID := middleware.GetReqID(r.Context()) reqID := middleware.GetReqID(r.Context())
expectedRequest := struct { var expectedRequest RequestAPILogin
Username string `json:"username"`
Password string `json:"password"`
}{}
decoder := json.NewDecoder(r.Body) decoder := json.NewDecoder(r.Body)
defer r.Body.Close() defer r.Body.Close()
if err := decoder.Decode(&expectedRequest); err != nil { if err := decoder.Decode(&expectedRequest); err != nil {
@@ -179,9 +191,7 @@ func (s *HTTPServer) HandlerAPILogin(w http.ResponseWriter, r *http.Request) {
return return
} }
response := struct { response := ResponseAPILogin{
Token string `json:"token"`
}{
Token: token, Token: token,
} }
@@ -193,17 +203,12 @@ func (s *HTTPServer) HandlerAPILogin(w http.ResponseWriter, r *http.Request) {
} }
} }
type RequestAPIUserCreate struct {
Username string `json:"username"`
Password string `json:"password"`
}
func (s *HTTPServer) HandlerAPIUserCreate(w http.ResponseWriter, r *http.Request) { func (s *HTTPServer) HandlerAPIUserCreate(w http.ResponseWriter, r *http.Request) {
reqID := middleware.GetReqID(r.Context()) reqID := middleware.GetReqID(r.Context())
defer r.Body.Close() defer r.Body.Close()
level, err := AuthLevelFromRequest(r) role, err := RoleFromRequest(r)
if err != nil || level < gpaste.AuthLevelAdmin { if err != nil || role != users.RoleAdmin {
w.WriteHeader(http.StatusUnauthorized) w.WriteHeader(http.StatusUnauthorized)
return return
} }
@@ -217,7 +222,7 @@ func (s *HTTPServer) HandlerAPIUserCreate(w http.ResponseWriter, r *http.Request
} }
// TODO: Ensure user does not already exist // TODO: Ensure user does not already exist
user := &users.User{Username: req.Username} user := &users.User{Username: req.Username, Role: users.RoleUser}
if err := user.SetPassword(req.Password); err != nil { if err := user.SetPassword(req.Password); err != nil {
s.Logger.Warnw("Error setting user password.", "req_id", reqID, "error", err, "remote_addr", r.RemoteAddr) s.Logger.Warnw("Error setting user password.", "req_id", reqID, "error", err, "remote_addr", r.RemoteAddr)
w.WriteHeader(http.StatusBadRequest) w.WriteHeader(http.StatusBadRequest)
@@ -229,5 +234,48 @@ func (s *HTTPServer) HandlerAPIUserCreate(w http.ResponseWriter, r *http.Request
w.WriteHeader(http.StatusInternalServerError) w.WriteHeader(http.StatusInternalServerError)
return return
} }
w.WriteHeader(http.StatusAccepted)
s.Logger.Infow("Created user.", "req_id", reqID, "remote_addr", r.RemoteAddr, "username", req.Username) s.Logger.Infow("Created user.", "req_id", reqID, "remote_addr", r.RemoteAddr, "username", req.Username)
} }
func (s *HTTPServer) HandlerAPIUserList(w http.ResponseWriter, r *http.Request) {
reqID := middleware.GetReqID(r.Context())
l, err := s.Users.List()
if err != nil {
s.Logger.Warnw("Error listing users.", "req_id", reqID, "error", err)
w.WriteHeader(http.StatusInternalServerError)
return
}
encoder := json.NewEncoder(w)
if err := encoder.Encode(l); err != nil {
s.Logger.Warnw("Error encoding response.", "req_id", "error", err)
}
}
func fileFromParams(r *http.Request) *files.File {
const (
keyMaxViews = "max_views"
keyExpiresOn = "exp"
)
var f files.File
q := r.URL.Query()
if q.Has(keyMaxViews) {
views, err := strconv.ParseUint(q.Get(keyMaxViews), 10, 64)
if err == nil {
f.MaxViews = uint(views)
}
}
if q.Has(keyExpiresOn) {
exp, err := time.Parse(time.RFC3339, q.Get(keyExpiresOn))
if err == nil {
f.ExpiresOn = exp
}
}
return &f
}

View File

@@ -8,24 +8,30 @@ import (
"mime/multipart" "mime/multipart"
"net/http" "net/http"
"net/http/httptest" "net/http/httptest"
"strings"
"testing" "testing"
"time"
"git.t-juice.club/torjus/gpaste" "git.t-juice.club/torjus/gpaste"
"git.t-juice.club/torjus/gpaste/api" "git.t-juice.club/torjus/gpaste/api"
"git.t-juice.club/torjus/gpaste/files"
"git.t-juice.club/torjus/gpaste/users" "git.t-juice.club/torjus/gpaste/users"
"github.com/google/go-cmp/cmp"
"github.com/google/uuid"
) )
func TestHandlers(t *testing.T) { func TestHandlers(t *testing.T) {
cfg := &gpaste.ServerConfig{ //cfg := &gpaste.ServerConfig{
SigningSecret: "abc123", // SigningSecret: "abc123",
Store: &gpaste.ServerStoreConfig{ // Store: &gpaste.ServerStoreConfig{
Type: "memory", // Type: "memory",
}, // },
URL: "http://localhost:8080", // URL: "http://localhost:8080",
} //}
hs := api.NewHTTPServer(cfg) //hs := api.NewHTTPServer(cfg)
t.Run("HandlerIndex", func(t *testing.T) { t.Run("index", func(t *testing.T) {
hs := newServer()
rr := httptest.NewRecorder() rr := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/", nil) req := httptest.NewRequest(http.MethodGet, "/", nil)
@@ -40,107 +46,239 @@ func TestHandlers(t *testing.T) {
t.Errorf("Body does not match expected. Got %s want %s", body, expectedBody) t.Errorf("Body does not match expected. Got %s want %s", body, expectedBody)
} }
}) })
t.Run("HandlerAPIFilePost", func(t *testing.T) { t.Run("api", func(t *testing.T) {
rr := httptest.NewRecorder() t.Run("file", func(t *testing.T) {
buf := &bytes.Buffer{} // POST /api/file
mw := multipart.NewWriter(buf) t.Run("POST", func(t *testing.T) {
fw, err := mw.CreateFormFile("test", "test.txt") hs := newServer()
if err != nil { rr := httptest.NewRecorder()
t.Fatalf("Unable to create form file: %s", err) buf := &bytes.Buffer{}
} mw := multipart.NewWriter(buf)
expectedData := "Test OMEGALUL PLS." fw, err := mw.CreateFormFile("test", "test.txt")
if _, err := io.WriteString(fw, expectedData); err != nil { if err != nil {
t.Fatalf("Unable to write body to buffer: %s", err) t.Fatalf("Unable to create form file: %s", err)
} }
mw.Close() expectedData := "Test OMEGALUL PLS."
if _, err := io.WriteString(fw, expectedData); err != nil {
t.Fatalf("Unable to write body to buffer: %s", err)
}
mw.Close()
req := httptest.NewRequest(http.MethodPost, "/api/file", buf) req := httptest.NewRequest(http.MethodPost, "/api/file?max_views=99", buf)
req.Header.Add("Content-Type", mw.FormDataContentType()) req.Header.Add("Content-Type", mw.FormDataContentType())
hs.Handler.ServeHTTP(rr, req) hs.Handler.ServeHTTP(rr, req)
if status := rr.Code; status != http.StatusAccepted { if status := rr.Code; status != http.StatusAccepted {
t.Errorf("Returned unexpected status. Got %d want %d", status, http.StatusAccepted) t.Errorf("Returned unexpected status. Got %d want %d", status, http.StatusAccepted)
} }
var expectedResp []struct { var expectedResp []struct {
Message string `json:"message"` Message string `json:"message"`
ID string `json:"id"` ID string `json:"id"`
URL string `json:"url"` URL string `json:"url"`
} }
decoder := json.NewDecoder(rr.Result().Body) decoder := json.NewDecoder(rr.Result().Body)
if err := decoder.Decode(&expectedResp); err != nil { if err := decoder.Decode(&expectedResp); err != nil {
t.Fatalf("error decoding response: %s", err) t.Fatalf("error decoding response: %s", err)
} }
if l := len(expectedResp); l != 1 { if l := len(expectedResp); l != 1 {
t.Errorf("Response has wrong length. Got %d want %d", l, 1) t.Errorf("Response has wrong length. Got %d want %d", l, 1)
} }
uploadID := expectedResp[0].ID uploadID := expectedResp[0].ID
if uploadID == "" { if uploadID == "" {
t.Errorf("Response has empty id") t.Errorf("Response has empty id")
} }
retrieved, err := hs.Files.Get(uploadID)
if err != nil {
t.Errorf("Error retrieving file: %s", err)
}
defer retrieved.Body.Close()
retBuf := new(bytes.Buffer)
io.Copy(retBuf, retrieved.Body)
if diff := cmp.Diff(retBuf.String(), expectedData); diff != "" {
t.Errorf("Retrieved file mismatch: %s", diff)
}
if retrieved.MaxViews != 99 {
t.Errorf("Uploaded file has wrong max_views: %d", retrieved.MaxViews)
}
})
// GET /api/file/id
t.Run("GET", func(t *testing.T) {
hs := newServer()
fileData := "abc123456"
sr := io.NopCloser(strings.NewReader(fileData))
file := &files.File{
ID: uuid.NewString(),
OriginalFilename: "test-file.txt",
MaxViews: 99,
ExpiresOn: time.Now().Add(90 * time.Second),
Body: sr,
}
hs.Files.Store(file)
rr := httptest.NewRecorder()
url := fmt.Sprintf("/api/file/%s", file.ID)
req := httptest.NewRequest(http.MethodGet, url, nil)
hs.Handler.ServeHTTP(rr, req)
if status := rr.Code; status != http.StatusOK {
t.Errorf("Returned unexpected status. Got %d want %d", status, http.StatusAccepted)
t.Logf(url)
}
if diff := cmp.Diff(rr.Body.String(), fileData); diff != "" {
t.Errorf("Returned body does not match expected: %s", diff)
}
})
// DELETE /api/file/id
t.Run("DELETE", func(t *testing.T) {
hs := newServer()
fileBody := io.NopCloser(strings.NewReader("roflcopter"))
file := &files.File{
ID: uuid.NewString(),
OriginalFilename: "testpls.txt",
MaxViews: 9,
ExpiresOn: time.Now().Add(10 * time.Hour),
Body: fileBody,
}
if err := hs.Files.Store(file); err != nil {
t.Fatalf("Error storing file: %s", err)
}
rr := httptest.NewRecorder()
url := fmt.Sprintf("/api/file/%s", file.ID)
req := httptest.NewRequest(http.MethodDelete, url, nil)
hs.Handler.ServeHTTP(rr, req)
if rr.Result().StatusCode != http.StatusOK {
t.Fatalf("Delete returned wrong status: %s", rr.Result().Status)
}
if _, err := hs.Files.Get(file.ID); err == nil {
t.Errorf("Getting after delete returned no error")
}
})
})
// /api/user
t.Run("user", func(t *testing.T) {
t.Run("POST", func(t *testing.T) {
hs := newServer()
adminPw := "admin"
admin := &users.User{
Username: "admin",
Role: users.RoleAdmin,
}
_ = admin.SetPassword(adminPw)
_ = hs.Users.Store(admin)
token, err := hs.Auth.Login(admin.Username, adminPw)
if err != nil {
t.Fatalf("error getting admin token: %s", err)
}
requestData := &api.RequestAPIUserCreate{
Username: "test",
Password: "test",
}
body := new(bytes.Buffer)
encoder := json.NewEncoder(body)
if err := encoder.Encode(requestData); err != nil {
t.Fatalf("Error encoding data: %s", err)
}
rr := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/user", body)
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", token))
hs.Handler.ServeHTTP(rr, req)
if rr.Result().StatusCode != http.StatusAccepted {
t.Fatalf("Create returned wrong status: %s", rr.Result().Status)
}
user, err := hs.Users.Get(requestData.Username)
if err != nil {
t.Fatalf("Unable to get user after create: %s", err)
}
expectedUser := &users.User{
Username: requestData.Username,
Role: users.RoleUser,
}
ignorePW := cmp.FilterPath(func(p cmp.Path) bool {
return p.String() == "HashedPassword"
}, cmp.Ignore())
if diff := cmp.Diff(user, expectedUser, ignorePW); diff != "" {
t.Errorf("User does not match expected: %s", diff)
}
})
})
// /api/login
t.Run("Login", func(t *testing.T) {
hs := newServer()
// TODO: Add test
username := "admin"
password := "admin"
user := &users.User{Username: username}
if err := user.SetPassword(password); err != nil {
t.Fatalf("Error setting user password: %s", err)
}
if err := hs.Users.Store(user); err != nil {
t.Fatalf("Error storing user: %s", err)
}
requestData := struct {
Username string `json:"username"`
Password string `json:"password"`
}{
Username: username,
Password: password,
}
body := new(bytes.Buffer)
encoder := json.NewEncoder(body)
if err := encoder.Encode(&requestData); err != nil {
t.Fatalf("Error encoding request body: %s", err)
}
t.Run("HandlerAPIFileGet", func(t *testing.T) {
rr := httptest.NewRecorder() rr := httptest.NewRecorder()
url := fmt.Sprintf("/api/file/%s", uploadID) req := httptest.NewRequest(http.MethodPost, "/api/login", body)
req := httptest.NewRequest(http.MethodGet, url, nil)
hs.Handler.ServeHTTP(rr, req) hs.Handler.ServeHTTP(rr, req)
if status := rr.Code; status != http.StatusOK { responseData := struct {
t.Errorf("Returned unexpected status. Got %d want %d", status, http.StatusAccepted) Token string `json:"token"`
t.Logf(url) }{}
decoder := json.NewDecoder(rr.Body)
if err := decoder.Decode(&responseData); err != nil {
t.Fatalf("Error decoding response: %s", err)
} }
if body := rr.Body.String(); body != expectedData {
t.Errorf("Returned body does not match expected.") if _, err := hs.Auth.ValidateToken(responseData.Token); err != nil {
t.Fatalf("Unable to validate received token: %s", err)
} }
}) })
}) })
t.Run("HandlerAPILogin", func(t *testing.T) {
// TODO: Add test
username := "admin"
password := "admin"
user := &users.User{Username: username}
if err := user.SetPassword(password); err != nil {
t.Fatalf("Error setting user password: %s", err)
}
if err := hs.Users.Store(user); err != nil {
t.Fatalf("Error storing user: %s", err)
}
requestData := struct { }
Username string `json:"username"`
Password string `json:"password"` func newServer() *api.HTTPServer {
}{ cfg := &gpaste.ServerConfig{
Username: username, SigningSecret: "abc123",
Password: password, Store: &gpaste.ServerStoreConfig{
} Type: "memory",
},
body := new(bytes.Buffer) URL: "http://localhost:8080",
encoder := json.NewEncoder(body) }
if err := encoder.Encode(&requestData); err != nil { return api.NewHTTPServer(cfg)
t.Fatalf("Error encoding request body: %s", err)
}
rr := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/login", body)
hs.Handler.ServeHTTP(rr, req)
responseData := struct {
Token string `json:"token"`
}{}
decoder := json.NewDecoder(rr.Body)
if err := decoder.Decode(&responseData); err != nil {
t.Fatalf("Error decoding response: %s", err)
}
if _, err := hs.Auth.ValidateToken(responseData.Token); err != nil {
t.Fatalf("Unable to validate received token: %s", err)
}
})
} }

24
api/json.go Normal file
View File

@@ -0,0 +1,24 @@
package api
type RequestAPIUserCreate struct {
Username string `json:"username"`
Password string `json:"password"`
}
type RequestAPILogin struct {
Username string `json:"username"`
Password string `json:"password"`
}
type ResponseAPILogin struct {
Token string `json:"token"`
}
type ResponseAPIFilePost struct {
Message string `json:"message"`
ID string `json:"id"`
URL string `json:"url"`
}
type ResponseAPIUserList struct {
Usernames []string `json:"usernames"`
}

View File

@@ -8,6 +8,7 @@ import (
"time" "time"
"git.t-juice.club/torjus/gpaste" "git.t-juice.club/torjus/gpaste"
"git.t-juice.club/torjus/gpaste/users"
"github.com/go-chi/chi/v5/middleware" "github.com/go-chi/chi/v5/middleware"
) )
@@ -70,7 +71,7 @@ func (s *HTTPServer) MiddlewareAuthentication(next http.Handler) http.Handler {
ctx = context.WithValue(ctx, authCtxAuthLevel, claims.Role) ctx = context.WithValue(ctx, authCtxAuthLevel, claims.Role)
ctx = context.WithValue(ctx, authCtxClaims, claims) ctx = context.WithValue(ctx, authCtxClaims, claims)
withCtx := r.WithContext(ctx) withCtx := r.WithContext(ctx)
s.Logger.Debugw("Request is authenticated.", "req_id", reqID, "username", claims.Subject) s.Logger.Debugw("Request is authenticated.", "req_id", reqID, "username", claims.Subject, "role", claims.Role)
next.ServeHTTP(w, withCtx) next.ServeHTTP(w, withCtx)
} }
@@ -90,14 +91,14 @@ func UsernameFromRequest(r *http.Request) (string, error) {
return username, nil return username, nil
} }
func AuthLevelFromRequest(r *http.Request) (gpaste.AuthLevel, error) { func RoleFromRequest(r *http.Request) (users.Role, error) {
rawLevel := r.Context().Value(authCtxAuthLevel) rawLevel := r.Context().Value(authCtxAuthLevel)
if rawLevel == nil { if rawLevel == nil {
return gpaste.AuthLevelUnset, fmt.Errorf("no username") return users.RoleUnset, fmt.Errorf("no username")
} }
level, ok := rawLevel.(gpaste.AuthLevel) level, ok := rawLevel.(users.Role)
if !ok { if !ok {
return gpaste.AuthLevelUnset, fmt.Errorf("no username") return users.RoleUnset, fmt.Errorf("no username")
} }
return level, nil return level, nil
} }

View File

@@ -9,14 +9,6 @@ import (
"github.com/google/uuid" "github.com/google/uuid"
) )
type AuthLevel int
const (
AuthLevelUnset AuthLevel = iota
AuthLevelUser
AuthLevelAdmin
)
type AuthService struct { type AuthService struct {
users users.UserStore users users.UserStore
hmacSecret []byte hmacSecret []byte

226
client/client.go Normal file
View File

@@ -0,0 +1,226 @@
package client
import (
"bytes"
"context"
"encoding/json"
"fmt"
"io"
"mime/multipart"
"net/http"
"os"
"path/filepath"
"time"
"git.t-juice.club/torjus/gpaste/api"
"git.t-juice.club/torjus/gpaste/files"
"github.com/google/uuid"
"github.com/kirsle/configdir"
)
type Client struct {
BaseURL string `json:"base_url"`
AuthToken string `json:"auth_token"`
httpClient http.Client
}
func (c *Client) WriteConfigToWriter(w io.Writer) error {
encoder := json.NewEncoder(w)
return encoder.Encode(c)
}
func (c *Client) WriteConfig() error {
dir := configdir.LocalConfig("gpaste")
// Ensure dir exists
err := os.MkdirAll(dir, os.ModePerm)
if err != nil {
return err
}
path := filepath.Join(dir, "client.json")
f, err := os.Create(path)
if err != nil {
return err
}
defer f.Close()
return c.WriteConfigToWriter(f)
}
func (c *Client) LoadConfig() error {
dir := configdir.LocalCache("gpaste")
path := filepath.Join(dir, "client.json")
f, err := os.Open(path)
if err != nil {
return err
}
defer f.Close()
return c.LoadConfigFromReader(f)
}
func (c *Client) LoadConfigFromReader(r io.Reader) error {
decoder := json.NewDecoder(r)
return decoder.Decode(c)
}
func (c *Client) Login(ctx context.Context, username, password string) error {
url := fmt.Sprintf("%s/api/login", c.BaseURL)
// TODO: Change timeout
ctx, cancel := context.WithTimeout(ctx, 10*time.Second)
defer cancel()
body := new(bytes.Buffer)
requestData := api.RequestAPILogin{
Username: username,
Password: password,
}
encoder := json.NewEncoder(body)
if err := encoder.Encode(&requestData); err != nil {
return fmt.Errorf("error encoding response: %w", err)
}
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, body)
if err != nil {
return fmt.Errorf("error creating request: %w", err)
}
resp, err := c.httpClient.Do(req)
if err != nil {
return fmt.Errorf("unable to perform request: %s", err)
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return fmt.Errorf("got non-ok response from server: %s", resp.Status)
}
var responseData api.ResponseAPILogin
decoder := json.NewDecoder(resp.Body)
if err := decoder.Decode(&responseData); err != nil {
return fmt.Errorf("unable to parse response: %s", err)
}
c.AuthToken = responseData.Token
return nil
}
func (c *Client) UserCreate(ctx context.Context, username, password string) error {
url := fmt.Sprintf("%s/api/user", c.BaseURL)
body := new(bytes.Buffer)
requestData := &api.RequestAPIUserCreate{
Username: username,
Password: password,
}
encoder := json.NewEncoder(body)
if err := encoder.Encode(requestData); err != nil {
return fmt.Errorf("error encoding response: %w", err)
}
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, body)
if err != nil {
return fmt.Errorf("error creating request: %w", err)
}
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", c.AuthToken))
resp, err := c.httpClient.Do(req)
if err != nil {
return fmt.Errorf("unable to perform request: %s", err)
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusAccepted {
return fmt.Errorf("got non-ok response from server: %s", resp.Status)
}
return nil
}
func (c *Client) Download(ctx context.Context, id string) (io.ReadCloser, error) {
url := fmt.Sprintf("%s/api/file/%s", c.BaseURL, id)
req, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil)
if err != nil {
return nil, fmt.Errorf("error creating request: %w", err)
}
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", c.AuthToken))
resp, err := c.httpClient.Do(req)
if err != nil {
return nil, fmt.Errorf("unable to perform request: %s", err)
}
if resp.StatusCode != http.StatusOK {
return nil, fmt.Errorf("got non-ok response from server: %s", resp.Status)
}
return resp.Body, nil
}
func (c *Client) Upload(ctx context.Context, files ...*files.File) ([]api.ResponseAPIFilePost, error) {
url := fmt.Sprintf("%s/api/file", c.BaseURL)
client := &http.Client{}
// TODO: Change timeout
ctx, cancel := context.WithTimeout(ctx, 10*time.Minute)
defer cancel()
// TODO: Improve buffering
buf := &bytes.Buffer{}
mw := multipart.NewWriter(buf)
for _, file := range files {
fw, err := mw.CreateFormFile(uuid.Must(uuid.NewRandom()).String(), file.OriginalFilename)
if err != nil {
return nil, err
}
if _, err := io.Copy(fw, file.Body); err != nil {
return nil, err
}
file.Body.Close()
}
mw.Close()
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, buf)
if err != nil {
return nil, err
}
req.Header.Add("Content-Type", mw.FormDataContentType())
resp, err := client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
var expectedResp []api.ResponseAPIFilePost
decoder := json.NewDecoder(resp.Body)
if err := decoder.Decode(&expectedResp); err != nil {
return nil, fmt.Errorf("error decoding response: %w", err)
}
return expectedResp, nil
}
func (c *Client) Delete(ctx context.Context, id string) error {
url := fmt.Sprintf("%s/api/file/%s", c.BaseURL, id)
req, err := http.NewRequestWithContext(ctx, http.MethodDelete, url, nil)
if err != nil {
return fmt.Errorf("error creating request: %w", err)
}
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", c.AuthToken))
resp, err := c.httpClient.Do(req)
if err != nil {
return fmt.Errorf("unable to perform request: %s", err)
}
if resp.StatusCode != http.StatusOK {
return fmt.Errorf("got non-ok response from server: %s", resp.Status)
}
return nil
}

194
client/client_test.go Normal file
View File

@@ -0,0 +1,194 @@
package client_test
import (
"bytes"
"context"
"fmt"
"io"
"net"
"strings"
"testing"
"time"
"git.t-juice.club/torjus/gpaste"
"git.t-juice.club/torjus/gpaste/api"
"git.t-juice.club/torjus/gpaste/client"
"git.t-juice.club/torjus/gpaste/files"
"git.t-juice.club/torjus/gpaste/users"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"github.com/google/uuid"
)
func TestClient(t *testing.T) {
listener, err := net.Listen("tcp", ":0")
if err != nil {
panic(err)
}
port := listener.Addr().(*net.TCPAddr).Port
cfg := &gpaste.ServerConfig{
LogLevel: "ERROR",
URL: fmt.Sprintf("http://localhost:%d", port),
SigningSecret: "TEST",
Store: &gpaste.ServerStoreConfig{Type: "memory"},
}
srv := api.NewHTTPServer(cfg)
go func() {
srv.Serve(listener)
}()
t.Cleanup(func() {
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel()
srv.Shutdown(ctx)
listener.Close()
})
// Add users
username := "admin"
password := "admin"
user := &users.User{
Username: username,
Role: users.RoleAdmin,
}
if err := user.SetPassword(password); err != nil {
t.Fatalf("Error setting password: %s", err)
}
if err := srv.Users.Store(user); err != nil {
t.Fatalf("Error storing user: %s", err)
}
t.Run("Login", func(t *testing.T) {
client := client.Client{BaseURL: cfg.URL}
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
if err := client.Login(ctx, username, password); err != nil {
t.Fatalf("Error logging in: %s", err)
}
claims, err := srv.Auth.ValidateToken(client.AuthToken)
if err != nil {
t.Errorf("unable to get claims from token: %s", err)
}
if claims.Role != user.Role {
t.Errorf("Claims have wrong role: %s", cmp.Diff(claims.Role, user.Role))
}
if claims.Subject != username {
t.Errorf("Claims have wrong role: %s", cmp.Diff(claims.Subject, username))
}
t.Run("UserCreate", func(t *testing.T) {
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
username := "user"
password := "user"
if err := client.UserCreate(ctx, username, password); err != nil {
t.Fatalf("Error creating user: %s", err)
}
user, err := srv.Users.Get(username)
if err != nil {
t.Fatalf("Error getting new user: %s", err)
}
if user.Username != username {
t.Errorf("Username does not match.")
}
if err := user.ValidatePassword(password); err != nil {
t.Errorf("Unable to validate password: %s", err)
}
})
})
t.Run("Upload", func(t *testing.T) {
client := client.Client{BaseURL: cfg.URL}
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
fileContents := "this is the test file"
fileBody := io.NopCloser(strings.NewReader(fileContents))
file := &files.File{
OriginalFilename: "filename.txt",
Body: fileBody,
}
resp, err := client.Upload(ctx, file)
if err != nil {
t.Fatalf("Error uploading: %s", err)
}
retrieved, err := srv.Files.Get(resp[0].ID)
if err != nil {
t.Fatalf("Error getting uploaded file from store: %s", err)
}
defer retrieved.Body.Close()
buf := new(strings.Builder)
if _, err := io.Copy(buf, retrieved.Body); err != nil {
t.Fatalf("error reading body from store: %s", err)
}
if buf.String() != fileContents {
t.Errorf("File contents does not match: %s", cmp.Diff(buf.String(), fileContents))
}
})
t.Run("Download", func(t *testing.T) {
client := client.Client{BaseURL: cfg.URL}
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
fileContents := "this is the test file"
fileBody := io.NopCloser(strings.NewReader(fileContents))
file := &files.File{
ID: uuid.NewString(),
OriginalFilename: "filename.txt",
Body: fileBody,
}
if err := srv.Files.Store(file); err != nil {
t.Fatalf("Error putting file in store: %s", err)
}
body, err := client.Download(ctx, file.ID)
if err != nil {
t.Fatalf("Error uploading: %s", err)
}
defer body.Close()
buf := new(strings.Builder)
if _, err := io.Copy(buf, body); err != nil {
t.Fatalf("error reading body from store: %s", err)
}
if buf.String() != fileContents {
t.Errorf("File contents does not match: %s", cmp.Diff(buf.String(), fileContents))
}
})
t.Run("Save", func(t *testing.T) {
c := client.Client{BaseURL: "http://example.org/gpaste", AuthToken: "tokenpls"}
expectedConfig := "{\"base_url\":\"http://example.org/gpaste\",\"auth_token\":\"tokenpls\"}\n"
buf := new(bytes.Buffer)
err := c.WriteConfigToWriter(buf)
if err != nil {
t.Fatalf("Error writing config: %s", err)
}
if diff := cmp.Diff(buf.String(), expectedConfig); diff != "" {
t.Errorf("Written config does not match expected: %s", diff)
}
})
t.Run("Load", func(t *testing.T) {
c := client.Client{}
config := "{\"base_url\":\"http://pasta.example.org\",\"auth_token\":\"tokenpls\"}\n"
expectedClient := client.Client{BaseURL: "http://pasta.example.org", AuthToken: "tokenpls"}
sr := strings.NewReader(config)
if err := c.LoadConfigFromReader(sr); err != nil {
t.Fatalf("Error reading config: %s", err)
}
if diff := cmp.Diff(c, expectedClient, cmpopts.IgnoreUnexported(client.Client{})); diff != "" {
t.Errorf("Client does not match expected: %s", diff)
}
})
}

View File

@@ -1,74 +1,56 @@
package actions package actions
import ( import (
"bytes" "bufio"
"context" "context"
"encoding/json"
"fmt" "fmt"
"io"
"mime/multipart"
"net/http"
"os" "os"
"strings" "strings"
"syscall" "syscall"
"time" "time"
"git.t-juice.club/torjus/gpaste/api" "git.t-juice.club/torjus/gpaste/client"
"github.com/google/uuid" "git.t-juice.club/torjus/gpaste/files"
"github.com/urfave/cli/v2" "github.com/urfave/cli/v2"
"golang.org/x/term" "golang.org/x/term"
) )
func ActionUpload(c *cli.Context) error { func ActionUpload(c *cli.Context) error {
url := fmt.Sprintf("%s/api/file", c.String("url")) clnt := client.Client{
client := &http.Client{} BaseURL: c.String("url"),
// TODO: Change timeout }
ctx, cancel := context.WithTimeout(c.Context, 10*time.Minute)
defer cancel()
buf := &bytes.Buffer{}
mw := multipart.NewWriter(buf)
for _, arg := range c.Args().Slice() { for _, arg := range c.Args().Slice() {
f, err := os.Open(arg) f, err := os.Open(arg)
if err != nil { if err != nil {
return err return err
} }
defer f.Close() defer f.Close()
fw, err := mw.CreateFormFile(uuid.Must(uuid.NewRandom()).String(), arg) file := &files.File{
OriginalFilename: arg,
Body: f,
}
resp, err := clnt.Upload(c.Context, file)
if err != nil { if err != nil {
return err errmsg := fmt.Sprintf("Error uploading file: %s", err)
return cli.Exit(errmsg, 1)
} }
if _, err := io.Copy(fw, f); err != nil { fmt.Printf("Uploaded file %s - %s", file.OriginalFilename, resp[0].URL)
return err }
return nil
}
func ActionDelete(c *cli.Context) error {
clnt := client.Client{
BaseURL: c.String("url"),
}
for _, arg := range c.Args().Slice() {
ctx, cancel := context.WithTimeout(c.Context, 5*time.Second)
defer cancel()
if err := clnt.Delete(ctx, arg); err != nil {
fmt.Printf("Error deleting file %s\n", arg)
fmt.Printf("%s\n", err)
} }
} fmt.Printf("Deleted %s\n", arg)
mw.Close()
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, buf)
if err != nil {
return err
}
req.Header.Add("Content-Type", mw.FormDataContentType())
resp, err := client.Do(req)
if err != nil {
return err
}
defer resp.Body.Close()
var expectedResp []struct {
Message string `json:"message"`
ID string `json:"id"`
URL string `json:"url"`
}
decoder := json.NewDecoder(resp.Body)
if err := decoder.Decode(&expectedResp); err != nil {
return fmt.Errorf("error decoding response: %w", err)
}
for _, r := range expectedResp {
fmt.Printf("Uploaded file %s\n", r.ID)
} }
return nil return nil
} }
@@ -83,92 +65,53 @@ func ActionLogin(c *cli.Context) error {
return fmt.Errorf("error reading password: %w", err) return fmt.Errorf("error reading password: %w", err)
} }
url := fmt.Sprintf("%s/api/login", c.String("url")) clnt := client.Client{
client := &http.Client{} BaseURL: c.String("url"),
// TODO: Change timeout
ctx, cancel := context.WithTimeout(c.Context, 10*time.Second)
defer cancel()
body := new(bytes.Buffer)
requestData := struct {
Username string `json:"username"`
Password string `json:"password"`
}{
Username: username,
Password: password,
} }
encoder := json.NewEncoder(body) if err := clnt.Login(c.Context, username, password); err != nil {
if err := encoder.Encode(&requestData); err != nil { errmsg := fmt.Sprintf("Error logging in: %s", err)
return fmt.Errorf("error encoding response: %w", err) return cli.Exit(errmsg, 1)
} }
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, body) if err := clnt.WriteConfig(); err != nil {
if err != nil { errMsg := fmt.Sprintf("Failed to write config: %s", err)
return fmt.Errorf("error creating request: %w", err) return cli.Exit(errMsg, 1)
} }
// TODO: Store this somewhere, so we don't need to log in each time
resp, err := client.Do(req) fmt.Println("Successfully logged in.")
if err != nil {
return fmt.Errorf("unable to perform request: %s", err)
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return cli.Exit("got non-ok response from server", 0)
}
responseData := struct {
Token string `json:"token"`
}{}
decoder := json.NewDecoder(resp.Body)
if err := decoder.Decode(&responseData); err != nil {
return fmt.Errorf("unable to parse response: %s", err)
}
fmt.Printf("Token: %s", responseData.Token)
return nil return nil
} }
func ActionUserCreate(c *cli.Context) error { func ActionUserCreate(c *cli.Context) error {
// TODO: Needs to supply auth token to actually work // TODO: Needs to supply auth token to actually work
username := c.Args().First() fmt.Println("Need to be logged in to create user")
if username == "" { username := readString("Enter username: ")
return cli.Exit("USERNAME not supplied.", 1)
}
password, err := readPassword() password, err := readPassword()
if err != nil { if err != nil {
return fmt.Errorf("error reading password: %w", err) return fmt.Errorf("error reading password: %w", err)
} }
url := fmt.Sprintf("%s/api/user", c.String("url")) clnt := client.Client{
client := &http.Client{} BaseURL: c.String("url"),
// TODO: Change timeout }
ctx, cancel := context.WithTimeout(c.Context, 10*time.Second) ctx, cancel := context.WithTimeout(c.Context, 10*time.Second)
defer cancel() defer cancel()
body := new(bytes.Buffer) if err := clnt.Login(ctx, username, password); err != nil {
requestData := &api.RequestAPIUserCreate{ errmsg := fmt.Sprintf("Error logging in: %s", err)
Username: username, return cli.Exit(errmsg, 1)
Password: password,
}
encoder := json.NewEncoder(body)
if err := encoder.Encode(requestData); err != nil {
return fmt.Errorf("error encoding response: %w", err)
}
req, err := http.NewRequestWithContext(ctx, http.MethodPost, url, body)
if err != nil {
return fmt.Errorf("error creating request: %w", err)
} }
resp, err := client.Do(req) fmt.Println("User to create:")
username = readString("Enter username: ")
password, err = readPassword()
if err != nil { if err != nil {
return fmt.Errorf("unable to perform request: %s", err) return fmt.Errorf("error reading password: %w", err)
} }
defer resp.Body.Close()
if resp.StatusCode != http.StatusAccepted { if err := clnt.UserCreate(ctx, username, password); err != nil {
return cli.Exit("got non-ok response from server", 0) errmsg := fmt.Sprintf("Error creating user: %s", err)
return cli.Exit(errmsg, 1)
} }
fmt.Printf("Created user %s\n", username) fmt.Printf("Created user %s\n", username)
@@ -186,3 +129,12 @@ func readPassword() (string, error) {
password := string(bytePassword) password := string(bytePassword)
return strings.TrimSpace(password), nil return strings.TrimSpace(password), nil
} }
func readString(prompt string) string {
fmt.Print(prompt)
scanner := bufio.NewScanner(os.Stdin)
for scanner.Scan() {
return scanner.Text()
}
return ""
}

View File

@@ -37,6 +37,12 @@ func main() {
ArgsUsage: "FILE [FILE]...", ArgsUsage: "FILE [FILE]...",
Action: actions.ActionUpload, Action: actions.ActionUpload,
}, },
{
Name: "delete",
Usage: "Delete file(s)",
ArgsUsage: "FILE [FILE]...",
Action: actions.ActionDelete,
},
{ {
Name: "login", Name: "login",
Usage: "Login to gpaste server", Usage: "Login to gpaste server",

View File

@@ -2,6 +2,7 @@ package actions
import ( import (
"context" "context"
"io"
"net/http" "net/http"
"os" "os"
"os/signal" "os/signal"
@@ -21,14 +22,27 @@ func ActionServe(c *cli.Context) error {
configPath = c.String("config") configPath = c.String("config")
} }
f, err := os.Open(configPath) var cfg *gpaste.ServerConfig
var r io.ReadCloser
r, err := os.Open(configPath)
if err != nil { if err != nil {
return cli.Exit(err, 1) cfg = &gpaste.ServerConfig{
} LogLevel: "INFO",
defer f.Close() URL: "localhost:8080",
cfg, err := gpaste.ServerConfigFromReader(f) ListenAddr: ":8080",
if err != nil { SigningSecret: "TODO: CHANGE THIS LOL",
return cli.Exit(err, 1) Store: &gpaste.ServerStoreConfig{
Type: "memory",
},
}
} else {
defer r.Close()
cfg, err = gpaste.ServerConfigFromReader(r)
if err != nil {
if err != nil {
return cli.Exit(err, 1)
}
}
} }
// Setup loggers // Setup loggers
rootLogger := getRootLogger(cfg.LogLevel) rootLogger := getRootLogger(cfg.LogLevel)

View File

@@ -12,6 +12,8 @@ type File struct {
ExpiresOn time.Time `json:"expires_on"` ExpiresOn time.Time `json:"expires_on"`
Body io.ReadCloser Body io.ReadCloser
FileSize int64 `json:"file_size"`
} }
type FileStore interface { type FileStore interface {

View File

@@ -40,10 +40,12 @@ func (s *FSFileStore) Store(f *File) error {
} }
defer dst.Close() defer dst.Close()
if _, err := io.Copy(dst, f.Body); err != nil { n, err := io.Copy(dst, f.Body)
if err != nil {
return err return err
} }
s.metadata[f.ID] = metadata s.metadata[f.ID] = metadata
s.metadata[f.ID].FileSize = n
if err := s.writeMetadata(); err != nil { if err := s.writeMetadata(); err != nil {
delete(s.metadata, f.ID) delete(s.metadata, f.ID)
return err return err

View File

@@ -14,6 +14,7 @@ type fileData struct {
MaxViews uint MaxViews uint
ExpiresOn time.Time ExpiresOn time.Time
FileSize int64
} }
type MemoryFileStore struct { type MemoryFileStore struct {
@@ -35,9 +36,11 @@ func (s *MemoryFileStore) Store(f *File) error {
ExpiresOn: f.ExpiresOn, ExpiresOn: f.ExpiresOn,
} }
_, err := io.Copy(&data.Body, f.Body) n, err := io.Copy(&data.Body, f.Body)
_ = f.Body.Close() _ = f.Body.Close()
data.FileSize = n
s.lock.Lock() s.lock.Lock()
defer s.lock.Unlock() defer s.lock.Unlock()
@@ -58,6 +61,7 @@ func (s *MemoryFileStore) Get(id string) (*File, error) {
MaxViews: fd.MaxViews, MaxViews: fd.MaxViews,
ExpiresOn: fd.ExpiresOn, ExpiresOn: fd.ExpiresOn,
Body: io.NopCloser(&fd.Body), Body: io.NopCloser(&fd.Body),
FileSize: fd.FileSize,
} }
return f, nil return f, nil

View File

@@ -21,9 +21,10 @@ func RunFilestoreTest(s files.FileStore, t *testing.T) {
bodyBuf.Write([]byte(dataString)) bodyBuf.Write([]byte(dataString))
body := io.NopCloser(bodyBuf) body := io.NopCloser(bodyBuf)
f := &files.File{ f := &files.File{
ID: id, ID: id,
MaxViews: 0, MaxViews: 99,
Body: body, Body: body,
ExpiresOn: time.Now().Add(99 * time.Second),
} }
err := s.Store(f) err := s.Store(f)
@@ -50,6 +51,17 @@ func RunFilestoreTest(s files.FileStore, t *testing.T) {
if retrievedBuf.String() != dataString { if retrievedBuf.String() != dataString {
t.Fatalf("Data from retrieved body mismatch. Got %s want %s", retrievedBuf.String(), dataString) t.Fatalf("Data from retrieved body mismatch. Got %s want %s", retrievedBuf.String(), dataString)
} }
expected := &files.File{
ID: f.ID,
MaxViews: f.MaxViews,
ExpiresOn: f.ExpiresOn,
FileSize: int64(len(dataString)),
}
ignoreBody := cmp.FilterPath(func(p cmp.Path) bool { return p.String() == "Body" }, cmp.Ignore())
if diff := cmp.Diff(retrieved, expected, ignoreBody); diff != "" {
t.Errorf("File comparison failed: %s", diff)
}
// List // List
ids, err := s.List() ids, err := s.List()
@@ -92,6 +104,7 @@ func RunPersistentFilestoreTest(newStoreFunc func() files.FileStore, t *testing.
MaxViews: 5, MaxViews: 5,
ExpiresOn: time.Now().Add(10 * time.Minute), ExpiresOn: time.Now().Add(10 * time.Minute),
Body: io.NopCloser(strings.NewReader("cocks!")), Body: io.NopCloser(strings.NewReader("cocks!")),
FileSize: 6,
}, },
ExpectedData: "cocks!", ExpectedData: "cocks!",
}, },
@@ -102,6 +115,7 @@ func RunPersistentFilestoreTest(newStoreFunc func() files.FileStore, t *testing.
MaxViews: 5, MaxViews: 5,
ExpiresOn: time.Now().Add(10 * time.Minute), ExpiresOn: time.Now().Add(10 * time.Minute),
Body: io.NopCloser(strings.NewReader("derps!")), Body: io.NopCloser(strings.NewReader("derps!")),
FileSize: 6,
}, },
ExpectedData: "derps!", ExpectedData: "derps!",
}, },

2
go.mod
View File

@@ -9,6 +9,7 @@ require github.com/go-chi/chi/v5 v5.0.7
require ( require (
github.com/golang-jwt/jwt v3.2.2+incompatible github.com/golang-jwt/jwt v3.2.2+incompatible
github.com/google/go-cmp v0.5.6 github.com/google/go-cmp v0.5.6
github.com/kirsle/configdir v0.0.0-20170128060238-e45d2f54772f
github.com/pelletier/go-toml v1.9.4 github.com/pelletier/go-toml v1.9.4
github.com/urfave/cli/v2 v2.3.0 github.com/urfave/cli/v2 v2.3.0
go.etcd.io/bbolt v1.3.6 go.etcd.io/bbolt v1.3.6
@@ -23,4 +24,5 @@ require (
go.uber.org/atomic v1.9.0 // indirect go.uber.org/atomic v1.9.0 // indirect
go.uber.org/multierr v1.7.0 // indirect go.uber.org/multierr v1.7.0 // indirect
golang.org/x/sys v0.0.0-20220114195835-da31bd327af9 // indirect golang.org/x/sys v0.0.0-20220114195835-da31bd327af9 // indirect
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 // indirect
) )

2
go.sum
View File

@@ -15,6 +15,8 @@ github.com/google/go-cmp v0.5.6 h1:BKbKCqvP6I+rmFHt06ZmyQtvB8xAkWdhFyr0ZUNZcxQ=
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I= github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I=
github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/kirsle/configdir v0.0.0-20170128060238-e45d2f54772f h1:dKccXx7xA56UNqOcFIbuqFjAWPVtP688j5QMgmo6OHU=
github.com/kirsle/configdir v0.0.0-20170128060238-e45d2f54772f/go.mod h1:4rEELDSfUAlBSyUjPG0JnaNGjf13JySHFeRdD/3dLP0=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=

View File

@@ -1,6 +1,10 @@
package users package users
import "golang.org/x/crypto/bcrypt" import (
"fmt"
"golang.org/x/crypto/bcrypt"
)
type Role string type Role string
@@ -16,10 +20,13 @@ type User struct {
Role Role `json:"role"` Role Role `json:"role"`
} }
var ErrNoSuchUser = fmt.Errorf("no such user")
type UserStore interface { type UserStore interface {
Get(username string) (*User, error) Get(username string) (*User, error)
Store(user *User) error Store(user *User) error
Delete(username string) error Delete(username string) error
List() ([]string, error)
} }
func (u *User) ValidatePassword(password string) error { func (u *User) ValidatePassword(password string) error {

View File

@@ -6,6 +6,8 @@ import (
"go.etcd.io/bbolt" "go.etcd.io/bbolt"
) )
var _ UserStore = &BoltUserStore{}
var keyUsers = []byte("users") var keyUsers = []byte("users")
type BoltUserStore struct { type BoltUserStore struct {
@@ -67,3 +69,22 @@ func (s *BoltUserStore) Delete(username string) error {
return bkt.Delete([]byte(username)) return bkt.Delete([]byte(username))
}) })
} }
func (s *BoltUserStore) List() ([]string, error) {
var ids []string
err := s.db.View(func(tx *bbolt.Tx) error {
bkt := tx.Bucket(keyUsers)
c := bkt.Cursor()
for k, _ := c.First(); k != nil; k, _ = c.Next() {
ids = append(ids, string(k))
}
return nil
})
if err != nil {
return nil, err
}
return ids, nil
}

View File

@@ -5,6 +5,8 @@ import (
"sync" "sync"
) )
var _ UserStore = &MemoryUserStore{}
type MemoryUserStore struct { type MemoryUserStore struct {
users map[string]*User users map[string]*User
lock sync.Mutex lock sync.Mutex
@@ -37,3 +39,14 @@ func (s *MemoryUserStore) Delete(username string) error {
delete(s.users, username) delete(s.users, username)
return nil return nil
} }
func (s *MemoryUserStore) List() ([]string, error) {
s.lock.Lock()
defer s.lock.Unlock()
var ids []string
for k := range s.users {
ids = append(ids, k)
}
return ids, nil
}

View File

@@ -47,5 +47,27 @@ func RunUserStoreTest(newFunc func() (func(), users.UserStore), t *testing.T) {
t.Errorf("User mismatch: %s", cmp.Diff(user, userMap[k])) t.Errorf("User mismatch: %s", cmp.Diff(user, userMap[k]))
} }
} }
l, err := s.List()
if err != nil {
t.Fatalf("Error listing users: %s", err)
}
if len(l) != len(userMap) {
t.Errorf("List wrong amount of users.")
}
for _, username := range l {
if err := s.Delete(username); err != nil {
t.Fatalf("Error deleting user: %s", err)
}
}
l, err = s.List()
if err != nil {
t.Fatalf("Error listing after delete: %s", err)
}
if len(l) != 0 {
t.Fatalf("List is not empty after deleting all")
}
}) })
} }