this repo has no description
1package knotserver
2
3import (
4 "context"
5 "fmt"
6 "log/slog"
7 "net/http"
8 "runtime/debug"
9
10 "github.com/go-chi/chi/v5"
11 "tangled.sh/tangled.sh/core/idresolver"
12 "tangled.sh/tangled.sh/core/jetstream"
13 "tangled.sh/tangled.sh/core/knotserver/config"
14 "tangled.sh/tangled.sh/core/knotserver/db"
15 "tangled.sh/tangled.sh/core/knotserver/xrpc"
16 tlog "tangled.sh/tangled.sh/core/log"
17 "tangled.sh/tangled.sh/core/notifier"
18 "tangled.sh/tangled.sh/core/rbac"
19 "tangled.sh/tangled.sh/core/xrpc/serviceauth"
20)
21
22type Handle struct {
23 c *config.Config
24 db *db.DB
25 jc *jetstream.JetstreamClient
26 e *rbac.Enforcer
27 l *slog.Logger
28 n *notifier.Notifier
29 resolver *idresolver.Resolver
30
31 // init is a channel that is closed when the knot has been initailized
32 // i.e. when the first user (knot owner) has been added.
33 init chan struct{}
34 knotInitialized bool
35}
36
37func Setup(ctx context.Context, c *config.Config, db *db.DB, e *rbac.Enforcer, jc *jetstream.JetstreamClient, l *slog.Logger, n *notifier.Notifier) (http.Handler, error) {
38 r := chi.NewRouter()
39
40 h := Handle{
41 c: c,
42 db: db,
43 e: e,
44 l: l,
45 jc: jc,
46 n: n,
47 resolver: idresolver.DefaultResolver(),
48 init: make(chan struct{}),
49 }
50
51 err := e.AddKnot(rbac.ThisServer)
52 if err != nil {
53 return nil, fmt.Errorf("failed to setup enforcer: %w", err)
54 }
55
56 err = h.jc.StartJetstream(ctx, h.processMessages)
57 if err != nil {
58 return nil, fmt.Errorf("failed to start jetstream: %w", err)
59 }
60
61 // Check if the knot knows about any Dids;
62 // if it does, it is already initialized and we can repopulate the
63 // Jetstream subscriptions.
64 dids, err := db.GetAllDids()
65 if err != nil {
66 return nil, fmt.Errorf("failed to get all Dids: %w", err)
67 }
68
69 if len(dids) > 0 {
70 h.knotInitialized = true
71 close(h.init)
72 for _, d := range dids {
73 h.jc.AddDid(d)
74 }
75 }
76
77 r.Get("/", h.Index)
78 r.Get("/capabilities", h.Capabilities)
79 r.Get("/version", h.Version)
80 r.Route("/{did}", func(r chi.Router) {
81 // Repo routes
82 r.Route("/{name}", func(r chi.Router) {
83 r.Route("/collaborator", func(r chi.Router) {
84 r.Use(h.VerifySignature)
85 r.Post("/add", h.AddRepoCollaborator)
86 })
87
88 r.Route("/languages", func(r chi.Router) {
89 r.Get("/", h.RepoLanguages)
90 r.Get("/{ref}", h.RepoLanguages)
91 })
92
93 r.Get("/", h.RepoIndex)
94 r.Get("/info/refs", h.InfoRefs)
95 r.Post("/git-upload-pack", h.UploadPack)
96 r.Post("/git-receive-pack", h.ReceivePack)
97 r.Get("/compare/{rev1}/{rev2}", h.Compare) // git diff-tree compare of two objects
98
99 r.With(h.VerifySignature).Post("/hidden-ref/{forkRef}/{remoteRef}", h.NewHiddenRef)
100
101 r.Route("/merge", func(r chi.Router) {
102 r.With(h.VerifySignature)
103 r.Post("/", h.Merge)
104 r.Post("/check", h.MergeCheck)
105 })
106
107 r.Route("/tree/{ref}", func(r chi.Router) {
108 r.Get("/", h.RepoIndex)
109 r.Get("/*", h.RepoTree)
110 })
111
112 r.Route("/blob/{ref}", func(r chi.Router) {
113 r.Get("/*", h.Blob)
114 })
115
116 r.Route("/raw/{ref}", func(r chi.Router) {
117 r.Get("/*", h.BlobRaw)
118 })
119
120 r.Get("/log/{ref}", h.Log)
121 r.Get("/archive/{file}", h.Archive)
122 r.Get("/commit/{ref}", h.Diff)
123 r.Get("/tags", h.Tags)
124 r.Route("/branches", func(r chi.Router) {
125 r.Get("/", h.Branches)
126 r.Get("/{branch}", h.Branch)
127 r.Route("/default", func(r chi.Router) {
128 r.Get("/", h.DefaultBranch)
129 r.With(h.VerifySignature).Put("/", h.SetDefaultBranch)
130 })
131 })
132 })
133 })
134
135 // xrpc apis
136 r.Mount("/xrpc", h.XrpcRouter())
137
138 // Create a new repository.
139 r.Route("/repo", func(r chi.Router) {
140 r.Use(h.VerifySignature)
141 r.Delete("/", h.RemoveRepo)
142 r.Route("/fork", func(r chi.Router) {
143 r.Post("/", h.RepoFork)
144 r.Post("/sync/{branch}", h.RepoForkSync)
145 r.Get("/sync/{branch}", h.RepoForkAheadBehind)
146 })
147 })
148
149 r.Route("/member", func(r chi.Router) {
150 r.Use(h.VerifySignature)
151 r.Put("/add", h.AddMember)
152 })
153
154 // Socket that streams git oplogs
155 r.Get("/events", h.Events)
156
157 // Initialize the knot with an owner and public key.
158 r.With(h.VerifySignature).Post("/init", h.Init)
159
160 // Health check. Used for two-way verification with appview.
161 r.With(h.VerifySignature).Get("/health", h.Health)
162
163 // All public keys on the knot.
164 r.Get("/keys", h.Keys)
165
166 return r, nil
167}
168
169func (h *Handle) XrpcRouter() http.Handler {
170 logger := tlog.New("knots")
171
172 serviceAuth := serviceauth.NewServiceAuth(h.l, h.resolver, h.c.Server.Did().String())
173
174 xrpc := &xrpc.Xrpc{
175 Config: h.c,
176 Db: h.db,
177 Ingester: h.jc,
178 Enforcer: h.e,
179 Logger: logger,
180 Notifier: h.n,
181 Resolver: h.resolver,
182 ServiceAuth: serviceAuth,
183 }
184 return xrpc.Router()
185}
186
187// version is set during build time.
188var version string
189
190func (h *Handle) Version(w http.ResponseWriter, r *http.Request) {
191 if version == "" {
192 info, ok := debug.ReadBuildInfo()
193 if !ok {
194 http.Error(w, "failed to read build info", http.StatusInternalServerError)
195 return
196 }
197
198 var modVer string
199 for _, mod := range info.Deps {
200 if mod.Path == "tangled.sh/tangled.sh/knotserver" {
201 version = mod.Version
202 break
203 }
204 }
205
206 if modVer == "" {
207 version = "unknown"
208 }
209 }
210
211 w.Header().Set("Content-Type", "text/plain; charset=utf-8")
212 fmt.Fprintf(w, "knotserver/%s", version)
213}