this repo has no description
1package knotserver 2 3import ( 4 "context" 5 "fmt" 6 "log/slog" 7 "net/http" 8 "runtime/debug" 9 10 "github.com/go-chi/chi/v5" 11 "tangled.sh/tangled.sh/core/idresolver" 12 "tangled.sh/tangled.sh/core/jetstream" 13 "tangled.sh/tangled.sh/core/knotserver/config" 14 "tangled.sh/tangled.sh/core/knotserver/db" 15 "tangled.sh/tangled.sh/core/knotserver/xrpc" 16 tlog "tangled.sh/tangled.sh/core/log" 17 "tangled.sh/tangled.sh/core/notifier" 18 "tangled.sh/tangled.sh/core/rbac" 19 "tangled.sh/tangled.sh/core/xrpc/serviceauth" 20) 21 22type Handle struct { 23 c *config.Config 24 db *db.DB 25 jc *jetstream.JetstreamClient 26 e *rbac.Enforcer 27 l *slog.Logger 28 n *notifier.Notifier 29 resolver *idresolver.Resolver 30 31 // init is a channel that is closed when the knot has been initailized 32 // i.e. when the first user (knot owner) has been added. 33 init chan struct{} 34 knotInitialized bool 35} 36 37func Setup(ctx context.Context, c *config.Config, db *db.DB, e *rbac.Enforcer, jc *jetstream.JetstreamClient, l *slog.Logger, n *notifier.Notifier) (http.Handler, error) { 38 r := chi.NewRouter() 39 40 h := Handle{ 41 c: c, 42 db: db, 43 e: e, 44 l: l, 45 jc: jc, 46 n: n, 47 resolver: idresolver.DefaultResolver(), 48 init: make(chan struct{}), 49 } 50 51 err := e.AddKnot(rbac.ThisServer) 52 if err != nil { 53 return nil, fmt.Errorf("failed to setup enforcer: %w", err) 54 } 55 56 err = h.jc.StartJetstream(ctx, h.processMessages) 57 if err != nil { 58 return nil, fmt.Errorf("failed to start jetstream: %w", err) 59 } 60 61 // Check if the knot knows about any Dids; 62 // if it does, it is already initialized and we can repopulate the 63 // Jetstream subscriptions. 64 dids, err := db.GetAllDids() 65 if err != nil { 66 return nil, fmt.Errorf("failed to get all Dids: %w", err) 67 } 68 69 if len(dids) > 0 { 70 h.knotInitialized = true 71 close(h.init) 72 for _, d := range dids { 73 h.jc.AddDid(d) 74 } 75 } 76 77 r.Get("/", h.Index) 78 r.Get("/capabilities", h.Capabilities) 79 r.Get("/version", h.Version) 80 r.Route("/{did}", func(r chi.Router) { 81 // Repo routes 82 r.Route("/{name}", func(r chi.Router) { 83 r.Route("/collaborator", func(r chi.Router) { 84 r.Use(h.VerifySignature) 85 r.Post("/add", h.AddRepoCollaborator) 86 }) 87 88 r.Route("/languages", func(r chi.Router) { 89 r.Get("/", h.RepoLanguages) 90 r.Get("/{ref}", h.RepoLanguages) 91 }) 92 93 r.Get("/", h.RepoIndex) 94 r.Get("/info/refs", h.InfoRefs) 95 r.Post("/git-upload-pack", h.UploadPack) 96 r.Post("/git-receive-pack", h.ReceivePack) 97 r.Get("/compare/{rev1}/{rev2}", h.Compare) // git diff-tree compare of two objects 98 99 r.With(h.VerifySignature).Post("/hidden-ref/{forkRef}/{remoteRef}", h.NewHiddenRef) 100 101 r.Route("/merge", func(r chi.Router) { 102 r.With(h.VerifySignature) 103 r.Post("/", h.Merge) 104 r.Post("/check", h.MergeCheck) 105 }) 106 107 r.Route("/tree/{ref}", func(r chi.Router) { 108 r.Get("/", h.RepoIndex) 109 r.Get("/*", h.RepoTree) 110 }) 111 112 r.Route("/blob/{ref}", func(r chi.Router) { 113 r.Get("/*", h.Blob) 114 }) 115 116 r.Route("/raw/{ref}", func(r chi.Router) { 117 r.Get("/*", h.BlobRaw) 118 }) 119 120 r.Get("/log/{ref}", h.Log) 121 r.Get("/archive/{file}", h.Archive) 122 r.Get("/commit/{ref}", h.Diff) 123 r.Get("/tags", h.Tags) 124 r.Route("/branches", func(r chi.Router) { 125 r.Get("/", h.Branches) 126 r.Get("/{branch}", h.Branch) 127 r.Route("/default", func(r chi.Router) { 128 r.Get("/", h.DefaultBranch) 129 r.With(h.VerifySignature).Put("/", h.SetDefaultBranch) 130 }) 131 }) 132 }) 133 }) 134 135 // xrpc apis 136 r.Mount("/xrpc", h.XrpcRouter()) 137 138 // Create a new repository. 139 r.Route("/repo", func(r chi.Router) { 140 r.Use(h.VerifySignature) 141 r.Delete("/", h.RemoveRepo) 142 r.Route("/fork", func(r chi.Router) { 143 r.Post("/", h.RepoFork) 144 r.Post("/sync/{branch}", h.RepoForkSync) 145 r.Get("/sync/{branch}", h.RepoForkAheadBehind) 146 }) 147 }) 148 149 r.Route("/member", func(r chi.Router) { 150 r.Use(h.VerifySignature) 151 r.Put("/add", h.AddMember) 152 }) 153 154 // Socket that streams git oplogs 155 r.Get("/events", h.Events) 156 157 // Initialize the knot with an owner and public key. 158 r.With(h.VerifySignature).Post("/init", h.Init) 159 160 // Health check. Used for two-way verification with appview. 161 r.With(h.VerifySignature).Get("/health", h.Health) 162 163 // All public keys on the knot. 164 r.Get("/keys", h.Keys) 165 166 return r, nil 167} 168 169func (h *Handle) XrpcRouter() http.Handler { 170 logger := tlog.New("knots") 171 172 serviceAuth := serviceauth.NewServiceAuth(h.l, h.resolver, h.c.Server.Did().String()) 173 174 xrpc := &xrpc.Xrpc{ 175 Config: h.c, 176 Db: h.db, 177 Ingester: h.jc, 178 Enforcer: h.e, 179 Logger: logger, 180 Notifier: h.n, 181 Resolver: h.resolver, 182 ServiceAuth: serviceAuth, 183 } 184 return xrpc.Router() 185} 186 187// version is set during build time. 188var version string 189 190func (h *Handle) Version(w http.ResponseWriter, r *http.Request) { 191 if version == "" { 192 info, ok := debug.ReadBuildInfo() 193 if !ok { 194 http.Error(w, "failed to read build info", http.StatusInternalServerError) 195 return 196 } 197 198 var modVer string 199 for _, mod := range info.Deps { 200 if mod.Path == "tangled.sh/tangled.sh/knotserver" { 201 version = mod.Version 202 break 203 } 204 } 205 206 if modVer == "" { 207 version = "unknown" 208 } 209 } 210 211 w.Header().Set("Content-Type", "text/plain; charset=utf-8") 212 fmt.Fprintf(w, "knotserver/%s", version) 213}