this repo has no description
1package knotserver
2
3import (
4 "context"
5 "fmt"
6 "log/slog"
7 "net/http"
8 "runtime/debug"
9
10 "github.com/go-chi/chi/v5"
11 "tangled.sh/tangled.sh/core/idresolver"
12 "tangled.sh/tangled.sh/core/jetstream"
13 "tangled.sh/tangled.sh/core/knotserver/config"
14 "tangled.sh/tangled.sh/core/knotserver/db"
15 "tangled.sh/tangled.sh/core/knotserver/xrpc"
16 tlog "tangled.sh/tangled.sh/core/log"
17 "tangled.sh/tangled.sh/core/notifier"
18 "tangled.sh/tangled.sh/core/rbac"
19 "tangled.sh/tangled.sh/core/types"
20)
21
22type Handle struct {
23 c *config.Config
24 db *db.DB
25 jc *jetstream.JetstreamClient
26 e *rbac.Enforcer
27 l *slog.Logger
28 n *notifier.Notifier
29 resolver *idresolver.Resolver
30
31 // init is a channel that is closed when the knot has been initailized
32 // i.e. when the first user (knot owner) has been added.
33 init chan struct{}
34 knotInitialized bool
35}
36
37func Setup(ctx context.Context, c *config.Config, db *db.DB, e *rbac.Enforcer, jc *jetstream.JetstreamClient, l *slog.Logger, n *notifier.Notifier) (http.Handler, error) {
38 r := chi.NewRouter()
39
40 h := Handle{
41 c: c,
42 db: db,
43 e: e,
44 l: l,
45 jc: jc,
46 n: n,
47 resolver: idresolver.DefaultResolver(),
48 init: make(chan struct{}),
49 }
50
51 err := e.AddKnot(rbac.ThisServer)
52 if err != nil {
53 return nil, fmt.Errorf("failed to setup enforcer: %w", err)
54 }
55
56 // Check if the knot knows about any Dids;
57 // if it does, it is already initialized and we can repopulate the
58 // Jetstream subscriptions.
59 dids, err := db.GetAllDids()
60 if err != nil {
61 return nil, fmt.Errorf("failed to get all Dids: %w", err)
62 }
63
64 if len(dids) > 0 {
65 h.knotInitialized = true
66 close(h.init)
67 for _, d := range dids {
68 h.jc.AddDid(d)
69 }
70 }
71
72 err = h.jc.StartJetstream(ctx, h.processMessages)
73 if err != nil {
74 return nil, fmt.Errorf("failed to start jetstream: %w", err)
75 }
76
77 r.Get("/", h.Index)
78 r.Get("/capabilities", h.Capabilities)
79 r.Get("/version", h.Version)
80 r.Route("/{did}", func(r chi.Router) {
81 // Repo routes
82 r.Route("/{name}", func(r chi.Router) {
83 r.Route("/collaborator", func(r chi.Router) {
84 r.Use(h.VerifySignature)
85 r.Post("/add", h.AddRepoCollaborator)
86 })
87
88 r.Route("/languages", func(r chi.Router) {
89 r.With(h.VerifySignature)
90 r.Get("/", h.RepoLanguages)
91 r.Get("/{ref}", h.RepoLanguages)
92 })
93
94 r.Get("/", h.RepoIndex)
95 r.Get("/info/refs", h.InfoRefs)
96 r.Post("/git-upload-pack", h.UploadPack)
97 r.Post("/git-receive-pack", h.ReceivePack)
98 r.Get("/compare/{rev1}/{rev2}", h.Compare) // git diff-tree compare of two objects
99
100 r.With(h.VerifySignature).Post("/hidden-ref/{forkRef}/{remoteRef}", h.NewHiddenRef)
101
102 r.Route("/merge", func(r chi.Router) {
103 r.With(h.VerifySignature)
104 r.Post("/", h.Merge)
105 r.Post("/check", h.MergeCheck)
106 })
107
108 r.Route("/tree/{ref}", func(r chi.Router) {
109 r.Get("/", h.RepoIndex)
110 r.Get("/*", h.RepoTree)
111 })
112
113 r.Route("/blob/{ref}", func(r chi.Router) {
114 r.Get("/*", h.Blob)
115 })
116
117 r.Route("/raw/{ref}", func(r chi.Router) {
118 r.Get("/*", h.BlobRaw)
119 })
120
121 r.Get("/log/{ref}", h.Log)
122 r.Get("/archive/{file}", h.Archive)
123 r.Get("/commit/{ref}", h.Diff)
124 r.Get("/tags", h.Tags)
125 r.Route("/branches", func(r chi.Router) {
126 r.Get("/", h.Branches)
127 r.Get("/{branch}", h.Branch)
128 r.Route("/default", func(r chi.Router) {
129 r.Get("/", h.DefaultBranch)
130 r.With(h.VerifySignature).Put("/", h.SetDefaultBranch)
131 })
132 })
133 })
134 })
135
136 // xrpc apis
137 r.Mount("/xrpc", h.XrpcRouter())
138
139 // Create a new repository.
140 r.Route("/repo", func(r chi.Router) {
141 r.Use(h.VerifySignature)
142 r.Delete("/", h.RemoveRepo)
143 r.Route("/fork", func(r chi.Router) {
144 r.Post("/", h.RepoFork)
145 r.Post("/sync/*", h.RepoForkSync)
146 r.Get("/sync/*", h.RepoForkAheadBehind)
147 })
148 })
149
150 r.Route("/member", func(r chi.Router) {
151 r.Use(h.VerifySignature)
152 r.Put("/add", h.AddMember)
153 })
154
155 // Socket that streams git oplogs
156 r.Get("/events", h.Events)
157
158 // Initialize the knot with an owner and public key.
159 r.With(h.VerifySignature).Post("/init", h.Init)
160
161 // Health check. Used for two-way verification with appview.
162 r.With(h.VerifySignature).Get("/health", h.Health)
163
164 // All public keys on the knot.
165 r.Get("/keys", h.Keys)
166
167 return r, nil
168}
169
170func (h *Handle) XrpcRouter() http.Handler {
171 logger := tlog.New("knots")
172
173 serviceAuth := serviceauth.NewServiceAuth(h.l, h.resolver, h.c.Server.Did().String())
174
175 xrpc := &xrpc.Xrpc{
176 Config: h.c,
177 Db: h.db,
178 Ingester: h.jc,
179 Enforcer: h.e,
180 Logger: logger,
181 Notifier: h.n,
182 Resolver: h.resolver,
183 ServiceAuth: serviceAuth,
184 }
185 return xrpc.Router()
186}
187
188// version is set during build time.
189var version string
190
191func (h *Handle) Version(w http.ResponseWriter, r *http.Request) {
192 if version == "" {
193 info, ok := debug.ReadBuildInfo()
194 if !ok {
195 http.Error(w, "failed to read build info", http.StatusInternalServerError)
196 return
197 }
198
199 var modVer string
200 for _, mod := range info.Deps {
201 if mod.Path == "tangled.sh/tangled.sh/knotserver" {
202 version = mod.Version
203 break
204 }
205 }
206
207 if modVer == "" {
208 version = "unknown"
209 }
210 }
211
212 w.Header().Set("Content-Type", "text/plain; charset=utf-8")
213 fmt.Fprintf(w, "knotserver/%s", version)
214}