mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 02:11:53 +00:00
* add support for idmapped mounts to start-sdk * misc fixes * misc fixes * add default to textarea * fix iptables masquerade rule * fix textarea types * more fixes * better logging for rsync * fix tty size * fix wg conf generation for android * disable file mounts on dependencies * mostly there, some styling issues (#3069) * mostly there, some styling issues * fix: address comments (#3070) * fix: address comments * fix: fix * show SSL for any address with secure protocol and ssl added * better sorting and messaging --------- Co-authored-by: Alex Inkin <alexander@inkin.ru> * fixes for nextcloud * allow sidebar navigation during service state traansitions * wip: x-forwarded headers * implement x-forwarded-for proxy * lowercase domain names and fix warning popover bug * fix http2 websockets * fix websocket retry behavior * add arch filters to s9pk pack * use docker for start-cli install * add version range to package signer on registry * fix rcs < 0 * fix user information parsing * refactor service interface getters * disable idmaps * build fixes * update docker login action * streamline build * add start-cli workflow * rename * riscv64gc * fix ui packing * no default features on cli * make cli depend on GIT_HASH * more build fixes * more build fixes * interpolate arch within dockerfile * fix tests * add launch ui to service page plus other small improvements (#3075) * add launch ui to service page plus other small improvements * revert translation disable * add spinner to service list if service is health and loading * chore: some visual tune up * chore: update Taiga UI --------- Co-authored-by: waterplea <alexander@inkin.ru> * fix backups * feat: use arm hosted runners and don't fail when apt package does not exist (#3076) --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> Co-authored-by: Shadowy Super Coder <musashidisciple@proton.me> Co-authored-by: Matt Hill <MattDHill@users.noreply.github.com> Co-authored-by: Alex Inkin <alexander@inkin.ru> Co-authored-by: Remco Ros <remcoros@live.nl>
311 lines
9.7 KiB
Rust
311 lines
9.7 KiB
Rust
use std::net::{Ipv4Addr, SocketAddr};
|
|
use std::ops::Deref;
|
|
use std::path::{Path, PathBuf};
|
|
use std::sync::Arc;
|
|
|
|
use chrono::Utc;
|
|
use clap::Parser;
|
|
use http::HeaderMap;
|
|
use imbl_value::InternedString;
|
|
use patch_db::PatchDb;
|
|
use reqwest::{Client, Proxy};
|
|
use rpc_toolkit::yajrc::RpcError;
|
|
use rpc_toolkit::{CallRemote, Context, Empty, RpcRequest};
|
|
use serde::{Deserialize, Serialize};
|
|
use sqlx::PgPool;
|
|
use tokio::sync::broadcast::Sender;
|
|
use tracing::instrument;
|
|
use ts_rs::TS;
|
|
use url::Url;
|
|
|
|
use crate::context::config::{CONFIG_PATH, ContextConfig};
|
|
use crate::context::{CliContext, RpcContext};
|
|
use crate::middleware::signature::SignatureAuthContext;
|
|
use crate::prelude::*;
|
|
use crate::registry::RegistryDatabase;
|
|
use crate::registry::device_info::{DEVICE_INFO_HEADER, DeviceInfo};
|
|
use crate::registry::migrations::run_migrations;
|
|
use crate::registry::signer::SignerInfo;
|
|
use crate::rpc_continuations::RpcContinuations;
|
|
use crate::sign::AnyVerifyingKey;
|
|
use crate::util::io::append_file;
|
|
|
|
const DEFAULT_REGISTRY_LISTEN: SocketAddr =
|
|
SocketAddr::new(std::net::IpAddr::V4(Ipv4Addr::LOCALHOST), 5959);
|
|
|
|
#[derive(Debug, Clone, Default, Deserialize, Serialize, Parser)]
|
|
#[serde(rename_all = "kebab-case")]
|
|
#[command(rename_all = "kebab-case")]
|
|
pub struct RegistryConfig {
|
|
#[arg(short = 'c', long = "config")]
|
|
pub config: Option<PathBuf>,
|
|
#[arg(short = 'l', long = "listen")]
|
|
pub registry_listen: Option<SocketAddr>,
|
|
#[arg(short = 'H', long = "hostname")]
|
|
pub registry_hostname: Vec<InternedString>,
|
|
#[arg(short = 'p', long = "tor-proxy")]
|
|
pub tor_proxy: Option<Url>,
|
|
#[arg(short = 'd', long = "datadir")]
|
|
pub datadir: Option<PathBuf>,
|
|
#[arg(short = 'u', long = "pg-connection-url")]
|
|
pub pg_connection_url: Option<String>,
|
|
}
|
|
impl ContextConfig for RegistryConfig {
|
|
fn next(&mut self) -> Option<PathBuf> {
|
|
self.config.take()
|
|
}
|
|
fn merge_with(&mut self, mut other: Self) {
|
|
self.registry_listen = self.registry_listen.take().or(other.registry_listen);
|
|
self.registry_hostname.append(&mut other.registry_hostname);
|
|
self.tor_proxy = self.tor_proxy.take().or(other.tor_proxy);
|
|
self.datadir = self.datadir.take().or(other.datadir);
|
|
}
|
|
}
|
|
|
|
impl RegistryConfig {
|
|
pub fn load(mut self) -> Result<Self, Error> {
|
|
let path = self.next();
|
|
self.load_path_rec(path)?;
|
|
self.load_path_rec(Some(CONFIG_PATH))?;
|
|
Ok(self)
|
|
}
|
|
}
|
|
|
|
pub struct RegistryContextSeed {
|
|
pub hostnames: Vec<InternedString>,
|
|
pub listen: SocketAddr,
|
|
pub db: TypedPatchDb<RegistryDatabase>,
|
|
pub datadir: PathBuf,
|
|
pub rpc_continuations: RpcContinuations,
|
|
pub client: Client,
|
|
pub shutdown: Sender<()>,
|
|
pub pool: Option<PgPool>,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
pub struct RegistryContext(Arc<RegistryContextSeed>);
|
|
impl RegistryContext {
|
|
#[instrument(skip_all)]
|
|
pub async fn init(config: &RegistryConfig) -> Result<Self, Error> {
|
|
let (shutdown, _) = tokio::sync::broadcast::channel(1);
|
|
let datadir = config
|
|
.datadir
|
|
.as_deref()
|
|
.unwrap_or_else(|| Path::new("/var/lib/startos"))
|
|
.to_owned();
|
|
if tokio::fs::metadata(&datadir).await.is_err() {
|
|
tokio::fs::create_dir_all(&datadir).await?;
|
|
}
|
|
let db_path = datadir.join("registry.db");
|
|
let db = TypedPatchDb::<RegistryDatabase>::load_or_init(
|
|
PatchDb::open(&db_path).await?,
|
|
|| async { Ok(RegistryDatabase::init()) },
|
|
)
|
|
.await?;
|
|
db.mutate(|db| run_migrations(db)).await.result?;
|
|
let tor_proxy_url = config
|
|
.tor_proxy
|
|
.clone()
|
|
.map(Ok)
|
|
.unwrap_or_else(|| "socks5h://localhost:9050".parse())?;
|
|
let pool: Option<PgPool> = match &config.pg_connection_url {
|
|
Some(url) => match PgPool::connect(url.as_str()).await {
|
|
Ok(pool) => Some(pool),
|
|
Err(_) => None,
|
|
},
|
|
None => None,
|
|
};
|
|
if config.registry_hostname.is_empty() {
|
|
return Err(Error::new(
|
|
eyre!("missing required configuration: registry-hostname"),
|
|
ErrorKind::NotFound,
|
|
));
|
|
}
|
|
Ok(Self(Arc::new(RegistryContextSeed {
|
|
hostnames: config.registry_hostname.clone(),
|
|
listen: config.registry_listen.unwrap_or(DEFAULT_REGISTRY_LISTEN),
|
|
db,
|
|
datadir,
|
|
rpc_continuations: RpcContinuations::new(),
|
|
client: Client::builder()
|
|
.proxy(Proxy::custom(move |url| {
|
|
if url.host_str().map_or(false, |h| h.ends_with(".onion")) {
|
|
Some(tor_proxy_url.clone())
|
|
} else {
|
|
None
|
|
}
|
|
}))
|
|
.build()
|
|
.with_kind(crate::ErrorKind::ParseUrl)?,
|
|
shutdown,
|
|
pool,
|
|
})))
|
|
}
|
|
}
|
|
impl AsRef<RpcContinuations> for RegistryContext {
|
|
fn as_ref(&self) -> &RpcContinuations {
|
|
&self.rpc_continuations
|
|
}
|
|
}
|
|
|
|
impl Context for RegistryContext {}
|
|
impl Deref for RegistryContext {
|
|
type Target = RegistryContextSeed;
|
|
fn deref(&self) -> &Self::Target {
|
|
&*self.0
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Deserialize, Serialize, Parser)]
|
|
pub struct RegistryUrlParams {
|
|
pub registry: Url,
|
|
}
|
|
|
|
impl CallRemote<RegistryContext> for CliContext {
|
|
async fn call_remote(
|
|
&self,
|
|
mut method: &str,
|
|
params: Value,
|
|
_: Empty,
|
|
) -> Result<Value, RpcError> {
|
|
let url = if let Some(url) = self.registry_url.clone() {
|
|
url
|
|
} else if self.registry_hostname.is_some() {
|
|
let mut url: Url = format!(
|
|
"http://{}",
|
|
self.registry_listen.unwrap_or(DEFAULT_REGISTRY_LISTEN)
|
|
)
|
|
.parse()
|
|
.map_err(Error::from)?;
|
|
url.path_segments_mut()
|
|
.map_err(|_| Error::new(eyre!("cannot extend URL path"), ErrorKind::ParseUrl))?
|
|
.push("rpc")
|
|
.push("v0");
|
|
url
|
|
} else {
|
|
return Err(
|
|
Error::new(eyre!("`--registry` required"), ErrorKind::InvalidRequest).into(),
|
|
);
|
|
};
|
|
|
|
method = method.strip_prefix("registry.").unwrap_or(method);
|
|
let sig_context = self
|
|
.registry_hostname
|
|
.clone()
|
|
.or_else(|| url.host().as_ref().map(InternedString::from_display));
|
|
|
|
crate::middleware::signature::call_remote(
|
|
self,
|
|
url,
|
|
HeaderMap::new(),
|
|
sig_context.as_deref(),
|
|
method,
|
|
params,
|
|
)
|
|
.await
|
|
}
|
|
}
|
|
|
|
impl CallRemote<RegistryContext, RegistryUrlParams> for RpcContext {
|
|
async fn call_remote(
|
|
&self,
|
|
mut method: &str,
|
|
params: Value,
|
|
RegistryUrlParams { mut registry }: RegistryUrlParams,
|
|
) -> Result<Value, RpcError> {
|
|
let mut headers = HeaderMap::new();
|
|
headers.insert(
|
|
DEVICE_INFO_HEADER,
|
|
DeviceInfo::load(self).await?.to_header_value(),
|
|
);
|
|
|
|
registry
|
|
.path_segments_mut()
|
|
.map_err(|_| Error::new(eyre!("cannot extend URL path"), ErrorKind::ParseUrl))?
|
|
.push("rpc")
|
|
.push("v0");
|
|
|
|
method = method.strip_prefix("registry.").unwrap_or(method);
|
|
let sig_context = registry.host_str().map(InternedString::from);
|
|
|
|
crate::middleware::signature::call_remote(
|
|
self,
|
|
registry,
|
|
headers,
|
|
sig_context.as_deref(),
|
|
method,
|
|
params,
|
|
)
|
|
.await
|
|
}
|
|
}
|
|
|
|
#[derive(Deserialize)]
|
|
pub struct RegistryAuthMetadata {
|
|
#[serde(default)]
|
|
admin: bool,
|
|
}
|
|
|
|
#[derive(Serialize, Deserialize, TS)]
|
|
pub struct AdminLogRecord {
|
|
pub timestamp: String,
|
|
pub name: String,
|
|
#[ts(type = "{ id: string | number | null; method: string; params: any }")]
|
|
pub request: RpcRequest,
|
|
pub key: AnyVerifyingKey,
|
|
}
|
|
|
|
impl SignatureAuthContext for RegistryContext {
|
|
type Database = RegistryDatabase;
|
|
type AdditionalMetadata = RegistryAuthMetadata;
|
|
type CheckPubkeyRes = Option<(AnyVerifyingKey, SignerInfo)>;
|
|
fn db(&self) -> &TypedPatchDb<Self::Database> {
|
|
&self.db
|
|
}
|
|
async fn sig_context(
|
|
&self,
|
|
) -> impl IntoIterator<Item = Result<impl AsRef<str> + Send, Error>> + Send {
|
|
self.hostnames.iter().map(Ok)
|
|
}
|
|
fn check_pubkey(
|
|
db: &Model<Self::Database>,
|
|
pubkey: Option<&AnyVerifyingKey>,
|
|
metadata: Self::AdditionalMetadata,
|
|
) -> Result<Self::CheckPubkeyRes, Error> {
|
|
if metadata.admin {
|
|
if let Some(pubkey) = pubkey {
|
|
let (guid, admin) = db.as_index().as_signers().get_signer_info(pubkey)?;
|
|
if db.as_admins().de()?.contains(&guid) {
|
|
return Ok(Some((pubkey.clone(), admin)));
|
|
}
|
|
}
|
|
Err(Error::new(eyre!("UNAUTHORIZED"), ErrorKind::Authorization))
|
|
} else {
|
|
Ok(None)
|
|
}
|
|
}
|
|
async fn post_auth_hook(
|
|
&self,
|
|
check_pubkey_res: Self::CheckPubkeyRes,
|
|
request: &RpcRequest,
|
|
) -> Result<(), Error> {
|
|
use tokio::io::AsyncWriteExt;
|
|
if let Some((pubkey, admin)) = check_pubkey_res {
|
|
let mut log = append_file(self.datadir.join("admin.log")).await?;
|
|
log.write_all(
|
|
(serde_json::to_string(&AdminLogRecord {
|
|
timestamp: Utc::now().to_rfc3339(),
|
|
name: admin.name,
|
|
request: request.clone(),
|
|
key: pubkey,
|
|
})
|
|
.with_kind(ErrorKind::Serialization)?
|
|
+ "\n")
|
|
.as_bytes(),
|
|
)
|
|
.await?;
|
|
}
|
|
Ok(())
|
|
}
|
|
}
|