1package knotserver
2
3import (
4 "context"
5 "fmt"
6 "log/slog"
7 "net/http"
8 "runtime/debug"
9
10 "github.com/go-chi/chi/v5"
11 "tangled.sh/tangled.sh/core/jetstream"
12 "tangled.sh/tangled.sh/core/knotserver/config"
13 "tangled.sh/tangled.sh/core/knotserver/db"
14 "tangled.sh/tangled.sh/core/rbac"
15)
16
17const (
18 ThisServer = "thisserver" // resource identifier for rbac enforcement
19)
20
21type Handle struct {
22 c *config.Config
23 db *db.DB
24 jc *jetstream.JetstreamClient
25 e *rbac.Enforcer
26 l *slog.Logger
27
28 // init is a channel that is closed when the knot has been initailized
29 // i.e. when the first user (knot owner) has been added.
30 init chan struct{}
31 knotInitialized bool
32}
33
34func Setup(ctx context.Context, c *config.Config, db *db.DB, e *rbac.Enforcer, jc *jetstream.JetstreamClient, l *slog.Logger) (http.Handler, error) {
35 r := chi.NewRouter()
36
37 h := Handle{
38 c: c,
39 db: db,
40 e: e,
41 l: l,
42 jc: jc,
43 init: make(chan struct{}),
44 }
45
46 err := e.AddDomain(ThisServer)
47 if err != nil {
48 return nil, fmt.Errorf("failed to setup enforcer: %w", err)
49 }
50
51 err = h.jc.StartJetstream(ctx, h.processMessages)
52 if err != nil {
53 return nil, fmt.Errorf("failed to start jetstream: %w", err)
54 }
55
56 // Check if the knot knows about any Dids;
57 // if it does, it is already initialized and we can repopulate the
58 // Jetstream subscriptions.
59 dids, err := db.GetAllDids()
60 if err != nil {
61 return nil, fmt.Errorf("failed to get all Dids: %w", err)
62 }
63
64 if len(dids) > 0 {
65 h.knotInitialized = true
66 close(h.init)
67 for _, d := range dids {
68 h.jc.AddDid(d)
69 }
70 }
71
72 r.Get("/", h.Index)
73 r.Get("/capabilities", h.Capabilities)
74 r.Get("/version", h.Version)
75 r.Route("/{did}", func(r chi.Router) {
76 // Repo routes
77 r.Route("/{name}", func(r chi.Router) {
78 r.Route("/collaborator", func(r chi.Router) {
79 r.Use(h.VerifySignature)
80 r.Post("/add", h.AddRepoCollaborator)
81 })
82
83 r.Get("/", h.RepoIndex)
84 r.Get("/info/refs", h.InfoRefs)
85 r.Post("/git-upload-pack", h.UploadPack)
86
87 r.Route("/merge", func(r chi.Router) {
88 r.With(h.VerifySignature)
89 r.Post("/", h.Merge)
90 r.Post("/check", h.MergeCheck)
91 })
92
93 r.Route("/tree/{ref}", func(r chi.Router) {
94 r.Get("/", h.RepoIndex)
95 r.Get("/*", h.RepoTree)
96 })
97
98 r.Route("/blob/{ref}", func(r chi.Router) {
99 r.Get("/*", h.Blob)
100 })
101
102 r.Get("/log/{ref}", h.Log)
103 r.Get("/archive/{file}", h.Archive)
104 r.Get("/commit/{ref}", h.Diff)
105 r.Get("/tags", h.Tags)
106 r.Route("/branches", func(r chi.Router) {
107 r.Get("/", h.Branches)
108 r.Route("/default", func(r chi.Router) {
109 r.Get("/", h.DefaultBranch)
110 r.With(h.VerifySignature).Put("/", h.SetDefaultBranch)
111 })
112 })
113 })
114 })
115
116 // Create a new repository.
117 r.Route("/repo", func(r chi.Router) {
118 r.Use(h.VerifySignature)
119 r.Put("/new", h.NewRepo)
120 r.Delete("/", h.RemoveRepo)
121 })
122
123 r.Route("/member", func(r chi.Router) {
124 r.Use(h.VerifySignature)
125 r.Put("/add", h.AddMember)
126 })
127
128 // Initialize the knot with an owner and public key.
129 r.With(h.VerifySignature).Post("/init", h.Init)
130
131 // Health check. Used for two-way verification with appview.
132 r.With(h.VerifySignature).Get("/health", h.Health)
133
134 // All public keys on the knot.
135 r.Get("/keys", h.Keys)
136
137 return r, nil
138}
139
140// version is set during build time.
141var version string
142
143func (h *Handle) Version(w http.ResponseWriter, r *http.Request) {
144 if version == "" {
145 info, ok := debug.ReadBuildInfo()
146 if !ok {
147 http.Error(w, "failed to read build info", http.StatusInternalServerError)
148 return
149 }
150
151 var modVer string
152 for _, mod := range info.Deps {
153 if mod.Path == "tangled.sh/tangled.sh/knotserver" {
154 version = mod.Version
155 break
156 }
157 }
158
159 if modVer == "" {
160 version = "unknown"
161 }
162 }
163
164 w.Header().Set("Content-Type", "text/plain")
165 fmt.Fprintf(w, "knotserver/%s", version)
166}