1package knotserver
2
3import (
4 "context"
5 "fmt"
6 "log/slog"
7 "net/http"
8 "runtime/debug"
9
10 "github.com/go-chi/chi/v5"
11 "tangled.sh/tangled.sh/core/jetstream"
12 "tangled.sh/tangled.sh/core/knotserver/config"
13 "tangled.sh/tangled.sh/core/knotserver/db"
14 "tangled.sh/tangled.sh/core/rbac"
15)
16
17const (
18 ThisServer = "thisserver" // resource identifier for rbac enforcement
19)
20
21type Handle struct {
22 c *config.Config
23 db *db.DB
24 jc *jetstream.JetstreamClient
25 e *rbac.Enforcer
26 l *slog.Logger
27
28 // init is a channel that is closed when the knot has been initailized
29 // i.e. when the first user (knot owner) has been added.
30 init chan struct{}
31 knotInitialized bool
32}
33
34func Setup(ctx context.Context, c *config.Config, db *db.DB, e *rbac.Enforcer, jc *jetstream.JetstreamClient, l *slog.Logger) (http.Handler, error) {
35 r := chi.NewRouter()
36
37 h := Handle{
38 c: c,
39 db: db,
40 e: e,
41 l: l,
42 jc: jc,
43 init: make(chan struct{}),
44 }
45
46 err := e.AddDomain(ThisServer)
47 if err != nil {
48 return nil, fmt.Errorf("failed to setup enforcer: %w", err)
49 }
50
51 err = h.jc.StartJetstream(ctx, h.processMessages)
52 if err != nil {
53 return nil, fmt.Errorf("failed to start jetstream: %w", err)
54 }
55
56 // Check if the knot knows about any Dids;
57 // if it does, it is already initialized and we can repopulate the
58 // Jetstream subscriptions.
59 dids, err := db.GetAllDids()
60 if err != nil {
61 return nil, fmt.Errorf("failed to get all Dids: %w", err)
62 }
63
64 if len(dids) > 0 {
65 h.knotInitialized = true
66 close(h.init)
67 for _, d := range dids {
68 h.jc.AddDid(d)
69 }
70 }
71
72 r.Get("/", h.Index)
73 r.Get("/version", h.Version)
74 r.Route("/{did}", func(r chi.Router) {
75 // Repo routes
76 r.Route("/{name}", func(r chi.Router) {
77 r.Route("/collaborator", func(r chi.Router) {
78 r.Use(h.VerifySignature)
79 r.Post("/add", h.AddRepoCollaborator)
80 })
81
82 r.Get("/", h.RepoIndex)
83 r.Get("/info/refs", h.InfoRefs)
84 r.Post("/git-upload-pack", h.UploadPack)
85
86 r.Route("/merge", func(r chi.Router) {
87 r.With(h.VerifySignature)
88 r.Post("/", h.Merge)
89 r.Post("/check", h.MergeCheck)
90 })
91
92 r.Route("/tree/{ref}", func(r chi.Router) {
93 r.Get("/", h.RepoIndex)
94 r.Get("/*", h.RepoTree)
95 })
96
97 r.Route("/blob/{ref}", func(r chi.Router) {
98 r.Get("/*", h.Blob)
99 })
100
101 r.Get("/log/{ref}", h.Log)
102 r.Get("/archive/{file}", h.Archive)
103 r.Get("/commit/{ref}", h.Diff)
104 r.Get("/tags", h.Tags)
105 r.Route("/branches", func(r chi.Router) {
106 r.Get("/", h.Branches)
107 r.Route("/default", func(r chi.Router) {
108 r.Get("/", h.DefaultBranch)
109 r.With(h.VerifySignature).Put("/", h.SetDefaultBranch)
110 })
111 })
112 })
113 })
114
115 // Create a new repository.
116 r.Route("/repo", func(r chi.Router) {
117 r.Use(h.VerifySignature)
118 r.Put("/new", h.NewRepo)
119 r.Delete("/", h.RemoveRepo)
120 })
121
122 r.Route("/member", func(r chi.Router) {
123 r.Use(h.VerifySignature)
124 r.Put("/add", h.AddMember)
125 })
126
127 // Initialize the knot with an owner and public key.
128 r.With(h.VerifySignature).Post("/init", h.Init)
129
130 // Health check. Used for two-way verification with appview.
131 r.With(h.VerifySignature).Get("/health", h.Health)
132
133 // All public keys on the knot.
134 r.Get("/keys", h.Keys)
135
136 return r, nil
137}
138
139// version is set during build time.
140var version string
141
142func (h *Handle) Version(w http.ResponseWriter, r *http.Request) {
143 if version == "" {
144 info, ok := debug.ReadBuildInfo()
145 if !ok {
146 http.Error(w, "failed to read build info", http.StatusInternalServerError)
147 return
148 }
149
150 var modVer string
151 for _, mod := range info.Deps {
152 if mod.Path == "tangled.sh/tangled.sh/knotserver" {
153 version = mod.Version
154 break
155 }
156 }
157
158 if modVer == "" {
159 version = "unknown"
160 }
161 }
162
163 w.Header().Set("Content-Type", "text/plain")
164 fmt.Fprintf(w, "knotserver/%s", version)
165}