widdler/main.go

355 lines
7.5 KiB
Go
Raw Normal View History

2021-05-17 07:50:45 -06:00
package main
import (
2021-05-20 06:23:18 -06:00
"crypto/tls"
2021-05-17 07:50:45 -06:00
"embed"
"encoding/csv"
"flag"
"fmt"
"io/ioutil"
"log"
"net"
"net/http"
"os"
"path"
"path/filepath"
"regexp"
"strings"
"text/template"
2021-05-17 07:50:45 -06:00
"time"
"golang.org/x/crypto/bcrypt"
"golang.org/x/crypto/ssh/terminal"
2021-05-17 07:50:45 -06:00
"golang.org/x/net/webdav"
"suah.dev/protect"
)
// Landing will be used to fill our landing template
type Landing struct {
User string
URL string
}
const landingPage = `
<h1>Hello{{if .User}} {{.User}}{{end}}! Welcome to widdler!</h1>
<p>To create a new TiddlyWiki html file, simply append an html file name to the URL in the address bar!</p>
<h3>For example:</h3>
<a href="{{.URL}}">{{.URL}}</a>
<p>This will create a new wiki called "<b>wiki.html</b>"</p>
2021-05-17 07:50:45 -06:00
<p>After creating a wiki, this message will be replaced by a list of your wiki files.</p>
`
var (
twFile = "empty-5.1.23.html"
//go:embed empty-5.1.23.html
tiddly embed.FS
templ *template.Template
)
2021-05-17 07:50:45 -06:00
type userHandlers struct {
dav *webdav.Handler
fs http.Handler
}
2021-05-17 07:50:45 -06:00
var (
2021-05-20 06:23:18 -06:00
auth bool
davDir string
fullListen string
genHtpass bool
2021-05-20 06:23:18 -06:00
handlers map[string]userHandlers
listen string
passPath string
tlsCert string
tlsKey string
users map[string]string
2021-05-17 07:50:45 -06:00
)
func init() {
users = make(map[string]string)
handlers = make(map[string]userHandlers)
2021-05-17 07:50:45 -06:00
dir, err := filepath.Abs(filepath.Dir(os.Args[0]))
if err != nil {
log.Fatalln(err)
}
flag.StringVar(&davDir, "wikis", dir, "Directory of TiddlyWikis to serve over WebDAV.")
flag.StringVar(&listen, "http", "localhost:8080", "Listen on")
2021-05-20 06:23:18 -06:00
flag.StringVar(&tlsCert, "tlscert", "", "TLS certificate.")
flag.StringVar(&tlsKey, "tlskey", "", "TLS key.")
2021-05-17 07:50:45 -06:00
flag.StringVar(&passPath, "htpass", fmt.Sprintf("%s/.htpasswd", dir), "Path to .htpasswd file..")
flag.BoolVar(&auth, "auth", true, "Enable HTTP Basic Authentication.")
flag.BoolVar(&genHtpass, "gen", false, "Generate a .htpasswd file or add a new entry to an existing file.")
2021-05-17 07:50:45 -06:00
flag.Parse()
// These are OpenBSD specific protections used to prevent unnecessary file access.
2021-05-20 18:33:35 -06:00
_ = protect.Unveil(passPath, "rwc")
2021-05-17 07:50:45 -06:00
_ = protect.Unveil(davDir, "rwc")
_ = protect.Unveil("/etc/ssl/cert.pem", "r")
_ = protect.Unveil("/etc/resolv.conf", "r")
2021-05-20 18:42:15 -06:00
_ = protect.Pledge("stdio wpath rpath cpath tty inet dns unveil")
2021-05-17 07:50:45 -06:00
templ, err = template.New("landing").Parse(landingPage)
if err != nil {
log.Fatalln(err)
}
2021-05-17 07:50:45 -06:00
}
func authenticate(user string, pass string) bool {
htpass, exists := users[user]
if !exists {
return false
}
err := bcrypt.CompareHashAndPassword([]byte(htpass), []byte(pass))
return err == nil
}
func logger(f http.HandlerFunc) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
n := time.Now()
fmt.Printf("%s (%s) [%s] \"%s %s\" %03d\n",
r.RemoteAddr,
n.Format(time.RFC822Z),
r.Method,
r.URL.Path,
r.Proto,
r.ContentLength,
)
f(w, r)
}
}
func createEmpty(path string) error {
_, fErr := os.Stat(path)
if os.IsNotExist(fErr) {
log.Printf("creating %q\n", path)
twData, _ := tiddly.ReadFile(twFile)
wErr := ioutil.WriteFile(path, []byte(twData), 0600)
if wErr != nil {
return wErr
}
}
return nil
}
func prompt(prompt string, secure bool) (string, error) {
var input string
fmt.Print(prompt)
if secure {
b, err := terminal.ReadPassword(int(os.Stdin.Fd()))
if err != nil {
return "", err
}
input = string(b)
} else {
fmt.Scanln(&input)
}
return input, nil
}
2021-05-17 07:50:45 -06:00
func main() {
2021-05-20 18:33:35 -06:00
_ = protect.Pledge("stdio wpath rpath cpath inet dns unveil")
if genHtpass {
user, err := prompt("Username: ", false)
if err != nil {
log.Fatalln(err)
}
pass, err := prompt("Password: ", true)
if err != nil {
log.Fatalln(err)
}
hash, err := bcrypt.GenerateFromPassword([]byte(pass), 11)
if err != nil {
log.Fatalln(err)
}
f, err := os.OpenFile(passPath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0600)
if err != nil {
log.Fatalln(err)
}
defer f.Close()
if _, err := f.WriteString(fmt.Sprintf("%s:%s\n", user, hash)); err != nil {
log.Fatalln(err)
}
fmt.Printf("Added %q to %q\n", user, passPath)
os.Exit(0)
}
2021-05-20 18:33:35 -06:00
// drop to only read on passPath
_ = protect.Unveil(passPath, "r")
_ = protect.Pledge("stdio wpath rpath cpath inet dns")
_, fErr := os.Stat(passPath)
if os.IsNotExist(fErr) {
if auth {
fmt.Println("No .htpasswd file found!")
os.Exit(1)
}
} else {
p, err := os.Open(passPath)
if err != nil {
log.Fatal(err)
}
defer p.Close()
ht := csv.NewReader(p)
ht.Comma = ':'
ht.Comment = '#'
ht.TrimLeadingSpace = true
entries, err := ht.ReadAll()
if err != nil {
log.Fatal(err)
}
for _, parts := range entries {
users[parts[0]] = parts[1]
}
}
if auth {
for u := range users {
uPath := path.Join(davDir, u)
handlers[u] = userHandlers{
dav: &webdav.Handler{
LockSystem: webdav.NewMemLS(),
FileSystem: webdav.Dir(uPath),
},
fs: http.FileServer(http.Dir(uPath)),
}
}
} else {
handlers[""] = userHandlers{
dav: &webdav.Handler{
LockSystem: webdav.NewMemLS(),
FileSystem: webdav.Dir(davDir),
},
fs: http.FileServer(http.Dir(davDir)),
}
2021-05-17 07:50:45 -06:00
}
mux := http.NewServeMux()
mux.HandleFunc("/", logger(func(w http.ResponseWriter, r *http.Request) {
user, pass := "", ""
var ok bool
if strings.Contains(r.URL.Path, ".htpasswd") {
http.NotFound(w, r)
return
}
// Prevent directory traversal
if strings.Contains(r.URL.Path, "..") {
http.NotFound(w, r)
return
}
if auth {
user, pass, ok = r.BasicAuth()
if !(ok && authenticate(user, pass)) {
w.Header().Set("WWW-Authenticate", `Basic realm="widdler"`)
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
2021-05-17 07:50:45 -06:00
}
handler := handlers[user]
userPath := path.Join(davDir, user)
fullPath := path.Join(davDir, user, r.URL.Path)
_, dErr := os.Stat(userPath)
if os.IsNotExist(dErr) {
mErr := os.Mkdir(userPath, 0700)
if mErr != nil {
http.Error(w, mErr.Error(), http.StatusInternalServerError)
return
}
}
isHTML, err := regexp.Match(`\.html$`, []byte(r.URL.Path))
2021-05-17 07:50:45 -06:00
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
2021-05-17 07:50:45 -06:00
return
}
if isHTML {
// HTML files will be created or sent back
err := createEmpty(fullPath)
if err != nil {
log.Println(err)
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
handler.dav.ServeHTTP(w, r)
} else {
// Everything else is browsable
entries, err := os.ReadDir(userPath)
if err != nil {
log.Println(err)
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
if len(entries) > 0 {
handler.fs.ServeHTTP(w, r)
} else {
l := Landing{
2021-05-20 06:23:18 -06:00
URL: fmt.Sprintf("%s/wiki.html", fullListen),
}
if user != "" {
l.User = user
}
err = templ.ExecuteTemplate(w, "landing", l)
2021-05-19 21:15:46 -06:00
if err != nil {
log.Println(err)
http.Error(w, err.Error(), http.StatusInternalServerError)
}
}
2021-05-17 07:50:45 -06:00
}
}))
s := http.Server{
Handler: mux,
}
lis, err := net.Listen("tcp", listen)
if err != nil {
2021-05-20 06:23:18 -06:00
log.Fatalln(err)
}
if tlsCert != "" && tlsKey != "" {
fullListen = fmt.Sprintf("https://%s", listen)
s.TLSConfig = &tls.Config{
MinVersion: tls.VersionTLS12,
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
PreferServerCipherSuites: true,
}
log.Printf("Listening for HTTPS on 'https://%s'", listen)
log.Fatalln(s.ServeTLS(lis, tlsCert, tlsKey))
} else {
fullListen = fmt.Sprintf("http://%s", listen)
log.Printf("Listening for HTTP on 'http://%s'", listen)
log.Fatalln(s.Serve(lis))
2021-05-17 07:50:45 -06:00
}
}