💾 Archived View for gemini.rmf-dev.com › repo › Vaati › Gemigit › files › 5ef20234ad4fd57bc0f329de4c… captured on 2023-04-19 at 23:34:50. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
0 package main
1
2 import (
3 "fmt"
4 "log"
5 "os"
6
7 "golang.org/x/crypto/ssh/terminal"
8
9 "gemigit/access"
10 "gemigit/auth"
11 "gemigit/config"
12 "gemigit/db"
13 "gemigit/httpgit"
14 "gemigit/repo"
15 "gemigit/gmi"
16
17 "github.com/pitr/gig"
18 )
19
20 func main() {
21
22 if err := config.LoadConfig(); err != nil {
23 log.Fatalln(err.Error())
24 }
25
26 if len(os.Args) > 1 {
27 switch (os.Args[1]) {
28 case "chpasswd":
29 if (config.Cfg.Ldap.Enabled) {
30 fmt.Println("Not valid when LDAP is enabled")
31 return
32 }
33 if len(os.Args) < 3 {
34 fmt.Println(os.Args[0] +
35 " chpasswd <username>")
36 return
37 }
38 fmt.Print("New Password : ")
39 password, err := terminal.ReadPassword(0)
40 fmt.Print("\n")
41 if err != nil {
42 log.Fatalln(err.Error())
43 }
44 err = db.Init(config.Cfg.Database.Type,
45 config.Cfg.Database.Url, false)
46 if err != nil {
47 log.Fatalln(err.Error())
48 }
49 defer db.Close()
50 if err := db.ChangePassword(os.Args[2],
51 string(password));
52 err != nil {
53 fmt.Println(err.Error())
54 return
55 }
56 fmt.Println(os.Args[2] + "'s password changed")
57 return
58 case "register":
59 if (config.Cfg.Ldap.Enabled) {
60 fmt.Println("Not valid when LDAP is enabled")
61 return
62 }
63 if len(os.Args) < 3 {
64 fmt.Println(os.Args[0] +
65 " register <username>")
66 return
67 }
68 fmt.Print("Password : ")
69 password, err := terminal.ReadPassword(0)
70 fmt.Print("\n")
71 if err != nil {
72 log.Fatalln(err.Error())
73 }
74 err = db.Init(config.Cfg.Database.Type,
75 config.Cfg.Database.Url, false)
76 if err != nil {
77 log.Fatalln(err.Error())
78 }
79 defer db.Close()
80 if err := db.Register(os.Args[2], string(password));
81 err != nil {
82 fmt.Println(err.Error())
83 return
84 }
85 fmt.Println("User " + os.Args[2] + " created")
86 return
87 case "rmuser":
88 if len(os.Args) < 3 {
89 fmt.Println(os.Args[0] + " rmuser <username>")
90 return
91 }
92 err := db.Init(config.Cfg.Database.Type,
93 config.Cfg.Database.Url, false)
94 if err != nil {
95 log.Fatalln(err.Error())
96 }
97 defer db.Close()
98 err = db.DeleteUser(os.Args[2])
99 if err != nil {
100 log.Fatalln(err)
101 }
102 fmt.Println("User " + os.Args[2] +
103 " deleted successfully")
104 return
105 case "init":
106 err := db.Init(config.Cfg.Database.Type,
107 config.Cfg.Database.Url, true)
108 if err != nil {
109 log.Fatalln(err.Error())
110 }
111 defer db.Close()
112 return
113 }
114 fmt.Println("usage: " + os.Args[0] + " [command]")
115 fmt.Println("commands :")
116 fmt.Println("\tchpasswd <username> - Change user password")
117 fmt.Println("\tregister <username> - Create user")
118 fmt.Println("\trmuser <username> - Remove user")
119 fmt.Println("\tinit - Initialize database")
120 return
121 }
122
123 log.SetFlags(log.LstdFlags | log.Lshortfile)
124
125 if err := access.Init(); err != nil {
126 log.Fatalln(err.Error())
127 }
128
129 if err := gmi.LoadTemplate(config.Cfg.Gemini.Templates); err != nil {
130 log.Fatalln(err.Error())
131 }
132
133 err := db.Init(config.Cfg.Database.Type,
134 config.Cfg.Database.Url, false)
135 if err != nil {
136 log.Fatalln(err.Error())
137 }
138 defer db.Close()
139 if err := repo.Init("repos"); err != nil {
140 log.Fatalln(err.Error())
141 }
142
143 if !config.Cfg.Git.Remote.Enabled {
144 go httpgit.Listen("repos/",
145 config.Cfg.Git.Address,
146 config.Cfg.Git.Port)
147 }
148 go auth.Decrease()
149
150 gig.DefaultLoggerConfig.Format = "${time_rfc3339} - ${remote_ip} | " +
151 "Path=${path}, Status=${status}, " +
152 "Latency=${latency}\n"
153 g := gig.Default()
154 g.Use(gig.Recover())
155 g.Static("/static", "./static")
156
157 passAuth := gig.PassAuth(
158 func(sig string, c gig.Context) (string, error) {
159 _, b := db.GetUser(sig)
160 if !b {
161 return "/login", nil
162 }
163 return "", nil
164 })
165
166 secure := g.Group("/account", passAuth)
167
168 secure.Handle("", gmi.ShowAccount)
169 // groups management
170 secure.Handle("/groups", gmi.ShowGroups)
171 secure.Handle("/groups/:group", gmi.ShowMembers)
172 secure.Handle("/groups/:group/desc", gmi.SetGroupDesc)
173 secure.Handle("/groups/:group/add", gmi.AddToGroup)
174 secure.Handle("/groups/:group/leave", gmi.LeaveGroup)
175 secure.Handle("/groups/:group/delete", gmi.DeleteGroup)
176 secure.Handle("/groups/:group/kick/:user", gmi.RmFromGroup)
177
178 // repository settings
179 secure.Handle("/repo/:repo/*", gmi.RepoFile)
180 secure.Handle("/repo/:repo/togglepublic", gmi.TogglePublic)
181 secure.Handle("/repo/:repo/chname", gmi.ChangeRepoName)
182 secure.Handle("/repo/:repo/chdesc", gmi.ChangeRepoDesc)
183 secure.Handle("/repo/:repo/delrepo", gmi.DeleteRepo)
184
185 // access management
186 secure.Handle("/repo/:repo/access", gmi.ShowAccess)
187 secure.Handle("/repo/:repo/access/add", gmi.AddUserAccess)
188 secure.Handle("/repo/:repo/access/addg", gmi.AddGroupAccess)
189 secure.Handle("/repo/:repo/access/:user/first",
190 gmi.UserAccessFirstOption)
191 secure.Handle("/repo/:repo/access/:user/second",
192 gmi.UserAccessSecondOption)
193 secure.Handle("/repo/:repo/access/:group/g/first",
194 gmi.GroupAccessFirstOption)
195 secure.Handle("/repo/:repo/access/:group/g/second",
196 gmi.GroupAccessSecondOption)
197 secure.Handle("/repo/:repo/access/:user/kick",
198 gmi.RemoveUserAccess)
199 secure.Handle("/repo/:repo/access/:group/g/kick",
200 gmi.RemoveGroupAccess)
201
202 // repository view
203 secure.Handle("/repo/:repo", gmi.RepoLog)
204 secure.Handle("/repo/:repo/license", gmi.RepoLicense)
205 secure.Handle("/repo/:repo/readme", gmi.RepoReadme)
206 secure.Handle("/repo/:repo/refs", gmi.RepoRefs)
207 secure.Handle("/repo/:repo/files", gmi.RepoFiles)
208 secure.Handle("/repo/:repo/files/:blob", gmi.RepoFileContent)
209
210 // user page
211 secure.Handle("/chdesc", gmi.ChangeDesc)
212 secure.Handle("/addrepo", gmi.AddRepo)
213 secure.Handle("/addgroup", gmi.AddGroup)
214 // otp
215 secure.Handle("/otp", gmi.ShowOTP)
216 secure.Handle("/otp/qr", gmi.CreateTOTP)
217 secure.Handle("/otp/confirm", gmi.ConfirmTOTP)
218 secure.Handle("/otp/rm", gmi.RemoveTOTP)
219 // token
220 secure.Handle("/token", gmi.ListTokens)
221 secure.Handle("/token/new", gmi.CreateToken)
222 secure.Handle("/token/secure", gmi.ToggleTokenAuth)
223 secure.Handle("/token/renew/:token", gmi.RenewToken)
224 secure.Handle("/token/delete/:token", gmi.DeleteToken)
225
226 if !config.Cfg.Ldap.Enabled {
227 secure.Handle("/chpasswd", gmi.ChangePassword)
228 }
229
230 secure.Handle("/disconnect", gmi.Disconnect)
231 secure.Handle("/disconnectall", gmi.DisconnectAll)
232
233 if config.Cfg.Git.Key != "" {
234 api := g.Group("/api")
235 api.Handle("/:key/init/:username/:repo", repo.ApiInit)
236 api.Handle("/:key/rm/:username/:repo", repo.ApiRemove)
237 api.Handle("/:key/mv/:username/:repo/:newname",
238 repo.ApiRename)
239 }
240
241 var public *gig.Group
242 if config.Cfg.Git.Public {
243 public = g.Group("/repo")
244 } else {
245 public = g.Group("/repo", passAuth)
246 }
247
248 public.Handle("", gmi.PublicList)
249 public.Handle("/:user/:repo/*", gmi.PublicFile)
250 public.Handle("/:user", gmi.PublicAccount)
251 public.Handle("/:user/:repo", gmi.PublicLog)
252 public.Handle("/:user/:repo/refs", gmi.PublicRefs)
253 public.Handle("/:user/:repo/license", gmi.PublicLicense)
254 public.Handle("/:user/:repo/readme", gmi.PublicReadme)
255 public.Handle("/:user/:repo/files", gmi.PublicFiles)
256 public.Handle("/:user/:repo/files/:blob", gmi.PublicFileContent)
257
258 g.PassAuthLoginHandle("/login", gmi.Login)
259
260 if config.Cfg.Users.Registration {
261 g.Handle("/register", gmi.Register)
262 g.Handle("/register/:name", gmi.RegisterConfirm)
263 }
264 g.Handle("/otp", gmi.LoginOTP)
265
266 g.Handle("/", func(c gig.Context) error {
267 return gmi.ShowIndex(c)
268 })
269
270 err = g.Run(config.Cfg.Gemini.Address + ":" + config.Cfg.Gemini.Port,
271 config.Cfg.Gemini.Certificate, config.Cfg.Gemini.Key)
272
273 if err != nil {
274 log.Fatal(err.Error())
275 }
276 }
277