/*
GoCheese -- Python private package repository and caching proxy
Copyright (C) 2019 Sergey Matveev <stargrave@stargrave.org>
+ 2019 Elena Balakhonova <balakhonova_e@riseup.net>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
import (
"bytes"
+ "context"
"crypto/sha256"
"encoding/hex"
- "errors"
"flag"
"fmt"
"io"
"io/ioutil"
"log"
+ "net"
"net/http"
"net/url"
"os"
+ "os/signal"
"path/filepath"
"regexp"
"runtime"
"strings"
+ "syscall"
+ "time"
+
+ "golang.org/x/net/netutil"
)
const (
)
var (
+ pkgPyPI = regexp.MustCompile(`^.*<a href="([^"]+)"[^>]*>(.+)</a><br/>.*$`)
+ Version string = "UNKNOWN"
+
root = flag.String("root", "./packages", "Path to packages directory")
bind = flag.String("bind", "[::]:8080", "Address to bind to")
+ tlsCert = flag.String("tls-cert", "", "Path to TLS X.509 certificate")
+ tlsKey = flag.String("tls-key", "", "Path to TLS X.509 private key")
norefreshURLPath = flag.String("norefresh", "/norefresh/", "Non-refreshing URL path")
refreshURLPath = flag.String("refresh", "/simple/", "Auto-refreshing URL path")
pypiURL = flag.String("pypi", "https://pypi.org/simple/", "Upstream PyPI URL")
passwdPath = flag.String("passwd", "passwd", "Path to file with authenticators")
+ passwdCheck = flag.Bool("passwd-check", false, "Test the -passwd file for syntax errors and exit")
fsck = flag.Bool("fsck", false, "Check integrity of all packages")
+ maxClients = flag.Int("maxclients", 128, "Maximal amount of simultaneous clients")
version = flag.Bool("version", false, "Print version information")
warranty = flag.Bool("warranty", false, "Print warranty information")
- pkgPyPI = regexp.MustCompile(`^.*<a href="([^"]+)"[^>]*>(.+)</a><br/>.*$`)
- Version string = "UNKNOWN"
-
- passwords map[string]Auther = make(map[string]Auther)
+ killed bool
)
-type Auther interface {
- Auth(password string) bool
-}
-
func mkdirForPkg(w http.ResponseWriter, r *http.Request, dir string) bool {
path := filepath.Join(*root, dir)
if _, err := os.Stat(path); os.IsNotExist(err) {
- if err = os.Mkdir(path, 0700); err != nil {
+ if err = os.Mkdir(path, os.FileMode(0777)); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return false
}
func refreshDir(w http.ResponseWriter, r *http.Request, dir, filenameGet string) bool {
if _, err := os.Stat(filepath.Join(*root, dir, InternalFlag)); err == nil {
- log.Println(r.RemoteAddr, "pypi refresh skip, internal package", dir)
return true
}
- log.Println(r.RemoteAddr, "pypi refresh", dir)
resp, err := http.Get(*pypiURL + dir + "/")
if err != nil {
http.Error(w, err.Error(), http.StatusBadGateway)
return false
}
- defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
+ resp.Body.Close()
if err != nil {
http.Error(w, err.Error(), http.StatusBadGateway)
return false
return false
}
if filename == filenameGet {
+ if killed {
+ // Skip heavy remote call, when shutting down
+ http.Error(w, "shutting down", http.StatusInternalServerError)
+ return false
+ }
log.Println(r.RemoteAddr, "pypi download", filename)
path = filepath.Join(*root, dir, filename)
resp, err = http.Get(uri)
}
defer resp.Body.Close()
hasher := sha256.New()
- dst, err := ioutil.TempFile(filepath.Join(*root, dir), "")
+ dst, err := TempFile(filepath.Join(*root, dir))
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return false
_, err = os.Stat(path)
if err == nil {
continue
- } else {
- if !os.IsNotExist(err) {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- return false
- }
+ }
+ if !os.IsNotExist(err) {
+ http.Error(w, err.Error(), http.StatusInternalServerError)
+ return false
}
log.Println(r.RemoteAddr, "pypi touch", filename)
- if err = ioutil.WriteFile(path, digest, os.FileMode(0600)); err != nil {
+ if err = ioutil.WriteFile(path, digest, os.FileMode(0666)); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return false
}
}
func listRoot(w http.ResponseWriter, r *http.Request) {
- log.Println(r.RemoteAddr, "root")
files, err := ioutil.ReadDir(*root)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
- w.Write([]byte(fmt.Sprintf(HTMLBegin, "root", "root")))
+ var result bytes.Buffer
+ result.WriteString(fmt.Sprintf(HTMLBegin, "root", "root"))
for _, file := range files {
if file.Mode().IsDir() {
- w.Write([]byte(fmt.Sprintf(
+ result.WriteString(fmt.Sprintf(
HTMLElement,
*refreshURLPath+file.Name()+"/",
file.Name(),
- )))
+ ))
}
}
- w.Write([]byte(HTMLEnd))
+ result.WriteString(HTMLEnd)
+ w.Write(result.Bytes())
}
func listDir(w http.ResponseWriter, r *http.Request, dir string, autorefresh bool) {
- log.Println(r.RemoteAddr, "dir", dir)
dirPath := filepath.Join(*root, dir)
if autorefresh {
if !refreshDir(w, r, dir, "") {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
- w.Write([]byte(fmt.Sprintf(HTMLBegin, dir, dir)))
+ var result bytes.Buffer
+ result.WriteString(fmt.Sprintf(HTMLBegin, dir, dir))
var data []byte
var filenameClean string
for _, file := range files {
if !strings.HasSuffix(file.Name(), SHA256Ext) {
continue
}
+ if killed {
+ // Skip expensive I/O when shutting down
+ http.Error(w, "shutting down", http.StatusInternalServerError)
+ return
+ }
data, err = ioutil.ReadFile(filepath.Join(dirPath, file.Name()))
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
filenameClean = strings.TrimSuffix(file.Name(), SHA256Ext)
- w.Write([]byte(fmt.Sprintf(
+ result.WriteString(fmt.Sprintf(
HTMLElement,
strings.Join([]string{
*refreshURLPath, dir, "/",
- filenameClean, "#", SHA256Prefix, string(data),
+ filenameClean, "#", SHA256Prefix, hex.EncodeToString(data),
}, ""),
filenameClean,
- )))
+ ))
}
- w.Write([]byte(HTMLEnd))
+ result.WriteString(HTMLEnd)
+ w.Write(result.Bytes())
}
func servePkg(w http.ResponseWriter, r *http.Request, dir, filename string) {
- log.Println(r.RemoteAddr, "pkg", filename)
+ log.Println(r.RemoteAddr, "get", filename)
path := filepath.Join(*root, dir, filename)
if _, err := os.Stat(path); os.IsNotExist(err) {
if !refreshDir(w, r, dir, filename) {
http.ServeFile(w, r, path)
}
-func strToAuther(verifier string) (string, Auther, error) {
- st := strings.SplitN(verifier, "$", 3)
- if len(st) != 3 || st[0] != "" {
- return "", nil, errors.New("invalid verifier structure")
- }
- algorithm := st[1]
- var auther Auther
- var err error
- switch algorithm {
- case "argon2i":
- auther, err = parseArgon2i(st[2])
- case "sha256":
- auther, err = parseSHA256(st[2])
- default:
- err = errors.New("unknown hashing algorithm")
- }
- return algorithm, auther, err
-}
-
func serveUpload(w http.ResponseWriter, r *http.Request) {
username, password, ok := r.BasicAuth()
if !ok {
}
for _, file := range r.MultipartForm.File["content"] {
filename := file.Filename
- log.Println(r.RemoteAddr, "upload", filename, "by", username)
+ log.Println(r.RemoteAddr, "put", filename, "by", username)
dir := filename[:strings.LastIndex(filename, "-")]
dirPath := filepath.Join(*root, dir)
path := filepath.Join(dirPath, filename)
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
- dst, err = ioutil.TempFile(dirPath, "")
+ dst, err = TempFile(dirPath)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
- if err = ioutil.WriteFile(
- path+SHA256Ext,
- hasher.Sum(nil),
- os.FileMode(0600),
- ); err != nil {
+ if err = ioutil.WriteFile(path+SHA256Ext, hasher.Sum(nil), os.FileMode(0666)); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
}
func handler(w http.ResponseWriter, r *http.Request) {
- if r.Method == "GET" {
+ switch r.Method {
+ case "GET":
var path string
var autorefresh bool
if strings.HasPrefix(r.URL.Path, *norefreshURLPath) {
} else {
servePkg(w, r, parts[0], parts[1])
}
- } else if r.Method == "POST" {
+ case "POST":
serveUpload(w, r)
+ default:
+ http.Error(w, "unknown action", http.StatusBadRequest)
}
}
}
return
}
- passwd, err := ioutil.ReadFile(*passwdPath)
+ if *passwdCheck {
+ refreshPasswd()
+ return
+ }
+ if (*tlsCert != "" && *tlsKey == "") || (*tlsCert == "" && *tlsKey != "") {
+ log.Fatalln("Both -tls-cert and -tls-key are required")
+ }
+ refreshPasswd()
+ log.Println("root:", *root, "bind:", *bind)
+
+ ln, err := net.Listen("tcp", *bind)
if err != nil {
log.Fatal(err)
}
- for _, credentials := range strings.Split(strings.TrimRight(string(passwd), "\n"), "\n") {
- splitted := strings.Split(credentials, ":")
- if len(splitted) != 2 {
- log.Fatal("Wrong login:password format")
- }
- _, auther, err := strToAuther(splitted[1])
- if err != nil {
- log.Fatal(err)
- }
- passwords[splitted[0]] = auther
- log.Println("Added password for " + splitted[0])
+ ln = netutil.LimitListener(ln, *maxClients)
+ server := &http.Server{
+ ReadTimeout: time.Minute,
+ WriteTimeout: time.Minute,
}
- log.Println("root:", *root, "bind:", *bind)
http.HandleFunc(*norefreshURLPath, handler)
http.HandleFunc(*refreshURLPath, handler)
- log.Fatal(http.ListenAndServe(*bind, nil))
+
+ needsRefreshPasswd := make(chan os.Signal, 0)
+ needsShutdown := make(chan os.Signal, 0)
+ exitErr := make(chan error, 0)
+ signal.Notify(needsRefreshPasswd, syscall.SIGHUP)
+ signal.Notify(needsShutdown, syscall.SIGTERM, syscall.SIGINT)
+ go func() {
+ for range needsRefreshPasswd {
+ log.Println("Refreshing passwords")
+ refreshPasswd()
+ }
+ }()
+ go func(s *http.Server) {
+ <-needsShutdown
+ killed = true
+ log.Println("Shutting down")
+ ctx, cancel := context.WithTimeout(context.TODO(), time.Minute)
+ exitErr <- s.Shutdown(ctx)
+ cancel()
+ }(server)
+
+ if *tlsCert == "" {
+ err = server.Serve(ln)
+ } else {
+ err = server.ServeTLS(ln, *tlsCert, *tlsKey)
+ }
+ if err != http.ErrServerClosed {
+ log.Fatal(err)
+ }
+ if err := <-exitErr; err != nil {
+ log.Fatal(err)
+ }
}