]> Cypherpunks.ru repositories - gocheese.git/blobdiff - gocheese.go
FIFO-based password management
[gocheese.git] / gocheese.go
index 416bf7a2e4213a4062bc33fc159ae5890c46f101..cc30de23dfc84596f7980a2fef81fc370827521c 100644 (file)
@@ -22,7 +22,10 @@ package main
 import (
        "bytes"
        "context"
+       "crypto/sha256"
+       "crypto/tls"
        "encoding/hex"
+       "errors"
        "flag"
        "fmt"
        "io/ioutil"
@@ -43,7 +46,7 @@ import (
 )
 
 const (
-       Version   = "2.5.0"
+       Version   = "3.0.0"
        HTMLBegin = `<!DOCTYPE html>
 <html>
   <head>
@@ -94,10 +97,11 @@ var (
        norefreshURLPath = flag.String("norefresh", "/norefresh/", "Non-refreshing URL path")
        refreshURLPath   = flag.String("refresh", "/simple/", "Auto-refreshing URL path")
        gpgUpdateURLPath = flag.String("gpgupdate", "/gpgupdate/", "GPG forceful refreshing URL path")
-       pypiURL          = flag.String("pypi", "https://pypi.org/simple/", "Upstream PyPI URL")
-       passwdPath       = flag.String("passwd", "passwd", "Path to file with authenticators")
+       pypiURL          = flag.String("pypi", "https://pypi.org/simple/", "Upstream (PyPI) URL")
+       pypiCertHash     = flag.String("pypi-cert-hash", "", "Authenticate upstream by its X.509 certificate's SPKI SHA256 hash")
        logTimestamped   = flag.Bool("log-timestamped", false, "Prepend timestmap to log messages")
-       passwdCheck      = flag.Bool("passwd-check", false, "Test the -passwd file for syntax errors and exit")
+       passwdPath       = flag.String("passwd", "", "Path to FIFO for upload authentication")
+       passwdCheck      = flag.Bool("passwd-check", false, "Run password checker")
        fsck             = flag.Bool("fsck", false, "Check integrity of all packages (errors are in stderr)")
        maxClients       = flag.Int("maxclients", 128, "Maximal amount of simultaneous clients")
        version          = flag.Bool("version", false, "Print version information")
@@ -169,7 +173,7 @@ func listDir(
        var result bytes.Buffer
        result.WriteString(fmt.Sprintf(HTMLBegin, pkgName))
        for _, algo := range knownHashAlgos {
-               for fn, _ := range files {
+               for fn := range files {
                        if killed {
                                // Skip expensive I/O when shutting down
                                http.Error(w, "shutting down", http.StatusInternalServerError)
@@ -284,8 +288,24 @@ func main() {
        }
 
        if *passwdCheck {
-               refreshPasswd()
-               return
+               if passwdReader(os.Stdin) {
+                       os.Exit(0)
+               } else {
+                       os.Exit(1)
+               }
+       }
+
+       if *passwdPath != "" {
+               go func() {
+                       for {
+                               fd, err := os.OpenFile(*passwdPath, os.O_RDONLY, os.FileMode(0666))
+                               if err != nil {
+                                       log.Fatalln(err)
+                               }
+                               passwdReader(fd)
+                               fd.Close()
+                       }
+               }()
        }
 
        if (*tlsCert != "" && *tlsKey == "") || (*tlsCert == "" && *tlsKey != "") {
@@ -297,7 +317,28 @@ func main() {
        if err != nil {
                log.Fatalln(err)
        }
-       refreshPasswd()
+       tlsConfig := tls.Config{
+               ClientSessionCache: tls.NewLRUClientSessionCache(16),
+               NextProtos:         []string{"h2", "http/1.1"},
+       }
+       pypiHTTPTransport = http.Transport{
+               ForceAttemptHTTP2: true,
+               TLSClientConfig:   &tlsConfig,
+       }
+       if *pypiCertHash != "" {
+               ourDgst, err := hex.DecodeString(*pypiCertHash)
+               if err != nil {
+                       log.Fatalln(err)
+               }
+               tlsConfig.VerifyConnection = func(s tls.ConnectionState) error {
+                       spki := s.VerifiedChains[0][0].RawSubjectPublicKeyInfo
+                       theirDgst := sha256.Sum256(spki)
+                       if bytes.Compare(ourDgst, theirDgst[:]) != 0 {
+                               return errors.New("certificate's SPKI digest mismatch")
+                       }
+                       return nil
+               }
+       }
 
        ln, err := net.Listen("tcp", *bind)
        if err != nil {
@@ -314,17 +355,9 @@ func main() {
                http.HandleFunc(*gpgUpdateURLPath, handler)
        }
 
-       needsRefreshPasswd := make(chan os.Signal, 0)
        needsShutdown := make(chan os.Signal, 0)
        exitErr := make(chan error, 0)
-       signal.Notify(needsRefreshPasswd, syscall.SIGHUP)
        signal.Notify(needsShutdown, syscall.SIGTERM, syscall.SIGINT)
-       go func() {
-               for range needsRefreshPasswd {
-                       log.Println("refreshing passwords")
-                       refreshPasswd()
-               }
-       }()
        go func(s *http.Server) {
                <-needsShutdown
                killed = true