#![feature(iter_collect_into)] use { argon2::{password_hash::SaltString, PasswordVerifier}, axum::{ body::Bytes, extract::{DefaultBodyLimit, Path}, http::{header::COOKIE, request::Parts}, response::{AppendHeaders, Html}, }, const_format::formatcp, core::fmt, htmlm::{html, write_html}, rand_core::OsRng, serde::{Deserialize, Serialize}, std::{ collections::{HashMap, HashSet}, fmt::{Display, Write}, net::Ipv4Addr, }, }; const MAX_NAME_LENGTH: usize = 32; const MAX_POSTNAME_LENGTH: usize = 64; const MAX_CODE_LENGTH: usize = 1024 * 4; const SESSION_DURATION_SECS: u64 = 60 * 60; const MAX_FEED_SIZE: usize = 8 * 1024; type Redirect = AppendHeaders<[(&'static str, &'static str); COUNT]>; macro_rules! static_asset { ($mime:literal, $body:literal) => { get(|| async { axum::http::Response::builder() .header("content-type", $mime) .header("content-encoding", "gzip") .body(axum::body::Body::from(Bytes::from_static(include_bytes!(concat!( $body, ".gz" ))))) .unwrap() }) }; } async fn amain() { use axum::routing::{delete, get, post}; let debug = cfg!(debug_assertions); log::set_logger(&Logger).unwrap(); log::set_max_level(if debug { log::LevelFilter::Warn } else { log::LevelFilter::Error }); db::init(); let router = axum::Router::new() .route("/", get(Index::page)) .route("/index.css", static_asset!("text/css", "index.css")) .route("/index.js", static_asset!("text/javascript", "index.js")) .route("/hbfmt.wasm", static_asset!("application/wasm", "hbfmt.wasm")) .route("/hbc.wasm", static_asset!("application/wasm", "hbc.wasm")) .route("/index-view", get(Index::get)) .route("/feed", get(Feed::page)) .route("/feed-view", get(Feed::get)) .route("/feed-more", post(Feed::more)) .route("/profile", get(Profile::page)) .route("/profile-view", get(Profile::get)) .route("/profile/:name", get(Profile::get_other_page)) .route("/profile/password", post(PasswordChange::post)) .route("/profile-view/:name", get(Profile::get_other)) .route("/post", get(Post::page)) .route("/post-view", get(Post::get)) .route("/post", post(Post::post)) .route("/code", post(fetch_code)) .route("/login", get(Login::page)) .route("/login-view", get(Login::get)) .route("/login", post(Login::post)) .route("/login", delete(Login::delete)) .route("/signup", get(Signup::page)) .route("/signup-view", get(Signup::get)) .route("/signup", post(Signup::post)) .route( "/hot-reload", get({ let id = std::time::SystemTime::now() .duration_since(std::time::SystemTime::UNIX_EPOCH) .unwrap() .as_millis(); move || async move { id.to_string() } }), ) .layer(DefaultBodyLimit::max(16 * 1024)); #[cfg(feature = "tls")] { let addr = (Ipv4Addr::UNSPECIFIED, std::env::var("DEPELL_PORT").unwrap().parse::().unwrap()); let config = axum_server::tls_rustls::RustlsConfig::from_pem_file( std::env::var("DEPELL_CERT_PATH").unwrap(), std::env::var("DEPELL_KEY_PATH").unwrap(), ) .await .unwrap(); axum_server::bind_rustls(addr.into(), config) .serve(router.into_make_service()) .await .unwrap(); } #[cfg(not(feature = "tls"))] { let addr = (Ipv4Addr::UNSPECIFIED, 8080); let socket = tokio::net::TcpListener::bind(addr).await.unwrap(); axum::serve(socket, router).await.unwrap(); } } async fn fetch_code( axum::Json(paths): axum::Json>, ) -> axum::Json> { let mut deps = HashMap::::new(); db::with(|db| { for path in &paths { let Some((author, name)) = path.split_once('/') else { continue }; db.fetch_deps .query_map((name, author), |r| { Ok(( r.get::<_, String>(1)? + "/" + r.get_ref(0)?.as_str()?, r.get::<_, String>(2)?, )) }) .log("fetch deps query") .into_iter() .flatten() .filter_map(|r| r.log("deps row")) .collect_into(&mut deps); } }); axum::Json(deps) } #[derive(Deserialize)] #[serde(untagged)] enum Feed { Before { before_timestamp: u64 }, } #[derive(Deserialize)] struct Before { before_timestamp: u64, } impl Feed { async fn more(session: Session, axum::Form(data): axum::Form) -> Html { Self::Before { before_timestamp: data.before_timestamp }.render(&session) } } impl Default for Feed { fn default() -> Self { Self::Before { before_timestamp: now() + 3600 } } } impl Page for Feed { fn render_to_buf(self, _: &Session, buf: &mut String) { db::with(|db| { let cursor = match self { Feed::Before { before_timestamp } => db .get_pots_before .query_map((before_timestamp,), Post::from_row) .log("fetch before posts query") .into_iter() .flatten() .filter_map(|r| r.log("fetch before posts row")), }; let base_len = buf.len(); let mut last_timestamp = None; for post in cursor { write!(buf, "{}", post).unwrap(); if buf.len() - base_len > MAX_FEED_SIZE { last_timestamp = Some(post.timestamp); break; } } write_html!((*buf) if let Some(last_timestamp) = last_timestamp {
"there might be more"
} else { "no more stuff" } ); }); } } #[derive(Default)] struct Index; impl PublicPage for Index { fn render_to_buf(self, buf: &mut String) { buf.push_str(include_str!("welcome-page.html")); } } #[derive(Deserialize, Default)] struct Post { author: String, name: String, #[serde(skip)] timestamp: u64, #[serde(skip)] imports: usize, #[serde(skip)] runs: usize, #[serde(skip)] dependencies: usize, code: String, #[serde(skip)] error: Option<&'static str>, } impl Page for Post { fn render_to_buf(self, session: &Session, buf: &mut String) { let Self { name, code, error, .. } = self; write_html! { (buf)
if let Some(e) = error {
e
}
MAX_CODE_LENGTH

            
!{include_str!("post-page.html")} } } } impl Post { pub fn from_row(r: &rusqlite::Row) -> rusqlite::Result { Ok(Post { author: r.get(0)?, name: r.get(1)?, timestamp: r.get(2)?, code: r.get(3)?, imports: r.get(4)?, ..Default::default() }) } async fn post( session: Session, axum::Form(mut data): axum::Form, ) -> Result> { if data.name.len() > MAX_POSTNAME_LENGTH { data.error = Some(formatcp!("name too long, max length is {MAX_POSTNAME_LENGTH}")); return Err(data.render(&session)); } if data.code.len() > MAX_CODE_LENGTH { data.error = Some(formatcp!("code too long, max length is {MAX_CODE_LENGTH}")); return Err(data.render(&session)); } db::with(|db| { if let Err(e) = db.create_post.insert((&data.name, &session.name, now(), &data.code)) { if let rusqlite::Error::SqliteFailure(e, _) = e { if e.code == rusqlite::ErrorCode::ConstraintViolation { data.error = Some("this name is already used"); } } data.error = data.error.or_else(|| { log::error!("create post error: {e}"); Some("internal server error") }); return; } for (author, name) in hblang::lexer::Lexer::uses(&data.code) .filter_map(|v| v.split_once('/')) .collect::>() { if db .create_import .insert((author, name, &session.name, &data.name)) .log("create import query") .is_none() { data.error = Some("internal server error"); return; }; } }); if data.error.is_some() { Err(data.render(&session)) } else { Ok(redirect("/profile")) } } } impl fmt::Display for Post { fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { let Self { author, name, timestamp, imports, runs, dependencies, code, .. } = self; write_html! { f
author "/" name timestamp for (name, count) in [include_str!("icons/download.svg"), "runs", "deps"] .iter() .zip([imports, runs, dependencies]) .filter(|(_, &c)| c != 0) {
!name count
}
code
if *timestamp == 0 { }
} Ok(()) } } #[derive(Deserialize, Default)] struct PasswordChange { old_password: String, new_password: String, #[serde(skip)] error: Option<&'static str>, } impl PasswordChange { async fn post( session: Session, axum::Form(mut change): axum::Form, ) -> Html { db::with(|que| { match que.authenticate.query_row((&session.name,), |r| r.get::<_, String>(1)) { Ok(hash) if verify_password(&hash, &change.old_password).is_err() => { change.error = Some("invalid credentials"); } Ok(_) => { let new_hashed = hash_password(&change.new_password); match que .change_passowrd .execute((new_hashed, &session.name)) .log("execute update") { None => change.error = Some("intenal server error"), Some(0) => change.error = Some("password is incorrect"), Some(_) => {} } } Err(rusqlite::Error::QueryReturnedNoRows) => { change.error = Some("invalid credentials"); } Err(e) => { log::error!("login queri failed: {e}"); change.error = Some("internal server error"); } } }); if change.error.is_some() { change.render(&session) } else { PasswordChange::default().render(&session) } } } impl Page for PasswordChange { fn render_to_buf(self, _: &Session, buf: &mut String) { let Self { old_password, new_password, error } = self; write_html! { (buf)
if let Some(e) = error {
e
}
} } } #[derive(Default)] struct Profile { other: Option, } impl Profile { async fn get_other(session: Session, Path(name): Path) -> Html { Profile { other: Some(name) }.render(&session) } async fn get_other_page(session: Session, Path(name): Path) -> Html { base(|b| Profile { other: Some(name) }.render_to_buf(&session, b), Some(&session)) } } impl Page for Profile { fn render_to_buf(self, session: &Session, buf: &mut String) { db::with(|db| { let name = self.other.as_ref().unwrap_or(&session.name); let iter = db .get_user_posts .query_map((name,), Post::from_row) .log("get user posts query") .into_iter() .flatten() .filter_map(|p| p.log("user post row")); write_html! { (*buf) if name == &session.name { |b|{PasswordChange::default().render_to_buf(session, b)} } for post in iter { !{post} } else { "no posts" } !{include_str!("profile-page.html")} } }) } } fn hash_password(password: &str) -> String { use argon2::PasswordHasher; argon2::Argon2::default() .hash_password(password.as_bytes(), &SaltString::generate(&mut OsRng)) .unwrap() .to_string() } fn verify_password(hash: &str, password: &str) -> Result<(), argon2::password_hash::Error> { argon2::Argon2::default() .verify_password(password.as_bytes(), &argon2::PasswordHash::new(hash)?) } #[derive(Serialize, Deserialize, Default, Debug)] struct Login { name: String, password: String, #[serde(skip)] error: Option<&'static str>, } impl PublicPage for Login { fn render_to_buf(self, buf: &mut String) { let Self { name, password, error } = self; write_html! { (buf)
if let Some(e) = error {
e
}
} } } impl Login { async fn post( axum::Form(mut data): axum::Form, ) -> Result, Html> { // TODO: hash password let mut id = [0u8; 32]; db::with(|db| match db.authenticate.query_row((&data.name,), |r| r.get::<_, String>(1)) { Ok(hash) => { if verify_password(&hash, &data.password).is_err() { data.error = Some("invalid credentials"); } else { getrandom::getrandom(&mut id).unwrap(); if db .login .insert((id, &data.name, now() + SESSION_DURATION_SECS)) .log("create session query") .is_none() { data.error = Some("internal server error"); } } } Err(rusqlite::Error::QueryReturnedNoRows) => { data.error = Some("invalid credentials"); } Err(e) => { log::error!("login queri failed: {e}"); data.error = Some("internal server error"); } }); if data.error.is_some() { Err(data.render()) } else { Ok(AppendHeaders([ ("hx-location", "/feed".into()), ( "set-cookie", format!( "id={}; SameSite=Strict; Secure; Max-Age={SESSION_DURATION_SECS}", to_hex(&id) ), ), ])) } } async fn delete(session: Session) -> Redirect { _ = db::with(|q| q.logout.execute((session.id,)).log("delete session query")); redirect("/login") } } #[derive(Serialize, Deserialize, Default)] struct Signup { name: String, new_password: String, confirm_password: String, #[serde(default)] confirm_no_password: bool, #[serde(skip)] error: Option<&'static str>, } impl PublicPage for Signup { fn render_to_buf(self, buf: &mut String) { let Signup { name, new_password, confirm_password, confirm_no_password, error } = self; let vals = if confirm_no_password { "{\"confirm_no_password\":true}" } else { "{}" }; write_html! { (buf)
if let Some(e) = error {
e
}
} } } impl Signup { async fn post(axum::Form(mut data): axum::Form) -> Result> { if data.name.len() > MAX_NAME_LENGTH { data.error = Some(formatcp!("name too long, max length is {MAX_NAME_LENGTH}")); return Err(data.render()); } if !data.confirm_no_password && data.new_password.is_empty() { data.confirm_no_password = true; data.error = Some("Are you sure you don't want to use a password? (then submit again)"); return Err(data.render()); } db::with(|db| { // TODO: hash passwords match db.register.insert((&data.name, hash_password(&data.new_password))) { Ok(_) => {} Err(rusqlite::Error::SqliteFailure(e, _)) if e.code == rusqlite::ErrorCode::ConstraintViolation => { data.error = Some("username already taken"); } Err(e) => { log::error!("create user query: {e}"); data.error = Some("internal server error"); } }; }); if data.error.is_some() { Err(data.render()) } else { Ok(redirect("/login")) } } } fn base(body: impl FnOnce(&mut String), session: Option<&Session>) -> Html { let username = session.map(|s| &s.name); let nav_button = |f: &mut String, name: &str| { write_html! {(f) } }; Html(html! { "" "depell"
|f|{body(f)}
}) } struct Session { name: String, id: [u8; 32], } #[axum::async_trait] impl axum::extract::FromRequestParts for Session { /// If the extractor fails it'll use this "rejection" type. A rejection is /// a kind of error that can be converted into a response. type Rejection = Redirect; /// Perform the extraction. async fn from_request_parts(parts: &mut Parts, _: &S) -> Result { let err = redirect("/login"); let value = parts .headers .get_all(COOKIE) .into_iter() .find_map(|c| c.to_str().ok()?.trim().strip_prefix("id=")) .map(|c| c.split_once(';').unwrap_or((c, "")).0) .ok_or(err)?; let mut id = [0u8; 32]; parse_hex(value, &mut id).ok_or(err)?; let (name, expiration) = db::with(|db| { db.get_session .query_row((id,), |r| Ok((r.get::<_, String>(0)?, r.get::<_, u64>(1)?))) .log("fetching session") .ok_or(err) })?; if expiration < now() { return Err(err); } Ok(Self { name, id }) } } fn now() -> u64 { std::time::SystemTime::now() .duration_since(std::time::SystemTime::UNIX_EPOCH) .unwrap() .as_secs() } fn parse_hex(hex: &str, dst: &mut [u8]) -> Option<()> { fn hex_to_nibble(b: u8) -> Option { Some(match b { b'a'..=b'f' => b - b'a' + 10, b'A'..=b'F' => b - b'A' + 10, b'0'..=b'9' => b - b'0', _ => return None, }) } if hex.len() != dst.len() * 2 { return None; } for (d, p) in dst.iter_mut().zip(hex.as_bytes().chunks_exact(2)) { *d = (hex_to_nibble(p[0])? << 4) | hex_to_nibble(p[1])?; } Some(()) } fn to_hex(src: &[u8]) -> String { use std::fmt::Write; let mut buf = String::new(); for &b in src { write!(buf, "{b:02x}").unwrap() } buf } fn main() { tokio::runtime::Builder::new_current_thread().enable_all().build().unwrap().block_on(amain()); } mod db { use std::cell::RefCell; macro_rules! gen_queries { ($vis:vis struct $name:ident { $($qname:ident: $code:expr,)* }) => { $vis struct $name<'a> { $($vis $qname: rusqlite::Statement<'a>,)* } impl<'a> $name<'a> { fn new(db: &'a rusqlite::Connection) -> Self { Self { $($qname: db.prepare($code).unwrap(),)* } } } }; } gen_queries! { pub struct Queries { register: "INSERT INTO user (name, password_hash) VALUES(?, ?)", change_passowrd: "UPDATE user SET password_hash = ? WHERE name = ?", authenticate: "SELECT name, password_hash FROM user WHERE name = ?", login: "INSERT OR REPLACE INTO session (id, username, expiration) VALUES(?, ?, ?)", logout: "DELETE FROM session WHERE id = ?", get_session: "SELECT username, expiration FROM session WHERE id = ?", get_user_posts: "SELECT author, name, timestamp, code FROM post WHERE author = ? ORDER BY timestamp DESC", // TODO: we might want to cache the recursive queries get_pots_before: "SELECT author, name, timestamp, code, ( WITH RECURSIVE roots(name, author, code) AS ( SELECT name, author, code FROM post WHERE name = outher.name AND author = outher.author UNION SELECT post.name, post.author, post.code FROM post JOIN import ON post.name = import.from_name AND post.author = import.from_author JOIN roots ON import.to_name = roots.name AND import.to_author = roots.author ) SELECT (count(*) - 1) FROM roots ) AS imports FROM post AS outher WHERE timestamp < ?", create_post: "INSERT INTO post (name, author, timestamp, code) VALUES(?, ?, ?, ?)", fetch_deps: " WITH RECURSIVE roots(name, author, code) AS ( SELECT name, author, code FROM post WHERE name = ? AND author = ? UNION SELECT post.name, post.author, post.code FROM post JOIN import ON post.name = import.to_name AND post.author = import.to_author JOIN roots ON import.from_name = roots.name AND import.from_author = roots.author ) SELECT * FROM roots; ", create_import: "INSERT INTO import(to_author, to_name, from_author, from_name) VALUES(?, ?, ?, ?)", } } struct Db { queries: Queries<'static>, _db: Box, } impl Db { fn new() -> Self { let db = Box::new(rusqlite::Connection::open("db.sqlite").unwrap()); Self { queries: Queries::new(unsafe { std::mem::transmute::<&rusqlite::Connection, &rusqlite::Connection>(&db) }), _db: db, } } } pub fn with(with: impl FnOnce(&mut Queries) -> T) -> T { thread_local! { static DB_CONN: RefCell = RefCell::new(Db::new()); } DB_CONN.with_borrow_mut(|q| with(&mut q.queries)) } pub fn init() { const SCHEMA_VERSION: usize = 0; const MIGRATIONS: &[&str] = &[include_str!("migrations/1.sql")]; let db = rusqlite::Connection::open("db.sqlite").unwrap(); db.execute_batch(include_str!("schema.sql")).unwrap(); let schema_version = db.pragma_query_value(None, "user_version", |v| v.get::<_, usize>(0)).unwrap(); if schema_version != SCHEMA_VERSION { for &mig in &MIGRATIONS[schema_version..] { db.execute_batch(mig).expect(mig); } db.pragma_update(None, "user_version", SCHEMA_VERSION).unwrap(); } Queries::new(&db); } } fn redirect(to: &'static str) -> Redirect { AppendHeaders([("hx-location", to)]) } trait PublicPage: Default { fn render_to_buf(self, buf: &mut String); fn render(self) -> Html { let mut str = String::new(); self.render_to_buf(&mut str); Html(str) } async fn get() -> Html { Self::default().render() } async fn page(session: Option) -> Html { base(|s| Self::default().render_to_buf(s), session.as_ref()) } } trait Page: Default { fn render_to_buf(self, session: &Session, buf: &mut String); fn render(self, session: &Session) -> Html { let mut str = String::new(); self.render_to_buf(session, &mut str); Html(str) } async fn get(session: Session) -> Html { Self::default().render(&session) } async fn page(session: Option) -> Result, axum::response::Redirect> { match session { Some(session) => { Ok(base(|f| Self::default().render_to_buf(&session, f), Some(&session))) } None => Err(axum::response::Redirect::permanent("/login")), } } } trait ResultExt { fn log(self, prefix: impl Display) -> Option; } impl ResultExt for Result { fn log(self, prefix: impl Display) -> Option { match self { Ok(v) => Some(v), Err(e) => { log::error!("{prefix}: {e}"); None } } } } struct Logger; impl log::Log for Logger { fn enabled(&self, _: &log::Metadata) -> bool { true } fn log(&self, record: &log::Record) { if self.enabled(record.metadata()) { eprintln!("{} - {}", record.module_path().unwrap_or("=="), record.args()); } } fn flush(&self) {} }