mangadex-home-rs/src/state.rs

126 lines
4.3 KiB
Rust
Raw Normal View History

2021-03-25 19:58:07 -07:00
use std::sync::{atomic::Ordering, Arc};
2021-03-22 14:47:56 -07:00
2021-03-25 21:07:32 -07:00
use crate::config::{CliArgs, SEND_SERVER_VERSION, VALIDATE_TOKENS};
2021-03-22 14:47:56 -07:00
use crate::ping::{Request, Response, Tls, CONTROL_CENTER_PING_URL};
2021-03-22 20:19:56 -07:00
use log::{error, info, warn};
2021-03-22 14:47:56 -07:00
use parking_lot::RwLock;
2021-03-25 21:07:32 -07:00
use rustls::sign::CertifiedKey;
2021-03-22 14:47:56 -07:00
use rustls::ResolvesServerCert;
use sodiumoxide::crypto::box_::PrecomputedKey;
use url::Url;
pub struct ServerState {
pub precomputed_key: PrecomputedKey,
pub image_server: Url,
pub tls_config: Tls,
2021-04-18 20:06:18 -07:00
pub url: Url,
pub url_overridden: bool,
2021-03-22 20:19:56 -07:00
pub log_state: LogState,
}
pub struct LogState {
pub was_paused_before: bool,
2021-03-22 14:47:56 -07:00
}
impl ServerState {
2021-03-25 18:06:54 -07:00
pub async fn init(secret: &str, config: &CliArgs) -> Result<Self, ()> {
2021-03-22 14:47:56 -07:00
let resp = reqwest::Client::new()
.post(CONTROL_CENTER_PING_URL)
2021-03-25 18:06:54 -07:00
.json(&Request::from((secret, config)))
2021-03-22 14:47:56 -07:00
.send()
.await;
2021-03-25 19:58:07 -07:00
if config.enable_server_string {
warn!("Client will send Server header in responses. This is not recommended!");
SEND_SERVER_VERSION.store(true, Ordering::Release);
}
2021-03-25 18:06:54 -07:00
2021-03-22 14:47:56 -07:00
match resp {
Ok(resp) => match resp.json::<Response>().await {
2021-04-18 20:06:18 -07:00
Ok(mut resp) => {
2021-03-22 14:47:56 -07:00
let key = resp
.token_key
.and_then(|key| {
if let Some(key) = base64::decode(&key)
.ok()
.and_then(|k| PrecomputedKey::from_slice(&k))
{
Some(key)
} else {
error!("Failed to parse token key: got {}", key);
None
}
})
.unwrap();
if resp.compromised {
2021-03-22 20:19:56 -07:00
error!("Got compromised response from control center!");
2021-03-22 14:47:56 -07:00
}
if resp.paused {
2021-03-22 20:19:56 -07:00
warn!("Control center has paused this node!");
2021-03-22 14:47:56 -07:00
}
2021-04-18 20:06:18 -07:00
if let Some(ref override_url) = config.override_upstream {
resp.image_server = override_url.clone();
warn!("Upstream URL overridden to: {}", resp.image_server);
} else {
}
2021-03-22 14:47:56 -07:00
info!("This client's URL has been set to {}", resp.url);
2021-04-18 20:06:18 -07:00
if config.disable_token_validation {
warn!("Token validation is explicitly disabled!");
2021-03-22 20:19:56 -07:00
} else {
2021-04-18 20:06:18 -07:00
if resp.force_tokens {
info!("This client will validate tokens.");
} else {
info!("This client will not validate tokens.");
}
VALIDATE_TOKENS.store(resp.force_tokens, Ordering::Release);
2021-03-22 14:47:56 -07:00
}
Ok(Self {
precomputed_key: key,
image_server: resp.image_server,
tls_config: resp.tls.unwrap(),
url: resp.url,
2021-04-18 20:06:18 -07:00
url_overridden: config.override_upstream.is_some(),
2021-03-22 20:19:56 -07:00
log_state: LogState {
was_paused_before: resp.paused,
},
2021-03-22 14:47:56 -07:00
})
}
Err(e) => {
warn!("Got malformed response: {}", e);
Err(())
}
},
Err(e) => match e {
e if e.is_timeout() => {
error!("Response timed out to control server. Is MangaDex down?");
Err(())
}
e => {
warn!("Failed to send request: {}", e);
Err(())
}
},
}
}
}
pub struct RwLockServerState(pub RwLock<ServerState>);
impl ResolvesServerCert for RwLockServerState {
fn resolve(&self, _: rustls::ClientHello) -> Option<CertifiedKey> {
let read_guard = self.0.read();
Some(CertifiedKey {
2021-03-25 21:07:32 -07:00
cert: read_guard.tls_config.certs.clone(),
key: Arc::clone(&read_guard.tls_config.priv_key),
2021-03-22 14:47:56 -07:00
ocsp: None,
sct_list: None,
})
}
}