From d84d2e63e6e81c7c38c0ed0bbc734240eafe53a0 Mon Sep 17 00:00:00 2001 From: AJ ONeal Date: Wed, 1 Aug 2018 19:13:10 -0600 Subject: [PATCH] feature complete!! (for the time spend I have for now) --- README.md | 27 ++++- chatserver.go | 267 +++++++++++++++++++++++++++++++--------------- public/index.html | 12 +-- 3 files changed, 215 insertions(+), 91 deletions(-) diff --git a/README.md b/README.md index f67e9ca..ed7b45c 100644 --- a/README.md +++ b/README.md @@ -6,16 +6,20 @@ Rudimentary go chat server as a fun project. ```bash git clone https://git.coolaj86.com/coolaj86/chat.go.git + go get gopkg.in/yaml.v2 go get github.com/emicklei/go-restful ``` +Note: I also copied some code directly from + + # Usage **Start the server** ```bash -go run chatserver.go -conf ./config.yml +go run -race chatserver.go -conf ./config.yml ``` See sample config file at `config.sample.yml`. @@ -27,3 +31,24 @@ You can connect multiple clients. ```bash telnet localhost 4080 ``` + +You can also use HTTP. The API docs and examples can be seen at + +``` +curl http://localhost:4080 +``` + + +Implemented +----- + +* [x] Awesome telnet server (would +* [x] HTTP API (no UI for the sake of time) +* [x] Multiplex the same port (because I wanted to learn) +* [x] E-mail "magic link" authentication (minus the link since it's localhost) + +Not Implemented +---- + +* [ ] Write to log file (just `go run ./chatserver.go > /path/to/log` +* [ ] Rooms diff --git a/chatserver.go b/chatserver.go index 5bd17b3..af769ef 100644 --- a/chatserver.go +++ b/chatserver.go @@ -1,6 +1,6 @@ package main -// TODO learn about chan chan's +// TODO learn more about chan chan's // http://marcio.io/2015/07/handling-1-million-requests-per-minute-with-golang/ import ( @@ -28,7 +28,7 @@ import ( ) // I'm not sure how to pass nested structs, so I de-nested this. -// TODO: Learn if passing nested structs is desirable? +// TODO Learn if passing nested structs is desirable? type Conf struct { Port uint `yaml:"port,omitempty"` Mailer ConfMailer @@ -50,7 +50,7 @@ type tcpUser struct { // https://stackoverflow.com/questions/51472020/how-to-get-the-size-of-available-tcp-data type bufferedConn struct { r *bufio.Reader - rout io.Reader + rout io.Reader // See https://github.com/polvi/sni/blob/master/sni.go#L135 net.Conn } @@ -77,18 +77,20 @@ func (b bufferedConn) Read(p []byte) (int, error) { // because... I can clean it up later type myMsg struct { sender net.Conn - bytes []byte - receivedAt time.Time - channel string - email string + Message string `json:"message"` + ReceivedAt time.Time `json:"received_at"` + Channel string `json:"channel"` + User string `json:"user"` +} +type JsonMsg struct { + Messages []myMsg `json:"messages"` } -var firstMsgs chan myMsg - +//var firstMsgs chan myMsg //var myRooms map[string](chan myMsg) -var myMsgs chan myMsg +var msgHistory []myMsg +var broadcastMsg chan myMsg -//var myUnsortedConns map[net.Conn]bool var newConns chan net.Conn var newTcpChat chan bufferedConn var authTcpChat chan tcpUser @@ -209,7 +211,7 @@ func handleRaw(bufConn bufferedConn) { panic(err) } // so I don't have to actually go check my email - fmt.Fprintf(os.Stdout, "\n== AUTHORIZATION ==\n[cheat code for %s]: %s\n", email, code) + fmt.Fprintf(os.Stdout, "\n== TELNET AUTHORIZATION ==\n[cheat code for %s]: %s\n", email, code) time.Sleep(150 * time.Millisecond) fmt.Fprintf(bufConn, " done\n") time.Sleep(150 * time.Millisecond) @@ -255,12 +257,12 @@ func handleRaw(bufConn bufferedConn) { //fmt.Fprintf(os.Stdout, "Queing message...\n") //myRooms["general"] <- myMsg{ - myMsgs <- myMsg{ - receivedAt: time.Now(), + broadcastMsg <- myMsg{ + ReceivedAt: time.Now(), sender: bufConn, - bytes: buf[0:count], - channel: "general", - email: email, + Message: string(buf[0:count]), + Channel: "general", + User: email, } //fmt.Fprintf(bufConn, "> ") } @@ -326,10 +328,10 @@ func handleSorted(conn bufferedConn) { /* firstMsgs <- myMsg{ - receivedAt: time.Now(), + ReceivedAt: time.Now(), sender: conn, - bytes: firstMsg, - channel: "general", + Message: firstMsg, + Channel: "general", } // TODO @@ -356,11 +358,11 @@ func handleSorted(conn bufferedConn) { continue } //myRooms["general"] <- myMsg{ - myMsgs <- myMsg{ - receivedAt: time.Now(), + broadcastMsg <- myMsg{ + ReceivedAt: time.Now(), sender: conn, - bytes: buf[0:count], - channel: "general", + Message: string(buf[0:count]), + Channel: "general", } } */ @@ -373,13 +375,7 @@ func handleConnection(netConn net.Conn) { m := sync.Mutex{} virgin := true - // Why don't these work? - //buf := make([]byte, 0, 1024) - //buf := []byte{} - // But this does - bufConn := newBufferedConn(netConn) - //myUnsortedConns[bufConn] = true go func() { // Handle First Packet _, err := bufConn.Peek(1) @@ -407,7 +403,9 @@ func handleConnection(netConn net.Conn) { virgin = false // don't block for this // let it be handled after the unlock - defer fmt.Fprintf(netConn, "\n\nWelcome to Sample Chat! You appear to be using Telnet.\nYou must authenticate via email to participate\n\nEmail: ") + defer fmt.Fprintf(netConn, + "\n\nWelcome to Sample Chat! You appear to be using Telnet (http is also available on this port)."+ + "\nYou must authenticate via email to participate\n\nEmail: ") } m.Unlock() } @@ -493,14 +491,15 @@ func serveHello(req *restful.Request, resp *restful.Response) { fmt.Fprintf(resp, "{\"msg\":\"hello\"}") } +// TODO I probably should just make the non-exportable properties private/lowercase type authReq struct { Cid string `json:"cid"` ChallengedAt time.Time `json:"-"` Chan chan authReq `json:"-"` - Code string `json:"code"` + Otp string `json:"otp"` CreatedAt time.Time `json:"-"` DidAuth bool `json:"-"` - Email string `json:"email"` + Subject string `json:"sub"` // Subject as in 'sub' as per OIDC VerifiedAt time.Time `json:"-"` Tries int `json:"-"` } @@ -508,54 +507,56 @@ type authReq struct { func requestAuth(req *restful.Request, resp *restful.Response) { ar := authReq{ CreatedAt: time.Now(), + DidAuth: false, Tries: 0, } + // Not sure why go restful finds it easier to do ReadEntity() than the "normal" way... + // err := json.NewDecoder(req.Body).Decode(&ar) err := req.ReadEntity(&ar) - // Looks like restful handles JSON automatically? - /* - err := json.NewDecoder(req.Body).Decode(&ar) - */ if nil != err { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"bad json in request body\"} }") return } - email := strings.TrimSpace(ar.Email) + email := strings.TrimSpace(ar.Subject) emailParts := strings.Split(email, "@") + // TODO better pre-mailer validation (whitelist characters or use lib) if 2 != len(emailParts) { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"bad email address '"+email+"'\"} }") return } + ar.Subject = email - var code string + var otp string if "" != config.Mailer.ApiKey { - code, err = sendAuthCode(config.Mailer, email) + otp, err = sendAuthCode(config.Mailer, ar.Subject) if nil != err { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"error sending auth code via mailgun\" } }") return } } - if "" == code { - code, err = genAuthCode() + if "" == otp { + otp, err = genAuthCode() if nil != err { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"error generating random number (code)\"} }") return } } + ar.Otp = otp - fmt.Fprintf(os.Stdout, "\n== AUTHORIZATION ==\n[cheat code for %s]: %s\n", ar.Email, ar.Code) + // Cheat code in case you didn't set up mailgun keys + fmt.Fprintf(os.Stdout, "\n== HTTP AUTHORIZATION ==\n[cheat code for %s]: %s\n", ar.Subject, ar.Otp) cid, _ := genAuthCode() if "" == cid { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"error generating random number (cid)\"} }") } ar.Cid = cid - ar.DidAuth = false - ar.Email = email - ar.Code = code newAuthReqs <- ar + // Not sure why this works... technically there needs to be some sort of "end" + // maybe it just figures that if I've returned fmt.Fprintf(resp, "{ \"success\": true, \"cid\": \""+ar.Cid+"\" }") } @@ -581,6 +582,11 @@ func issueToken(req *restful.Request, resp *restful.Response) { av := <-ar.Chan close(ar.Chan) ar.Chan = nil + // TODO use a pointer instead? + if "" == av.Otp { + fmt.Fprintf(resp, "{ \"error\": { \"message\": \"invalid request: empty authorization challenge\"} }") + return + } av.Tries += 1 av.ChallengedAt = time.Now() @@ -590,13 +596,13 @@ func issueToken(req *restful.Request, resp *restful.Response) { // * CreatedAt is not more than 15 minutes old // Probably also need to make sure than not more than n emails are sent per y minutes - // Not that this would even matter with the above, just a habit - if 1 != subtle.ConstantTimeCompare([]byte(av.Code), []byte(ar.Code)) { + // Not that this would even matter if the above were implemented, just a habit + if 1 != subtle.ConstantTimeCompare([]byte(av.Otp), []byte(ar.Otp)) { fmt.Fprintf(resp, "{ \"error\": { \"message\": \"invalid authorization code\"} }") // I'm not sure if this is necessary, but I think it is // to overwrite the original with the updated // (these are copies, not pointers, IIRC) - // of course, should use a DB anyway... + // and it seems like this is how I might write to a DB anyway newAuthReqs <- av return } @@ -604,19 +610,85 @@ func issueToken(req *restful.Request, resp *restful.Response) { ar.VerifiedAt = time.Now() newAuthReqs <- av + // TODO I would use a JWT, but I need to wrap up this project fmt.Fprintf(resp, "{ \"success\": true, \"token\": \""+ar.Cid+"\" }") } func requireToken(req *restful.Request, resp *restful.Response, chain *restful.FilterChain) { - //req.SetAttribute("go", "there") - //req.Attribute("go") // "there" + ar := authReq{} + + auth := req.HeaderParameter("Authorization") + if "" == auth { + fmt.Fprintf(resp, "{ \"error\": { \"message\": \"missing Authorization header\"} }") + return + } + authParts := strings.Split(auth, " ") + if "bearer" != strings.ToLower(authParts[0]) || "" == authParts[1] { + fmt.Fprintf(resp, "{ \"error\": { \"message\": \"expected 'Authorization: Bearer '\"} }") + return + } + + ar.Cid = authParts[1] + ar.Chan = make(chan authReq) + valAuthReqs <- ar + av := <-ar.Chan + close(ar.Chan) + ar.Chan = nil + // TODO use a pointer instead? + if "" == av.Cid { + fmt.Fprintf(resp, "{ \"error\": { \"message\": \"invalid token: no session found\"} }") + return + } + + // I prefer testing for "if not good" to "if bad" + // (much safer in the dynamic world I come from) + if true != av.DidAuth { + fmt.Fprintf(resp, "{ \"error\": { \"message\": \"bad session'\"} }") + return + } + + req.SetAttribute("user", av.Subject) chain.ProcessFilter(req, resp) } func listMsgs(req *restful.Request, resp *restful.Response) { - fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_NO_IMPL\", \"message\": \"invalid authorization code\"} }") + // TODO support ?since= + // Also, data race? the list could be added to while this is iterating? + // For now we'll just let the client sort the list + resp.WriteEntity(&JsonMsg{ + Messages: msgHistory, + }) } func postMsg(req *restful.Request, resp *restful.Response) { - fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_NO_IMPL\", \"message\": \"invalid authorization code\"} }") + user, ok := req.Attribute("user").(string) + if !ok { + fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_SANITY\", \"message\": \"SANITY FAIL user was not set, nor session error sent\"} }") + return + } + if "" == user { + fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_SESSION\", \"message\": \"invalid session\"} }") + return + } + + msg := myMsg{} + err := req.ReadEntity(&msg) + if nil != err { + fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_FORMAT\", \"message\": \"invalid json POST\"} }") + return + } + + msg.sender = nil + msg.ReceivedAt = time.Now() + msg.User = user + if "" == msg.Channel { + msg.Channel = "general" + } + if "" == msg.Message { + fmt.Fprintf(resp, "{ \"error\": { \"code\": \"E_FORMAT\", \"message\": \"please specify a 'message'\"} }") + return + } + broadcastMsg <- msg + + fmt.Fprintf(resp, "{ \"success\": true }") } func main() { @@ -640,24 +712,35 @@ func main() { config.RootPath = "./public" } - myRawConns := make(map[bufferedConn]bool) - myAuthReqs := make(map[string]authReq) - firstMsgs = make(chan myMsg, 128) - //myRooms = make(map[string](chan myMsg)) + // The magical sorting hat newConns = make(chan net.Conn, 128) + + // TCP & Authentication + myRawConns := make(map[bufferedConn]bool) + newTcpChat = make(chan bufferedConn, 128) authTcpChat = make(chan tcpUser, 128) + + // HTTP & Authentication + myAuthReqs := make(map[string]authReq) newAuthReqs = make(chan authReq, 128) valAuthReqs = make(chan authReq, 128) delAuthReqs = make(chan authReq, 128) - newTcpChat = make(chan bufferedConn, 128) newHttpChat = make(chan bufferedConn, 128) newHttpClient = make(chan bufferedConn, 128) - //myUnsortedConns = make(map[net.Conn]bool) - // TODO dynamically select on channels? - // https://stackoverflow.com/questions/19992334/how-to-listen-to-n-channels-dynamic-select-statement + // cruft to delete + //myRooms = make(map[string](chan myMsg)) + //firstMsgs = make(chan myMsg, 128) + //myRooms["general"] = make(chan myMsg, 128) - myMsgs = make(chan myMsg, 128) + // Note: I had considered dynamically select on channels for rooms. + // https://stackoverflow.com/questions/19992334/how-to-listen-to-n-channels-dynamic-select-statement + // I don't think that's actually the best approach, but I just wanted to save the link + + broadcastMsg = make(chan myMsg, 128) + // Poor-Man's container/ring (circular buffer) + msgHistory = make([]myMsg, 128) + msgIndex := 0 var addr string if 0 != int(*port) { @@ -730,20 +813,26 @@ func main() { myRawConns[u.bufConn] = true // is chan chan the right way to handle this? u.userCount <- len(myRawConns) - myMsgs <- myMsg{ + broadcastMsg <- myMsg{ sender: nil, // TODO fmt.Fprintf()? template? - bytes: []byte("<" + u.email + "> joined #general\n"), - receivedAt: time.Now(), - channel: "general", - email: "system", + Message: "<" + u.email + "> joined #general\n", + ReceivedAt: time.Now(), + Channel: "general", + User: "system", } case ar := <-newAuthReqs: myAuthReqs[ar.Cid] = ar - case av := <-valAuthReqs: + case ar := <-valAuthReqs: // TODO In this case it's probably more conventional (and efficient) to // use struct with a mutex and the authReqs map than a chan chan - av.Chan <- myAuthReqs[av.Cid] + av, ok := myAuthReqs[ar.Cid] + //ar.Chan <- nil // TODO + if ok { + ar.Chan <- av + } else { + ar.Chan <- authReq{} + } case ar := <-delAuthReqs: delete(myAuthReqs, ar.Cid) case bufConn := <-newTcpChat: @@ -758,9 +847,15 @@ func main() { //delete(myRooms["general"], bufConn) case bufConn := <-newHttpClient: // this will be Accept()ed immediately by restful + // NOTE: we don't store these HTTP connections for broadcast + // as we manage the session by HTTP Auth Bearer rather than TCP myHttpServer.chans <- bufConn - case msg := <-myMsgs: - t := msg.receivedAt + case msg := <-broadcastMsg: + msgHistory[msgIndex] = msg + msgIndex += 1 + msgIndex %= len(msgHistory) + + t := msg.ReceivedAt tf := "%d-%02d-%02d %02d:%02d:%02d (%s)" var sender string if nil != msg.sender { @@ -768,16 +863,18 @@ func main() { } else { sender = "system" } + // Tangential thought: // I wonder if we could use IP detection to get the client's tz // ... could probably make time for this in the authentication loop - zone, _ := msg.receivedAt.Zone() + zone, _ := msg.ReceivedAt.Zone() - //ts, err := msg.receivedAt.MarshalJSON() + // TODO put logging here + //ts, err := msg.ReceivedAt.MarshalJSON() fmt.Fprintf(os.Stdout, tf+" [%s] (%s):\n\t%s", t.Year(), t.Month(), t.Day(), t.Hour(), t.Minute(), t.Second(), zone, sender, - msg.email, msg.bytes) + msg.User, msg.Message) for conn, _ := range myRawConns { // Don't echo back to the original client @@ -796,21 +893,23 @@ func main() { _, err := fmt.Fprintf(conn, tf+" [%s]: %s", t.Year(), t.Month(), t.Day(), t.Hour(), t.Minute(), t.Second(), zone, - msg.email, msg.bytes) + msg.User, msg.Message) if nil != err { delTcpChat <- conn } }(conn) } - case msg := <-firstMsgs: - fmt.Fprintf(os.Stdout, "f [First Message]\n") - ts, err := msg.receivedAt.MarshalJSON() - if nil != err { - fmt.Fprintf(os.Stderr, "f [Error] %s\n", err) - } - fmt.Fprintf(os.Stdout, "f [Timestamp] %s\n", ts) - fmt.Fprintf(os.Stdout, "f [Remote] %s\n", msg.sender.RemoteAddr().String()) - fmt.Fprintf(os.Stdout, "f [Message] %s\n", msg.bytes) + /* + case msg := <-firstMsgs: + fmt.Fprintf(os.Stdout, "f [First Message]\n") + ts, err := msg.ReceivedAt.MarshalJSON() + if nil != err { + fmt.Fprintf(os.Stderr, "f [Error] %s\n", err) + } + fmt.Fprintf(os.Stdout, "f [Timestamp] %s\n", ts) + fmt.Fprintf(os.Stdout, "f [Remote] %s\n", msg.sender.RemoteAddr().String()) + fmt.Fprintf(os.Stdout, "f [Message] %s\n", msg.Message) + */ } } } diff --git a/public/index.html b/public/index.html index 1a6dc11..f44ba22 100644 --- a/public/index.html +++ b/public/index.html @@ -3,23 +3,23 @@ Sample Chat
# Ask for an auth code (swap sub)
-curl -X POST https://localhost:4080/api/session \
+curl -X POST http://localhost:4080/api/sessions \
   -H 'Content-Type: application/json; charset=utf-8' \
   -d '{"sub":"jon@example.com"}'
 
 # Validate auth code (swap session id, sub, and otp)
-curl -X POST https://localhost:4080/api/session/xyz \
+curl -X POST http://localhost:4080/api/sessions/xyz \
   -H 'Content-Type: application/json; charset=utf-8' \
-  -d '{"sub":"jon@example.com","otp":"secret123"}'
+  -d '{"otp":"secret123"}'
 
 # Post a message (swap api-token)
-curl -X POST https://localhost:4080/api/rooms/general \
+curl -X POST http://localhost:4080/api/rooms/general \
   -H 'Authorization: Bearer api-token' \
   -H 'Content-Type: application/json; charset=utf-8' \
-  -d '{"msg":"hello"}'
+  -d '{"message":"hello"}'
 
 # Get a room's messages (swap api-token, since unix-epoch)
-curl https://localhost:4080/api/rooms/general?since=0 \
+curl http://localhost:4080/api/rooms/general?since=0 \
   -H 'Authorization: Bearer api-token'