-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #467 from fawick/master
Merging restic-server
- Loading branch information
Showing
8 changed files
with
649 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
# Compiled Object files, Static and Dynamic libs (Shared Objects) | ||
*.o | ||
*.a | ||
*.so | ||
|
||
# Folders | ||
_obj | ||
_test | ||
|
||
# Architecture specific extensions/prefixes | ||
*.[568vq] | ||
[568vq].out | ||
|
||
*.cgo1.go | ||
*.cgo2.c | ||
_cgo_defun.c | ||
_cgo_gotypes.go | ||
_cgo_export.* | ||
|
||
_testmain.go | ||
|
||
*.exe | ||
*.test | ||
*.prof |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
Copyright (c) 2015, Bertil Chapuis | ||
All rights reserved. | ||
|
||
Redistribution and use in source and binary forms, with or without | ||
modification, are permitted provided that the following conditions are met: | ||
|
||
* Redistributions of source code must retain the above copyright notice, this | ||
list of conditions and the following disclaimer. | ||
|
||
* Redistributions in binary form must reproduce the above copyright notice, | ||
this list of conditions and the following disclaimer in the documentation | ||
and/or other materials provided with the distribution. | ||
|
||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | ||
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE | ||
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | ||
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER | ||
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | ||
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | ||
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# Restic Server | ||
|
||
Restic Server is a sample server that implement restic's rest backend api. | ||
It has been developed for demonstration purpose and is not intented to be used in production. | ||
|
||
## Getting started | ||
|
||
By default the server persists backup data in `/tmp/restic`. | ||
Build and start the server with a custom persistence directory: | ||
|
||
``` | ||
go build | ||
./restic-server -path /user/home/backup | ||
``` | ||
|
||
The server use an `.htpasswd` file to specify users. You can create such a file at the root of the persistence directory by executing the following command. In order to append new user to the file, just omit the `-c` argument. | ||
|
||
``` | ||
htpasswd -s -c .htpasswd username | ||
``` | ||
|
||
By default the server uses http. This is not very secure since with Basic Authentication, username and passwords will be present in every request. In order to enable TLS support just add the `-tls` argument and add a private and public key at the root of your persistence directory. | ||
|
||
Signed certificate are required by the restic backend but if you just want to test the feature you can generate unsigned keys with the following commands: | ||
|
||
``` | ||
openssl genrsa -out private_key 2048 | ||
openssl req -new -x509 -key private_key -out public_key -days 365 | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,192 @@ | ||
// +build go1.4 | ||
|
||
package main | ||
|
||
import ( | ||
"encoding/json" | ||
"fmt" | ||
"io" | ||
"io/ioutil" | ||
"net/http" | ||
"os" | ||
"path/filepath" | ||
"strings" | ||
"time" | ||
) | ||
|
||
// Context contains repository meta-data. | ||
type Context struct { | ||
path string | ||
} | ||
|
||
// AuthHandler wraps h with a http.HandlerFunc that performs basic | ||
// authentication against the user/passwords pairs stored in f and returns the | ||
// http.HandlerFunc. | ||
func AuthHandler(f *HtpasswdFile, h http.Handler) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
username, password, ok := r.BasicAuth() | ||
if !ok { | ||
http.Error(w, "401 unauthorized", 401) | ||
return | ||
} | ||
if !f.Validate(username, password) { | ||
http.Error(w, "401 unauthorized", 401) | ||
return | ||
} | ||
h.ServeHTTP(w, r) | ||
} | ||
} | ||
|
||
// CheckConfig returns a http.HandlerFunc that checks whether | ||
// a configuration exists. | ||
func CheckConfig(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
config := filepath.Join(c.path, "config") | ||
st, err := os.Stat(config) | ||
if err != nil { | ||
http.Error(w, "404 not found", 404) | ||
return | ||
} | ||
w.Header().Add("Content-Length", fmt.Sprint(st.Size())) | ||
} | ||
} | ||
|
||
// GetConfig returns a http.HandlerFunc that allows for a | ||
// config to be retrieved. | ||
func GetConfig(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
config := filepath.Join(c.path, "config") | ||
bytes, err := ioutil.ReadFile(config) | ||
if err != nil { | ||
http.Error(w, "404 not found", 404) | ||
return | ||
} | ||
w.Write(bytes) | ||
} | ||
} | ||
|
||
// SaveConfig returns a http.HandlerFunc that allows for a | ||
// config to be saved. | ||
func SaveConfig(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
config := filepath.Join(c.path, "config") | ||
bytes, err := ioutil.ReadAll(r.Body) | ||
if err != nil { | ||
http.Error(w, "400 bad request", 400) | ||
return | ||
} | ||
errw := ioutil.WriteFile(config, bytes, 0600) | ||
if errw != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
return | ||
} | ||
w.Write([]byte("200 ok")) | ||
} | ||
} | ||
|
||
// ListBlobs returns a http.HandlerFunc that lists | ||
// all blobs of a given type in an arbitrary order. | ||
func ListBlobs(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
vars := strings.Split(r.RequestURI, "/") | ||
dir := vars[1] | ||
path := filepath.Join(c.path, dir) | ||
files, err := ioutil.ReadDir(path) | ||
if err != nil { | ||
http.Error(w, "404 not found", 404) | ||
return | ||
} | ||
names := make([]string, len(files)) | ||
for i, f := range files { | ||
names[i] = f.Name() | ||
} | ||
data, err := json.Marshal(names) | ||
if err != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
return | ||
} | ||
w.Write(data) | ||
} | ||
} | ||
|
||
// CheckBlob reutrns a http.HandlerFunc that tests whether a blob exists | ||
// and returns 200, if it does, or 404 otherwise. | ||
func CheckBlob(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
vars := strings.Split(r.RequestURI, "/") | ||
dir := vars[1] | ||
name := vars[2] | ||
path := filepath.Join(c.path, dir, name) | ||
st, err := os.Stat(path) | ||
if err != nil { | ||
http.Error(w, "404 not found", 404) | ||
return | ||
} | ||
w.Header().Add("Content-Length", fmt.Sprint(st.Size())) | ||
} | ||
} | ||
|
||
// GetBlob returns a http.HandlerFunc that retrieves a blob | ||
// from the repository. | ||
func GetBlob(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
vars := strings.Split(r.RequestURI, "/") | ||
dir := vars[1] | ||
name := vars[2] | ||
path := filepath.Join(c.path, dir, name) | ||
file, err := os.Open(path) | ||
if err != nil { | ||
http.Error(w, "404 not found", 404) | ||
return | ||
} | ||
defer file.Close() | ||
http.ServeContent(w, r, "", time.Unix(0, 0), file) | ||
} | ||
} | ||
|
||
// SaveBlob returns a http.HandlerFunc that saves a blob to the repository. | ||
func SaveBlob(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
vars := strings.Split(r.RequestURI, "/") | ||
dir := vars[1] | ||
name := vars[2] | ||
path := filepath.Join(c.path, dir, name) | ||
tmp := path + "_tmp" | ||
tf, err := os.OpenFile(tmp, os.O_CREATE|os.O_WRONLY, 0600) | ||
if err != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
return | ||
} | ||
if _, err := io.Copy(tf, r.Body); err != nil { | ||
http.Error(w, "400 bad request", 400) | ||
tf.Close() | ||
os.Remove(tmp) | ||
return | ||
} | ||
if err := tf.Close(); err != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
} | ||
if err := os.Rename(tmp, path); err != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
return | ||
} | ||
w.Write([]byte("200 ok")) | ||
} | ||
} | ||
|
||
// DeleteBlob returns a http.HandlerFunc that deletes a blob from the | ||
// repository. | ||
func DeleteBlob(c *Context) http.HandlerFunc { | ||
return func(w http.ResponseWriter, r *http.Request) { | ||
vars := strings.Split(r.RequestURI, "/") | ||
dir := vars[1] | ||
name := vars[2] | ||
path := filepath.Join(c.path, dir, name) | ||
err := os.Remove(path) | ||
if err != nil { | ||
http.Error(w, "500 internal server error", 500) | ||
return | ||
} | ||
w.Write([]byte("200 ok")) | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,96 @@ | ||
// +build go1.4 | ||
|
||
package main | ||
|
||
/* | ||
Copied from: github.com/bitly/oauth2_proxy | ||
MIT License | ||
Permission is hereby granted, free of charge, to any person obtaining a copy | ||
of this software and associated documentation files (the "Software"), to deal | ||
in the Software without restriction, including without limitation the rights | ||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
copies of the Software, and to permit persons to whom the Software is | ||
furnished to do so, subject to the following conditions: | ||
The above copyright notice and this permission notice shall be included in | ||
all copies or substantial portions of the Software. | ||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
THE SOFTWARE. | ||
*/ | ||
|
||
import ( | ||
"crypto/sha1" | ||
"encoding/base64" | ||
"encoding/csv" | ||
"io" | ||
"log" | ||
"os" | ||
) | ||
|
||
// lookup passwords in a htpasswd file | ||
// The entries must have been created with -s for SHA encryption | ||
|
||
// HtpasswdFile is a map for usernames to passwords. | ||
type HtpasswdFile struct { | ||
Users map[string]string | ||
} | ||
|
||
// NewHtpasswdFromFile reads the users and passwords from a htpasswd | ||
// file and returns them. If an error is encountered, it is returned, together | ||
// with a nil-Pointer for the HtpasswdFile. | ||
func NewHtpasswdFromFile(path string) (*HtpasswdFile, error) { | ||
r, err := os.Open(path) | ||
if err != nil { | ||
return nil, err | ||
} | ||
defer r.Close() | ||
return NewHtpasswd(r) | ||
} | ||
|
||
// NewHtpasswd reads the users and passwords from a htpasswd | ||
// datastream in file and returns them. If an error is encountered, | ||
// it is returned, together with a nil-Pointer for the HtpasswdFile. | ||
func NewHtpasswd(file io.Reader) (*HtpasswdFile, error) { | ||
cr := csv.NewReader(file) | ||
cr.Comma = ':' | ||
cr.Comment = '#' | ||
cr.TrimLeadingSpace = true | ||
|
||
records, err := cr.ReadAll() | ||
if err != nil { | ||
return nil, err | ||
} | ||
h := &HtpasswdFile{Users: make(map[string]string)} | ||
for _, record := range records { | ||
h.Users[record[0]] = record[1] | ||
} | ||
return h, nil | ||
} | ||
|
||
// Validate returns true if password matches the stored password | ||
// for user. If no password for user is stored, or the password | ||
// is wrong, false is returned. | ||
func (h *HtpasswdFile) Validate(user string, password string) bool { | ||
realPassword, exists := h.Users[user] | ||
if !exists { | ||
return false | ||
} | ||
if realPassword[:5] == "{SHA}" { | ||
d := sha1.New() | ||
d.Write([]byte(password)) | ||
if realPassword[5:] == base64.StdEncoding.EncodeToString(d.Sum(nil)) { | ||
return true | ||
} | ||
} else { | ||
log.Printf("Invalid htpasswd entry for %s. Must be a SHA entry.", user) | ||
} | ||
return false | ||
} |
Oops, something went wrong.