Compare commits
9 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
b8be51799c
|
||
|
|
caa625e2d1
|
||
|
|
05df6253db | ||
|
|
b294d4fdc8
|
||
|
|
90bba0e527
|
||
|
|
b3922980db
|
||
|
|
7878834155 | ||
|
|
8f48e36da8
|
||
|
|
7e3eee56e0
|
3
Makefile
3
Makefile
@@ -1,7 +1,7 @@
|
||||
NAME=sour.is-keyproofs
|
||||
BUMP?=current
|
||||
DATE:=$(shell date -u +%FT%TZ)
|
||||
HASH:=$(shell git rev-pars HEAD 2> /dev/null)
|
||||
HASH:=$(shell git rev-parse HEAD 2> /dev/null)
|
||||
VERSION:=$(shell BUMP=$(BUMP) ./version.sh)
|
||||
|
||||
|
||||
@@ -14,6 +14,7 @@ version:
|
||||
@echo $(VERSION)
|
||||
tag:
|
||||
git tag -a v$(VERSION) -m "Version: $(VERSION)"
|
||||
git push --follow-tags
|
||||
release:
|
||||
@make tag BUMP=patch
|
||||
run:
|
||||
|
||||
2
go.mod
2
go.mod
@@ -3,12 +3,14 @@ module github.com/sour-is/keyproofs
|
||||
go 1.15
|
||||
|
||||
require (
|
||||
github.com/disintegration/imaging v1.6.2
|
||||
github.com/fsnotify/fsnotify v1.4.7
|
||||
github.com/go-chi/chi v4.1.2+incompatible
|
||||
github.com/google/go-cmp v0.5.4 // indirect
|
||||
github.com/hashicorp/golang-lru v0.5.4
|
||||
github.com/joho/godotenv v1.3.0
|
||||
github.com/lucasb-eyer/go-colorful v1.0.3
|
||||
github.com/nullrocks/identicon v0.0.0-20180626043057-7875f45b0022
|
||||
github.com/rs/cors v1.7.0
|
||||
github.com/rs/zerolog v1.20.0
|
||||
github.com/russross/blackfriday v1.5.2
|
||||
|
||||
6
go.sum
6
go.sum
@@ -9,6 +9,8 @@ github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7
|
||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/disintegration/imaging v1.6.2 h1:w1LecBlG2Lnp8B3jk5zSuNqd7b4DXhcjwek1ei82L+c=
|
||||
github.com/disintegration/imaging v1.6.2/go.mod h1:44/5580QXChDfwIclfc/PCwrr44amcmDAg8hxG0Ewe4=
|
||||
github.com/edsrzf/mmap-go v1.0.0/go.mod h1:YO35OhQPt3KJa3ryjFM5Bs14WD66h8eGKpfaBNrHW5M=
|
||||
github.com/fatih/color v1.6.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
|
||||
github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
|
||||
@@ -60,6 +62,8 @@ github.com/mattn/go-colorable v0.1.2/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVc
|
||||
github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4=
|
||||
github.com/mattn/go-isatty v0.0.8/go.mod h1:Iq45c/XA43vh69/j3iqttzPXn0bhXyGjM0Hdxcsrc5s=
|
||||
github.com/mattn/go-isatty v0.0.9/go.mod h1:YNRxwqDuOph6SZLI9vUUz6OYw3QyUt7WiY2yME+cCiQ=
|
||||
github.com/nullrocks/identicon v0.0.0-20180626043057-7875f45b0022 h1:Ys0rDzh8s4UMlGaDa1UTA0sfKgvF0hQZzTYX8ktjiDc=
|
||||
github.com/nullrocks/identicon v0.0.0-20180626043057-7875f45b0022/go.mod h1:x4NsS+uc7ecH/Cbm9xKQ6XzmJM57rWTkjywjfB2yQ18=
|
||||
github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
||||
github.com/onsi/ginkgo v1.8.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
||||
github.com/onsi/gomega v1.4.3/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
|
||||
@@ -112,6 +116,8 @@ golang.org/x/crypto v0.0.0-20201117144127-c1f2f97bffc9 h1:phUcVbl53swtrUN8kQEXFh
|
||||
golang.org/x/crypto v0.0.0-20201117144127-c1f2f97bffc9/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I=
|
||||
golang.org/x/crypto v0.0.0-20201124201722-c8d3bf9c5392 h1:xYJJ3S178yv++9zXV/hnr29plCAGO9vAFG9dorqaFQc=
|
||||
golang.org/x/crypto v0.0.0-20201124201722-c8d3bf9c5392/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I=
|
||||
golang.org/x/image v0.0.0-20191009234506-e7c1f5e7dbb8 h1:hVwzHzIUGRjiF7EcUjqNxk3NCfkPxbDKRdnNE1Rpg0U=
|
||||
golang.org/x/image v0.0.0-20191009234506-e7c1f5e7dbb8/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
|
||||
golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
|
||||
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||
golang.org/x/net v0.0.0-20181102091132-c10e9556a7bc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||
|
||||
17
main.go
17
main.go
@@ -89,6 +89,12 @@ func run(ctx context.Context) error {
|
||||
mux := chi.NewRouter()
|
||||
mux.Use(
|
||||
cfg.ApplyHTTP,
|
||||
func(next http.Handler) http.Handler {
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
r = r.WithContext(log.WithContext(r.Context()))
|
||||
next.ServeHTTP(w, r)
|
||||
})
|
||||
},
|
||||
secHeaders,
|
||||
cors.New(cors.Options{
|
||||
AllowCredentials: true,
|
||||
@@ -121,6 +127,15 @@ func run(ctx context.Context) error {
|
||||
avatarApp.Routes(mux)
|
||||
}
|
||||
|
||||
if env("DISABLE_WKD", "false") == "false" {
|
||||
avatarApp, err := keyproofs.NewWKDApp(ctx, env("WKD_PATH", "pub"), env("WKD_DOMAIN", "pub"))
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
avatarApp.Routes(mux)
|
||||
}
|
||||
|
||||
if env("DISABLE_VCARD", "false") == "false" {
|
||||
vcardApp, err := keyproofs.NewVCardApp(ctx)
|
||||
if err != nil {
|
||||
@@ -135,6 +150,8 @@ func run(ctx context.Context) error {
|
||||
Str("build-hash", cfg.GetString("build-hash")).
|
||||
Str("build-date", cfg.GetString("build-date")).
|
||||
Str("listen", listen).
|
||||
Int("user", os.Geteuid()).
|
||||
Int("group", os.Getgid()).
|
||||
Msg("startup")
|
||||
|
||||
err := New(&http.Server{
|
||||
|
||||
@@ -13,6 +13,7 @@ import (
|
||||
|
||||
"github.com/rs/zerolog/log"
|
||||
"github.com/sour-is/crypto/openpgp"
|
||||
"github.com/sour-is/crypto/openpgp/packet"
|
||||
"github.com/tv42/zbase32"
|
||||
"golang.org/x/crypto/openpgp/armor"
|
||||
)
|
||||
@@ -22,12 +23,17 @@ func getOpenPGPkey(ctx context.Context, id string) (entity *Entity, err error) {
|
||||
addr := "https://keys.openpgp.org/vks/v1/by-fingerprint/" + strings.ToUpper(id)
|
||||
return getEntityHTTP(ctx, addr, true)
|
||||
} else if email, err := mail.ParseAddress(id); err == nil {
|
||||
addr := getWKDPubKeyAddr(email)
|
||||
addr, advAddr := getWKDPubKeyAddr(email)
|
||||
req, err := getEntityHTTP(ctx, addr, false)
|
||||
if err == nil {
|
||||
return req, err
|
||||
}
|
||||
|
||||
req, err = getEntityHTTP(ctx, advAddr, false)
|
||||
if err == nil {
|
||||
return req, err
|
||||
}
|
||||
|
||||
addr = "https://keys.openpgp.org/vks/v1/by-email/" + url.QueryEscape(id)
|
||||
return getEntityHTTP(ctx, addr, true)
|
||||
} else {
|
||||
@@ -44,16 +50,15 @@ func getEntityHTTP(ctx context.Context, url string, useArmored bool) (entity *En
|
||||
}
|
||||
cl := http.Client{}
|
||||
resp, err := cl.Do(req)
|
||||
if err != nil {
|
||||
return entity, fmt.Errorf("Requesting key: %w\nRemote URL: %v", err, url)
|
||||
}
|
||||
log.Debug().
|
||||
Bool("useArmored", useArmored).
|
||||
Str("status", resp.Status).
|
||||
Str("url", url).
|
||||
Msg("getEntityHTTP")
|
||||
|
||||
if err != nil {
|
||||
return entity, fmt.Errorf("Requesting key: %w\nRemote URL: %v", err, url)
|
||||
}
|
||||
|
||||
if resp.StatusCode != 200 {
|
||||
return entity, fmt.Errorf("bad response from remote: %s\nRemote URL: %v", resp.Status, url)
|
||||
}
|
||||
@@ -74,11 +79,17 @@ func (k EntityKey) Key() interface{} {
|
||||
}
|
||||
|
||||
type Entity struct {
|
||||
Primary *mail.Address
|
||||
Emails []*mail.Address
|
||||
Fingerprint string
|
||||
Proofs []string
|
||||
ArmorText string
|
||||
Primary *mail.Address
|
||||
SelfSignature *packet.Signature
|
||||
Emails []*mail.Address
|
||||
Fingerprint string
|
||||
Proofs []string
|
||||
ArmorText string
|
||||
entity *openpgp.Entity
|
||||
}
|
||||
|
||||
func (e *Entity) Serialize(f io.Writer) error {
|
||||
return e.entity.Serialize(f)
|
||||
}
|
||||
|
||||
func getEntity(lis openpgp.EntityList) (*Entity, error) {
|
||||
@@ -93,6 +104,7 @@ func getEntity(lis openpgp.EntityList) (*Entity, error) {
|
||||
continue
|
||||
}
|
||||
|
||||
entity.entity = e
|
||||
entity.Fingerprint = fmt.Sprintf("%X", e.PrimaryKey.Fingerprint)
|
||||
|
||||
for name, ident := range e.Identities {
|
||||
@@ -122,6 +134,7 @@ func getEntity(lis openpgp.EntityList) (*Entity, error) {
|
||||
|
||||
// If identity is self signed read notation data.
|
||||
if ident.SelfSignature != nil && ident.SelfSignature.NotationData != nil {
|
||||
entity.SelfSignature = ident.SelfSignature
|
||||
// Get proofs and append to list.
|
||||
if proofs, ok := ident.SelfSignature.NotationData["proof@metacode.biz"]; ok {
|
||||
entity.Proofs = append(entity.Proofs, proofs...)
|
||||
@@ -142,9 +155,14 @@ func ReadKey(r io.Reader, useArmored bool) (e *Entity, err error) {
|
||||
var buf bytes.Buffer
|
||||
|
||||
var w io.Writer = &buf
|
||||
|
||||
e = &Entity{}
|
||||
|
||||
defer func() {
|
||||
if e != nil {
|
||||
e.ArmorText = buf.String()
|
||||
}
|
||||
}()
|
||||
|
||||
if !useArmored {
|
||||
var aw io.WriteCloser
|
||||
aw, err = armor.Encode(&buf, "PGP PUBLIC KEY BLOCK", nil)
|
||||
@@ -155,11 +173,6 @@ func ReadKey(r io.Reader, useArmored bool) (e *Entity, err error) {
|
||||
|
||||
w = aw
|
||||
}
|
||||
defer func() {
|
||||
if e != nil {
|
||||
e.ArmorText = buf.String()
|
||||
}
|
||||
}()
|
||||
|
||||
r = io.TeeReader(r, w)
|
||||
|
||||
@@ -194,11 +207,11 @@ func isFingerprint(s string) bool {
|
||||
return true
|
||||
}
|
||||
|
||||
func getWKDPubKeyAddr(email *mail.Address) string {
|
||||
func getWKDPubKeyAddr(email *mail.Address) (string, string) {
|
||||
parts := strings.SplitN(email.Address, "@", 2)
|
||||
|
||||
hash := sha1.Sum([]byte(parts[0]))
|
||||
lp := zbase32.EncodeToString(hash[:])
|
||||
|
||||
return fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s", parts[1], lp)
|
||||
return fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s", parts[1], lp),
|
||||
fmt.Sprintf("https://openpgpkey.%s/.well-known/openpgpkey/hu/%s/%s", parts[1], parts[1], lp)
|
||||
}
|
||||
|
||||
@@ -2,6 +2,7 @@ package keyproofs
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"context"
|
||||
"encoding/base64"
|
||||
"encoding/json"
|
||||
@@ -205,6 +206,17 @@ func NewProof(ctx context.Context, uri, fingerprint string) ProofResolver {
|
||||
return &httpResolve{p, url, nil}
|
||||
}
|
||||
|
||||
case strings.Contains(p.URI.Path, "/conv/"), strings.Contains(p.URI.Path, "/twt/"):
|
||||
if sp := strings.SplitN(p.URI.Path, "/", 3); len(sp) == 3 {
|
||||
p.Icon = "fas fa-comment-alt"
|
||||
p.Service = "Twtxt"
|
||||
p.Name = fmt.Sprintf("...@%s", p.URI.Host)
|
||||
p.Link = fmt.Sprintf("https://%s", p.URI.Host)
|
||||
|
||||
url := fmt.Sprintf("https://%s/api/v1/conv", p.URI.Host)
|
||||
return &twtxtResolve{p, url, sp[2], nil}
|
||||
}
|
||||
|
||||
default:
|
||||
if sp := strings.SplitN(p.URI.Path, "/", 3); len(sp) > 1 {
|
||||
p.Icon = "fas fa-project-diagram"
|
||||
@@ -219,6 +231,7 @@ func NewProof(ctx context.Context, uri, fingerprint string) ProofResolver {
|
||||
return &httpResolve{p, p.Verify, nil}
|
||||
}
|
||||
}
|
||||
|
||||
default:
|
||||
p.Icon = "exclamation-triangle"
|
||||
p.Service = "unknown"
|
||||
@@ -294,8 +307,8 @@ func (r *gitlabResolve) Resolve(ctx context.Context) error {
|
||||
|
||||
return ErrNoFingerprint
|
||||
}
|
||||
func (p *gitlabResolve) Proof() *Proof {
|
||||
return &p.proof
|
||||
func (r *gitlabResolve) Proof() *Proof {
|
||||
return &r.proof
|
||||
}
|
||||
|
||||
func (p *Proof) Resolve(ctx context.Context) error {
|
||||
@@ -305,6 +318,44 @@ func (p *Proof) Proof() *Proof {
|
||||
return p
|
||||
}
|
||||
|
||||
type twtxtResolve struct {
|
||||
proof Proof `json:"-"`
|
||||
url string `json:"-"`
|
||||
Hash string `json:"hash"`
|
||||
headers map[string]string `json:"-"`
|
||||
}
|
||||
|
||||
func (t *twtxtResolve) Resolve(ctx context.Context) error {
|
||||
t.proof.Status = ProofInvalid
|
||||
|
||||
twt := struct {
|
||||
Twts []struct {
|
||||
Text string `json:"text"`
|
||||
Twter struct{ Nick string }
|
||||
} `json:"twts"`
|
||||
}{}
|
||||
|
||||
if err := postJSON(ctx, t.url, nil, t, &twt); err != nil {
|
||||
return err
|
||||
}
|
||||
if len(twt.Twts) > 0 {
|
||||
nick := twt.Twts[0].Twter.Nick
|
||||
t.proof.Name = fmt.Sprintf("%s@%s", nick, t.proof.URI.Host)
|
||||
t.proof.Link += "/user/" + nick
|
||||
|
||||
ck := fmt.Sprintf("[Verifying my OpenPGP key: openpgp4fpr:%s]", t.proof.Fingerprint)
|
||||
if strings.Contains(twt.Twts[0].Text, ck) {
|
||||
t.proof.Status = ProofVerified
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
return ErrNoFingerprint
|
||||
}
|
||||
func (t *twtxtResolve) Proof() *Proof {
|
||||
return &t.proof
|
||||
}
|
||||
|
||||
func checkHTTP(ctx context.Context, uri, fingerprint string, hdr map[string]string) error {
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
@@ -370,3 +421,36 @@ func httpJSON(ctx context.Context, uri string, hdr map[string]string, dst interf
|
||||
|
||||
return json.NewDecoder(res.Body).Decode(dst)
|
||||
}
|
||||
|
||||
func postJSON(ctx context.Context, uri string, hdr map[string]string, payload, dst interface{}) error {
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
log.Info().Str("URI", uri).Msg("postJSON")
|
||||
|
||||
body, err := json.Marshal(payload)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
return err
|
||||
}
|
||||
buf := bytes.NewBuffer(body)
|
||||
|
||||
req, err := http.NewRequestWithContext(ctx, "POST", uri, buf)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
return err
|
||||
}
|
||||
|
||||
req.Header.Set("Accept", "application/json")
|
||||
for k, v := range hdr {
|
||||
req.Header.Set(k, v)
|
||||
}
|
||||
|
||||
res, err := http.DefaultClient.Do(req)
|
||||
if err != nil {
|
||||
log.Err(err)
|
||||
return err
|
||||
}
|
||||
defer res.Body.Close()
|
||||
|
||||
return json.NewDecoder(res.Body).Decode(dst)
|
||||
}
|
||||
|
||||
344
pkg/keyproofs/routes-avatar.go
Normal file
344
pkg/keyproofs/routes-avatar.go
Normal file
@@ -0,0 +1,344 @@
|
||||
package keyproofs
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/md5"
|
||||
"crypto/sha256"
|
||||
"encoding/base64"
|
||||
"fmt"
|
||||
"hash"
|
||||
"io"
|
||||
"net/http"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strconv"
|
||||
"strings"
|
||||
|
||||
"github.com/disintegration/imaging"
|
||||
"github.com/fsnotify/fsnotify"
|
||||
"github.com/go-chi/chi"
|
||||
"github.com/nullrocks/identicon"
|
||||
"github.com/rs/zerolog/log"
|
||||
|
||||
"github.com/sour-is/keyproofs/pkg/graceful"
|
||||
)
|
||||
|
||||
type avatarApp struct {
|
||||
path string
|
||||
}
|
||||
|
||||
func NewAvatarApp(ctx context.Context, path string) (*avatarApp, error) {
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
path = filepath.Clean(path)
|
||||
app := &avatarApp{path: path}
|
||||
err := app.CheckFiles(ctx)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("check files: %w", err)
|
||||
}
|
||||
|
||||
watch, err := fsnotify.NewWatcher()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
for _, typ := range []string{"avatar", "bg", "cover"} {
|
||||
err = watch.Add(filepath.Join(path, typ))
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("adding watch: %w", err)
|
||||
}
|
||||
}
|
||||
|
||||
log.Debug().Msg("startup avatar watcher")
|
||||
wg := graceful.WaitGroup(ctx)
|
||||
wg.Go(func() error {
|
||||
for {
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
log.Debug().Msg("shutdown avatar watcher")
|
||||
return nil
|
||||
case op := <-watch.Events:
|
||||
log.Print(op)
|
||||
switch op.Op {
|
||||
case fsnotify.Create:
|
||||
path = filepath.Dir(op.Name)
|
||||
kind := filepath.Base(path)
|
||||
name := filepath.Base(op.Name)
|
||||
if err := app.createLinks(kind, name); err != nil {
|
||||
log.Err(err).Send()
|
||||
}
|
||||
case fsnotify.Remove, fsnotify.Rename:
|
||||
path = filepath.Dir(op.Name)
|
||||
kind := filepath.Base(path)
|
||||
name := filepath.Base(op.Name)
|
||||
if err := app.removeLinks(kind, name); err != nil {
|
||||
log.Error().Err(err).Send()
|
||||
}
|
||||
default:
|
||||
}
|
||||
case err := <-watch.Errors:
|
||||
log.Err(err).Send()
|
||||
}
|
||||
}
|
||||
})
|
||||
|
||||
return app, nil
|
||||
}
|
||||
|
||||
func (app *avatarApp) CheckFiles(ctx context.Context) error {
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
for _, name := range []string{".links", "avatar", "bg", "cover"} {
|
||||
log.Debug().Msgf("mkdir: %s", filepath.Join(app.path, name))
|
||||
err := os.MkdirAll(filepath.Join(app.path, name), 0700)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
return filepath.Walk(app.path, func(path string, info os.FileInfo, err error) error {
|
||||
if err != nil {
|
||||
return fmt.Errorf("walk failed: %w", err)
|
||||
}
|
||||
if info.IsDir() {
|
||||
switch info.Name() {
|
||||
case "avatar", "bg", "cover":
|
||||
return nil
|
||||
default:
|
||||
return filepath.SkipDir
|
||||
}
|
||||
}
|
||||
|
||||
path = filepath.Dir(path)
|
||||
kind := filepath.Base(path)
|
||||
name := info.Name()
|
||||
|
||||
log.Debug().Msgf("link: %s %s %s", app.path, kind, name)
|
||||
|
||||
return app.createLinks(kind, name)
|
||||
})
|
||||
}
|
||||
|
||||
func (app *avatarApp) get(w http.ResponseWriter, r *http.Request) {
|
||||
log := log.Ctx(r.Context())
|
||||
|
||||
log.Print(r.Host)
|
||||
|
||||
kind := chi.URLParam(r, "kind")
|
||||
hash := chi.URLParam(r, "hash")
|
||||
|
||||
sizeW, sizeH, resize := 0, 0, false
|
||||
if s, err := strconv.Atoi(r.URL.Query().Get("s")); err == nil && s > 0 {
|
||||
sizeW, sizeH, resize = sizeByKind(kind, s)
|
||||
}
|
||||
log.Debug().Int("width", sizeW).Int("height", sizeH).Bool("resize", resize).Str("kind", kind).Msg("Get Image")
|
||||
|
||||
if strings.ContainsRune(hash, '@') {
|
||||
avatarHost, _, err := styleSRV(r.Context(), hash)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
hash = hashSHA256(strings.ToLower(hash))
|
||||
http.Redirect(w, r, fmt.Sprintf("https://%s/%s/%s?%s", avatarHost, kind, hash, r.URL.RawQuery), 301)
|
||||
return
|
||||
}
|
||||
|
||||
fname := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
|
||||
log.Debug().Msgf("path: %s", fname)
|
||||
|
||||
if !fileExists(fname) {
|
||||
switch kind {
|
||||
case "avatar":
|
||||
ig, err := identicon.New("sour.is", 5, 3)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
ii, err := ig.Draw(hash)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "image/png")
|
||||
w.WriteHeader(200)
|
||||
err = ii.Png(clamp(128, 512, sizeW), w)
|
||||
log.Error().Err(err).Send()
|
||||
|
||||
return
|
||||
default:
|
||||
sp := strings.SplitN(pixl, ",", 2)
|
||||
b, _ := base64.RawStdEncoding.DecodeString(sp[1])
|
||||
w.Header().Set("Content-Type", "image/png")
|
||||
w.WriteHeader(200)
|
||||
if _, err := w.Write(b); err != nil {
|
||||
log.Error().Err(err).Send()
|
||||
}
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
if !resize {
|
||||
f, err := os.Open(fname)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("Content-Type", "image/png")
|
||||
w.WriteHeader(200)
|
||||
|
||||
_, err = io.Copy(w, f)
|
||||
if err != nil {
|
||||
log.Error().Err(err).Send()
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
img, err := imaging.Open(fname, imaging.AutoOrientation(true))
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
img = imaging.Fill(img, sizeW, sizeH, imaging.Center, imaging.Lanczos)
|
||||
|
||||
w.Header().Set("Content-Type", "image/png")
|
||||
w.WriteHeader(200)
|
||||
log.Debug().Msg("writing image")
|
||||
err = imaging.Encode(w, img, imaging.PNG)
|
||||
if err != nil {
|
||||
log.Error().Err(err).Send()
|
||||
}
|
||||
}
|
||||
|
||||
func (app *avatarApp) Routes(r *chi.Mux) {
|
||||
r.MethodFunc("GET", "/{kind:avatar|bg|cover}/{hash}", app.get)
|
||||
}
|
||||
|
||||
func hashString(value string, h hash.Hash) string {
|
||||
_, _ = h.Write([]byte(value))
|
||||
return fmt.Sprintf("%x", h.Sum(nil))
|
||||
}
|
||||
func hashMD5(name string) string {
|
||||
return hashString(name, md5.New())
|
||||
}
|
||||
func hashSHA256(name string) string {
|
||||
return hashString(name, sha256.New())
|
||||
}
|
||||
|
||||
func (app *avatarApp) createLinks(kind, name string) error {
|
||||
if !strings.ContainsRune(name, '@') {
|
||||
return nil
|
||||
}
|
||||
|
||||
src := filepath.Join("..", kind, name)
|
||||
name = strings.ToLower(name)
|
||||
|
||||
hash := hashMD5(name)
|
||||
link := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
|
||||
err := app.replaceLink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
hash = hashSHA256(name)
|
||||
link = filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
|
||||
err = app.replaceLink(src, link)
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
func (app *avatarApp) removeLinks(kind, name string) error {
|
||||
if !strings.ContainsRune(name, '@') {
|
||||
return nil
|
||||
}
|
||||
name = strings.ToLower(name)
|
||||
|
||||
hash := hashMD5(name)
|
||||
link := filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
|
||||
err := os.Remove(link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
hash = hashSHA256(name)
|
||||
link = filepath.Join(app.path, ".links", strings.Join([]string{kind, hash}, "-"))
|
||||
err = os.Remove(link)
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
func (app *avatarApp) replaceLink(src, link string) error {
|
||||
if dst, err := os.Readlink(link); err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
err = os.Symlink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
} else {
|
||||
if dst != src {
|
||||
err = os.Remove(link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = os.Symlink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func fileExists(filename string) bool {
|
||||
info, err := os.Stat(filename)
|
||||
if os.IsNotExist(err) {
|
||||
return false
|
||||
}
|
||||
return !info.IsDir()
|
||||
}
|
||||
|
||||
func sizeByKind(kind string, size int) (sizeW int, sizeH int, resize bool) {
|
||||
switch kind {
|
||||
case "avatar":
|
||||
if size == 0 {
|
||||
size = 128
|
||||
}
|
||||
sizeW = clamp(128, 640, size)
|
||||
sizeH = sizeW
|
||||
resize = true
|
||||
|
||||
return
|
||||
case "cover":
|
||||
if size == 0 {
|
||||
size = 940
|
||||
}
|
||||
|
||||
sizeW = clamp(640, 1300, size)
|
||||
sizeH = ratio(sizeW, 2.7)
|
||||
resize = true
|
||||
|
||||
return
|
||||
default:
|
||||
return 0, 0, false
|
||||
}
|
||||
}
|
||||
|
||||
func ratio(size int, ratio float64) int {
|
||||
return int(float64(size) / ratio)
|
||||
}
|
||||
func clamp(min, max, size int) int {
|
||||
if size > max {
|
||||
return max
|
||||
}
|
||||
|
||||
if size < min {
|
||||
return min
|
||||
}
|
||||
|
||||
return size
|
||||
}
|
||||
@@ -147,6 +147,7 @@ func (app *keyproofApp) getProofs(w http.ResponseWriter, r *http.Request) {
|
||||
|
||||
page := page{Style: defaultStyle}
|
||||
page.AppName = fmt.Sprintf("%s v%s", cfg.GetString("app-name"), cfg.GetString("app-version"))
|
||||
page.AppBuild = fmt.Sprintf("%s %s", cfg.GetString("build-date"), cfg.GetString("build-hash"))
|
||||
|
||||
// Wait for either entity to resolve or timeout
|
||||
select {
|
||||
|
||||
380
pkg/keyproofs/routes-wkd.go
Normal file
380
pkg/keyproofs/routes-wkd.go
Normal file
@@ -0,0 +1,380 @@
|
||||
package keyproofs
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/sha1"
|
||||
"fmt"
|
||||
"io"
|
||||
"io/ioutil"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
|
||||
"github.com/fsnotify/fsnotify"
|
||||
"github.com/go-chi/chi"
|
||||
"github.com/rs/zerolog/log"
|
||||
"github.com/sour-is/crypto/openpgp"
|
||||
"github.com/sour-is/keyproofs/pkg/graceful"
|
||||
"github.com/tv42/zbase32"
|
||||
)
|
||||
|
||||
type wkdApp struct {
|
||||
path string
|
||||
domain string
|
||||
}
|
||||
|
||||
func NewWKDApp(ctx context.Context, path, domain string) (*wkdApp, error) {
|
||||
log := log.Ctx(ctx)
|
||||
log.Debug().Str("domain", domain).Str("path", path).Msg("NewWKDApp")
|
||||
|
||||
path = filepath.Clean(path)
|
||||
app := &wkdApp{path: path, domain: domain}
|
||||
err := app.CheckFiles(ctx)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
watch, err := fsnotify.NewWatcher()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
for _, typ := range []string{"keys"} {
|
||||
err = watch.Add(filepath.Join(path, typ))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
log.Debug().Msg("startup wkd watcher")
|
||||
wg := graceful.WaitGroup(ctx)
|
||||
wg.Go(func() error {
|
||||
for {
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
log.Debug().Msg("shutdown wkd watcher")
|
||||
return nil
|
||||
case op := <-watch.Events:
|
||||
log.Print(op)
|
||||
switch op.Op {
|
||||
case fsnotify.Create:
|
||||
path = filepath.Dir(op.Name)
|
||||
kind := filepath.Base(path)
|
||||
name := filepath.Base(op.Name)
|
||||
if err := app.createLinks(kind, name); err != nil {
|
||||
log.Err(err).Send()
|
||||
}
|
||||
case fsnotify.Remove, fsnotify.Rename:
|
||||
path = filepath.Dir(op.Name)
|
||||
kind := filepath.Base(path)
|
||||
name := filepath.Base(op.Name)
|
||||
if err := app.removeLinks(kind, name); err != nil {
|
||||
log.Error().Err(err).Send()
|
||||
}
|
||||
default:
|
||||
}
|
||||
case err := <-watch.Errors:
|
||||
log.Err(err).Send()
|
||||
}
|
||||
}
|
||||
})
|
||||
|
||||
return app, nil
|
||||
}
|
||||
|
||||
func (app *wkdApp) CheckFiles(ctx context.Context) error {
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
for _, name := range []string{".links", "keys"} {
|
||||
log.Debug().Msgf("mkdir: %s", filepath.Join(app.path, name))
|
||||
err := os.MkdirAll(filepath.Join(app.path, name), 0700)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
return filepath.Walk(app.path, func(path string, info os.FileInfo, err error) error {
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
log.Debug().Msg(info.Name())
|
||||
if path == app.path {
|
||||
return nil
|
||||
}
|
||||
if info.IsDir() {
|
||||
switch info.Name() {
|
||||
case "keys":
|
||||
return nil
|
||||
}
|
||||
return filepath.SkipDir
|
||||
|
||||
}
|
||||
|
||||
path = filepath.Dir(path)
|
||||
kind := filepath.Base(path)
|
||||
name := info.Name()
|
||||
|
||||
log.Debug().Msgf("link: %s %s %s", app.path, kind, name)
|
||||
|
||||
return app.createLinks(kind, name)
|
||||
})
|
||||
}
|
||||
|
||||
func (app *wkdApp) getRedirect(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
log.Print(r.Host)
|
||||
|
||||
hash := chi.URLParam(r, "hash")
|
||||
|
||||
if strings.ContainsRune(hash, '@') {
|
||||
hash, domain := hashHuman(hash)
|
||||
log.Debug().Str("hash", hash).Str("domain", domain).Msg("redirect")
|
||||
if host, adv := getWKDDomain(ctx, domain); adv {
|
||||
log.Debug().Str("host", host).Str("domain", domain).Bool("adv", adv).Msg("redirect")
|
||||
http.Redirect(w, r, fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s/%s", host, domain, hash), http.StatusTemporaryRedirect)
|
||||
} else {
|
||||
log.Debug().Str("host", host).Str("domain", domain).Bool("adv", adv).Msg("redirect")
|
||||
http.Redirect(w, r, fmt.Sprintf("https://%s/.well-known/openpgpkey/hu/%s", domain, hash), http.StatusTemporaryRedirect)
|
||||
}
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
writeText(w, http.StatusBadRequest, "Bad Request")
|
||||
}
|
||||
|
||||
func (app *wkdApp) get(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
log.Print(r.Host)
|
||||
|
||||
hash := chi.URLParam(r, "hash")
|
||||
domain := chi.URLParam(r, "domain")
|
||||
if domain == "" {
|
||||
domain = app.domain
|
||||
}
|
||||
|
||||
if strings.ContainsRune(hash, '@') {
|
||||
hash, domain = hashHuman(hash)
|
||||
}
|
||||
|
||||
fname := filepath.Join(app.path, ".links", strings.Join([]string{"keys", domain, hash}, "-"))
|
||||
log.Debug().Msgf("path: %s", fname)
|
||||
|
||||
f, err := os.Open(fname)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
_, err = io.Copy(w, f)
|
||||
if err != nil {
|
||||
writeText(w, 500, err.Error())
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
func (app *wkdApp) Routes(r *chi.Mux) {
|
||||
r.MethodFunc("GET", "/wkd/{hash}", app.getRedirect)
|
||||
r.MethodFunc("GET", "/key/{hash}", app.get)
|
||||
r.MethodFunc("POST", "/pks/add", app.postKey)
|
||||
r.MethodFunc("GET", "/.well-known/openpgpkey/hu/{hash}", app.get)
|
||||
r.MethodFunc("GET", "/.well-known/openpgpkey/hu/{domain}/{hash}", app.get)
|
||||
}
|
||||
|
||||
func (app *wkdApp) createLinks(kind, name string) error {
|
||||
if !strings.ContainsRune(name, '@') {
|
||||
return nil
|
||||
}
|
||||
|
||||
src := filepath.Join("..", kind, name)
|
||||
name = strings.ToLower(name)
|
||||
|
||||
hash, domain := hashHuman(name)
|
||||
link := filepath.Join(app.path, ".links", strings.Join([]string{kind, domain, hash}, "-"))
|
||||
err := app.replaceLink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return err
|
||||
}
|
||||
func hashHuman(name string) (string, string) {
|
||||
name = strings.ToLower(name)
|
||||
parts := strings.SplitN(name, "@", 2)
|
||||
hash := sha1.Sum([]byte(parts[0]))
|
||||
lp := zbase32.EncodeToString(hash[:])
|
||||
|
||||
return lp, parts[1]
|
||||
}
|
||||
|
||||
func (app *wkdApp) removeLinks(kind, name string) error {
|
||||
if !strings.ContainsRune(name, '@') {
|
||||
return nil
|
||||
}
|
||||
name = strings.ToLower(name)
|
||||
|
||||
hash, domain := hashHuman(name)
|
||||
link := filepath.Join(app.path, ".links", strings.Join([]string{kind, domain, hash}, "-"))
|
||||
err := os.Remove(link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return err
|
||||
}
|
||||
|
||||
func (app *wkdApp) replaceLink(src, link string) error {
|
||||
if dst, err := os.Readlink(link); err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
err = os.Symlink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
} else {
|
||||
if dst != src {
|
||||
err = os.Remove(link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
err = os.Symlink(src, link)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func getWKDDomain(ctx context.Context, domain string) (string, bool) {
|
||||
cname, err := net.DefaultResolver.LookupCNAME(ctx, "openpgpkey."+domain)
|
||||
if err == nil {
|
||||
return strings.Trim(cname, "."), true
|
||||
}
|
||||
return domain, false
|
||||
}
|
||||
|
||||
func (app *wkdApp) postKey(w http.ResponseWriter, r *http.Request) {
|
||||
ctx := r.Context()
|
||||
log := log.Ctx(ctx)
|
||||
|
||||
body, err := ioutil.ReadAll(r.Body)
|
||||
r.Body.Close()
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusBadRequest, "ERR BODY")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
q, err := url.ParseQuery(string(body))
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusBadRequest, "ERR PARSE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
lis, err := openpgp.ReadArmoredKeyRing(strings.NewReader(q.Get("keytext")))
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusBadRequest, "ERR READ KEY")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
entity, err := getEntity(lis)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusBadRequest, "ERR ENTITY")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
fname := filepath.Join(app.path, "keys", entity.Primary.Address)
|
||||
|
||||
f, err := os.Open(fname)
|
||||
if os.IsNotExist(err) {
|
||||
out, err := os.Create(fname)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR CREATE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
err = entity.Serialize(out)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR WRITE")
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("X-HKP-Status", "Created key")
|
||||
writeText(w, http.StatusOK, "OK CREATED")
|
||||
return
|
||||
}
|
||||
|
||||
current, err := openpgp.ReadKeyRing(f)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR READ")
|
||||
|
||||
return
|
||||
}
|
||||
f.Close()
|
||||
|
||||
compare, err := getEntity(current)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR PARSE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
if entity.Fingerprint != compare.Fingerprint {
|
||||
w.Header().Set("X-HKP-Status", "Mismatch fingerprint")
|
||||
writeText(w, http.StatusBadRequest, "ERR FINGERPRINT")
|
||||
return
|
||||
}
|
||||
if entity.SelfSignature == nil || compare.SelfSignature == nil {
|
||||
w.Header().Set("X-HKP-Status", "Missing signature")
|
||||
writeText(w, http.StatusBadRequest, "ERR SIGNATURE")
|
||||
return
|
||||
}
|
||||
|
||||
log.Debug().Msgf("%v < %v", entity.SelfSignature.CreationTime, compare.SelfSignature.CreationTime)
|
||||
|
||||
if !compare.SelfSignature.CreationTime.Before(entity.SelfSignature.CreationTime) {
|
||||
w.Header().Set("X-HKP-Status", "out of date")
|
||||
writeText(w, http.StatusBadRequest, "ERR OUT OF DATE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
out, err := os.Create(fname)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR CREATE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
err = entity.Serialize(out)
|
||||
if err != nil {
|
||||
log.Err(err).Send()
|
||||
writeText(w, http.StatusInternalServerError, "ERR WRITE")
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
w.Header().Set("X-HKP-Status", "Updated key")
|
||||
writeText(w, http.StatusOK, "OK UPDATED")
|
||||
}
|
||||
@@ -1,10 +1,11 @@
|
||||
package keyproofs
|
||||
|
||||
type page struct {
|
||||
AppName string
|
||||
Entity *Entity
|
||||
Style *Style
|
||||
Proofs *Proofs
|
||||
AppName string
|
||||
AppBuild string
|
||||
Entity *Entity
|
||||
Style *Style
|
||||
Proofs *Proofs
|
||||
|
||||
Markdown string
|
||||
HasProofs bool
|
||||
@@ -81,7 +82,7 @@ var pageTPL = `
|
||||
{{template "content" .}}
|
||||
|
||||
<div class="card-footer text-muted text-center">
|
||||
<a href="/">{{.AppName}}</a>
|
||||
<a href="/" alt="{{.AppBuild}}">{{.AppName}}</a>
|
||||
| © 2020 Sour.is
|
||||
| <a href="/id/me@sour.is">About me</a>
|
||||
| <a href="https://github.com/sour-is/keyproofs">GitHub</a>
|
||||
|
||||
@@ -55,6 +55,8 @@ func NewXMPP(ctx context.Context, config *xmpp.Config) (*connection, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
conn.client = cl
|
||||
|
||||
sc := xmpp.NewStreamManager(cl, func(c xmpp.Sender) { log.Info().Msg("XMPP Client connected.") })
|
||||
|
||||
wg.Go(func() error {
|
||||
@@ -68,7 +70,6 @@ func NewXMPP(ctx context.Context, config *xmpp.Config) (*connection, error) {
|
||||
log.Info().Msg("XMPP Client shutdown.")
|
||||
}()
|
||||
|
||||
conn.client = cl
|
||||
return conn, err
|
||||
}
|
||||
|
||||
|
||||
@@ -1,10 +1,11 @@
|
||||
[Unit]
|
||||
Description=sour.is paste API
|
||||
Description=sour.is KeyProofs API
|
||||
After=syslog.target network.target
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
User=www-data
|
||||
Group=www-data
|
||||
WorkingDirectory=/var/www
|
||||
ExecStart=/usr/local/bin/sour.is-keyproofs
|
||||
|
||||
|
||||
Reference in New Issue
Block a user