#![feature(proc_macro_hygiene, decl_macro, vec_remove_item, try_trait)] #![recursion_limit = "256"] #[macro_use] extern crate rocket; #[macro_use] extern crate serde_derive; #[macro_use] extern crate serde_json; #[macro_use] extern crate log; #[macro_use] extern crate diesel; #[macro_use] extern crate diesel_migrations; #[macro_use] extern crate lazy_static; #[macro_use] extern crate derive_more; #[macro_use] extern crate num_derive; use std::{ path::Path, process::{exit, Command}, }; #[macro_use] mod error; mod api; mod auth; mod config; mod crypto; mod db; mod mail; mod util; pub use config::CONFIG; pub use error::{Error, MapResult}; fn main() { launch_info(); if CONFIG.extended_logging() { init_logging().ok(); } check_db(); check_rsa_keys(); check_web_vault(); migrations::run_migrations(); launch_rocket(); } fn launch_info() { println!("/--------------------------------------------------------------------\\"); println!("| Starting Bitwarden_RS |"); if let Some(version) = option_env!("GIT_VERSION") { println!("|{:^68}|", format!("Version {}", version)); } println!("|--------------------------------------------------------------------|"); println!("| This is an *unofficial* Bitwarden implementation, DO NOT use the |"); println!("| official channels to report bugs/features, regardless of client. |"); println!("| Report URL: https://github.com/dani-garcia/bitwarden_rs/issues/new |"); println!("\\--------------------------------------------------------------------/\n"); } fn init_logging() -> Result<(), fern::InitError> { use std::str::FromStr; let mut logger = fern::Dispatch::new() .format(|out, message, record| { out.finish(format_args!( "{}[{}][{}] {}", chrono::Local::now().format("[%Y-%m-%d %H:%M:%S]"), record.target(), record.level(), message )) }) .level(log::LevelFilter::from_str(&CONFIG.log_level()).expect("Valid log level")) // Hide unknown certificate errors if using self-signed .level_for("rustls::session", log::LevelFilter::Off) // Hide failed to close stream messages .level_for("hyper::server", log::LevelFilter::Warn) .chain(std::io::stdout()); if let Some(log_file) = CONFIG.log_file() { logger = logger.chain(fern::log_file(log_file)?); } #[cfg(not(windows))] { if cfg!(feature = "enable_syslog") || CONFIG.use_syslog() { logger = chain_syslog(logger); } } logger.apply()?; Ok(()) } #[cfg(not(windows))] fn chain_syslog(logger: fern::Dispatch) -> fern::Dispatch { let syslog_fmt = syslog::Formatter3164 { facility: syslog::Facility::LOG_USER, hostname: None, process: "bitwarden_rs".into(), pid: 0, }; match syslog::unix(syslog_fmt) { Ok(sl) => logger.chain(sl), Err(e) => { error!("Unable to connect to syslog: {:?}", e); logger } } } fn check_db() { if cfg!(feature = "sqlite") { let url = CONFIG.database_url(); let path = Path::new(&url); if let Some(parent) = path.parent() { use std::fs; if fs::create_dir_all(parent).is_err() { error!("Error creating database directory"); exit(1); } } // Turn on WAL in SQLite if CONFIG.enable_db_wal() { use diesel::RunQueryDsl; let connection = db::get_connection().expect("Can't conect to DB"); diesel::sql_query("PRAGMA journal_mode=wal") .execute(&connection) .expect("Failed to turn on WAL"); } } db::get_connection().expect("Can't connect to DB"); } fn check_rsa_keys() { // If the RSA keys don't exist, try to create them if !util::file_exists(&CONFIG.private_rsa_key()) || !util::file_exists(&CONFIG.public_rsa_key()) { info!("JWT keys don't exist, checking if OpenSSL is available..."); Command::new("openssl").arg("version").status().unwrap_or_else(|_| { info!("Can't create keys because OpenSSL is not available, make sure it's installed and available on the PATH"); exit(1); }); info!("OpenSSL detected, creating keys..."); let key = CONFIG.rsa_key_filename(); let pem = format!("{}.pem", key); let priv_der = format!("{}.der", key); let pub_der = format!("{}.pub.der", key); let mut success = Command::new("openssl") .args(&["genrsa", "-out", &pem]) .status() .expect("Failed to create private pem file") .success(); success &= Command::new("openssl") .args(&["rsa", "-in", &pem, "-outform", "DER", "-out", &priv_der]) .status() .expect("Failed to create private der file") .success(); success &= Command::new("openssl") .args(&["rsa", "-in", &priv_der, "-inform", "DER"]) .args(&["-RSAPublicKey_out", "-outform", "DER", "-out", &pub_der]) .status() .expect("Failed to create public der file") .success(); if success { info!("Keys created correctly."); } else { error!("Error creating keys, exiting..."); exit(1); } } } fn check_web_vault() { if !CONFIG.web_vault_enabled() { return; } let index_path = Path::new(&CONFIG.web_vault_folder()).join("index.html"); if !index_path.exists() { error!("Web vault is not found. To install it, please follow the steps in https://github.com/dani-garcia/bitwarden_rs/wiki/Building-binary#install-the-web-vault"); exit(1); } } // Embed the migrations from the migrations folder into the application // This way, the program automatically migrates the database to the latest version // https://docs.rs/diesel_migrations/*/diesel_migrations/macro.embed_migrations.html #[allow(unused_imports)] mod migrations { #[cfg(feature = "sqlite")] embed_migrations!("migrations/sqlite"); #[cfg(feature = "mysql")] embed_migrations!("migrations/mysql"); pub fn run_migrations() { // Make sure the database is up to date (create if it doesn't exist, or run the migrations) let connection = crate::db::get_connection().expect("Can't connect to DB"); use std::io::stdout; embedded_migrations::run_with_output(&connection, &mut stdout()).expect("Can't run migrations"); } } fn launch_rocket() { // Create Rocket object, this stores current log level and sets it's own let rocket = rocket::ignite(); // If we aren't logging the mounts, we force the logging level down if !CONFIG.log_mounts() { log::set_max_level(log::LevelFilter::Warn); } let rocket = rocket .mount("/", api::web_routes()) .mount("/api", api::core_routes()) .mount("/admin", api::admin_routes()) .mount("/identity", api::identity_routes()) .mount("/icons", api::icons_routes()) .mount("/notifications", api::notifications_routes()); // Force the level up for the fairings, managed state and lauch if !CONFIG.log_mounts() { log::set_max_level(log::LevelFilter::max()); } let rocket = rocket .manage(db::init_pool()) .manage(api::start_notification_server()) .attach(util::AppHeaders()); // Launch and print error if there is one // The launch will restore the original logging level error!("Launch error {:#?}", rocket.launch()); }