mirror of
https://github.com/ViViDboarder/bitwarden_rs.git
synced 2024-11-10 15:26:39 +00:00
259 lines
7.6 KiB
Rust
259 lines
7.6 KiB
Rust
#![feature(proc_macro_hygiene, decl_macro, vec_remove_item, try_trait)]
|
|
#![recursion_limit = "256"]
|
|
|
|
#[macro_use]
|
|
extern crate rocket;
|
|
#[macro_use]
|
|
extern crate serde_derive;
|
|
#[macro_use]
|
|
extern crate serde_json;
|
|
#[macro_use]
|
|
extern crate log;
|
|
#[macro_use]
|
|
extern crate diesel;
|
|
#[macro_use]
|
|
extern crate diesel_migrations;
|
|
#[macro_use]
|
|
extern crate lazy_static;
|
|
#[macro_use]
|
|
extern crate derive_more;
|
|
#[macro_use]
|
|
extern crate num_derive;
|
|
|
|
use std::{
|
|
path::Path,
|
|
process::{exit, Command},
|
|
};
|
|
|
|
#[macro_use]
|
|
mod error;
|
|
mod api;
|
|
mod auth;
|
|
mod config;
|
|
mod crypto;
|
|
mod db;
|
|
mod mail;
|
|
mod util;
|
|
|
|
pub use config::CONFIG;
|
|
pub use error::{Error, MapResult};
|
|
|
|
fn main() {
|
|
launch_info();
|
|
|
|
if CONFIG.extended_logging() {
|
|
init_logging().ok();
|
|
}
|
|
|
|
check_db();
|
|
check_rsa_keys();
|
|
check_web_vault();
|
|
migrations::run_migrations();
|
|
|
|
launch_rocket();
|
|
}
|
|
|
|
fn launch_info() {
|
|
println!("/--------------------------------------------------------------------\\");
|
|
println!("| Starting Bitwarden_RS |");
|
|
|
|
if let Some(version) = option_env!("GIT_VERSION") {
|
|
println!("|{:^68}|", format!("Version {}", version));
|
|
}
|
|
|
|
println!("|--------------------------------------------------------------------|");
|
|
println!("| This is an *unofficial* Bitwarden implementation, DO NOT use the |");
|
|
println!("| official channels to report bugs/features, regardless of client. |");
|
|
println!("| Report URL: https://github.com/dani-garcia/bitwarden_rs/issues/new |");
|
|
println!("\\--------------------------------------------------------------------/\n");
|
|
}
|
|
|
|
fn init_logging() -> Result<(), fern::InitError> {
|
|
use std::str::FromStr;
|
|
let mut logger = fern::Dispatch::new()
|
|
.format(|out, message, record| {
|
|
out.finish(format_args!(
|
|
"{}[{}][{}] {}",
|
|
chrono::Local::now().format("[%Y-%m-%d %H:%M:%S]"),
|
|
record.target(),
|
|
record.level(),
|
|
message
|
|
))
|
|
})
|
|
.level(log::LevelFilter::from_str(&CONFIG.log_level()).expect("Valid log level"))
|
|
// Hide unknown certificate errors if using self-signed
|
|
.level_for("rustls::session", log::LevelFilter::Off)
|
|
// Hide failed to close stream messages
|
|
.level_for("hyper::server", log::LevelFilter::Warn)
|
|
.chain(std::io::stdout());
|
|
|
|
if let Some(log_file) = CONFIG.log_file() {
|
|
logger = logger.chain(fern::log_file(log_file)?);
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
{
|
|
if cfg!(feature = "enable_syslog") || CONFIG.use_syslog() {
|
|
logger = chain_syslog(logger);
|
|
}
|
|
}
|
|
|
|
logger.apply()?;
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
fn chain_syslog(logger: fern::Dispatch) -> fern::Dispatch {
|
|
let syslog_fmt = syslog::Formatter3164 {
|
|
facility: syslog::Facility::LOG_USER,
|
|
hostname: None,
|
|
process: "bitwarden_rs".into(),
|
|
pid: 0,
|
|
};
|
|
|
|
match syslog::unix(syslog_fmt) {
|
|
Ok(sl) => logger.chain(sl),
|
|
Err(e) => {
|
|
error!("Unable to connect to syslog: {:?}", e);
|
|
logger
|
|
}
|
|
}
|
|
}
|
|
|
|
fn check_db() {
|
|
if cfg!(feature = "sqlite") {
|
|
let url = CONFIG.database_url();
|
|
let path = Path::new(&url);
|
|
|
|
if let Some(parent) = path.parent() {
|
|
use std::fs;
|
|
if fs::create_dir_all(parent).is_err() {
|
|
error!("Error creating database directory");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
// Turn on WAL in SQLite
|
|
if CONFIG.enable_db_wal() {
|
|
use diesel::RunQueryDsl;
|
|
let connection = db::get_connection().expect("Can't conect to DB");
|
|
diesel::sql_query("PRAGMA journal_mode=wal")
|
|
.execute(&connection)
|
|
.expect("Failed to turn on WAL");
|
|
}
|
|
}
|
|
db::get_connection().expect("Can't connect to DB");
|
|
}
|
|
|
|
fn check_rsa_keys() {
|
|
// If the RSA keys don't exist, try to create them
|
|
if !util::file_exists(&CONFIG.private_rsa_key()) || !util::file_exists(&CONFIG.public_rsa_key()) {
|
|
info!("JWT keys don't exist, checking if OpenSSL is available...");
|
|
|
|
Command::new("openssl").arg("version").status().unwrap_or_else(|_| {
|
|
info!("Can't create keys because OpenSSL is not available, make sure it's installed and available on the PATH");
|
|
exit(1);
|
|
});
|
|
|
|
info!("OpenSSL detected, creating keys...");
|
|
|
|
let key = CONFIG.rsa_key_filename();
|
|
|
|
let pem = format!("{}.pem", key);
|
|
let priv_der = format!("{}.der", key);
|
|
let pub_der = format!("{}.pub.der", key);
|
|
|
|
let mut success = Command::new("openssl")
|
|
.args(&["genrsa", "-out", &pem])
|
|
.status()
|
|
.expect("Failed to create private pem file")
|
|
.success();
|
|
|
|
success &= Command::new("openssl")
|
|
.args(&["rsa", "-in", &pem, "-outform", "DER", "-out", &priv_der])
|
|
.status()
|
|
.expect("Failed to create private der file")
|
|
.success();
|
|
|
|
success &= Command::new("openssl")
|
|
.args(&["rsa", "-in", &priv_der, "-inform", "DER"])
|
|
.args(&["-RSAPublicKey_out", "-outform", "DER", "-out", &pub_der])
|
|
.status()
|
|
.expect("Failed to create public der file")
|
|
.success();
|
|
|
|
if success {
|
|
info!("Keys created correctly.");
|
|
} else {
|
|
error!("Error creating keys, exiting...");
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
|
|
fn check_web_vault() {
|
|
if !CONFIG.web_vault_enabled() {
|
|
return;
|
|
}
|
|
|
|
let index_path = Path::new(&CONFIG.web_vault_folder()).join("index.html");
|
|
|
|
if !index_path.exists() {
|
|
error!("Web vault is not found. To install it, please follow the steps in https://github.com/dani-garcia/bitwarden_rs/wiki/Building-binary#install-the-web-vault");
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
// Embed the migrations from the migrations folder into the application
|
|
// This way, the program automatically migrates the database to the latest version
|
|
// https://docs.rs/diesel_migrations/*/diesel_migrations/macro.embed_migrations.html
|
|
#[allow(unused_imports)]
|
|
mod migrations {
|
|
|
|
#[cfg(feature = "sqlite")]
|
|
embed_migrations!("migrations/sqlite");
|
|
#[cfg(feature = "mysql")]
|
|
embed_migrations!("migrations/mysql");
|
|
|
|
pub fn run_migrations() {
|
|
// Make sure the database is up to date (create if it doesn't exist, or run the migrations)
|
|
let connection = crate::db::get_connection().expect("Can't connect to DB");
|
|
|
|
use std::io::stdout;
|
|
embedded_migrations::run_with_output(&connection, &mut stdout()).expect("Can't run migrations");
|
|
}
|
|
}
|
|
|
|
fn launch_rocket() {
|
|
// Create Rocket object, this stores current log level and sets it's own
|
|
let rocket = rocket::ignite();
|
|
|
|
// If we aren't logging the mounts, we force the logging level down
|
|
if !CONFIG.log_mounts() {
|
|
log::set_max_level(log::LevelFilter::Warn);
|
|
}
|
|
|
|
let rocket = rocket
|
|
.mount("/", api::web_routes())
|
|
.mount("/api", api::core_routes())
|
|
.mount("/admin", api::admin_routes())
|
|
.mount("/identity", api::identity_routes())
|
|
.mount("/icons", api::icons_routes())
|
|
.mount("/notifications", api::notifications_routes());
|
|
|
|
// Force the level up for the fairings, managed state and lauch
|
|
if !CONFIG.log_mounts() {
|
|
log::set_max_level(log::LevelFilter::max());
|
|
}
|
|
|
|
let rocket = rocket
|
|
.manage(db::init_pool())
|
|
.manage(api::start_notification_server())
|
|
.attach(util::AppHeaders());
|
|
|
|
// Launch and print error if there is one
|
|
// The launch will restore the original logging level
|
|
error!("Launch error {:#?}", rocket.launch());
|
|
}
|