更新一波
This commit is contained in:
parent
06cccb8432
commit
8f2747edfd
63
src/config.rs
Normal file
63
src/config.rs
Normal file
@ -0,0 +1,63 @@
|
||||
|
||||
#[derive(Debug, Clone, Copy, PartialEq, Eq, Hash)]
|
||||
pub enum ClusterByoc {
|
||||
http,
|
||||
https,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, PartialEq, Eq, Hash)]
|
||||
pub struct Config {
|
||||
pub cluster_port: u32,
|
||||
pub cluster_id: u32,
|
||||
pub cluster_secret: String,
|
||||
/// CLUSTER_BYOC
|
||||
pub cluster_byoc: ClusterByoc,
|
||||
pub no_demaon: bool,
|
||||
/// DISABLE_ACCESS_LOG
|
||||
pub disable_access_log: bool,
|
||||
/// FORCE_NOOPEN
|
||||
pub force_noopen: bool,
|
||||
}
|
||||
|
||||
impl Config {
|
||||
pub fn new_from_env() -> Self {
|
||||
let cluster_port = std::env::var("CLUSTER_PORT")
|
||||
.unwrap_or_else(|_| "8080".to_string())
|
||||
.parse::<u32>()
|
||||
.expect("CLUSTER_PORT must be a number");
|
||||
let cluster_id = std::env::var("CLUSTER_ID")
|
||||
.unwrap_or_else(|_| "1".to_string())
|
||||
.parse::<u32>()
|
||||
.expect("CLUSTER_ID must be a number");
|
||||
let cluster_secret = std::env::var("CLUSTER_SECRET").expect("CLUSTER_SECRET must be set");
|
||||
let cluster_byoc = match std::env::var("CLUSTER_BYOC")
|
||||
.unwrap_or_else(|_| "http".to_string())
|
||||
.as_str()
|
||||
{
|
||||
"http" => ClusterByoc::http,
|
||||
"https" => ClusterByoc::https,
|
||||
_ => panic!("CLUSTER_BYOC must be http or https"),
|
||||
};
|
||||
let no_demaon = std::env::var("NO_DAEMON")
|
||||
.unwrap_or_else(|_| "false".to_string())
|
||||
.parse::<bool>()
|
||||
.expect("NO_DAEMON must be true or false");
|
||||
let disable_access_log = std::env::var("DISABLE_ACCESS_LOG")
|
||||
.unwrap_or_else(|_| "false".to_string())
|
||||
.parse::<bool>()
|
||||
.expect("DISABLE_ACCESS_LOG must be true or false");
|
||||
let force_noopen = std::env::var("FORCE_NOOPEN")
|
||||
.unwrap_or_else(|_| "false".to_string())
|
||||
.parse::<bool>()
|
||||
.expect("FORCE_NOOPEN must be true or false");
|
||||
Self {
|
||||
cluster_port,
|
||||
cluster_id,
|
||||
cluster_secret,
|
||||
cluster_byoc,
|
||||
no_demaon,
|
||||
disable_access_log,
|
||||
force_noopen,
|
||||
}
|
||||
}
|
||||
}
|
@ -1,4 +1 @@
|
||||
|
||||
pub fn init_logging() {
|
||||
|
||||
}
|
||||
pub fn init_logging() {}
|
||||
|
@ -1,6 +1,5 @@
|
||||
mod log;
|
||||
mod serve;
|
||||
mod utils;
|
||||
|
||||
fn main() {
|
||||
|
||||
}
|
||||
fn main() {}
|
||||
|
43
src/serve.rs
Normal file
43
src/serve.rs
Normal file
@ -0,0 +1,43 @@
|
||||
use axum::{extract::Path, http::header::HeaderMap, http::StatusCode, response::IntoResponse};
|
||||
|
||||
/// ```ts
|
||||
/// import express from 'express'
|
||||
///
|
||||
/// const router = express.Router()
|
||||
///
|
||||
/// const MeasureRoute = router
|
||||
///
|
||||
/// router.get('/:size(\\d+)', (req, res) => {
|
||||
/// if (req.get('x-openbmclapi-secret') !== process.env.CLUSTER_SECRET) {
|
||||
/// return res.sendStatus(403)
|
||||
/// }
|
||||
/// const size = parseInt(req.params.size, 10)
|
||||
/// if (isNaN(size) || size > 200) return res.sendStatus(400)
|
||||
/// const buffer = Buffer.alloc(1024 * 1024, '0066ccff', 'hex')
|
||||
/// res.set('content-length', (size * 1024 * 1024).toString())
|
||||
/// for (let i = 0; i < size; i++) {
|
||||
/// res.write(buffer)
|
||||
/// }
|
||||
/// })
|
||||
///
|
||||
/// export default MeasureRoute
|
||||
/// ```
|
||||
async fn measure(header: HeaderMap, Path(size): Path<u32>) -> impl IntoResponse {
|
||||
match header.get("x-openbmclapi-secret") {
|
||||
Some(secret) => {
|
||||
if secret != "secret" {
|
||||
return (StatusCode::FORBIDDEN, Vec::new());
|
||||
}
|
||||
if size > 200 {
|
||||
return (StatusCode::BAD_REQUEST, Vec::new());
|
||||
}
|
||||
let buffer: Vec<u8> = vec![0x00, 0x66, 0xcc, 0xff];
|
||||
let mut response: Vec<u8> = Vec::new();
|
||||
for _ in 0..size {
|
||||
response.extend(&buffer);
|
||||
}
|
||||
return (StatusCode::OK, response);
|
||||
}
|
||||
None => return (StatusCode::FORBIDDEN, Vec::new()),
|
||||
}
|
||||
}
|
21
src/utils.rs
21
src/utils.rs
@ -1,6 +1,6 @@
|
||||
use md5::{Digest, Md5};
|
||||
use sha1::{Digest as Sha1Digest, Sha1};
|
||||
use std::path::PathBuf;
|
||||
use md5::{Md5, Digest};
|
||||
use sha1::{Sha1, Digest as Sha1Digest};
|
||||
|
||||
/// import {join} from 'path'
|
||||
///
|
||||
@ -35,7 +35,7 @@ pub fn validate_file(buffer: &[u8], check_sum: &str) -> bool {
|
||||
let result = hasher.finalize();
|
||||
let result_str = format!("{:x}", result);
|
||||
result_str == check_sum
|
||||
},
|
||||
}
|
||||
_ => {
|
||||
let mut hasher = Sha1::new();
|
||||
hasher.update(buffer);
|
||||
@ -48,11 +48,20 @@ pub fn validate_file(buffer: &[u8], check_sum: &str) -> bool {
|
||||
|
||||
#[test]
|
||||
fn test_hash_to_filename() {
|
||||
assert_eq!(hash_to_filename("1234567890abcdef"), PathBuf::from("12/1234567890abcdef"));
|
||||
assert_eq!(
|
||||
hash_to_filename("1234567890abcdef"),
|
||||
PathBuf::from("12/1234567890abcdef")
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_validate_file() {
|
||||
assert_eq!(validate_file(b"hello", "5d41402abc4b2a76b9719d911017c592"), true);
|
||||
assert_eq!(validate_file(b"hello", "5d41402abc4b2a76b9719d911017c593"), false);
|
||||
assert_eq!(
|
||||
validate_file(b"hello", "5d41402abc4b2a76b9719d911017c592"),
|
||||
true
|
||||
);
|
||||
assert_eq!(
|
||||
validate_file(b"hello", "5d41402abc4b2a76b9719d911017c593"),
|
||||
false
|
||||
);
|
||||
}
|
Loading…
Reference in New Issue
Block a user