mirror of
https://github.com/idanoo/autobrr
synced 2025-07-22 16:29:12 +00:00

* feat(metrics): add metrics server * chore: update license headers * feat(metrics): add optional basic auth * feat(metrics): add go and process collectors --------- Co-authored-by: ze0s <43699394+zze0s@users.noreply.github.com> Co-authored-by: ze0s <ze0s@riseup.net>
344 lines
9 KiB
Go
344 lines
9 KiB
Go
// Copyright (c) 2021 - 2025, Ludvig Lundgren and the autobrr contributors.
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
|
|
package main
|
|
|
|
import (
|
|
"bufio"
|
|
"context"
|
|
"encoding/json"
|
|
"flag"
|
|
"fmt"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/autobrr/autobrr/internal/auth"
|
|
"github.com/autobrr/autobrr/internal/config"
|
|
"github.com/autobrr/autobrr/internal/database"
|
|
"github.com/autobrr/autobrr/internal/database/tools"
|
|
"github.com/autobrr/autobrr/internal/domain"
|
|
"github.com/autobrr/autobrr/internal/logger"
|
|
"github.com/autobrr/autobrr/internal/user"
|
|
"github.com/autobrr/autobrr/pkg/errors"
|
|
|
|
_ "github.com/lib/pq"
|
|
"golang.org/x/crypto/bcrypt"
|
|
"golang.org/x/term"
|
|
)
|
|
|
|
const usage = `usage: autobrrctl <action> [options]
|
|
|
|
Actions:
|
|
create-user <username> Create a new user
|
|
change-password <username> Change the password
|
|
db:seed --db-path <path-to-database> --seed-db <path-to-sql-seed> Seed the sqlite database
|
|
db:reset --db-path <path-to-database> --seed-db <path-to-sql-seed> Reset the sqlite database
|
|
db:convert --sqlite-db <path-to-sqlite-db> --postgres-url <postgres-db-url> Convert SQLite to Postgres
|
|
version Display the version of autobrrctl
|
|
help Show this help message
|
|
|
|
Examples:
|
|
autobrrctl --config /path/to/config/dir create-user john
|
|
autobrrctl --config /path/to/config/dir change-password john
|
|
autobrrctl db:reset --db-path /path/to/autobrr.db --seed-db /path/to/seed
|
|
autobrrctl db:seed --db-path /path/to/autobrr.db --seed-db /path/to/seed
|
|
autobrrctl db:convert --sqlite-db /path/to/autobrr.db --postgres-url postgres://username:password@127.0.0.1:5432/autobrr
|
|
autobrrctl version
|
|
autobrrctl help
|
|
`
|
|
|
|
var (
|
|
version = "dev"
|
|
commit = ""
|
|
date = ""
|
|
|
|
owner = "autobrr"
|
|
repo = "autobrr"
|
|
)
|
|
|
|
func init() {
|
|
flag.Usage = func() {
|
|
fmt.Fprint(flag.CommandLine.Output(), usage)
|
|
}
|
|
}
|
|
|
|
func main() {
|
|
var configPath string
|
|
flag.StringVar(&configPath, "config", "", "path to configuration file")
|
|
flag.Parse()
|
|
|
|
switch cmd := flag.Arg(0); cmd {
|
|
|
|
case "version":
|
|
fmt.Printf("Version: %v\nCommit: %v\nBuild: %v\n", version, commit, date)
|
|
|
|
// get the latest release tag from brr-api
|
|
client := &http.Client{
|
|
Timeout: 10 * time.Second,
|
|
}
|
|
|
|
resp, err := client.Get(fmt.Sprintf("https://api.autobrr.com/repos/%s/%s/releases/latest", owner, repo))
|
|
if err != nil {
|
|
if errors.Is(err, http.ErrHandlerTimeout) {
|
|
fmt.Println("Server timed out while fetching latest release from api")
|
|
} else {
|
|
fmt.Printf("Failed to fetch latest release from api: %v\n", err)
|
|
}
|
|
os.Exit(1)
|
|
}
|
|
defer resp.Body.Close()
|
|
|
|
// brr-api returns 500 instead of 404 here
|
|
if resp.StatusCode == http.StatusNotFound || resp.StatusCode == http.StatusInternalServerError {
|
|
fmt.Printf("No release found for %s/%s\n", owner, repo)
|
|
os.Exit(1)
|
|
}
|
|
|
|
var rel struct {
|
|
TagName string `json:"tag_name"`
|
|
}
|
|
if err := json.NewDecoder(resp.Body).Decode(&rel); err != nil {
|
|
fmt.Printf("Failed to decode response from api: %v\n", err)
|
|
os.Exit(1)
|
|
}
|
|
fmt.Printf("Latest release: %v\n", rel.TagName)
|
|
|
|
case "create-user":
|
|
if configPath == "" {
|
|
log.Fatal("--config required")
|
|
}
|
|
|
|
username := flag.Arg(1)
|
|
if username == "" {
|
|
flag.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
// read config
|
|
cfg := config.New(configPath, version)
|
|
|
|
// init new logger
|
|
l := logger.New(cfg.Config)
|
|
|
|
// open database connection
|
|
db, _ := database.NewDB(cfg.Config, l)
|
|
if err := db.Open(); err != nil {
|
|
log.Fatal("could not open db connection")
|
|
}
|
|
|
|
userRepo := database.NewUserRepo(l, db)
|
|
|
|
userSvc := user.NewService(userRepo)
|
|
authSvc := auth.NewService(l, userSvc)
|
|
|
|
ctx := context.Background()
|
|
|
|
password, err := readPassword()
|
|
if err != nil {
|
|
log.Fatalf("failed to read password: %v", err)
|
|
}
|
|
|
|
hashed, err := authSvc.CreateHash(string(password))
|
|
if err != nil {
|
|
log.Fatalf("failed to hash password: %v", err)
|
|
}
|
|
|
|
req := domain.CreateUserRequest{
|
|
Username: username,
|
|
Password: hashed,
|
|
}
|
|
|
|
if err := userRepo.Store(ctx, req); err != nil {
|
|
log.Fatalf("failed to create user: %v", err)
|
|
}
|
|
|
|
case "change-password":
|
|
if configPath == "" {
|
|
log.Fatal("--config required")
|
|
}
|
|
|
|
username := flag.Arg(1)
|
|
if username == "" {
|
|
flag.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
// read config
|
|
cfg := config.New(configPath, version)
|
|
|
|
// init new logger
|
|
l := logger.New(cfg.Config)
|
|
|
|
// open database connection
|
|
db, _ := database.NewDB(cfg.Config, l)
|
|
if err := db.Open(); err != nil {
|
|
log.Fatal("could not open db connection")
|
|
}
|
|
|
|
userRepo := database.NewUserRepo(l, db)
|
|
|
|
userSvc := user.NewService(userRepo)
|
|
authSvc := auth.NewService(l, userSvc)
|
|
|
|
ctx := context.Background()
|
|
|
|
usr, err := userSvc.FindByUsername(ctx, username)
|
|
if err != nil {
|
|
log.Fatalf("failed to get user: %v", err)
|
|
}
|
|
|
|
if usr == nil {
|
|
log.Fatalf("failed to get user: %v", err)
|
|
}
|
|
|
|
password, err := readPassword()
|
|
if err != nil {
|
|
log.Fatalf("failed to read password: %v", err)
|
|
}
|
|
|
|
hashed, err := authSvc.CreateHash(string(password))
|
|
if err != nil {
|
|
log.Fatalf("failed to hash password: %v", err)
|
|
}
|
|
|
|
usr.Password = hashed
|
|
|
|
req := domain.UpdateUserRequest{
|
|
UsernameCurrent: username,
|
|
PasswordNew: string(password),
|
|
PasswordNewHash: hashed,
|
|
}
|
|
|
|
if err := userSvc.Update(ctx, req); err != nil {
|
|
log.Fatalf("failed to create user: %v", err)
|
|
}
|
|
|
|
log.Printf("successfully updated password for user %q", username)
|
|
|
|
case "db:convert":
|
|
var sqliteDBPath, postgresDBURL string
|
|
migrateFlagSet := flag.NewFlagSet("db:convert", flag.ExitOnError)
|
|
migrateFlagSet.StringVar(&sqliteDBPath, "sqlite-db", "", "path to SQLite database file")
|
|
migrateFlagSet.StringVar(&postgresDBURL, "postgres-url", "", "URL for PostgreSQL database")
|
|
|
|
if err := migrateFlagSet.Parse(flag.Args()[1:]); err != nil {
|
|
fmt.Printf("Error parsing flags for db:convert: %v\n", err)
|
|
migrateFlagSet.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
if sqliteDBPath == "" || postgresDBURL == "" {
|
|
fmt.Println("Error: missing required flags for db:convert")
|
|
flag.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
c := tools.NewConverter(sqliteDBPath, postgresDBURL)
|
|
if err := c.Convert(); err != nil {
|
|
log.Fatalf("database conversion failed: %v", err)
|
|
}
|
|
|
|
case "db:seed", "db:reset":
|
|
var dbPath, seedDBPath string
|
|
seedResetFlagSet := flag.NewFlagSet("db:seed/db:reset", flag.ExitOnError)
|
|
seedResetFlagSet.StringVar(&dbPath, "db-path", "", "path to the database file")
|
|
seedResetFlagSet.StringVar(&seedDBPath, "seed-db", "", "path to SQL seed file")
|
|
|
|
if err := seedResetFlagSet.Parse(flag.Args()[1:]); err != nil {
|
|
fmt.Printf("Error parsing flags for db:seed or db:reset: %v\n", err)
|
|
seedResetFlagSet.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
if dbPath == "" || seedDBPath == "" {
|
|
fmt.Println("Error: missing required flags for db:seed or db:reset")
|
|
flag.Usage()
|
|
os.Exit(1)
|
|
}
|
|
|
|
s := tools.NewSQLiteSeeder(dbPath, seedDBPath)
|
|
|
|
if cmd == "db:seed" {
|
|
if err := s.Seed(); err != nil {
|
|
fmt.Println("Error seeding the database:", err)
|
|
os.Exit(1)
|
|
}
|
|
fmt.Println("Database seeding completed successfully!")
|
|
} else {
|
|
if err := s.Reset(); err != nil {
|
|
fmt.Println("Error resetting the database:", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
if err := s.Seed(); err != nil {
|
|
fmt.Println("Error seeding the database:", err)
|
|
os.Exit(1)
|
|
}
|
|
fmt.Println("Database reset and reseed completed successfully!")
|
|
}
|
|
|
|
case "htpasswd":
|
|
password, err := readPassword()
|
|
if err != nil {
|
|
log.Fatalf("failed to read password: %v", err)
|
|
}
|
|
|
|
hash, err := CreateHtpasswdHash(string(password))
|
|
if err != nil {
|
|
log.Fatalf("failed to hash password: %v", err)
|
|
}
|
|
|
|
fmt.Println(hash)
|
|
|
|
default:
|
|
flag.Usage()
|
|
if cmd != "help" {
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
}
|
|
|
|
func readPassword() (password []byte, err error) {
|
|
fd := int(os.Stdin.Fd())
|
|
|
|
if term.IsTerminal(fd) {
|
|
fmt.Printf("Password: ")
|
|
password, err = term.ReadPassword(int(os.Stdin.Fd()))
|
|
fmt.Printf("\n")
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to read password from terminal")
|
|
}
|
|
} else {
|
|
scanner := bufio.NewScanner(os.Stdin)
|
|
if !scanner.Scan() {
|
|
if err := scanner.Err(); err != nil {
|
|
return nil, errors.Wrap(err, "failed to read password from stdin")
|
|
}
|
|
|
|
return nil, errors.New("password input is empty")
|
|
}
|
|
|
|
password = scanner.Bytes()
|
|
}
|
|
|
|
// make sure the password is not empty
|
|
if len(password) == 0 {
|
|
return nil, errors.New("zero length password")
|
|
}
|
|
|
|
return password, nil
|
|
}
|
|
|
|
// CreateHtpasswdHash generates a bcrypt hash of the password for use in basic auth
|
|
func CreateHtpasswdHash(password string) (string, error) {
|
|
// Generate a bcrypt hash from the input password
|
|
hash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to generate hash: %v", err)
|
|
}
|
|
|
|
// Return the formatted bcrypt hash (with the bcrypt marker "$2y$")
|
|
return string(hash), nil
|
|
}
|