2023-03-12 10:20:40 +03:00
|
|
|
use anyhow::{bail, Context, Result};
|
2022-11-11 16:46:07 +03:00
|
|
|
use clap::builder::PossibleValuesParser;
|
|
|
|
use clap::{value_parser, Arg, ArgAction, ArgMatches, Command};
|
2022-07-06 07:11:00 +03:00
|
|
|
use clap_complete::{generate, Generator, Shell};
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(feature = "tls")]
|
2022-06-02 06:06:41 +03:00
|
|
|
use rustls::{Certificate, PrivateKey};
|
2022-06-15 14:33:51 +03:00
|
|
|
use std::env;
|
|
|
|
use std::net::IpAddr;
|
2022-05-26 11:17:55 +03:00
|
|
|
use std::path::{Path, PathBuf};
|
|
|
|
|
2022-06-19 06:26:03 +03:00
|
|
|
use crate::auth::AccessControl;
|
2022-06-20 06:25:09 +03:00
|
|
|
use crate::auth::AuthMethod;
|
2022-07-31 03:27:09 +03:00
|
|
|
use crate::log_http::{LogHttp, DEFAULT_LOG_FORMAT};
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(feature = "tls")]
|
2022-06-15 14:33:51 +03:00
|
|
|
use crate::tls::{load_certs, load_private_key};
|
2022-07-08 14:30:05 +03:00
|
|
|
use crate::utils::encode_uri;
|
2022-05-26 11:17:55 +03:00
|
|
|
|
2022-11-11 16:46:07 +03:00
|
|
|
pub fn build_cli() -> Command {
|
2022-06-29 04:19:09 +03:00
|
|
|
let app = Command::new(env!("CARGO_CRATE_NAME"))
|
2022-06-15 14:33:51 +03:00
|
|
|
.version(env!("CARGO_PKG_VERSION"))
|
|
|
|
.author(env!("CARGO_PKG_AUTHORS"))
|
|
|
|
.about(concat!(
|
|
|
|
env!("CARGO_PKG_DESCRIPTION"),
|
|
|
|
" - ",
|
|
|
|
env!("CARGO_PKG_REPOSITORY")
|
|
|
|
))
|
2022-11-11 16:46:07 +03:00
|
|
|
.arg(
|
2023-05-30 11:49:16 +03:00
|
|
|
Arg::new("serve_path")
|
|
|
|
.env("DUFS_SERVE_PATH")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-11-11 16:46:07 +03:00
|
|
|
.default_value(".")
|
|
|
|
.value_parser(value_parser!(PathBuf))
|
|
|
|
.help("Specific path to serve"),
|
|
|
|
)
|
2022-05-29 12:01:30 +03:00
|
|
|
.arg(
|
2022-06-17 03:41:01 +03:00
|
|
|
Arg::new("bind")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_BIND")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-29 12:01:30 +03:00
|
|
|
.short('b')
|
|
|
|
.long("bind")
|
2022-11-11 03:57:44 +03:00
|
|
|
.help("Specify bind address or unix socket")
|
2022-08-27 05:30:08 +03:00
|
|
|
.action(ArgAction::Append)
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_delimiter(',')
|
|
|
|
.value_name("addrs"),
|
2022-05-29 12:01:30 +03:00
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("port")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_PORT")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-29 12:01:30 +03:00
|
|
|
.short('p')
|
|
|
|
.long("port")
|
|
|
|
.default_value("5000")
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_parser(value_parser!(u16))
|
2022-05-29 12:01:30 +03:00
|
|
|
.help("Specify port to listen on")
|
|
|
|
.value_name("port"),
|
|
|
|
)
|
2022-06-02 03:32:31 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("path-prefix")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_PATH_PREFIX")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-02 03:32:31 +03:00
|
|
|
.long("path-prefix")
|
|
|
|
.value_name("path")
|
2022-07-07 10:44:25 +03:00
|
|
|
.help("Specify a path prefix"),
|
2022-06-02 03:32:31 +03:00
|
|
|
)
|
2022-06-25 03:15:16 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("hidden")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_HIDDEN")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-25 03:15:16 +03:00
|
|
|
.long("hidden")
|
2022-09-09 16:30:27 +03:00
|
|
|
.help("Hide paths from directory listings, separated by `,`")
|
2022-06-25 04:57:58 +03:00
|
|
|
.value_name("value"),
|
2022-06-25 03:15:16 +03:00
|
|
|
)
|
2022-06-17 03:41:01 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("auth")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_AUTH")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-17 03:41:01 +03:00
|
|
|
.short('a')
|
|
|
|
.long("auth")
|
2022-06-19 06:26:03 +03:00
|
|
|
.help("Add auth for path")
|
2022-08-27 05:30:08 +03:00
|
|
|
.action(ArgAction::Append)
|
|
|
|
.value_delimiter(',')
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_name("rules"),
|
2022-06-17 03:41:01 +03:00
|
|
|
)
|
2022-06-20 10:11:39 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("auth-method")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_AUTH_METHOD")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-20 10:11:39 +03:00
|
|
|
.long("auth-method")
|
|
|
|
.help("Select auth method")
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_parser(PossibleValuesParser::new(["basic", "digest"]))
|
2022-06-20 10:11:39 +03:00
|
|
|
.default_value("digest")
|
|
|
|
.value_name("value"),
|
|
|
|
)
|
2022-05-29 12:01:30 +03:00
|
|
|
.arg(
|
2022-05-31 03:38:30 +03:00
|
|
|
Arg::new("allow-all")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_ALL")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-31 03:38:30 +03:00
|
|
|
.short('A')
|
|
|
|
.long("allow-all")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-05-31 03:38:30 +03:00
|
|
|
.help("Allow all operations"),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("allow-upload")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_UPLOAD")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-31 03:38:30 +03:00
|
|
|
.long("allow-upload")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-02 14:32:19 +03:00
|
|
|
.help("Allow upload files/folders"),
|
2022-05-31 03:38:30 +03:00
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("allow-delete")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_DELETE")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-31 17:38:00 +03:00
|
|
|
.long("allow-delete")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-02 14:32:19 +03:00
|
|
|
.help("Allow delete files/folders"),
|
2022-05-29 12:01:30 +03:00
|
|
|
)
|
2022-06-21 02:23:20 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("allow-search")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_SEARCH")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-21 02:23:20 +03:00
|
|
|
.long("allow-search")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-21 02:23:20 +03:00
|
|
|
.help("Allow search files/folders"),
|
|
|
|
)
|
2022-05-31 15:53:14 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("allow-symlink")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_SYMLINK")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-05-31 17:38:00 +03:00
|
|
|
.long("allow-symlink")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-02 14:32:19 +03:00
|
|
|
.help("Allow symlink to files/folders outside root directory"),
|
2022-05-31 15:53:14 +03:00
|
|
|
)
|
2022-12-10 06:09:42 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("allow-archive")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ALLOW_ARCHIVE")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-12-10 06:09:42 +03:00
|
|
|
.long("allow-archive")
|
|
|
|
.action(ArgAction::SetTrue)
|
|
|
|
.help("Allow zip archive generation"),
|
|
|
|
)
|
2022-06-19 12:27:09 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("enable-cors")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ENABLE_CORS")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-19 12:27:09 +03:00
|
|
|
.long("enable-cors")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-19 12:27:09 +03:00
|
|
|
.help("Enable CORS, sets `Access-Control-Allow-Origin: *`"),
|
|
|
|
)
|
2022-06-01 17:49:55 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("render-index")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_RENDER_INDEX")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-01 17:49:55 +03:00
|
|
|
.long("render-index")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-20 14:40:09 +03:00
|
|
|
.help("Serve index.html when requesting a directory, returns 404 if not found index.html"),
|
2022-06-01 17:49:55 +03:00
|
|
|
)
|
2022-06-17 03:41:01 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("render-try-index")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_RENDER_TRY_INDEX")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-17 03:41:01 +03:00
|
|
|
.long("render-try-index")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-25 03:15:16 +03:00
|
|
|
.help("Serve index.html when requesting a directory, returns directory listing if not found index.html"),
|
2022-06-17 03:41:01 +03:00
|
|
|
)
|
2022-06-01 17:49:55 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("render-spa")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_RENDER_SPA")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-01 17:49:55 +03:00
|
|
|
.long("render-spa")
|
2022-11-11 16:46:07 +03:00
|
|
|
.action(ArgAction::SetTrue)
|
2022-06-20 14:40:09 +03:00
|
|
|
.help("Serve SPA(Single Page Application)"),
|
2022-09-05 05:30:45 +03:00
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("assets")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_ASSETS")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-09-05 05:30:45 +03:00
|
|
|
.long("assets")
|
|
|
|
.help("Use custom assets to override builtin assets")
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_parser(value_parser!(PathBuf))
|
2022-09-05 05:30:45 +03:00
|
|
|
.value_name("path")
|
2022-06-29 04:19:09 +03:00
|
|
|
);
|
|
|
|
|
|
|
|
#[cfg(feature = "tls")]
|
|
|
|
let app = app
|
2022-06-02 06:06:41 +03:00
|
|
|
.arg(
|
|
|
|
Arg::new("tls-cert")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_TLS_CERT")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-02 06:06:41 +03:00
|
|
|
.long("tls-cert")
|
|
|
|
.value_name("path")
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_parser(value_parser!(PathBuf))
|
2022-06-02 06:06:41 +03:00
|
|
|
.help("Path to an SSL/TLS certificate to serve with HTTPS"),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("tls-key")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_TLS_KEY")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-06-02 06:06:41 +03:00
|
|
|
.long("tls-key")
|
|
|
|
.value_name("path")
|
2022-11-11 16:46:07 +03:00
|
|
|
.value_parser(value_parser!(PathBuf))
|
2022-06-02 06:06:41 +03:00
|
|
|
.help("Path to the SSL/TLS certificate's private key"),
|
2022-06-29 04:19:09 +03:00
|
|
|
);
|
|
|
|
|
2022-07-31 03:27:09 +03:00
|
|
|
app.arg(
|
|
|
|
Arg::new("log-format")
|
2023-02-19 06:40:14 +03:00
|
|
|
.env("DUFS_LOG_FORMAT")
|
2023-02-19 17:48:41 +03:00
|
|
|
.hide_env(true)
|
2022-07-31 03:27:09 +03:00
|
|
|
.long("log-format")
|
|
|
|
.value_name("format")
|
|
|
|
.help("Customize http log format"),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::new("completions")
|
|
|
|
.long("completions")
|
|
|
|
.value_name("shell")
|
|
|
|
.value_parser(value_parser!(Shell))
|
|
|
|
.help("Print shell completion script for <shell>"),
|
|
|
|
)
|
2022-05-26 11:17:55 +03:00
|
|
|
}
|
|
|
|
|
2022-07-06 07:11:00 +03:00
|
|
|
pub fn print_completions<G: Generator>(gen: G, cmd: &mut Command) {
|
|
|
|
generate(gen, cmd, cmd.get_name().to_string(), &mut std::io::stdout());
|
2022-05-26 11:17:55 +03:00
|
|
|
}
|
|
|
|
|
2022-06-20 14:40:09 +03:00
|
|
|
#[derive(Debug)]
|
2022-05-26 11:17:55 +03:00
|
|
|
pub struct Args {
|
2022-11-11 03:57:44 +03:00
|
|
|
pub addrs: Vec<BindAddr>,
|
2022-06-15 14:33:51 +03:00
|
|
|
pub port: u16,
|
2022-05-26 11:17:55 +03:00
|
|
|
pub path: PathBuf,
|
2022-06-19 09:23:10 +03:00
|
|
|
pub path_is_file: bool,
|
2022-06-04 14:08:18 +03:00
|
|
|
pub path_prefix: String,
|
|
|
|
pub uri_prefix: String,
|
2022-07-19 15:37:14 +03:00
|
|
|
pub hidden: Vec<String>,
|
2022-06-20 06:25:09 +03:00
|
|
|
pub auth_method: AuthMethod,
|
2022-06-19 06:26:03 +03:00
|
|
|
pub auth: AccessControl,
|
2022-05-31 03:38:30 +03:00
|
|
|
pub allow_upload: bool,
|
|
|
|
pub allow_delete: bool,
|
2022-06-21 02:23:20 +03:00
|
|
|
pub allow_search: bool,
|
2022-05-31 15:53:14 +03:00
|
|
|
pub allow_symlink: bool,
|
2022-12-10 06:09:42 +03:00
|
|
|
pub allow_archive: bool,
|
2022-06-01 17:49:55 +03:00
|
|
|
pub render_index: bool,
|
|
|
|
pub render_spa: bool,
|
2022-06-17 14:02:13 +03:00
|
|
|
pub render_try_index: bool,
|
2022-06-19 12:27:09 +03:00
|
|
|
pub enable_cors: bool,
|
2022-09-05 05:30:45 +03:00
|
|
|
pub assets_path: Option<PathBuf>,
|
2022-07-31 03:27:09 +03:00
|
|
|
pub log_http: LogHttp,
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(feature = "tls")]
|
2022-06-02 06:06:41 +03:00
|
|
|
pub tls: Option<(Vec<Certificate>, PrivateKey)>,
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(not(feature = "tls"))]
|
|
|
|
pub tls: Option<()>,
|
2022-05-26 11:17:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Args {
|
|
|
|
/// Parse command-line arguments.
|
|
|
|
///
|
2022-12-10 04:18:54 +03:00
|
|
|
/// If a parsing error occurred, exit the process and print out informative
|
2022-05-26 11:17:55 +03:00
|
|
|
/// error message to user.
|
2023-02-21 12:23:24 +03:00
|
|
|
pub fn parse(matches: ArgMatches) -> Result<Args> {
|
2022-11-11 16:46:07 +03:00
|
|
|
let port = *matches.get_one::<u16>("port").unwrap();
|
2022-06-15 14:33:51 +03:00
|
|
|
let addrs = matches
|
2022-11-11 16:46:07 +03:00
|
|
|
.get_many::<String>("bind")
|
|
|
|
.map(|bind| bind.map(|v| v.as_str()).collect())
|
2022-06-15 14:33:51 +03:00
|
|
|
.unwrap_or_else(|| vec!["0.0.0.0", "::"]);
|
2022-11-11 03:57:44 +03:00
|
|
|
let addrs: Vec<BindAddr> = Args::parse_addrs(&addrs)?;
|
2023-05-30 11:49:16 +03:00
|
|
|
let path = Args::parse_path(matches.get_one::<PathBuf>("serve_path").unwrap())?;
|
2022-06-19 09:23:10 +03:00
|
|
|
let path_is_file = path.metadata()?.is_file();
|
2022-06-04 07:51:56 +03:00
|
|
|
let path_prefix = matches
|
2022-11-11 16:46:07 +03:00
|
|
|
.get_one::<String>("path-prefix")
|
2022-06-04 14:08:18 +03:00
|
|
|
.map(|v| v.trim_matches('/').to_owned())
|
|
|
|
.unwrap_or_default();
|
|
|
|
let uri_prefix = if path_prefix.is_empty() {
|
|
|
|
"/".to_owned()
|
|
|
|
} else {
|
2022-07-08 14:30:05 +03:00
|
|
|
format!("/{}/", &encode_uri(&path_prefix))
|
2022-06-04 14:08:18 +03:00
|
|
|
};
|
2022-07-19 15:37:14 +03:00
|
|
|
let hidden: Vec<String> = matches
|
2022-11-11 16:46:07 +03:00
|
|
|
.get_one::<String>("hidden")
|
2022-09-09 16:30:27 +03:00
|
|
|
.map(|v| v.split(',').map(|x| x.to_string()).collect())
|
2022-06-25 03:15:16 +03:00
|
|
|
.unwrap_or_default();
|
2022-11-11 16:46:07 +03:00
|
|
|
let enable_cors = matches.get_flag("enable-cors");
|
2022-06-19 06:26:03 +03:00
|
|
|
let auth: Vec<&str> = matches
|
2022-11-11 16:46:07 +03:00
|
|
|
.get_many::<String>("auth")
|
|
|
|
.map(|auth| auth.map(|v| v.as_str()).collect())
|
2022-06-19 06:26:03 +03:00
|
|
|
.unwrap_or_default();
|
2022-11-11 16:46:07 +03:00
|
|
|
let auth_method = match matches.get_one::<String>("auth-method").unwrap().as_str() {
|
2022-06-20 06:25:09 +03:00
|
|
|
"basic" => AuthMethod::Basic,
|
|
|
|
_ => AuthMethod::Digest,
|
|
|
|
};
|
2022-06-19 06:26:03 +03:00
|
|
|
let auth = AccessControl::new(&auth, &uri_prefix)?;
|
2022-11-11 16:46:07 +03:00
|
|
|
let allow_upload = matches.get_flag("allow-all") || matches.get_flag("allow-upload");
|
|
|
|
let allow_delete = matches.get_flag("allow-all") || matches.get_flag("allow-delete");
|
|
|
|
let allow_search = matches.get_flag("allow-all") || matches.get_flag("allow-search");
|
|
|
|
let allow_symlink = matches.get_flag("allow-all") || matches.get_flag("allow-symlink");
|
2022-12-10 06:09:42 +03:00
|
|
|
let allow_archive = matches.get_flag("allow-all") || matches.get_flag("allow-archive");
|
2022-11-11 16:46:07 +03:00
|
|
|
let render_index = matches.get_flag("render-index");
|
|
|
|
let render_try_index = matches.get_flag("render-try-index");
|
|
|
|
let render_spa = matches.get_flag("render-spa");
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(feature = "tls")]
|
2022-11-11 16:46:07 +03:00
|
|
|
let tls = match (
|
|
|
|
matches.get_one::<PathBuf>("tls-cert"),
|
|
|
|
matches.get_one::<PathBuf>("tls-key"),
|
|
|
|
) {
|
2022-06-02 06:06:41 +03:00
|
|
|
(Some(certs_file), Some(key_file)) => {
|
|
|
|
let certs = load_certs(certs_file)?;
|
|
|
|
let key = load_private_key(key_file)?;
|
|
|
|
Some((certs, key))
|
|
|
|
}
|
|
|
|
_ => None,
|
|
|
|
};
|
2022-06-29 04:19:09 +03:00
|
|
|
#[cfg(not(feature = "tls"))]
|
|
|
|
let tls = None;
|
2022-07-31 03:27:09 +03:00
|
|
|
let log_http: LogHttp = matches
|
2022-11-11 16:46:07 +03:00
|
|
|
.get_one::<String>("log-format")
|
|
|
|
.map(|v| v.as_str())
|
2022-07-31 03:27:09 +03:00
|
|
|
.unwrap_or(DEFAULT_LOG_FORMAT)
|
|
|
|
.parse()?;
|
2022-11-11 16:46:07 +03:00
|
|
|
let assets_path = match matches.get_one::<PathBuf>("assets") {
|
2022-09-05 05:30:45 +03:00
|
|
|
Some(v) => Some(Args::parse_assets_path(v)?),
|
|
|
|
None => None,
|
|
|
|
};
|
2022-05-26 11:17:55 +03:00
|
|
|
|
|
|
|
Ok(Args {
|
2022-06-15 14:33:51 +03:00
|
|
|
addrs,
|
|
|
|
port,
|
2022-05-26 11:17:55 +03:00
|
|
|
path,
|
2022-06-19 09:23:10 +03:00
|
|
|
path_is_file,
|
2022-06-02 03:32:31 +03:00
|
|
|
path_prefix,
|
2022-06-04 14:08:18 +03:00
|
|
|
uri_prefix,
|
2022-06-25 03:15:16 +03:00
|
|
|
hidden,
|
2022-06-20 06:25:09 +03:00
|
|
|
auth_method,
|
2022-05-26 13:06:52 +03:00
|
|
|
auth,
|
2022-06-19 12:27:09 +03:00
|
|
|
enable_cors,
|
2022-05-31 03:38:30 +03:00
|
|
|
allow_delete,
|
|
|
|
allow_upload,
|
2022-06-21 02:23:20 +03:00
|
|
|
allow_search,
|
2022-05-31 15:53:14 +03:00
|
|
|
allow_symlink,
|
2022-12-10 06:09:42 +03:00
|
|
|
allow_archive,
|
2022-06-01 17:49:55 +03:00
|
|
|
render_index,
|
2022-06-17 14:02:13 +03:00
|
|
|
render_try_index,
|
2022-06-01 17:49:55 +03:00
|
|
|
render_spa,
|
2022-06-02 06:06:41 +03:00
|
|
|
tls,
|
2022-07-31 03:27:09 +03:00
|
|
|
log_http,
|
2022-09-05 05:30:45 +03:00
|
|
|
assets_path,
|
2022-05-26 11:17:55 +03:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2023-02-21 12:23:24 +03:00
|
|
|
fn parse_addrs(addrs: &[&str]) -> Result<Vec<BindAddr>> {
|
2022-11-11 03:57:44 +03:00
|
|
|
let mut bind_addrs = vec![];
|
2022-06-15 14:33:51 +03:00
|
|
|
let mut invalid_addrs = vec![];
|
|
|
|
for addr in addrs {
|
|
|
|
match addr.parse::<IpAddr>() {
|
|
|
|
Ok(v) => {
|
2022-11-11 03:57:44 +03:00
|
|
|
bind_addrs.push(BindAddr::Address(v));
|
2022-06-15 14:33:51 +03:00
|
|
|
}
|
|
|
|
Err(_) => {
|
2022-11-11 03:57:44 +03:00
|
|
|
if cfg!(unix) {
|
|
|
|
bind_addrs.push(BindAddr::Path(PathBuf::from(addr)));
|
|
|
|
} else {
|
|
|
|
invalid_addrs.push(*addr);
|
|
|
|
}
|
2022-06-15 14:33:51 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !invalid_addrs.is_empty() {
|
2023-02-21 12:23:24 +03:00
|
|
|
bail!("Invalid bind address `{}`", invalid_addrs.join(","));
|
2022-06-15 14:33:51 +03:00
|
|
|
}
|
2022-11-11 03:57:44 +03:00
|
|
|
Ok(bind_addrs)
|
2022-06-15 14:33:51 +03:00
|
|
|
}
|
|
|
|
|
2023-02-21 12:23:24 +03:00
|
|
|
fn parse_path<P: AsRef<Path>>(path: P) -> Result<PathBuf> {
|
2022-05-26 11:17:55 +03:00
|
|
|
let path = path.as_ref();
|
|
|
|
if !path.exists() {
|
2023-02-21 12:23:24 +03:00
|
|
|
bail!("Path `{}` doesn't exist", path.display());
|
2022-05-26 11:17:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
env::current_dir()
|
|
|
|
.and_then(|mut p| {
|
|
|
|
p.push(path); // If path is absolute, it replaces the current path.
|
2022-05-31 17:38:00 +03:00
|
|
|
std::fs::canonicalize(p)
|
2022-05-26 11:17:55 +03:00
|
|
|
})
|
2023-03-12 10:20:40 +03:00
|
|
|
.with_context(|| format!("Failed to access path `{}`", path.display()))
|
2022-05-26 11:17:55 +03:00
|
|
|
}
|
2022-09-05 05:30:45 +03:00
|
|
|
|
2023-02-21 12:23:24 +03:00
|
|
|
fn parse_assets_path<P: AsRef<Path>>(path: P) -> Result<PathBuf> {
|
2022-09-05 05:30:45 +03:00
|
|
|
let path = Self::parse_path(path)?;
|
|
|
|
if !path.join("index.html").exists() {
|
2023-02-21 12:23:24 +03:00
|
|
|
bail!("Path `{}` doesn't contains index.html", path.display());
|
2022-09-05 05:30:45 +03:00
|
|
|
}
|
|
|
|
Ok(path)
|
|
|
|
}
|
2022-06-06 05:52:12 +03:00
|
|
|
}
|
2022-11-11 03:57:44 +03:00
|
|
|
|
|
|
|
#[derive(Debug, Clone, PartialEq, Eq, PartialOrd, Ord)]
|
|
|
|
pub enum BindAddr {
|
|
|
|
Address(IpAddr),
|
|
|
|
Path(PathBuf),
|
|
|
|
}
|