meilisearch/meilisearch-http/src/option.rs

223 lines
8.5 KiB
Rust
Raw Normal View History

2021-09-29 04:22:59 +08:00
use std::fs;
2020-12-12 20:32:06 +08:00
use std::io::{BufReader, Read};
use std::path::PathBuf;
use std::sync::Arc;
2020-12-22 21:02:41 +08:00
use byte_unit::Byte;
use clap::Parser;
2021-09-29 04:22:59 +08:00
use meilisearch_lib::options::IndexerOpts;
2020-12-12 20:32:06 +08:00
use rustls::internal::pemfile::{certs, pkcs8_private_keys, rsa_private_keys};
use rustls::{
AllowAnyAnonymousOrAuthenticatedClient, AllowAnyAuthenticatedClient, NoClientAuth,
RootCertStore,
};
2021-01-30 02:14:23 +08:00
2020-12-12 20:32:06 +08:00
const POSSIBLE_ENV: [&str; 2] = ["development", "production"];
#[derive(Debug, Clone, Parser)]
2020-12-12 20:32:06 +08:00
pub struct Opt {
/// The destination where the database must be created.
#[clap(long, env = "MEILI_DB_PATH", default_value = "./data.ms")]
2020-12-23 00:13:50 +08:00
pub db_path: PathBuf,
2020-12-12 20:32:06 +08:00
/// The address on which the http server will listen.
#[clap(long, env = "MEILI_HTTP_ADDR", default_value = "127.0.0.1:7700")]
2020-12-12 20:32:06 +08:00
pub http_addr: String,
/// The master key allowing you to do everything on the server.
#[clap(long, env = "MEILI_MASTER_KEY")]
2020-12-12 20:32:06 +08:00
pub master_key: Option<String>,
/// This environment variable must be set to `production` if you are running in production.
/// If the server is running in development mode more logs will be displayed,
/// and the master key can be avoided which implies that there is no security on the updates routes.
/// This is useful to debug when integrating the engine with another service.
#[clap(long, env = "MEILI_ENV", default_value = "development", possible_values = &POSSIBLE_ENV)]
2020-12-12 20:32:06 +08:00
pub env: String,
/// Do not send analytics to Meili.
2021-06-16 23:12:49 +08:00
#[cfg(all(not(debug_assertions), feature = "analytics"))]
#[clap(long, env = "MEILI_NO_ANALYTICS")]
pub no_analytics: bool,
2020-12-12 20:32:06 +08:00
/// The maximum size, in bytes, of the main lmdb database directory
#[clap(long, env = "MEILI_MAX_INDEX_SIZE", default_value = "100 GiB")]
2021-06-17 01:50:15 +08:00
pub max_index_size: Byte,
2020-12-12 20:32:06 +08:00
/// The maximum size, in bytes, of the update lmdb database directory
#[clap(long, env = "MEILI_MAX_TASK_DB_SIZE", default_value = "100 GiB")]
pub max_task_db_size: Byte,
2020-12-12 20:32:06 +08:00
/// The maximum size, in bytes, of accepted JSON payloads
#[clap(long, env = "MEILI_HTTP_PAYLOAD_SIZE_LIMIT", default_value = "100 MB")]
2020-12-22 21:02:41 +08:00
pub http_payload_size_limit: Byte,
2020-12-12 20:32:06 +08:00
/// Read server certificates from CERTFILE.
/// This should contain PEM-format certificates
/// in the right order (the first certificate should
/// certify KEYFILE, the last should be a root CA).
#[clap(long, env = "MEILI_SSL_CERT_PATH", parse(from_os_str))]
2020-12-12 20:32:06 +08:00
pub ssl_cert_path: Option<PathBuf>,
/// Read private key from KEYFILE. This should be a RSA
/// private key or PKCS8-encoded private key, in PEM format.
#[clap(long, env = "MEILI_SSL_KEY_PATH", parse(from_os_str))]
2020-12-12 20:32:06 +08:00
pub ssl_key_path: Option<PathBuf>,
/// Enable client authentication, and accept certificates
/// signed by those roots provided in CERTFILE.
#[clap(long, env = "MEILI_SSL_AUTH_PATH", parse(from_os_str))]
2020-12-12 20:32:06 +08:00
pub ssl_auth_path: Option<PathBuf>,
/// Read DER-encoded OCSP response from OCSPFILE and staple to certificate.
/// Optional
#[clap(long, env = "MEILI_SSL_OCSP_PATH", parse(from_os_str))]
2020-12-12 20:32:06 +08:00
pub ssl_ocsp_path: Option<PathBuf>,
/// Send a fatal alert if the client does not complete client authentication.
#[clap(long, env = "MEILI_SSL_REQUIRE_AUTH")]
2020-12-12 20:32:06 +08:00
pub ssl_require_auth: bool,
/// SSL support session resumption
#[clap(long, env = "MEILI_SSL_RESUMPTION")]
2020-12-12 20:32:06 +08:00
pub ssl_resumption: bool,
/// SSL support tickets.
#[clap(long, env = "MEILI_SSL_TICKETS")]
2020-12-12 20:32:06 +08:00
pub ssl_tickets: bool,
/// Defines the path of the snapshot file to import.
/// This option will, by default, stop the process if a database already exist or if no snapshot exists at
/// the given path. If this option is not specified no snapshot is imported.
#[clap(long)]
2020-12-12 20:32:06 +08:00
pub import_snapshot: Option<PathBuf>,
/// The engine will ignore a missing snapshot and not return an error in such case.
#[clap(long, requires = "import-snapshot")]
2020-12-12 20:32:06 +08:00
pub ignore_missing_snapshot: bool,
/// The engine will skip snapshot importation and not return an error in such case.
#[clap(long, requires = "import-snapshot")]
2020-12-12 20:32:06 +08:00
pub ignore_snapshot_if_db_exists: bool,
/// Defines the directory path where meilisearch will create snapshot each snapshot_time_gap.
#[clap(long, env = "MEILI_SNAPSHOT_DIR", default_value = "snapshots/")]
2020-12-12 20:32:06 +08:00
pub snapshot_dir: PathBuf,
/// Activate snapshot scheduling.
#[clap(long, env = "MEILI_SCHEDULE_SNAPSHOT")]
2020-12-12 20:32:06 +08:00
pub schedule_snapshot: bool,
/// Defines time interval, in seconds, between each snapshot creation.
#[clap(long, env = "MEILI_SNAPSHOT_INTERVAL_SEC", default_value = "86400")] // 24h
2021-03-17 19:01:56 +08:00
pub snapshot_interval_sec: u64,
2020-12-12 20:32:06 +08:00
/// Folder where dumps are created when the dump route is called.
#[clap(long, env = "MEILI_DUMPS_DIR", default_value = "dumps/")]
2020-12-12 20:32:06 +08:00
pub dumps_dir: PathBuf,
2021-06-17 01:50:15 +08:00
/// Import a dump from the specified path, must be a `.dump` file.
#[clap(long, conflicts_with = "import-snapshot")]
2020-12-12 20:32:06 +08:00
pub import_dump: Option<PathBuf>,
/// Set the log level
#[clap(long, env = "MEILI_LOG_LEVEL", default_value = "info")]
pub log_level: String,
#[clap(skip)]
2020-12-23 00:13:50 +08:00
pub indexer_options: IndexerOpts,
2020-12-12 20:32:06 +08:00
}
impl Opt {
2021-09-15 00:39:02 +08:00
pub fn get_ssl_config(&self) -> anyhow::Result<Option<rustls::ServerConfig>> {
2020-12-12 20:32:06 +08:00
if let (Some(cert_path), Some(key_path)) = (&self.ssl_cert_path, &self.ssl_key_path) {
let client_auth = match &self.ssl_auth_path {
Some(auth_path) => {
let roots = load_certs(auth_path.to_path_buf())?;
let mut client_auth_roots = RootCertStore::empty();
for root in roots {
client_auth_roots.add(&root).unwrap();
}
if self.ssl_require_auth {
AllowAnyAuthenticatedClient::new(client_auth_roots)
} else {
AllowAnyAnonymousOrAuthenticatedClient::new(client_auth_roots)
}
}
None => NoClientAuth::new(),
};
let mut config = rustls::ServerConfig::new(client_auth);
config.key_log = Arc::new(rustls::KeyLogFile::new());
let certs = load_certs(cert_path.to_path_buf())?;
let privkey = load_private_key(key_path.to_path_buf())?;
let ocsp = load_ocsp(&self.ssl_ocsp_path)?;
config
.set_single_cert_with_ocsp_and_sct(certs, privkey, ocsp, vec![])
2021-09-15 00:39:02 +08:00
.map_err(|_| anyhow::anyhow!("bad certificates/private key"))?;
2020-12-12 20:32:06 +08:00
if self.ssl_resumption {
config.set_persistence(rustls::ServerSessionMemoryCache::new(256));
}
if self.ssl_tickets {
config.ticketer = rustls::Ticketer::new();
}
Ok(Some(config))
} else {
Ok(None)
}
}
}
2021-09-15 00:39:02 +08:00
fn load_certs(filename: PathBuf) -> anyhow::Result<Vec<rustls::Certificate>> {
2021-09-29 04:22:59 +08:00
let certfile =
fs::File::open(filename).map_err(|_| anyhow::anyhow!("cannot open certificate file"))?;
2020-12-12 20:32:06 +08:00
let mut reader = BufReader::new(certfile);
2021-09-29 04:22:59 +08:00
certs(&mut reader).map_err(|_| anyhow::anyhow!("cannot read certificate file"))
2020-12-12 20:32:06 +08:00
}
2021-09-15 00:39:02 +08:00
fn load_private_key(filename: PathBuf) -> anyhow::Result<rustls::PrivateKey> {
2020-12-12 20:32:06 +08:00
let rsa_keys = {
2021-09-29 04:22:59 +08:00
let keyfile = fs::File::open(filename.clone())
.map_err(|_| anyhow::anyhow!("cannot open private key file"))?;
2020-12-12 20:32:06 +08:00
let mut reader = BufReader::new(keyfile);
2021-09-29 04:22:59 +08:00
rsa_private_keys(&mut reader)
.map_err(|_| anyhow::anyhow!("file contains invalid rsa private key"))?
2020-12-12 20:32:06 +08:00
};
let pkcs8_keys = {
2021-09-29 04:22:59 +08:00
let keyfile = fs::File::open(filename)
.map_err(|_| anyhow::anyhow!("cannot open private key file"))?;
2020-12-12 20:32:06 +08:00
let mut reader = BufReader::new(keyfile);
2021-09-29 04:22:59 +08:00
pkcs8_private_keys(&mut reader).map_err(|_| {
anyhow::anyhow!(
"file contains invalid pkcs8 private key (encrypted keys not supported)"
)
})?
2020-12-12 20:32:06 +08:00
};
// prefer to load pkcs8 keys
if !pkcs8_keys.is_empty() {
Ok(pkcs8_keys[0].clone())
} else {
assert!(!rsa_keys.is_empty());
Ok(rsa_keys[0].clone())
}
}
2021-09-15 00:39:02 +08:00
fn load_ocsp(filename: &Option<PathBuf>) -> anyhow::Result<Vec<u8>> {
2020-12-12 20:32:06 +08:00
let mut ret = Vec::new();
if let Some(ref name) = filename {
fs::File::open(name)
2021-09-15 00:39:02 +08:00
.map_err(|_| anyhow::anyhow!("cannot open ocsp file"))?
2020-12-12 20:32:06 +08:00
.read_to_end(&mut ret)
2021-09-15 00:39:02 +08:00
.map_err(|_| anyhow::anyhow!("cannot read oscp file"))?;
2020-12-12 20:32:06 +08:00
}
Ok(ret)
}