package main import ( "flag" "fmt" "log" "net/http" "os" "path/filepath" ) func main() { var err error // Parse command line arguments. var listen = flag.String("listen", ":8000", "listen address") var path = flag.String("path", "/tmp/restic", "data directory") var tls = flag.Bool("tls", false, "turn on TLS support") flag.Parse() // Create the missing directories. dirs := []string{ "data", "index", "keys", "locks", "snapshots", "tmp", } for _, d := range dirs { os.MkdirAll(filepath.Join(*path, d), 0700) } for i := 0; i < 256; i++ { os.MkdirAll(filepath.Join(*path, "data", fmt.Sprintf("%02x", i)), 0700) } // Define the routes. context := &Context{*path} router := NewRouter() router.HeadFunc("/config", CheckConfig(context)) router.GetFunc("/config", GetConfig(context)) router.PostFunc("/config", SaveConfig(context)) router.GetFunc("/:dir/", ListBlobs(context)) router.HeadFunc("/:dir/:name", CheckBlob(context)) router.GetFunc("/:type/:name", GetBlob(context)) router.PostFunc("/:type/:name", SaveBlob(context)) router.DeleteFunc("/:type/:name", DeleteBlob(context)) // Check for a password file. var handler http.Handler htpasswdFile, err := NewHtpasswdFromFile(filepath.Join(*path, ".htpasswd")) if err != nil { log.Println("Authentication disabled") handler = router } else { log.Println("Authentication enabled") handler = AuthHandler(htpasswdFile, router) } // Start the server. if !*tls { log.Printf("Starting server on %s\n", *listen) err = http.ListenAndServe(*listen, handler) } else { privateKey := filepath.Join(*path, "private_key") publicKey := filepath.Join(*path, "public_key") log.Println("TLS enabled") log.Printf("Private key: %s", privateKey) log.Printf("Public key: %s", publicKey) log.Printf("Starting server on %s\n", *listen) err = http.ListenAndServeTLS(*listen, publicKey, privateKey, handler) } if err != nil { log.Fatal(err) } }