cli.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008
  1. package raft
  2. import (
  3. "bufio"
  4. "bytes"
  5. "fmt"
  6. "net"
  7. "os"
  8. "os/exec"
  9. "path/filepath"
  10. "regexp"
  11. "runtime"
  12. "sort"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "text/tabwriter"
  17. "time"
  18. )
  19. const (
  20. ColorReset = "\033[0m"
  21. ColorDim = "\033[90m" // Dark Gray
  22. ColorRed = "\033[31m"
  23. ColorGreen = "\033[32m"
  24. ColorYellow = "\033[33m"
  25. ColorBlue = "\033[34m"
  26. ColorCyan = "\033[36m"
  27. )
  28. // CLICommand defines a CLI command handler
  29. type CLICommand struct {
  30. Name string
  31. Description string
  32. Handler func(parts []string, server *KVServer)
  33. }
  34. // CLI manages the command line interface
  35. type CLI struct {
  36. server *KVServer
  37. commands map[string]CLICommand
  38. mu sync.RWMutex
  39. token string
  40. }
  41. // NewCLI creates a new CLI instance
  42. func NewCLI(server *KVServer) *CLI {
  43. cli := &CLI{
  44. server: server,
  45. commands: make(map[string]CLICommand),
  46. }
  47. cli.registerDefaultCommands()
  48. return cli
  49. }
  50. // Helper to calculate visible length of string ignoring ANSI codes
  51. var ansiRegex = regexp.MustCompile(`\x1b\[[0-9;]*m`)
  52. func visibleLen(s string) int {
  53. clean := ansiRegex.ReplaceAllString(s, "")
  54. return len([]rune(clean))
  55. }
  56. func printBoxed(content string) {
  57. lines := strings.Split(strings.TrimSpace(content), "\n")
  58. maxWidth := 0
  59. for _, line := range lines {
  60. l := visibleLen(line)
  61. if l > maxWidth {
  62. maxWidth = l
  63. }
  64. }
  65. // Min width to look decent
  66. if maxWidth < 20 {
  67. maxWidth = 20
  68. }
  69. // Add padding
  70. contentWidth := maxWidth + 2
  71. fmt.Println() // Start new line before box
  72. // Top Border
  73. fmt.Printf("%s╭%s╮%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  74. // Content
  75. for _, line := range lines {
  76. visLen := visibleLen(line)
  77. padding := contentWidth - visLen - 1 // -1 for the space after │
  78. // Ensure padding is not negative
  79. if padding < 0 { padding = 0 }
  80. fmt.Printf("%s│%s %s%s%s│%s\n", ColorDim, ColorReset, line, strings.Repeat(" ", padding), ColorDim, ColorReset)
  81. }
  82. // Bottom Border
  83. fmt.Printf("%s╰%s╯%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  84. fmt.Println() // End new line after box
  85. }
  86. func formatBytes(bytes int64) string {
  87. const unit = 1024
  88. if bytes < unit {
  89. return fmt.Sprintf("%d B", bytes)
  90. }
  91. div, exp := int64(unit), 0
  92. for n := bytes / unit; n >= unit; n /= unit {
  93. div *= unit
  94. exp++
  95. }
  96. return fmt.Sprintf("%.1f %cB", float64(bytes)/float64(div), "KMGTPE"[exp])
  97. }
  98. // scanCRLF is a split function for a Scanner that returns each line of
  99. // text, stripped of any trailing end-of-line marker. The returned line may
  100. // be empty. The end-of-line marker is one optional carriage return followed
  101. // by one mandatory newline, OR just a carriage return.
  102. func scanCRLF(data []byte, atEOF bool) (advance int, token []byte, err error) {
  103. if atEOF && len(data) == 0 {
  104. return 0, nil, nil
  105. }
  106. if i := bytes.IndexByte(data, '\n'); i >= 0 {
  107. // We have a full newline-terminated line.
  108. return i + 1, dropCR(data[0:i]), nil
  109. }
  110. if i := bytes.IndexByte(data, '\r'); i >= 0 {
  111. // We have a CR-terminated line.
  112. return i + 1, data[0:i], nil
  113. }
  114. // If we're at EOF, we have a final, non-terminated line. Return it.
  115. if atEOF {
  116. return len(data), dropCR(data), nil
  117. }
  118. // Request more data.
  119. return 0, nil, nil
  120. }
  121. // dropCR drops a terminal \r from the data.
  122. func dropCR(data []byte) []byte {
  123. if len(data) > 0 && data[len(data)-1] == '\r' {
  124. return data[0 : len(data)-1]
  125. }
  126. return data
  127. }
  128. // Start starts the command line interface
  129. func (c *CLI) Start() {
  130. // Attempt to fix terminal settings if they are messed up (e.g. missing ICRNL)
  131. // This helps when Enter sends \r but the terminal driver expects \n
  132. cmd := exec.Command("stty", "sane")
  133. cmd.Stdin = os.Stdin
  134. cmd.Stdout = os.Stdout
  135. _ = cmd.Run()
  136. // Boxed startup message
  137. var sb strings.Builder
  138. sb.WriteString(fmt.Sprintf("Node %s%s%s CLI Started\n", ColorGreen, c.server.Raft.nodeID, ColorReset))
  139. sb.WriteString("Type 'help' for commands.")
  140. printBoxed(sb.String())
  141. // Initialize history handling
  142. historyPath := filepath.Join(os.TempDir(), fmt.Sprintf(".raft_history_%s", c.server.Raft.nodeID))
  143. historyFile, err := os.OpenFile(historyPath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
  144. if err != nil {
  145. // Just warn, don't fail
  146. fmt.Printf("%sWarning: Could not open history file: %v%s\n", ColorYellow, err, ColorReset)
  147. }
  148. defer func() {
  149. if historyFile != nil {
  150. historyFile.Close()
  151. }
  152. }()
  153. // State Monitor Loop
  154. go func() {
  155. var lastState string
  156. var lastTerm uint64
  157. stats := c.server.GetStats()
  158. lastState = stats.State
  159. lastTerm = stats.Term
  160. ticker := time.NewTicker(100 * time.Millisecond)
  161. defer ticker.Stop()
  162. for {
  163. select {
  164. case <-c.server.stopCh:
  165. return
  166. case <-ticker.C:
  167. stats := c.server.GetStats()
  168. if stats.State != lastState || stats.Term != lastTerm {
  169. msg := fmt.Sprintf("%s[State Change] %s (Term %d) -> %s (Term %d)%s",
  170. ColorYellow, lastState, lastTerm, stats.State, stats.Term, ColorReset)
  171. fmt.Printf("\n%s\n> ", msg)
  172. lastState = stats.State
  173. lastTerm = stats.Term
  174. }
  175. }
  176. }
  177. }()
  178. scanner := bufio.NewScanner(os.Stdin)
  179. scanner.Split(scanCRLF)
  180. fmt.Print("> ")
  181. for scanner.Scan() {
  182. text := strings.TrimSpace(scanner.Text())
  183. if text == "" {
  184. fmt.Print("> ")
  185. continue
  186. }
  187. // Save command to history
  188. if historyFile != nil {
  189. if _, err := historyFile.WriteString(text + "\n"); err != nil {
  190. // Ignore write error
  191. }
  192. }
  193. parts := strings.Fields(text)
  194. cmdName := strings.ToLower(parts[0])
  195. c.mu.RLock()
  196. cmd, exists := c.commands[cmdName]
  197. c.mu.RUnlock()
  198. if exists {
  199. cmd.Handler(parts, c.server)
  200. } else {
  201. // Check aliases
  202. switch cmdName {
  203. case "binlog", "db", "stats":
  204. c.mu.RLock()
  205. if infoCmd, ok := c.commands["info"]; ok {
  206. infoCmd.Handler(parts, c.server)
  207. }
  208. c.mu.RUnlock()
  209. case "history":
  210. c.printHistory(historyPath)
  211. default:
  212. printBoxed("Unknown command. Type 'help'.")
  213. }
  214. }
  215. fmt.Print("> ")
  216. }
  217. }
  218. // printHistory prints the command history
  219. func (c *CLI) printHistory(path string) {
  220. content, err := os.ReadFile(path)
  221. if err != nil {
  222. printBoxed("No history found.")
  223. return
  224. }
  225. lines := strings.Split(string(content), "\n")
  226. // Show last 20 lines
  227. start := 0
  228. if len(lines) > 20 {
  229. start = len(lines) - 20
  230. }
  231. var sb strings.Builder
  232. sb.WriteString(fmt.Sprintf("%sCommand History (Last 20):%s\n", ColorCyan, ColorReset))
  233. for i := start; i < len(lines); i++ {
  234. line := strings.TrimSpace(lines[i])
  235. if line != "" {
  236. sb.WriteString(fmt.Sprintf("%d: %s\n", i+1, line))
  237. }
  238. }
  239. printBoxed(sb.String())
  240. }
  241. // RegisterCommand registers a new CLI command
  242. func (c *CLI) RegisterCommand(name, description string, handler func(parts []string, server *KVServer)) {
  243. c.mu.Lock()
  244. defer c.mu.Unlock()
  245. c.commands[strings.ToLower(name)] = CLICommand{
  246. Name: name,
  247. Description: description,
  248. Handler: handler,
  249. }
  250. }
  251. func (c *CLI) registerDefaultCommands() {
  252. c.RegisterCommand("set", "Set value (set <key> <val>)", func(parts []string, server *KVServer) {
  253. if len(parts) != 3 {
  254. printBoxed("Usage: set <key> <value>")
  255. return
  256. }
  257. key, val := parts[1], parts[2]
  258. // Use Authenticated Set
  259. c.mu.RLock()
  260. token := c.token
  261. c.mu.RUnlock()
  262. if err := server.SetAuthenticated(key, val, token); err != nil {
  263. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  264. } else {
  265. printBoxed(fmt.Sprintf("%sOK%s", ColorGreen, ColorReset))
  266. }
  267. })
  268. c.RegisterCommand("get", "Get value (get <key>)", func(parts []string, server *KVServer) {
  269. if len(parts) != 2 {
  270. printBoxed("Usage: get <key>")
  271. return
  272. }
  273. key := parts[1]
  274. c.mu.RLock()
  275. token := c.token
  276. c.mu.RUnlock()
  277. if val, ok, err := server.GetLinearAuthenticated(key, token); err != nil {
  278. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  279. } else if !ok {
  280. printBoxed(fmt.Sprintf("%sNot Found%s", ColorYellow, ColorReset))
  281. } else {
  282. printBoxed(fmt.Sprintf("%s%s%s = %s%s%s", ColorCyan, key, ColorReset, ColorYellow, val, ColorReset))
  283. }
  284. })
  285. c.RegisterCommand("del", "Delete key (del <key>)", func(parts []string, server *KVServer) {
  286. if len(parts) != 2 {
  287. printBoxed("Usage: del <key>")
  288. return
  289. }
  290. key := parts[1]
  291. c.mu.RLock()
  292. token := c.token
  293. c.mu.RUnlock()
  294. if err := server.DelAuthenticated(key, token); err != nil {
  295. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  296. } else {
  297. printBoxed(fmt.Sprintf("%sDeleted%s", ColorGreen, ColorReset))
  298. }
  299. })
  300. // User Command Group
  301. c.RegisterCommand("user", "User management commands (type 'user help' for more)", func(parts []string, server *KVServer) {
  302. if len(parts) < 2 {
  303. printBoxed("Usage: user <subcommand> [args...]\nType 'user help' for list of subcommands.")
  304. return
  305. }
  306. subCmd := strings.ToLower(parts[1])
  307. args := parts[2:]
  308. // Common vars
  309. c.mu.RLock()
  310. token := c.token
  311. c.mu.RUnlock()
  312. switch subCmd {
  313. case "init": // Was auth-init
  314. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  315. printBoxed(fmt.Sprintf("%sPermission Denied: Auth already enabled. Login as root to re-init.%s", ColorRed, ColorReset))
  316. return
  317. }
  318. fmt.Print("Enter root password: ")
  319. password, err := readPassword()
  320. fmt.Println()
  321. if err != nil || password == "" {
  322. printBoxed("Error reading password")
  323. return
  324. }
  325. if err := server.AuthManager.CreateRootUser(password); err != nil {
  326. printBoxed(fmt.Sprintf("Failed to create root user: %v", err))
  327. return
  328. }
  329. if err := server.AuthManager.EnableAuth(); err != nil {
  330. printBoxed(fmt.Sprintf("Failed to enable auth: %v", err))
  331. return
  332. }
  333. printBoxed("Auth Initialized. Please login as 'root'.")
  334. case "login": // Was login
  335. if len(args) < 1 {
  336. printBoxed("Usage: user login <username> [code]")
  337. return
  338. }
  339. username := args[0]
  340. code := ""
  341. if len(args) > 1 {
  342. code = args[1]
  343. }
  344. fmt.Print("Password: ")
  345. password, err := readPassword()
  346. fmt.Println()
  347. if err != nil {
  348. printBoxed("Error reading password")
  349. return
  350. }
  351. t, err := server.AuthManager.Login(username, password, code, "cli")
  352. if err != nil {
  353. printBoxed(fmt.Sprintf("%sLogin Failed:%s %v", ColorRed, ColorReset, err))
  354. } else {
  355. c.mu.Lock()
  356. c.token = t
  357. c.mu.Unlock()
  358. printBoxed(fmt.Sprintf("%sLogin Success!%s", ColorGreen, ColorReset))
  359. }
  360. case "logout": // Was logout
  361. if token != "" {
  362. server.Logout(token)
  363. c.mu.Lock()
  364. c.token = ""
  365. c.mu.Unlock()
  366. printBoxed("Logged out.")
  367. } else {
  368. printBoxed("Not logged in.")
  369. }
  370. case "who": // Was whoami
  371. if token == "" {
  372. printBoxed("Not logged in.")
  373. return
  374. }
  375. session, err := server.GetSessionInfo(token)
  376. if err != nil {
  377. printBoxed(fmt.Sprintf("Error: %v", err))
  378. return
  379. }
  380. printBoxed(fmt.Sprintf("Logged in as: %s%s%s", ColorCyan, session.Username, ColorReset))
  381. case "add": // Was user-add
  382. if len(args) < 1 {
  383. printBoxed("Usage: user add <username> [role1,role2...]")
  384. return
  385. }
  386. username := args[0]
  387. var roles []string
  388. if len(args) > 1 {
  389. roles = strings.Split(args[1], ",")
  390. }
  391. fmt.Printf("Enter password for %s: ", username)
  392. password, err := readPassword()
  393. fmt.Println()
  394. if err != nil || password == "" {
  395. printBoxed("Error reading password")
  396. return
  397. }
  398. if err := server.CreateUser(username, password, roles, token); err != nil {
  399. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  400. } else {
  401. printBoxed(fmt.Sprintf("%sUser %s created%s", ColorGreen, username, ColorReset))
  402. }
  403. case "del": // Was user-del
  404. if len(args) < 1 {
  405. printBoxed("Usage: user del <username>")
  406. return
  407. }
  408. username := args[0]
  409. fmt.Printf("Delete user '%s'? (y/N): ", username)
  410. var resp string
  411. fmt.Scanln(&resp)
  412. if strings.ToLower(resp) != "y" {
  413. return
  414. }
  415. if err := server.DeleteUser(username, token); err != nil {
  416. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  417. } else {
  418. printBoxed(fmt.Sprintf("%sUser deleted%s", ColorGreen, ColorReset))
  419. }
  420. case "list":
  421. users, err := server.ListUsers(token)
  422. if err != nil {
  423. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  424. return
  425. }
  426. var buf bytes.Buffer
  427. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  428. fmt.Fprintln(w, "Username\tRoles\tStatus")
  429. fmt.Fprintln(w, "--------\t-----\t------")
  430. for _, u := range users {
  431. status := "Offline"
  432. if u.IsOnline { status = "Online" }
  433. fmt.Fprintf(w, "%s\t%s\t%s\n", u.Username, strings.Join(u.Roles, ","), status)
  434. }
  435. w.Flush()
  436. printBoxed(buf.String())
  437. case "update":
  438. // user update <username> [roles=r1,r2]
  439. // Currently only password update via prompt, maybe roles later
  440. // The prompt implies a generic update but also mentions "user update"
  441. // Let's implement password update here or allow changing roles.
  442. // Ideally arguments: user update <username> roles=admin,dev
  443. // If no args (other than username), prompt for password?
  444. if len(args) < 1 {
  445. printBoxed("Usage: user update <username> [roles=r1,r2...]")
  446. return
  447. }
  448. username := args[0]
  449. // If args present, update roles
  450. if len(args) > 1 {
  451. // Parse options
  452. updated := false
  453. // user, err := server.AuthManager.GetUser(username) // Use internal GetUser helper or logic?
  454. // We need authenticated way. server.ListUsers gives us access if admin.
  455. // But we need the User object to modify.
  456. // Let's rely on server.UpdateUser taking a struct.
  457. // We first need to GET the user to avoid overwriting fields.
  458. // Since we don't have GetUser exposed in server (only List), let's add one or iterate List.
  459. // Iterating List is inefficient but works for now.
  460. users, _ := server.ListUsers(token)
  461. var targetUser *User
  462. for _, u := range users {
  463. if u.Username == username {
  464. targetUser = u
  465. break
  466. }
  467. }
  468. if targetUser == nil {
  469. printBoxed("User not found or permission denied")
  470. return
  471. }
  472. // Apply updates
  473. for _, arg := range args[1:] {
  474. if strings.HasPrefix(arg, "roles=") {
  475. roleStr := strings.TrimPrefix(arg, "roles=")
  476. targetUser.Roles = strings.Split(roleStr, ",")
  477. updated = true
  478. }
  479. }
  480. if updated {
  481. if err := server.UpdateUser(*targetUser, token); err != nil {
  482. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  483. } else {
  484. printBoxed(fmt.Sprintf("%sUser updated%s", ColorGreen, ColorReset))
  485. }
  486. }
  487. } else {
  488. // No args -> Change Password
  489. fmt.Printf("Enter new password for %s: ", username)
  490. pass, err := readPassword()
  491. fmt.Println()
  492. if err != nil || pass == "" {
  493. printBoxed("Error reading password")
  494. return
  495. }
  496. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  497. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  498. } else {
  499. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  500. }
  501. }
  502. case "passwd": // Keep alias or subcommand
  503. if len(args) < 1 {
  504. printBoxed("Usage: user passwd <username>")
  505. return
  506. }
  507. // Reuse logic
  508. username := args[0]
  509. fmt.Printf("Enter new password for %s: ", username)
  510. pass, err := readPassword()
  511. fmt.Println()
  512. if err != nil || pass == "" {
  513. printBoxed("Error reading password")
  514. return
  515. }
  516. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  517. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  518. } else {
  519. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  520. }
  521. case "role":
  522. if len(args) < 1 {
  523. printBoxed("Usage: user role <list|add|delete|update> ...")
  524. return
  525. }
  526. roleCmd := strings.ToLower(args[0])
  527. roleArgs := args[1:]
  528. switch roleCmd {
  529. case "list":
  530. roles, err := server.ListRoles(token)
  531. if err != nil {
  532. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  533. return
  534. }
  535. var buf bytes.Buffer
  536. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  537. fmt.Fprintln(w, "Role\tParents\tPerms")
  538. fmt.Fprintln(w, "----\t-------\t-----")
  539. for _, r := range roles {
  540. parents := strings.Join(r.ParentRoles, ",")
  541. permCount := len(r.Permissions)
  542. fmt.Fprintf(w, "%s\t%s\t%d rules\n", r.Name, parents, permCount)
  543. }
  544. w.Flush()
  545. printBoxed(buf.String())
  546. case "add":
  547. if len(roleArgs) < 1 {
  548. printBoxed("Usage: user role add <name>")
  549. return
  550. }
  551. if err := server.CreateRole(roleArgs[0], token); err != nil {
  552. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  553. } else {
  554. printBoxed(fmt.Sprintf("%sRole %s created%s", ColorGreen, roleArgs[0], ColorReset))
  555. }
  556. case "delete":
  557. if len(roleArgs) < 1 {
  558. printBoxed("Usage: user role delete <name>")
  559. return
  560. }
  561. if err := server.DeleteRole(roleArgs[0], token); err != nil {
  562. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  563. } else {
  564. printBoxed(fmt.Sprintf("%sRole %s deleted%s", ColorGreen, roleArgs[0], ColorReset))
  565. }
  566. case "update":
  567. if len(roleArgs) < 1 {
  568. printBoxed("Usage: user role update <name> [parents=p1,p2] [perms=action:pattern,...]")
  569. return
  570. }
  571. name := roleArgs[0]
  572. roles, _ := server.ListRoles(token)
  573. var targetRole *Role
  574. for _, r := range roles {
  575. if r.Name == name {
  576. targetRole = r
  577. break
  578. }
  579. }
  580. if targetRole == nil {
  581. printBoxed("Role not found")
  582. return
  583. }
  584. updated := false
  585. for _, arg := range roleArgs[1:] {
  586. if strings.HasPrefix(arg, "parents=") {
  587. pStr := strings.TrimPrefix(arg, "parents=")
  588. targetRole.ParentRoles = strings.Split(pStr, ",")
  589. updated = true
  590. }
  591. if strings.HasPrefix(arg, "perms=") {
  592. permStr := strings.TrimPrefix(arg, "perms=")
  593. rules := strings.Split(permStr, ",")
  594. var newPerms []Permission
  595. for _, r := range rules {
  596. parts := strings.SplitN(r, ":", 2)
  597. if len(parts) == 2 {
  598. action := parts[0]
  599. pattern := parts[1]
  600. newPerms = append(newPerms, Permission{
  601. KeyPattern: pattern,
  602. Actions: []string{action},
  603. })
  604. }
  605. }
  606. targetRole.Permissions = newPerms
  607. updated = true
  608. }
  609. }
  610. if updated {
  611. if err := server.UpdateRole(*targetRole, token); err != nil {
  612. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  613. } else {
  614. printBoxed(fmt.Sprintf("%sRole updated%s", ColorGreen, ColorReset))
  615. }
  616. } else {
  617. printBoxed("No changes specified.")
  618. }
  619. default:
  620. printBoxed("Unknown sub-command. Options: list, add, delete, update")
  621. }
  622. case "help":
  623. var sb strings.Builder
  624. sb.WriteString(fmt.Sprintf("%sUser Management Commands:%s\n", ColorCyan, ColorReset))
  625. // Define subcommands for formatting
  626. type subCmd struct {
  627. Name string
  628. Desc string
  629. }
  630. cmds := []subCmd{
  631. {"user init", "Initialize auth system (Root)"},
  632. {"user login <user> [code]", "Login"},
  633. {"user logout", "Logout"},
  634. {"user who", "Current user info"},
  635. {"user add <user> [roles]", "Create user (Root)"},
  636. {"user del <user>", "Delete user (Root)"},
  637. {"user update <user> [opts]", "Update user/pass (Root)"},
  638. {"user list", "List users (Root)"},
  639. {"user role list", "List roles (Root)"},
  640. {"user role add <name>", "Create role (Root)"},
  641. {"user role delete <name>", "Delete role (Root)"},
  642. {"user role update <name> ...", "Update role (Root)"},
  643. }
  644. // Find max length
  645. maxLen := 0
  646. for _, c := range cmds {
  647. if len(c.Name) > maxLen {
  648. maxLen = len(c.Name)
  649. }
  650. }
  651. for _, c := range cmds {
  652. padding := strings.Repeat(" ", maxLen-len(c.Name))
  653. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, c.Name, ColorReset, padding, ColorDim, c.Desc, ColorReset))
  654. }
  655. printBoxed(sb.String())
  656. default:
  657. printBoxed(fmt.Sprintf("Unknown subcommand '%s'. Type 'user help'.", subCmd))
  658. }
  659. })
  660. c.RegisterCommand("join", "Add node to cluster (join <id> <addr>)", func(parts []string, server *KVServer) {
  661. if len(parts) != 3 {
  662. printBoxed("Usage: join <nodeID> <address>")
  663. return
  664. }
  665. // Admin only
  666. c.mu.RLock()
  667. token := c.token
  668. c.mu.RUnlock()
  669. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  670. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  671. return
  672. }
  673. nodeID := parts[1]
  674. addr := parts[2]
  675. if err := server.Join(nodeID, addr); err != nil {
  676. printBoxed(fmt.Sprintf("%sError joining node:%s %v", ColorRed, ColorReset, err))
  677. } else {
  678. printBoxed(fmt.Sprintf("%sJoin request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  679. }
  680. })
  681. c.RegisterCommand("leave", "Remove node from cluster (leave <id>)", func(parts []string, server *KVServer) {
  682. if len(parts) != 2 {
  683. printBoxed("Usage: leave <nodeID>")
  684. return
  685. }
  686. // Admin only
  687. c.mu.RLock()
  688. token := c.token
  689. c.mu.RUnlock()
  690. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  691. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  692. return
  693. }
  694. nodeID := parts[1]
  695. if err := server.Leave(nodeID); err != nil {
  696. printBoxed(fmt.Sprintf("%sError leaving node:%s %v", ColorRed, ColorReset, err))
  697. } else {
  698. printBoxed(fmt.Sprintf("%sLeave request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  699. }
  700. })
  701. c.RegisterCommand("search", "Search keys (search <pat> [lim] [off])", func(parts []string, server *KVServer) {
  702. if len(parts) < 2 {
  703. printBoxed("Usage: search <pattern> [limit] [offset]")
  704. return
  705. }
  706. pattern := parts[1]
  707. limit := 20 // Default limit
  708. offset := 0
  709. if len(parts) >= 3 {
  710. if l, err := strconv.Atoi(parts[2]); err == nil {
  711. limit = l
  712. }
  713. }
  714. if len(parts) >= 4 {
  715. if o, err := strconv.Atoi(parts[3]); err == nil {
  716. offset = o
  717. }
  718. }
  719. c.mu.RLock()
  720. token := c.token
  721. c.mu.RUnlock()
  722. // Use Authenticated Search
  723. results, err := server.SearchAuthenticated(pattern, limit, offset, token)
  724. if err != nil {
  725. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  726. return
  727. }
  728. // Format Table to Buffer
  729. var buf bytes.Buffer
  730. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  731. fmt.Fprintln(w, "Key\tValue\tCommitIndex")
  732. fmt.Fprintln(w, "---\t-----\t-----------")
  733. for _, r := range results {
  734. fmt.Fprintf(w, "%s\t%s\t%d\n", r.Key, r.Value, r.CommitIndex)
  735. }
  736. w.Flush()
  737. summary := fmt.Sprintf("\n%sFound %d records (showing max %d)%s", ColorDim, len(results), limit, ColorReset)
  738. printBoxed(buf.String() + summary)
  739. })
  740. c.RegisterCommand("count", "Count keys (count <pat>)", func(parts []string, server *KVServer) {
  741. if len(parts) < 2 {
  742. printBoxed("Usage: count <pattern> (e.g. 'count *', 'count user.*')")
  743. return
  744. }
  745. pattern := parts[1]
  746. c.mu.RLock()
  747. token := c.token
  748. c.mu.RUnlock()
  749. start := time.Now()
  750. count, err := server.CountAuthenticated(pattern, token)
  751. duration := time.Since(start)
  752. if err != nil {
  753. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  754. } else {
  755. printBoxed(fmt.Sprintf("%sCount: %d%s (took %v)", ColorGreen, count, ColorReset, duration))
  756. }
  757. })
  758. c.RegisterCommand("info", "Show all system stats", func(parts []string, server *KVServer) {
  759. // Admin only
  760. c.mu.RLock()
  761. token := c.token
  762. c.mu.RUnlock()
  763. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  764. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  765. return
  766. }
  767. // 1. Gather all data
  768. var m runtime.MemStats
  769. runtime.ReadMemStats(&m)
  770. dbSize := server.GetDBSize()
  771. logSize := server.GetLogSize()
  772. stats := server.GetStats()
  773. health := server.HealthCheck()
  774. dbApplied := server.DB.GetLastAppliedIndex()
  775. // 2. Build Output
  776. var sb strings.Builder
  777. // Section: Node Status
  778. sb.WriteString(fmt.Sprintf("%sNode Status:%s\n", ColorCyan, ColorReset))
  779. sb.WriteString(fmt.Sprintf(" ID: %s%s%s\n", ColorGreen, health.NodeID, ColorReset))
  780. sb.WriteString(fmt.Sprintf(" State: %s\n", health.State))
  781. sb.WriteString(fmt.Sprintf(" Term: %d\n", health.Term))
  782. sb.WriteString(fmt.Sprintf(" Leader: %s\n", health.LeaderID))
  783. sb.WriteString(fmt.Sprintf(" Healthy: %v\n", health.IsHealthy))
  784. sb.WriteString("\n")
  785. // Section: Storage Stats
  786. sb.WriteString(fmt.Sprintf("%sStorage & Memory:%s\n", ColorCyan, ColorReset))
  787. sb.WriteString(fmt.Sprintf(" DB Size: %s\n", formatBytes(dbSize)))
  788. sb.WriteString(fmt.Sprintf(" Raft Log: %s\n", formatBytes(logSize)))
  789. sb.WriteString(fmt.Sprintf(" Mem Alloc: %s\n", formatBytes(int64(m.Alloc))))
  790. sb.WriteString(fmt.Sprintf(" Mem Sys: %s\n", formatBytes(int64(m.Sys))))
  791. sb.WriteString(fmt.Sprintf(" NumGC: %d\n", m.NumGC))
  792. sb.WriteString("\n")
  793. // Section: Raft & DB Indices
  794. sb.WriteString(fmt.Sprintf("%sConsensus Indices:%s\n", ColorCyan, ColorReset))
  795. sb.WriteString(fmt.Sprintf(" Commit Index: %d\n", stats.CommitIndex))
  796. sb.WriteString(fmt.Sprintf(" Applied Index:%d\n", stats.LastApplied))
  797. sb.WriteString(fmt.Sprintf(" Last Log Idx: %d\n", stats.LastLogIndex))
  798. sb.WriteString(fmt.Sprintf(" DB Applied: %d\n", dbApplied))
  799. sb.WriteString("\n")
  800. // Section: Cluster Members
  801. sb.WriteString(fmt.Sprintf("%sCluster Members (%d):%s", ColorCyan, stats.ClusterSize, ColorReset))
  802. for id, addr := range stats.ClusterNodes {
  803. // Determine status color
  804. statusColor := ColorDim
  805. nodeID := server.Raft.nodeID // Assuming local nodeID is accessible
  806. if id == nodeID {
  807. statusColor = ColorCyan // Self
  808. } else {
  809. // Quick check
  810. conn, err := net.DialTimeout("tcp", addr, 50*time.Millisecond)
  811. if err == nil {
  812. statusColor = ColorGreen
  813. conn.Close()
  814. }
  815. }
  816. // Marker for Leader
  817. marker := ""
  818. if id == health.LeaderID {
  819. marker = fmt.Sprintf(" %s(Leader)%s", ColorYellow, ColorReset)
  820. }
  821. sb.WriteString(fmt.Sprintf("\n - %s%s%s: %s%s", statusColor, id, ColorReset, addr, marker))
  822. }
  823. printBoxed(sb.String())
  824. })
  825. c.RegisterCommand("quit", "Gracefully shutdown the node", func(parts []string, server *KVServer) {
  826. // Admin only
  827. c.mu.RLock()
  828. token := c.token
  829. c.mu.RUnlock()
  830. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  831. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  832. return
  833. }
  834. printBoxed("Shutting down node...")
  835. if err := server.Stop(); err != nil {
  836. printBoxed(fmt.Sprintf("%sError stopping server:%s %v", ColorRed, ColorReset, err))
  837. } else {
  838. printBoxed(fmt.Sprintf("%sNode stopped successfully.%s", ColorGreen, ColorReset))
  839. }
  840. os.Exit(0)
  841. })
  842. c.RegisterCommand("clear", "Clear screen", func(parts []string, server *KVServer) {
  843. fmt.Print("\033[H\033[2J")
  844. })
  845. c.RegisterCommand("help", "Show commands", func(parts []string, server *KVServer) {
  846. var sb strings.Builder
  847. sb.WriteString(fmt.Sprintf("%sCommands:%s\n", ColorGreen, ColorReset))
  848. // Sort commands
  849. c.mu.RLock()
  850. var cmds []CLICommand
  851. for _, cmd := range c.commands {
  852. cmds = append(cmds, cmd)
  853. }
  854. c.mu.RUnlock()
  855. sort.Slice(cmds, func(i, j int) bool {
  856. return cmds[i].Name < cmds[j].Name
  857. })
  858. // Find max length for padding
  859. maxNameLen := 0
  860. for _, cmd := range cmds {
  861. if len(cmd.Name) > maxNameLen {
  862. maxNameLen = len(cmd.Name)
  863. }
  864. }
  865. for _, cmd := range cmds {
  866. padding := strings.Repeat(" ", maxNameLen-len(cmd.Name))
  867. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, cmd.Name, ColorReset, padding, ColorDim, cmd.Description, ColorReset))
  868. }
  869. printBoxed(sb.String())
  870. })
  871. }
  872. // readPassword securely reads a password from stdin without echoing.
  873. func readPassword() (string, error) {
  874. // 1. Disable echo
  875. cmd := exec.Command("stty", "-echo")
  876. cmd.Stdin = os.Stdin
  877. cmd.Stdout = os.Stdout
  878. if err := cmd.Run(); err != nil {
  879. return "", fmt.Errorf("failed to disable echo: %v", err)
  880. }
  881. defer func() {
  882. // 3. Re-enable echo
  883. cmd := exec.Command("stty", "echo")
  884. cmd.Stdin = os.Stdin
  885. cmd.Stdout = os.Stdout
  886. _ = cmd.Run()
  887. }()
  888. // 2. Read input
  889. reader := bufio.NewReader(os.Stdin)
  890. pass, err := reader.ReadString('\n')
  891. if err != nil {
  892. return "", err
  893. }
  894. return strings.TrimSpace(pass), nil
  895. }