cli.go 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992
  1. package raft
  2. import (
  3. "bufio"
  4. "bytes"
  5. "fmt"
  6. "net"
  7. "os"
  8. "os/exec"
  9. "path/filepath"
  10. "regexp"
  11. "runtime"
  12. "sort"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "text/tabwriter"
  17. "time"
  18. )
  19. const (
  20. ColorReset = "\033[0m"
  21. ColorDim = "\033[90m" // Dark Gray
  22. ColorRed = "\033[31m"
  23. ColorGreen = "\033[32m"
  24. ColorYellow = "\033[33m"
  25. ColorBlue = "\033[34m"
  26. ColorCyan = "\033[36m"
  27. )
  28. // CLICommand defines a CLI command handler
  29. type CLICommand struct {
  30. Name string
  31. Description string
  32. Handler func(parts []string, server *KVServer)
  33. }
  34. // CLI manages the command line interface
  35. type CLI struct {
  36. server *KVServer
  37. commands map[string]CLICommand
  38. mu sync.RWMutex
  39. token string
  40. }
  41. // NewCLI creates a new CLI instance
  42. func NewCLI(server *KVServer) *CLI {
  43. cli := &CLI{
  44. server: server,
  45. commands: make(map[string]CLICommand),
  46. }
  47. cli.registerDefaultCommands()
  48. return cli
  49. }
  50. // Helper to calculate visible length of string ignoring ANSI codes
  51. var ansiRegex = regexp.MustCompile(`\x1b\[[0-9;]*m`)
  52. func visibleLen(s string) int {
  53. clean := ansiRegex.ReplaceAllString(s, "")
  54. return len([]rune(clean))
  55. }
  56. func printBoxed(content string) {
  57. lines := strings.Split(strings.TrimSpace(content), "\n")
  58. maxWidth := 0
  59. for _, line := range lines {
  60. l := visibleLen(line)
  61. if l > maxWidth {
  62. maxWidth = l
  63. }
  64. }
  65. // Min width to look decent
  66. if maxWidth < 20 {
  67. maxWidth = 20
  68. }
  69. // Add padding
  70. contentWidth := maxWidth + 2
  71. fmt.Println() // Start new line before box
  72. // Top Border
  73. fmt.Printf("%s╭%s╮%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  74. // Content
  75. for _, line := range lines {
  76. visLen := visibleLen(line)
  77. padding := contentWidth - visLen - 1 // -1 for the space after │
  78. // Ensure padding is not negative
  79. if padding < 0 { padding = 0 }
  80. fmt.Printf("%s│%s %s%s%s│%s\n", ColorDim, ColorReset, line, strings.Repeat(" ", padding), ColorDim, ColorReset)
  81. }
  82. // Bottom Border
  83. fmt.Printf("%s╰%s╯%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  84. fmt.Println() // End new line after box
  85. }
  86. func formatBytes(bytes int64) string {
  87. const unit = 1024
  88. if bytes < unit {
  89. return fmt.Sprintf("%d B", bytes)
  90. }
  91. div, exp := int64(unit), 0
  92. for n := bytes / unit; n >= unit; n /= unit {
  93. div *= unit
  94. exp++
  95. }
  96. return fmt.Sprintf("%.1f %cB", float64(bytes)/float64(div), "KMGTPE"[exp])
  97. }
  98. // scanCRLF is a split function for a Scanner that returns each line of
  99. // text, stripped of any trailing end-of-line marker. The returned line may
  100. // be empty. The end-of-line marker is one optional carriage return followed
  101. // by one mandatory newline, OR just a carriage return.
  102. func scanCRLF(data []byte, atEOF bool) (advance int, token []byte, err error) {
  103. if atEOF && len(data) == 0 {
  104. return 0, nil, nil
  105. }
  106. if i := bytes.IndexByte(data, '\n'); i >= 0 {
  107. // We have a full newline-terminated line.
  108. return i + 1, dropCR(data[0:i]), nil
  109. }
  110. if i := bytes.IndexByte(data, '\r'); i >= 0 {
  111. // We have a CR-terminated line.
  112. return i + 1, data[0:i], nil
  113. }
  114. // If we're at EOF, we have a final, non-terminated line. Return it.
  115. if atEOF {
  116. return len(data), dropCR(data), nil
  117. }
  118. // Request more data.
  119. return 0, nil, nil
  120. }
  121. // dropCR drops a terminal \r from the data.
  122. func dropCR(data []byte) []byte {
  123. if len(data) > 0 && data[len(data)-1] == '\r' {
  124. return data[0 : len(data)-1]
  125. }
  126. return data
  127. }
  128. // Start starts the command line interface
  129. func (c *CLI) Start() {
  130. // Attempt to fix terminal settings if they are messed up (e.g. missing ICRNL)
  131. // This helps when Enter sends \r but the terminal driver expects \n
  132. cmd := exec.Command("stty", "sane")
  133. cmd.Stdin = os.Stdin
  134. cmd.Stdout = os.Stdout
  135. _ = cmd.Run()
  136. // Boxed startup message
  137. var sb strings.Builder
  138. sb.WriteString(fmt.Sprintf("Node %s%s%s CLI Started\n", ColorGreen, c.server.Raft.nodeID, ColorReset))
  139. sb.WriteString("Type 'help' for commands.")
  140. printBoxed(sb.String())
  141. // Initialize history handling
  142. historyPath := filepath.Join(os.TempDir(), fmt.Sprintf(".raft_history_%s", c.server.Raft.nodeID))
  143. historyFile, err := os.OpenFile(historyPath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
  144. if err != nil {
  145. // Just warn, don't fail
  146. fmt.Printf("%sWarning: Could not open history file: %v%s\n", ColorYellow, err, ColorReset)
  147. }
  148. defer func() {
  149. if historyFile != nil {
  150. historyFile.Close()
  151. }
  152. }()
  153. // State Monitor Loop
  154. go func() {
  155. var lastState string
  156. var lastTerm uint64
  157. stats := c.server.GetStats()
  158. lastState = stats.State
  159. lastTerm = stats.Term
  160. ticker := time.NewTicker(100 * time.Millisecond)
  161. defer ticker.Stop()
  162. for {
  163. select {
  164. case <-c.server.stopCh:
  165. return
  166. case <-ticker.C:
  167. stats := c.server.GetStats()
  168. if stats.State != lastState || stats.Term != lastTerm {
  169. msg := fmt.Sprintf("%s[State Change] %s (Term %d) -> %s (Term %d)%s",
  170. ColorYellow, lastState, lastTerm, stats.State, stats.Term, ColorReset)
  171. fmt.Printf("\n%s\n> ", msg)
  172. lastState = stats.State
  173. lastTerm = stats.Term
  174. }
  175. }
  176. }
  177. }()
  178. scanner := bufio.NewScanner(os.Stdin)
  179. scanner.Split(scanCRLF)
  180. fmt.Print("> ")
  181. for scanner.Scan() {
  182. text := strings.TrimSpace(scanner.Text())
  183. if text == "" {
  184. fmt.Print("> ")
  185. continue
  186. }
  187. // Save command to history
  188. if historyFile != nil {
  189. if _, err := historyFile.WriteString(text + "\n"); err != nil {
  190. // Ignore write error
  191. }
  192. }
  193. parts := strings.Fields(text)
  194. cmdName := strings.ToLower(parts[0])
  195. c.mu.RLock()
  196. cmd, exists := c.commands[cmdName]
  197. c.mu.RUnlock()
  198. if exists {
  199. cmd.Handler(parts, c.server)
  200. } else {
  201. // Check aliases
  202. switch cmdName {
  203. case "binlog", "db", "stats":
  204. c.mu.RLock()
  205. if infoCmd, ok := c.commands["info"]; ok {
  206. infoCmd.Handler(parts, c.server)
  207. }
  208. c.mu.RUnlock()
  209. case "history":
  210. c.printHistory(historyPath)
  211. default:
  212. printBoxed("Unknown command. Type 'help'.")
  213. }
  214. }
  215. fmt.Print("> ")
  216. }
  217. }
  218. // printHistory prints the command history
  219. func (c *CLI) printHistory(path string) {
  220. content, err := os.ReadFile(path)
  221. if err != nil {
  222. printBoxed("No history found.")
  223. return
  224. }
  225. lines := strings.Split(string(content), "\n")
  226. // Show last 20 lines
  227. start := 0
  228. if len(lines) > 20 {
  229. start = len(lines) - 20
  230. }
  231. var sb strings.Builder
  232. sb.WriteString(fmt.Sprintf("%sCommand History (Last 20):%s\n", ColorCyan, ColorReset))
  233. for i := start; i < len(lines); i++ {
  234. line := strings.TrimSpace(lines[i])
  235. if line != "" {
  236. sb.WriteString(fmt.Sprintf("%d: %s\n", i+1, line))
  237. }
  238. }
  239. printBoxed(sb.String())
  240. }
  241. // RegisterCommand registers a new CLI command
  242. func (c *CLI) RegisterCommand(name, description string, handler func(parts []string, server *KVServer)) {
  243. c.mu.Lock()
  244. defer c.mu.Unlock()
  245. c.commands[strings.ToLower(name)] = CLICommand{
  246. Name: name,
  247. Description: description,
  248. Handler: handler,
  249. }
  250. }
  251. func (c *CLI) registerDefaultCommands() {
  252. c.RegisterCommand("set", "Set value (set <key> <val>)", func(parts []string, server *KVServer) {
  253. if len(parts) != 3 {
  254. printBoxed("Usage: set <key> <value>")
  255. return
  256. }
  257. key, val := parts[1], parts[2]
  258. // Use Authenticated Set
  259. c.mu.RLock()
  260. token := c.token
  261. c.mu.RUnlock()
  262. if err := server.SetAuthenticated(key, val, token); err != nil {
  263. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  264. } else {
  265. printBoxed(fmt.Sprintf("%sOK%s", ColorGreen, ColorReset))
  266. }
  267. })
  268. c.RegisterCommand("get", "Get value (get <key>)", func(parts []string, server *KVServer) {
  269. if len(parts) != 2 {
  270. printBoxed("Usage: get <key>")
  271. return
  272. }
  273. key := parts[1]
  274. c.mu.RLock()
  275. token := c.token
  276. c.mu.RUnlock()
  277. if val, ok, err := server.GetLinearAuthenticated(key, token); err != nil {
  278. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  279. } else if !ok {
  280. printBoxed(fmt.Sprintf("%sNot Found%s", ColorYellow, ColorReset))
  281. } else {
  282. printBoxed(fmt.Sprintf("%s%s%s = %s%s%s", ColorCyan, key, ColorReset, ColorYellow, val, ColorReset))
  283. }
  284. })
  285. c.RegisterCommand("del", "Delete key (del <key>)", func(parts []string, server *KVServer) {
  286. if len(parts) != 2 {
  287. printBoxed("Usage: del <key>")
  288. return
  289. }
  290. key := parts[1]
  291. c.mu.RLock()
  292. token := c.token
  293. c.mu.RUnlock()
  294. if err := server.DelAuthenticated(key, token); err != nil {
  295. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  296. } else {
  297. printBoxed(fmt.Sprintf("%sDeleted%s", ColorGreen, ColorReset))
  298. }
  299. })
  300. // User Command Group
  301. c.RegisterCommand("user", "User management commands (type 'user help' for more)", func(parts []string, server *KVServer) {
  302. if len(parts) < 2 {
  303. printBoxed("Usage: user <subcommand> [args...]\nType 'user help' for list of subcommands.")
  304. return
  305. }
  306. subCmd := strings.ToLower(parts[1])
  307. args := parts[2:]
  308. // Common vars
  309. c.mu.RLock()
  310. token := c.token
  311. c.mu.RUnlock()
  312. switch subCmd {
  313. case "init": // Was auth-init
  314. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  315. printBoxed(fmt.Sprintf("%sPermission Denied: Auth already enabled. Login as root to re-init.%s", ColorRed, ColorReset))
  316. return
  317. }
  318. fmt.Print("Enter root password: ")
  319. password, err := readPassword()
  320. fmt.Println()
  321. if err != nil || password == "" {
  322. printBoxed("Error reading password")
  323. return
  324. }
  325. if err := server.AuthManager.CreateRootUser(password); err != nil {
  326. printBoxed(fmt.Sprintf("Failed to create root user: %v", err))
  327. return
  328. }
  329. if err := server.AuthManager.EnableAuth(); err != nil {
  330. printBoxed(fmt.Sprintf("Failed to enable auth: %v", err))
  331. return
  332. }
  333. printBoxed("Auth Initialized. Please login as 'root'.")
  334. case "login": // Was login
  335. if len(args) < 1 {
  336. printBoxed("Usage: user login <username> [code]")
  337. return
  338. }
  339. username := args[0]
  340. code := ""
  341. if len(args) > 1 {
  342. code = args[1]
  343. }
  344. fmt.Print("Password: ")
  345. password, err := readPassword()
  346. fmt.Println()
  347. if err != nil {
  348. printBoxed("Error reading password")
  349. return
  350. }
  351. t, err := server.AuthManager.Login(username, password, code, "cli")
  352. if err != nil {
  353. printBoxed(fmt.Sprintf("%sLogin Failed:%s %v", ColorRed, ColorReset, err))
  354. } else {
  355. c.mu.Lock()
  356. c.token = t
  357. c.mu.Unlock()
  358. printBoxed(fmt.Sprintf("%sLogin Success!%s", ColorGreen, ColorReset))
  359. }
  360. case "logout": // Was logout
  361. if token != "" {
  362. server.Logout(token)
  363. c.mu.Lock()
  364. c.token = ""
  365. c.mu.Unlock()
  366. printBoxed("Logged out.")
  367. } else {
  368. printBoxed("Not logged in.")
  369. }
  370. case "who": // Was whoami
  371. if token == "" {
  372. printBoxed("Not logged in.")
  373. return
  374. }
  375. session, err := server.GetSessionInfo(token)
  376. if err != nil {
  377. printBoxed(fmt.Sprintf("Error: %v", err))
  378. return
  379. }
  380. printBoxed(fmt.Sprintf("Logged in as: %s%s%s", ColorCyan, session.Username, ColorReset))
  381. case "add": // Was user-add
  382. if len(args) < 1 {
  383. printBoxed("Usage: user add <username> [role1,role2...]")
  384. return
  385. }
  386. username := args[0]
  387. var roles []string
  388. if len(args) > 1 {
  389. roles = strings.Split(args[1], ",")
  390. }
  391. fmt.Printf("Enter password for %s: ", username)
  392. password, err := readPassword()
  393. fmt.Println()
  394. if err != nil || password == "" {
  395. printBoxed("Error reading password")
  396. return
  397. }
  398. if err := server.CreateUser(username, password, roles, token); err != nil {
  399. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  400. } else {
  401. printBoxed(fmt.Sprintf("%sUser %s created%s", ColorGreen, username, ColorReset))
  402. }
  403. case "del": // Was user-del
  404. if len(args) < 1 {
  405. printBoxed("Usage: user del <username>")
  406. return
  407. }
  408. username := args[0]
  409. fmt.Printf("Delete user '%s'? (y/N): ", username)
  410. var resp string
  411. fmt.Scanln(&resp)
  412. if strings.ToLower(resp) != "y" {
  413. return
  414. }
  415. if err := server.DeleteUser(username, token); err != nil {
  416. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  417. } else {
  418. printBoxed(fmt.Sprintf("%sUser deleted%s", ColorGreen, ColorReset))
  419. }
  420. case "list":
  421. users, err := server.ListUsers(token)
  422. if err != nil {
  423. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  424. return
  425. }
  426. var buf bytes.Buffer
  427. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  428. fmt.Fprintln(w, "Username\tRoles\tStatus")
  429. fmt.Fprintln(w, "--------\t-----\t------")
  430. for _, u := range users {
  431. status := "Offline"
  432. if u.IsOnline { status = "Online" }
  433. fmt.Fprintf(w, "%s\t%s\t%s\n", u.Username, strings.Join(u.Roles, ","), status)
  434. }
  435. w.Flush()
  436. printBoxed(buf.String())
  437. case "update":
  438. // user update <username> [roles=r1,r2]
  439. // Currently only password update via prompt, maybe roles later
  440. // The prompt implies a generic update but also mentions "user update"
  441. // Let's implement password update here or allow changing roles.
  442. // Ideally arguments: user update <username> roles=admin,dev
  443. // If no args (other than username), prompt for password?
  444. if len(args) < 1 {
  445. printBoxed("Usage: user update <username> [roles=r1,r2...]")
  446. return
  447. }
  448. username := args[0]
  449. // If args present, update roles
  450. if len(args) > 1 {
  451. // Parse options
  452. updated := false
  453. // user, err := server.AuthManager.GetUser(username) // Use internal GetUser helper or logic?
  454. // We need authenticated way. server.ListUsers gives us access if admin.
  455. // But we need the User object to modify.
  456. // Let's rely on server.UpdateUser taking a struct.
  457. // We first need to GET the user to avoid overwriting fields.
  458. // Since we don't have GetUser exposed in server (only List), let's add one or iterate List.
  459. // Iterating List is inefficient but works for now.
  460. users, _ := server.ListUsers(token)
  461. var targetUser *User
  462. for _, u := range users {
  463. if u.Username == username {
  464. targetUser = u
  465. break
  466. }
  467. }
  468. if targetUser == nil {
  469. printBoxed("User not found or permission denied")
  470. return
  471. }
  472. // Apply updates
  473. for _, arg := range args[1:] {
  474. if strings.HasPrefix(arg, "roles=") {
  475. roleStr := strings.TrimPrefix(arg, "roles=")
  476. targetUser.Roles = strings.Split(roleStr, ",")
  477. updated = true
  478. }
  479. }
  480. if updated {
  481. if err := server.UpdateUser(*targetUser, token); err != nil {
  482. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  483. } else {
  484. printBoxed(fmt.Sprintf("%sUser updated%s", ColorGreen, ColorReset))
  485. }
  486. }
  487. } else {
  488. // No args -> Change Password
  489. fmt.Printf("Enter new password for %s: ", username)
  490. pass, err := readPassword()
  491. fmt.Println()
  492. if err != nil || pass == "" {
  493. printBoxed("Error reading password")
  494. return
  495. }
  496. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  497. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  498. } else {
  499. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  500. }
  501. }
  502. case "passwd": // Keep alias or subcommand
  503. if len(args) < 1 {
  504. printBoxed("Usage: user passwd <username>")
  505. return
  506. }
  507. // Reuse logic
  508. username := args[0]
  509. fmt.Printf("Enter new password for %s: ", username)
  510. pass, err := readPassword()
  511. fmt.Println()
  512. if err != nil || pass == "" {
  513. printBoxed("Error reading password")
  514. return
  515. }
  516. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  517. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  518. } else {
  519. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  520. }
  521. case "role":
  522. if len(args) < 1 {
  523. printBoxed("Usage: user role <list|add|delete|update> ...")
  524. return
  525. }
  526. roleCmd := strings.ToLower(args[0])
  527. roleArgs := args[1:]
  528. switch roleCmd {
  529. case "list":
  530. roles, err := server.ListRoles(token)
  531. if err != nil {
  532. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  533. return
  534. }
  535. var buf bytes.Buffer
  536. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  537. fmt.Fprintln(w, "Role\tParents\tPerms")
  538. fmt.Fprintln(w, "----\t-------\t-----")
  539. for _, r := range roles {
  540. parents := strings.Join(r.ParentRoles, ",")
  541. permCount := len(r.Permissions)
  542. fmt.Fprintf(w, "%s\t%s\t%d rules\n", r.Name, parents, permCount)
  543. }
  544. w.Flush()
  545. printBoxed(buf.String())
  546. case "add":
  547. if len(roleArgs) < 1 {
  548. printBoxed("Usage: user role add <name>")
  549. return
  550. }
  551. if err := server.CreateRole(roleArgs[0], token); err != nil {
  552. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  553. } else {
  554. printBoxed(fmt.Sprintf("%sRole %s created%s", ColorGreen, roleArgs[0], ColorReset))
  555. }
  556. case "delete":
  557. if len(roleArgs) < 1 {
  558. printBoxed("Usage: user role delete <name>")
  559. return
  560. }
  561. if err := server.DeleteRole(roleArgs[0], token); err != nil {
  562. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  563. } else {
  564. printBoxed(fmt.Sprintf("%sRole %s deleted%s", ColorGreen, roleArgs[0], ColorReset))
  565. }
  566. case "update":
  567. // Simplistic update: user role update <name> parents=p1,p2
  568. // Complex permissions editing is hard in CLI without JSON
  569. if len(roleArgs) < 1 {
  570. printBoxed("Usage: user role update <name> [parents=p1,p2]")
  571. return
  572. }
  573. name := roleArgs[0]
  574. roles, _ := server.ListRoles(token)
  575. var targetRole *Role
  576. for _, r := range roles {
  577. if r.Name == name {
  578. targetRole = r
  579. break
  580. }
  581. }
  582. if targetRole == nil {
  583. printBoxed("Role not found")
  584. return
  585. }
  586. updated := false
  587. for _, arg := range roleArgs[1:] {
  588. if strings.HasPrefix(arg, "parents=") {
  589. pStr := strings.TrimPrefix(arg, "parents=")
  590. targetRole.ParentRoles = strings.Split(pStr, ",")
  591. updated = true
  592. }
  593. }
  594. if updated {
  595. if err := server.UpdateRole(*targetRole, token); err != nil {
  596. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  597. } else {
  598. printBoxed(fmt.Sprintf("%sRole updated%s", ColorGreen, ColorReset))
  599. }
  600. } else {
  601. printBoxed("No changes specified.")
  602. }
  603. default:
  604. printBoxed("Unknown sub-command. Options: list, add, delete, update")
  605. }
  606. case "help":
  607. var sb strings.Builder
  608. sb.WriteString(fmt.Sprintf("%sUser Management Commands:%s\n", ColorCyan, ColorReset))
  609. // Define subcommands for formatting
  610. type subCmd struct {
  611. Name string
  612. Desc string
  613. }
  614. cmds := []subCmd{
  615. {"user init", "Initialize auth system (Root)"},
  616. {"user login <user> [code]", "Login"},
  617. {"user logout", "Logout"},
  618. {"user who", "Current user info"},
  619. {"user add <user> [roles]", "Create user (Root)"},
  620. {"user del <user>", "Delete user (Root)"},
  621. {"user update <user> [opts]", "Update user/pass (Root)"},
  622. {"user list", "List users (Root)"},
  623. {"user role list", "List roles (Root)"},
  624. {"user role add <name>", "Create role (Root)"},
  625. {"user role delete <name>", "Delete role (Root)"},
  626. {"user role update <name> ...", "Update role (Root)"},
  627. }
  628. // Find max length
  629. maxLen := 0
  630. for _, c := range cmds {
  631. if len(c.Name) > maxLen {
  632. maxLen = len(c.Name)
  633. }
  634. }
  635. for _, c := range cmds {
  636. padding := strings.Repeat(" ", maxLen-len(c.Name))
  637. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, c.Name, ColorReset, padding, ColorDim, c.Desc, ColorReset))
  638. }
  639. printBoxed(sb.String())
  640. default:
  641. printBoxed(fmt.Sprintf("Unknown subcommand '%s'. Type 'user help'.", subCmd))
  642. }
  643. })
  644. c.RegisterCommand("join", "Add node to cluster (join <id> <addr>)", func(parts []string, server *KVServer) {
  645. if len(parts) != 3 {
  646. printBoxed("Usage: join <nodeID> <address>")
  647. return
  648. }
  649. // Admin only
  650. c.mu.RLock()
  651. token := c.token
  652. c.mu.RUnlock()
  653. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  654. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  655. return
  656. }
  657. nodeID := parts[1]
  658. addr := parts[2]
  659. if err := server.Join(nodeID, addr); err != nil {
  660. printBoxed(fmt.Sprintf("%sError joining node:%s %v", ColorRed, ColorReset, err))
  661. } else {
  662. printBoxed(fmt.Sprintf("%sJoin request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  663. }
  664. })
  665. c.RegisterCommand("leave", "Remove node from cluster (leave <id>)", func(parts []string, server *KVServer) {
  666. if len(parts) != 2 {
  667. printBoxed("Usage: leave <nodeID>")
  668. return
  669. }
  670. // Admin only
  671. c.mu.RLock()
  672. token := c.token
  673. c.mu.RUnlock()
  674. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  675. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  676. return
  677. }
  678. nodeID := parts[1]
  679. if err := server.Leave(nodeID); err != nil {
  680. printBoxed(fmt.Sprintf("%sError leaving node:%s %v", ColorRed, ColorReset, err))
  681. } else {
  682. printBoxed(fmt.Sprintf("%sLeave request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  683. }
  684. })
  685. c.RegisterCommand("search", "Search keys (search <pat> [lim] [off])", func(parts []string, server *KVServer) {
  686. if len(parts) < 2 {
  687. printBoxed("Usage: search <pattern> [limit] [offset]")
  688. return
  689. }
  690. pattern := parts[1]
  691. limit := 20 // Default limit
  692. offset := 0
  693. if len(parts) >= 3 {
  694. if l, err := strconv.Atoi(parts[2]); err == nil {
  695. limit = l
  696. }
  697. }
  698. if len(parts) >= 4 {
  699. if o, err := strconv.Atoi(parts[3]); err == nil {
  700. offset = o
  701. }
  702. }
  703. c.mu.RLock()
  704. token := c.token
  705. c.mu.RUnlock()
  706. // Use Authenticated Search
  707. results, err := server.SearchAuthenticated(pattern, limit, offset, token)
  708. if err != nil {
  709. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  710. return
  711. }
  712. // Format Table to Buffer
  713. var buf bytes.Buffer
  714. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  715. fmt.Fprintln(w, "Key\tValue\tCommitIndex")
  716. fmt.Fprintln(w, "---\t-----\t-----------")
  717. for _, r := range results {
  718. fmt.Fprintf(w, "%s\t%s\t%d\n", r.Key, r.Value, r.CommitIndex)
  719. }
  720. w.Flush()
  721. summary := fmt.Sprintf("\n%sFound %d records (showing max %d)%s", ColorDim, len(results), limit, ColorReset)
  722. printBoxed(buf.String() + summary)
  723. })
  724. c.RegisterCommand("count", "Count keys (count <pat>)", func(parts []string, server *KVServer) {
  725. if len(parts) < 2 {
  726. printBoxed("Usage: count <pattern> (e.g. 'count *', 'count user.*')")
  727. return
  728. }
  729. pattern := parts[1]
  730. c.mu.RLock()
  731. token := c.token
  732. c.mu.RUnlock()
  733. start := time.Now()
  734. count, err := server.CountAuthenticated(pattern, token)
  735. duration := time.Since(start)
  736. if err != nil {
  737. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  738. } else {
  739. printBoxed(fmt.Sprintf("%sCount: %d%s (took %v)", ColorGreen, count, ColorReset, duration))
  740. }
  741. })
  742. c.RegisterCommand("info", "Show all system stats", func(parts []string, server *KVServer) {
  743. // Admin only
  744. c.mu.RLock()
  745. token := c.token
  746. c.mu.RUnlock()
  747. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  748. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  749. return
  750. }
  751. // 1. Gather all data
  752. var m runtime.MemStats
  753. runtime.ReadMemStats(&m)
  754. dbSize := server.GetDBSize()
  755. logSize := server.GetLogSize()
  756. stats := server.GetStats()
  757. health := server.HealthCheck()
  758. dbApplied := server.DB.GetLastAppliedIndex()
  759. // 2. Build Output
  760. var sb strings.Builder
  761. // Section: Node Status
  762. sb.WriteString(fmt.Sprintf("%sNode Status:%s\n", ColorCyan, ColorReset))
  763. sb.WriteString(fmt.Sprintf(" ID: %s%s%s\n", ColorGreen, health.NodeID, ColorReset))
  764. sb.WriteString(fmt.Sprintf(" State: %s\n", health.State))
  765. sb.WriteString(fmt.Sprintf(" Term: %d\n", health.Term))
  766. sb.WriteString(fmt.Sprintf(" Leader: %s\n", health.LeaderID))
  767. sb.WriteString(fmt.Sprintf(" Healthy: %v\n", health.IsHealthy))
  768. sb.WriteString("\n")
  769. // Section: Storage Stats
  770. sb.WriteString(fmt.Sprintf("%sStorage & Memory:%s\n", ColorCyan, ColorReset))
  771. sb.WriteString(fmt.Sprintf(" DB Size: %s\n", formatBytes(dbSize)))
  772. sb.WriteString(fmt.Sprintf(" Raft Log: %s\n", formatBytes(logSize)))
  773. sb.WriteString(fmt.Sprintf(" Mem Alloc: %s\n", formatBytes(int64(m.Alloc))))
  774. sb.WriteString(fmt.Sprintf(" Mem Sys: %s\n", formatBytes(int64(m.Sys))))
  775. sb.WriteString(fmt.Sprintf(" NumGC: %d\n", m.NumGC))
  776. sb.WriteString("\n")
  777. // Section: Raft & DB Indices
  778. sb.WriteString(fmt.Sprintf("%sConsensus Indices:%s\n", ColorCyan, ColorReset))
  779. sb.WriteString(fmt.Sprintf(" Commit Index: %d\n", stats.CommitIndex))
  780. sb.WriteString(fmt.Sprintf(" Applied Index:%d\n", stats.LastApplied))
  781. sb.WriteString(fmt.Sprintf(" Last Log Idx: %d\n", stats.LastLogIndex))
  782. sb.WriteString(fmt.Sprintf(" DB Applied: %d\n", dbApplied))
  783. sb.WriteString("\n")
  784. // Section: Cluster Members
  785. sb.WriteString(fmt.Sprintf("%sCluster Members (%d):%s", ColorCyan, stats.ClusterSize, ColorReset))
  786. for id, addr := range stats.ClusterNodes {
  787. // Determine status color
  788. statusColor := ColorDim
  789. nodeID := server.Raft.nodeID // Assuming local nodeID is accessible
  790. if id == nodeID {
  791. statusColor = ColorCyan // Self
  792. } else {
  793. // Quick check
  794. conn, err := net.DialTimeout("tcp", addr, 50*time.Millisecond)
  795. if err == nil {
  796. statusColor = ColorGreen
  797. conn.Close()
  798. }
  799. }
  800. // Marker for Leader
  801. marker := ""
  802. if id == health.LeaderID {
  803. marker = fmt.Sprintf(" %s(Leader)%s", ColorYellow, ColorReset)
  804. }
  805. sb.WriteString(fmt.Sprintf("\n - %s%s%s: %s%s", statusColor, id, ColorReset, addr, marker))
  806. }
  807. printBoxed(sb.String())
  808. })
  809. c.RegisterCommand("quit", "Gracefully shutdown the node", func(parts []string, server *KVServer) {
  810. // Admin only
  811. c.mu.RLock()
  812. token := c.token
  813. c.mu.RUnlock()
  814. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  815. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  816. return
  817. }
  818. printBoxed("Shutting down node...")
  819. if err := server.Stop(); err != nil {
  820. printBoxed(fmt.Sprintf("%sError stopping server:%s %v", ColorRed, ColorReset, err))
  821. } else {
  822. printBoxed(fmt.Sprintf("%sNode stopped successfully.%s", ColorGreen, ColorReset))
  823. }
  824. os.Exit(0)
  825. })
  826. c.RegisterCommand("clear", "Clear screen", func(parts []string, server *KVServer) {
  827. fmt.Print("\033[H\033[2J")
  828. })
  829. c.RegisterCommand("help", "Show commands", func(parts []string, server *KVServer) {
  830. var sb strings.Builder
  831. sb.WriteString(fmt.Sprintf("%sCommands:%s\n", ColorGreen, ColorReset))
  832. // Sort commands
  833. c.mu.RLock()
  834. var cmds []CLICommand
  835. for _, cmd := range c.commands {
  836. cmds = append(cmds, cmd)
  837. }
  838. c.mu.RUnlock()
  839. sort.Slice(cmds, func(i, j int) bool {
  840. return cmds[i].Name < cmds[j].Name
  841. })
  842. // Find max length for padding
  843. maxNameLen := 0
  844. for _, cmd := range cmds {
  845. if len(cmd.Name) > maxNameLen {
  846. maxNameLen = len(cmd.Name)
  847. }
  848. }
  849. for _, cmd := range cmds {
  850. padding := strings.Repeat(" ", maxNameLen-len(cmd.Name))
  851. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, cmd.Name, ColorReset, padding, ColorDim, cmd.Description, ColorReset))
  852. }
  853. printBoxed(sb.String())
  854. })
  855. }
  856. // readPassword securely reads a password from stdin without echoing.
  857. func readPassword() (string, error) {
  858. // 1. Disable echo
  859. cmd := exec.Command("stty", "-echo")
  860. cmd.Stdin = os.Stdin
  861. cmd.Stdout = os.Stdout
  862. if err := cmd.Run(); err != nil {
  863. return "", fmt.Errorf("failed to disable echo: %v", err)
  864. }
  865. defer func() {
  866. // 3. Re-enable echo
  867. cmd := exec.Command("stty", "echo")
  868. cmd.Stdin = os.Stdin
  869. cmd.Stdout = os.Stdout
  870. _ = cmd.Run()
  871. }()
  872. // 2. Read input
  873. reader := bufio.NewReader(os.Stdin)
  874. pass, err := reader.ReadString('\n')
  875. if err != nil {
  876. return "", err
  877. }
  878. return strings.TrimSpace(pass), nil
  879. }