cli.go 30 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102
  1. package raft
  2. import (
  3. "bufio"
  4. "bytes"
  5. "fmt"
  6. "net"
  7. "os"
  8. "os/exec"
  9. "path/filepath"
  10. "regexp"
  11. "runtime"
  12. "sort"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "text/tabwriter"
  17. "time"
  18. )
  19. const (
  20. ColorReset = "\033[0m"
  21. ColorDim = "\033[90m" // Dark Gray
  22. ColorRed = "\033[31m"
  23. ColorGreen = "\033[32m"
  24. ColorYellow = "\033[33m"
  25. ColorBlue = "\033[34m"
  26. ColorCyan = "\033[36m"
  27. )
  28. // CLICommand defines a CLI command handler
  29. type CLICommand struct {
  30. Name string
  31. Description string
  32. Handler func(parts []string, server *KVServer)
  33. }
  34. // CLI manages the command line interface
  35. type CLI struct {
  36. server *KVServer
  37. commands map[string]CLICommand
  38. mu sync.RWMutex
  39. token string
  40. }
  41. // NewCLI creates a new CLI instance
  42. func NewCLI(server *KVServer) *CLI {
  43. cli := &CLI{
  44. server: server,
  45. commands: make(map[string]CLICommand),
  46. }
  47. cli.registerDefaultCommands()
  48. return cli
  49. }
  50. // Helper to calculate visible length of string ignoring ANSI codes
  51. var ansiRegex = regexp.MustCompile(`\x1b\[[0-9;]*m`)
  52. func visibleLen(s string) int {
  53. clean := ansiRegex.ReplaceAllString(s, "")
  54. return len([]rune(clean))
  55. }
  56. func printBoxed(content string) {
  57. lines := strings.Split(strings.TrimSpace(content), "\n")
  58. maxWidth := 0
  59. for _, line := range lines {
  60. l := visibleLen(line)
  61. if l > maxWidth {
  62. maxWidth = l
  63. }
  64. }
  65. // Min width to look decent
  66. if maxWidth < 20 {
  67. maxWidth = 20
  68. }
  69. // Add padding
  70. contentWidth := maxWidth + 2
  71. fmt.Println() // Start new line before box
  72. // Top Border
  73. fmt.Printf("%s╭%s╮%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  74. // Content
  75. for _, line := range lines {
  76. visLen := visibleLen(line)
  77. padding := contentWidth - visLen - 1 // -1 for the space after │
  78. // Ensure padding is not negative
  79. if padding < 0 { padding = 0 }
  80. fmt.Printf("%s│%s %s%s%s│%s\n", ColorDim, ColorReset, line, strings.Repeat(" ", padding), ColorDim, ColorReset)
  81. }
  82. // Bottom Border
  83. fmt.Printf("%s╰%s╯%s\n", ColorDim, strings.Repeat("─", contentWidth), ColorReset)
  84. fmt.Println() // End new line after box
  85. }
  86. func formatBytes(bytes int64) string {
  87. const unit = 1024
  88. if bytes < unit {
  89. return fmt.Sprintf("%d B", bytes)
  90. }
  91. div, exp := int64(unit), 0
  92. for n := bytes / unit; n >= unit; n /= unit {
  93. div *= unit
  94. exp++
  95. }
  96. return fmt.Sprintf("%.1f %cB", float64(bytes)/float64(div), "KMGTPE"[exp])
  97. }
  98. // scanCRLF is a split function for a Scanner that returns each line of
  99. // text, stripped of any trailing end-of-line marker. The returned line may
  100. // be empty. The end-of-line marker is one optional carriage return followed
  101. // by one mandatory newline, OR just a carriage return.
  102. func scanCRLF(data []byte, atEOF bool) (advance int, token []byte, err error) {
  103. if atEOF && len(data) == 0 {
  104. return 0, nil, nil
  105. }
  106. if i := bytes.IndexByte(data, '\n'); i >= 0 {
  107. // We have a full newline-terminated line.
  108. return i + 1, dropCR(data[0:i]), nil
  109. }
  110. if i := bytes.IndexByte(data, '\r'); i >= 0 {
  111. // We have a CR-terminated line.
  112. return i + 1, data[0:i], nil
  113. }
  114. // If we're at EOF, we have a final, non-terminated line. Return it.
  115. if atEOF {
  116. return len(data), dropCR(data), nil
  117. }
  118. // Request more data.
  119. return 0, nil, nil
  120. }
  121. // dropCR drops a terminal \r from the data.
  122. func dropCR(data []byte) []byte {
  123. if len(data) > 0 && data[len(data)-1] == '\r' {
  124. return data[0 : len(data)-1]
  125. }
  126. return data
  127. }
  128. // Start starts the command line interface
  129. func (c *CLI) Start() {
  130. // Attempt to fix terminal settings if they are messed up (e.g. missing ICRNL)
  131. // This helps when Enter sends \r but the terminal driver expects \n
  132. cmd := exec.Command("stty", "sane")
  133. cmd.Stdin = os.Stdin
  134. cmd.Stdout = os.Stdout
  135. _ = cmd.Run()
  136. // Boxed startup message
  137. var sb strings.Builder
  138. sb.WriteString(fmt.Sprintf("Node %s%s%s CLI Started\n", ColorGreen, c.server.Raft.nodeID, ColorReset))
  139. sb.WriteString("Type 'help' for commands.")
  140. printBoxed(sb.String())
  141. // Initialize history handling
  142. historyPath := filepath.Join(os.TempDir(), fmt.Sprintf(".raft_history_%s", c.server.Raft.nodeID))
  143. historyFile, err := os.OpenFile(historyPath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
  144. if err != nil {
  145. // Just warn, don't fail
  146. fmt.Printf("%sWarning: Could not open history file: %v%s\n", ColorYellow, err, ColorReset)
  147. }
  148. defer func() {
  149. if historyFile != nil {
  150. historyFile.Close()
  151. }
  152. }()
  153. // State Monitor Loop
  154. go func() {
  155. var lastState string
  156. var lastTerm uint64
  157. stats := c.server.GetStats()
  158. lastState = stats.State
  159. lastTerm = stats.Term
  160. ticker := time.NewTicker(100 * time.Millisecond)
  161. defer ticker.Stop()
  162. for {
  163. select {
  164. case <-c.server.stopCh:
  165. return
  166. case <-ticker.C:
  167. stats := c.server.GetStats()
  168. if stats.State != lastState || stats.Term != lastTerm {
  169. msg := fmt.Sprintf("%s[State Change] %s (Term %d) -> %s (Term %d)%s",
  170. ColorYellow, lastState, lastTerm, stats.State, stats.Term, ColorReset)
  171. fmt.Printf("\n%s\n> ", msg)
  172. lastState = stats.State
  173. lastTerm = stats.Term
  174. }
  175. }
  176. }
  177. }()
  178. scanner := bufio.NewScanner(os.Stdin)
  179. scanner.Split(scanCRLF)
  180. fmt.Print("> ")
  181. for scanner.Scan() {
  182. text := strings.TrimSpace(scanner.Text())
  183. if text == "" {
  184. fmt.Print("> ")
  185. continue
  186. }
  187. // Save command to history
  188. if historyFile != nil {
  189. if _, err := historyFile.WriteString(text + "\n"); err != nil {
  190. // Ignore write error
  191. }
  192. }
  193. parts := strings.Fields(text)
  194. cmdName := strings.ToLower(parts[0])
  195. c.mu.RLock()
  196. cmd, exists := c.commands[cmdName]
  197. c.mu.RUnlock()
  198. if exists {
  199. cmd.Handler(parts, c.server)
  200. } else {
  201. // Check aliases
  202. switch cmdName {
  203. case "binlog", "db", "stats":
  204. c.mu.RLock()
  205. if infoCmd, ok := c.commands["info"]; ok {
  206. infoCmd.Handler(parts, c.server)
  207. }
  208. c.mu.RUnlock()
  209. case "history":
  210. c.printHistory(historyPath)
  211. default:
  212. printBoxed("Unknown command. Type 'help'.")
  213. }
  214. }
  215. fmt.Print("> ")
  216. }
  217. }
  218. // printHistory prints the command history
  219. func (c *CLI) printHistory(path string) {
  220. content, err := os.ReadFile(path)
  221. if err != nil {
  222. printBoxed("No history found.")
  223. return
  224. }
  225. lines := strings.Split(string(content), "\n")
  226. // Show last 20 lines
  227. start := 0
  228. if len(lines) > 20 {
  229. start = len(lines) - 20
  230. }
  231. var sb strings.Builder
  232. sb.WriteString(fmt.Sprintf("%sCommand History (Last 20):%s\n", ColorCyan, ColorReset))
  233. for i := start; i < len(lines); i++ {
  234. line := strings.TrimSpace(lines[i])
  235. if line != "" {
  236. sb.WriteString(fmt.Sprintf("%d: %s\n", i+1, line))
  237. }
  238. }
  239. printBoxed(sb.String())
  240. }
  241. // RegisterCommand registers a new CLI command
  242. func (c *CLI) RegisterCommand(name, description string, handler func(parts []string, server *KVServer)) {
  243. c.mu.Lock()
  244. defer c.mu.Unlock()
  245. c.commands[strings.ToLower(name)] = CLICommand{
  246. Name: name,
  247. Description: description,
  248. Handler: handler,
  249. }
  250. }
  251. func (c *CLI) registerDefaultCommands() {
  252. c.RegisterCommand("set", "Set value (set <key> <val>)", func(parts []string, server *KVServer) {
  253. if len(parts) != 3 {
  254. printBoxed("Usage: set <key> <value>")
  255. return
  256. }
  257. key, val := parts[1], parts[2]
  258. // Use Authenticated Set
  259. c.mu.RLock()
  260. token := c.token
  261. c.mu.RUnlock()
  262. if err := server.SetAuthenticated(key, val, token); err != nil {
  263. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  264. } else {
  265. printBoxed(fmt.Sprintf("%sOK%s", ColorGreen, ColorReset))
  266. }
  267. })
  268. c.RegisterCommand("get", "Get value (get <key>)", func(parts []string, server *KVServer) {
  269. if len(parts) != 2 {
  270. printBoxed("Usage: get <key>")
  271. return
  272. }
  273. key := parts[1]
  274. c.mu.RLock()
  275. token := c.token
  276. c.mu.RUnlock()
  277. if val, ok, err := server.GetLinearAuthenticated(key, token); err != nil {
  278. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  279. } else if !ok {
  280. printBoxed(fmt.Sprintf("%sNot Found%s", ColorYellow, ColorReset))
  281. } else {
  282. printBoxed(fmt.Sprintf("%s%s%s = %s%s%s", ColorCyan, key, ColorReset, ColorYellow, val, ColorReset))
  283. }
  284. })
  285. c.RegisterCommand("del", "Delete key (del <key>)", func(parts []string, server *KVServer) {
  286. if len(parts) != 2 {
  287. printBoxed("Usage: del <key>")
  288. return
  289. }
  290. key := parts[1]
  291. c.mu.RLock()
  292. token := c.token
  293. c.mu.RUnlock()
  294. if err := server.DelAuthenticated(key, token); err != nil {
  295. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  296. } else {
  297. printBoxed(fmt.Sprintf("%sDeleted%s", ColorGreen, ColorReset))
  298. }
  299. })
  300. // User Command Group
  301. c.RegisterCommand("user", "User management commands (type 'user help' for more)", func(parts []string, server *KVServer) {
  302. if len(parts) < 2 {
  303. printBoxed("Usage: user <subcommand> [args...]\nType 'user help' for list of subcommands.")
  304. return
  305. }
  306. subCmd := strings.ToLower(parts[1])
  307. args := parts[2:]
  308. // Common vars
  309. c.mu.RLock()
  310. token := c.token
  311. c.mu.RUnlock()
  312. switch subCmd {
  313. case "init": // Was auth-init
  314. if server.AuthManager.IsEnabled() {
  315. fmt.Printf("%sAuth system is already initialized.%s\n", ColorYellow, ColorReset)
  316. fmt.Print("Do you want to reset the root user? (y/N): ")
  317. var resp string
  318. fmt.Scanln(&resp)
  319. if strings.ToLower(resp) != "y" {
  320. return
  321. }
  322. }
  323. fmt.Print("Enter root password: ")
  324. password, err := readPassword()
  325. fmt.Println()
  326. if err != nil || password == "" {
  327. printBoxed("Error reading password")
  328. return
  329. }
  330. if err := server.AuthManager.CreateRootUser(password); err != nil {
  331. printBoxed(fmt.Sprintf("Failed to create root user: %v", err))
  332. return
  333. }
  334. if err := server.AuthManager.EnableAuth(); err != nil {
  335. printBoxed(fmt.Sprintf("Failed to enable auth: %v", err))
  336. return
  337. }
  338. printBoxed("Auth Initialized. Please login as 'root'.")
  339. case "login": // Was login
  340. if len(args) < 1 {
  341. printBoxed("Usage: user login <username> [code]")
  342. return
  343. }
  344. username := args[0]
  345. code := ""
  346. if len(args) > 1 {
  347. code = args[1]
  348. }
  349. fmt.Print("Password: ")
  350. password, err := readPassword()
  351. fmt.Println()
  352. if err != nil {
  353. printBoxed("Error reading password")
  354. return
  355. }
  356. t, err := server.AuthManager.Login(username, password, code, "cli")
  357. if err != nil && err.Error() == "mfa code required" {
  358. fmt.Printf("%sTwo-Factor Authentication Required%s\n", ColorYellow, ColorReset)
  359. fmt.Print("Enter MFA Code: ")
  360. code, err = readPassword()
  361. fmt.Println()
  362. if err == nil {
  363. t, err = server.AuthManager.Login(username, password, code, "cli")
  364. }
  365. }
  366. if err != nil {
  367. printBoxed(fmt.Sprintf("%sLogin Failed:%s %v", ColorRed, ColorReset, err))
  368. } else {
  369. c.mu.Lock()
  370. c.token = t
  371. c.mu.Unlock()
  372. printBoxed(fmt.Sprintf("%sLogin Success!%s", ColorGreen, ColorReset))
  373. }
  374. case "mfa":
  375. if len(args) < 1 {
  376. printBoxed("Usage: user mfa <enable|disable>")
  377. return
  378. }
  379. // Require Login
  380. c.mu.RLock()
  381. token := c.token
  382. c.mu.RUnlock()
  383. if token == "" {
  384. printBoxed("Error: You must be logged in.")
  385. return
  386. }
  387. switch args[0] {
  388. case "enable":
  389. // Generate
  390. secret, err := GenerateMFASecret()
  391. if err != nil {
  392. printBoxed(fmt.Sprintf("Error generating secret: %v", err))
  393. return
  394. }
  395. // Get Username
  396. session, err := server.AuthManager.GetSession(token)
  397. if err != nil {
  398. printBoxed("Session expired")
  399. return
  400. }
  401. url := GenerateOTPAuthURL(session.Username, secret, "RaftKV")
  402. // Show info
  403. fmt.Println()
  404. fmt.Printf("%sSetup 2FA%s\n", ColorCyan, ColorReset)
  405. fmt.Println("1. Install Google Authenticator or compatible app.")
  406. fmt.Println("2. Add account manually using this secret:")
  407. fmt.Printf(" %s%s%s\n", ColorGreen, secret, ColorReset)
  408. fmt.Printf(" (URL: %s)\n", url)
  409. fmt.Println("3. Enter the 6-digit code to verify.")
  410. fmt.Println()
  411. fmt.Print("Verification Code: ")
  412. code, err := readPassword()
  413. fmt.Println()
  414. if !ValidateTOTP(secret, code) {
  415. printBoxed(fmt.Sprintf("%sError: Invalid Code%s", ColorRed, ColorReset))
  416. return
  417. }
  418. if err := server.SetUserMFA(session.Username, secret, true, token); err != nil {
  419. printBoxed(fmt.Sprintf("Error saving user: %v", err))
  420. } else {
  421. printBoxed(fmt.Sprintf("%sMFA Enabled Successfully!%s", ColorGreen, ColorReset))
  422. }
  423. case "disable":
  424. fmt.Print("Are you sure you want to disable MFA? (y/N): ")
  425. var resp string
  426. fmt.Scanln(&resp)
  427. if strings.ToLower(resp) != "y" {
  428. return
  429. }
  430. session, err := server.AuthManager.GetSession(token)
  431. if err != nil {
  432. printBoxed("Session expired")
  433. return
  434. }
  435. if err := server.SetUserMFA(session.Username, "", false, token); err != nil {
  436. printBoxed(fmt.Sprintf("Error saving user: %v", err))
  437. } else {
  438. printBoxed(fmt.Sprintf("%sMFA Disabled%s", ColorGreen, ColorReset))
  439. }
  440. }
  441. case "logout": // Was logout
  442. if token != "" {
  443. server.Logout(token)
  444. c.mu.Lock()
  445. c.token = ""
  446. c.mu.Unlock()
  447. printBoxed("Logged out.")
  448. } else {
  449. printBoxed("Not logged in.")
  450. }
  451. case "who": // Was whoami
  452. if token == "" {
  453. printBoxed("Not logged in.")
  454. return
  455. }
  456. session, err := server.GetSessionInfo(token)
  457. if err != nil {
  458. printBoxed(fmt.Sprintf("Error: %v", err))
  459. return
  460. }
  461. printBoxed(fmt.Sprintf("Logged in as: %s%s%s", ColorCyan, session.Username, ColorReset))
  462. case "add": // Was user-add
  463. if len(args) < 1 {
  464. printBoxed("Usage: user add <username> [role1,role2...]")
  465. return
  466. }
  467. username := args[0]
  468. var roles []string
  469. if len(args) > 1 {
  470. roles = strings.Split(args[1], ",")
  471. }
  472. fmt.Printf("Enter password for %s: ", username)
  473. password, err := readPassword()
  474. fmt.Println()
  475. if err != nil || password == "" {
  476. printBoxed("Error reading password")
  477. return
  478. }
  479. if err := server.CreateUser(username, password, roles, token); err != nil {
  480. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  481. } else {
  482. printBoxed(fmt.Sprintf("%sUser %s created%s", ColorGreen, username, ColorReset))
  483. }
  484. case "del": // Was user-del
  485. if len(args) < 1 {
  486. printBoxed("Usage: user del <username>")
  487. return
  488. }
  489. username := args[0]
  490. fmt.Printf("Delete user '%s'? (y/N): ", username)
  491. var resp string
  492. fmt.Scanln(&resp)
  493. if strings.ToLower(resp) != "y" {
  494. return
  495. }
  496. if err := server.DeleteUser(username, token); err != nil {
  497. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  498. } else {
  499. printBoxed(fmt.Sprintf("%sUser deleted%s", ColorGreen, ColorReset))
  500. }
  501. case "list":
  502. users, err := server.ListUsers(token)
  503. if err != nil {
  504. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  505. return
  506. }
  507. var buf bytes.Buffer
  508. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  509. fmt.Fprintln(w, "Username\tRoles\tStatus")
  510. fmt.Fprintln(w, "--------\t-----\t------")
  511. for _, u := range users {
  512. status := "Offline"
  513. if u.IsOnline { status = "Online" }
  514. fmt.Fprintf(w, "%s\t%s\t%s\n", u.Username, strings.Join(u.Roles, ","), status)
  515. }
  516. w.Flush()
  517. printBoxed(buf.String())
  518. case "update":
  519. // user update <username> [roles=r1,r2]
  520. // Currently only password update via prompt, maybe roles later
  521. // The prompt implies a generic update but also mentions "user update"
  522. // Let's implement password update here or allow changing roles.
  523. // Ideally arguments: user update <username> roles=admin,dev
  524. // If no args (other than username), prompt for password?
  525. if len(args) < 1 {
  526. printBoxed("Usage: user update <username> [roles=r1,r2...]")
  527. return
  528. }
  529. username := args[0]
  530. // If args present, update roles
  531. if len(args) > 1 {
  532. // Parse options
  533. updated := false
  534. // user, err := server.AuthManager.GetUser(username) // Use internal GetUser helper or logic?
  535. // We need authenticated way. server.ListUsers gives us access if admin.
  536. // But we need the User object to modify.
  537. // Let's rely on server.UpdateUser taking a struct.
  538. // We first need to GET the user to avoid overwriting fields.
  539. // Since we don't have GetUser exposed in server (only List), let's add one or iterate List.
  540. // Iterating List is inefficient but works for now.
  541. users, _ := server.ListUsers(token)
  542. var targetUser *User
  543. for _, u := range users {
  544. if u.Username == username {
  545. targetUser = u
  546. break
  547. }
  548. }
  549. if targetUser == nil {
  550. printBoxed("User not found or permission denied")
  551. return
  552. }
  553. // Apply updates
  554. for _, arg := range args[1:] {
  555. if strings.HasPrefix(arg, "roles=") {
  556. roleStr := strings.TrimPrefix(arg, "roles=")
  557. targetUser.Roles = strings.Split(roleStr, ",")
  558. updated = true
  559. }
  560. }
  561. if updated {
  562. if err := server.UpdateUser(*targetUser, token); err != nil {
  563. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  564. } else {
  565. printBoxed(fmt.Sprintf("%sUser updated%s", ColorGreen, ColorReset))
  566. }
  567. }
  568. } else {
  569. // No args -> Change Password
  570. fmt.Printf("Enter new password for %s: ", username)
  571. pass, err := readPassword()
  572. fmt.Println()
  573. if err != nil || pass == "" {
  574. printBoxed("Error reading password")
  575. return
  576. }
  577. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  578. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  579. } else {
  580. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  581. }
  582. }
  583. case "passwd": // Keep alias or subcommand
  584. if len(args) < 1 {
  585. printBoxed("Usage: user passwd <username>")
  586. return
  587. }
  588. // Reuse logic
  589. username := args[0]
  590. fmt.Printf("Enter new password for %s: ", username)
  591. pass, err := readPassword()
  592. fmt.Println()
  593. if err != nil || pass == "" {
  594. printBoxed("Error reading password")
  595. return
  596. }
  597. if err := server.ChangeUserPassword(username, pass, token); err != nil {
  598. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  599. } else {
  600. printBoxed(fmt.Sprintf("%sPassword updated%s", ColorGreen, ColorReset))
  601. }
  602. case "role":
  603. if len(args) < 1 {
  604. printBoxed("Usage: user role <list|add|delete|update> ...")
  605. return
  606. }
  607. roleCmd := strings.ToLower(args[0])
  608. roleArgs := args[1:]
  609. switch roleCmd {
  610. case "list":
  611. roles, err := server.ListRoles(token)
  612. if err != nil {
  613. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  614. return
  615. }
  616. var buf bytes.Buffer
  617. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  618. fmt.Fprintln(w, "Role\tParents\tPerms")
  619. fmt.Fprintln(w, "----\t-------\t-----")
  620. for _, r := range roles {
  621. parents := strings.Join(r.ParentRoles, ",")
  622. permCount := len(r.Permissions)
  623. fmt.Fprintf(w, "%s\t%s\t%d rules\n", r.Name, parents, permCount)
  624. }
  625. w.Flush()
  626. printBoxed(buf.String())
  627. case "add":
  628. if len(roleArgs) < 1 {
  629. printBoxed("Usage: user role add <name>")
  630. return
  631. }
  632. if err := server.CreateRole(roleArgs[0], token); err != nil {
  633. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  634. } else {
  635. printBoxed(fmt.Sprintf("%sRole %s created%s", ColorGreen, roleArgs[0], ColorReset))
  636. }
  637. case "delete":
  638. if len(roleArgs) < 1 {
  639. printBoxed("Usage: user role delete <name>")
  640. return
  641. }
  642. if err := server.DeleteRole(roleArgs[0], token); err != nil {
  643. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  644. } else {
  645. printBoxed(fmt.Sprintf("%sRole %s deleted%s", ColorGreen, roleArgs[0], ColorReset))
  646. }
  647. case "update":
  648. if len(roleArgs) < 1 {
  649. printBoxed("Usage: user role update <name> [parents=p1,p2] [perms=action:pattern,...]")
  650. return
  651. }
  652. name := roleArgs[0]
  653. roles, _ := server.ListRoles(token)
  654. var targetRole *Role
  655. for _, r := range roles {
  656. if r.Name == name {
  657. targetRole = r
  658. break
  659. }
  660. }
  661. if targetRole == nil {
  662. printBoxed("Role not found")
  663. return
  664. }
  665. updated := false
  666. for _, arg := range roleArgs[1:] {
  667. if strings.HasPrefix(arg, "parents=") {
  668. pStr := strings.TrimPrefix(arg, "parents=")
  669. targetRole.ParentRoles = strings.Split(pStr, ",")
  670. updated = true
  671. }
  672. if strings.HasPrefix(arg, "perms=") {
  673. permStr := strings.TrimPrefix(arg, "perms=")
  674. rules := strings.Split(permStr, ",")
  675. var newPerms []Permission
  676. for _, r := range rules {
  677. parts := strings.SplitN(r, ":", 2)
  678. if len(parts) == 2 {
  679. action := parts[0]
  680. pattern := parts[1]
  681. newPerms = append(newPerms, Permission{
  682. KeyPattern: pattern,
  683. Actions: []string{action},
  684. })
  685. }
  686. }
  687. targetRole.Permissions = newPerms
  688. updated = true
  689. }
  690. }
  691. if updated {
  692. if err := server.UpdateRole(*targetRole, token); err != nil {
  693. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  694. } else {
  695. printBoxed(fmt.Sprintf("%sRole updated%s", ColorGreen, ColorReset))
  696. }
  697. } else {
  698. printBoxed("No changes specified.")
  699. }
  700. default:
  701. printBoxed("Unknown sub-command. Options: list, add, delete, update")
  702. }
  703. case "help":
  704. var sb strings.Builder
  705. sb.WriteString(fmt.Sprintf("%sUser Management Commands:%s\n", ColorCyan, ColorReset))
  706. // Define subcommands for formatting
  707. type subCmd struct {
  708. Name string
  709. Desc string
  710. }
  711. cmds := []subCmd{
  712. {"user init", "Initialize auth system (Root)"},
  713. {"user login <user> [code]", "Login"},
  714. {"user logout", "Logout"},
  715. {"user who", "Current user info"},
  716. {"user add <user> [roles]", "Create user (Root)"},
  717. {"user del <user>", "Delete user (Root)"},
  718. {"user update <user> [opts]", "Update user/pass (Root)"},
  719. {"user list", "List users (Root)"},
  720. {"user role list", "List roles (Root)"},
  721. {"user role add <name>", "Create role (Root)"},
  722. {"user role delete <name>", "Delete role (Root)"},
  723. {"user role update <name> ...", "Update role (Root)"},
  724. }
  725. // Find max length
  726. maxLen := 0
  727. for _, c := range cmds {
  728. if len(c.Name) > maxLen {
  729. maxLen = len(c.Name)
  730. }
  731. }
  732. for _, c := range cmds {
  733. padding := strings.Repeat(" ", maxLen-len(c.Name))
  734. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, c.Name, ColorReset, padding, ColorDim, c.Desc, ColorReset))
  735. }
  736. printBoxed(sb.String())
  737. default:
  738. printBoxed(fmt.Sprintf("Unknown subcommand '%s'. Type 'user help'.", subCmd))
  739. }
  740. })
  741. c.RegisterCommand("join", "Add node to cluster (join <id> <addr>)", func(parts []string, server *KVServer) {
  742. if len(parts) != 3 {
  743. printBoxed("Usage: join <nodeID> <address>")
  744. return
  745. }
  746. // Admin only
  747. c.mu.RLock()
  748. token := c.token
  749. c.mu.RUnlock()
  750. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  751. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  752. return
  753. }
  754. nodeID := parts[1]
  755. addr := parts[2]
  756. if err := server.Join(nodeID, addr); err != nil {
  757. printBoxed(fmt.Sprintf("%sError joining node:%s %v", ColorRed, ColorReset, err))
  758. } else {
  759. printBoxed(fmt.Sprintf("%sJoin request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  760. }
  761. })
  762. c.RegisterCommand("leave", "Remove node from cluster (leave <id>)", func(parts []string, server *KVServer) {
  763. if len(parts) != 2 {
  764. printBoxed("Usage: leave <nodeID>")
  765. return
  766. }
  767. // Admin only
  768. c.mu.RLock()
  769. token := c.token
  770. c.mu.RUnlock()
  771. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  772. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  773. return
  774. }
  775. nodeID := parts[1]
  776. if err := server.Leave(nodeID); err != nil {
  777. printBoxed(fmt.Sprintf("%sError leaving node:%s %v", ColorRed, ColorReset, err))
  778. } else {
  779. printBoxed(fmt.Sprintf("%sLeave request sent for node %s%s", ColorGreen, nodeID, ColorReset))
  780. }
  781. })
  782. c.RegisterCommand("search", "Search keys (search <pat> [lim] [off])", func(parts []string, server *KVServer) {
  783. if len(parts) < 2 {
  784. printBoxed("Usage: search <pattern> [limit] [offset]")
  785. return
  786. }
  787. pattern := parts[1]
  788. limit := 20 // Default limit
  789. offset := 0
  790. if len(parts) >= 3 {
  791. if l, err := strconv.Atoi(parts[2]); err == nil {
  792. limit = l
  793. }
  794. }
  795. if len(parts) >= 4 {
  796. if o, err := strconv.Atoi(parts[3]); err == nil {
  797. offset = o
  798. }
  799. }
  800. c.mu.RLock()
  801. token := c.token
  802. c.mu.RUnlock()
  803. // Use Authenticated Search
  804. results, err := server.SearchAuthenticated(pattern, limit, offset, token)
  805. if err != nil {
  806. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  807. return
  808. }
  809. // Format Table to Buffer
  810. var buf bytes.Buffer
  811. w := tabwriter.NewWriter(&buf, 0, 0, 2, ' ', 0)
  812. fmt.Fprintln(w, "Key\tValue\tCommitIndex")
  813. fmt.Fprintln(w, "---\t-----\t-----------")
  814. for _, r := range results {
  815. fmt.Fprintf(w, "%s\t%s\t%d\n", r.Key, r.Value, r.CommitIndex)
  816. }
  817. w.Flush()
  818. summary := fmt.Sprintf("\n%sFound %d records (showing max %d)%s", ColorDim, len(results), limit, ColorReset)
  819. printBoxed(buf.String() + summary)
  820. })
  821. c.RegisterCommand("count", "Count keys (count <pat>)", func(parts []string, server *KVServer) {
  822. if len(parts) < 2 {
  823. printBoxed("Usage: count <pattern> (e.g. 'count *', 'count user.*')")
  824. return
  825. }
  826. pattern := parts[1]
  827. c.mu.RLock()
  828. token := c.token
  829. c.mu.RUnlock()
  830. start := time.Now()
  831. count, err := server.CountAuthenticated(pattern, token)
  832. duration := time.Since(start)
  833. if err != nil {
  834. printBoxed(fmt.Sprintf("%sError:%s %v", ColorRed, ColorReset, err))
  835. } else {
  836. printBoxed(fmt.Sprintf("%sCount: %d%s (took %v)", ColorGreen, count, ColorReset, duration))
  837. }
  838. })
  839. c.RegisterCommand("info", "Show all system stats", func(parts []string, server *KVServer) {
  840. // Admin only
  841. c.mu.RLock()
  842. token := c.token
  843. c.mu.RUnlock()
  844. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  845. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  846. return
  847. }
  848. // 1. Gather all data
  849. var m runtime.MemStats
  850. runtime.ReadMemStats(&m)
  851. dbSize := server.GetDBSize()
  852. logSize := server.GetLogSize()
  853. stats := server.GetStats()
  854. health := server.HealthCheck()
  855. dbApplied := server.DB.GetLastAppliedIndex()
  856. // 2. Build Output
  857. var sb strings.Builder
  858. // Section: Node Status
  859. sb.WriteString(fmt.Sprintf("%sNode Status:%s\n", ColorCyan, ColorReset))
  860. sb.WriteString(fmt.Sprintf(" ID: %s%s%s\n", ColorGreen, health.NodeID, ColorReset))
  861. sb.WriteString(fmt.Sprintf(" State: %s\n", health.State))
  862. sb.WriteString(fmt.Sprintf(" Term: %d\n", health.Term))
  863. sb.WriteString(fmt.Sprintf(" Leader: %s\n", health.LeaderID))
  864. sb.WriteString(fmt.Sprintf(" Healthy: %v\n", health.IsHealthy))
  865. sb.WriteString("\n")
  866. // Section: Storage Stats
  867. sb.WriteString(fmt.Sprintf("%sStorage & Memory:%s\n", ColorCyan, ColorReset))
  868. sb.WriteString(fmt.Sprintf(" DB Size: %s\n", formatBytes(dbSize)))
  869. sb.WriteString(fmt.Sprintf(" Raft Log: %s\n", formatBytes(logSize)))
  870. sb.WriteString(fmt.Sprintf(" Mem Alloc: %s\n", formatBytes(int64(m.Alloc))))
  871. sb.WriteString(fmt.Sprintf(" Mem Sys: %s\n", formatBytes(int64(m.Sys))))
  872. sb.WriteString(fmt.Sprintf(" NumGC: %d\n", m.NumGC))
  873. sb.WriteString("\n")
  874. // Section: Raft & DB Indices
  875. sb.WriteString(fmt.Sprintf("%sConsensus Indices:%s\n", ColorCyan, ColorReset))
  876. sb.WriteString(fmt.Sprintf(" Commit Index: %d\n", stats.CommitIndex))
  877. sb.WriteString(fmt.Sprintf(" Applied Index:%d\n", stats.LastApplied))
  878. sb.WriteString(fmt.Sprintf(" Last Log Idx: %d\n", stats.LastLogIndex))
  879. sb.WriteString(fmt.Sprintf(" DB Applied: %d\n", dbApplied))
  880. sb.WriteString("\n")
  881. // Section: Cluster Members
  882. sb.WriteString(fmt.Sprintf("%sCluster Members (%d):%s", ColorCyan, stats.ClusterSize, ColorReset))
  883. for id, addr := range stats.ClusterNodes {
  884. // Determine status color
  885. statusColor := ColorDim
  886. nodeID := server.Raft.nodeID // Assuming local nodeID is accessible
  887. if id == nodeID {
  888. statusColor = ColorCyan // Self
  889. } else {
  890. // Quick check
  891. conn, err := net.DialTimeout("tcp", addr, 50*time.Millisecond)
  892. if err == nil {
  893. statusColor = ColorGreen
  894. conn.Close()
  895. }
  896. }
  897. // Marker for Leader
  898. marker := ""
  899. if id == health.LeaderID {
  900. marker = fmt.Sprintf(" %s(Leader)%s", ColorYellow, ColorReset)
  901. }
  902. sb.WriteString(fmt.Sprintf("\n - %s%s%s: %s%s", statusColor, id, ColorReset, addr, marker))
  903. }
  904. printBoxed(sb.String())
  905. })
  906. c.RegisterCommand("quit", "Gracefully shutdown the node", func(parts []string, server *KVServer) {
  907. // Admin only
  908. c.mu.RLock()
  909. token := c.token
  910. c.mu.RUnlock()
  911. if server.AuthManager.IsEnabled() && !server.IsRoot(token) {
  912. printBoxed(fmt.Sprintf("%sPermission Denied: Root access required%s", ColorRed, ColorReset))
  913. return
  914. }
  915. printBoxed("Shutting down node...")
  916. if err := server.Stop(); err != nil {
  917. printBoxed(fmt.Sprintf("%sError stopping server:%s %v", ColorRed, ColorReset, err))
  918. } else {
  919. printBoxed(fmt.Sprintf("%sNode stopped successfully.%s", ColorGreen, ColorReset))
  920. }
  921. os.Exit(0)
  922. })
  923. c.RegisterCommand("clear", "Clear screen", func(parts []string, server *KVServer) {
  924. fmt.Print("\033[H\033[2J")
  925. })
  926. c.RegisterCommand("help", "Show commands", func(parts []string, server *KVServer) {
  927. var sb strings.Builder
  928. sb.WriteString(fmt.Sprintf("%sCommands:%s\n", ColorGreen, ColorReset))
  929. // Sort commands
  930. c.mu.RLock()
  931. var cmds []CLICommand
  932. for _, cmd := range c.commands {
  933. cmds = append(cmds, cmd)
  934. }
  935. c.mu.RUnlock()
  936. sort.Slice(cmds, func(i, j int) bool {
  937. return cmds[i].Name < cmds[j].Name
  938. })
  939. // Find max length for padding
  940. maxNameLen := 0
  941. for _, cmd := range cmds {
  942. if len(cmd.Name) > maxNameLen {
  943. maxNameLen = len(cmd.Name)
  944. }
  945. }
  946. for _, cmd := range cmds {
  947. padding := strings.Repeat(" ", maxNameLen-len(cmd.Name))
  948. sb.WriteString(fmt.Sprintf(" %s%s%s%s %s%s%s\n", ColorGreen, cmd.Name, ColorReset, padding, ColorDim, cmd.Description, ColorReset))
  949. }
  950. printBoxed(sb.String())
  951. })
  952. }
  953. // readPassword securely reads a password from stdin without echoing.
  954. func readPassword() (string, error) {
  955. // 1. Disable echo
  956. cmd := exec.Command("stty", "-echo")
  957. cmd.Stdin = os.Stdin
  958. cmd.Stdout = os.Stdout
  959. if err := cmd.Run(); err != nil {
  960. return "", fmt.Errorf("failed to disable echo: %v", err)
  961. }
  962. defer func() {
  963. // 3. Re-enable echo
  964. cmd := exec.Command("stty", "echo")
  965. cmd.Stdin = os.Stdin
  966. cmd.Stdout = os.Stdout
  967. _ = cmd.Run()
  968. }()
  969. // 2. Read input
  970. reader := bufio.NewReader(os.Stdin)
  971. pass, err := reader.ReadString('\n')
  972. if err != nil {
  973. return "", err
  974. }
  975. return strings.TrimSpace(pass), nil
  976. }