A vibe coded tangled fork which supports pijul.

appview: handle non-unique publicKey records

- upsert public key to handle record update event
- don't delete by pair of name and key. delete by name or rkey instead.

Signed-off-by: Seongmin Lee <git@boltless.me>

+109 -47
+17 -7
appview/db/pubkeys.go
··· 5 5 "time" 6 6 ) 7 7 8 - func AddPublicKey(e Execer, did, name, key, rkey string) error { 8 + func UpsertPublicKey(e Execer, pubKey models.PublicKey) error { 9 9 _, err := e.Exec( 10 - `insert or ignore into public_keys (did, name, key, rkey) 11 - values (?, ?, ?, ?)`, 12 - did, name, key, rkey) 10 + `insert into public_keys (did, rkey, name, key, created) 11 + values (?, ?, ?, ?, ?) 12 + on conflict(did, rkey) do update set 13 + name = excluded.name, 14 + key = excluded.key, 15 + created = excluded.created`, 16 + pubKey.Did, 17 + pubKey.Rkey, 18 + pubKey.Name, 19 + pubKey.Key, 20 + pubKey.Created.Format(time.RFC3339), 21 + ) 13 22 return err 14 23 } 15 24 16 - func DeletePublicKey(e Execer, did, name, key string) error { 25 + // for public_keys with empty rkey 26 + func DeletePublicKeyLegacy(e Execer, did, name string) error { 17 27 _, err := e.Exec(` 18 28 delete from public_keys 19 - where did = ? and name = ? and key = ?`, 20 - did, name, key) 29 + where did = ? and name = ? and rkey = ''`, 30 + did, name) 21 31 return err 22 32 } 23 33
+13 -3
appview/ingester.go
··· 131 131 if err != nil { 132 132 return fmt.Errorf("failed to %s star record: %w", e.Commit.Operation, err) 133 133 } 134 + l.Info("processed star", "operation", e.Commit.Operation, "rkey", e.Commit.RKey) 134 135 135 136 return nil 136 137 } ··· 164 165 if err != nil { 165 166 return fmt.Errorf("failed to %s follow record: %w", e.Commit.Operation, err) 166 167 } 168 + l.Info("processed follow", "operation", e.Commit.Operation, "rkey", e.Commit.RKey) 167 169 168 170 return nil 169 171 } ··· 185 187 l.Error("invalid record", "err", err) 186 188 return err 187 189 } 190 + pubKey, err := models.PublicKeyFromRecord(syntax.DID(did), syntax.RecordKey(e.Commit.RKey), record) 191 + if err != nil { 192 + l.Error("invalid record", "err", err) 193 + return err 194 + } 195 + if err := pubKey.Validate(); err != nil { 196 + l.Error("invalid record", "err", err) 197 + return err 198 + } 188 199 189 - name := record.Name 190 - key := record.Key 191 - err = db.AddPublicKey(i.Db, did, name, key, e.Commit.RKey) 200 + err = db.UpsertPublicKey(i.Db, pubKey) 192 201 case jmodels.CommitOperationDelete: 193 202 l.Debug("processing delete of pubkey") 194 203 err = db.DeletePublicKeyByRkey(i.Db, did, e.Commit.RKey) ··· 197 206 if err != nil { 198 207 return fmt.Errorf("failed to %s pubkey record: %w", e.Commit.Operation, err) 199 208 } 209 + l.Info("processed pubkey", "operation", e.Commit.Operation, "rkey", e.Commit.RKey) 200 210 201 211 return nil 202 212 }
+38
appview/models/pubkey.go
··· 2 2 3 3 import ( 4 4 "encoding/json" 5 + "fmt" 5 6 "time" 7 + 8 + "github.com/bluesky-social/indigo/atproto/syntax" 9 + "github.com/gliderlabs/ssh" 10 + "tangled.org/core/api/tangled" 6 11 ) 7 12 8 13 type PublicKey struct { ··· 23 28 Alias: (*Alias)(&p), 24 29 }) 25 30 } 31 + 32 + func (p *PublicKey) AsRecord() tangled.PublicKey { 33 + return tangled.PublicKey{ 34 + Name: p.Name, 35 + Key: p.Key, 36 + CreatedAt: p.Created.Format(time.RFC3339), 37 + } 38 + } 39 + 40 + var _ Validator = new(PublicKey) 41 + 42 + func (p *PublicKey) Validate() error { 43 + if _, _, _, _, err := ssh.ParseAuthorizedKey([]byte(p.Key)); err != nil { 44 + return fmt.Errorf("invalid ssh key format: %w", err) 45 + } 46 + 47 + return nil 48 + } 49 + 50 + func PublicKeyFromRecord(did syntax.DID, rkey syntax.RecordKey, record tangled.PublicKey) (PublicKey, error) { 51 + created, err := time.Parse(time.RFC3339, record.CreatedAt) 52 + if err != nil { 53 + return PublicKey{}, fmt.Errorf("invalid time format '%s'", record.CreatedAt) 54 + } 55 + 56 + return PublicKey{ 57 + Did: did.String(), 58 + Rkey: rkey.String(), 59 + Name: record.Name, 60 + Key: record.Key, 61 + Created: &created, 62 + }, nil 63 + }
+1 -1
appview/pages/templates/user/settings/fragments/keyListing.html
··· 19 19 <button 20 20 class="btn text-red-500 hover:text-red-700 dark:text-red-400 dark:hover:text-red-300 gap-2 group" 21 21 title="Delete key" 22 - hx-delete="/settings/keys?name={{urlquery $key.Name}}&rkey={{urlquery $key.Rkey}}&key={{urlquery $key.Key}}" 22 + hx-delete="/settings/keys?name={{urlquery $key.Name}}&rkey={{urlquery $key.Rkey}}" 23 23 hx-swap="none" 24 24 hx-confirm="Are you sure you want to delete the key {{ $key.Name }}?" 25 25 >
+40 -36
appview/settings/settings.go
··· 31 31 atpclient "github.com/bluesky-social/indigo/atproto/client" 32 32 "github.com/bluesky-social/indigo/atproto/syntax" 33 33 lexutil "github.com/bluesky-social/indigo/lex/util" 34 - "github.com/gliderlabs/ssh" 35 34 "github.com/google/uuid" 36 35 ) 37 36 ··· 611 610 s.Logger.Warn("keys: unimplemented method") 612 611 return 613 612 case http.MethodPut: 614 - did := s.OAuth.GetDid(r) 615 - key := r.FormValue("key") 616 - key = strings.TrimSpace(key) 617 - name := r.FormValue("name") 618 - client, err := s.OAuth.AuthorizedClient(r) 619 - if err != nil { 620 - s.Pages.Notice(w, "settings-keys", "Failed to authorize. Try again later.") 621 - return 613 + created := time.Now() 614 + pubKey := models.PublicKey{ 615 + Did: s.OAuth.GetDid(r), 616 + Rkey: tid.TID(), 617 + Name: r.FormValue("name"), 618 + Key: strings.TrimSpace(r.FormValue("key")), 619 + Created: &created, 622 620 } 623 621 624 - _, _, _, _, err = ssh.ParseAuthorizedKey([]byte(key)) 625 - if err != nil { 622 + if err := pubKey.Validate(); err != nil { 626 623 s.Logger.Error("parsing public key", "err", err) 627 624 s.Pages.NoticeHTML(w, "settings-keys", "That doesn't look like a valid public key. Make sure it's a <strong>public</strong> key.") 628 625 return 629 626 } 630 627 631 - rkey := tid.TID() 632 - 633 628 tx, err := s.Db.Begin() 634 629 if err != nil { 635 630 s.Logger.Error("failed to start transaction for adding public key", "err", err) ··· 638 633 } 639 634 defer tx.Rollback() 640 635 641 - if err := db.AddPublicKey(tx, did, name, key, rkey); err != nil { 636 + if err = db.UpsertPublicKey(s.Db, pubKey); err != nil { 642 637 s.Logger.Error("adding public key", "err", err) 643 638 s.Pages.Notice(w, "settings-keys", "Failed to add public key.") 644 639 return 645 640 } 646 641 642 + client, err := s.OAuth.AuthorizedClient(r) 643 + if err != nil { 644 + s.Pages.Notice(w, "settings-keys", "Failed to authorize. Try again later.") 645 + return 646 + } 647 + 647 648 // store in pds too 649 + record := pubKey.AsRecord() 648 650 resp, err := comatproto.RepoPutRecord(r.Context(), client, &comatproto.RepoPutRecord_Input{ 649 651 Collection: tangled.PublicKeyNSID, 650 - Repo: did, 651 - Rkey: rkey, 652 + Repo: pubKey.Did, 653 + Rkey: pubKey.Rkey, 652 654 Record: &lexutil.LexiconTypeDecoder{ 653 - Val: &tangled.PublicKey{ 654 - CreatedAt: time.Now().Format(time.RFC3339), 655 - Key: key, 656 - Name: name, 657 - }}, 655 + Val: &record, 656 + }, 658 657 }) 659 658 // invalid record 660 659 if err != nil { ··· 681 680 682 681 name := q.Get("name") 683 682 rkey := q.Get("rkey") 684 - key := q.Get("key") 685 683 686 - s.Logger.Debug("deleting key", "name", name, "rkey", rkey, "key", key) 684 + s.Logger.Debug("deleting key", "name", name, "rkey", rkey) 687 685 688 - client, err := s.OAuth.AuthorizedClient(r) 689 - if err != nil { 690 - s.Logger.Error("failed to authorize client", "err", err) 691 - s.Pages.Notice(w, "settings-keys", "Failed to authorize client.") 692 - return 693 - } 686 + if rkey == "" { 687 + if err := db.DeletePublicKeyLegacy(s.Db, did, name); err != nil { 688 + s.Logger.Error("failed to remove public key", "err", err) 689 + s.Pages.Notice(w, "settings-keys", "Failed to remove public key.") 690 + return 691 + } 692 + } else { 693 + if err := db.DeletePublicKeyByRkey(s.Db, did, rkey); err != nil { 694 + s.Logger.Error("failed to remove public key", "err", err) 695 + s.Pages.Notice(w, "settings-keys", "Failed to remove public key.") 696 + return 697 + } 694 698 695 - if err := db.DeletePublicKey(s.Db, did, name, key); err != nil { 696 - s.Logger.Error("removing public key", "err", err) 697 - s.Pages.Notice(w, "settings-keys", "Failed to remove public key.") 698 - return 699 - } 699 + client, err := s.OAuth.AuthorizedClient(r) 700 + if err != nil { 701 + s.Logger.Error("failed to authorize client", "err", err) 702 + s.Pages.Notice(w, "settings-keys", "Failed to authorize client.") 703 + return 704 + } 700 705 701 - if rkey != "" { 702 706 // remove from pds too 703 - _, err := comatproto.RepoDeleteRecord(r.Context(), client, &comatproto.RepoDeleteRecord_Input{ 707 + _, err = comatproto.RepoDeleteRecord(r.Context(), client, &comatproto.RepoDeleteRecord_Input{ 704 708 Collection: tangled.PublicKeyNSID, 705 709 Repo: did, 706 710 Rkey: rkey,