initial commit

This commit is contained in:
nak 2026-03-15 21:35:46 +00:00
commit a2e07963d9
7 changed files with 710 additions and 0 deletions

15
.gitignore vendored Normal file
View file

@ -0,0 +1,15 @@
# built binary
overte-api
# backup files
*.bak
# Go
*.exe
*.test
*.out
/vendor/
# env / secrets
.env
*.env

4
README.md Normal file
View file

@ -0,0 +1,4 @@
Overte API
==========
HUMAN IN THE LOOP vibe coded API for my Overte domain

6
build.sh Executable file
View file

@ -0,0 +1,6 @@
#!/bin/sh
set -e
echo "Building overte-api..."
go build -o overte-api .
echo "Done."

11
go.mod Normal file
View file

@ -0,0 +1,11 @@
module wizards.cyou/overte-api
go 1.22.2
require (
github.com/cespare/xxhash/v2 v2.3.0 // indirect
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f // indirect
github.com/gorilla/websocket v1.5.3 // indirect
github.com/redis/go-redis/v9 v9.18.0 // indirect
go.uber.org/atomic v1.11.0 // indirect
)

10
go.sum Normal file
View file

@ -0,0 +1,10 @@
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78=
github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc=
github.com/gorilla/websocket v1.5.3 h1:saDtZ6Pbx/0u+bgYQ3q96pZgCzfhKXGPqt7kZ72aNNg=
github.com/gorilla/websocket v1.5.3/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
github.com/redis/go-redis/v9 v9.18.0 h1:pMkxYPkEbMPwRdenAzUNyFNrDgHx9U+DrBabWNfSRQs=
github.com/redis/go-redis/v9 v9.18.0/go.mod h1:k3ufPphLU5YXwNTUcCRXGxUoF1fqxnhFQmscfkCoDA0=
go.uber.org/atomic v1.11.0 h1:ZvwS0R+56ePWxUNi+Atn9dWONBPp/AUETXlHW0DxSjE=
go.uber.org/atomic v1.11.0/go.mod h1:LUxbIzbOniOlMKjJjyPfpl4v+PKK2cNJn91OQbhoJI0=

239
hub.go Normal file
View file

@ -0,0 +1,239 @@
package main
import (
"encoding/json"
"log"
"net/http"
"sync"
"time"
"github.com/gorilla/websocket"
)
// --- Message types ---
//
// Server -> client:
// {"type": "user:connected", "username": "nak"}
// {"type": "user:disconnected", "username": "nak"}
// {"type": "ping"}
//
// Client -> server:
// {"type": "pong"}
// {"type": "recall", "username": "nak"} (domain script relays to all clients)
//
// Any connected client can send a message; the hub broadcasts it to all others.
// This keeps the server simple and lets the domain script act as a relay for
// Overte-side events without needing separate channels for each use case.
type Message struct {
Type string `json:"type"`
Username string `json:"username,omitempty"`
Payload string `json:"payload,omitempty"`
}
// --- Hub ---
type Hub struct {
mu sync.RWMutex
clients map[*Client]bool
}
func newHub() *Hub {
return &Hub{clients: make(map[*Client]bool)}
}
func (h *Hub) register(c *Client) {
h.mu.Lock()
h.clients[c] = true
h.mu.Unlock()
log.Printf("[WS] client connected (total: %d)", h.count())
}
func (h *Hub) unregister(c *Client) {
h.mu.Lock()
delete(h.clients, c)
h.mu.Unlock()
log.Printf("[WS] client disconnected (total: %d)", h.count())
}
func (h *Hub) count() int {
h.mu.RLock()
defer h.mu.RUnlock()
return len(h.clients)
}
// Broadcast sends a message to all connected clients except the sender.
// Pass nil sender to broadcast to everyone.
func (h *Hub) Broadcast(msg Message, sender *Client) {
data, err := json.Marshal(msg)
if err != nil {
return
}
h.mu.RLock()
defer h.mu.RUnlock()
for c := range h.clients {
if c == sender {
continue
}
select {
case c.send <- data:
default:
// slow client — drop the message rather than block
log.Printf("[WS] dropped message to slow client")
}
}
}
// --- Client ---
type Client struct {
hub *Hub
conn *websocket.Conn
send chan []byte
}
const (
writeWait = 10 * time.Second
pongWait = 60 * time.Second
pingPeriod = 45 * time.Second
maxMessageSize = 4096
)
func (c *Client) readPump() {
defer func() {
c.hub.unregister(c)
c.conn.Close()
}()
c.conn.SetReadLimit(maxMessageSize)
c.conn.SetReadDeadline(time.Now().Add(pongWait))
c.conn.SetPongHandler(func(string) error {
c.conn.SetReadDeadline(time.Now().Add(pongWait))
return nil
})
for {
_, data, err := c.conn.ReadMessage()
if err != nil {
if websocket.IsUnexpectedCloseError(err,
websocket.CloseGoingAway, websocket.CloseAbnormalClosure) {
log.Printf("[WS] read error: %v", err)
}
break
}
var msg Message
if err := json.Unmarshal(data, &msg); err != nil {
log.Printf("[WS] bad message: %s", data)
continue
}
// Relay to all other clients — domain script and entity scripts
// all share the same hub, so a recall from the tablet entity script
// arrives at the domain script automatically.
if msg.Type != "pong" {
c.hub.Broadcast(msg, c)
}
}
}
func (c *Client) writePump() {
ticker := time.NewTicker(pingPeriod)
defer func() {
ticker.Stop()
c.conn.Close()
}()
for {
select {
case data, ok := <-c.send:
c.conn.SetWriteDeadline(time.Now().Add(writeWait))
if !ok {
c.conn.WriteMessage(websocket.CloseMessage, []byte{})
return
}
if err := c.conn.WriteMessage(websocket.TextMessage, data); err != nil {
return
}
case <-ticker.C:
c.conn.SetWriteDeadline(time.Now().Add(writeWait))
if err := c.conn.WriteMessage(websocket.PingMessage, nil); err != nil {
return
}
}
}
}
// --- Upgrader & handler ---
var upgrader = websocket.Upgrader{
ReadBufferSize: 1024,
WriteBufferSize: 1024,
// Allow all origins — Overte scripts connect from localhost-ish contexts
CheckOrigin: func(r *http.Request) bool { return true },
}
var hub = newHub()
func handleWS(w http.ResponseWriter, r *http.Request) {
log.Printf("[WS] new connection from %s (total after: %d)", r.RemoteAddr, hub.count()+1)
conn, err := upgrader.Upgrade(w, r, nil)
if err != nil {
log.Println("[WS] upgrade error:", err)
return
}
client := &Client{
hub: hub,
conn: conn,
send: make(chan []byte, 64),
}
hub.register(client)
go client.writePump()
client.readPump() // blocks until disconnect
}
// --- Presence loop ---
//
// Replaces the domain script's polling. The server watches nodes.json,
// detects connects/disconnects, pushes events to all WS clients, and
// continues to tick balances. Single source of truth for who is online.
func presenceLoop() {
ticker := time.NewTicker(2 * time.Second)
defer ticker.Stop()
prev := map[string]bool{}
for range ticker.C {
users, err := getConnectedUsers()
if err != nil {
log.Println("[presence] error fetching nodes:", err)
continue
}
curr := map[string]bool{}
for _, u := range users {
curr[u] = true
}
// Detect joins
for u := range curr {
if !prev[u] {
log.Printf("[presence] connected: %s", u)
hub.Broadcast(Message{Type: "user:connected", Username: u}, nil)
}
}
// Detect leaves
for u := range prev {
if !curr[u] {
log.Printf("[presence] disconnected: %s", u)
hub.Broadcast(Message{Type: "user:disconnected", Username: u}, nil)
}
}
// Tick balances for connected users
for u := range curr {
if _, err := rdb.HIncrByFloat(ctx, "balances", u, 1.0).Result(); err != nil {
log.Printf("[presence] tick error for %s: %v", u, err)
}
}
prev = curr
}
}

425
main.go Normal file
View file

@ -0,0 +1,425 @@
package main
import (
"context"
"crypto/hmac"
"crypto/rand"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"errors"
"io"
"log"
"net/http"
"os"
"strconv"
"strings"
"time"
"github.com/redis/go-redis/v9"
)
var rdb *redis.Client
var ctx = context.Background()
var domainAdminUser string
var domainAdminPass string
var hmacSecret []byte
// Shape definitions: name -> face count -> price (100 * faces)
var shapes = map[string]int{
"tetrahedron": 4,
"hexahedron": 6,
"octahedron": 8,
"dodecahedron": 12,
"icosahedron": 20,
}
func shapePrice(name string) (int64, bool) {
faces, ok := shapes[name]
if !ok {
return 0, false
}
return int64(faces * 100), true
}
type Node struct {
Type string `json:"type"`
Username string `json:"username"`
}
type NodesResponse struct {
Nodes []Node `json:"nodes"`
}
// --- Main ---
func main() {
domainAdminUser = os.Getenv("DOMAIN_ADMIN_USER")
domainAdminPass = os.Getenv("DOMAIN_ADMIN_PASS")
if domainAdminUser == "" || domainAdminPass == "" {
log.Fatal("DOMAIN_ADMIN_USER and DOMAIN_ADMIN_PASS environment variables must be set")
}
// Load or generate HMAC secret
secret := os.Getenv("HMAC_SECRET")
if secret == "" {
log.Println("HMAC_SECRET not set, generating ephemeral secret (tokens won't survive restarts)")
buf := make([]byte, 32)
if _, err := rand.Read(buf); err != nil {
log.Fatal("Failed to generate HMAC secret:", err)
}
hmacSecret = buf
} else {
hmacSecret = []byte(secret)
}
rdb = redis.NewClient(&redis.Options{
Addr: "localhost:6379",
})
if _, err := rdb.Ping(ctx).Result(); err != nil {
log.Fatal("Could not connect to Redis: ", err)
}
log.Println("Connected to Redis")
go presenceLoop()
http.HandleFunc("/ws", handleWS)
http.HandleFunc("/api/balance/", handleBalance)
http.HandleFunc("/api/session", handleSession)
http.HandleFunc("/api/inventory/", handleInventory)
http.HandleFunc("/api/purchase", handlePurchase)
http.HandleFunc("/api/connected", handleConnected)
http.HandleFunc("/api/recall", handleRecall)
log.Println("Listening on :8080")
log.Fatal(http.ListenAndServe(":8080", nil))
}
// --- Domain helpers ---
func getConnectedUsers() ([]string, error) {
req, err := http.NewRequest("GET", "http://localhost:40100/nodes.json", nil)
if err != nil {
return nil, err
}
req.SetBasicAuth(domainAdminUser, domainAdminPass)
req.Header.Set("X-Requested-With", "XMLHttpRequest")
client := &http.Client{Timeout: 5 * time.Second}
resp, err := client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
body, err := io.ReadAll(resp.Body)
if err != nil {
return nil, err
}
var nodesResp NodesResponse
if err := json.Unmarshal(body, &nodesResp); err != nil {
return nil, err
}
var users []string
for _, node := range nodesResp.Nodes {
if node.Type == "agent" && node.Username != "" {
users = append(users, node.Username)
}
}
return users, nil
}
func isUserConnected(username string) (bool, error) {
users, err := getConnectedUsers()
if err != nil {
return false, err
}
for _, u := range users {
if u == username {
return true, nil
}
}
return false, nil
}
// --- Token helpers ---
// makeToken returns a hex HMAC-SHA256 of "username:timestamp" using hmacSecret.
func makeToken(username string, ts int64) string {
msg := []byte(username + ":" + strconv.FormatInt(ts, 10))
mac := hmac.New(sha256.New, hmacSecret)
mac.Write(msg)
return hex.EncodeToString(mac.Sum(nil))
}
func itoa(n int64) string {
return strconv.FormatInt(n, 10)
}
// sessionKey returns the Redis key for a user's session token.
func sessionKey(username string) string {
return "session:" + username
}
const sessionTTL = 6 * time.Minute // token valid for 6 min; client refreshes every 5
// issueToken creates a new signed token, stores it in Redis, and returns it.
func issueToken(username string) (string, error) {
ts := time.Now().Unix()
token := makeToken(username, ts)
// Store as "token:timestamp" so we can re-verify the HMAC on use
val := token + ":" + itoa(ts)
if err := rdb.Set(ctx, sessionKey(username), val, sessionTTL).Err(); err != nil {
return "", err
}
return token, nil
}
// validateToken checks the Authorization header against the stored token.
// Returns the username on success or an error.
func validateToken(r *http.Request) (string, error) {
auth := r.Header.Get("Authorization")
if !strings.HasPrefix(auth, "Bearer ") {
return "", errors.New("missing bearer token")
}
provided := strings.TrimPrefix(auth, "Bearer ")
// Token format in header: "username:hextoken"
parts := strings.SplitN(provided, ":", 2)
if len(parts) != 2 {
return "", errors.New("malformed token")
}
username, hexToken := parts[0], parts[1]
stored, err := rdb.Get(ctx, sessionKey(username)).Result()
if err == redis.Nil {
return "", errors.New("no active session")
} else if err != nil {
return "", err
}
// stored format: "hmac:timestamp"
storedParts := strings.SplitN(stored, ":", 2)
if len(storedParts) != 2 {
return "", errors.New("corrupt session data")
}
if !hmac.Equal([]byte(hexToken), []byte(storedParts[0])) {
return "", errors.New("invalid token")
}
// Refresh TTL on valid use
rdb.Expire(ctx, sessionKey(username), sessionTTL)
return username, nil
}
// --- HTTP handlers ---
// GET /api/balance/:username
func handleBalance(w http.ResponseWriter, r *http.Request) {
username := r.URL.Path[len("/api/balance/"):]
if username == "" {
http.Error(w, "missing username", http.StatusBadRequest)
return
}
balance, err := rdb.HGet(ctx, "balances", username).Float64()
if err == redis.Nil {
balance = 0
} else if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"username": username,
"balance": int64(balance),
})
}
// POST /api/session
// Body: {"username": "..."}
// Verifies user is in nodes.json, issues a signed session token.
func handleSession(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
var body struct {
Username string `json:"username"`
}
if err := json.NewDecoder(r.Body).Decode(&body); err != nil || body.Username == "" {
http.Error(w, "invalid body", http.StatusBadRequest)
return
}
connected, err := isUserConnected(body.Username)
if err != nil {
log.Printf("Session check error for %s: %v", body.Username, err)
http.Error(w, "could not verify connection", http.StatusServiceUnavailable)
return
}
if !connected {
http.Error(w, "user not connected to domain", http.StatusForbidden)
return
}
token, err := issueToken(body.Username)
if err != nil {
http.Error(w, "could not create session", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]string{
// Return as "username:token" so client has one opaque string to store
"token": body.Username + ":" + token,
})
}
// GET /api/inventory/:username
func handleInventory(w http.ResponseWriter, r *http.Request) {
username := r.URL.Path[len("/api/inventory/"):]
if username == "" {
http.Error(w, "missing username", http.StatusBadRequest)
return
}
raw, err := rdb.HGetAll(ctx, "inventory:"+username).Result()
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
inventory := make(map[string]int64)
for shape := range shapes {
inventory[shape] = 0
}
for k, v := range raw {
n, parseErr := strconv.ParseInt(v, 10, 64)
if parseErr == nil {
inventory[k] = n
}
}
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"username": username,
"inventory": inventory,
})
}
// POST /api/purchase
// Header: Authorization: Bearer username:token
// Body: {"shape": "tetrahedron"}
// Atomically deducts verts and increments inventory count.
func handlePurchase(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
username, err := validateToken(r)
if err != nil {
http.Error(w, "unauthorized: "+err.Error(), http.StatusUnauthorized)
return
}
var body struct {
Shape string `json:"shape"`
}
if err := json.NewDecoder(r.Body).Decode(&body); err != nil || body.Shape == "" {
http.Error(w, "invalid body", http.StatusBadRequest)
return
}
price, ok := shapePrice(body.Shape)
if !ok {
http.Error(w, "unknown shape", http.StatusBadRequest)
return
}
// Atomic purchase: WATCH balances hash, check sufficient funds, deduct, increment inventory
balanceKey := "balances"
inventoryKey := "inventory:" + username
txErr := rdb.Watch(ctx, func(tx *redis.Tx) error {
balance, err := tx.HGet(ctx, balanceKey, username).Float64()
if err == redis.Nil {
balance = 0
} else if err != nil {
return err
}
if int64(balance) < price {
return errors.New("insufficient balance")
}
_, err = tx.TxPipelined(ctx, func(pipe redis.Pipeliner) error {
pipe.HIncrByFloat(ctx, balanceKey, username, float64(-price))
pipe.HIncrBy(ctx, inventoryKey, body.Shape, 1)
return nil
})
return err
}, balanceKey)
if txErr != nil {
if txErr.Error() == "insufficient balance" {
http.Error(w, "insufficient balance", http.StatusPaymentRequired)
return
}
log.Printf("Purchase tx error for %s/%s: %v", username, body.Shape, txErr)
http.Error(w, "transaction failed", http.StatusInternalServerError)
return
}
// Read back new state
newBalance, _ := rdb.HGet(ctx, balanceKey, username).Float64()
newCount, _ := rdb.HGet(ctx, inventoryKey, body.Shape).Int64()
log.Printf("Purchase: %s bought %s for %d verts (balance now %.0f)", username, body.Shape, price, newBalance)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"ok": true,
"shape": body.Shape,
"price": price,
"balance": int64(newBalance),
"owned": newCount,
})
}
// GET /api/connected
// Returns the list of currently connected usernames. Public endpoint — no auth required.
func handleConnected(w http.ResponseWriter, r *http.Request) {
users, err := getConnectedUsers()
if err != nil {
log.Println("Error fetching connected users:", err)
http.Error(w, "could not fetch connected users", http.StatusServiceUnavailable)
return
}
if users == nil {
users = []string{}
}
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"users": users,
})
}
// POST /api/recall
// Header: Authorization: Bearer username:token
// Publishes a recall message into the WS hub so the domain script
// deletes the user's clones immediately.
func handleRecall(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodPost {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
username, err := validateToken(r)
if err != nil {
http.Error(w, "unauthorized: "+err.Error(), http.StatusUnauthorized)
return
}
hub.Broadcast(Message{Type: "recall", Username: username}, nil)
log.Printf("Recall broadcast for %s", username)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]bool{"ok": true})
}