cryptpad/lib/rpc.js

1683 lines
55 KiB
JavaScript
Raw Normal View History

2017-04-25 22:04:17 +08:00
/*@flow*/
/*jshint esversion: 6 */
2017-03-28 00:15:15 +08:00
/* Use Nacl for checking signatures of messages */
var Nacl = require("tweetnacl/nacl-fast");
2017-05-04 17:46:11 +08:00
/* globals Buffer*/
/* globals process */
var Fs = require("fs");
2018-07-19 16:33:01 +08:00
var Fse = require("fs-extra");
2017-05-04 17:36:56 +08:00
var Path = require("path");
2017-05-11 22:12:44 +08:00
var Https = require("https");
const Package = require('../package.json');
const Pinned = require('../scripts/pinned');
2018-01-29 19:40:09 +08:00
const Saferphore = require("saferphore");
const nThen = require("nthen");
const Pins = require("./pins");
const Meta = require("./metadata");
const WriteQueue = require("./write-queue");
const BatchRead = require("./batch-read");
2019-03-29 20:45:54 +08:00
const Util = require("./common-util");
const escapeKeyCharacters = Util.escapeKeyCharacters;
const unescapeKeyCharacters = Util.unescapeKeyCharacters;
const mkEvent = Util.mkEvent;
const Admin = require("./commands/admin-rpc");
var RPC = module.exports;
var Store = require("../storage/file");
var BlobStore = require("../storage/blob");
2017-05-11 22:12:44 +08:00
2017-05-22 17:16:01 +08:00
var DEFAULT_LIMIT = 50 * 1024 * 1024;
var SESSION_EXPIRATION_TIME = 60 * 1000;
2019-04-09 00:11:36 +08:00
var Log;
var WARN = function (e, output) {
if (e && output) {
Log.warn(e, {
output: output,
message: String(e),
stack: new Error(e).stack,
});
}
};
var isValidId = function (chan) {
return chan && chan.length && /^[a-zA-Z0-9=+-]*$/.test(chan) &&
[32, 48].indexOf(chan.length) > -1;
2017-03-15 22:55:25 +08:00
};
var makeToken = function () {
return Number(Math.floor(Math.random() * Number.MAX_SAFE_INTEGER))
.toString(16);
};
var makeCookie = function (token) {
var time = (+new Date());
time -= time % 5000;
2017-03-28 00:15:15 +08:00
return [
time,
2017-05-04 17:46:11 +08:00
process.pid,
token
2017-04-04 01:24:57 +08:00
];
2017-03-28 00:15:15 +08:00
};
var parseCookie = function (cookie) {
if (!(cookie && cookie.split)) { return null; }
var parts = cookie.split('|');
if (parts.length !== 3) { return null; }
2017-03-28 00:15:15 +08:00
var c = {};
c.time = new Date(parts[0]);
2017-04-04 01:24:57 +08:00
c.pid = Number(parts[1]);
c.seq = parts[2];
2017-03-28 00:15:15 +08:00
return c;
};
2018-01-19 17:27:16 +08:00
var getSession = function (Sessions, key) {
var safeKey = escapeKeyCharacters(key);
if (Sessions[safeKey]) {
Sessions[safeKey].atime = +new Date();
return Sessions[safeKey];
2017-04-10 23:42:35 +08:00
}
var user = Sessions[safeKey] = {};
user.atime = +new Date();
2017-04-10 23:42:35 +08:00
user.tokens = [
makeToken()
];
return user;
};
var isTooOld = function (time, now) {
return (now - time) > 300000;
};
2017-04-04 01:24:57 +08:00
2017-07-05 22:00:54 +08:00
var expireSession = function (Sessions, key) {
var session = Sessions[key];
if (!session) { return; }
if (session.blobstage) {
session.blobstage.close();
}
delete Sessions[key];
};
2017-04-10 23:42:35 +08:00
var expireSessions = function (Sessions) {
var now = +new Date();
Object.keys(Sessions).forEach(function (key) {
2017-05-05 15:12:16 +08:00
var session = Sessions[key];
2017-07-05 22:00:54 +08:00
if (session && isTooOld(session.atime, now)) {
expireSession(Sessions, key);
2017-04-10 23:42:35 +08:00
}
});
};
var addTokenForKey = function (Sessions, publicKey, token) {
if (!Sessions[publicKey]) { throw new Error('undefined user'); }
2018-01-19 17:27:16 +08:00
var user = getSession(Sessions, publicKey);
2017-04-10 23:42:35 +08:00
user.tokens.push(token);
user.atime = +new Date();
if (user.tokens.length > 2) { user.tokens.shift(); }
};
var isValidCookie = function (Sessions, publicKey, cookie) {
var parsed = parseCookie(cookie);
if (!parsed) { return false; }
2017-04-04 01:24:57 +08:00
var now = +new Date();
if (!parsed.time) { return false; }
if (isTooOld(parsed.time, now)) {
2017-03-28 00:15:15 +08:00
return false;
}
// different process. try harder
2017-05-04 17:46:11 +08:00
if (process.pid !== parsed.pid) {
2017-03-28 00:15:15 +08:00
return false;
}
2018-01-19 17:27:16 +08:00
var user = getSession(Sessions, publicKey);
if (!user) { return false; }
var idx = user.tokens.indexOf(parsed.seq);
if (idx === -1) { return false; }
if (idx > 0) {
// make a new token
2017-04-10 23:42:35 +08:00
addTokenForKey(Sessions, publicKey, makeToken());
}
2017-03-28 00:15:15 +08:00
return true;
};
var checkSignature = function (signedMsg, signature, publicKey) {
if (!(signedMsg && publicKey)) { return false; }
2017-03-21 01:02:11 +08:00
var signedBuffer;
var pubBuffer;
2017-03-28 00:15:15 +08:00
var signatureBuffer;
try {
2017-03-28 00:15:15 +08:00
signedBuffer = Nacl.util.decodeUTF8(signedMsg);
} catch (e) {
2019-04-09 00:11:36 +08:00
Log.error('INVALID_SIGNED_BUFFER', signedMsg);
return null;
}
2017-03-28 00:15:15 +08:00
try {
pubBuffer = Nacl.util.decodeBase64(publicKey);
} catch (e) {
return false;
}
try {
signatureBuffer = Nacl.util.decodeBase64(signature);
} catch (e) {
return false;
}
if (pubBuffer.length !== 32) {
2019-04-09 00:11:36 +08:00
Log.error('PUBLIC_KEY_LENGTH', publicKey);
2017-03-28 00:15:15 +08:00
return false;
}
2017-03-28 00:15:15 +08:00
if (signatureBuffer.length !== 64) {
return false;
}
2017-03-28 00:15:15 +08:00
return Nacl.sign.detached.verify(signedBuffer, signatureBuffer, pubBuffer);
};
const batchUserPins = BatchRead("LOAD_USER_PINS");
2017-05-17 00:08:59 +08:00
var loadUserPins = function (Env, publicKey, cb) {
2018-01-19 17:27:16 +08:00
var session = getSession(Env.Sessions, publicKey);
2017-04-10 23:42:35 +08:00
if (session.channels) {
return cb(session.channels);
}
batchUserPins(publicKey, cb, function (done) {
var ref = {};
var lineHandler = Pins.createLineHandler(ref, function (label, data) {
Log.error(label, {
log: publicKey,
data: data,
});
});
// if channels aren't in memory. load them from disk
Env.pinStore.getMessages(publicKey, lineHandler, function () {
// no more messages
2017-04-04 01:24:57 +08:00
// only put this into the cache if it completes
session.channels = ref.pins;
done(ref.pins); // FIXME no error handling?
});
2017-04-10 23:42:35 +08:00
});
};
var truthyKeys = function (O) {
return Object.keys(O).filter(function (k) {
return O[k];
});
};
2019-12-05 00:15:45 +08:00
var getChannelList = function (Env, publicKey, _cb) {
var cb = Util.once(Util.mkAsync(_cb));
2017-05-17 00:08:59 +08:00
loadUserPins(Env, publicKey, function (pins) {
2017-04-10 23:42:35 +08:00
cb(truthyKeys(pins));
2017-04-04 01:24:57 +08:00
});
};
2019-12-05 00:15:45 +08:00
var getFileSize = function (Env, channel, _cb) {
var cb = Util.once(Util.mkAsync(_cb));
if (!isValidId(channel)) { return void cb('INVALID_CHAN'); }
if (channel.length === 32) {
if (typeof(Env.msgStore.getChannelSize) !== 'function') {
return cb('GET_CHANNEL_SIZE_UNSUPPORTED');
2017-05-10 21:36:14 +08:00
}
return void Env.msgStore.getChannelSize(channel, function (e, size /*:number*/) {
if (e) {
if (e.code === 'ENOENT') { return void cb(void 0, 0); }
return void cb(e.code);
}
cb(void 0, size);
2017-05-10 21:36:14 +08:00
});
}
// 'channel' refers to a file, so you need another API
Env.blobStore.size(channel, function (e, size) {
if (typeof(size) === 'undefined') { return void cb(e); }
cb(void 0, size);
2017-04-07 16:09:59 +08:00
});
};
const batchMetadata = BatchRead("GET_METADATA");
2018-03-20 22:09:31 +08:00
var getMetadata = function (Env, channel, cb) {
if (!isValidId(channel)) { return void cb('INVALID_CHAN'); }
if (channel.length !== 32) { return cb("INVALID_CHAN_LENGTH"); }
batchMetadata(channel, cb, function (done) {
var ref = {};
var lineHandler = Meta.createLineHandler(ref, Log.error);
return void Env.msgStore.readChannelMetadata(channel, lineHandler, function (err) {
if (err) {
// stream errors?
return void done(err);
}
done(void 0, ref.meta);
});
});
2018-03-20 22:09:31 +08:00
};
// E_NO_OWNERS
var hasOwners = function (metadata) {
return Boolean(metadata && Array.isArray(metadata.owners));
};
var hasPendingOwners = function (metadata) {
return Boolean(metadata && Array.isArray(metadata.pending_owners));
};
// INSUFFICIENT_PERMISSIONS
var isOwner = function (metadata, unsafeKey) {
return metadata.owners.indexOf(unsafeKey) !== -1;
};
var isPendingOwner = function (metadata, unsafeKey) {
return metadata.pending_owners.indexOf(unsafeKey) !== -1;
};
2019-08-28 18:40:35 +08:00
/* setMetadata
- write a new line to the metadata log if a valid command is provided
- data is an object: {
channel: channelId,
command: metadataCommand (string),
value: value
}
*/
var queueMetadata = WriteQueue();
2019-08-28 18:40:35 +08:00
var setMetadata = function (Env, data, unsafeKey, cb) {
var channel = data.channel;
var command = data.command;
if (!channel || !isValidId(channel)) { return void cb ('INVALID_CHAN'); }
if (!command || typeof (command) !== 'string') { return void cb ('INVALID_COMMAND'); }
if (Meta.commands.indexOf(command) === -1) { return void('UNSUPPORTED_COMMAND'); }
queueMetadata(channel, function (next) {
getMetadata(Env, channel, function (err, metadata) {
if (err) {
cb(err);
return void next();
}
if (!hasOwners(metadata)) {
cb('E_NO_OWNERS');
return void next();
}
2019-08-28 18:40:35 +08:00
// if you are a pending owner and not an owner
// you can either ADD_OWNERS, or RM_PENDING_OWNERS
// and you should only be able to add yourself as an owner
// everything else should be rejected
// else if you are not an owner
// you should be rejected
// else write the command
// Confirm that the channel is owned by the user in question
// or the user is accepting a pending ownership offer
if (hasPendingOwners(metadata) &&
isPendingOwner(metadata, unsafeKey) &&
!isOwner(metadata, unsafeKey)) {
// If you are a pending owner, make sure you can only add yourelf as an owner
2019-08-30 23:36:27 +08:00
if ((command !== 'ADD_OWNERS' && command !== 'RM_PENDING_OWNERS')
|| !Array.isArray(data.value)
|| data.value.length !== 1
|| data.value[0] !== unsafeKey) {
cb('INSUFFICIENT_PERMISSIONS');
return void next();
}
// FIXME wacky fallthrough is hard to read
// we could pass this off to a writeMetadataCommand function
// and make the flow easier to follow
} else if (!isOwner(metadata, unsafeKey)) {
cb('INSUFFICIENT_PERMISSIONS');
return void next();
}
2019-08-28 18:40:35 +08:00
// Add the new metadata line
var line = [command, data.value, +new Date()];
var changed = false;
try {
changed = Meta.handleCommand(metadata, line);
} catch (e) {
cb(e);
return void next();
2019-08-28 18:40:35 +08:00
}
// if your command is valid but it didn't result in any change to the metadata,
// call back now and don't write any "useless" line to the log
if (!changed) {
cb(void 0, metadata);
return void next();
}
Env.msgStore.writeMetadata(channel, JSON.stringify(line), function (e) {
if (e) {
cb(e);
return void next();
}
2019-08-28 18:40:35 +08:00
cb(void 0, metadata);
next();
2019-08-28 18:40:35 +08:00
});
});
});
};
2017-05-17 00:08:59 +08:00
var getMultipleFileSize = function (Env, channels, cb) {
if (!Array.isArray(channels)) { return cb('INVALID_PIN_LIST'); }
if (typeof(Env.msgStore.getChannelSize) !== 'function') {
2017-04-21 20:51:00 +08:00
return cb('GET_CHANNEL_SIZE_UNSUPPORTED');
}
var i = channels.length;
var counts = {};
var done = function () {
i--;
if (i === 0) { return cb(void 0, counts); }
};
channels.forEach(function (channel) {
2017-05-17 00:08:59 +08:00
getFileSize(Env, channel, function (e, size) {
2017-04-21 20:51:00 +08:00
if (e) {
2017-06-13 17:47:22 +08:00
// most likely error here is that a file no longer exists
// but a user still has it in their drive, and wants to know
// its size. We should find a way to inform them of this in
// the future. For now we can just tell them it has no size.
//WARN('getFileSize', e);
counts[channel] = 0;
2017-04-21 20:51:00 +08:00
return done();
}
counts[channel] = size;
done();
});
});
};
2018-01-29 19:40:09 +08:00
/* accepts a list, and returns a sublist of channel or file ids which seem
to have been deleted from the server (file size 0)
we might consider that we should only say a file is gone if fs.stat returns
ENOENT, but for now it's simplest to just rely on getFileSize...
*/
var getDeletedPads = function (Env, channels, cb) {
if (!Array.isArray(channels)) { return cb('INVALID_LIST'); }
var L = channels.length;
var sem = Saferphore.create(10);
var absentees = [];
2018-01-29 21:26:24 +08:00
var job = function (channel, wait) {
return function (give) {
getFileSize(Env, channel, wait(give(function (e, size) {
if (e) { return; }
if (size === 0) { absentees.push(channel); }
})));
};
};
2018-01-29 19:40:09 +08:00
nThen(function (w) {
for (var i = 0; i < L; i++) {
2018-01-29 21:26:24 +08:00
sem.take(job(channels[i], w));
2018-01-29 19:40:09 +08:00
}
}).nThen(function () {
cb(void 0, absentees);
});
};
const batchTotalSize = BatchRead("GET_TOTAL_SIZE");
2017-05-17 00:08:59 +08:00
var getTotalSize = function (Env, publicKey, cb) {
2019-12-04 20:37:46 +08:00
var unescapedKey = unescapeKeyCharacters(publicKey);
var limit = Env.limits[unescapedKey];
// Get a common key if multiple users share the same quota, otherwise take the public key
var batchKey = (limit && Array.isArray(limit.users)) ? limit.users.join('') : publicKey;
batchTotalSize(batchKey, cb, function (done) {
2019-12-04 20:37:46 +08:00
var channels = [];
var bytes = 0;
2019-12-04 20:37:46 +08:00
nThen(function (waitFor) {
// Get the channels list for our user account
2019-12-04 20:37:46 +08:00
getChannelList(Env, publicKey, waitFor(function (_channels) {
if (!_channels) {
waitFor.abort();
return done('INVALID_PIN_LIST');
}
2019-12-04 20:37:46 +08:00
Array.prototype.push.apply(channels, _channels);
}));
// Get the channels list for users sharing our quota
if (limit && Array.isArray(limit.users) && limit.users.length > 1) {
limit.users.forEach(function (key) {
if (key === unescapedKey) { return; } // Don't count ourselves twice
getChannelList(Env, key, waitFor(function (_channels) {
if (!_channels) { return; } // Broken user, don't count their quota
Array.prototype.push.apply(channels, _channels);
}));
});
2019-12-04 20:37:46 +08:00
}
}).nThen(function (waitFor) {
// Get size of the channels
var list = []; // Contains the channels already counted in the quota to avoid duplicates
2019-12-04 20:37:46 +08:00
channels.forEach(function (channel) { // TODO semaphore?
if (list.indexOf(channel) !== -1) { return; }
list.push(channel);
getFileSize(Env, channel, waitFor(function (e, size) {
if (!e) { bytes += size; }
}));
2017-04-07 16:09:59 +08:00
});
2019-12-04 20:37:46 +08:00
}).nThen(function () {
done(void 0, bytes);
2017-04-07 16:09:59 +08:00
});
});
};
2017-04-04 01:24:57 +08:00
var hashChannelList = function (A) {
var uniques = [];
A.forEach(function (a) {
if (uniques.indexOf(a) === -1) { uniques.push(a); }
});
uniques.sort();
var hash = Nacl.util.encodeBase64(Nacl.hash(Nacl
.util.decodeUTF8(JSON.stringify(uniques))));
return hash;
};
2017-05-17 00:08:59 +08:00
var getHash = function (Env, publicKey, cb) {
getChannelList(Env, publicKey, function (channels) {
2017-04-07 16:30:40 +08:00
cb(void 0, hashChannelList(channels));
});
};
var applyCustomLimits = function (Env, config) {
var isLimit = function (o) {
var valid = o && typeof(o) === 'object' &&
typeof(o.limit) === 'number' &&
typeof(o.plan) === 'string' &&
typeof(o.note) === 'string';
return valid;
};
// read custom limits from the config
var customLimits = (function (custom) {
var limits = {};
Object.keys(custom).forEach(function (k) {
k.replace(/\/([^\/]+)$/, function (all, safeKey) {
var id = unescapeKeyCharacters(safeKey || '');
limits[id] = custom[k];
return '';
});
});
return limits;
}(config.customLimits || {}));
Object.keys(customLimits).forEach(function (k) {
if (!isLimit(customLimits[k])) { return; }
Env.limits[k] = customLimits[k];
});
};
// The limits object contains storage limits for all the publicKey that have paid
// To each key is associated an object containing the 'limit' value and a 'note' explaining that limit
2019-09-05 21:48:13 +08:00
var updateLimits = function (Env, config, publicKey, cb /*:(?string, ?any[])=>void*/) { // FIXME BATCH?
if (config.adminEmail === false) {
applyCustomLimits(Env, config);
if (config.allowSubscriptions === false) { return; }
throw new Error("allowSubscriptions must be false if adminEmail is false");
}
if (typeof cb !== "function") { cb = function () {}; }
var defaultLimit = typeof(config.defaultStorageLimit) === 'number'?
config.defaultStorageLimit: DEFAULT_LIMIT;
2017-05-23 17:46:59 +08:00
var userId;
if (publicKey) {
userId = unescapeKeyCharacters(publicKey);
}
var body = JSON.stringify({
domain: config.myDomain,
subdomain: config.mySubdomain || null,
adminEmail: config.adminEmail,
version: Package.version
});
var options = {
host: 'accounts.cryptpad.fr',
path: '/api/getauthorized',
method: 'POST',
headers: {
"Content-Type": "application/json",
"Content-Length": Buffer.byteLength(body)
}
};
var req = Https.request(options, function (response) {
if (!('' + response.statusCode).match(/^2\d\d$/)) {
return void cb('SERVER ERROR ' + response.statusCode);
}
var str = '';
2017-05-16 23:07:53 +08:00
response.on('data', function (chunk) {
str += chunk;
});
response.on('end', function () {
try {
var json = JSON.parse(str);
Env.limits = json;
applyCustomLimits(Env, config);
var l;
2017-05-23 17:46:59 +08:00
if (userId) {
var limit = Env.limits[userId];
l = limit && typeof limit.limit === "number" ?
2017-05-22 21:56:24 +08:00
[limit.limit, limit.plan, limit.note] : [defaultLimit, '', ''];
}
cb(void 0, l);
} catch (e) {
cb(e);
}
});
});
req.on('error', function (e) {
applyCustomLimits(Env, config);
if (!config.domain) { return cb(); }
cb(e);
});
req.end(body);
};
// XXX it's possible for this to respond before the server has had a chance
// to fetch the limits. Maybe we should respond with an error...
// or wait until we actually know the limits before responding
var getLimit = function (Env, publicKey, cb) {
var unescapedKey = unescapeKeyCharacters(publicKey);
var limit = Env.limits[unescapedKey];
var defaultLimit = typeof(Env.defaultStorageLimit) === 'number'?
Env.defaultStorageLimit: DEFAULT_LIMIT;
var toSend = limit && typeof(limit.limit) === "number"?
2017-05-22 21:56:24 +08:00
[limit.limit, limit.plan, limit.note] : [defaultLimit, '', ''];
cb(void 0, toSend);
};
var getFreeSpace = function (Env, publicKey, cb) {
getLimit(Env, publicKey, function (e, limit) {
if (e) { return void cb(e); }
getTotalSize(Env, publicKey, function (e, size) {
if (typeof(size) === 'undefined') { return void cb(e); }
var rem = limit[0] - size;
if (typeof(rem) !== 'number') {
return void cb('invalid_response');
}
cb(void 0, rem);
});
});
};
var sumChannelSizes = function (sizes) {
return Object.keys(sizes).map(function (id) { return sizes[id]; })
.filter(function (x) {
// only allow positive numbers
return !(typeof(x) !== 'number' || x <= 0);
})
2017-05-19 15:11:28 +08:00
.reduce(function (a, b) { return a + b; }, 0);
};
// inform that the
var loadChannelPins = function (Env) {
Pinned.load(function (err, data) {
if (err) {
Log.error("LOAD_CHANNEL_PINS", err);
// FIXME not sure what should be done here instead
Env.pinnedPads = {};
Env.evPinnedPadsReady.fire();
return;
}
Env.pinnedPads = data;
Env.evPinnedPadsReady.fire();
}, {
pinPath: Env.paths.pin,
});
};
var addPinned = function (
Env,
publicKey /*:string*/,
channelList /*Array<string>*/,
cb /*:()=>void*/)
{
Env.evPinnedPadsReady.reg(() => {
channelList.forEach((c) => {
const x = Env.pinnedPads[c] = Env.pinnedPads[c] || {};
x[publicKey] = 1;
});
cb();
});
};
var removePinned = function (
Env,
publicKey /*:string*/,
channelList /*Array<string>*/,
cb /*:()=>void*/)
{
Env.evPinnedPadsReady.reg(() => {
channelList.forEach((c) => {
const x = Env.pinnedPads[c];
if (!x) { return; }
delete x[publicKey];
});
cb();
});
};
var isChannelPinned = function (Env, channel, cb) {
Env.evPinnedPadsReady.reg(() => {
if (Env.pinnedPads[channel] && Object.keys(Env.pinnedPads[channel]).length) {
cb(true);
} else {
delete Env.pinnedPads[channel];
cb(false);
}
});
};
var pinChannel = function (Env, publicKey, channels, cb) {
2017-04-10 23:42:35 +08:00
if (!channels && channels.filter) {
return void cb('INVALID_PIN_LIST');
2017-04-10 23:42:35 +08:00
}
2017-04-07 16:30:40 +08:00
// get channel list ensures your session has a cached channel list
2017-05-17 00:08:59 +08:00
getChannelList(Env, publicKey, function (pinned) {
2018-01-19 17:27:16 +08:00
var session = getSession(Env.Sessions, publicKey);
2017-04-10 23:42:35 +08:00
// only pin channels which are not already pinned
var toStore = channels.filter(function (channel) {
return pinned.indexOf(channel) === -1;
});
if (toStore.length === 0) {
2017-05-17 00:08:59 +08:00
return void getHash(Env, publicKey, cb);
2017-04-10 23:42:35 +08:00
}
getMultipleFileSize(Env, toStore, function (e, sizes) {
if (typeof(sizes) === 'undefined') { return void cb(e); }
var pinSize = sumChannelSizes(sizes);
getFreeSpace(Env, publicKey, function (e, free) {
if (typeof(free) === 'undefined') {
WARN('getFreeSpace', e);
return void cb(e);
}
if (pinSize > free) { return void cb('E_OVER_LIMIT'); }
Env.pinStore.message(publicKey, JSON.stringify(['PIN', toStore, +new Date()]),
function (e) {
if (e) { return void cb(e); }
toStore.forEach(function (channel) {
session.channels[channel] = true;
});
addPinned(Env, publicKey, toStore, () => {});
getHash(Env, publicKey, cb);
});
2017-04-10 23:42:35 +08:00
});
2017-04-07 16:30:40 +08:00
});
2017-04-04 01:24:57 +08:00
});
};
2017-05-17 00:08:59 +08:00
var unpinChannel = function (Env, publicKey, channels, cb) {
2017-04-10 23:42:35 +08:00
if (!channels && channels.filter) {
// expected array
return void cb('INVALID_PIN_LIST');
2017-04-10 23:42:35 +08:00
}
2017-04-07 16:30:40 +08:00
2017-05-17 00:08:59 +08:00
getChannelList(Env, publicKey, function (pinned) {
2018-01-19 17:27:16 +08:00
var session = getSession(Env.Sessions, publicKey);
2017-04-10 23:42:35 +08:00
// only unpin channels which are pinned
var toStore = channels.filter(function (channel) {
return pinned.indexOf(channel) !== -1;
});
if (toStore.length === 0) {
2017-05-17 00:08:59 +08:00
return void getHash(Env, publicKey, cb);
2017-04-10 23:42:35 +08:00
}
Env.pinStore.message(publicKey, JSON.stringify(['UNPIN', toStore, +new Date()]),
2017-04-10 23:42:35 +08:00
function (e) {
if (e) { return void cb(e); }
toStore.forEach(function (channel) {
2017-05-10 21:36:14 +08:00
delete session.channels[channel];
2017-04-10 23:42:35 +08:00
});
removePinned(Env, publicKey, toStore, () => {});
2017-05-17 00:08:59 +08:00
getHash(Env, publicKey, cb);
2017-04-07 16:30:40 +08:00
});
});
};
2017-05-17 00:08:59 +08:00
var resetUserPins = function (Env, publicKey, channelList, cb) {
if (!Array.isArray(channelList)) { return void cb('INVALID_PIN_LIST'); }
2018-01-19 17:27:16 +08:00
var session = getSession(Env.Sessions, publicKey);
2017-04-10 23:42:35 +08:00
if (!channelList.length) {
return void getHash(Env, publicKey, function (e, hash) {
if (e) { return cb(e); }
cb(void 0, hash);
});
}
var pins = {};
getMultipleFileSize(Env, channelList, function (e, sizes) {
if (typeof(sizes) === 'undefined') { return void cb(e); }
var pinSize = sumChannelSizes(sizes);
2017-07-04 23:02:29 +08:00
getLimit(Env, publicKey, function (e, limit) {
if (e) {
2017-07-04 23:02:29 +08:00
WARN('[RESET_ERR]', e);
return void cb(e);
}
/* we want to let people pin, even if they are over their limit,
but they should only be able to do this once.
This prevents data loss in the case that someone registers, but
does not have enough free space to pin their migrated data.
They will not be able to pin additional pads until they upgrade
or delete enough files to go back under their limit. */
if (pinSize > limit[0] && session.hasPinned) { return void(cb('E_OVER_LIMIT')); }
Env.pinStore.message(publicKey, JSON.stringify(['RESET', channelList, +new Date()]),
function (e) {
if (e) { return void cb(e); }
channelList.forEach(function (channel) {
pins[channel] = true;
});
2017-04-07 17:37:19 +08:00
2019-09-13 00:06:54 +08:00
var oldChannels;
if (session.channels && typeof(session.channels) === 'object') {
oldChannels = Object.keys(session.channels);
} else {
oldChannels = [];
}
removePinned(Env, publicKey, oldChannels, () => {
addPinned(Env, publicKey, channelList, ()=>{});
});
// update in-memory cache IFF the reset was allowed.
session.channels = pins;
getHash(Env, publicKey, function (e, hash) {
cb(e, hash);
});
});
2017-04-07 17:37:19 +08:00
});
});
2017-04-07 16:30:40 +08:00
};
2017-07-13 00:54:08 +08:00
var clearOwnedChannel = function (Env, channelId, unsafeKey, cb) {
if (typeof(channelId) !== 'string' || channelId.length !== 32) {
return cb('INVALID_ARGUMENTS');
}
getMetadata(Env, channelId, function (err, metadata) {
if (err) { return void cb(err); }
if (!hasOwners(metadata)) { return void cb('E_NO_OWNERS'); }
2018-01-19 17:25:29 +08:00
// Confirm that the channel is owned by the user in question
if (!isOwner(metadata, unsafeKey)) {
2017-07-13 00:54:08 +08:00
return void cb('INSUFFICIENT_PERMISSIONS');
}
return void Env.msgStore.clearChannel(channelId, function (e) {
cb(e);
});
});
};
var removeOwnedChannel = function (Env, channelId, unsafeKey, cb) {
2018-05-30 20:36:29 +08:00
if (typeof(channelId) !== 'string' || !isValidId(channelId)) {
return cb('INVALID_ARGUMENTS');
}
if (Env.blobStore.isFileId(channelId)) {
var safeKey = escapeKeyCharacters(unsafeKey);
var blobId = channelId;
return void nThen(function (w) {
// check if you have permissions
Env.blobStore.isOwnedBy(safeKey, blobId, w(function (err, owned) {
if (err || !owned) {
w.abort();
return void cb("INSUFFICIENT_PERMISSIONS");
}
}));
}).nThen(function (w) {
// remove the blob
return void Env.blobStore.archive.blob(blobId, w(function (err) {
Log.info('ARCHIVAL_OWNED_FILE_BY_OWNER_RPC', {
safeKey: safeKey,
blobId: blobId,
status: err? String(err): 'SUCCESS',
});
if (err) {
w.abort();
return void cb(err);
}
}));
}).nThen(function () {
// archive the proof
return void Env.blobStore.archive.proof(safeKey, blobId, function (err) {
Log.info("ARCHIVAL_PROOF_REMOVAL_BY_OWNER_RPC", {
safeKey: safeKey,
blobId: blobId,
status: err? String(err): 'SUCCESS',
});
if (err) {
return void cb("E_PROOF_REMOVAL");
}
2019-10-31 01:29:33 +08:00
cb();
});
});
2018-05-30 20:36:29 +08:00
}
getMetadata(Env, channelId, function (err, metadata) {
if (err) { return void cb(err); }
if (!hasOwners(metadata)) { return void cb('E_NO_OWNERS'); }
if (!isOwner(metadata, unsafeKey)) {
return void cb('INSUFFICIENT_PERMISSIONS');
}
// temporarily archive the file
return void Env.msgStore.archiveChannel(channelId, function (e) {
Log.info('ARCHIVAL_CHANNEL_BY_OWNER_RPC', {
unsafeKey: unsafeKey,
channelId: channelId,
status: e? String(e): 'SUCCESS',
});
cb(e);
});
});
};
var removeOwnedChannelHistory = function (Env, channelId, unsafeKey, hash, cb) {
2020-01-24 03:31:45 +08:00
nThen(function (w) {
getMetadata(Env, channelId, w(function (err, metadata) {
if (err) { return void cb(err); }
if (!hasOwners(metadata)) {
w.abort();
return void cb('E_NO_OWNERS');
}
if (!isOwner(metadata, unsafeKey)) {
w.abort();
return void cb("INSUFFICIENT_PERMISSIONS");
}
// else fall through to the next block
}));
}).nThen(function () {
Env.msgStore.trimChannel(channelId, hash, function (err) {
if (err) { return void cb(err); }
2020-01-24 03:31:45 +08:00
// XXX you must also clear the channel's index from historyKeeper cache
});
});
};
2018-03-20 18:16:18 +08:00
/* Users should be able to clear their own pin log with an authenticated RPC
*/
var removePins = function (Env, safeKey, cb) {
2018-03-20 18:16:18 +08:00
if (typeof(Env.pinStore.removeChannel) !== 'function') {
return void cb("E_NOT_IMPLEMENTED");
}
Env.pinStore.removeChannel(safeKey, function (err) {
Log.info('DELETION_PIN_BY_OWNER_RPC', {
safeKey: safeKey,
status: err? String(err): 'SUCCESS',
});
2018-03-20 18:16:18 +08:00
cb(err);
});
};
var trimPins = function (Env, safeKey, cb) {
// XXX trim to latest pin checkpoint
cb("NOT_IMPLEMENTED");
};
/*
We assume that the server is secured against MitM attacks
via HTTPS, and that malicious actors do not have code execution
capabilities. If they do, we have much more serious problems.
The capability to replay a block write or remove results in either
a denial of service for the user whose block was removed, or in the
case of a write, a rollback to an earlier password.
Since block modification is destructive, this can result in loss
of access to the user's drive.
So long as the detached signature is never observed by a malicious
party, and the server discards it after proof of knowledge, replays
are not possible. However, this precludes verification of the signature
at a later time.
Despite this, an integrity check is still possible by the original
author of the block, since we assume that the block will have been
encrypted with xsalsa20-poly1305 which is authenticated.
*/
2019-09-05 21:48:13 +08:00
var validateLoginBlock = function (Env, publicKey, signature, block, cb) { // FIXME BLOCKS
// convert the public key to a Uint8Array and validate it
if (typeof(publicKey) !== 'string') { return void cb('E_INVALID_KEY'); }
var u8_public_key;
try {
u8_public_key = Nacl.util.decodeBase64(publicKey);
} catch (e) {
return void cb('E_INVALID_KEY');
}
var u8_signature;
try {
u8_signature = Nacl.util.decodeBase64(signature);
} catch (e) {
2019-04-09 00:11:36 +08:00
Log.error('INVALID_BLOCK_SIGNATURE', e);
return void cb('E_INVALID_SIGNATURE');
}
// convert the block to a Uint8Array
var u8_block;
try {
u8_block = Nacl.util.decodeBase64(block);
} catch (e) {
return void cb('E_INVALID_BLOCK');
}
// take its hash
var hash = Nacl.hash(u8_block);
// validate the signature against the hash of the content
var verified = Nacl.sign.detached.verify(hash, u8_signature, u8_public_key);
// existing authentication ensures that users cannot replay old blocks
// call back with (err) if unsuccessful
if (!verified) { return void cb("E_COULD_NOT_VERIFY"); }
return void cb(null, u8_block);
};
2019-09-05 21:48:13 +08:00
var createLoginBlockPath = function (Env, publicKey) { // FIXME BLOCKS
// prepare publicKey to be used as a file name
var safeKey = escapeKeyCharacters(publicKey);
// validate safeKey
if (typeof(safeKey) !== 'string') {
return;
}
// derive the full path
// /home/cryptpad/cryptpad/block/fg/fg32kefksjdgjkewrjksdfksjdfsdfskdjfsfd
return Path.join(Env.paths.block, safeKey.slice(0, 2), safeKey);
};
2019-09-05 21:48:13 +08:00
var writeLoginBlock = function (Env, msg, cb) { // FIXME BLOCKS
//console.log(msg);
var publicKey = msg[0];
var signature = msg[1];
var block = msg[2];
2018-06-28 22:52:23 +08:00
validateLoginBlock(Env, publicKey, signature, block, function (e, validatedBlock) {
if (e) { return void cb(e); }
2018-06-28 22:52:23 +08:00
if (!(validatedBlock instanceof Uint8Array)) { return void cb('E_INVALID_BLOCK'); }
// derive the filepath
var path = createLoginBlockPath(Env, publicKey);
// make sure the path is valid
if (typeof(path) !== 'string') {
return void cb('E_INVALID_BLOCK_PATH');
}
var parsed = Path.parse(path);
if (!parsed || typeof(parsed.dir) !== 'string') {
return void cb("E_INVALID_BLOCK_PATH_2");
}
nThen(function (w) {
// make sure the path to the file exists
2018-07-19 17:14:52 +08:00
Fse.mkdirp(parsed.dir, w(function (e) {
if (e) {
w.abort();
cb(e);
}
}));
2019-09-05 21:48:13 +08:00
}).nThen(function () {
// actually write the block
2018-06-28 22:52:23 +08:00
// flow is dumb and I need to guard against this which will never happen
/*:: if (typeof(validatedBlock) === 'undefined') { throw new Error('should never happen'); } */
/*:: if (typeof(path) === 'undefined') { throw new Error('should never happen'); } */
Fs.writeFile(path, Buffer.from(validatedBlock), { encoding: "binary", }, function (err) {
if (err) { return void cb(err); }
cb();
});
});
});
};
/*
When users write a block, they upload the block, and provide
a signature proving that they deserve to be able to write to
the location determined by the public key.
When removing a block, there is nothing to upload, but we need
to sign something. Since the signature is considered sensitive
information, we can just sign some constant and use that as proof.
*/
2019-09-05 21:48:13 +08:00
var removeLoginBlock = function (Env, msg, cb) { // FIXME BLOCKS
var publicKey = msg[0];
var signature = msg[1];
var block = Nacl.util.decodeUTF8('DELETE_BLOCK'); // clients and the server will have to agree on this constant
2018-06-28 22:52:23 +08:00
validateLoginBlock(Env, publicKey, signature, block, function (e /*::, validatedBlock */) {
if (e) { return void cb(e); }
// derive the filepath
var path = createLoginBlockPath(Env, publicKey);
// make sure the path is valid
if (typeof(path) !== 'string') {
return void cb('E_INVALID_BLOCK_PATH');
}
2019-06-12 22:35:08 +08:00
// FIXME COLDSTORAGE
Fs.unlink(path, function (err) {
Log.info('DELETION_BLOCK_BY_OWNER_RPC', {
publicKey: publicKey,
path: path,
status: err? String(err): 'SUCCESS',
});
if (err) { return void cb(err); }
cb();
});
});
};
2019-08-14 23:34:08 +08:00
var ARRAY_LINE = /^\[/;
2019-08-21 18:54:24 +08:00
/* Files can contain metadata but not content
call back with true if the channel log has no content other than metadata
otherwise false
*/
var isNewChannel = function (Env, channel, cb) {
if (!isValidId(channel)) { return void cb('INVALID_CHAN'); }
if (channel.length !== 32) { return void cb('INVALID_CHAN'); }
var done = false;
Env.msgStore.getMessages(channel, function (msg) {
if (done) { return; }
try {
2019-08-21 18:54:24 +08:00
if (typeof(msg) === 'string' && ARRAY_LINE.test(msg)) {
2019-08-14 23:34:08 +08:00
done = true;
return void cb(void 0, false);
}
} catch (e) {
WARN('invalid message read from store', e);
}
}, function () {
if (done) { return; }
// no more messages...
cb(void 0, true);
});
};
/* writePrivateMessage
allows users to anonymously send a message to the channel
prevents their netflux-id from being stored in history
and from being broadcast to anyone that might currently be in the channel
Otherwise behaves the same as sending to a channel
*/
var writePrivateMessage = function (Env, args, nfwssCtx, cb) {
var channelId = args[0];
var msg = args[1];
// don't bother handling empty messages
if (!msg) { return void cb("INVALID_MESSAGE"); }
// don't support anything except regular channels
if (!isValidId(channelId) || channelId.length !== 32) {
return void cb("INVALID_CHAN");
}
// We expect a modern netflux-websocket-server instance
// if this API isn't here everything will fall apart anyway
if (!(nfwssCtx && nfwssCtx.historyKeeper && typeof(nfwssCtx.historyKeeper.onChannelMessage) === 'function')) {
return void cb("NOT_IMPLEMENTED");
}
// historyKeeper expects something with an 'id' attribute
// it will fail unless you provide it, but it doesn't need anything else
var channelStruct = {
id: channelId,
};
// construct a message to store and broadcast
var fullMessage = [
0, // idk
null, // normally the netflux id, null isn't rejected, and it distinguishes messages written in this way
"MSG", // indicate that this is a MSG
channelId, // channel id
msg // the actual message content. Generally a string
];
// store the message and do everything else that is typically done when going through historyKeeper
nfwssCtx.historyKeeper.onChannelMessage(nfwssCtx, channelStruct, fullMessage);
// call back with the message and the target channel.
// historyKeeper will take care of broadcasting it if anyone is in the channel
cb(void 0, {
channel: channelId,
message: fullMessage
});
};
var isUnauthenticatedCall = function (call) {
return [
'GET_FILE_SIZE',
2018-03-20 22:09:31 +08:00
'GET_METADATA',
'GET_MULTIPLE_FILE_SIZE',
'IS_CHANNEL_PINNED',
'IS_NEW_CHANNEL',
2018-01-29 19:40:09 +08:00
'GET_HISTORY_OFFSET',
'GET_DELETED_PADS',
'WRITE_PRIVATE_MESSAGE',
].indexOf(call) !== -1;
};
2017-05-31 18:51:26 +08:00
var isAuthenticatedCall = function (call) {
return [
'COOKIE',
2017-05-31 18:51:26 +08:00
'RESET',
'PIN',
'UNPIN',
'GET_HASH',
'GET_TOTAL_SIZE',
'UPDATE_LIMITS',
'GET_LIMIT',
'UPLOAD_STATUS',
2017-05-31 18:51:26 +08:00
'UPLOAD_COMPLETE',
2018-03-13 00:50:47 +08:00
'OWNED_UPLOAD_COMPLETE',
2017-05-31 18:51:26 +08:00
'UPLOAD_CANCEL',
'EXPIRE_SESSION',
'TRIM_OWNED_CHANNEL_HISTORY',
'CLEAR_OWNED_CHANNEL',
'REMOVE_OWNED_CHANNEL',
2018-03-20 18:16:18 +08:00
'REMOVE_PINS',
'TRIM_PINS',
'WRITE_LOGIN_BLOCK',
'REMOVE_LOGIN_BLOCK',
2019-03-28 00:00:28 +08:00
'ADMIN',
2019-08-28 18:40:35 +08:00
'SET_METADATA'
2017-05-31 18:51:26 +08:00
].indexOf(call) !== -1;
};
// upload_status
var upload_status = function (Env, safeKey, filesize, _cb) { // FIXME FILES
var cb = Util.once(Util.mkAsync(_cb));
// validate that the provided size is actually a positive number
if (typeof(filesize) !== 'number' &&
filesize >= 0) { return void cb('E_INVALID_SIZE'); }
if (filesize >= Env.maxUploadSize) { return cb('TOO_LARGE'); }
nThen(function (w) {
var abortAndCB = Util.both(w.abort, cb);
Env.blobStore.status(safeKey, w(function (err, inProgress) {
// if there's an error something is weird
if (err) { return void abortAndCB(err); }
// we cannot upload two things at once
if (inProgress) { return void abortAndCB(void 0, true); }
}));
}).nThen(function () {
// if yuo're here then there are no pending uploads
// check if you have space in your quota to upload something of this size
getFreeSpace(Env, safeKey, function (e, free) {
if (e) { return void cb(e); }
if (filesize >= free) { return cb('NOT_ENOUGH_SPACE'); }
cb(void 0, false);
});
});
};
2020-01-24 03:32:10 +08:00
RPC.create = function (config, cb) {
2019-04-09 00:11:36 +08:00
Log = config.log;
// load pin-store...
2019-04-09 00:11:36 +08:00
Log.silly('LOADING RPC MODULE');
2017-03-28 00:15:15 +08:00
2017-05-04 17:36:56 +08:00
var keyOrDefaultString = function (key, def) {
return typeof(config[key]) === 'string'? config[key]: def;
};
var Env = {
defaultStorageLimit: config.defaultStorageLimit,
maxUploadSize: config.maxUploadSize || (20 * 1024 * 1024),
Sessions: {},
paths: {},
msgStore: config.store,
2020-01-24 03:32:10 +08:00
pinStore: undefined,
pinnedPads: {},
evPinnedPadsReady: mkEvent(true),
2019-04-09 00:11:36 +08:00
limits: {},
admins: [],
sessionExpirationInterval: undefined,
};
2019-04-09 00:11:36 +08:00
try {
Env.admins = (config.adminKeys || []).map(function (k) {
k = k.replace(/\/+$/, '');
var s = k.split('/');
return s[s.length-1];
});
} catch (e) {
console.error("Can't parse admin keys. Please update or fix your config.js file!");
}
var Sessions = Env.Sessions;
var paths = Env.paths;
2017-05-10 21:36:14 +08:00
var pinPath = paths.pin = keyOrDefaultString('pinPath', './pins');
paths.block = keyOrDefaultString('blockPath', './block');
2019-03-28 00:00:28 +08:00
paths.data = keyOrDefaultString('filePath', './datastore');
paths.staging = keyOrDefaultString('blobStagingPath', './blobstage');
paths.blob = keyOrDefaultString('blobPath', './blob');
2017-05-04 17:36:56 +08:00
var isUnauthenticateMessage = function (msg) {
2017-07-03 22:43:49 +08:00
return msg && msg.length === 2 && isUnauthenticatedCall(msg[0]);
};
var handleUnauthenticatedMessage = function (msg, respond, nfwssCtx) {
2019-09-06 20:36:22 +08:00
Log.silly('LOG_RPC', msg[0]);
switch (msg[0]) {
case 'GET_HISTORY_OFFSET': {
if (typeof(msg[1]) !== 'object' || typeof(msg[1].channelName) !== 'string') {
return respond('INVALID_ARG_FORMAT', msg);
}
const msgHash = typeof(msg[1].msgHash) === 'string' ? msg[1].msgHash : undefined;
nfwssCtx.getHistoryOffset(nfwssCtx, msg[1].channelName, msgHash, (e, ret) => {
if (e) {
if (e.code !== 'ENOENT') {
WARN(e.stack, msg);
}
return respond(e.message);
}
respond(e, [null, ret, null]);
});
break;
}
case 'GET_FILE_SIZE':
return void getFileSize(Env, msg[1], function (e, size) {
WARN(e, msg[1]);
respond(e, [null, size, null]);
});
2018-03-20 22:09:31 +08:00
case 'GET_METADATA':
2019-09-05 21:48:13 +08:00
return void getMetadata(Env, msg[1], function (e, data) {
2018-03-20 22:09:31 +08:00
WARN(e, msg[1]);
respond(e, [null, data, null]);
});
case 'GET_MULTIPLE_FILE_SIZE':
return void getMultipleFileSize(Env, msg[1], function (e, dict) {
if (e) {
WARN(e, dict);
return respond(e);
}
respond(e, [null, dict, null]);
});
2018-01-29 19:40:09 +08:00
case 'GET_DELETED_PADS':
return void getDeletedPads(Env, msg[1], function (e, list) {
if (e) {
WARN(e, msg[1]);
return respond(e);
}
respond(e, [null, list, null]);
});
case 'IS_CHANNEL_PINNED':
return void isChannelPinned(Env, msg[1], function (isPinned) {
respond(null, [null, isPinned, null]);
});
case 'IS_NEW_CHANNEL':
return void isNewChannel(Env, msg[1], function (e, isNew) {
respond(e, [null, isNew, null]);
});
case 'WRITE_PRIVATE_MESSAGE':
return void writePrivateMessage(Env, msg[1], nfwssCtx, function (e, output) {
respond(e, output);
});
default:
2019-04-09 00:11:36 +08:00
Log.warn("UNSUPPORTED_RPC_CALL", msg);
return respond('UNSUPPORTED_RPC_CALL', msg);
}
};
var rpc0 = function (ctx, data, respond) {
2017-04-24 18:10:12 +08:00
if (!Array.isArray(data)) {
2019-04-09 00:11:36 +08:00
Log.debug('INVALID_ARG_FORMET', data);
return void respond('INVALID_ARG_FORMAT');
2017-04-24 18:10:12 +08:00
}
2017-03-28 00:15:15 +08:00
if (!data.length) {
return void respond("INSUFFICIENT_ARGS");
2017-03-28 00:15:15 +08:00
} else if (data.length !== 1) {
2019-04-09 00:11:36 +08:00
Log.debug('UNEXPECTED_ARGUMENTS_LENGTH', data);
}
2017-03-28 00:15:15 +08:00
var msg = data[0].slice(0);
2017-04-04 01:24:57 +08:00
2017-04-24 18:10:12 +08:00
if (!Array.isArray(msg)) {
return void respond('INVALID_ARG_FORMAT');
}
if (isUnauthenticateMessage(msg)) {
return handleUnauthenticatedMessage(msg, respond, ctx);
}
2017-03-28 00:15:15 +08:00
var signature = msg.shift();
var publicKey = msg.shift();
// make sure a user object is initialized in the cookie jar
if (publicKey) {
2018-01-19 17:27:16 +08:00
getSession(Sessions, publicKey);
} else {
2019-04-09 00:11:36 +08:00
Log.debug("NO_PUBLIC_KEY_PROVIDED", publicKey);
}
var cookie = msg[0];
2017-04-10 23:42:35 +08:00
if (!isValidCookie(Sessions, publicKey, cookie)) {
2017-03-28 00:15:15 +08:00
// no cookie is fine if the RPC is to get a cookie
if (msg[1] !== 'COOKIE') {
2017-03-28 00:15:15 +08:00
return void respond('NO_COOKIE');
}
}
var serialized = JSON.stringify(msg);
2017-04-05 23:28:04 +08:00
if (!(serialized && typeof(publicKey) === 'string')) {
2017-03-28 00:15:15 +08:00
return void respond('INVALID_MESSAGE_OR_PUBLIC_KEY');
}
2017-05-31 18:51:26 +08:00
if (isAuthenticatedCall(msg[1])) {
if (checkSignature(serialized, signature, publicKey) !== true) {
return void respond("INVALID_SIGNATURE_OR_PUBLIC_KEY");
}
} else if (msg[1] !== 'UPLOAD') {
2019-04-09 00:11:36 +08:00
Log.warn('INVALID_RPC_CALL', msg[1]);
return void respond("INVALID_RPC_CALL");
2017-03-28 00:15:15 +08:00
}
var safeKey = escapeKeyCharacters(publicKey);
/* If you have gotten this far, you have signed the message with the
public key which you provided.
We can safely modify the state for that key
OR it's an unauthenticated call, which must not modify the state
for that key in a meaningful way.
*/
// discard validated cookie from message
msg.shift();
var Respond = function (e, msg) {
var session = Sessions[safeKey];
var token = session? session.tokens.slice(-1)[0]: '';
var cookie = makeCookie(token).join('|');
respond(e ? String(e): e, [cookie].concat(typeof(msg) !== 'undefined' ?msg: []));
};
if (typeof(msg) !== 'object' || !msg.length) {
return void Respond('INVALID_MSG');
}
var handleMessage = function () {
2019-04-09 00:11:36 +08:00
Log.silly('LOG_RPC', msg[0]);
switch (msg[0]) {
2017-04-07 17:37:19 +08:00
case 'COOKIE': return void Respond(void 0);
case 'RESET':
2017-05-17 00:08:59 +08:00
return resetUserPins(Env, safeKey, msg[1], function (e, hash) {
//WARN(e, hash);
2017-04-07 17:37:19 +08:00
return void Respond(e, hash);
2017-04-04 01:24:57 +08:00
});
case 'PIN':
2017-05-17 00:08:59 +08:00
return pinChannel(Env, safeKey, msg[1], function (e, hash) {
WARN(e, hash);
2017-04-07 16:30:40 +08:00
Respond(e, hash);
2017-04-04 01:24:57 +08:00
});
case 'UNPIN':
2017-05-17 00:08:59 +08:00
return unpinChannel(Env, safeKey, msg[1], function (e, hash) {
WARN(e, hash);
2017-04-07 16:30:40 +08:00
Respond(e, hash);
2017-04-04 01:24:57 +08:00
});
case 'GET_HASH':
2017-05-17 00:08:59 +08:00
return void getHash(Env, safeKey, function (e, hash) {
WARN(e, hash);
2017-04-07 16:30:40 +08:00
Respond(e, hash);
2017-04-04 01:24:57 +08:00
});
2017-04-28 17:46:13 +08:00
case 'GET_TOTAL_SIZE': // TODO cache this, since it will get called quite a bit
2017-05-17 00:08:59 +08:00
return getTotalSize(Env, safeKey, function (e, size) {
if (e) {
WARN(e, safeKey);
return void Respond(e);
}
2017-04-07 16:09:59 +08:00
Respond(e, size);
2017-03-15 22:55:25 +08:00
});
2017-04-07 16:09:59 +08:00
case 'GET_FILE_SIZE':
2017-06-08 20:00:48 +08:00
return void getFileSize(Env, msg[1], function (e, size) {
WARN(e, msg[1]);
Respond(e, size);
});
2017-05-11 22:12:44 +08:00
case 'UPDATE_LIMITS':
return void updateLimits(Env, config, safeKey, function (e, limit) {
if (e) {
WARN(e, limit);
return void Respond(e);
}
2017-05-11 22:12:44 +08:00
Respond(void 0, limit);
});
case 'GET_LIMIT':
return void getLimit(Env, safeKey, function (e, limit) {
if (e) {
WARN(e, limit);
return void Respond(e);
}
2017-05-11 22:12:44 +08:00
Respond(void 0, limit);
2017-04-28 17:46:13 +08:00
});
2017-04-21 20:51:00 +08:00
case 'GET_MULTIPLE_FILE_SIZE':
2017-05-17 00:08:59 +08:00
return void getMultipleFileSize(Env, msg[1], function (e, dict) {
if (e) {
WARN(e, dict);
return void Respond(e);
}
2017-04-21 20:51:00 +08:00
Respond(void 0, dict);
});
2017-07-05 22:00:54 +08:00
case 'EXPIRE_SESSION':
return void setTimeout(function () {
expireSession(Sessions, safeKey);
Respond(void 0, "OK");
});
2017-07-13 00:54:08 +08:00
case 'CLEAR_OWNED_CHANNEL':
return void clearOwnedChannel(Env, msg[1], publicKey, function (e, response) {
if (e) { return void Respond(e); }
Respond(void 0, response);
});
case 'REMOVE_OWNED_CHANNEL':
2018-02-15 02:42:00 +08:00
return void removeOwnedChannel(Env, msg[1], publicKey, function (e) {
if (e) { return void Respond(e); }
Respond(void 0, "OK");
});
case 'TRIM_OWNED_CHANNEL_HISTORY':
return void removeOwnedChannelHistory(Env, msg[1], publicKey, msg[2], function (e) {
if (e) { return void Respond(e); }
Respond(void 0, 'OK');
});
2018-03-20 18:16:18 +08:00
case 'REMOVE_PINS':
2018-03-22 01:53:11 +08:00
return void removePins(Env, safeKey, function (e) {
2018-03-20 18:16:18 +08:00
if (e) { return void Respond(e); }
2018-03-22 01:27:20 +08:00
Respond(void 0, "OK");
2018-03-20 18:16:18 +08:00
});
case 'TRIM_PINS':
return void trimPins(Env, safeKey, function (e) {
if (e) { return void Respond(e); }
Respond(void 0, "OK");
});
2017-04-28 23:11:50 +08:00
case 'UPLOAD':
return void Env.blobStore.upload(safeKey, msg[1], function (e, len) {
WARN(e, len);
2017-05-04 17:36:56 +08:00
Respond(e, len);
});
case 'UPLOAD_STATUS':
var filesize = msg[1];
return void upload_status(Env, safeKey, filesize, function (e, yes) {
if (!e && !yes) {
// no pending uploads, set the new size
2018-01-19 17:27:16 +08:00
var user = getSession(Sessions, safeKey);
user.pendingUploadSize = filesize;
user.currentUploadSize = 0;
}
Respond(e, yes);
2017-05-04 17:36:56 +08:00
});
case 'UPLOAD_COMPLETE':
return void Env.blobStore.complete(safeKey, msg[1], function (e, hash) {
WARN(e, hash);
2017-05-04 17:36:56 +08:00
Respond(e, hash);
2017-04-28 23:11:50 +08:00
});
2018-03-13 00:50:47 +08:00
case 'OWNED_UPLOAD_COMPLETE':
return void Env.blobStore.completeOwned(safeKey, msg[1], function (e, blobId) {
2018-03-13 00:50:47 +08:00
WARN(e, blobId);
Respond(e, blobId);
});
2017-05-04 17:36:56 +08:00
case 'UPLOAD_CANCEL':
// msg[1] is fileSize
// if we pass it here, we can start an upload right away without calling
// UPLOAD_STATUS again
return void Env.blobStore.cancel(safeKey, msg[1], function (e) {
WARN(e, 'UPLOAD_CANCEL');
2017-04-28 23:11:50 +08:00
Respond(e);
});
case 'WRITE_LOGIN_BLOCK':
return void writeLoginBlock(Env, msg[1], function (e) {
if (e) {
WARN(e, 'WRITE_LOGIN_BLOCK');
return void Respond(e);
}
Respond(e);
});
case 'REMOVE_LOGIN_BLOCK':
2018-06-19 23:17:56 +08:00
return void removeLoginBlock(Env, msg[1], function (e) {
if (e) {
WARN(e, 'REMOVE_LOGIN_BLOCK');
return void Respond(e);
}
Respond(e);
});
2019-03-28 00:00:28 +08:00
case 'ADMIN':
return void Admin.command(Env, ctx, safeKey, config, msg[1], function (e, result) {
2019-03-28 00:00:28 +08:00
if (e) {
WARN(e, result);
return void Respond(e);
}
Respond(void 0, result);
});
2019-08-28 18:40:35 +08:00
case 'SET_METADATA':
return void setMetadata(Env, msg[1], publicKey, function (e, data) {
if (e) {
WARN(e, data);
return void Respond(e);
}
Respond(void 0, data);
});
default:
return void Respond('UNSUPPORTED_RPC_CALL', msg);
}
};
handleMessage(true);
};
2020-01-24 03:32:10 +08:00
var rpc = function (ctx, data, respond) {
try {
return rpc0(ctx, data, respond);
} catch (e) {
console.log("Error from RPC with data " + JSON.stringify(data));
console.log(e.stack);
}
};
2017-05-11 22:12:44 +08:00
var updateLimitDaily = function () {
updateLimits(Env, config, undefined, function (e) {
if (e) {
WARN('limitUpdate', e);
}
2017-05-11 22:12:44 +08:00
});
};
applyCustomLimits(Env, config);
2017-05-11 22:12:44 +08:00
updateLimitDaily();
setInterval(updateLimitDaily, 24*3600*1000);
loadChannelPins(Env);
nThen(function (w) {
Store.create({
filePath: pinPath,
}, w(function (s) {
Env.pinStore = s;
}));
BlobStore.create({
blobPath: config.blobPath,
blobStagingPath: config.blobStagingPath,
archivePath: config.archivePath,
getSession: function (safeKey) {
return getSession(Sessions, safeKey);
},
}, w(function (err, blob) {
if (err) { throw new Error(err); }
Env.blobStore = blob;
}));
}).nThen(function () {
cb(void 0, rpc);
// expire old sessions once per minute
// XXX allow for graceful shutdown
Env.sessionExpirationInterval = setInterval(function () {
expireSessions(Sessions);
}, SESSION_EXPIRATION_TIME);
2017-04-04 01:24:57 +08:00
});
};