2017-05-27 00:09:31 +08:00
|
|
|
/*jshint esversion: 6 */
|
2018-01-29 19:40:09 +08:00
|
|
|
const nThen = require("nthen");
|
2019-03-29 20:45:54 +08:00
|
|
|
|
2020-01-24 03:47:55 +08:00
|
|
|
const Util = require("./common-util");
|
2019-09-12 23:30:35 +08:00
|
|
|
const mkEvent = Util.mkEvent;
|
|
|
|
|
2020-01-25 02:06:46 +08:00
|
|
|
const Core = require("./commands/core");
|
2020-01-25 00:25:48 +08:00
|
|
|
const Admin = require("./commands/admin-rpc");
|
2020-01-25 01:43:11 +08:00
|
|
|
const Pinning = require("./commands/pin-rpc");
|
2020-01-25 02:06:46 +08:00
|
|
|
const Quota = require("./commands/quota");
|
2020-01-25 02:14:26 +08:00
|
|
|
const Block = require("./commands/block");
|
2020-01-25 02:19:40 +08:00
|
|
|
const Metadata = require("./commands/metadata");
|
2020-01-25 02:36:14 +08:00
|
|
|
const Channel = require("./commands/channel");
|
|
|
|
const Upload = require("./commands/upload");
|
2020-01-25 00:25:48 +08:00
|
|
|
|
2017-03-11 01:03:15 +08:00
|
|
|
var RPC = module.exports;
|
|
|
|
|
2020-01-25 02:36:14 +08:00
|
|
|
const Store = require("../storage/file");
|
|
|
|
const BlobStore = require("../storage/blob");
|
2019-09-03 23:00:26 +08:00
|
|
|
|
2020-01-25 03:45:53 +08:00
|
|
|
const UNAUTHENTICATED_CALLS = [
|
|
|
|
'GET_FILE_SIZE',
|
|
|
|
'GET_METADATA',
|
|
|
|
'GET_MULTIPLE_FILE_SIZE',
|
|
|
|
'IS_CHANNEL_PINNED',
|
|
|
|
'IS_NEW_CHANNEL',
|
|
|
|
'GET_DELETED_PADS',
|
|
|
|
'WRITE_PRIVATE_MESSAGE',
|
|
|
|
];
|
|
|
|
|
2017-07-03 17:38:39 +08:00
|
|
|
var isUnauthenticatedCall = function (call) {
|
2020-01-25 03:45:53 +08:00
|
|
|
return UNAUTHENTICATED_CALLS.indexOf(call) !== -1;
|
2017-07-03 17:38:39 +08:00
|
|
|
};
|
|
|
|
|
2020-01-25 03:45:53 +08:00
|
|
|
const AUTHENTICATED_CALLS = [
|
|
|
|
'COOKIE',
|
|
|
|
'RESET',
|
|
|
|
'PIN',
|
|
|
|
'UNPIN',
|
|
|
|
'GET_HASH',
|
|
|
|
'GET_TOTAL_SIZE',
|
|
|
|
'UPDATE_LIMITS',
|
|
|
|
'GET_LIMIT',
|
|
|
|
'UPLOAD_STATUS',
|
|
|
|
'UPLOAD_COMPLETE',
|
|
|
|
'OWNED_UPLOAD_COMPLETE',
|
|
|
|
'UPLOAD_CANCEL',
|
|
|
|
'EXPIRE_SESSION',
|
|
|
|
'TRIM_OWNED_CHANNEL_HISTORY',
|
|
|
|
'CLEAR_OWNED_CHANNEL',
|
|
|
|
'REMOVE_OWNED_CHANNEL',
|
|
|
|
'REMOVE_PINS',
|
|
|
|
'TRIM_PINS',
|
|
|
|
'WRITE_LOGIN_BLOCK',
|
|
|
|
'REMOVE_LOGIN_BLOCK',
|
|
|
|
'ADMIN',
|
|
|
|
'SET_METADATA'
|
|
|
|
];
|
|
|
|
|
2017-05-31 18:51:26 +08:00
|
|
|
var isAuthenticatedCall = function (call) {
|
2020-01-25 03:45:53 +08:00
|
|
|
return AUTHENTICATED_CALLS.indexOf(call) !== -1;
|
|
|
|
};
|
|
|
|
|
|
|
|
var isUnauthenticateMessage = function (msg) {
|
|
|
|
return msg && msg.length === 2 && isUnauthenticatedCall(msg[0]);
|
|
|
|
};
|
|
|
|
|
2020-02-04 03:20:05 +08:00
|
|
|
var handleUnauthenticatedMessage = function (Env, msg, respond, Server) {
|
2020-01-25 03:45:53 +08:00
|
|
|
Env.Log.silly('LOG_RPC', msg[0]);
|
|
|
|
switch (msg[0]) {
|
|
|
|
case 'GET_FILE_SIZE':
|
|
|
|
return void Pinning.getFileSize(Env, msg[1], function (e, size) {
|
|
|
|
Env.WARN(e, msg[1]);
|
|
|
|
respond(e, [null, size, null]);
|
|
|
|
});
|
|
|
|
case 'GET_METADATA':
|
|
|
|
return void Metadata.getMetadata(Env, msg[1], function (e, data) {
|
|
|
|
Env.WARN(e, msg[1]);
|
|
|
|
respond(e, [null, data, null]);
|
|
|
|
});
|
|
|
|
case 'GET_MULTIPLE_FILE_SIZE': // XXX not actually used on the client?
|
|
|
|
return void Pinning.getMultipleFileSize(Env, msg[1], function (e, dict) {
|
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, dict);
|
|
|
|
return respond(e);
|
|
|
|
}
|
|
|
|
respond(e, [null, dict, null]);
|
|
|
|
});
|
|
|
|
case 'GET_DELETED_PADS':
|
|
|
|
return void Pinning.getDeletedPads(Env, msg[1], function (e, list) {
|
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, msg[1]);
|
|
|
|
return respond(e);
|
|
|
|
}
|
|
|
|
respond(e, [null, list, null]);
|
|
|
|
});
|
|
|
|
case 'IS_CHANNEL_PINNED':
|
|
|
|
return void Pinning.isChannelPinned(Env, msg[1], function (isPinned) {
|
|
|
|
respond(null, [null, isPinned, null]);
|
|
|
|
});
|
|
|
|
case 'IS_NEW_CHANNEL':
|
|
|
|
return void Channel.isNewChannel(Env, msg[1], function (e, isNew) {
|
|
|
|
respond(e, [null, isNew, null]);
|
|
|
|
});
|
|
|
|
case 'WRITE_PRIVATE_MESSAGE':
|
2020-02-04 03:20:05 +08:00
|
|
|
return void Channel.writePrivateMessage(Env, msg[1], Server, function (e, output) {
|
2020-01-25 03:45:53 +08:00
|
|
|
respond(e, output);
|
|
|
|
});
|
|
|
|
default:
|
|
|
|
Env.Log.warn("UNSUPPORTED_RPC_CALL", msg);
|
|
|
|
return respond('UNSUPPORTED_RPC_CALL', msg);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-02-04 07:32:21 +08:00
|
|
|
const AUTHENTICATED_USER_TARGETED = {
|
|
|
|
RESET: Pinning.resetUserPins,
|
|
|
|
PIN: Pinning.pinChannel,
|
|
|
|
UNPIN: Pinning.unpinChannel,
|
|
|
|
CLEAR_OWNED_CHANNEL: Channel.clearOwnedChannel,
|
|
|
|
REMOVE_OWNED_CHANNEL: Channel.removeOwnedChannel,
|
|
|
|
UPLOAD_STATUS: Upload.status,
|
|
|
|
UPLOAD: Upload.upload,
|
|
|
|
UPLOAD_COMPLETE: Upload.complete,
|
|
|
|
UPLOAD_CANCEL: Upload.cancel,
|
|
|
|
OWNED_UPLOAD_COMPLETE: Upload.complete_owned,
|
|
|
|
};
|
|
|
|
|
|
|
|
const AUTHENTICATED_USER_SCOPED = {
|
|
|
|
GET_HASH: Pinning.getHash,
|
|
|
|
GET_TOTAL_SIZE: Pinning.getTotalSize,
|
|
|
|
UPDATE_LIMITS: Quota.updateLimits,
|
|
|
|
GET_LIMIT: Pinning.getLimit,
|
|
|
|
EXPIRE_SESSION: Core.expireSession,
|
|
|
|
REMOVE_PINS: Pinning.removePins,
|
|
|
|
TRIM_PINS: Pinning.trimPins,
|
|
|
|
SET_METADATA: Metadata.setMetadata,
|
|
|
|
};
|
|
|
|
|
2020-01-25 03:45:53 +08:00
|
|
|
var handleAuthenticatedMessage = function (Env, map) {
|
|
|
|
var msg = map.msg;
|
|
|
|
var safeKey = map.safeKey;
|
|
|
|
var publicKey = map.publicKey;
|
|
|
|
var Respond = map.Respond;
|
2020-02-04 03:20:05 +08:00
|
|
|
var Server = map.Server;
|
2020-01-25 03:45:53 +08:00
|
|
|
|
2020-02-04 07:32:21 +08:00
|
|
|
var TYPE = msg[0];
|
|
|
|
|
|
|
|
Env.Log.silly('LOG_RPC', TYPE);
|
|
|
|
|
|
|
|
if (typeof(AUTHENTICATED_USER_TARGETED[TYPE]) === 'function') {
|
|
|
|
return void AUTHENTICATED_USER_TARGETED[TYPE](Env, safeKey, msg[1], function (e, value) {
|
|
|
|
Env.WARN(e, value);
|
|
|
|
return void Respond(e, value);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
if (typeof(AUTHENTICATED_USER_SCOPED[TYPE]) === 'function') {
|
|
|
|
return void AUTHENTICATED_USER_SCOPED[TYPE](Env, safeKey, function (e, value) {
|
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, safeKey);
|
|
|
|
return void Respond(e);
|
|
|
|
}
|
|
|
|
Respond(e, value);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-01-25 03:45:53 +08:00
|
|
|
switch (msg[0]) {
|
|
|
|
case 'COOKIE': return void Respond(void 0);
|
|
|
|
case 'TRIM_OWNED_CHANNEL_HISTORY':
|
|
|
|
return void Channel.removeOwnedChannelHistory(Env, msg[1], publicKey, msg[2], function (e) { // XXX USER_TARGETED_DOUBLE
|
|
|
|
if (e) { return void Respond(e); }
|
|
|
|
Respond(void 0, 'OK');
|
|
|
|
});
|
|
|
|
case 'WRITE_LOGIN_BLOCK':
|
|
|
|
return void Block.writeLoginBlock(Env, msg[1], function (e) { // XXX SPECIAL
|
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, 'WRITE_LOGIN_BLOCK');
|
|
|
|
return void Respond(e);
|
|
|
|
}
|
|
|
|
Respond(e);
|
|
|
|
});
|
|
|
|
case 'REMOVE_LOGIN_BLOCK':
|
|
|
|
return void Block.removeLoginBlock(Env, msg[1], function (e) { // XXX SPECIAL
|
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, 'REMOVE_LOGIN_BLOCK');
|
|
|
|
return void Respond(e);
|
|
|
|
}
|
|
|
|
Respond(e);
|
|
|
|
});
|
|
|
|
case 'ADMIN':
|
2020-02-04 03:20:05 +08:00
|
|
|
return void Admin.command(Env, Server, safeKey, msg[1], function (e, result) { // XXX SPECIAL
|
2020-01-25 03:45:53 +08:00
|
|
|
if (e) {
|
|
|
|
Env.WARN(e, result);
|
|
|
|
return void Respond(e);
|
|
|
|
}
|
|
|
|
Respond(void 0, result);
|
|
|
|
});
|
|
|
|
default:
|
2020-02-04 07:32:21 +08:00
|
|
|
console.log(msg);
|
|
|
|
throw new Error("OOPS");
|
2020-01-25 03:45:53 +08:00
|
|
|
return void Respond('UNSUPPORTED_RPC_CALL', msg);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-02-04 03:20:05 +08:00
|
|
|
var rpc = function (Env, Server, data, respond) {
|
2020-01-25 03:45:53 +08:00
|
|
|
if (!Array.isArray(data)) {
|
|
|
|
Env.Log.debug('INVALID_ARG_FORMET', data);
|
|
|
|
return void respond('INVALID_ARG_FORMAT');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!data.length) {
|
|
|
|
return void respond("INSUFFICIENT_ARGS");
|
|
|
|
} else if (data.length !== 1) {
|
|
|
|
Env.Log.debug('UNEXPECTED_ARGUMENTS_LENGTH', data);
|
|
|
|
}
|
|
|
|
|
|
|
|
var msg = data[0].slice(0);
|
|
|
|
|
|
|
|
if (!Array.isArray(msg)) {
|
|
|
|
return void respond('INVALID_ARG_FORMAT');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isUnauthenticateMessage(msg)) {
|
2020-02-04 04:47:41 +08:00
|
|
|
return handleUnauthenticatedMessage(Env, msg, respond, Server);
|
2020-01-25 03:45:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
var signature = msg.shift();
|
|
|
|
var publicKey = msg.shift();
|
|
|
|
|
|
|
|
// make sure a user object is initialized in the cookie jar
|
|
|
|
if (publicKey) {
|
|
|
|
Core.getSession(Env.Sessions, publicKey);
|
|
|
|
} else {
|
|
|
|
Env.Log.debug("NO_PUBLIC_KEY_PROVIDED", publicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
var cookie = msg[0];
|
|
|
|
if (!Core.isValidCookie(Env.Sessions, publicKey, cookie)) {
|
|
|
|
// no cookie is fine if the RPC is to get a cookie
|
|
|
|
if (msg[1] !== 'COOKIE') {
|
|
|
|
return void respond('NO_COOKIE');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var serialized = JSON.stringify(msg);
|
|
|
|
|
|
|
|
if (!(serialized && typeof(publicKey) === 'string')) {
|
|
|
|
return void respond('INVALID_MESSAGE_OR_PUBLIC_KEY');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isAuthenticatedCall(msg[1])) {
|
|
|
|
if (Core.checkSignature(Env, serialized, signature, publicKey) !== true) {
|
|
|
|
return void respond("INVALID_SIGNATURE_OR_PUBLIC_KEY");
|
|
|
|
}
|
|
|
|
} else if (msg[1] !== 'UPLOAD') {
|
|
|
|
Env.Log.warn('INVALID_RPC_CALL', msg[1]);
|
|
|
|
return void respond("INVALID_RPC_CALL");
|
|
|
|
}
|
|
|
|
|
|
|
|
var safeKey = Util.escapeKeyCharacters(publicKey);
|
|
|
|
/* If you have gotten this far, you have signed the message with the
|
|
|
|
public key which you provided.
|
|
|
|
|
|
|
|
We can safely modify the state for that key
|
|
|
|
|
|
|
|
OR it's an unauthenticated call, which must not modify the state
|
|
|
|
for that key in a meaningful way.
|
|
|
|
*/
|
|
|
|
|
|
|
|
// discard validated cookie from message
|
|
|
|
msg.shift();
|
|
|
|
|
|
|
|
var Respond = function (e, msg) {
|
|
|
|
var session = Env.Sessions[safeKey];
|
|
|
|
var token = session? session.tokens.slice(-1)[0]: '';
|
|
|
|
var cookie = Core.makeCookie(token).join('|');
|
|
|
|
respond(e ? String(e): e, [cookie].concat(typeof(msg) !== 'undefined' ?msg: []));
|
|
|
|
};
|
|
|
|
|
|
|
|
if (typeof(msg) !== 'object' || !msg.length) {
|
|
|
|
return void Respond('INVALID_MSG');
|
|
|
|
}
|
|
|
|
|
|
|
|
handleAuthenticatedMessage(Env, {
|
|
|
|
msg: msg,
|
|
|
|
safeKey: safeKey,
|
|
|
|
publicKey: publicKey,
|
|
|
|
Respond: Respond,
|
2020-02-04 03:20:05 +08:00
|
|
|
Server: Server,
|
2020-01-25 03:45:53 +08:00
|
|
|
});
|
2017-05-31 18:51:26 +08:00
|
|
|
};
|
|
|
|
|
2020-01-24 03:32:10 +08:00
|
|
|
RPC.create = function (config, cb) {
|
2020-01-25 02:36:14 +08:00
|
|
|
var Log = config.log;
|
2019-04-09 00:11:36 +08:00
|
|
|
|
2017-03-11 01:03:15 +08:00
|
|
|
// load pin-store...
|
2019-04-09 00:11:36 +08:00
|
|
|
Log.silly('LOADING RPC MODULE');
|
2017-03-28 00:15:15 +08:00
|
|
|
|
2017-05-04 17:36:56 +08:00
|
|
|
var keyOrDefaultString = function (key, def) {
|
|
|
|
return typeof(config[key]) === 'string'? config[key]: def;
|
|
|
|
};
|
|
|
|
|
2020-01-25 02:36:14 +08:00
|
|
|
var WARN = function (e, output) {
|
|
|
|
if (e && output) {
|
|
|
|
Log.warn(e, {
|
|
|
|
output: output,
|
|
|
|
message: String(e),
|
|
|
|
stack: new Error(e).stack,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2017-12-06 00:48:30 +08:00
|
|
|
var Env = {
|
2020-02-04 03:20:05 +08:00
|
|
|
historyKeeper: config.historyKeeper,
|
2020-02-04 06:14:23 +08:00
|
|
|
intervals: config.intervals || {},
|
2017-12-06 00:48:30 +08:00
|
|
|
defaultStorageLimit: config.defaultStorageLimit,
|
|
|
|
maxUploadSize: config.maxUploadSize || (20 * 1024 * 1024),
|
|
|
|
Sessions: {},
|
|
|
|
paths: {},
|
2019-03-30 00:03:53 +08:00
|
|
|
msgStore: config.store,
|
2020-01-24 03:32:10 +08:00
|
|
|
pinStore: undefined,
|
2017-12-06 00:48:30 +08:00
|
|
|
pinnedPads: {},
|
2018-02-06 18:35:24 +08:00
|
|
|
evPinnedPadsReady: mkEvent(true),
|
2019-04-09 00:11:36 +08:00
|
|
|
limits: {},
|
|
|
|
admins: [],
|
2020-01-25 01:43:11 +08:00
|
|
|
Log: Log,
|
|
|
|
WARN: WARN,
|
2020-01-25 03:45:53 +08:00
|
|
|
flushCache: config.flushCache,
|
|
|
|
adminEmail: config.adminEmail,
|
|
|
|
allowSubscriptions: config.allowSubscriptions,
|
|
|
|
myDomain: config.myDomain,
|
|
|
|
mySubdomain: config.mySubdomain,
|
|
|
|
customLimits: config.customLimits,
|
|
|
|
domain: config.domain // XXX
|
2017-12-06 00:48:30 +08:00
|
|
|
};
|
2019-04-09 00:11:36 +08:00
|
|
|
|
|
|
|
try {
|
|
|
|
Env.admins = (config.adminKeys || []).map(function (k) {
|
|
|
|
k = k.replace(/\/+$/, '');
|
|
|
|
var s = k.split('/');
|
|
|
|
return s[s.length-1];
|
|
|
|
});
|
|
|
|
} catch (e) {
|
|
|
|
console.error("Can't parse admin keys. Please update or fix your config.js file!");
|
|
|
|
}
|
|
|
|
|
2017-12-06 00:48:30 +08:00
|
|
|
var Sessions = Env.Sessions;
|
|
|
|
var paths = Env.paths;
|
2017-05-10 21:36:14 +08:00
|
|
|
var pinPath = paths.pin = keyOrDefaultString('pinPath', './pins');
|
2018-06-19 17:31:15 +08:00
|
|
|
paths.block = keyOrDefaultString('blockPath', './block');
|
2019-03-28 00:00:28 +08:00
|
|
|
paths.data = keyOrDefaultString('filePath', './datastore');
|
2019-09-23 22:13:24 +08:00
|
|
|
paths.staging = keyOrDefaultString('blobStagingPath', './blobstage');
|
|
|
|
paths.blob = keyOrDefaultString('blobPath', './blob');
|
2017-05-04 17:36:56 +08:00
|
|
|
|
2017-05-11 22:12:44 +08:00
|
|
|
var updateLimitDaily = function () {
|
2020-01-25 03:45:53 +08:00
|
|
|
Quota.updateLimits(Env, undefined, function (e) {
|
2017-06-13 17:14:01 +08:00
|
|
|
if (e) {
|
|
|
|
WARN('limitUpdate', e);
|
|
|
|
}
|
2017-05-11 22:12:44 +08:00
|
|
|
});
|
|
|
|
};
|
2020-01-25 03:45:53 +08:00
|
|
|
Quota.applyCustomLimits(Env);
|
2017-05-11 22:12:44 +08:00
|
|
|
updateLimitDaily();
|
2020-02-04 06:14:23 +08:00
|
|
|
Env.intervals.dailyLimitUpdate = setInterval(updateLimitDaily, 24*3600*1000);
|
2017-05-11 22:12:44 +08:00
|
|
|
|
2020-01-25 02:06:46 +08:00
|
|
|
Pinning.loadChannelPins(Env);
|
2017-12-06 00:48:30 +08:00
|
|
|
|
2019-09-12 23:30:35 +08:00
|
|
|
nThen(function (w) {
|
|
|
|
Store.create({
|
|
|
|
filePath: pinPath,
|
|
|
|
}, w(function (s) {
|
|
|
|
Env.pinStore = s;
|
|
|
|
}));
|
|
|
|
BlobStore.create({
|
|
|
|
blobPath: config.blobPath,
|
|
|
|
blobStagingPath: config.blobStagingPath,
|
2019-09-20 22:43:52 +08:00
|
|
|
archivePath: config.archivePath,
|
2019-09-12 23:30:35 +08:00
|
|
|
getSession: function (safeKey) {
|
2020-01-25 01:43:11 +08:00
|
|
|
return Core.getSession(Sessions, safeKey);
|
2019-09-12 23:30:35 +08:00
|
|
|
},
|
|
|
|
}, w(function (err, blob) {
|
|
|
|
if (err) { throw new Error(err); }
|
|
|
|
Env.blobStore = blob;
|
|
|
|
}));
|
|
|
|
}).nThen(function () {
|
2020-02-04 03:20:05 +08:00
|
|
|
cb(void 0, function (Server, data, respond) {
|
2020-01-25 03:45:53 +08:00
|
|
|
try {
|
2020-02-04 03:20:05 +08:00
|
|
|
return rpc(Env, Server, data, respond);
|
2020-01-25 03:45:53 +08:00
|
|
|
} catch (e) {
|
|
|
|
console.log("Error from RPC with data " + JSON.stringify(data));
|
|
|
|
console.log(e.stack);
|
|
|
|
}
|
|
|
|
});
|
2019-09-12 23:30:35 +08:00
|
|
|
// expire old sessions once per minute
|
2020-02-04 06:14:23 +08:00
|
|
|
Env.intervals.sessionExpirationInterval = setInterval(function () {
|
2020-01-25 02:06:46 +08:00
|
|
|
Core.expireSessions(Sessions);
|
2020-01-25 01:43:11 +08:00
|
|
|
}, Core.SESSION_EXPIRATION_TIME);
|
2017-04-04 01:24:57 +08:00
|
|
|
});
|
2017-03-11 01:03:15 +08:00
|
|
|
};
|