mirror of https://github.com/xwiki-labs/cryptpad
198 lines
5.8 KiB
JavaScript
198 lines
5.8 KiB
JavaScript
// SPDX-FileCopyrightText: 2023 XWiki CryptPad Team <contact@cryptpad.org> and contributors
|
|
//
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
/*
|
|
globals process
|
|
*/
|
|
var Express = require('express');
|
|
var Http = require('http');
|
|
var Fs = require('fs');
|
|
var nThen = require("nthen");
|
|
var Util = require("./lib/common-util");
|
|
|
|
var OS = require("node:os");
|
|
var Cluster = require("node:cluster");
|
|
|
|
var config = require("./lib/load-config");
|
|
var Environment = require("./lib/env");
|
|
var Env = Environment.create(config);
|
|
var Default = require("./lib/defaults");
|
|
|
|
var app = Express();
|
|
|
|
(function () {
|
|
// you absolutely must provide an 'httpUnsafeOrigin' (a truthy string)
|
|
if (typeof(Env.httpUnsafeOrigin) !== 'string' || !Env.httpUnsafeOrigin.trim()) {
|
|
throw new Error("No 'httpUnsafeOrigin' provided");
|
|
}
|
|
}());
|
|
|
|
var COMMANDS = {};
|
|
|
|
COMMANDS.LOG = function (msg, cb) {
|
|
var level = msg.level;
|
|
Env.Log[level](msg.tag, msg.info);
|
|
cb();
|
|
};
|
|
|
|
COMMANDS.UPDATE_QUOTA = function (msg, cb) {
|
|
var Quota = require("./lib/commands/quota");
|
|
Quota.updateCachedLimits(Env, (err) => {
|
|
if (err) {
|
|
Env.Log.warn('UPDATE_QUOTA_ERR', err);
|
|
return void cb(err);
|
|
}
|
|
Env.Log.info('QUOTA_UPDATED', {});
|
|
cb();
|
|
});
|
|
};
|
|
|
|
COMMANDS.GET_PROFILING_DATA = function (msg, cb) {
|
|
cb(void 0, Env.bytesWritten);
|
|
};
|
|
|
|
nThen(function (w) {
|
|
require("./lib/log").create(config, w(function (_log) {
|
|
Env.Log = _log;
|
|
config.log = _log;
|
|
}));
|
|
}).nThen(function (w) {
|
|
Fs.exists("customize", w(function (e) {
|
|
if (e) { return; }
|
|
Env.Log.info('NO_CUSTOMIZE_FOLDER', {
|
|
message: "CryptPad is customizable, see customize.dist/readme.md for details",
|
|
});
|
|
}));
|
|
}).nThen(function (w) {
|
|
// check that a valid origin was provided in the config
|
|
try {
|
|
var url = new URL('', Env.httpUnsafeOrigin).href;
|
|
Env.Log.info("WEBSERVER_LISTENING", {
|
|
origin: url,
|
|
});
|
|
|
|
if (!Env.admins.length) {
|
|
Env.Log.info('NO_ADMIN_CONFIGURED', {
|
|
message: `Your instance is not correctly configured for production usage. Review its checkup page for more information.`,
|
|
details: new URL('/checkup/', Env.httpUnsafeOrigin).href,
|
|
});
|
|
}
|
|
} catch (err) {
|
|
Env.Log.error("INVALID_ORIGIN", {
|
|
httpUnsafeOrigin: Env.httpUnsafeOrigin,
|
|
});
|
|
process.exit(1);
|
|
}
|
|
Env.httpServer = Http.createServer(app);
|
|
Env.httpServer.listen(Env.websocketPort, Env.httpAddress, w(function () {
|
|
Env.Log.info('WEBSOCKET_LISTENING', {
|
|
port: Env.websocketPort,
|
|
});
|
|
}));
|
|
}).nThen(function (w) {
|
|
var limit = Env.maxWorkers;
|
|
var workerState = {
|
|
Env: Environment.serialize(Env),
|
|
};
|
|
|
|
Cluster.setupPrimary({
|
|
exec: './lib/http-worker.js',
|
|
args: [],
|
|
});
|
|
|
|
var launchWorker = (online) => {
|
|
var worker = Cluster.fork(workerState);
|
|
worker.on('online', () => {
|
|
online();
|
|
});
|
|
|
|
worker.on('message', msg => {
|
|
if (!msg) { return; }
|
|
var txid = msg.txid;
|
|
var content = msg.content;
|
|
if (!content) { return; }
|
|
|
|
var command = COMMANDS[content.command];
|
|
if (typeof(command) !== 'function') {
|
|
return void Env.Log.error('UNHANDLED_HTTP_WORKER_COMMAND', msg);
|
|
}
|
|
|
|
const cb = Util.once(Util.mkAsync(function (err, value) {
|
|
worker.send({
|
|
type: 'REPLY',
|
|
error: Util.serializeError(err),
|
|
txid: txid,
|
|
pid: msg.pid,
|
|
value: value,
|
|
});
|
|
}));
|
|
|
|
command(content, cb);
|
|
});
|
|
|
|
worker.on('exit', (code, signal) => {
|
|
if (!signal && code === 0) { return; }
|
|
// relaunch http workers if they crash
|
|
Env.Log.error('HTTP_WORKER_EXIT', {
|
|
signal,
|
|
code,
|
|
});
|
|
// update the environment with the latest state before relaunching
|
|
workerState.Env = Environment.serialize(Env);
|
|
launchWorker(function () {
|
|
Env.Log.info('HTTP_WORKER_RELAUNCH', {});
|
|
});
|
|
});
|
|
};
|
|
|
|
var txids = {};
|
|
|
|
var sendCommand = (worker, command, data /*, cb */) => {
|
|
worker.send({
|
|
type: 'EVENT',
|
|
txid: Util.guid(txids),
|
|
command: command,
|
|
data: data,
|
|
});
|
|
};
|
|
|
|
var broadcast = (command, data/*, cb*/) => {
|
|
for (const worker of Object.values(Cluster.workers)) {
|
|
sendCommand(worker, command, data /*, cb */);
|
|
}
|
|
};
|
|
|
|
var throttledEnvChange = Util.throttle(function () {
|
|
Env.Log.info('WORKER_ENV_UPDATE', 'Updating HTTP workers with latest state');
|
|
broadcast('ENV_UPDATE', Environment.serialize(Env));
|
|
}, 250); // NOTE: changing this value will impact lib/commands/admin-rpc.js#adminDecree callback
|
|
|
|
var throttledCacheFlush = Util.throttle(function () {
|
|
Env.Log.info('WORKER_CACHE_FLUSH', 'Instructing HTTP workers to flush cache');
|
|
broadcast('FLUSH_CACHE', Env.FRESH_KEY);
|
|
}, 250);
|
|
|
|
Env.envUpdated.reg(throttledEnvChange);
|
|
Env.cacheFlushed.reg(throttledCacheFlush);
|
|
|
|
OS.cpus().forEach((cpu, index) => {
|
|
if (limit && index >= limit) {
|
|
return;
|
|
}
|
|
launchWorker(w());
|
|
});
|
|
}).nThen(function () {
|
|
if (Env.shouldUpdateNode) {
|
|
Env.Log.warn("NODEJS_OLD_VERSION", {
|
|
message: `The CryptPad development team recommends using at least NodeJS v${Default.recommendedVersion.join('.')}`,
|
|
currentVersion: process.version,
|
|
});
|
|
}
|
|
if (Env.OFFLINE_MODE) { return; }
|
|
if (Env.websocketPath) { return; }
|
|
|
|
require("./lib/api").create(Env);
|
|
});
|
|
|