cryptpad/rpc.js

862 lines
24 KiB
JavaScript
Raw Normal View History

2017-04-25 14:04:17 +00:00
/*@flow*/
2017-03-27 16:15:15 +00:00
/* Use Nacl for checking signatures of messages */
var Nacl = require("tweetnacl");
2017-05-04 09:46:11 +00:00
/* globals Buffer*/
/* globals process */
var Fs = require("fs");
2017-05-04 09:36:56 +00:00
var Path = require("path");
2017-05-11 14:12:44 +00:00
var Https = require("https");
var RPC = module.exports;
2017-04-03 17:24:57 +00:00
var Store = require("./storage/file");
2017-05-11 14:12:44 +00:00
var config = require('./config');
var DEFAULT_LIMIT = 100;
2017-03-15 14:55:25 +00:00
var isValidChannel = function (chan) {
2017-05-10 13:36:14 +00:00
return /^[a-fA-F0-9]/.test(chan) ||
[32, 48].indexOf(chan.length) !== -1;
2017-03-15 14:55:25 +00:00
};
2017-05-04 09:36:56 +00:00
var uint8ArrayToHex = function (a) {
// call slice so Uint8Arrays work as expected
2017-05-04 14:16:09 +00:00
return Array.prototype.slice.call(a).map(function (e) {
2017-05-04 09:36:56 +00:00
var n = Number(e & 0xff).toString(16);
if (n === 'NaN') {
throw new Error('invalid input resulted in NaN');
}
switch (n.length) {
case 0: return '00'; // just being careful, shouldn't happen
case 1: return '0' + n;
case 2: return n;
default: throw new Error('unexpected value');
}
}).join('');
};
2017-05-10 13:36:14 +00:00
var createFileId = function () {
var id = uint8ArrayToHex(Nacl.randomBytes(24));
if (id.length !== 48 || /[^a-f0-9]/.test(id)) {
throw new Error('file ids must consist of 48 hex characters');
2017-05-04 09:36:56 +00:00
}
return id;
};
var makeToken = function () {
return Number(Math.floor(Math.random() * Number.MAX_SAFE_INTEGER))
.toString(16);
};
var makeCookie = function (token) {
var time = (+new Date());
time -= time % 5000;
2017-03-27 16:15:15 +00:00
return [
time,
2017-05-04 09:46:11 +00:00
process.pid,
token
2017-04-03 17:24:57 +00:00
];
2017-03-27 16:15:15 +00:00
};
var parseCookie = function (cookie) {
if (!(cookie && cookie.split)) { return null; }
var parts = cookie.split('|');
if (parts.length !== 3) { return null; }
2017-03-27 16:15:15 +00:00
var c = {};
c.time = new Date(parts[0]);
2017-04-03 17:24:57 +00:00
c.pid = Number(parts[1]);
c.seq = parts[2];
2017-03-27 16:15:15 +00:00
return c;
};
2017-04-10 15:42:35 +00:00
var beginSession = function (Sessions, key) {
if (Sessions[key]) {
Sessions[key].atime = +new Date();
return Sessions[key];
}
var user = Sessions[key] = {};
user.atime = +new Date();
2017-04-10 15:42:35 +00:00
user.tokens = [
makeToken()
];
return user;
};
var isTooOld = function (time, now) {
return (now - time) > 300000;
};
2017-04-03 17:24:57 +00:00
2017-04-10 15:42:35 +00:00
var expireSessions = function (Sessions) {
var now = +new Date();
Object.keys(Sessions).forEach(function (key) {
2017-05-05 07:12:16 +00:00
var session = Sessions[key];
2017-04-10 15:42:35 +00:00
if (isTooOld(Sessions[key].atime, now)) {
if (session.blobstage) {
session.blobstage.close();
}
2017-04-10 15:42:35 +00:00
delete Sessions[key];
}
});
};
var addTokenForKey = function (Sessions, publicKey, token) {
if (!Sessions[publicKey]) { throw new Error('undefined user'); }
var user = Sessions[publicKey];
user.tokens.push(token);
user.atime = +new Date();
if (user.tokens.length > 2) { user.tokens.shift(); }
};
var isValidCookie = function (Sessions, publicKey, cookie) {
var parsed = parseCookie(cookie);
if (!parsed) { return false; }
2017-04-03 17:24:57 +00:00
var now = +new Date();
if (!parsed.time) { return false; }
if (isTooOld(parsed.time, now)) {
2017-03-27 16:15:15 +00:00
return false;
}
// different process. try harder
2017-05-04 09:46:11 +00:00
if (process.pid !== parsed.pid) {
2017-03-27 16:15:15 +00:00
return false;
}
2017-04-10 15:42:35 +00:00
var user = Sessions[publicKey];
if (!user) { return false; }
var idx = user.tokens.indexOf(parsed.seq);
if (idx === -1) { return false; }
if (idx > 0) {
// make a new token
2017-04-10 15:42:35 +00:00
addTokenForKey(Sessions, publicKey, makeToken());
}
2017-03-27 16:15:15 +00:00
return true;
};
var checkSignature = function (signedMsg, signature, publicKey) {
if (!(signedMsg && publicKey)) { return false; }
2017-03-20 17:02:11 +00:00
var signedBuffer;
var pubBuffer;
2017-03-27 16:15:15 +00:00
var signatureBuffer;
try {
2017-03-27 16:15:15 +00:00
signedBuffer = Nacl.util.decodeUTF8(signedMsg);
} catch (e) {
2017-03-27 16:15:15 +00:00
console.log('invalid signedBuffer');
console.log(signedMsg);
return null;
}
2017-03-27 16:15:15 +00:00
try {
pubBuffer = Nacl.util.decodeBase64(publicKey);
} catch (e) {
return false;
}
try {
signatureBuffer = Nacl.util.decodeBase64(signature);
} catch (e) {
return false;
}
if (pubBuffer.length !== 32) {
console.log('public key length: ' + pubBuffer.length);
console.log(publicKey);
return false;
}
2017-03-27 16:15:15 +00:00
if (signatureBuffer.length !== 64) {
return false;
}
2017-03-27 16:15:15 +00:00
return Nacl.sign.detached.verify(signedBuffer, signatureBuffer, pubBuffer);
};
2017-04-10 15:42:35 +00:00
var loadUserPins = function (store, Sessions, publicKey, cb) {
var session = beginSession(Sessions, publicKey);
if (session.channels) {
return cb(session.channels);
}
// if channels aren't in memory. load them from disk
2017-04-03 17:24:57 +00:00
var pins = {};
2017-04-10 15:42:35 +00:00
var pin = function (channel) {
pins[channel] = true;
};
var unpin = function (channel) {
pins[channel] = false;
};
2017-04-03 17:24:57 +00:00
store.getMessages(publicKey, function (msg) {
// handle messages...
var parsed;
try {
parsed = JSON.parse(msg);
switch (parsed[0]) {
case 'PIN':
2017-04-10 15:42:35 +00:00
parsed[1].forEach(pin);
2017-04-03 17:24:57 +00:00
break;
case 'UNPIN':
2017-04-10 15:42:35 +00:00
parsed[1].forEach(unpin);
2017-04-03 17:24:57 +00:00
break;
case 'RESET':
2017-04-10 15:42:35 +00:00
Object.keys(pins).forEach(unpin);
2017-04-07 09:37:19 +00:00
if (parsed[1] && parsed[1].length) {
2017-04-10 15:42:35 +00:00
parsed[1].forEach(pin);
2017-04-07 09:37:19 +00:00
}
2017-04-03 17:24:57 +00:00
break;
default:
console.error('invalid message read from store');
}
} catch (e) {
console.log('invalid message read from store');
console.error(e);
}
}, function () {
// no more messages
2017-04-10 15:42:35 +00:00
// only put this into the cache if it completes
session.channels = pins;
cb(pins);
});
};
var truthyKeys = function (O) {
return Object.keys(O).filter(function (k) {
return O[k];
});
};
var getChannelList = function (store, Sessions, publicKey, cb) {
loadUserPins(store, Sessions, publicKey, function (pins) {
cb(truthyKeys(pins));
2017-04-03 17:24:57 +00:00
});
};
2017-05-10 13:36:14 +00:00
var getUploadSize = function (store, channel, cb) {
var path = '';
Fs.stat(path, function (err, stats) {
if (err) { return void cb(err); }
cb(void 0, stats.size);
});
};
2017-04-07 08:09:59 +00:00
var getFileSize = function (store, channel, cb) {
2017-04-07 08:34:03 +00:00
if (!isValidChannel(channel)) { return void cb('INVALID_CHAN'); }
2017-05-10 13:36:14 +00:00
if (channel.length === 32) {
if (typeof(store.getChannelSize) !== 'function') {
return cb('GET_CHANNEL_SIZE_UNSUPPORTED');
}
return void store.getChannelSize(channel, function (e, size) {
if (e) { return void cb(e.code); }
cb(void 0, size);
});
2017-04-21 12:51:00 +00:00
}
2017-04-07 08:09:59 +00:00
2017-05-10 13:36:14 +00:00
// 'channel' refers to a file, so you need anoter API
getUploadSize(null, channel, function (e, size) {
if (e) { return void cb(e); }
2017-04-07 08:09:59 +00:00
cb(void 0, size);
});
};
2017-04-21 12:51:00 +00:00
var getMultipleFileSize = function (store, channels, cb) {
if (!Array.isArray(channels)) { return cb('INVALID_LIST'); }
if (typeof(store.getChannelSize) !== 'function') {
return cb('GET_CHANNEL_SIZE_UNSUPPORTED');
}
var i = channels.length;
var counts = {};
var done = function () {
i--;
if (i === 0) { return cb(void 0, counts); }
};
channels.forEach(function (channel) {
2017-04-24 09:40:13 +00:00
if (!isValidChannel(channel)) {
counts[channel] = -1;
return done();
}
2017-04-21 12:51:00 +00:00
store.getChannelSize(channel, function (e, size) {
if (e) {
counts[channel] = -1;
return done();
}
counts[channel] = size;
done();
});
});
};
2017-04-10 15:42:35 +00:00
var getTotalSize = function (pinStore, messageStore, Sessions, publicKey, cb) {
2017-04-07 08:09:59 +00:00
var bytes = 0;
2017-04-10 15:42:35 +00:00
return void getChannelList(pinStore, Sessions, publicKey, function (channels) {
2017-04-07 08:09:59 +00:00
if (!channels) { cb('NO_ARRAY'); } // unexpected
var count = channels.length;
if (!count) { cb(void 0, 0); }
channels.forEach(function (channel) {
return messageStore.getChannelSize(channel, function (e, size) {
count--;
if (!e) { bytes += size; }
if (count === 0) { return cb(void 0, bytes); }
});
});
});
};
2017-04-03 17:24:57 +00:00
var hashChannelList = function (A) {
var uniques = [];
A.forEach(function (a) {
if (uniques.indexOf(a) === -1) { uniques.push(a); }
});
uniques.sort();
var hash = Nacl.util.encodeBase64(Nacl.hash(Nacl
.util.decodeUTF8(JSON.stringify(uniques))));
return hash;
};
2017-04-10 15:42:35 +00:00
var getHash = function (store, Sessions, publicKey, cb) {
getChannelList(store, Sessions, publicKey, function (channels) {
2017-04-07 08:30:40 +00:00
cb(void 0, hashChannelList(channels));
});
};
2017-05-04 14:16:09 +00:00
/* var storeMessage = function (store, publicKey, msg, cb) {
2017-04-07 08:30:40 +00:00
store.message(publicKey, JSON.stringify(msg), cb);
2017-05-04 14:16:09 +00:00
}; */
2017-04-07 08:30:40 +00:00
2017-05-10 13:36:14 +00:00
// TODO check if new pinned size exceeds user quota
2017-04-10 15:42:35 +00:00
var pinChannel = function (store, Sessions, publicKey, channels, cb) {
if (!channels && channels.filter) {
// expected array
return void cb('[TYPE_ERROR] pin expects channel list argument');
}
2017-04-07 08:30:40 +00:00
2017-04-10 15:42:35 +00:00
getChannelList(store, Sessions, publicKey, function (pinned) {
var session = beginSession(Sessions, publicKey);
// only pin channels which are not already pinned
var toStore = channels.filter(function (channel) {
return pinned.indexOf(channel) === -1;
});
if (toStore.length === 0) {
return void getHash(store, Sessions, publicKey, cb);
}
store.message(publicKey, JSON.stringify(['PIN', toStore]),
function (e) {
if (e) { return void cb(e); }
toStore.forEach(function (channel) {
session.channels[channel] = true;
});
getHash(store, Sessions, publicKey, cb);
2017-04-07 08:30:40 +00:00
});
2017-04-03 17:24:57 +00:00
});
};
2017-04-10 15:42:35 +00:00
var unpinChannel = function (store, Sessions, publicKey, channels, cb) {
if (!channels && channels.filter) {
// expected array
return void cb('[TYPE_ERROR] unpin expects channel list argument');
}
2017-04-07 08:30:40 +00:00
2017-04-10 15:42:35 +00:00
getChannelList(store, Sessions, publicKey, function (pinned) {
var session = beginSession(Sessions, publicKey);
// only unpin channels which are pinned
var toStore = channels.filter(function (channel) {
return pinned.indexOf(channel) !== -1;
});
if (toStore.length === 0) {
return void getHash(store, Sessions, publicKey, cb);
}
store.message(publicKey, JSON.stringify(['UNPIN', toStore]),
function (e) {
if (e) { return void cb(e); }
toStore.forEach(function (channel) {
2017-05-10 13:36:14 +00:00
delete session.channels[channel];
2017-04-10 15:42:35 +00:00
});
getHash(store, Sessions, publicKey, cb);
2017-04-07 08:30:40 +00:00
});
});
};
2017-05-10 13:36:14 +00:00
// TODO check if new pinned size exceeds user quota
2017-04-10 15:42:35 +00:00
var resetUserPins = function (store, Sessions, publicKey, channelList, cb) {
var session = beginSession(Sessions, publicKey);
var pins = session.channels = {};
2017-04-07 09:37:19 +00:00
store.message(publicKey, JSON.stringify(['RESET', channelList]),
function (e) {
if (e) { return void cb(e); }
2017-04-10 15:42:35 +00:00
channelList.forEach(function (channel) {
pins[channel] = true;
});
2017-04-07 09:37:19 +00:00
2017-04-10 15:42:35 +00:00
getHash(store, Sessions, publicKey, function (e, hash) {
2017-04-07 09:37:19 +00:00
cb(e, hash);
});
});
2017-04-07 08:30:40 +00:00
};
var getPrivilegedUserList = function (cb) {
Fs.readFile('./privileged.conf', 'utf8', function (e, body) {
if (e) {
if (e.code === 'ENOENT') {
return void cb(void 0, []);
}
return void (e.code);
}
var list = body.split(/\n/)
.map(function (line) {
return line.replace(/#.*$/, '').trim();
})
.filter(function (x) { return x; });
cb(void 0, list);
});
};
var isPrivilegedUser = function (publicKey, cb) {
getPrivilegedUserList(function (e, list) {
if (e) { return void cb(false); }
cb(list.indexOf(publicKey) !== -1);
});
};
2017-05-11 14:12:44 +00:00
var limits = {};
var updateLimits = function (publicKey, cb) {
if (typeof cb !== "function") { cb = function () {}; }
var body = JSON.stringify({
domain: config.domain,
subdomain: config.subdomain
});
2017-05-11 14:12:44 +00:00
var options = {
host: 'accounts.cryptpad.fr',
path: '/api/getauthorized',
method: 'POST',
headers: {
"Content-Type": "application/json",
"Content-Length": Buffer.byteLength(body)
}
2017-05-11 14:12:44 +00:00
};
var req = Https.request(options, function (response) {
if (!('' + req.statusCode).match(/^2\d\d$/)) {
return void cb('SERVER ERROR ' + req.statusCode);
}
2017-05-11 14:12:44 +00:00
var str = '';
response.on('data', function (chunk) {
str += chunk;
});
response.on('end', function () {
try {
var json = JSON.parse(str);
limits = json;
var l;
if (publicKey) {
l = typeof limits[publicKey] === "number" ? limits[publicKey] : DEFAULT_LIMIT;
}
cb(void 0, l);
} catch (e) {
cb(e);
}
});
});
req.on('error', function (e) {
2017-05-11 14:12:44 +00:00
console.error(e);
cb(e);
});
req.end(body);
2017-05-11 14:12:44 +00:00
};
var getLimit = function (publicKey, cb) {
return void cb(null, typeof limits[publicKey] === "number" ? limits[publicKey] : DEFAULT_LIMIT);
2017-04-28 09:46:13 +00:00
};
var safeMkdir = function (path, cb) {
Fs.mkdir(path, function (e) {
if (!e || e.code === 'EEXIST') { return void cb(); }
cb(e);
});
2017-04-28 09:46:13 +00:00
};
2017-05-04 09:36:56 +00:00
var makeFilePath = function (root, id) {
if (typeof(id) !== 'string' || id.length <= 2) { return null; }
return Path.join(root, id.slice(0, 2), id);
};
var makeFileStream = function (root, id, cb) {
var stub = id.slice(0, 2);
var full = makeFilePath(root, id);
safeMkdir(Path.join(root, stub), function (e) {
if (e) { return void cb(e); }
try {
var stream = Fs.createWriteStream(full, {
flags: 'a',
encoding: 'binary',
});
stream.on('open', function () {
cb(void 0, stream);
});
} catch (err) {
cb('BAD_STREAM');
}
});
};
2017-05-10 13:36:14 +00:00
var upload = function (paths, Sessions, publicKey, content, cb) {
2017-05-04 09:46:11 +00:00
var dec = new Buffer(Nacl.util.decodeBase64(content)); // jshint ignore:line
2017-04-28 09:46:13 +00:00
2017-05-04 09:36:56 +00:00
var session = Sessions[publicKey];
session.atime = +new Date();
2017-05-04 09:36:56 +00:00
if (!session.blobstage) {
2017-05-10 13:36:14 +00:00
makeFileStream(paths.staging, publicKey, function (e, stream) {
2017-05-04 09:36:56 +00:00
if (e) { return void cb(e); }
2017-04-28 15:11:50 +00:00
2017-05-04 09:36:56 +00:00
var blobstage = session.blobstage = stream;
blobstage.write(dec);
cb(void 0, dec.length);
});
} else {
session.blobstage.write(dec);
cb(void 0, dec.length);
}
};
2017-05-10 13:36:14 +00:00
var upload_cancel = function (paths, Sessions, publicKey, cb) {
var path = makeFilePath(paths.staging, publicKey);
2017-05-04 09:36:56 +00:00
if (!path) {
2017-05-10 13:36:14 +00:00
console.log(paths.staging, publicKey);
2017-05-04 09:36:56 +00:00
console.log(path);
return void cb('NO_FILE');
}
Fs.unlink(path, function (e) {
if (e) { return void cb('E_UNLINK'); }
cb(void 0);
});
2017-04-28 15:11:50 +00:00
};
2017-05-04 09:36:56 +00:00
var isFile = function (filePath, cb) {
Fs.stat(filePath, function (e, stats) {
if (e) {
if (e.code === 'ENOENT') { return void cb(void 0, false); }
return void cb(e.message);
}
return void cb(void 0, stats.isFile());
});
};
2017-05-10 13:36:14 +00:00
/* TODO
change channel IDs to a different length so that when we pin, we will be able
to tell that it is not a channel, but a file, just by its length.
also, when your upload is complete, pin the resulting file.
*/
var upload_complete = function (paths, Sessions, publicKey, cb) {
2017-05-04 09:36:56 +00:00
var session = Sessions[publicKey];
if (session.blobstage && session.blobstage.close) {
session.blobstage.close();
delete session.blobstage;
}
2017-05-10 13:36:14 +00:00
var oldPath = makeFilePath(paths.staging, publicKey);
2017-05-04 09:36:56 +00:00
var tryRandomLocation = function (cb) {
2017-05-10 13:36:14 +00:00
var id = createFileId();
2017-05-04 09:36:56 +00:00
var prefix = id.slice(0, 2);
2017-05-10 13:36:14 +00:00
var newPath = makeFilePath(paths.blob, id);
2017-05-04 09:36:56 +00:00
2017-05-10 13:36:14 +00:00
safeMkdir(Path.join(paths.blob, prefix), function (e) {
2017-05-04 09:36:56 +00:00
if (e) {
console.error(e);
return void cb('RENAME_ERR');
}
isFile(newPath, function (e, yes) {
if (e) {
console.error(e);
return void cb(e);
}
if (yes) {
return void tryRandomLocation(cb);
}
cb(void 0, newPath, id);
});
});
};
tryRandomLocation(function (e, newPath, id) {
Fs.rename(oldPath, newPath, function (e) {
if (e) {
console.error(e);
return cb(e);
}
cb(void 0, id);
});
});
};
2017-05-10 13:36:14 +00:00
/* TODO
when asking about your upload status, also send some information about how big
your upload is going to be. if that would exceed your limit, return TOO_LARGE
error.
*/
var upload_status = function (paths, Sessions, publicKey, cb) {
var filePath = makeFilePath(paths.staging, publicKey);
2017-05-04 09:36:56 +00:00
if (!filePath) { return void cb('E_INVALID_PATH'); }
isFile(filePath, function (e, yes) {
cb(e, yes);
});
2017-04-28 09:46:13 +00:00
};
2017-04-25 14:04:17 +00:00
/*::const ConfigType = require('./config.example.js');*/
RPC.create = function (config /*:typeof(ConfigType)*/, cb /*:(?Error, ?Function)=>void*/) {
// load pin-store...
console.log('loading rpc module...');
2017-03-27 16:15:15 +00:00
2017-04-10 15:42:35 +00:00
var Sessions = {};
2017-03-27 16:15:15 +00:00
2017-05-04 09:36:56 +00:00
var keyOrDefaultString = function (key, def) {
return typeof(config[key]) === 'string'? config[key]: def;
};
2017-05-10 13:36:14 +00:00
var paths = {};
var pinPath = paths.pin = keyOrDefaultString('pinPath', './pins');
var blobPath = paths.blob = keyOrDefaultString('blobPath', './blob');
var blobStagingPath = paths.staging = keyOrDefaultString('blobStagingPath', './blobstage');
2017-05-04 09:36:56 +00:00
2017-04-03 17:24:57 +00:00
var store;
2017-03-27 16:15:15 +00:00
2017-04-25 14:04:17 +00:00
var rpc = function (
ctx /*:{ store: Object }*/,
data /*:Array<Array<any>>*/,
respond /*:(?string, ?Array<any>)=>void*/)
{
2017-04-24 10:10:12 +00:00
if (!Array.isArray(data)) {
return void respond('INVALID_ARG_FORMAT');
}
2017-03-27 16:15:15 +00:00
if (!data.length) {
return void respond("INSUFFICIENT_ARGS");
2017-03-27 16:15:15 +00:00
} else if (data.length !== 1) {
2017-04-24 10:10:12 +00:00
console.log('[UNEXPECTED_ARGUMENTS_LENGTH] %s', data.length);
}
2017-03-27 16:15:15 +00:00
var msg = data[0].slice(0);
2017-04-03 17:24:57 +00:00
2017-04-24 10:10:12 +00:00
if (!Array.isArray(msg)) {
return void respond('INVALID_ARG_FORMAT');
}
2017-03-27 16:15:15 +00:00
var signature = msg.shift();
var publicKey = msg.shift();
// make sure a user object is initialized in the cookie jar
2017-04-10 15:42:35 +00:00
beginSession(Sessions, publicKey);
var cookie = msg[0];
2017-04-10 15:42:35 +00:00
if (!isValidCookie(Sessions, publicKey, cookie)) {
2017-03-27 16:15:15 +00:00
// no cookie is fine if the RPC is to get a cookie
if (msg[1] !== 'COOKIE') {
2017-03-27 16:15:15 +00:00
return void respond('NO_COOKIE');
}
}
var serialized = JSON.stringify(msg);
2017-04-05 15:28:04 +00:00
if (!(serialized && typeof(publicKey) === 'string')) {
2017-03-27 16:15:15 +00:00
return void respond('INVALID_MESSAGE_OR_PUBLIC_KEY');
}
if (checkSignature(serialized, signature, publicKey) !== true) {
return void respond("INVALID_SIGNATURE_OR_PUBLIC_KEY");
}
2017-04-05 15:28:04 +00:00
var safeKey = publicKey.replace(/\//g, '-');
/* If you have gotten this far, you have signed the message with the
public key which you provided.
We can safely modify the state for that key
*/
// discard validated cookie from message
msg.shift();
var Respond = function (e, msg) {
2017-04-10 15:42:35 +00:00
var token = Sessions[publicKey].tokens.slice(-1)[0];
var cookie = makeCookie(token).join('|');
2017-05-04 09:36:56 +00:00
respond(e, [cookie].concat(typeof(msg) !== 'undefined' ?msg: []));
};
if (typeof(msg) !== 'object' || !msg.length) {
return void Respond('INVALID_MSG');
}
var deny = function () {
Respond('E_ACCESS_DENIED');
};
var handleMessage = function (privileged) {
switch (msg[0]) {
2017-04-07 09:37:19 +00:00
case 'COOKIE': return void Respond(void 0);
case 'RESET':
2017-04-10 15:42:35 +00:00
return resetUserPins(store, Sessions, safeKey, msg[1], function (e, hash) {
2017-04-07 09:37:19 +00:00
return void Respond(e, hash);
2017-04-03 17:24:57 +00:00
});
2017-04-28 09:46:13 +00:00
case 'PIN': // TODO don't pin if over the limit
// if over, send error E_OVER_LIMIT
2017-04-10 15:42:35 +00:00
return pinChannel(store, Sessions, safeKey, msg[1], function (e, hash) {
2017-04-07 08:30:40 +00:00
Respond(e, hash);
2017-04-03 17:24:57 +00:00
});
case 'UNPIN':
2017-04-10 15:42:35 +00:00
return unpinChannel(store, Sessions, safeKey, msg[1], function (e, hash) {
2017-04-07 08:30:40 +00:00
Respond(e, hash);
2017-04-03 17:24:57 +00:00
});
case 'GET_HASH':
2017-04-10 15:42:35 +00:00
return void getHash(store, Sessions, safeKey, function (e, hash) {
2017-04-07 08:30:40 +00:00
Respond(e, hash);
2017-04-03 17:24:57 +00:00
});
2017-04-28 09:46:13 +00:00
case 'GET_TOTAL_SIZE': // TODO cache this, since it will get called quite a bit
2017-04-10 15:42:35 +00:00
return getTotalSize(store, ctx.store, Sessions, safeKey, function (e, size) {
2017-04-07 08:09:59 +00:00
if (e) { return void Respond(e); }
Respond(e, size);
2017-03-15 14:55:25 +00:00
});
2017-04-07 08:09:59 +00:00
case 'GET_FILE_SIZE':
return void getFileSize(ctx.store, msg[1], Respond);
2017-05-11 14:12:44 +00:00
case 'UPDATE_LIMITS':
return void updateLimits(safeKey, function (e, limit) {
if (e) { return void Respond(e); }
Respond(void 0, limit);
});
case 'GET_LIMIT':
return void getLimit(safeKey, function (e, limit) {
if (e) { return void Respond(e); }
2017-05-04 14:16:09 +00:00
limit = limit;
2017-05-11 14:12:44 +00:00
Respond(void 0, limit);
2017-04-28 09:46:13 +00:00
});
2017-04-21 12:51:00 +00:00
case 'GET_MULTIPLE_FILE_SIZE':
return void getMultipleFileSize(ctx.store, msg[1], function (e, dict) {
if (e) { return void Respond(e); }
Respond(void 0, dict);
});
2017-04-28 15:11:50 +00:00
// restricted to privileged users...
2017-04-28 15:11:50 +00:00
case 'UPLOAD':
if (!privileged) { return deny(); }
2017-05-10 13:36:14 +00:00
return void upload(paths, Sessions, safeKey, msg[1], function (e, len) {
2017-05-04 09:36:56 +00:00
Respond(e, len);
});
case 'UPLOAD_STATUS':
if (!privileged) { return deny(); }
2017-05-10 13:36:14 +00:00
return void upload_status(paths, Sessions, safeKey, function (e, stat) {
2017-05-04 09:36:56 +00:00
Respond(e, stat);
});
case 'UPLOAD_COMPLETE':
if (!privileged) { return deny(); }
2017-05-10 13:36:14 +00:00
return void upload_complete(paths, Sessions, safeKey, function (e, hash) {
2017-05-04 09:36:56 +00:00
Respond(e, hash);
2017-04-28 15:11:50 +00:00
});
2017-05-04 09:36:56 +00:00
case 'UPLOAD_CANCEL':
if (!privileged) { return deny(); }
2017-05-10 13:36:14 +00:00
return void upload_cancel(paths, Sessions, safeKey, function (e) {
2017-04-28 15:11:50 +00:00
Respond(e);
});
default:
return void Respond('UNSUPPORTED_RPC_CALL', msg);
}
};
// reject uploads unless explicitly enabled
if (config.enableUploads !== true) {
return void handleMessage(false);
}
// restrict upload capability unless explicitly disabled
if (config.restrictUploads === false) {
return void handleMessage(true);
}
// if session has not been authenticated, do so
var session = Sessions[publicKey];
if (typeof(session.privilege) !== 'boolean') {
return void isPrivilegedUser(publicKey, function (yes) {
session.privilege = yes;
handleMessage(yes);
});
}
// if authenticated, proceed
handleMessage(session.privilege);
};
2017-05-11 14:12:44 +00:00
var updateLimitDaily = function () {
updateLimits(function (e) {
if (e) { console.error('Error updating the storage limits', e); }
});
};
updateLimitDaily();
setInterval(updateLimitDaily, 24*3600*1000);
2017-04-03 17:24:57 +00:00
Store.create({
filePath: pinPath,
2017-04-03 17:24:57 +00:00
}, function (s) {
store = s;
safeMkdir(blobPath, function (e) {
if (e) { throw e; }
safeMkdir(blobStagingPath, function (e) {
if (e) { throw e; }
cb(void 0, rpc);
// expire old sessions once per minute
setInterval(function () {
expireSessions(Sessions);
}, 60000);
2017-04-28 15:11:50 +00:00
});
});
2017-04-03 17:24:57 +00:00
});
};