import * as app from './app.js'; import * as form from './form.js'; import * as http from './http.js'; let gProcesses = {}; let gStatsTimer = false; const k_content_security_policy = 'sandbox allow-downloads allow-top-navigation-by-user-activation'; const k_global_settings = { index: { type: 'string', default_value: '/~core/apps/', description: 'Default path.', }, index_map: { type: 'textarea', default_value: undefined, description: 'Mappings from hostname to redirect path, one per line, as in: "www.tildefriends.net=/~core/index/"', }, room: { type: 'boolean', default_value: true, description: 'Enable peers to tunnel through this instance as a room.', }, room_name: { type: 'string', default_value: 'tilde friends tunnel', description: 'Name of the room.', }, replicator: { type: 'boolean', default_value: true, description: 'Enable message and blob replication.', }, code_of_conduct: { type: 'textarea', default_value: undefined, description: 'Code of conduct presented at sign-in.', }, http_redirect: { type: 'string', default_value: undefined, description: 'If connecting by HTTP and HTTPS is configured, Location header prefix (ie, "https://example.com")', }, fetch_hosts: { type: 'string', default_value: undefined, description: 'Comma-separated list of host names to which HTTP fetch requests are allowed. None if empty.', }, blob_fetch_age_seconds: { type: 'integer', default_value: platform() == 'android' || platform() == 'iphone' ? 0.5 * 365 * 24 * 60 * 60 : undefined, description: 'Only blobs mentioned more recently than this age will be automatically fetched.', }, blob_expire_age_seconds: { type: 'integer', default_value: platform() == 'android' || platform() == 'iphone' ? 1.0 * 365 * 24 * 60 * 60 : undefined, description: 'Blobs older than this will be automatically deleted.', }, seeds_host: { type: 'string', default_value: 'seeds.tildefriends.net', description: 'Hostname for seed connections.', }, peer_exchange: { type: 'boolean', default_value: false, description: 'Enable discovery of, sharing of, and connecting to internet peer strangers, including announcing this instance.', }, }; let gGlobalSettings = { index: '/~core/apps/', }; let kPingInterval = 60 * 1000; /** * TODOC * @param {*} out * @param {*} error */ function printError(out, error) { if (error.stackTrace) { out.print(error.fileName + ':' + error.lineNumber + ': ' + error.message); out.print(error.stackTrace); } else { for (let [k, v] of Object.entries(error)) { out.print(k, v); } out.print(error.toString()); } } /** * TODOC * @param {*} handlers * @param {*} argv * @returns */ function invoke(handlers, argv) { let promises = []; if (handlers) { for (let i = 0; i < handlers.length; ++i) { try { promises.push(handlers[i](...argv)); } catch (error) { handlers.splice(i, 1); i--; promises.push( new Promise(function (resolve, reject) { reject(error); }) ); } } } return Promise.all(promises); } /** * TODOC * @param {*} eventName * @param {*} argv * @returns */ function broadcastEvent(eventName, argv) { let promises = []; for (let process of Object.values(gProcesses)) { if (process.eventHandlers[eventName]) { promises.push(invoke(process.eventHandlers[eventName], argv)); } } return Promise.all(promises); } /** * TODOC * @param {*} message * @returns */ function broadcast(message) { let sender = this; let promises = []; for (let process of Object.values(gProcesses)) { if ( process != sender && process.packageOwner == sender.packageOwner && process.packageName == sender.packageName ) { let from = getUser(process, sender); promises.push(postMessageInternal(from, process, message)); } } return Promise.all(promises); } /** * TODOC * @param {String} eventName * @param {*} argv * @returns */ function broadcastAppEventToUser( user, packageOwner, packageName, eventName, argv ) { let promises = []; for (let process of Object.values(gProcesses)) { if ( process.credentials?.session?.name === user && process.packageOwner == packageOwner && process.packageName == packageName ) { if (process.eventHandlers[eventName]) { promises.push(invoke(process.eventHandlers[eventName], argv)); } } } return Promise.all(promises); } /** * TODOC * @param {*} caller * @param {*} process * @returns */ function getUser(caller, process) { return { key: process.key, packageOwner: process.packageOwner, packageName: process.packageName, credentials: process.credentials, postMessage: postMessageInternal.bind(caller, caller, process), }; } /** * TODOC * @param {*} user * @param {*} process * @returns */ async function getApps(user, process) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { if (user && user !== process.credentials.session.name && user !== 'core') { return {}; } else if (!user) { user = process.credentials.session.name; } } if (user) { let db = new Database(user); try { let names = JSON.parse(await db.get('apps')); let result = {}; for (let name of names) { result[name] = await db.get('path:' + name); } return result; } catch {} } return {}; } /** * TODOC * @param {*} from * @param {*} to * @param {*} message * @returns */ function postMessageInternal(from, to, message) { if (to.eventHandlers['message']) { return invoke(to.eventHandlers['message'], [getUser(from, from), message]); } } /** * TODOC * @param {*} blobId * @param {*} session * @param {*} options * @returns */ async function getSessionProcessBlob(blobId, session, options) { let actualOptions = {timeout: kPingInterval}; if (options) { for (let i in options) { actualOptions[i] = options[i]; } } return getProcessBlob(blobId, 'session_' + session, actualOptions); } /** * TODOC * @param {*} blobId * @param {*} key * @param {*} options * @returns */ async function getProcessBlob(blobId, key, options) { // TODO(tasiaiso): break this down ? let process = gProcesses[key]; if (!process && !(options && 'create' in options && !options.create)) { let resolveReady; let rejectReady; try { print('Creating task for ' + blobId + ' ' + key); process = {}; process.key = key; process.credentials = options.credentials || {}; process.task = new Task(); process.packageOwner = options.packageOwner; process.packageName = options.packageName; process.eventHandlers = {}; if (!options?.script || options?.script === 'app.js') { process.app = new app.App(); } process.lastActive = Date.now(); process.lastPing = null; process.timeout = options.timeout; process.ready = new Promise(function (resolve, reject) { resolveReady = resolve; rejectReady = reject; }); gProcesses[key] = process; process.task.onExit = function (exitCode, terminationSignal) { broadcastEvent('onSessionEnd', [getUser(process, process)]); process.task = null; delete gProcesses[key]; }; let imports = { core: { broadcast: broadcast.bind(process), register: function (eventName, handler) { if (!process.eventHandlers[eventName]) { process.eventHandlers[eventName] = []; } process.eventHandlers[eventName].push(handler); }, unregister: function (eventName, handler) { if (process.eventHandlers[eventName]) { let index = process.eventHandlers[eventName].indexOf(handler); if (index != -1) { process.eventHandlers[eventName].splice(index, 1); } if (process.eventHandlers[eventName].length == 0) { delete process.eventHandlers[eventName]; } } }, user: getUser(process, process), users: async function () { try { return JSON.parse(await new Database('auth').get('users')); } catch { return []; } }, permissionsGranted: function () { let user = process?.credentials?.session?.name; if ( user && options?.packageOwner && options?.packageName && gGlobalSettings.userPermissions && gGlobalSettings.userPermissions[user] && gGlobalSettings.userPermissions[user][options.packageOwner] ) { return gGlobalSettings.userPermissions[user][ options.packageOwner ][options.packageName]; } }, allPermissionsGranted: function () { let user = process?.credentials?.session?.name; if ( user && options?.packageOwner && options?.packageName && gGlobalSettings.userPermissions && gGlobalSettings.userPermissions[user] ) { return gGlobalSettings.userPermissions[user]; } }, permissionsForUser: function (user) { return ( (gGlobalSettings?.permissions ? gGlobalSettings.permissions[user] : []) ?? [] ); }, apps: (user) => getApps(user, process), getSockets: getSockets, permissionTest: function (permission) { let user = process?.credentials?.session?.name; if (!user || !options?.packageOwner || !options?.packageName) { return; } else if ( gGlobalSettings.userPermissions && gGlobalSettings.userPermissions[user] && gGlobalSettings.userPermissions[user][options.packageOwner] && gGlobalSettings.userPermissions[user][options.packageOwner][ options.packageName ] && gGlobalSettings.userPermissions[user][options.packageOwner][ options.packageName ][permission] !== undefined ) { if ( gGlobalSettings.userPermissions[user][options.packageOwner][ options.packageName ][permission] ) { return true; } else { throw Error(`Permission denied: ${permission}.`); } } else if (process.app) { return process.app .makeFunction(['requestPermission'])(permission) .then(function (value) { if (value == 'allow') { storePermission( user, options.packageOwner, options.packageName, permission, true ); process.sendPermissions(); return true; } else if (value == 'allow once') { return true; } else if (value == 'deny') { storePermission( user, options.packageOwner, options.packageName, permission, false ); process.sendPermissions(); throw Error(`Permission denied: ${permission}.`); } else if (value == 'deny once') { throw Error(`Permission denied: ${permission}.`); } throw Error(`Permission denied: ${permission}.`); }); } else { throw Error(`Permission denied: ${permission}.`); } }, app: { owner: options?.packageOwner, name: options?.packageName, }, url: options?.url, }, }; process.sendIdentities = async function () { process.app.send( Object.assign( { action: 'identities', }, await ssb.getIdentityInfo( process?.credentials?.session?.name, options?.packageOwner, options?.packageName ) ) ); }; process.setActiveIdentity = async function (identity) { if ( process?.credentials?.session?.name && options.packageOwner && options.packageName ) { await new Database(process?.credentials?.session?.name).set( `id:${options.packageOwner}:${options.packageName}`, identity ); } process.sendIdentities(); broadcastAppEventToUser( process?.credentials?.session?.name, options.packageOwner, options.packageName, 'setActiveIdentity', [identity] ); }; process.createIdentity = async function () { if ( process.credentials && process.credentials.session && process.credentials.session.name && process.credentials.session.name !== 'guest' ) { let id = await ssb.createIdentity(process.credentials.session.name); await process.sendIdentities(); broadcastAppEventToUser( process?.credentials?.session?.name, options.packageOwner, options.packageName, 'setActiveIdentity', [ await ssb.getActiveIdentity( process.credentials?.session?.name, options.packageOwner, options.packageName ), ] ); return id; } else { throw new Error('Must be signed-in to create an account.'); } }; if (process.credentials?.permissions?.administration) { imports.core.globalSettingsDescriptions = function () { let settings = Object.assign({}, k_global_settings); for (let [key, value] of Object.entries(gGlobalSettings)) { if (settings[key]) { settings[key].value = value; } } return settings; }; imports.core.globalSettingsGet = function (key) { return gGlobalSettings[key]; }; imports.core.globalSettingsSet = function (key, value) { print('Setting', key, value); gGlobalSettings[key] = value; setGlobalSettings(gGlobalSettings); print('Done.'); }; imports.core.deleteUser = async function (user) { await imports.core.permissionTest('delete_user'); let db = new Database('auth'); db.remove('user:' + user); let users = new Set(); let users_original = await db.get('users'); try { users = new Set(JSON.parse(users_original)); } catch {} users.delete(user); users = JSON.stringify([...users].sort()); if (users !== users_original) { await db.set('users', users); } }; } if (options.api) { imports.app = {}; for (let i in options.api) { let api = options.api[i]; imports.app[api[0]] = process.app.makeFunction(api); } } for (let [name, f] of Object.entries(options?.imports || {})) { imports[name] = f; } process.task.onPrint = function (args) { if (imports.app) { imports.app.print(...args); } }; process.task.onError = function (error) { try { if (process.app) { process.app.makeFunction(['error'])(error); } else { printError({print: print}, error); } } catch (e) { printError({print: print}, error); } }; imports.ssb = Object.fromEntries( Object.keys(ssb).map((key) => [key, ssb[key].bind(ssb)]) ); imports.ssb.port = tildefriends.ssb_port; imports.ssb.createIdentity = () => process.createIdentity(); imports.ssb.addIdentity = function (id) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return Promise.resolve( imports.core.permissionTest('ssb_id_add') ).then(function () { return ssb.addIdentity(process.credentials.session.name, id); }); } }; imports.ssb.deleteIdentity = function (id) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return Promise.resolve( imports.core.permissionTest('ssb_id_delete') ).then(function () { return ssb.deleteIdentity(process.credentials.session.name, id); }); } }; imports.ssb.setActiveIdentity = (id) => process.setActiveIdentity(id); imports.ssb.getActiveIdentity = () => ssb.getActiveIdentity( process.credentials?.session?.name, options.packageOwner, options.packageName ); imports.ssb.getOwnerIdentities = function () { if (options.packageOwner) { return ssb.getIdentities(options.packageOwner); } }; imports.ssb.getIdentities = function () { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return ssb.getIdentities(process.credentials.session.name); } }; imports.ssb.getPrivateKey = function (id) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return Promise.resolve( imports.core.permissionTest('ssb_id_export') ).then(function () { return ssb.getPrivateKey(process.credentials.session.name, id); }); } }; imports.ssb.appendMessageWithIdentity = function (id, message) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return Promise.resolve( imports.core.permissionTest('ssb_append') ).then(function () { return ssb.appendMessageWithIdentity( process.credentials.session.name, id, message ); }); } }; imports.ssb.privateMessageEncrypt = function (id, recipients, message) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return ssb.privateMessageEncrypt( process.credentials.session.name, id, recipients, message ); } }; imports.ssb.privateMessageDecrypt = function (id, message) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return ssb.privateMessageDecrypt( process.credentials.session.name, id, message ); } }; imports.ssb.setServerFollowingMe = function (id, following) { if ( process.credentials && process.credentials.session && process.credentials.session.name ) { return ssb.setServerFollowingMe( process.credentials.session.name, id, following ); } }; imports.ssb.addEventListener = undefined; imports.ssb.removeEventListener = undefined; imports.ssb.getIdentityInfo = undefined; imports.fetch = function (url, options) { return http.fetch(url, options, gGlobalSettings.fetch_hosts); }; if ( process.credentials && process.credentials.session && process.credentials.session.name ) { imports.database = function (key) { let db = new Database(process.credentials.session.name + ':' + key); return Object.fromEntries( Object.keys(db).map((x) => [x, db[x].bind(db)]) ); }; imports.my_shared_database = function (packageName, key) { let db = new Database( ':shared:' + process.credentials.session.name + ':' + packageName + ':' + key ); return Object.fromEntries( Object.keys(db).map((x) => [x, db[x].bind(db)]) ); }; imports.databases = function () { return [].concat( databases.list( ':shared:' + process.credentials.session.name + ':%' ), databases.list(process.credentials.session.name + ':%') ); }; } if (options.packageOwner && options.packageName) { imports.shared_database = function (key) { let db = new Database( ':shared:' + options.packageOwner + ':' + options.packageName + ':' + key ); return Object.fromEntries( Object.keys(db).map((x) => [x, db[x].bind(db)]) ); }; } process.sendPermissions = function sendPermissions() { process.app.send({ action: 'permissions', permissions: imports.core.permissionsGranted(), }); }; process.resetPermission = function resetPermission(permission) { let user = process?.credentials?.session?.name; storePermission( user, options?.packageOwner, options?.packageName, permission, undefined ); process.sendPermissions(); }; process.task.setImports(imports); process.task.activate(); let source = await ssb.blobGet(blobId); let appSourceName = blobId; let appSource = utf8Decode(source); try { let appObject = JSON.parse(appSource); if (appObject.type == 'tildefriends-app') { appSourceName = options?.script ?? 'app.js'; let id = appObject.files[appSourceName]; let blob = await ssb.blobGet(id); appSource = utf8Decode(blob); await process.task.loadFile([ '/tfrpc.js', await File.readFile('core/tfrpc.js'), ]); await Promise.all( Object.keys(appObject.files).map(async function (f) { await process.task.loadFile([ f, await ssb.blobGet(appObject.files[f]), ]); }) ); } } catch (e) { printError({print: print}, e); } broadcastEvent('onSessionBegin', [getUser(process, process)]); if (process.app) { process.app.send({action: 'ready', version: version()}); process.sendPermissions(); } await process.task.execute({name: appSourceName, source: appSource}); resolveReady(process); if (!gStatsTimer) { gStatsTimer = true; sendStats(); } } catch (error) { if (process.app) { if (process?.task?.onError) { process.task.onError(error); } else { printError({print: print}, error); } } else { printError({print: print}, error); } rejectReady(error); } } return process; } /** * TODOC * @param {*} settings * @returns */ async function setGlobalSettings(settings) { gGlobalSettings = settings; try { return await new Database('core').set('settings', JSON.stringify(settings)); } catch (error) { print('Error storing settings:', error); } } /** * TODOC * @param {*} response * @param {*} data * @param {*} type * @param {*} headers * @param {*} status_code */ function sendData(response, data, type, headers, status_code) { if (data) { response.writeHead( status_code ?? 200, Object.assign( { 'Content-Type': type || httpd.mime_type_from_magic_bytes(data) || 'application/binary', 'Content-Length': data.byteLength, }, headers || {} ) ); response.end(data); } else { response.writeHead( status_code ?? 404, Object.assign( { 'Content-Type': 'text/plain; charset=utf-8', 'Content-Length': 'File not found'.length, }, headers || {} ) ); response.end('File not found'); } } let g_handler_index = 0; /** * TODOC * @param {*} response * @param {*} handler_blob_id * @param {*} path * @param {*} query * @param {*} headers * @param {*} packageOwner * @param {*} packageName * @returns */ async function useAppHandler( response, handler_blob_id, path, query, headers, packageOwner, packageName ) { print('useAppHandler', packageOwner, packageName); let do_resolve; let promise = new Promise(async function (resolve, reject) { do_resolve = resolve; }); let process; let result; try { process = await getProcessBlob( handler_blob_id, 'handler_' + g_handler_index++, { script: 'handler.js', imports: { request: { path: path, query: query, }, respond: do_resolve, }, credentials: await httpd.auth_query(headers), packageOwner: packageOwner, packageName: packageName, } ); await process.ready; result = await promise; } finally { if (process?.task) { await process.task.kill(); } } return result; } /** * TODOC * @param {*} request * @param {*} response * @param {*} blobId * @param {*} uri * @returns */ async function blobHandler(request, response, blobId, uri) { if (!uri) { response.writeHead(303, { Location: (request.client.tls ? 'https://' : 'http://') + (request.headers['x-forwarded-host'] ?? request.headers.host) + blobId + '/', 'Content-Length': '0', }); response.end(); return; } let process; if (uri == '/view') { let data; let match; let query = form.decodeForm(request.query); let headers = { 'Content-Security-Policy': k_content_security_policy, }; if (query.filename && query.filename.match(/^[A-Za-z0-9\.-]*$/)) { headers['Content-Disposition'] = `attachment; filename=${query.filename}`; } if ((match = /^\/\~(\w+)\/(\w+)$/.exec(blobId))) { let id = await new Database(match[1]).get('path:' + match[2]); if (id) { if (request.headers['if-none-match'] === '"' + id + '"') { headers['Content-Length'] = '0'; response.writeHead(304, headers); response.end(); } else { data = await ssb.blobGet(id); if (match[3]) { let appObject = JSON.parse(data); data = appObject.files[match[3]]; } sendData( response, data, undefined, Object.assign({etag: '"' + id + '"'}, headers) ); } } else { if (request.headers['if-none-match'] === '"' + blobId + '"') { headers['Content-Length'] = '0'; response.writeHead(304, headers); response.end(); } else { sendData( response, data, undefined, Object.assign({etag: '"' + blobId + '"'}, headers) ); } } } else { if (request.headers['if-none-match'] === '"' + blobId + '"') { headers['Content-Length'] = '0'; response.writeHead(304, headers); response.end(); } else { data = await ssb.blobGet(blobId); sendData( response, data, undefined, Object.assign({etag: '"' + blobId + '"'}, headers) ); } } } else if (uri == '/save') { let match; if ((match = /^\/\~(\w+)\/(\w+)$/.exec(blobId))) { let user = match[1]; let appName = match[2]; let credentials = await httpd.auth_query(request.headers); if ( credentials && credentials.session && (credentials.session.name == user || (credentials.permissions.administration && user == 'core')) ) { let database = new Database(user); let app_object = JSON.parse(utf8Decode(request.body)); let previous_id = await database.get('path:' + appName); if (previous_id) { try { let previous_object = JSON.parse( utf8Decode(await ssb.blobGet(previous_id)) ); delete previous_object.previous; delete app_object.previous; if (JSON.stringify(previous_object) == JSON.stringify(app_object)) { response.writeHead(200, { 'Content-Type': 'text/plain; charset=utf-8', }); response.end('/' + previous_id); return; } } catch {} } app_object.previous = previous_id; let newBlobId = await ssb.blobStore(JSON.stringify(app_object)); let apps = new Set(); let apps_original = await database.get('apps'); try { apps = new Set(JSON.parse(apps_original)); } catch {} if (!apps.has(appName)) { apps.add(appName); } apps = JSON.stringify([...apps].sort()); if (apps != apps_original) { await database.set('apps', apps); } await database.set('path:' + appName, newBlobId); response.writeHead(200, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('/' + newBlobId); } else { response.writeHead(401, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('401 Unauthorized'); return; } } else if (blobId === '') { let newBlobId = await ssb.blobStore(request.body); response.writeHead(200, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('/' + newBlobId); } else { response.writeHead(400, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('Invalid name.'); } } else if (uri == '/delete') { let match; if ((match = /^\/\~(\w+)\/(\w+)$/.exec(blobId))) { let user = match[1]; let appName = match[2]; let credentials = await httpd.auth_query(request.headers); if ( credentials && credentials.session && (credentials.session.name == user || (credentials.permissions.administration && user == 'core')) ) { let database = new Database(user); let apps = new Set(); try { apps = new Set(JSON.parse(await database.get('apps'))); } catch {} if (apps.delete(appName)) { await database.set('apps', JSON.stringify([...apps].sort())); } database.remove('path:' + appName); } else { response.writeHead(401, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('401 Unauthorized'); return; } } response.writeHead(200, {'Content-Type': 'text/plain; charset=utf-8'}); response.end('OK'); } else { let data; let match; let id; let app_id = blobId; let packageOwner; let packageName; if ((match = /^\/\~(\w+)\/(\w+)$/.exec(blobId))) { packageOwner = match[1]; packageName = match[2]; let db = new Database(match[1]); app_id = await db.get('path:' + match[2]); } let app_object = JSON.parse(utf8Decode(await ssb.blobGet(app_id))); id = app_object?.files[uri.substring(1)]; if (!id && app_object?.files['handler.js']) { let answer; try { answer = await useAppHandler( response, app_id, uri.substring(1), request.query ? form.decodeForm(request.query) : undefined, request.headers, packageOwner, packageName ); } catch (error) { data = utf8Encode( `Internal Server Error\n\n${error?.message}\n${error?.stack}` ); response.writeHead(500, { 'Content-Type': 'text/plain; charset=utf-8', 'Content-Length': data.length, }); response.end(data); return; } if (answer && typeof answer.data == 'string') { answer.data = utf8Encode(answer.data); } sendData( response, answer?.data, answer?.content_type, Object.assign(answer?.headers ?? {}, { 'Access-Control-Allow-Origin': '*', 'Content-Security-Policy': k_content_security_policy, }), answer.status_code ); } else if (id) { if ( request.headers['if-none-match'] && request.headers['if-none-match'] == '"' + id + '"' ) { let headers = { 'Access-Control-Allow-Origin': '*', 'Content-Security-Policy': k_content_security_policy, 'Content-Length': '0', }; response.writeHead(304, headers); response.end(); } else { let headers = { ETag: '"' + id + '"', 'Access-Control-Allow-Origin': '*', 'Content-Security-Policy': k_content_security_policy, }; data = await ssb.blobGet(id); let type = httpd.mime_type_from_extension(uri) || httpd.mime_type_from_magic_bytes(data); sendData(response, data, type, headers); } } else { sendData(response, data, undefined, {}); } } } ssb.addEventListener('message', function () { broadcastEvent('onMessage', [...arguments]); }); ssb.addEventListener('broadcasts', function () { broadcastEvent('onBroadcastsChanged', []); }); ssb.addEventListener('connections', function () { broadcastEvent('onConnectionsChanged', []); }); /** * TODOC */ async function loadSettings() { let data = {}; try { let settings = await new Database('core').get('settings'); if (settings) { data = JSON.parse(settings); } } catch (error) { print('Settings not found in database:', error); } for (let [key, value] of Object.entries(k_global_settings)) { if (data[key] === undefined) { data[key] = value.default_value; } } gGlobalSettings = data; } /** * TODOC */ function sendStats() { let apps = Object.values(gProcesses) .filter((process) => process.app) .map((process) => process.app); if (apps.length) { let stats = getStats(); for (let app of apps) { app.send({action: 'stats', stats: stats}); } setTimeout(sendStats, 1000); } else { gStatsTimer = false; } } /** * TODOC */ loadSettings() .then(function () { if (tildefriends.https_port && gGlobalSettings.http_redirect) { httpd.set_http_redirect(gGlobalSettings.http_redirect); } httpd.all('/app/socket', app.socket); httpd.all('', function default_http_handler(request, response) { let match; if ((match = /^(\/~[^\/]+\/[^\/]+)(\/?.*)$/.exec(request.uri))) { return blobHandler(request, response, match[1], match[2]); } else if ( (match = /^\/([&\%][^\.]{44}(?:\.\w+)?)(\/?.*)/.exec(request.uri)) ) { return blobHandler(request, response, match[1], match[2]); } else if ((match = /^(.*)(\/(?:save|delete)?)$/.exec(request.uri))) { return blobHandler(request, response, match[1], match[2]); } else { let data = 'File not found.'; response.writeHead(404, { 'Content-Type': 'text/plain; charset=utf-8', 'Content-Length': data.length.toString(), }); return response.end(data); } }); let port = httpd.start(tildefriends.http_port); if (tildefriends.args.out_http_port_file) { print('Writing the port file.'); File.writeFile( tildefriends.args.out_http_port_file, port.toString() + '\n' ) .then(function (r) { print( 'Wrote the port file:', tildefriends.args.out_http_port_file, r ); }) .catch(function () { print('Failed to write the port file.'); }); } if (tildefriends.https_port) { async function start_tls() { const kCertificatePath = 'data/httpd/certificate.pem'; const kPrivateKeyPath = 'data/httpd/privatekey.pem'; let privateKey; let certificate; try { privateKey = utf8Decode(await File.readFile(kPrivateKeyPath)); certificate = utf8Decode(await File.readFile(kCertificatePath)); } catch (e) { print(`TLS disabled (${e.message}).`); return; } let context = new TlsContext(); context.setPrivateKey(privateKey); context.setCertificate(certificate); httpd.start(tildefriends.https_port, context); } start_tls(); } }) .catch(function (error) { print('Failed to load settings.'); printError({print: print}, error); exit(1); }); /** * TODOC * @param {*} user * @param {*} packageOwner * @param {*} packageName * @param {*} permission * @param {*} allow */ function storePermission(user, packageOwner, packageName, permission, allow) { if (!gGlobalSettings.userPermissions) { gGlobalSettings.userPermissions = {}; } if (!gGlobalSettings.userPermissions[user]) { gGlobalSettings.userPermissions[user] = {}; } if (!gGlobalSettings.userPermissions[user][packageOwner]) { gGlobalSettings.userPermissions[user][packageOwner] = {}; } if (!gGlobalSettings.userPermissions[user][packageOwner][packageName]) { gGlobalSettings.userPermissions[user][packageOwner][packageName] = {}; } if ( gGlobalSettings.userPermissions[user][packageOwner][packageName][ permission ] !== allow ) { if (allow === undefined) { delete gGlobalSettings.userPermissions[user][packageOwner][packageName][ permission ]; } else { gGlobalSettings.userPermissions[user][packageOwner][packageName][ permission ] = allow; } setGlobalSettings(gGlobalSettings); } } export { gGlobalSettings as globalSettings, setGlobalSettings, invoke, getSessionProcessBlob, };