You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
394 lines
10 KiB
394 lines
10 KiB
const tcpp = require("tcp-ping");
|
|
const Ping = require("./ping-lite");
|
|
const { R } = require("redbean-node");
|
|
const { log, genSecret } = require("../src/util");
|
|
const passwordHash = require("./password-hash");
|
|
const { Resolver } = require("dns");
|
|
const childProcess = require("child_process");
|
|
const iconv = require("iconv-lite");
|
|
const chardet = require("chardet");
|
|
const fs = require("fs");
|
|
const nodeJsUtil = require("util");
|
|
|
|
// From ping-lite
|
|
exports.WIN = /^win/.test(process.platform);
|
|
exports.LIN = /^linux/.test(process.platform);
|
|
exports.MAC = /^darwin/.test(process.platform);
|
|
exports.FBSD = /^freebsd/.test(process.platform);
|
|
exports.BSD = /bsd$/.test(process.platform);
|
|
|
|
/**
|
|
* Init or reset JWT secret
|
|
* @returns {Promise<Bean>}
|
|
*/
|
|
exports.initJWTSecret = async () => {
|
|
let jwtSecretBean = await R.findOne("setting", " `key` = ? ", [
|
|
"jwtSecret",
|
|
]);
|
|
|
|
if (! jwtSecretBean) {
|
|
jwtSecretBean = R.dispense("setting");
|
|
jwtSecretBean.key = "jwtSecret";
|
|
}
|
|
|
|
jwtSecretBean.value = passwordHash.generate(genSecret());
|
|
await R.store(jwtSecretBean);
|
|
return jwtSecretBean;
|
|
};
|
|
|
|
exports.tcping = function (hostname, port) {
|
|
return new Promise((resolve, reject) => {
|
|
tcpp.ping({
|
|
address: hostname,
|
|
port: port,
|
|
attempts: 1,
|
|
}, function (err, data) {
|
|
|
|
if (err) {
|
|
reject(err);
|
|
}
|
|
|
|
if (data.results.length >= 1 && data.results[0].err) {
|
|
reject(data.results[0].err);
|
|
}
|
|
|
|
resolve(Math.round(data.max));
|
|
});
|
|
});
|
|
};
|
|
|
|
exports.ping = async (hostname) => {
|
|
try {
|
|
return await exports.pingAsync(hostname);
|
|
} catch (e) {
|
|
// If the host cannot be resolved, try again with ipv6
|
|
if (e.message.includes("service not known")) {
|
|
return await exports.pingAsync(hostname, true);
|
|
} else {
|
|
throw e;
|
|
}
|
|
}
|
|
};
|
|
|
|
exports.pingAsync = function (hostname, ipv6 = false) {
|
|
return new Promise((resolve, reject) => {
|
|
const ping = new Ping(hostname, {
|
|
ipv6
|
|
});
|
|
|
|
ping.send(function (err, ms, stdout) {
|
|
if (err) {
|
|
reject(err);
|
|
} else if (ms === null) {
|
|
reject(new Error(stdout));
|
|
} else {
|
|
resolve(Math.round(ms));
|
|
}
|
|
});
|
|
});
|
|
};
|
|
|
|
exports.dnsResolve = function (hostname, resolverServer, rrtype) {
|
|
const resolver = new Resolver();
|
|
resolver.setServers([resolverServer]);
|
|
return new Promise((resolve, reject) => {
|
|
if (rrtype == "PTR") {
|
|
resolver.reverse(hostname, (err, records) => {
|
|
if (err) {
|
|
reject(err);
|
|
} else {
|
|
resolve(records);
|
|
}
|
|
});
|
|
} else {
|
|
resolver.resolve(hostname, rrtype, (err, records) => {
|
|
if (err) {
|
|
reject(err);
|
|
} else {
|
|
resolve(records);
|
|
}
|
|
});
|
|
}
|
|
});
|
|
};
|
|
|
|
exports.setting = async function (key) {
|
|
let value = await R.getCell("SELECT `value` FROM setting WHERE `key` = ? ", [
|
|
key,
|
|
]);
|
|
|
|
try {
|
|
const v = JSON.parse(value);
|
|
log.debug("util", `Get Setting: ${key}: ${v}`);
|
|
return v;
|
|
} catch (e) {
|
|
return value;
|
|
}
|
|
};
|
|
|
|
exports.setSetting = async function (key, value, type = null) {
|
|
let bean = await R.findOne("setting", " `key` = ? ", [
|
|
key,
|
|
]);
|
|
if (!bean) {
|
|
bean = R.dispense("setting");
|
|
bean.key = key;
|
|
}
|
|
bean.type = type;
|
|
bean.value = JSON.stringify(value);
|
|
await R.store(bean);
|
|
};
|
|
|
|
exports.getSettings = async function (type) {
|
|
let list = await R.getAll("SELECT `key`, `value` FROM setting WHERE `type` = ? ", [
|
|
type,
|
|
]);
|
|
|
|
let result = {};
|
|
|
|
for (let row of list) {
|
|
try {
|
|
result[row.key] = JSON.parse(row.value);
|
|
} catch (e) {
|
|
result[row.key] = row.value;
|
|
}
|
|
}
|
|
|
|
return result;
|
|
};
|
|
|
|
exports.setSettings = async function (type, data) {
|
|
let keyList = Object.keys(data);
|
|
|
|
let promiseList = [];
|
|
|
|
for (let key of keyList) {
|
|
let bean = await R.findOne("setting", " `key` = ? ", [
|
|
key
|
|
]);
|
|
|
|
if (bean == null) {
|
|
bean = R.dispense("setting");
|
|
bean.type = type;
|
|
bean.key = key;
|
|
}
|
|
|
|
if (bean.type === type) {
|
|
bean.value = JSON.stringify(data[key]);
|
|
promiseList.push(R.store(bean));
|
|
}
|
|
}
|
|
|
|
await Promise.all(promiseList);
|
|
};
|
|
|
|
// ssl-checker by @dyaa
|
|
// param: res - response object from axios
|
|
// return an object containing the certificate information
|
|
|
|
const getDaysBetween = (validFrom, validTo) =>
|
|
Math.round(Math.abs(+validFrom - +validTo) / 8.64e7);
|
|
|
|
const getDaysRemaining = (validFrom, validTo) => {
|
|
const daysRemaining = getDaysBetween(validFrom, validTo);
|
|
if (new Date(validTo).getTime() < new Date().getTime()) {
|
|
return -daysRemaining;
|
|
}
|
|
return daysRemaining;
|
|
};
|
|
|
|
// Fix certificate Info for display
|
|
// param: info - the chain obtained from getPeerCertificate()
|
|
const parseCertificateInfo = function (info) {
|
|
let link = info;
|
|
let i = 0;
|
|
|
|
const existingList = {};
|
|
|
|
while (link) {
|
|
log.debug("util", `[${i}] ${link.fingerprint}`);
|
|
|
|
if (!link.valid_from || !link.valid_to) {
|
|
break;
|
|
}
|
|
link.validTo = new Date(link.valid_to);
|
|
link.validFor = link.subjectaltname?.replace(/DNS:|IP Address:/g, "").split(", ");
|
|
link.daysRemaining = getDaysRemaining(new Date(), link.validTo);
|
|
|
|
existingList[link.fingerprint] = true;
|
|
|
|
// Move up the chain until loop is encountered
|
|
if (link.issuerCertificate == null) {
|
|
break;
|
|
} else if (link.issuerCertificate.fingerprint in existingList) {
|
|
log.debug("util", `[Last] ${link.issuerCertificate.fingerprint}`);
|
|
link.issuerCertificate = null;
|
|
break;
|
|
} else {
|
|
link = link.issuerCertificate;
|
|
}
|
|
|
|
// Should be no use, but just in case.
|
|
if (i > 500) {
|
|
throw new Error("Dead loop occurred in parseCertificateInfo");
|
|
}
|
|
i++;
|
|
}
|
|
|
|
return info;
|
|
};
|
|
|
|
exports.checkCertificate = function (res) {
|
|
const info = res.request.res.socket.getPeerCertificate(true);
|
|
const valid = res.request.res.socket.authorized || false;
|
|
|
|
log.debug("util", "Parsing Certificate Info");
|
|
const parsedInfo = parseCertificateInfo(info);
|
|
|
|
return {
|
|
valid: valid,
|
|
certInfo: parsedInfo
|
|
};
|
|
};
|
|
|
|
// Check if the provided status code is within the accepted ranges
|
|
// Param: status - the status code to check
|
|
// Param: accepted_codes - an array of accepted status codes
|
|
// Return: true if the status code is within the accepted ranges, false otherwise
|
|
// Will throw an error if the provided status code is not a valid range string or code string
|
|
|
|
exports.checkStatusCode = function (status, acceptedCodes) {
|
|
if (acceptedCodes == null || acceptedCodes.length === 0) {
|
|
return false;
|
|
}
|
|
|
|
for (const codeRange of acceptedCodes) {
|
|
const codeRangeSplit = codeRange.split("-").map(string => parseInt(string));
|
|
if (codeRangeSplit.length === 1) {
|
|
if (status === codeRangeSplit[0]) {
|
|
return true;
|
|
}
|
|
} else if (codeRangeSplit.length === 2) {
|
|
if (status >= codeRangeSplit[0] && status <= codeRangeSplit[1]) {
|
|
return true;
|
|
}
|
|
} else {
|
|
throw new Error("Invalid status code range");
|
|
}
|
|
}
|
|
|
|
return false;
|
|
};
|
|
|
|
exports.getTotalClientInRoom = (io, roomName) => {
|
|
|
|
const sockets = io.sockets;
|
|
|
|
if (! sockets) {
|
|
return 0;
|
|
}
|
|
|
|
const adapter = sockets.adapter;
|
|
|
|
if (! adapter) {
|
|
return 0;
|
|
}
|
|
|
|
const room = adapter.rooms.get(roomName);
|
|
|
|
if (room) {
|
|
return room.size;
|
|
} else {
|
|
return 0;
|
|
}
|
|
};
|
|
|
|
exports.allowDevAllOrigin = (res) => {
|
|
if (process.env.NODE_ENV === "development") {
|
|
exports.allowAllOrigin(res);
|
|
}
|
|
};
|
|
|
|
exports.allowAllOrigin = (res) => {
|
|
res.header("Access-Control-Allow-Origin", "*");
|
|
res.header("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept");
|
|
};
|
|
|
|
exports.checkLogin = (socket) => {
|
|
if (! socket.userID) {
|
|
throw new Error("You are not logged in.");
|
|
}
|
|
};
|
|
|
|
/**
|
|
* For logged-in users, double-check the password
|
|
* @param socket
|
|
* @param currentPassword
|
|
* @returns {Promise<Bean>}
|
|
*/
|
|
exports.doubleCheckPassword = async (socket, currentPassword) => {
|
|
if (typeof currentPassword !== "string") {
|
|
throw new Error("Wrong data type?");
|
|
}
|
|
|
|
let user = await R.findOne("user", " id = ? AND active = 1 ", [
|
|
socket.userID,
|
|
]);
|
|
|
|
if (!user || !passwordHash.verify(currentPassword, user.password)) {
|
|
throw new Error("Incorrect current password");
|
|
}
|
|
|
|
return user;
|
|
};
|
|
|
|
exports.startUnitTest = async () => {
|
|
console.log("Starting unit test...");
|
|
const npm = /^win/.test(process.platform) ? "npm.cmd" : "npm";
|
|
const child = childProcess.spawn(npm, ["run", "jest"]);
|
|
|
|
child.stdout.on("data", (data) => {
|
|
console.log(data.toString());
|
|
});
|
|
|
|
child.stderr.on("data", (data) => {
|
|
console.log(data.toString());
|
|
});
|
|
|
|
child.on("close", function (code) {
|
|
console.log("Jest exit code: " + code);
|
|
process.exit(code);
|
|
});
|
|
};
|
|
|
|
/**
|
|
* @param body : Buffer
|
|
* @returns {string}
|
|
*/
|
|
exports.convertToUTF8 = (body) => {
|
|
const guessEncoding = chardet.detect(body);
|
|
const str = iconv.decode(body, guessEncoding);
|
|
return str.toString();
|
|
};
|
|
|
|
let logFile;
|
|
|
|
try {
|
|
logFile = fs.createWriteStream("./data/error.log", {
|
|
flags: "a"
|
|
});
|
|
} catch (_) { }
|
|
|
|
exports.errorLog = (error, outputToConsole = true) => {
|
|
try {
|
|
if (logFile) {
|
|
const dateTime = R.isoDateTime();
|
|
logFile.write(`[${dateTime}] ` + nodeJsUtil.format(error) + "\n");
|
|
|
|
if (outputToConsole) {
|
|
console.error(error);
|
|
}
|
|
}
|
|
} catch (_) { }
|
|
};
|