iceshrimp/packages/backend/src/server/index.ts

222 lines
5.1 KiB
TypeScript
Raw Normal View History

2016-12-29 07:49:51 +09:00
/**
* Core Server
*/
2023-01-13 13:40:33 +09:00
import cluster from "node:cluster";
import * as fs from "node:fs";
import * as http from "node:http";
import Koa from "koa";
import Router from "@koa/router";
import mount from "koa-mount";
import koaLogger from "koa-logger";
import * as slow from "koa-slow";
import { IsNull } from "typeorm";
import config from "@/config/index.js";
import Logger from "@/services/logger.js";
import { UserProfiles, Users } from "@/models/index.js";
import { genIdenticon } from "@/misc/gen-identicon.js";
import { createTemp } from "@/misc/create-temp.js";
import { publishMainStream } from "@/services/stream.js";
import * as Acct from "@/misc/acct.js";
import { envOption } from "@/env.js";
2023-02-10 08:23:44 +09:00
import megalodon, { MegalodonInterface } from '@cutls/megalodon';
2023-01-13 13:40:33 +09:00
import activityPub from "./activitypub.js";
import nodeinfo from "./nodeinfo.js";
import wellKnown from "./well-known.js";
import apiServer from "./api/index.js";
import fileServer from "./file/index.js";
import proxyServer from "./proxy/index.js";
import webServer from "./web/index.js";
import { initializeStreamingServer } from "./api/streaming.js";
export const serverLogger = new Logger("server", "gray", false);
2017-01-17 08:06:39 +09:00
2018-04-13 06:06:18 +09:00
// Init app
2018-04-13 00:51:55 +09:00
const app = new Koa();
app.proxy = true;
2017-11-13 19:58:29 +09:00
2023-01-13 13:40:33 +09:00
if (!["production", "test"].includes(process.env.NODE_ENV || "")) {
2018-04-19 18:03:46 +09:00
// Logger
2023-01-13 13:40:33 +09:00
app.use(
koaLogger((str) => {
serverLogger.info(str);
}),
);
2018-04-26 11:46:42 +09:00
// Delay
if (envOption.slow) {
2023-01-13 13:40:33 +09:00
app.use(
slow({
delay: 3000,
}),
);
2019-02-04 10:03:49 +09:00
}
2018-04-19 18:03:46 +09:00
}
2018-04-13 00:51:55 +09:00
// HSTS
// 6months (15552000sec)
2023-01-13 13:40:33 +09:00
if (config.url.startsWith("https") && !config.disableHsts) {
2018-04-13 07:34:27 +09:00
app.use(async (ctx, next) => {
2023-01-13 13:40:33 +09:00
ctx.set("strict-transport-security", "max-age=15552000; preload");
2018-04-13 07:34:27 +09:00
await next();
});
}
2023-01-13 13:40:33 +09:00
app.use(mount("/api", apiServer));
app.use(mount("/files", fileServer));
app.use(mount("/proxy", proxyServer));
2018-04-13 06:17:14 +09:00
2018-04-13 00:51:55 +09:00
// Init router
const router = new Router();
2018-04-13 00:51:55 +09:00
// Routing
router.use(activityPub.routes());
router.use(nodeinfo.routes());
router.use(wellKnown.routes());
2018-04-13 06:17:14 +09:00
2023-01-13 13:40:33 +09:00
router.get("/avatar/@:acct", async (ctx) => {
2021-11-12 02:02:25 +09:00
const { username, host } = Acct.parse(ctx.params.acct);
const user = await Users.findOne({
where: {
usernameLower: username.toLowerCase(),
2023-01-13 13:40:33 +09:00
host: host == null || host === config.host ? IsNull() : host,
isSuspended: false,
},
2023-01-13 13:40:33 +09:00
relations: ["avatar"],
});
if (user) {
2022-04-17 21:18:18 +09:00
ctx.redirect(Users.getAvatarUrlSync(user));
} else {
2023-01-13 13:40:33 +09:00
ctx.redirect("/static-assets/user-unknown.png");
}
});
2023-01-13 13:40:33 +09:00
router.get("/identicon/:x", async (ctx) => {
const [temp, cleanup] = await createTemp();
2022-01-16 10:45:48 +09:00
await genIdenticon(ctx.params.x, fs.createWriteStream(temp));
2023-01-13 13:40:33 +09:00
ctx.set("Content-Type", "image/png");
ctx.body = fs.createReadStream(temp).on("close", () => cleanup());
});
2023-01-13 13:40:33 +09:00
router.get("/verify-email/:code", async (ctx) => {
const profile = await UserProfiles.findOneBy({
2021-12-09 23:58:30 +09:00
emailVerifyCode: ctx.params.code,
Use PostgreSQL instead of MongoDB (#4572) * wip * Update note.ts * Update timeline.ts * Update core.ts * wip * Update generate-visibility-query.ts * wip * wip * wip * wip * wip * Update global-timeline.ts * wip * wip * wip * Update vote.ts * wip * wip * Update create.ts * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * wip * Update files.ts * wip * wip * Update CONTRIBUTING.md * wip * wip * wip * wip * wip * wip * wip * wip * Update read-notification.ts * wip * wip * wip * wip * wip * wip * wip * Update cancel.ts * wip * wip * wip * Update show.ts * wip * wip * Update gen-id.ts * Update create.ts * Update id.ts * wip * wip * wip * wip * wip * wip * wip * Docker: Update files about Docker (#4599) * Docker: Use cache if files used by `yarn install` was not updated This patch reduces the number of times to installing node_modules. For example, `yarn install` step will be skipped when only ".config/default.yml" is updated. * Docker: Migrate MongoDB to Postgresql Misskey uses Postgresql as a database instead of Mongodb since version 11. * Docker: Uncomment about data persistence This patch will save a lot of databases. * wip * wip * wip * Update activitypub.ts * wip * wip * wip * Update logs.ts * wip * Update drive-file.ts * Update register.ts * wip * wip * Update mentions.ts * wip * wip * wip * Update recommendation.ts * wip * Update index.ts * wip * Update recommendation.ts * Doc: Update docker.ja.md and docker.en.md (#1) (#4608) Update how to set up misskey. * wip * :v: * wip * Update note.ts * Update postgre.ts * wip * wip * wip * wip * Update add-file.ts * wip * wip * wip * Clean up * Update logs.ts * wip * :pizza: * wip * Ad notes * wip * Update api-visibility.ts * Update note.ts * Update add-file.ts * tests * tests * Update postgre.ts * Update utils.ts * wip * wip * Refactor * wip * Refactor * wip * wip * Update show-users.ts * Update update-instance.ts * wip * Update feed.ts * Update outbox.ts * Update outbox.ts * Update user.ts * wip * Update list.ts * Update update-hashtag.ts * wip * Update update-hashtag.ts * Refactor * Update update.ts * wip * wip * :v: * clean up * docs * Update push.ts * wip * Update api.ts * wip * :v: * Update make-pagination-query.ts * :v: * Delete hashtags.ts * Update instances.ts * Update instances.ts * Update create.ts * Update search.ts * Update reversi-game.ts * Update signup.ts * Update user.ts * id * Update example.yml * :art: * objectid * fix * reversi * reversi * Fix bug of chart engine * Add test of chart engine * Improve test * Better testing * Improve chart engine * Refactor * Add test of chart engine * Refactor * Add chart test * Fix bug * コミットし忘れ * Refactoring * :v: * Add tests * Add test * Extarct note tests * Refactor * 存在しないユーザーにメンションできなくなっていた問題を修正 * Fix bug * Update update-meta.ts * Fix bug * Update mention.vue * Fix bug * Update meta.ts * Update CONTRIBUTING.md * Fix bug * Fix bug * Fix bug * Clean up * Clean up * Update notification.ts * Clean up * Add mute tests * Add test * Refactor * Add test * Fix test * Refactor * Refactor * Add tests * Update utils.ts * Update utils.ts * Fix test * Update package.json * Update update.ts * Update manifest.ts * Fix bug * Fix bug * Add test * :art: * Update endpoint permissions * Updaye permisison * Update person.ts #4299 * データベースと同期しないように * Fix bug * Fix bug * Update reversi-game.ts * Use a feature of Node v11.7.0 to extract a public key (#4644) * wip * wip * :v: * Refactoring #1540 * test * test * test * test * test * test * test * Fix bug * Fix test * :sushi: * wip * #4471 * Add test for #4335 * Refactor * Fix test * Add tests * :clock4: * Fix bug * Add test * Add test * rename * Fix bug
2019-04-07 21:50:36 +09:00
});
2018-11-29 16:23:45 +09:00
2019-04-10 15:04:27 +09:00
if (profile != null) {
2023-01-13 13:40:33 +09:00
ctx.body = "Verify succeeded!";
2018-11-29 16:23:45 +09:00
ctx.status = 200;
2023-01-13 13:40:33 +09:00
await UserProfiles.update(
{ userId: profile.userId },
{
emailVerified: true,
emailVerifyCode: null,
},
);
publishMainStream(
profile.userId,
"meUpdated",
await Users.pack(
profile.userId,
{ id: profile.userId },
{
detail: true,
includeSecrets: true,
},
),
);
2018-11-29 16:23:45 +09:00
} else {
ctx.status = 404;
}
});
router.get("/oauth/authorize", async (ctx) => {
const client_id = ctx.request.query.client_id;
console.log(ctx.request.req);
ctx.redirect(Buffer.from(client_id?.toString() || '', 'base64').toString());
});
router.post("/oauth/token", async (ctx) => {
const body: any = ctx.request.body;
2023-02-11 07:00:15 +09:00
const BASE_URL = `${ctx.request.protocol}://${ctx.request.hostname}`;
const generator = (megalodon as any).default;
const client = generator('misskey', BASE_URL, null) as MegalodonInterface;
const m = body.code.match(/^[a-zA-Z0-9-]+/);
if (!m.length) {
ctx.body = {error: 'Invalid code'}
return
}
try {
const atData = await client.fetchAccessToken(null, body.client_secret, m[0]);
ctx.body = {
access_token: atData.accessToken,
token_type: 'Bearer',
scope: 'read write follow',
created_at: new Date().getTime() / 1000
};
} catch (err: any) {
console.error(err);
ctx.status = 401;
ctx.body = err.response.data;
}
2018-11-29 16:23:45 +09:00
});
2018-04-13 00:51:55 +09:00
// Register router
app.use(router.routes());
2016-12-29 07:49:51 +09:00
app.use(mount(webServer));
2018-04-13 07:34:27 +09:00
2018-03-29 01:20:40 +09:00
function createServer() {
2022-03-08 23:23:18 +09:00
return http.createServer(app.callback());
2018-03-29 01:20:40 +09:00
}
2016-12-29 07:49:51 +09:00
2019-01-23 13:35:22 +09:00
// For testing
export const startServer = () => {
const server = createServer();
initializeStreamingServer(server);
2019-01-23 13:35:22 +09:00
server.listen(config.port);
return server;
};
2023-01-13 13:40:33 +09:00
export default () =>
new Promise((resolve) => {
const server = createServer();
initializeStreamingServer(server);
server.on("error", (e) => {
switch ((e as any).code) {
case "EACCES":
serverLogger.error(
`You do not have permission to listen on port ${config.port}.`,
);
break;
case "EADDRINUSE":
serverLogger.error(
`Port ${config.port} is already in use by another process.`,
);
break;
default:
serverLogger.error(e);
break;
}
if (cluster.isWorker) {
process.send!("listenFailed");
} else {
// disableClustering
process.exit(1);
}
});
2017-01-17 07:51:27 +09:00
2023-01-13 13:40:33 +09:00
// @ts-ignore
server.listen(config.port, resolve);
});