mirror of
https://iceshrimp.dev/limepotato/jormungandr-bite.git
synced 2024-11-30 13:57:33 -07:00
254 lines
5.8 KiB
TypeScript
254 lines
5.8 KiB
TypeScript
/**
|
|
* Core Server
|
|
*/
|
|
|
|
import cluster from "node:cluster";
|
|
import * as fs from "node:fs";
|
|
import * as http from "node:http";
|
|
import Koa from "koa";
|
|
import Router from "@koa/router";
|
|
import mount from "koa-mount";
|
|
import koaLogger from "koa-logger";
|
|
import * as slow from "koa-slow";
|
|
|
|
import { IsNull } from "typeorm";
|
|
import config from "@/config/index.js";
|
|
import Logger from "@/services/logger.js";
|
|
import { UserProfiles, Users } from "@/models/index.js";
|
|
import { genIdenticon } from "@/misc/gen-identicon.js";
|
|
import { createTemp } from "@/misc/create-temp.js";
|
|
import { publishMainStream } from "@/services/stream.js";
|
|
import * as Acct from "@/misc/acct.js";
|
|
import { envOption } from "@/env.js";
|
|
import megalodon, { MegalodonInterface } from "@calckey/megalodon";
|
|
import activityPub from "./activitypub.js";
|
|
import nodeinfo from "./nodeinfo.js";
|
|
import wellKnown from "./well-known.js";
|
|
import apiServer from "./api/index.js";
|
|
import fileServer from "./file/index.js";
|
|
import proxyServer from "./proxy/index.js";
|
|
import webServer from "./web/index.js";
|
|
import { initializeStreamingServer } from "./api/streaming.js";
|
|
import { koaBody } from "koa-body";
|
|
|
|
export const serverLogger = new Logger("server", "gray", false);
|
|
|
|
// Init app
|
|
const app = new Koa();
|
|
app.proxy = true;
|
|
|
|
if (!["production", "test"].includes(process.env.NODE_ENV || "")) {
|
|
// Logger
|
|
app.use(
|
|
koaLogger((str) => {
|
|
serverLogger.info(str);
|
|
}),
|
|
);
|
|
|
|
// Delay
|
|
if (envOption.slow) {
|
|
app.use(
|
|
slow({
|
|
delay: 3000,
|
|
}),
|
|
);
|
|
}
|
|
}
|
|
|
|
// HSTS
|
|
// 6months (15552000sec)
|
|
if (config.url.startsWith("https") && !config.disableHsts) {
|
|
app.use(async (ctx, next) => {
|
|
ctx.set("strict-transport-security", "max-age=15552000; preload");
|
|
await next();
|
|
});
|
|
}
|
|
|
|
app.use(mount("/api", apiServer));
|
|
app.use(mount("/files", fileServer));
|
|
app.use(mount("/proxy", proxyServer));
|
|
|
|
// Init router
|
|
const router = new Router();
|
|
const mastoRouter = new Router();
|
|
|
|
mastoRouter.use(
|
|
koaBody({
|
|
urlencoded: true,
|
|
}),
|
|
);
|
|
|
|
mastoRouter.use(async (ctx, next) => {
|
|
if (ctx.request.query) {
|
|
if (!ctx.request.body || Object.keys(ctx.request.body).length === 0) {
|
|
ctx.request.body = ctx.request.query;
|
|
} else {
|
|
ctx.request.body = { ...ctx.request.body, ...ctx.request.query };
|
|
}
|
|
}
|
|
await next();
|
|
});
|
|
|
|
// Routing
|
|
router.use(activityPub.routes());
|
|
router.use(nodeinfo.routes());
|
|
router.use(wellKnown.routes());
|
|
|
|
router.get("/avatar/@:acct", async (ctx) => {
|
|
const { username, host } = Acct.parse(ctx.params.acct);
|
|
const user = await Users.findOne({
|
|
where: {
|
|
usernameLower: username.toLowerCase(),
|
|
host: host == null || host === config.host ? IsNull() : host,
|
|
isSuspended: false,
|
|
},
|
|
relations: ["avatar"],
|
|
});
|
|
|
|
if (user) {
|
|
ctx.redirect(Users.getAvatarUrlSync(user));
|
|
} else {
|
|
ctx.redirect("/static-assets/user-unknown.png");
|
|
}
|
|
});
|
|
|
|
router.get("/identicon/:x", async (ctx) => {
|
|
const [temp, cleanup] = await createTemp();
|
|
await genIdenticon(ctx.params.x, fs.createWriteStream(temp));
|
|
ctx.set("Content-Type", "image/png");
|
|
ctx.body = fs.createReadStream(temp).on("close", () => cleanup());
|
|
});
|
|
|
|
router.get("/verify-email/:code", async (ctx) => {
|
|
const profile = await UserProfiles.findOneBy({
|
|
emailVerifyCode: ctx.params.code,
|
|
});
|
|
|
|
if (profile != null) {
|
|
ctx.body = "Verify succeeded!";
|
|
ctx.status = 200;
|
|
|
|
await UserProfiles.update(
|
|
{ userId: profile.userId },
|
|
{
|
|
emailVerified: true,
|
|
emailVerifyCode: null,
|
|
},
|
|
);
|
|
|
|
publishMainStream(
|
|
profile.userId,
|
|
"meUpdated",
|
|
await Users.pack(
|
|
profile.userId,
|
|
{ id: profile.userId },
|
|
{
|
|
detail: true,
|
|
includeSecrets: true,
|
|
},
|
|
),
|
|
);
|
|
} else {
|
|
ctx.status = 404;
|
|
}
|
|
});
|
|
|
|
mastoRouter.get("/oauth/authorize", async (ctx) => {
|
|
const client_id = ctx.request.query.client_id;
|
|
console.log(ctx.request.req);
|
|
ctx.redirect(Buffer.from(client_id?.toString() || "", "base64").toString());
|
|
});
|
|
|
|
mastoRouter.post("/oauth/token", async (ctx) => {
|
|
const body: any = ctx.request.body;
|
|
let client_id: any = ctx.request.query.client_id;
|
|
const BASE_URL = `${ctx.request.protocol}://${ctx.request.hostname}`;
|
|
const generator = (megalodon as any).default;
|
|
const client = generator("misskey", BASE_URL, null) as MegalodonInterface;
|
|
let m = null;
|
|
if (body.code) {
|
|
m = body.code.match(/^[a-zA-Z0-9-]+/);
|
|
if (!m.length) {
|
|
ctx.body = { error: "Invalid code" };
|
|
return;
|
|
}
|
|
}
|
|
if (client_id instanceof Array) {
|
|
client_id = client_id.toString();
|
|
} else if (!client_id) {
|
|
client_id = null;
|
|
}
|
|
try {
|
|
const atData = await client.fetchAccessToken(
|
|
client_id,
|
|
body.client_secret,
|
|
m ? m[0] : "",
|
|
);
|
|
ctx.body = {
|
|
access_token: atData.accessToken,
|
|
token_type: "Bearer",
|
|
scope: "read write follow",
|
|
created_at: Math.floor(new Date().getTime() / 1000),
|
|
};
|
|
} catch (err: any) {
|
|
console.error(err);
|
|
ctx.status = 401;
|
|
ctx.body = err.response.data;
|
|
}
|
|
});
|
|
|
|
// Register router
|
|
app.use(mastoRouter.routes());
|
|
app.use(router.routes());
|
|
|
|
app.use(mount(webServer));
|
|
|
|
function createServer() {
|
|
return http.createServer(app.callback());
|
|
}
|
|
|
|
// For testing
|
|
export const startServer = () => {
|
|
const server = createServer();
|
|
|
|
initializeStreamingServer(server);
|
|
|
|
server.listen(config.port);
|
|
|
|
return server;
|
|
};
|
|
|
|
export default () =>
|
|
new Promise((resolve) => {
|
|
const server = createServer();
|
|
|
|
initializeStreamingServer(server);
|
|
|
|
server.on("error", (e) => {
|
|
switch ((e as any).code) {
|
|
case "EACCES":
|
|
serverLogger.error(
|
|
`You do not have permission to listen on port ${config.port}.`,
|
|
);
|
|
break;
|
|
case "EADDRINUSE":
|
|
serverLogger.error(
|
|
`Port ${config.port} is already in use by another process.`,
|
|
);
|
|
break;
|
|
default:
|
|
serverLogger.error(e);
|
|
break;
|
|
}
|
|
|
|
if (cluster.isWorker) {
|
|
process.send!("listenFailed");
|
|
} else {
|
|
// disableClustering
|
|
process.exit(1);
|
|
}
|
|
});
|
|
|
|
// @ts-ignore
|
|
server.listen(config.port, resolve);
|
|
});
|