1
0
Fork 0
peertube/helpers/utils.js

216 lines
6.4 KiB
JavaScript
Raw Normal View History

2015-06-09 11:41:40 -04:00
;(function () {
'use strict'
var async = require('async')
2015-06-09 11:41:40 -04:00
var config = require('config')
2015-11-16 07:54:00 -05:00
var crypto = require('crypto')
2015-06-09 11:41:40 -04:00
var fs = require('fs')
var openssl = require('openssl-wrapper')
2015-11-16 07:54:00 -05:00
var request = require('request')
var replay = require('request-replay')
var ursa = require('ursa')
2015-06-09 11:41:40 -04:00
2016-01-30 11:05:22 -05:00
var constants = require('../initializers/constants')
2015-06-09 11:41:40 -04:00
var logger = require('./logger')
2016-01-31 05:23:52 -05:00
var certDir = __dirname + '/../' + config.get('storage.certs')
2015-06-09 11:41:40 -04:00
var http = config.get('webserver.https') ? 'https' : 'http'
var host = config.get('webserver.host')
var port = config.get('webserver.port')
var algorithm = 'aes-256-ctr'
2016-01-31 05:23:52 -05:00
var utils = {
getCertDir: getCertDir,
certsExist: certsExist,
cleanForExit: cleanForExit,
createCerts: createCerts,
createCertsIfNotExist: createCertsIfNotExist,
generatePassword: generatePassword,
makeMultipleRetryRequest: makeMultipleRetryRequest,
symetricEncrypt: symetricEncrypt,
symetricDecrypt: symetricDecrypt
2015-06-09 11:41:40 -04:00
}
2016-01-31 05:23:52 -05:00
function getCertDir () {
return certDir
}
2015-06-09 11:41:40 -04:00
2016-01-31 05:23:52 -05:00
function makeMultipleRetryRequest (all_data, pods, callbackEach, callback) {
2015-06-09 11:41:40 -04:00
if (!callback) {
callback = callbackEach
callbackEach = null
2015-06-09 11:41:40 -04:00
}
var url = http + '://' + host + ':' + port
var signature
2015-11-16 07:54:00 -05:00
// Add signature if it is specified in the params
if (all_data.method === 'POST' && all_data.data && all_data.sign === true) {
2016-01-31 05:23:52 -05:00
var myKey = ursa.createPrivateKey(fs.readFileSync(certDir + 'peertube.key.pem'))
2015-06-09 11:41:40 -04:00
signature = myKey.hashAndSign('sha256', url, 'utf8', 'hex')
}
// Make a request for each pod
async.each(pods, function (pod, callback_each_async) {
function callbackEachRetryRequest (err, response, body, url, pod) {
if (callbackEach !== null) {
callbackEach(err, response, body, url, pod, function () {
callback_each_async()
})
} else {
callback_each_async()
}
}
2015-06-09 11:41:40 -04:00
var params = {
2015-11-16 07:54:00 -05:00
url: pod.url + all_data.path,
method: all_data.method
2015-06-09 11:41:40 -04:00
}
// Add data with POST requst ?
2015-11-16 07:54:00 -05:00
if (all_data.method === 'POST' && all_data.data) {
2015-06-09 11:41:40 -04:00
// Encrypt data ?
2015-11-16 07:54:00 -05:00
if (all_data.encrypt === true) {
2015-06-09 11:41:40 -04:00
var crt = ursa.createPublicKey(pod.publicKey)
// TODO: ES6 with let
;(function (crt_copy, copy_params, copy_url, copy_pod, copy_signature) {
2016-01-31 05:23:52 -05:00
symetricEncrypt(JSON.stringify(all_data.data), function (err, dataEncrypted) {
2015-06-09 11:41:40 -04:00
if (err) throw err
var passwordEncrypted = crt_copy.encrypt(dataEncrypted.password, 'utf8', 'hex')
copy_params.json = {
data: dataEncrypted.crypted,
key: passwordEncrypted
}
makeRetryRequest(copy_params, copy_url, copy_pod, copy_signature, callbackEachRetryRequest)
2015-06-09 11:41:40 -04:00
})
})(crt, params, url, pod, signature)
} else {
2015-11-16 07:54:00 -05:00
params.json = { data: all_data.data }
makeRetryRequest(params, url, pod, signature, callbackEachRetryRequest)
2015-06-09 11:41:40 -04:00
}
} else {
makeRetryRequest(params, url, pod, signature, callbackEachRetryRequest)
2015-06-09 11:41:40 -04:00
}
}, callback)
2015-06-09 11:41:40 -04:00
}
2016-01-31 05:23:52 -05:00
function certsExist (callback) {
fs.exists(certDir + 'peertube.key.pem', function (exists) {
2015-06-09 11:41:40 -04:00
return callback(exists)
})
}
2016-01-31 05:23:52 -05:00
function createCerts (callback) {
certsExist(function (exist) {
2015-06-09 11:41:40 -04:00
if (exist === true) {
var string = 'Certs already exist.'
logger.warning(string)
return callback(new Error(string))
}
2015-11-16 07:54:00 -05:00
logger.info('Generating a RSA key...')
2016-01-31 05:23:52 -05:00
openssl.exec('genrsa', { 'out': certDir + 'peertube.key.pem', '2048': false }, function (err) {
2015-06-09 11:41:40 -04:00
if (err) {
logger.error('Cannot create private key on this pod.', { error: err })
return callback(err)
}
2015-11-16 07:54:00 -05:00
logger.info('RSA key generated.')
2015-06-09 11:41:40 -04:00
2015-11-16 07:54:00 -05:00
logger.info('Manage public key...')
2016-01-31 05:23:52 -05:00
openssl.exec('rsa', { 'in': certDir + 'peertube.key.pem', 'pubout': true, 'out': certDir + 'peertube.pub' }, function (err) {
2015-06-09 11:41:40 -04:00
if (err) {
logger.error('Cannot create public key on this pod .', { error: err })
return callback(err)
}
2015-11-16 07:54:00 -05:00
logger.info('Public key managed.')
2015-06-09 11:41:40 -04:00
return callback(null)
})
})
})
}
2016-01-31 05:23:52 -05:00
function createCertsIfNotExist (callback) {
certsExist(function (exist) {
2015-06-09 11:41:40 -04:00
if (exist === true) {
return callback(null)
}
2016-01-31 05:23:52 -05:00
createCerts(function (err) {
2015-06-09 11:41:40 -04:00
return callback(err)
})
})
}
2016-01-31 05:23:52 -05:00
function generatePassword (callback) {
2015-06-09 11:41:40 -04:00
crypto.randomBytes(32, function (err, buf) {
if (err) {
return callback(err)
}
callback(null, buf.toString('utf8'))
})
}
2016-01-31 05:23:52 -05:00
function symetricEncrypt (text, callback) {
generatePassword(function (err, password) {
2015-06-09 11:41:40 -04:00
if (err) {
return callback(err)
}
var cipher = crypto.createCipher(algorithm, password)
var crypted = cipher.update(text, 'utf8', 'hex')
crypted += cipher.final('hex')
callback(null, { crypted: crypted, password: password })
})
}
2016-01-31 05:23:52 -05:00
function symetricDecrypt (text, password) {
2015-06-09 11:41:40 -04:00
var decipher = crypto.createDecipher(algorithm, password)
var dec = decipher.update(text, 'hex', 'utf8')
dec += decipher.final('utf8')
return dec
}
2016-01-31 05:23:52 -05:00
function cleanForExit (webtorrent_process) {
logger.info('Gracefully exiting')
process.kill(-webtorrent_process.pid)
}
2016-01-31 05:23:52 -05:00
// ---------------------------------------------------------------------------
2015-06-09 11:41:40 -04:00
module.exports = utils
2016-01-31 05:23:52 -05:00
// ---------------------------------------------------------------------------
function makeRetryRequest (params, from_url, to_pod, signature, callbackEach) {
// Append the signature
if (signature) {
params.json.signature = {
url: from_url,
signature: signature
}
}
logger.debug('Make retry requests to %s.', to_pod.url)
replay(
request.post(params, function (err, response, body) {
callbackEach(err, response, body, params.url, to_pod)
}),
{
retries: constants.REQUEST_RETRIES,
factor: 3,
maxTimeout: Infinity,
errorCodes: [ 'EADDRINFO', 'ETIMEDOUT', 'ECONNRESET', 'ESOCKETTIMEDOUT', 'ENOTFOUND', 'ECONNREFUSED' ]
}
).on('replay', function (replay) {
logger.info('Replaying request to %s. Request failed: %d %s. Replay number: #%d. Will retry in: %d ms.',
params.url, replay.error.code, replay.error.message, replay.number, replay.delay)
})
}
2015-06-09 11:41:40 -04:00
})()