2013-10-26 07:18:36 -05:00
|
|
|
var crypto = require('crypto')
|
2014-11-12 06:14:37 -05:00
|
|
|
var Error = require('http-errors')
|
|
|
|
var utils = require('./utils')
|
|
|
|
var Logger = require('./logger')
|
2013-06-07 20:16:28 -05:00
|
|
|
|
2014-11-13 12:13:37 -05:00
|
|
|
module.exports.match = function match(regexp) {
|
|
|
|
return function(req, res, next, value, name) {
|
|
|
|
if (regexp.exec(value)) {
|
|
|
|
next()
|
|
|
|
} else {
|
|
|
|
next('route')
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-07 20:16:28 -05:00
|
|
|
module.exports.validate_name = function validate_name(req, res, next, value, name) {
|
2014-11-12 06:14:37 -05:00
|
|
|
if (value.charAt(0) === '-') {
|
|
|
|
// special case in couchdb usually
|
|
|
|
next('route')
|
|
|
|
} else if (utils.validate_name(value)) {
|
|
|
|
next()
|
|
|
|
} else {
|
|
|
|
next( Error[403]('invalid ' + name) )
|
|
|
|
}
|
2013-10-26 07:18:36 -05:00
|
|
|
}
|
2013-06-07 20:16:28 -05:00
|
|
|
|
2014-11-16 12:44:46 -05:00
|
|
|
module.exports.validate_package = function validate_package(req, res, next, value, name) {
|
|
|
|
if (value.charAt(0) === '-') {
|
|
|
|
// special case in couchdb usually
|
|
|
|
next('route')
|
|
|
|
} else if (utils.validate_package(value)) {
|
|
|
|
next()
|
|
|
|
} else {
|
|
|
|
next( Error[403]('invalid ' + name) )
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-07 20:16:28 -05:00
|
|
|
module.exports.media = function media(expect) {
|
2014-11-12 06:14:37 -05:00
|
|
|
return function(req, res, next) {
|
|
|
|
if (req.headers['content-type'] !== expect) {
|
|
|
|
next( Error[415]('wrong content-type, expect: ' + expect
|
|
|
|
+ ', got: '+req.headers['content-type']) )
|
|
|
|
} else {
|
|
|
|
next()
|
|
|
|
}
|
|
|
|
}
|
2013-06-07 20:16:28 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
module.exports.expect_json = function expect_json(req, res, next) {
|
2014-11-12 06:14:37 -05:00
|
|
|
if (!utils.is_object(req.body)) {
|
|
|
|
return next( Error[400]("can't parse incoming json") )
|
|
|
|
}
|
|
|
|
next()
|
2013-06-07 20:16:28 -05:00
|
|
|
}
|
|
|
|
|
2013-12-08 22:59:31 -05:00
|
|
|
module.exports.anti_loop = function(config) {
|
2014-11-12 06:14:37 -05:00
|
|
|
return function(req, res, next) {
|
|
|
|
if (req.headers.via != null) {
|
|
|
|
var arr = req.headers.via.split(',')
|
|
|
|
|
|
|
|
for (var i=0; i<arr.length; i++) {
|
|
|
|
var m = arr[i].match(/\s*(\S+)\s+(\S+)/)
|
|
|
|
if (m && m[2] === config.server_id) {
|
|
|
|
return next( Error[508]('loop detected') )
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
next()
|
|
|
|
}
|
2013-12-08 22:59:31 -05:00
|
|
|
}
|
2013-06-07 20:16:28 -05:00
|
|
|
|
2013-07-02 20:49:24 -05:00
|
|
|
// express doesn't do etags with requests <= 1024b
|
|
|
|
// we use md5 here, it works well on 1k+ bytes, but sucks with fewer data
|
|
|
|
// could improve performance using crc32 after benchmarks
|
|
|
|
function md5sum(data) {
|
2014-11-12 06:14:37 -05:00
|
|
|
return crypto.createHash('md5').update(data).digest('hex')
|
2013-07-02 20:49:24 -05:00
|
|
|
}
|
|
|
|
|
2015-04-08 15:54:59 -05:00
|
|
|
module.exports.allow = function(auth) {
|
2014-11-13 13:32:31 -05:00
|
|
|
return function(action) {
|
|
|
|
return function(req, res, next) {
|
2015-02-24 14:28:16 -05:00
|
|
|
req.pause();
|
2015-04-08 15:54:59 -05:00
|
|
|
auth['allow_'+action](req.params.package, req.remote_user, function(error, is_allowed) {
|
2015-02-24 14:28:16 -05:00
|
|
|
req.resume();
|
2015-04-08 15:54:59 -05:00
|
|
|
if (error) {
|
2015-02-24 14:28:16 -05:00
|
|
|
next(error)
|
2015-04-08 15:54:59 -05:00
|
|
|
} else if (is_allowed) {
|
2015-02-24 14:28:16 -05:00
|
|
|
next()
|
|
|
|
} else {
|
2015-04-08 15:54:59 -05:00
|
|
|
// last plugin (that's our built-in one) returns either
|
|
|
|
// cb(err) or cb(null, true), so this should never happen
|
|
|
|
throw Error('bug in the auth plugin system')
|
2014-11-13 13:32:31 -05:00
|
|
|
}
|
2015-02-24 14:28:16 -05:00
|
|
|
})
|
2014-11-13 13:32:31 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module.exports.final = function(body, req, res, next) {
|
2014-11-16 07:37:50 -05:00
|
|
|
if (res.statusCode === 401 && !res.getHeader('WWW-Authenticate')) {
|
|
|
|
// they say it's required for 401, so...
|
|
|
|
res.header('WWW-Authenticate', 'Basic, Bearer')
|
|
|
|
}
|
|
|
|
|
2014-11-13 13:32:31 -05:00
|
|
|
try {
|
|
|
|
if (typeof(body) === 'string' || typeof(body) === 'object') {
|
|
|
|
if (!res.getHeader('Content-type')) {
|
|
|
|
res.header('Content-type', 'application/json')
|
|
|
|
}
|
|
|
|
|
|
|
|
if (typeof(body) === 'object' && body != null) {
|
|
|
|
if (typeof(body.error) === 'string') {
|
|
|
|
res._sinopia_error = body.error
|
|
|
|
}
|
|
|
|
body = JSON.stringify(body, undefined, ' ') + '\n'
|
|
|
|
}
|
|
|
|
|
|
|
|
// don't send etags with errors
|
|
|
|
if (!res.statusCode || (res.statusCode >= 200 && res.statusCode < 300)) {
|
|
|
|
res.header('ETag', '"' + md5sum(body) + '"')
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// send(null), send(204), etc.
|
|
|
|
}
|
|
|
|
} catch(err) {
|
|
|
|
// if sinopia sends headers first, and then calls res.send()
|
|
|
|
// as an error handler, we can't report error properly,
|
|
|
|
// and should just close socket
|
|
|
|
if (err.message.match(/set headers after they are sent/)) {
|
|
|
|
if (res.socket != null) res.socket.destroy()
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
throw err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
res.send(body)
|
|
|
|
}
|
|
|
|
|
|
|
|
module.exports.log = function(req, res, next) {
|
2014-11-12 06:14:37 -05:00
|
|
|
// logger
|
|
|
|
req.log = Logger.logger.child({ sub: 'in' })
|
|
|
|
|
|
|
|
var _auth = req.headers.authorization
|
2014-11-13 13:32:31 -05:00
|
|
|
if (_auth != null) req.headers.authorization = '<Classified>'
|
|
|
|
var _cookie = req.headers.cookie
|
|
|
|
if (_cookie != null) req.headers.cookie = '<Classified>'
|
2014-11-12 11:18:30 -05:00
|
|
|
|
|
|
|
req.url = req.originalUrl
|
2014-11-12 06:14:37 -05:00
|
|
|
req.log.info( { req: req, ip: req.ip }
|
|
|
|
, '@{ip} requested \'@{req.method} @{req.url}\'' )
|
2014-11-12 11:18:30 -05:00
|
|
|
req.originalUrl = req.url
|
|
|
|
|
2014-11-13 13:32:31 -05:00
|
|
|
if (_auth != null) req.headers.authorization = _auth
|
|
|
|
if (_cookie != null) req.headers.cookie = _cookie
|
2014-11-12 06:14:37 -05:00
|
|
|
|
|
|
|
var bytesin = 0
|
|
|
|
req.on('data', function(chunk) {
|
|
|
|
bytesin += chunk.length
|
|
|
|
})
|
|
|
|
|
|
|
|
var bytesout = 0
|
|
|
|
var _write = res.write
|
|
|
|
res.write = function(buf) {
|
|
|
|
bytesout += buf.length
|
|
|
|
_write.apply(res, arguments)
|
|
|
|
}
|
|
|
|
|
|
|
|
function log() {
|
|
|
|
var message = "@{status}, user: @{user}, req: '@{request.method} @{request.url}'"
|
|
|
|
if (res._sinopia_error) {
|
|
|
|
message += ', error: @{!error}'
|
|
|
|
} else {
|
|
|
|
message += ', bytes: @{bytes.in}/@{bytes.out}'
|
|
|
|
}
|
2014-11-12 11:18:30 -05:00
|
|
|
|
|
|
|
req.url = req.originalUrl
|
2014-11-12 06:14:37 -05:00
|
|
|
req.log.warn({
|
|
|
|
request : { method: req.method, url: req.url },
|
|
|
|
level : 35, // http
|
2015-01-26 06:00:37 -05:00
|
|
|
user : req.remote_user && req.remote_user.name,
|
2014-11-12 06:14:37 -05:00
|
|
|
status : res.statusCode,
|
|
|
|
error : res._sinopia_error,
|
|
|
|
bytes : {
|
|
|
|
in : bytesin,
|
|
|
|
out : bytesout,
|
|
|
|
}
|
|
|
|
}, message)
|
2014-11-12 11:18:30 -05:00
|
|
|
req.originalUrl = req.url
|
2014-11-12 06:14:37 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
req.on('close', function() {
|
|
|
|
log(true)
|
|
|
|
})
|
|
|
|
|
|
|
|
var _end = res.end
|
|
|
|
res.end = function(buf) {
|
|
|
|
if (buf) bytesout += buf.length
|
|
|
|
_end.apply(res, arguments)
|
|
|
|
log()
|
|
|
|
}
|
|
|
|
next()
|
2013-07-02 20:49:24 -05:00
|
|
|
}
|
|
|
|
|