2017-06-26 02:49:39 +00:00
const os = require ( 'os' ) ;
const throng = require ( 'throng' ) ;
const dotenv = require ( 'dotenv' ) ;
const express = require ( 'express' ) ;
const http = require ( 'http' ) ;
const redis = require ( 'redis' ) ;
const pg = require ( 'pg' ) ;
const log = require ( 'npmlog' ) ;
const url = require ( 'url' ) ;
2019-05-22 16:19:16 +00:00
const { WebSocketServer } = require ( '@clusterws/cws' ) ;
2017-06-26 02:49:39 +00:00
const uuid = require ( 'uuid' ) ;
2018-08-24 16:16:53 +00:00
const fs = require ( 'fs' ) ;
2017-05-20 15:31:47 +00:00
const env = process . env . NODE _ENV || 'development' ;
2019-07-30 09:10:46 +00:00
const alwaysRequireAuth = process . env . WHITELIST _MODE === 'true' || process . env . AUTHORIZED _FETCH === 'true' ;
2017-02-02 15:11:36 +00:00
dotenv . config ( {
2017-05-20 15:31:47 +00:00
path : env === 'production' ? '.env.production' : '.env' ,
} ) ;
2017-02-02 00:31:09 +00:00
2017-05-28 14:25:26 +00:00
log . level = process . env . LOG _LEVEL || 'verbose' ;
2017-05-03 21:18:13 +00:00
const dbUrlToConfig = ( dbUrl ) => {
if ( ! dbUrl ) {
2017-05-20 15:31:47 +00:00
return { } ;
2017-05-03 21:18:13 +00:00
}
2019-03-10 15:00:54 +00:00
const params = url . parse ( dbUrl , true ) ;
2017-05-20 15:31:47 +00:00
const config = { } ;
2017-05-04 13:53:44 +00:00
if ( params . auth ) {
2017-05-20 15:31:47 +00:00
[ config . user , config . password ] = params . auth . split ( ':' ) ;
2017-05-04 13:53:44 +00:00
}
if ( params . hostname ) {
2017-05-20 15:31:47 +00:00
config . host = params . hostname ;
2017-05-04 13:53:44 +00:00
}
if ( params . port ) {
2017-05-20 15:31:47 +00:00
config . port = params . port ;
2017-05-03 21:18:13 +00:00
}
2017-05-04 13:53:44 +00:00
if ( params . pathname ) {
2017-05-20 15:31:47 +00:00
config . database = params . pathname . split ( '/' ) [ 1 ] ;
2017-05-04 13:53:44 +00:00
}
2017-05-20 15:31:47 +00:00
const ssl = params . query && params . query . ssl ;
2017-05-20 19:06:09 +00:00
2019-03-10 15:00:54 +00:00
if ( ssl && ssl === 'true' || ssl === '1' ) {
config . ssl = true ;
2017-05-04 13:53:44 +00:00
}
2017-05-20 15:31:47 +00:00
return config ;
} ;
2017-05-03 21:18:13 +00:00
2017-05-20 19:06:09 +00:00
const redisUrlToClient = ( defaultConfig , redisUrl ) => {
const config = defaultConfig ;
if ( ! redisUrl ) {
return redis . createClient ( config ) ;
}
if ( redisUrl . startsWith ( 'unix://' ) ) {
return redis . createClient ( redisUrl . slice ( 7 ) , config ) ;
}
return redis . createClient ( Object . assign ( config , {
url : redisUrl ,
} ) ) ;
} ;
2017-05-28 14:25:26 +00:00
const numWorkers = + process . env . STREAMING _CLUSTER _NUM || ( env === 'development' ? 1 : Math . max ( os . cpus ( ) . length - 1 , 1 ) ) ;
2017-05-03 21:18:13 +00:00
2017-05-28 14:25:26 +00:00
const startMaster = ( ) => {
2018-08-24 16:16:53 +00:00
if ( ! process . env . SOCKET && process . env . PORT && isNaN ( + process . env . PORT ) ) {
log . warn ( 'UNIX domain socket is now supported by using SOCKET. Please migrate from PORT hack.' ) ;
}
2018-10-20 00:25:25 +00:00
2017-05-28 14:25:26 +00:00
log . info ( ` Starting streaming API server master with ${ numWorkers } workers ` ) ;
} ;
2017-05-03 21:18:13 +00:00
2017-05-28 14:25:26 +00:00
const startWorker = ( workerId ) => {
log . info ( ` Starting worker ${ workerId } ` ) ;
2017-04-17 02:32:30 +00:00
const pgConfigs = {
development : {
2017-06-25 16:13:31 +00:00
user : process . env . DB _USER || pg . defaults . user ,
password : process . env . DB _PASS || pg . defaults . password ,
2017-10-17 09:45:37 +00:00
database : process . env . DB _NAME || 'mastodon_development' ,
2017-06-25 16:13:31 +00:00
host : process . env . DB _HOST || pg . defaults . host ,
port : process . env . DB _PORT || pg . defaults . port ,
2017-05-20 15:31:47 +00:00
max : 10 ,
2017-04-17 02:32:30 +00:00
} ,
production : {
user : process . env . DB _USER || 'mastodon' ,
password : process . env . DB _PASS || '' ,
database : process . env . DB _NAME || 'mastodon_production' ,
host : process . env . DB _HOST || 'localhost' ,
port : process . env . DB _PORT || 5432 ,
2017-05-20 15:31:47 +00:00
max : 10 ,
} ,
} ;
2017-02-02 00:31:09 +00:00
2019-03-10 23:51:23 +00:00
if ( ! ! process . env . DB _SSLMODE && process . env . DB _SSLMODE !== 'disable' ) {
pgConfigs . development . ssl = true ;
pgConfigs . production . ssl = true ;
}
const app = express ( ) ;
2017-12-12 14:13:24 +00:00
app . set ( 'trusted proxy' , process . env . TRUSTED _PROXY _IP || 'loopback,uniquelocal' ) ;
2017-05-20 15:31:47 +00:00
const pgPool = new pg . Pool ( Object . assign ( pgConfigs [ env ] , dbUrlToConfig ( process . env . DATABASE _URL ) ) ) ;
const server = http . createServer ( app ) ;
const redisNamespace = process . env . REDIS _NAMESPACE || null ;
2017-02-07 13:37:12 +00:00
2017-05-07 17:42:32 +00:00
const redisParams = {
2017-04-17 02:32:30 +00:00
host : process . env . REDIS _HOST || '127.0.0.1' ,
port : process . env . REDIS _PORT || 6379 ,
2017-05-17 13:36:34 +00:00
db : process . env . REDIS _DB || 0 ,
2017-05-03 21:18:13 +00:00
password : process . env . REDIS _PASSWORD ,
2017-05-20 15:31:47 +00:00
} ;
2017-05-07 17:42:32 +00:00
if ( redisNamespace ) {
2017-05-20 15:31:47 +00:00
redisParams . namespace = redisNamespace ;
2017-05-07 17:42:32 +00:00
}
2017-05-20 19:06:09 +00:00
2017-05-20 15:31:47 +00:00
const redisPrefix = redisNamespace ? ` ${ redisNamespace } : ` : '' ;
2017-05-07 17:42:32 +00:00
2017-06-03 18:50:53 +00:00
const redisSubscribeClient = redisUrlToClient ( redisParams , process . env . REDIS _URL ) ;
2017-05-20 19:06:09 +00:00
const redisClient = redisUrlToClient ( redisParams , process . env . REDIS _URL ) ;
2017-02-07 13:37:12 +00:00
2017-05-20 15:31:47 +00:00
const subs = { } ;
2017-02-07 13:37:12 +00:00
2017-06-20 18:41:41 +00:00
redisSubscribeClient . on ( 'message' , ( channel , message ) => {
2017-05-20 15:31:47 +00:00
const callbacks = subs [ channel ] ;
2017-02-07 13:37:12 +00:00
2017-05-20 15:31:47 +00:00
log . silly ( ` New message on channel ${ channel } ` ) ;
2017-02-07 13:37:12 +00:00
2017-04-17 02:32:30 +00:00
if ( ! callbacks ) {
2017-05-20 15:31:47 +00:00
return ;
2017-04-17 02:32:30 +00:00
}
2017-05-28 14:25:26 +00:00
2017-05-20 15:31:47 +00:00
callbacks . forEach ( callback => callback ( message ) ) ;
} ) ;
2017-02-07 13:37:12 +00:00
2020-06-02 17:24:53 +00:00
const subscriptionHeartbeat = channels => {
if ( ! Array . isArray ( channels ) ) {
channels = [ channels ] ;
}
const interval = 6 * 60 ;
2017-06-03 18:50:53 +00:00
const tellSubscribed = ( ) => {
2020-06-02 17:24:53 +00:00
channels . forEach ( channel => redisClient . set ( ` ${ redisPrefix } subscribed: ${ channel } ` , '1' , 'EX' , interval * 3 ) ) ;
2017-06-03 18:50:53 +00:00
} ;
2020-06-02 17:24:53 +00:00
2017-06-03 18:50:53 +00:00
tellSubscribed ( ) ;
2020-06-02 17:24:53 +00:00
const heartbeat = setInterval ( tellSubscribed , interval * 1000 ) ;
2017-06-03 18:50:53 +00:00
return ( ) => {
clearInterval ( heartbeat ) ;
} ;
} ;
2017-02-07 13:37:12 +00:00
2017-04-17 02:32:30 +00:00
const subscribe = ( channel , callback ) => {
2017-05-20 15:31:47 +00:00
log . silly ( ` Adding listener for ${ channel } ` ) ;
subs [ channel ] = subs [ channel ] || [ ] ;
2017-06-20 18:41:41 +00:00
if ( subs [ channel ] . length === 0 ) {
log . verbose ( ` Subscribe ${ channel } ` ) ;
redisSubscribeClient . subscribe ( channel ) ;
}
2017-05-20 15:31:47 +00:00
subs [ channel ] . push ( callback ) ;
} ;
2017-02-03 17:27:42 +00:00
2017-04-17 02:32:30 +00:00
const unsubscribe = ( channel , callback ) => {
2017-05-20 15:31:47 +00:00
log . silly ( ` Removing listener for ${ channel } ` ) ;
subs [ channel ] = subs [ channel ] . filter ( item => item !== callback ) ;
2017-06-20 18:41:41 +00:00
if ( subs [ channel ] . length === 0 ) {
log . verbose ( ` Unsubscribe ${ channel } ` ) ;
redisSubscribeClient . unsubscribe ( channel ) ;
}
2017-05-20 15:31:47 +00:00
} ;
2017-02-03 17:27:42 +00:00
2017-04-17 02:32:30 +00:00
const allowCrossDomain = ( req , res , next ) => {
2017-05-20 15:31:47 +00:00
res . header ( 'Access-Control-Allow-Origin' , '*' ) ;
res . header ( 'Access-Control-Allow-Headers' , 'Authorization, Accept, Cache-Control' ) ;
res . header ( 'Access-Control-Allow-Methods' , 'GET, OPTIONS' ) ;
2017-02-05 22:37:25 +00:00
2017-05-20 15:31:47 +00:00
next ( ) ;
} ;
2017-02-05 22:37:25 +00:00
2017-04-17 02:32:30 +00:00
const setRequestId = ( req , res , next ) => {
2017-05-20 15:31:47 +00:00
req . requestId = uuid . v4 ( ) ;
res . header ( 'X-Request-Id' , req . requestId ) ;
2017-02-02 00:31:09 +00:00
2017-05-20 15:31:47 +00:00
next ( ) ;
} ;
2017-02-02 00:31:09 +00:00
2017-12-12 14:13:24 +00:00
const setRemoteAddress = ( req , res , next ) => {
req . remoteAddress = req . connection . remoteAddress ;
next ( ) ;
} ;
2019-05-24 13:21:42 +00:00
const accountFromToken = ( token , allowedScopes , req , next ) => {
2017-04-17 02:32:30 +00:00
pgPool . connect ( ( err , client , done ) => {
2017-02-02 00:31:09 +00:00
if ( err ) {
2017-05-20 15:31:47 +00:00
next ( err ) ;
return ;
2017-02-02 00:31:09 +00:00
}
2020-06-02 17:24:53 +00:00
client . query ( 'SELECT oauth_access_tokens.resource_owner_id, users.account_id, users.chosen_languages, oauth_access_tokens.scopes, devices.device_id FROM oauth_access_tokens INNER JOIN users ON oauth_access_tokens.resource_owner_id = users.id LEFT OUTER JOIN devices ON oauth_access_tokens.id = devices.access_token_id WHERE oauth_access_tokens.token = $1 AND oauth_access_tokens.revoked_at IS NULL LIMIT 1' , [ token ] , ( err , result ) => {
2017-05-20 15:31:47 +00:00
done ( ) ;
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
if ( err ) {
2017-05-20 15:31:47 +00:00
next ( err ) ;
return ;
2017-04-17 02:32:30 +00:00
}
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
if ( result . rows . length === 0 ) {
2017-05-20 15:31:47 +00:00
err = new Error ( 'Invalid access token' ) ;
err . statusCode = 401 ;
2017-02-03 23:34:31 +00:00
2017-05-20 15:31:47 +00:00
next ( err ) ;
return ;
2017-04-17 02:32:30 +00:00
}
2017-02-03 23:34:31 +00:00
2019-05-24 13:21:42 +00:00
const scopes = result . rows [ 0 ] . scopes . split ( ' ' ) ;
if ( allowedScopes . size > 0 && ! scopes . some ( scope => allowedScopes . includes ( scope ) ) ) {
err = new Error ( 'Access token does not cover required scopes' ) ;
err . statusCode = 401 ;
next ( err ) ;
return ;
}
2017-05-20 15:31:47 +00:00
req . accountId = result . rows [ 0 ] . account _id ;
2018-07-14 01:59:31 +00:00
req . chosenLanguages = result . rows [ 0 ] . chosen _languages ;
2019-05-24 13:21:42 +00:00
req . allowNotifications = scopes . some ( scope => [ 'read' , 'read:notifications' ] . includes ( scope ) ) ;
2020-06-02 17:24:53 +00:00
req . deviceId = result . rows [ 0 ] . device _id ;
2017-02-03 23:34:31 +00:00
2017-05-20 15:31:47 +00:00
next ( ) ;
} ) ;
} ) ;
} ;
2017-02-03 23:34:31 +00:00
2019-05-24 13:21:42 +00:00
const accountFromRequest = ( req , next , required = true , allowedScopes = [ 'read' ] ) => {
2017-05-29 16:20:53 +00:00
const authorization = req . headers . authorization ;
const location = url . parse ( req . url , true ) ;
2019-05-24 13:21:42 +00:00
const accessToken = location . query . access _token || req . headers [ 'sec-websocket-protocol' ] ;
2017-02-03 23:34:31 +00:00
2017-05-21 19:13:11 +00:00
if ( ! authorization && ! accessToken ) {
2017-12-12 14:13:24 +00:00
if ( required ) {
const err = new Error ( 'Missing access token' ) ;
err . statusCode = 401 ;
2017-02-02 00:31:09 +00:00
2017-12-12 14:13:24 +00:00
next ( err ) ;
return ;
} else {
next ( ) ;
return ;
}
2017-04-17 02:32:30 +00:00
}
2017-02-02 16:10:59 +00:00
2017-05-21 19:13:11 +00:00
const token = authorization ? authorization . replace ( /^Bearer / , '' ) : accessToken ;
2017-02-02 12:56:14 +00:00
2019-05-24 13:21:42 +00:00
accountFromToken ( token , allowedScopes , req , next ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-02-05 02:19:04 +00:00
2017-12-12 14:13:24 +00:00
const PUBLIC _STREAMS = [
'public' ,
2018-05-21 10:43:38 +00:00
'public:media' ,
2017-12-12 14:13:24 +00:00
'public:local' ,
2018-05-21 10:43:38 +00:00
'public:local:media' ,
2020-05-10 08:36:18 +00:00
'public:remote' ,
'public:remote:media' ,
2017-12-12 14:13:24 +00:00
'hashtag' ,
'hashtag:local' ,
] ;
2017-05-29 16:20:53 +00:00
const wsVerifyClient = ( info , cb ) => {
2017-12-12 14:13:24 +00:00
const location = url . parse ( info . req . url , true ) ;
2019-07-30 09:10:46 +00:00
const authRequired = alwaysRequireAuth || ! PUBLIC _STREAMS . some ( stream => stream === location . query . stream ) ;
2019-05-24 13:21:42 +00:00
const allowedScopes = [ ] ;
if ( authRequired ) {
allowedScopes . push ( 'read' ) ;
if ( location . query . stream === 'user:notification' ) {
allowedScopes . push ( 'read:notifications' ) ;
} else {
allowedScopes . push ( 'read:statuses' ) ;
}
}
2017-12-12 14:13:24 +00:00
2017-05-29 16:20:53 +00:00
accountFromRequest ( info . req , err => {
if ( ! err ) {
cb ( true , undefined , undefined ) ;
} else {
log . error ( info . req . requestId , err . toString ( ) ) ;
cb ( false , 401 , 'Unauthorized' ) ;
}
2019-05-24 13:21:42 +00:00
} , authRequired , allowedScopes ) ;
2017-05-29 16:20:53 +00:00
} ;
2017-12-12 14:13:24 +00:00
const PUBLIC _ENDPOINTS = [
'/api/v1/streaming/public' ,
'/api/v1/streaming/public/local' ,
2020-05-10 08:36:18 +00:00
'/api/v1/streaming/public/remote' ,
2017-12-12 14:13:24 +00:00
'/api/v1/streaming/hashtag' ,
'/api/v1/streaming/hashtag/local' ,
] ;
2017-05-29 16:20:53 +00:00
const authenticationMiddleware = ( req , res , next ) => {
if ( req . method === 'OPTIONS' ) {
next ( ) ;
return ;
}
2019-07-30 09:10:46 +00:00
const authRequired = alwaysRequireAuth || ! PUBLIC _ENDPOINTS . some ( endpoint => endpoint === req . path ) ;
2019-05-24 13:21:42 +00:00
const allowedScopes = [ ] ;
if ( authRequired ) {
allowedScopes . push ( 'read' ) ;
if ( req . path === '/api/v1/streaming/user/notification' ) {
allowedScopes . push ( 'read:notifications' ) ;
} else {
allowedScopes . push ( 'read:statuses' ) ;
}
}
accountFromRequest ( req , next , authRequired , allowedScopes ) ;
2017-05-29 16:20:53 +00:00
} ;
2017-06-25 23:46:15 +00:00
const errorMiddleware = ( err , req , res , { } ) => {
2017-05-28 14:25:26 +00:00
log . error ( req . requestId , err . toString ( ) ) ;
2017-05-20 15:31:47 +00:00
res . writeHead ( err . statusCode || 500 , { 'Content-Type' : 'application/json' } ) ;
2017-05-28 14:25:26 +00:00
res . end ( JSON . stringify ( { error : err . statusCode ? err . toString ( ) : 'An unexpected error occurred' } ) ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-02-05 02:19:04 +00:00
2017-04-17 02:32:30 +00:00
const placeholders = ( arr , shift = 0 ) => arr . map ( ( _ , i ) => ` $ ${ i + 1 + shift } ` ) . join ( ', ' ) ;
2017-02-02 00:31:09 +00:00
2017-11-17 23:16:48 +00:00
const authorizeListAccess = ( id , req , next ) => {
pgPool . connect ( ( err , client , done ) => {
if ( err ) {
next ( false ) ;
return ;
}
client . query ( 'SELECT id, account_id FROM lists WHERE id = $1 LIMIT 1' , [ id ] , ( err , result ) => {
done ( ) ;
if ( err || result . rows . length === 0 || result . rows [ 0 ] . account _id !== req . accountId ) {
next ( false ) ;
return ;
}
next ( true ) ;
} ) ;
} ) ;
} ;
2020-06-02 17:24:53 +00:00
const streamFrom = ( ids , req , output , attachCloseHandler , needsFiltering = false , notificationOnly = false ) => {
const accountId = req . accountId || req . remoteAddress ;
2017-06-03 18:50:53 +00:00
const streamType = notificationOnly ? ' (notification)' : '' ;
2020-06-02 17:24:53 +00:00
if ( ! Array . isArray ( ids ) ) {
ids = [ ids ] ;
}
log . verbose ( req . requestId , ` Starting stream from ${ ids . join ( ', ' ) } for ${ accountId } ${ streamType } ` ) ;
2017-04-17 02:32:30 +00:00
const listener = message => {
2017-05-20 15:31:47 +00:00
const { event , payload , queued _at } = JSON . parse ( message ) ;
2017-02-02 12:56:14 +00:00
2017-04-17 02:32:30 +00:00
const transmit = ( ) => {
2017-07-07 14:56:52 +00:00
const now = new Date ( ) . getTime ( ) ;
const delta = now - queued _at ;
2017-09-24 13:31:03 +00:00
const encodedPayload = typeof payload === 'object' ? JSON . stringify ( payload ) : payload ;
2017-02-02 12:56:14 +00:00
2017-12-12 14:13:24 +00:00
log . silly ( req . requestId , ` Transmitting for ${ accountId } : ${ event } ${ encodedPayload } Delay: ${ delta } ms ` ) ;
2017-07-07 14:56:52 +00:00
output ( event , encodedPayload ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-02-02 12:56:14 +00:00
2017-06-03 18:50:53 +00:00
if ( notificationOnly && event !== 'notification' ) {
return ;
}
2019-05-24 13:21:42 +00:00
if ( event === 'notification' && ! req . allowNotifications ) {
return ;
}
2017-04-17 02:32:30 +00:00
// Only messages that may require filtering are statuses, since notifications
// are already personalized and deletes do not matter
2018-04-17 11:49:09 +00:00
if ( ! needsFiltering || event !== 'update' ) {
transmit ( ) ;
return ;
}
2017-02-02 12:56:14 +00:00
2018-04-17 11:49:09 +00:00
const unpackedPayload = payload ;
const targetAccountIds = [ unpackedPayload . account . id ] . concat ( unpackedPayload . mentions . map ( item => item . id ) ) ;
const accountDomain = unpackedPayload . account . acct . split ( '@' ) [ 1 ] ;
2017-04-17 02:32:30 +00:00
2018-07-14 01:59:31 +00:00
if ( Array . isArray ( req . chosenLanguages ) && unpackedPayload . language !== null && req . chosenLanguages . indexOf ( unpackedPayload . language ) === - 1 ) {
2018-04-17 11:49:09 +00:00
log . silly ( req . requestId , ` Message ${ unpackedPayload . id } filtered by language ( ${ unpackedPayload . language } ) ` ) ;
return ;
}
// When the account is not logged in, it is not necessary to confirm the block or mute
if ( ! req . accountId ) {
transmit ( ) ;
return ;
}
pgPool . connect ( ( err , client , done ) => {
if ( err ) {
log . error ( err ) ;
return ;
}
const queries = [
client . query ( ` SELECT 1 FROM blocks WHERE (account_id = $ 1 AND target_account_id IN ( ${ placeholders ( targetAccountIds , 2 ) } )) OR (account_id = $ 2 AND target_account_id = $ 1) UNION SELECT 1 FROM mutes WHERE account_id = $ 1 AND target_account_id IN ( ${ placeholders ( targetAccountIds , 2 ) } ) ` , [ req . accountId , unpackedPayload . account . id ] . concat ( targetAccountIds ) ) ,
] ;
if ( accountDomain ) {
queries . push ( client . query ( 'SELECT 1 FROM account_domain_blocks WHERE account_id = $1 AND domain = $2' , [ req . accountId , accountDomain ] ) ) ;
}
Promise . all ( queries ) . then ( values => {
done ( ) ;
if ( values [ 0 ] . rows . length > 0 || ( values . length > 1 && values [ 1 ] . rows . length > 0 ) ) {
2017-05-26 22:53:48 +00:00
return ;
}
2018-04-17 11:49:09 +00:00
transmit ( ) ;
} ) . catch ( err => {
done ( ) ;
log . error ( err ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2018-04-17 11:49:09 +00:00
} ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-04-17 02:32:30 +00:00
2020-06-02 17:24:53 +00:00
ids . forEach ( id => {
subscribe ( ` ${ redisPrefix } ${ id } ` , listener ) ;
} ) ;
attachCloseHandler ( ids . map ( id => ` ${ redisPrefix } ${ id } ` ) , listener ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
// Setup stream output to HTTP
const streamToHttp = ( req , res ) => {
2017-12-12 14:13:24 +00:00
const accountId = req . accountId || req . remoteAddress ;
2017-05-20 15:31:47 +00:00
res . setHeader ( 'Content-Type' , 'text/event-stream' ) ;
2020-01-24 19:51:33 +00:00
res . setHeader ( 'Cache-Control' , 'no-store' ) ;
2017-05-20 15:31:47 +00:00
res . setHeader ( 'Transfer-Encoding' , 'chunked' ) ;
2017-02-03 23:34:31 +00:00
2020-01-24 19:51:33 +00:00
res . write ( ':)\n' ) ;
2017-05-20 15:31:47 +00:00
const heartbeat = setInterval ( ( ) => res . write ( ':thump\n' ) , 15000 ) ;
2017-02-03 23:34:31 +00:00
2017-04-17 02:32:30 +00:00
req . on ( 'close' , ( ) => {
2017-12-12 14:13:24 +00:00
log . verbose ( req . requestId , ` Ending stream for ${ accountId } ` ) ;
2017-05-20 15:31:47 +00:00
clearInterval ( heartbeat ) ;
} ) ;
2017-02-02 14:20:31 +00:00
2017-04-17 02:32:30 +00:00
return ( event , payload ) => {
2017-05-20 15:31:47 +00:00
res . write ( ` event: ${ event } \n ` ) ;
res . write ( ` data: ${ payload } \n \n ` ) ;
} ;
} ;
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
// Setup stream end for HTTP
2020-06-02 17:24:53 +00:00
const streamHttpEnd = ( req , closeHandler = false ) => ( ids , listener ) => {
if ( ! Array . isArray ( ids ) ) {
ids = [ ids ] ;
}
2017-04-17 02:32:30 +00:00
req . on ( 'close' , ( ) => {
2020-06-02 17:24:53 +00:00
ids . forEach ( id => {
unsubscribe ( id , listener ) ;
} ) ;
2017-06-03 18:50:53 +00:00
if ( closeHandler ) {
closeHandler ( ) ;
}
2017-05-20 15:31:47 +00:00
} ) ;
} ;
2017-02-03 23:34:31 +00:00
2017-04-17 02:32:30 +00:00
// Setup stream output to WebSockets
2017-05-28 14:25:26 +00:00
const streamToWs = ( req , ws ) => ( event , payload ) => {
if ( ws . readyState !== ws . OPEN ) {
log . error ( req . requestId , 'Tried writing to closed socket' ) ;
return ;
}
2017-02-03 23:34:31 +00:00
2017-05-28 14:25:26 +00:00
ws . send ( JSON . stringify ( { event , payload } ) ) ;
2017-05-20 15:31:47 +00:00
} ;
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
// Setup stream end for WebSockets
2017-06-03 18:50:53 +00:00
const streamWsEnd = ( req , ws , closeHandler = false ) => ( id , listener ) => {
2017-12-12 14:13:24 +00:00
const accountId = req . accountId || req . remoteAddress ;
2017-04-17 02:32:30 +00:00
ws . on ( 'close' , ( ) => {
2017-12-12 14:13:24 +00:00
log . verbose ( req . requestId , ` Ending stream for ${ accountId } ` ) ;
2017-05-20 15:31:47 +00:00
unsubscribe ( id , listener ) ;
2017-06-03 18:50:53 +00:00
if ( closeHandler ) {
closeHandler ( ) ;
}
2017-05-20 15:31:47 +00:00
} ) ;
2017-04-02 19:27:14 +00:00
2017-06-23 14:05:04 +00:00
ws . on ( 'error' , ( ) => {
2017-12-12 14:13:24 +00:00
log . verbose ( req . requestId , ` Ending stream for ${ accountId } ` ) ;
2017-05-20 15:31:47 +00:00
unsubscribe ( id , listener ) ;
2017-06-03 18:50:53 +00:00
if ( closeHandler ) {
closeHandler ( ) ;
}
2017-05-20 15:31:47 +00:00
} ) ;
} ;
2017-02-03 23:34:31 +00:00
2018-10-11 17:24:43 +00:00
const httpNotFound = res => {
res . writeHead ( 404 , { 'Content-Type' : 'application/json' } ) ;
res . end ( JSON . stringify ( { error : 'Not found' } ) ) ;
} ;
2017-05-20 15:31:47 +00:00
app . use ( setRequestId ) ;
2017-12-12 14:13:24 +00:00
app . use ( setRemoteAddress ) ;
2017-05-20 15:31:47 +00:00
app . use ( allowCrossDomain ) ;
2018-08-26 09:54:25 +00:00
app . get ( '/api/v1/streaming/health' , ( req , res ) => {
res . writeHead ( 200 , { 'Content-Type' : 'text/plain' } ) ;
res . end ( 'OK' ) ;
} ) ;
2017-05-20 15:31:47 +00:00
app . use ( authenticationMiddleware ) ;
app . use ( errorMiddleware ) ;
2017-02-02 00:31:09 +00:00
2017-04-17 02:32:30 +00:00
app . get ( '/api/v1/streaming/user' , ( req , res ) => {
2020-06-02 17:24:53 +00:00
const channels = [ ` timeline: ${ req . accountId } ` ] ;
if ( req . deviceId ) {
channels . push ( ` timeline: ${ req . accountId } : ${ req . deviceId } ` ) ;
}
streamFrom ( channels , req , streamToHttp ( req , res ) , streamHttpEnd ( req , subscriptionHeartbeat ( channels ) ) ) ;
2017-06-03 18:50:53 +00:00
} ) ;
app . get ( '/api/v1/streaming/user/notification' , ( req , res ) => {
streamFrom ( ` timeline: ${ req . accountId } ` , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , false , true ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-03 23:34:31 +00:00
2017-04-17 02:32:30 +00:00
app . get ( '/api/v1/streaming/public' , ( req , res ) => {
2018-05-21 10:43:38 +00:00
const onlyMedia = req . query . only _media === '1' || req . query . only _media === 'true' ;
const channel = onlyMedia ? 'timeline:public:media' : 'timeline:public' ;
streamFrom ( channel , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , true ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-03 23:34:31 +00:00
2017-04-17 02:32:30 +00:00
app . get ( '/api/v1/streaming/public/local' , ( req , res ) => {
2018-05-21 10:43:38 +00:00
const onlyMedia = req . query . only _media === '1' || req . query . only _media === 'true' ;
const channel = onlyMedia ? 'timeline:public:local:media' : 'timeline:public:local' ;
streamFrom ( channel , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , true ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-06 22:46:14 +00:00
2020-05-10 08:36:18 +00:00
app . get ( '/api/v1/streaming/public/remote' , ( req , res ) => {
const onlyMedia = req . query . only _media === '1' || req . query . only _media === 'true' ;
const channel = onlyMedia ? 'timeline:public:remote:media' : 'timeline:public:remote' ;
streamFrom ( channel , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , true ) ;
} ) ;
2018-04-18 11:09:06 +00:00
app . get ( '/api/v1/streaming/direct' , ( req , res ) => {
2018-10-07 21:44:58 +00:00
const channel = ` timeline:direct: ${ req . accountId } ` ;
streamFrom ( channel , req , streamToHttp ( req , res ) , streamHttpEnd ( req , subscriptionHeartbeat ( channel ) ) , true ) ;
2018-04-18 11:09:06 +00:00
} ) ;
2017-04-17 02:32:30 +00:00
app . get ( '/api/v1/streaming/hashtag' , ( req , res ) => {
2018-10-11 17:24:43 +00:00
const { tag } = req . query ;
if ( ! tag || tag . length === 0 ) {
httpNotFound ( res ) ;
return ;
}
streamFrom ( ` timeline:hashtag: ${ tag . toLowerCase ( ) } ` , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , true ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-02 12:56:14 +00:00
2017-04-17 02:32:30 +00:00
app . get ( '/api/v1/streaming/hashtag/local' , ( req , res ) => {
2018-10-11 17:24:43 +00:00
const { tag } = req . query ;
if ( ! tag || tag . length === 0 ) {
httpNotFound ( res ) ;
return ;
}
streamFrom ( ` timeline:hashtag: ${ tag . toLowerCase ( ) } :local ` , req , streamToHttp ( req , res ) , streamHttpEnd ( req ) , true ) ;
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-06 22:46:14 +00:00
2017-11-17 23:16:48 +00:00
app . get ( '/api/v1/streaming/list' , ( req , res ) => {
const listId = req . query . list ;
authorizeListAccess ( listId , req , authorized => {
if ( ! authorized ) {
2018-10-11 17:24:43 +00:00
httpNotFound ( res ) ;
2017-11-17 23:16:48 +00:00
return ;
}
const channel = ` timeline:list: ${ listId } ` ;
streamFrom ( channel , req , streamToHttp ( req , res ) , streamHttpEnd ( req , subscriptionHeartbeat ( channel ) ) ) ;
} ) ;
} ) ;
2019-05-22 16:19:16 +00:00
const wss = new WebSocketServer ( { server , verifyClient : wsVerifyClient } ) ;
2017-05-29 16:20:53 +00:00
2019-05-22 16:19:16 +00:00
wss . on ( 'connection' , ( ws , req ) => {
2017-05-29 16:20:53 +00:00
const location = url . parse ( req . url , true ) ;
req . requestId = uuid . v4 ( ) ;
2017-12-12 14:13:24 +00:00
req . remoteAddress = ws . _socket . remoteAddress ;
2017-02-02 00:31:09 +00:00
2018-10-07 21:44:58 +00:00
let channel ;
2017-05-29 16:20:53 +00:00
switch ( location . query . stream ) {
case 'user' :
2020-06-02 17:24:53 +00:00
channel = [ ` timeline: ${ req . accountId } ` ] ;
if ( req . deviceId ) {
channel . push ( ` timeline: ${ req . accountId } : ${ req . deviceId } ` ) ;
}
2017-06-03 18:50:53 +00:00
streamFrom ( channel , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws , subscriptionHeartbeat ( channel ) ) ) ;
break ;
case 'user:notification' :
streamFrom ( ` timeline: ${ req . accountId } ` , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , false , true ) ;
2017-05-29 16:20:53 +00:00
break ;
case 'public' :
streamFrom ( 'timeline:public' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
case 'public:local' :
streamFrom ( 'timeline:public:local' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
2020-05-10 08:36:18 +00:00
case 'public:remote' :
streamFrom ( 'timeline:public:remote' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
2018-05-21 10:43:38 +00:00
case 'public:media' :
streamFrom ( 'timeline:public:media' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
case 'public:local:media' :
streamFrom ( 'timeline:public:local:media' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
2020-05-10 08:36:18 +00:00
case 'public:remote:media' :
streamFrom ( 'timeline:public:remote:media' , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
break ;
2018-04-18 11:09:06 +00:00
case 'direct' :
2018-10-07 21:44:58 +00:00
channel = ` timeline:direct: ${ req . accountId } ` ;
streamFrom ( channel , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws , subscriptionHeartbeat ( channel ) ) , true ) ;
2018-04-18 11:09:06 +00:00
break ;
2017-05-29 16:20:53 +00:00
case 'hashtag' :
2018-10-11 17:24:43 +00:00
if ( ! location . query . tag || location . query . tag . length === 0 ) {
ws . close ( ) ;
return ;
}
2017-09-04 10:52:06 +00:00
streamFrom ( ` timeline:hashtag: ${ location . query . tag . toLowerCase ( ) } ` , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
2017-05-29 16:20:53 +00:00
break ;
case 'hashtag:local' :
2018-10-11 17:24:43 +00:00
if ( ! location . query . tag || location . query . tag . length === 0 ) {
ws . close ( ) ;
return ;
}
2017-09-04 10:52:06 +00:00
streamFrom ( ` timeline:hashtag: ${ location . query . tag . toLowerCase ( ) } :local ` , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws ) , true ) ;
2017-05-29 16:20:53 +00:00
break ;
2017-11-17 23:16:48 +00:00
case 'list' :
const listId = location . query . list ;
authorizeListAccess ( listId , req , authorized => {
if ( ! authorized ) {
ws . close ( ) ;
return ;
}
2018-10-07 21:44:58 +00:00
channel = ` timeline:list: ${ listId } ` ;
2017-11-17 23:16:48 +00:00
streamFrom ( channel , req , streamToWs ( req , ws ) , streamWsEnd ( req , ws , subscriptionHeartbeat ( channel ) ) ) ;
} ) ;
break ;
2017-05-29 16:20:53 +00:00
default :
ws . close ( ) ;
}
2017-05-20 15:31:47 +00:00
} ) ;
2017-02-03 23:34:31 +00:00
2019-05-22 16:19:16 +00:00
wss . startAutoPing ( 30000 ) ;
2017-05-28 14:25:26 +00:00
2018-10-20 00:25:25 +00:00
attachServerWithConfig ( server , address => {
log . info ( ` Worker ${ workerId } now listening on ${ address } ` ) ;
} ) ;
2017-04-21 17:24:31 +00:00
2017-05-28 14:25:26 +00:00
const onExit = ( ) => {
log . info ( ` Worker ${ workerId } exiting, bye bye ` ) ;
2017-05-20 15:31:47 +00:00
server . close ( ) ;
2017-07-07 18:01:00 +00:00
process . exit ( 0 ) ;
2017-05-28 14:25:26 +00:00
} ;
const onError = ( err ) => {
log . error ( err ) ;
2017-12-12 19:19:33 +00:00
server . close ( ) ;
process . exit ( 0 ) ;
2017-05-28 14:25:26 +00:00
} ;
process . on ( 'SIGINT' , onExit ) ;
process . on ( 'SIGTERM' , onExit ) ;
process . on ( 'exit' , onExit ) ;
2017-12-12 19:19:33 +00:00
process . on ( 'uncaughtException' , onError ) ;
2017-05-28 14:25:26 +00:00
} ;
2018-10-20 00:25:25 +00:00
const attachServerWithConfig = ( server , onSuccess ) => {
if ( process . env . SOCKET || process . env . PORT && isNaN ( + process . env . PORT ) ) {
server . listen ( process . env . SOCKET || process . env . PORT , ( ) => {
if ( onSuccess ) {
2018-10-21 14:41:33 +00:00
fs . chmodSync ( server . address ( ) , 0o666 ) ;
2018-10-20 00:25:25 +00:00
onSuccess ( server . address ( ) ) ;
}
} ) ;
} else {
2019-07-15 03:56:35 +00:00
server . listen ( + process . env . PORT || 4000 , process . env . BIND || '127.0.0.1' , ( ) => {
2018-10-20 00:25:25 +00:00
if ( onSuccess ) {
onSuccess ( ` ${ server . address ( ) . address } : ${ server . address ( ) . port } ` ) ;
}
} ) ;
}
} ;
const onPortAvailable = onSuccess => {
const testServer = http . createServer ( ) ;
testServer . once ( 'error' , err => {
onSuccess ( err ) ;
} ) ;
testServer . once ( 'listening' , ( ) => {
testServer . once ( 'close' , ( ) => onSuccess ( ) ) ;
testServer . close ( ) ;
} ) ;
attachServerWithConfig ( testServer ) ;
} ;
onPortAvailable ( err => {
if ( err ) {
log . error ( 'Could not start server, the port or socket is in use' ) ;
return ;
}
throng ( {
workers : numWorkers ,
lifetime : Infinity ,
start : startWorker ,
master : startMaster ,
} ) ;
2017-05-28 14:25:26 +00:00
} ) ;