paricafe/packages/backend/src/server/ServerService.ts

262 lines
8.9 KiB
TypeScript
Raw Normal View History

/*
* SPDX-FileCopyrightText: syuilo and other misskey contributors
* SPDX-License-Identifier: AGPL-3.0-only
*/
2022-09-17 13:27:08 -05:00
import cluster from 'node:cluster';
import * as fs from 'node:fs';
import { fileURLToPath } from 'node:url';
import { Inject, Injectable, OnApplicationShutdown } from '@nestjs/common';
import Fastify, { FastifyInstance } from 'fastify';
import fastifyStatic from '@fastify/static';
2022-09-17 13:27:08 -05:00
import { IsNull } from 'typeorm';
import { GlobalEventService } from '@/core/GlobalEventService.js';
2022-09-20 15:33:11 -05:00
import type { Config } from '@/config.js';
import type { EmojisRepository, UserProfilesRepository, UsersRepository } from '@/models/_.js';
2022-09-17 13:27:08 -05:00
import { DI } from '@/di-symbols.js';
2022-09-18 09:07:41 -05:00
import type Logger from '@/logger.js';
2022-09-17 13:27:08 -05:00
import * as Acct from '@/misc/acct.js';
import { genIdenticon } from '@/misc/gen-identicon.js';
import { createTemp } from '@/misc/create-temp.js';
import { UserEntityService } from '@/core/entities/UserEntityService.js';
2022-09-18 09:07:41 -05:00
import { LoggerService } from '@/core/LoggerService.js';
import { bindThis } from '@/decorators.js';
import { MetaService } from '@/core/MetaService.js';
2022-09-17 13:27:08 -05:00
import { ActivityPubServerService } from './ActivityPubServerService.js';
import { NodeinfoServerService } from './NodeinfoServerService.js';
import { ApiServerService } from './api/ApiServerService.js';
import { StreamingApiServerService } from './api/StreamingApiServerService.js';
import { WellKnownServerService } from './WellKnownServerService.js';
import { FileServerService } from './FileServerService.js';
import { ClientServerService } from './web/ClientServerService.js';
import { OpenApiServerService } from './api/openapi/OpenApiServerService.js';
import { OAuth2ProviderService } from './oauth/OAuth2ProviderService.js';
const _dirname = fileURLToPath(new URL('.', import.meta.url));
2022-09-17 13:27:08 -05:00
@Injectable()
export class ServerService implements OnApplicationShutdown {
2022-09-18 13:11:50 -05:00
private logger: Logger;
#fastify: FastifyInstance;
2022-09-18 09:07:41 -05:00
2022-09-17 13:27:08 -05:00
constructor(
@Inject(DI.config)
private config: Config,
@Inject(DI.usersRepository)
private usersRepository: UsersRepository,
@Inject(DI.userProfilesRepository)
private userProfilesRepository: UserProfilesRepository,
@Inject(DI.emojisRepository)
private emojisRepository: EmojisRepository,
private metaService: MetaService,
2022-09-17 13:27:08 -05:00
private userEntityService: UserEntityService,
private apiServerService: ApiServerService,
private openApiServerService: OpenApiServerService,
2022-09-17 13:27:08 -05:00
private streamingApiServerService: StreamingApiServerService,
private activityPubServerService: ActivityPubServerService,
private wellKnownServerService: WellKnownServerService,
private nodeinfoServerService: NodeinfoServerService,
private fileServerService: FileServerService,
private clientServerService: ClientServerService,
private globalEventService: GlobalEventService,
2022-09-18 09:07:41 -05:00
private loggerService: LoggerService,
private oauth2ProviderService: OAuth2ProviderService,
2022-09-17 13:27:08 -05:00
) {
2022-09-18 13:11:50 -05:00
this.logger = this.loggerService.getLogger('server', 'gray', false);
2022-09-17 13:27:08 -05:00
}
@bindThis
public async launch(): Promise<void> {
const fastify = Fastify({
trustProxy: true,
2023-10-18 21:18:17 -05:00
logger: false,
});
this.#fastify = fastify;
2022-09-17 13:27:08 -05:00
// HSTS
// 6months (15552000sec)
if (this.config.url.startsWith('https') && !this.config.disableHsts) {
fastify.addHook('onRequest', (request, reply, done) => {
reply.header('strict-transport-security', 'max-age=15552000; preload');
done();
2022-09-17 13:27:08 -05:00
});
}
// Register non-serving static server so that the child services can use reply.sendFile.
// `root` here is just a placeholder and each call must use its own `rootPath`.
fastify.register(fastifyStatic, {
root: _dirname,
serve: false,
});
fastify.register(this.apiServerService.createServer, { prefix: '/api' });
fastify.register(this.openApiServerService.createServer);
fastify.register(this.fileServerService.createServer);
fastify.register(this.activityPubServerService.createServer);
fastify.register(this.nodeinfoServerService.createServer);
fastify.register(this.wellKnownServerService.createServer);
fastify.register(this.oauth2ProviderService.createServer);
2022-09-17 13:27:08 -05:00
fastify.get<{ Params: { path: string }; Querystring: { static?: any; badge?: any; }; }>('/emoji/:path(.*)', async (request, reply) => {
const path = request.params.path;
reply.header('Cache-Control', 'public, max-age=86400');
if (!path.match(/^[a-zA-Z0-9\-_@\.]+?\.webp$/)) {
reply.code(404);
return;
}
const name = path.split('@')[0].replace('.webp', '');
const host = path.split('@')[1]?.replace('.webp', '');
const emoji = await this.emojisRepository.findOneBy({
// `@.` is the spec of ReactionService.decodeReaction
host: (host == null || host === '.') ? IsNull() : host,
name: name,
});
reply.header('Content-Security-Policy', 'default-src \'none\'; style-src \'unsafe-inline\'');
if (emoji == null) {
if ('fallback' in request.query) {
return await reply.redirect('/static-assets/emoji-unknown.png');
} else {
reply.code(404);
return;
}
}
let url: URL;
if ('badge' in request.query) {
url = new URL(`${this.config.mediaProxy}/emoji.png`);
// || emoji.originalUrl してるのは後方互換性のためpublicUrlはstringなので??はだめ)
url.searchParams.set('url', emoji.publicUrl || emoji.originalUrl);
url.searchParams.set('badge', '1');
} else {
url = new URL(`${this.config.mediaProxy}/emoji.webp`);
// || emoji.originalUrl してるのは後方互換性のためpublicUrlはstringなので??はだめ)
url.searchParams.set('url', emoji.publicUrl || emoji.originalUrl);
url.searchParams.set('emoji', '1');
if ('static' in request.query) url.searchParams.set('static', '1');
}
return await reply.redirect(
301,
url.toString(),
);
});
fastify.get<{ Params: { acct: string } }>('/avatar/@:acct', async (request, reply) => {
const { username, host } = Acct.parse(request.params.acct);
2022-09-17 13:27:08 -05:00
const user = await this.usersRepository.findOne({
where: {
usernameLower: username.toLowerCase(),
host: (host == null) || (host === this.config.host) ? IsNull() : host,
isSuspended: false,
},
});
reply.header('Cache-Control', 'public, max-age=86400');
2022-09-17 13:27:08 -05:00
if (user) {
reply.redirect(user.avatarUrl ?? this.userEntityService.getIdenticonUrl(user));
2022-09-17 13:27:08 -05:00
} else {
reply.redirect('/static-assets/user-unknown.png');
2022-09-17 13:27:08 -05:00
}
});
fastify.get<{ Params: { x: string } }>('/identicon/:x', async (request, reply) => {
reply.header('Content-Type', 'image/png');
reply.header('Cache-Control', 'public, max-age=86400');
if ((await this.metaService.fetch()).enableIdenticonGeneration) {
const [temp, cleanup] = await createTemp();
await genIdenticon(request.params.x, fs.createWriteStream(temp));
return fs.createReadStream(temp).on('close', () => cleanup());
} else {
return reply.redirect('/static-assets/avatar.png');
}
2022-09-17 13:27:08 -05:00
});
fastify.get<{ Params: { code: string } }>('/verify-email/:code', async (request, reply) => {
2022-09-17 13:27:08 -05:00
const profile = await this.userProfilesRepository.findOneBy({
emailVerifyCode: request.params.code,
2022-09-17 13:27:08 -05:00
});
if (profile != null) {
await this.userProfilesRepository.update({ userId: profile.userId }, {
emailVerified: true,
emailVerifyCode: null,
});
this.globalEventService.publishMainStream(profile.userId, 'meUpdated', await this.userEntityService.pack(profile.userId, { id: profile.userId }, {
detail: true,
includeSecrets: true,
}));
reply.code(200).send('Verification succeeded! メールアドレスの認証に成功しました。');
return;
2022-09-17 13:27:08 -05:00
} else {
reply.code(404).send('Verification failed. Please try again. メールアドレスの認証に失敗しました。もう一度お試しください');
2023-02-08 20:03:40 -06:00
return;
2022-09-17 13:27:08 -05:00
}
});
fastify.register(this.clientServerService.createServer);
2022-09-17 13:27:08 -05:00
this.streamingApiServerService.attach(fastify.server);
2022-09-17 13:27:08 -05:00
fastify.server.on('error', err => {
2022-09-18 09:07:41 -05:00
switch ((err as any).code) {
2022-09-17 13:27:08 -05:00
case 'EACCES':
this.logger.error(`You do not have permission to listen on port ${this.config.port}.`);
2022-09-17 13:27:08 -05:00
break;
case 'EADDRINUSE':
this.logger.error(`Port ${this.config.port} is already in use by another process.`);
2022-09-17 13:27:08 -05:00
break;
default:
2022-09-18 13:11:50 -05:00
this.logger.error(err);
2022-09-17 13:27:08 -05:00
break;
}
if (cluster.isWorker) {
process.send!('listenFailed');
2022-09-17 13:27:08 -05:00
} else {
// disableClustering
2022-09-17 13:27:08 -05:00
process.exit(1);
}
});
if (this.config.socket) {
if (fs.existsSync(this.config.socket)) {
fs.unlinkSync(this.config.socket);
}
fastify.listen({ path: this.config.socket }, (err, address) => {
if (this.config.chmodSocket) {
fs.chmodSync(this.config.socket!, this.config.chmodSocket);
}
});
} else {
fastify.listen({ port: this.config.port, host: '0.0.0.0' });
}
await fastify.ready();
}
2023-05-28 23:21:26 -05:00
@bindThis
public async dispose(): Promise<void> {
await this.streamingApiServerService.detach();
await this.#fastify.close();
2022-09-17 13:27:08 -05:00
}
2023-05-28 23:21:26 -05:00
@bindThis
async onApplicationShutdown(signal: string): Promise<void> {
await this.dispose();
}
2022-09-17 13:27:08 -05:00
}