2016-07-19 01:35:02 +00:00
|
|
|
"use strict";
|
|
|
|
|
2014-08-14 16:35:37 +00:00
|
|
|
var _ = require("lodash");
|
2016-06-12 01:44:28 +00:00
|
|
|
var pkg = require("../package.json");
|
2014-08-14 16:35:37 +00:00
|
|
|
var Client = require("./client");
|
|
|
|
var ClientManager = require("./clientManager");
|
2014-09-26 22:12:53 +00:00
|
|
|
var express = require("express");
|
2014-08-14 16:35:37 +00:00
|
|
|
var fs = require("fs");
|
2017-04-20 10:17:25 +00:00
|
|
|
var path = require("path");
|
2014-08-14 16:35:37 +00:00
|
|
|
var io = require("socket.io");
|
2016-04-03 05:12:49 +00:00
|
|
|
var dns = require("dns");
|
2014-09-13 12:23:17 +00:00
|
|
|
var Helper = require("./helper");
|
2016-11-18 17:25:23 +00:00
|
|
|
var colors = require("colors/safe");
|
2017-06-11 19:33:04 +00:00
|
|
|
const net = require("net");
|
2016-12-17 09:51:33 +00:00
|
|
|
const Identification = require("./identification");
|
2017-06-22 21:09:55 +00:00
|
|
|
const themes = require("./plugins/themes");
|
2014-08-14 16:35:37 +00:00
|
|
|
|
2017-09-01 09:44:53 +00:00
|
|
|
// The order defined the priority: the first available plugin is used
|
|
|
|
// ALways keep local auth in the end, which should always be enabled.
|
|
|
|
const authPlugins = [
|
|
|
|
require("./plugins/auth/ldap"),
|
|
|
|
require("./plugins/auth/local"),
|
|
|
|
];
|
|
|
|
|
2017-08-28 09:18:31 +00:00
|
|
|
// A random number that will force clients to reload the page if it differs
|
|
|
|
const serverHash = Math.floor(Date.now() * Math.random());
|
|
|
|
|
2016-04-26 20:41:08 +00:00
|
|
|
var manager = null;
|
2014-08-14 16:35:37 +00:00
|
|
|
|
2016-06-08 09:26:24 +00:00
|
|
|
module.exports = function() {
|
2016-12-17 09:51:33 +00:00
|
|
|
log.info(`The Lounge ${colors.green(Helper.getVersion())} \
|
2017-11-18 18:52:31 +00:00
|
|
|
(Node.js ${colors.green(process.versions.node)} on ${colors.green(process.platform)} ${process.arch})`);
|
2016-12-17 09:51:33 +00:00
|
|
|
log.info(`Configuration file: ${colors.green(Helper.CONFIG_PATH)}`);
|
2014-08-14 16:35:37 +00:00
|
|
|
|
2014-09-26 22:12:53 +00:00
|
|
|
var app = express()
|
2017-11-12 18:24:21 +00:00
|
|
|
.disable("x-powered-by")
|
2016-05-01 17:27:10 +00:00
|
|
|
.use(allRequests)
|
2014-08-14 16:35:37 +00:00
|
|
|
.use(index)
|
2017-10-03 10:52:31 +00:00
|
|
|
.use(express.static("public"))
|
2017-07-06 15:33:09 +00:00
|
|
|
.use("/storage/", express.static(Helper.getStoragePath(), {
|
|
|
|
redirect: false,
|
|
|
|
maxAge: 86400 * 1000,
|
2017-11-12 18:24:21 +00:00
|
|
|
}));
|
2014-11-01 20:06:01 +00:00
|
|
|
|
2017-06-22 21:09:55 +00:00
|
|
|
app.get("/themes/:theme.css", (req, res) => {
|
|
|
|
const themeName = req.params.theme;
|
|
|
|
const theme = themes.getFilename(themeName);
|
|
|
|
if (theme === undefined) {
|
|
|
|
return res.status(404).send("Not found");
|
|
|
|
}
|
|
|
|
return res.sendFile(theme);
|
|
|
|
});
|
|
|
|
|
2016-06-08 09:26:24 +00:00
|
|
|
var config = Helper.config;
|
2014-09-26 23:26:21 +00:00
|
|
|
var server = null;
|
|
|
|
|
2016-07-30 01:20:38 +00:00
|
|
|
if (config.public && (config.ldap || {}).enable) {
|
2016-08-10 06:14:09 +00:00
|
|
|
log.warn("Server is public and set to use LDAP. Set to private mode if trying to use LDAP authentication.");
|
2016-07-30 01:20:38 +00:00
|
|
|
}
|
|
|
|
|
2016-06-08 09:26:24 +00:00
|
|
|
if (!config.https.enable) {
|
2014-09-26 23:26:21 +00:00
|
|
|
server = require("http");
|
2016-12-17 09:51:33 +00:00
|
|
|
server = server.createServer(app);
|
2014-09-26 23:26:21 +00:00
|
|
|
} else {
|
2016-10-04 22:35:04 +00:00
|
|
|
const keyPath = Helper.expandHome(config.https.key);
|
|
|
|
const certPath = Helper.expandHome(config.https.certificate);
|
2017-04-10 18:49:58 +00:00
|
|
|
const caPath = Helper.expandHome(config.https.ca);
|
2017-04-13 21:05:28 +00:00
|
|
|
|
|
|
|
if (!keyPath.length || !fs.existsSync(keyPath)) {
|
2016-10-04 22:35:04 +00:00
|
|
|
log.error("Path to SSL key is invalid. Stopping server...");
|
|
|
|
process.exit();
|
|
|
|
}
|
2017-04-13 21:05:28 +00:00
|
|
|
|
|
|
|
if (!certPath.length || !fs.existsSync(certPath)) {
|
2016-10-04 22:35:04 +00:00
|
|
|
log.error("Path to SSL certificate is invalid. Stopping server...");
|
|
|
|
process.exit();
|
|
|
|
}
|
2017-04-13 21:05:28 +00:00
|
|
|
|
2017-04-10 18:49:58 +00:00
|
|
|
if (caPath.length && !fs.existsSync(caPath)) {
|
|
|
|
log.error("Path to SSL ca bundle is invalid. Stopping server...");
|
|
|
|
process.exit();
|
|
|
|
}
|
|
|
|
|
2017-04-13 21:05:28 +00:00
|
|
|
server = require("spdy");
|
2014-09-26 23:26:21 +00:00
|
|
|
server = server.createServer({
|
2016-10-04 22:35:04 +00:00
|
|
|
key: fs.readFileSync(keyPath),
|
2017-04-10 18:49:58 +00:00
|
|
|
cert: fs.readFileSync(certPath),
|
2017-11-15 06:35:15 +00:00
|
|
|
ca: caPath ? fs.readFileSync(caPath) : undefined,
|
2016-12-17 09:51:33 +00:00
|
|
|
}, app);
|
2014-09-26 23:26:21 +00:00
|
|
|
}
|
|
|
|
|
2017-08-31 18:56:20 +00:00
|
|
|
let listenParams;
|
|
|
|
|
|
|
|
if (typeof config.host === "string" && config.host.startsWith("unix:")) {
|
|
|
|
listenParams = config.host.replace(/^unix:/, "");
|
|
|
|
} else {
|
|
|
|
listenParams = {
|
|
|
|
port: config.port,
|
|
|
|
host: config.host,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2017-09-03 12:13:56 +00:00
|
|
|
server.on("error", (err) => log.error(`${err}`));
|
|
|
|
|
2017-08-31 18:56:20 +00:00
|
|
|
server.listen(listenParams, () => {
|
|
|
|
if (typeof listenParams === "string") {
|
|
|
|
log.info("Available on socket " + colors.green(listenParams));
|
|
|
|
} else {
|
|
|
|
const protocol = config.https.enable ? "https" : "http";
|
|
|
|
const address = server.address();
|
|
|
|
|
|
|
|
log.info(
|
|
|
|
"Available at " +
|
|
|
|
colors.green(`${protocol}://${address.address}:${address.port}/`) +
|
|
|
|
` in ${colors.bold(config.public ? "public" : "private")} mode`
|
|
|
|
);
|
|
|
|
}
|
2017-08-23 05:19:50 +00:00
|
|
|
|
|
|
|
const sockets = io(server, {
|
|
|
|
serveClient: false,
|
2017-11-15 06:35:15 +00:00
|
|
|
transports: config.transports,
|
2017-08-23 05:19:50 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
sockets.on("connect", (socket) => {
|
|
|
|
if (config.public) {
|
|
|
|
performAuthentication.call(socket, {});
|
|
|
|
} else {
|
2017-08-28 09:18:31 +00:00
|
|
|
socket.emit("auth", {
|
|
|
|
serverHash: serverHash,
|
|
|
|
success: true,
|
|
|
|
});
|
2017-08-23 05:19:50 +00:00
|
|
|
socket.on("auth", performAuthentication);
|
|
|
|
}
|
|
|
|
});
|
2014-08-14 16:35:37 +00:00
|
|
|
|
2017-08-23 05:19:50 +00:00
|
|
|
manager = new ClientManager();
|
2016-12-07 05:50:11 +00:00
|
|
|
|
2017-08-23 05:19:50 +00:00
|
|
|
new Identification((identHandler) => {
|
|
|
|
manager.init(identHandler, sockets);
|
|
|
|
});
|
2017-08-30 17:26:45 +00:00
|
|
|
|
|
|
|
// Handle ctrl+c and kill gracefully
|
|
|
|
let suicideTimeout = null;
|
|
|
|
const exitGracefully = function() {
|
|
|
|
if (suicideTimeout !== null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Forcefully exit after 3 seconds
|
|
|
|
suicideTimeout = setTimeout(() => process.exit(1), 3000);
|
|
|
|
|
|
|
|
log.info("Exiting...");
|
|
|
|
|
|
|
|
// Close all client and IRC connections
|
|
|
|
manager.clients.forEach((client) => client.quit());
|
|
|
|
|
|
|
|
// Close http server
|
|
|
|
server.close(() => {
|
|
|
|
clearTimeout(suicideTimeout);
|
|
|
|
process.exit(0);
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
process.on("SIGINT", exitGracefully);
|
|
|
|
process.on("SIGTERM", exitGracefully);
|
2016-12-17 09:51:33 +00:00
|
|
|
});
|
2017-10-06 09:53:08 +00:00
|
|
|
|
|
|
|
return server;
|
2014-08-14 16:35:37 +00:00
|
|
|
};
|
|
|
|
|
2017-10-12 07:57:25 +00:00
|
|
|
function getClientIp(socket) {
|
|
|
|
let ip = socket.handshake.address;
|
2016-07-31 00:54:09 +00:00
|
|
|
|
2017-06-11 19:33:04 +00:00
|
|
|
if (Helper.config.reverseProxy) {
|
2017-10-12 07:57:25 +00:00
|
|
|
const forwarded = (socket.request.headers["x-forwarded-for"] || "").split(/\s*,\s*/).filter(Boolean);
|
2017-06-11 19:33:04 +00:00
|
|
|
|
|
|
|
if (forwarded.length && net.isIP(forwarded[0])) {
|
|
|
|
ip = forwarded[0];
|
|
|
|
}
|
2016-04-03 05:12:49 +00:00
|
|
|
}
|
2016-07-31 00:54:09 +00:00
|
|
|
|
|
|
|
return ip.replace(/^::ffff:/, "");
|
2016-04-03 05:12:49 +00:00
|
|
|
}
|
|
|
|
|
2016-05-01 17:27:10 +00:00
|
|
|
function allRequests(req, res, next) {
|
|
|
|
res.setHeader("X-Content-Type-Options", "nosniff");
|
|
|
|
return next();
|
|
|
|
}
|
|
|
|
|
2014-08-14 16:35:37 +00:00
|
|
|
function index(req, res, next) {
|
2016-05-01 09:41:17 +00:00
|
|
|
if (req.url.split("?")[0] !== "/") {
|
|
|
|
return next();
|
|
|
|
}
|
|
|
|
|
2017-07-06 15:33:09 +00:00
|
|
|
const policies = [
|
|
|
|
"default-src *",
|
|
|
|
"connect-src 'self' ws: wss:",
|
|
|
|
"style-src * 'unsafe-inline'",
|
|
|
|
"script-src 'self'",
|
|
|
|
"child-src 'self'",
|
|
|
|
"object-src 'none'",
|
|
|
|
"form-action 'none'",
|
|
|
|
];
|
|
|
|
|
|
|
|
// If prefetch is enabled, but storage is not, we have to allow mixed content
|
|
|
|
if (Helper.config.prefetchStorage || !Helper.config.prefetch) {
|
|
|
|
policies.push("img-src 'self'");
|
|
|
|
policies.unshift("block-all-mixed-content");
|
|
|
|
}
|
|
|
|
|
2017-11-12 18:24:21 +00:00
|
|
|
res.setHeader("Content-Type", "text/html");
|
2017-07-06 15:33:09 +00:00
|
|
|
res.setHeader("Content-Security-Policy", policies.join("; "));
|
2017-04-20 10:17:25 +00:00
|
|
|
res.setHeader("Referrer-Policy", "no-referrer");
|
2017-11-12 18:24:21 +00:00
|
|
|
|
|
|
|
return fs.readFile(path.join(__dirname, "..", "public", "index.html"), "utf-8", (err, file) => {
|
|
|
|
if (err) {
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
|
|
|
|
res.send(_.template(file)(Helper.config));
|
|
|
|
});
|
2014-08-14 16:35:37 +00:00
|
|
|
}
|
|
|
|
|
2017-08-28 20:14:01 +00:00
|
|
|
function initializeClient(socket, client, token, lastMessage) {
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.emit("authorized");
|
2016-09-25 06:52:16 +00:00
|
|
|
|
2017-10-17 09:45:18 +00:00
|
|
|
client.clientAttach(socket.id, token);
|
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on("disconnect", function() {
|
|
|
|
client.clientDetach(socket.id);
|
|
|
|
});
|
2016-11-19 20:34:05 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on(
|
|
|
|
"input",
|
|
|
|
function(data) {
|
|
|
|
client.input(data);
|
|
|
|
}
|
|
|
|
);
|
2016-09-25 06:41:10 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on(
|
|
|
|
"more",
|
|
|
|
function(data) {
|
|
|
|
client.more(data);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
socket.on(
|
|
|
|
"conn",
|
|
|
|
function(data) {
|
|
|
|
// prevent people from overriding webirc settings
|
|
|
|
data.ip = null;
|
|
|
|
data.hostname = null;
|
|
|
|
|
|
|
|
client.connect(data);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
if (!Helper.config.public && !Helper.config.ldap.enable) {
|
2014-08-14 16:35:37 +00:00
|
|
|
socket.on(
|
2017-08-13 18:37:12 +00:00
|
|
|
"change-password",
|
2014-08-14 16:35:37 +00:00
|
|
|
function(data) {
|
2017-08-13 18:37:12 +00:00
|
|
|
var old = data.old_password;
|
|
|
|
var p1 = data.new_password;
|
|
|
|
var p2 = data.verify_password;
|
|
|
|
if (typeof p1 === "undefined" || p1 === "") {
|
|
|
|
socket.emit("change-password", {
|
2017-11-15 06:35:15 +00:00
|
|
|
error: "Please enter a new password",
|
2017-08-13 18:37:12 +00:00
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (p1 !== p2) {
|
|
|
|
socket.emit("change-password", {
|
2017-11-15 06:35:15 +00:00
|
|
|
error: "Both new password fields must match",
|
2017-08-13 18:37:12 +00:00
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
2016-05-31 21:28:31 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
Helper.password
|
|
|
|
.compare(old || "", client.config.password)
|
|
|
|
.then((matching) => {
|
|
|
|
if (!matching) {
|
|
|
|
socket.emit("change-password", {
|
2017-11-15 06:35:15 +00:00
|
|
|
error: "The current password field does not match your account password",
|
2017-08-13 18:37:12 +00:00
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
const hash = Helper.password.hash(p1);
|
2017-03-23 07:47:51 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
client.setPassword(hash, (success) => {
|
|
|
|
const obj = {};
|
2017-03-23 07:47:51 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
if (success) {
|
|
|
|
obj.success = "Successfully updated your password";
|
|
|
|
} else {
|
|
|
|
obj.error = "Failed to update your password";
|
|
|
|
}
|
2017-03-23 07:47:51 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.emit("change-password", obj);
|
2017-03-23 07:47:51 +00:00
|
|
|
});
|
2017-08-13 18:37:12 +00:00
|
|
|
}).catch((error) => {
|
|
|
|
log.error(`Error while checking users password. Error: ${error}`);
|
|
|
|
});
|
2016-02-17 02:29:44 +00:00
|
|
|
}
|
|
|
|
);
|
2017-08-13 18:37:12 +00:00
|
|
|
}
|
2017-07-24 06:01:25 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on(
|
|
|
|
"open",
|
|
|
|
function(data) {
|
|
|
|
client.open(socket.id, data);
|
|
|
|
}
|
|
|
|
);
|
2017-07-24 06:01:25 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on(
|
|
|
|
"sort",
|
|
|
|
function(data) {
|
|
|
|
client.sort(data);
|
|
|
|
}
|
|
|
|
);
|
2017-07-24 06:01:25 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.on(
|
|
|
|
"names",
|
|
|
|
function(data) {
|
|
|
|
client.names(data);
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
socket.on("msg:preview:toggle", function(data) {
|
|
|
|
const networkAndChan = client.find(data.target);
|
|
|
|
if (!networkAndChan) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const message = networkAndChan.chan.findMessage(data.msgId);
|
|
|
|
|
|
|
|
if (!message) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const preview = message.findPreview(data.link);
|
|
|
|
|
|
|
|
if (preview) {
|
|
|
|
preview.shown = data.shown;
|
|
|
|
}
|
|
|
|
});
|
2017-07-24 06:01:25 +00:00
|
|
|
|
2017-07-10 19:47:03 +00:00
|
|
|
socket.on("push:register", (subscription) => {
|
|
|
|
if (!client.isRegistered() || !client.config.sessions[token]) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const registration = client.registerPushSubscription(client.config.sessions[token], subscription);
|
|
|
|
|
|
|
|
if (registration) {
|
|
|
|
client.manager.webPush.pushSingle(client, registration, {
|
|
|
|
type: "notification",
|
|
|
|
timestamp: Date.now(),
|
|
|
|
title: "The Lounge",
|
2017-11-15 06:35:15 +00:00
|
|
|
body: "🚀 Push notifications have been enabled",
|
2017-07-10 19:47:03 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
socket.on("push:unregister", () => {
|
|
|
|
if (!client.isRegistered()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
client.unregisterPushSubscription(token);
|
|
|
|
});
|
|
|
|
|
2017-08-15 09:44:29 +00:00
|
|
|
const sendSessionList = () => {
|
|
|
|
const sessions = _.map(client.config.sessions, (session, sessionToken) => ({
|
|
|
|
current: sessionToken === token,
|
|
|
|
active: _.find(client.attachedClients, (u) => u.token === sessionToken) !== undefined,
|
|
|
|
lastUse: session.lastUse,
|
|
|
|
ip: session.ip,
|
|
|
|
agent: session.agent,
|
|
|
|
token: sessionToken, // TODO: Ideally don't expose actual tokens to the client
|
|
|
|
}));
|
|
|
|
|
|
|
|
socket.emit("sessions:list", sessions);
|
|
|
|
};
|
|
|
|
|
|
|
|
socket.on("sessions:get", sendSessionList);
|
|
|
|
|
|
|
|
socket.on("sign-out", (tokenToSignOut) => {
|
|
|
|
// If no token provided, sign same client out
|
|
|
|
if (!tokenToSignOut) {
|
|
|
|
tokenToSignOut = token;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(tokenToSignOut in client.config.sessions)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
delete client.config.sessions[tokenToSignOut];
|
2017-07-24 06:01:25 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
client.manager.updateUser(client.name, {
|
2017-11-15 06:35:15 +00:00
|
|
|
sessions: client.config.sessions,
|
2017-07-24 06:01:25 +00:00
|
|
|
});
|
|
|
|
|
2017-08-15 09:44:29 +00:00
|
|
|
_.map(client.attachedClients, (attachedClient, socketId) => {
|
|
|
|
if (attachedClient.token !== tokenToSignOut) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const socketToRemove = manager.sockets.of("/").connected[socketId];
|
|
|
|
|
|
|
|
socketToRemove.emit("sign-out");
|
|
|
|
socketToRemove.disconnect();
|
|
|
|
});
|
|
|
|
|
|
|
|
// Do not send updated session list if user simply logs out
|
|
|
|
if (tokenToSignOut !== token) {
|
|
|
|
sendSessionList();
|
|
|
|
}
|
2017-08-13 18:37:12 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
socket.join(client.id);
|
|
|
|
|
|
|
|
const sendInitEvent = (tokenToSend) => {
|
2017-08-28 20:14:01 +00:00
|
|
|
let networks = client.networks;
|
|
|
|
|
|
|
|
if (lastMessage > -1) {
|
|
|
|
// We need a deep cloned object because we are going to remove unneeded messages
|
|
|
|
networks = _.cloneDeep(networks);
|
|
|
|
|
|
|
|
networks.forEach((network) => {
|
|
|
|
network.channels.forEach((channel) => {
|
|
|
|
channel.messages = channel.messages.filter((m) => m.id > lastMessage);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
socket.emit("init", {
|
2017-07-10 19:47:03 +00:00
|
|
|
applicationServerKey: manager.webPush.vapidKeys.publicKey,
|
|
|
|
pushSubscription: client.config.sessions[token],
|
2017-08-13 18:37:12 +00:00
|
|
|
active: client.lastActiveChannel,
|
2017-08-28 20:14:01 +00:00
|
|
|
networks: networks,
|
2017-11-15 06:35:15 +00:00
|
|
|
token: tokenToSend,
|
2017-08-13 18:37:12 +00:00
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2017-08-26 16:37:56 +00:00
|
|
|
if (!Helper.config.public && token === null) {
|
2017-08-13 18:37:12 +00:00
|
|
|
client.generateToken((newToken) => {
|
2017-10-17 09:45:18 +00:00
|
|
|
client.attachedClients[socket.id].token = token = newToken;
|
2017-08-13 18:37:12 +00:00
|
|
|
|
2017-10-12 07:57:25 +00:00
|
|
|
client.updateSession(token, getClientIp(socket), socket.request);
|
2017-06-21 07:58:29 +00:00
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
sendInitEvent(token);
|
2014-08-14 16:35:37 +00:00
|
|
|
});
|
2017-08-13 18:37:12 +00:00
|
|
|
} else {
|
|
|
|
sendInitEvent(null);
|
2014-08-14 16:35:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-04 17:32:18 +00:00
|
|
|
function getClientConfiguration() {
|
|
|
|
const config = _.pick(Helper.config, [
|
|
|
|
"public",
|
|
|
|
"lockNetwork",
|
|
|
|
"displayNetwork",
|
|
|
|
"useHexIp",
|
|
|
|
"themes",
|
|
|
|
"prefetch",
|
|
|
|
]);
|
|
|
|
|
|
|
|
config.ldapEnabled = Helper.config.ldap.enable;
|
2017-11-12 18:00:34 +00:00
|
|
|
config.version = pkg.version;
|
2017-11-07 20:22:16 +00:00
|
|
|
config.gitCommit = Helper.getGitCommit();
|
|
|
|
config.themes = themes.getAll();
|
2017-11-04 17:32:18 +00:00
|
|
|
|
2017-11-15 18:43:38 +00:00
|
|
|
if (config.displayNetwork) {
|
|
|
|
config.defaults = Helper.config.defaults;
|
|
|
|
}
|
|
|
|
|
2017-11-04 17:32:18 +00:00
|
|
|
return config;
|
|
|
|
}
|
|
|
|
|
2017-08-13 18:37:12 +00:00
|
|
|
function performAuthentication(data) {
|
2017-06-21 07:58:29 +00:00
|
|
|
const socket = this;
|
|
|
|
let client;
|
|
|
|
|
2017-08-28 20:14:01 +00:00
|
|
|
const finalInit = () => initializeClient(socket, client, data.token || null, data.lastMessage || -1);
|
2017-08-13 18:37:12 +00:00
|
|
|
|
2017-06-21 07:58:29 +00:00
|
|
|
const initClient = () => {
|
2017-11-04 17:32:18 +00:00
|
|
|
socket.emit("configuration", getClientConfiguration());
|
|
|
|
|
2017-10-12 07:57:25 +00:00
|
|
|
client.ip = getClientIp(socket);
|
2017-08-13 18:37:12 +00:00
|
|
|
|
|
|
|
// If webirc is enabled perform reverse dns lookup
|
|
|
|
if (Helper.config.webirc === null) {
|
|
|
|
return finalInit();
|
2017-06-21 07:58:29 +00:00
|
|
|
}
|
2017-08-13 18:37:12 +00:00
|
|
|
|
|
|
|
reverseDnsLookup(client.ip, (hostname) => {
|
|
|
|
client.hostname = hostname;
|
|
|
|
|
|
|
|
finalInit();
|
|
|
|
});
|
2017-06-21 07:58:29 +00:00
|
|
|
};
|
|
|
|
|
2016-06-08 09:26:24 +00:00
|
|
|
if (Helper.config.public) {
|
2016-07-30 01:20:38 +00:00
|
|
|
client = new Client(manager);
|
2014-08-14 16:35:37 +00:00
|
|
|
manager.clients.push(client);
|
2017-06-21 07:58:29 +00:00
|
|
|
|
2014-08-14 16:35:37 +00:00
|
|
|
socket.on("disconnect", function() {
|
|
|
|
manager.clients = _.without(manager.clients, client);
|
|
|
|
client.quit();
|
|
|
|
});
|
2017-06-21 07:58:29 +00:00
|
|
|
|
|
|
|
initClient();
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const authCallback = (success) => {
|
|
|
|
// Authorization failed
|
|
|
|
if (!success) {
|
|
|
|
socket.emit("auth", {success: false});
|
|
|
|
return;
|
2016-04-03 05:12:49 +00:00
|
|
|
}
|
2016-07-30 01:20:38 +00:00
|
|
|
|
2017-06-21 07:58:29 +00:00
|
|
|
// If authorization succeeded but there is no loaded user,
|
|
|
|
// load it and find the user again (this happens with LDAP)
|
|
|
|
if (!client) {
|
2017-10-15 16:05:19 +00:00
|
|
|
client = manager.loadUser(data.user);
|
2016-07-30 01:20:38 +00:00
|
|
|
}
|
|
|
|
|
2017-06-21 07:58:29 +00:00
|
|
|
initClient();
|
|
|
|
};
|
2016-07-30 01:20:38 +00:00
|
|
|
|
2017-06-21 07:58:29 +00:00
|
|
|
client = manager.findClient(data.user);
|
|
|
|
|
|
|
|
// We have found an existing user and client has provided a token
|
|
|
|
if (client && data.token && typeof client.config.sessions[data.token] !== "undefined") {
|
2017-10-12 07:57:25 +00:00
|
|
|
client.updateSession(data.token, getClientIp(socket), socket.request);
|
2017-06-21 07:58:29 +00:00
|
|
|
|
|
|
|
authCallback(true);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform password checking
|
2017-09-01 09:44:53 +00:00
|
|
|
let auth = () => {
|
|
|
|
log.error("None of the auth plugins is enabled");
|
|
|
|
};
|
|
|
|
for (let i = 0; i < authPlugins.length; ++i) {
|
|
|
|
if (authPlugins[i].isEnabled()) {
|
|
|
|
auth = authPlugins[i].auth;
|
|
|
|
break;
|
|
|
|
}
|
2014-08-14 16:35:37 +00:00
|
|
|
}
|
2017-08-29 16:05:06 +00:00
|
|
|
auth(manager, client, data.user, data.password, authCallback);
|
2014-08-14 16:35:37 +00:00
|
|
|
}
|
2017-08-13 18:37:12 +00:00
|
|
|
|
|
|
|
function reverseDnsLookup(ip, callback) {
|
|
|
|
dns.reverse(ip, (err, hostnames) => {
|
|
|
|
if (!err && hostnames.length) {
|
|
|
|
return callback(hostnames[0]);
|
|
|
|
}
|
|
|
|
|
|
|
|
callback(ip);
|
|
|
|
});
|
|
|
|
}
|