-import * as replay from 'request-replay'
+import * as Bluebird from 'bluebird'
+import { createWriteStream, remove } from 'fs-extra'
import * as request from 'request'
-import * as Promise from 'bluebird'
-
-import {
- RETRY_REQUESTS,
- REMOTE_SCHEME,
- CONFIG
-} from '../initializers'
-import { PodInstance } from '../models'
-import { sign } from './peertube-crypto'
-
-type MakeRetryRequestParams = {
- url: string,
- method: 'GET'|'POST',
- json: Object
-}
-function makeRetryRequest (params: MakeRetryRequestParams) {
- return new Promise<{ response: request.RequestResponse, body: any }>((res, rej) => {
- replay(
- request(params, (err, response, body) => err ? rej(err) : res({ response, body })),
- {
- retries: RETRY_REQUESTS,
- factor: 3,
- maxTimeout: Infinity,
- errorCodes: [ 'EADDRINFO', 'ETIMEDOUT', 'ECONNRESET', 'ESOCKETTIMEDOUT', 'ENOTFOUND', 'ECONNREFUSED' ]
- }
- )
+import { ACTIVITY_PUB } from '../initializers/constants'
+import { processImage } from './image-utils'
+import { join } from 'path'
+import { logger } from './logger'
+import { CONFIG } from '../initializers/config'
+
+function doRequest <T> (
+ requestOptions: request.CoreOptions & request.UriOptions & { activityPub?: boolean },
+ bodyKBLimit = 1000 // 1MB
+): Bluebird<{ response: request.RequestResponse, body: T }> {
+ if (requestOptions.activityPub === true) {
+ if (!Array.isArray(requestOptions.headers)) requestOptions.headers = {}
+ requestOptions.headers['accept'] = ACTIVITY_PUB.ACCEPT_HEADER
+ }
+
+ return new Bluebird<{ response: request.RequestResponse, body: T }>((res, rej) => {
+ request(requestOptions, (err, response, body) => err ? rej(err) : res({ response, body }))
+ .on('data', onRequestDataLengthCheck(bodyKBLimit))
})
}
-type MakeSecureRequestParams = {
- method: 'GET'|'POST'
- toPod: PodInstance
- path: string
- sign: boolean
- data?: Object
+function doRequestAndSaveToFile (
+ requestOptions: request.CoreOptions & request.UriOptions,
+ destPath: string,
+ bodyKBLimit = 10000 // 10MB
+) {
+ return new Bluebird<void>((res, rej) => {
+ const file = createWriteStream(destPath)
+ file.on('finish', () => res())
+
+ request(requestOptions)
+ .on('data', onRequestDataLengthCheck(bodyKBLimit))
+ .on('error', err => {
+ file.close()
+
+ remove(destPath)
+ .catch(err => logger.error('Cannot remove %s after request failure.', destPath, { err }))
+
+ return rej(err)
+ })
+ .pipe(file)
+ })
}
-function makeSecureRequest (params: MakeSecureRequestParams) {
- return new Promise<{ response: request.RequestResponse, body: any }>((res, rej) => {
- const requestParams = {
- url: REMOTE_SCHEME.HTTP + '://' + params.toPod.host + params.path,
- json: {}
- }
- if (params.method !== 'POST') {
- return rej(new Error('Cannot make a secure request with a non POST method.'))
- }
+async function downloadImage (url: string, destDir: string, destName: string, size: { width: number, height: number }) {
+ const tmpPath = join(CONFIG.STORAGE.TMP_DIR, 'pending-' + destName)
+ await doRequestAndSaveToFile({ method: 'GET', uri: url }, tmpPath)
- // Add signature if it is specified in the params
- if (params.sign === true) {
- const host = CONFIG.WEBSERVER.HOST
-
- let dataToSign
- if (params.data) {
- dataToSign = params.data
- } else {
- // We do not have data to sign so we just take our host
- // It is not ideal but the connection should be in HTTPS
- dataToSign = host
- }
-
- requestParams.json['signature'] = {
- host, // Which host we pretend to be
- signature: sign(dataToSign)
- }
- }
+ const destPath = join(destDir, destName)
- // If there are data informations
- if (params.data) {
- requestParams.json['data'] = params.data
- }
+ try {
+ await processImage(tmpPath, destPath, size)
+ } catch (err) {
+ await remove(tmpPath)
- request.post(requestParams, (err, response, body) => err ? rej(err) : res({ response, body }))
- })
+ throw err
+ }
}
// ---------------------------------------------------------------------------
export {
- makeRetryRequest,
- makeSecureRequest
+ doRequest,
+ doRequestAndSaveToFile,
+ downloadImage
+}
+
+// ---------------------------------------------------------------------------
+
+// Thanks to https://github.com/request/request/issues/2470#issuecomment-268929907 <3
+function onRequestDataLengthCheck (bodyKBLimit: number) {
+ let bufferLength = 0
+ const bytesLimit = bodyKBLimit * 1000
+
+ return function (chunk) {
+ bufferLength += chunk.length
+ if (bufferLength > bytesLimit) {
+ this.abort()
+
+ const error = new Error(`Response was too large - aborted after ${bytesLimit} bytes.`)
+ this.emit('error', error)
+ }
+ }
}