X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=src%2Futils.js;h=176648a312b0a7229f711b9585c41d067300055f;hb=45239549bf2659998dcf9196d86974b0b625912e;hp=0b21565dd74d3db9ae23db3a09cc9f28d5994d0b;hpb=8c308c2bf7f658945d80be9d5880361238635f5b;p=github%2FChocobozzz%2FPeerTube.git diff --git a/src/utils.js b/src/utils.js index 0b21565dd..176648a31 100644 --- a/src/utils.js +++ b/src/utils.js @@ -1,23 +1,25 @@ ;(function () { 'use strict' - var request = require('request') - var replay = require('request-replay') - var ursa = require('ursa') + var async = require('async') var config = require('config') + var crypto = require('crypto') var fs = require('fs') var openssl = require('openssl-wrapper') - var crypto = require('crypto') + var request = require('request') + var replay = require('request-replay') + var ursa = require('ursa') + var constants = require('./constants') var logger = require('./logger') + var utils = {} + var http = config.get('webserver.https') ? 'https' : 'http' var host = config.get('webserver.host') var port = config.get('webserver.port') var algorithm = 'aes-256-ctr' - var utils = {} - // ----------- Private functions ---------- function makeRetryRequest (params, from_url, to_pod, signature, callbackEach) { @@ -29,15 +31,14 @@ } } - logger.debug('Sending informations to %s', to_pod.url, { params: params }) + logger.debug('Make retry requests to %s.', to_pod.url) - // Replay 15 times, with factor 3 replay( request.post(params, function (err, response, body) { - callbackEach(err, response, body, to_pod.url) + callbackEach(err, response, body, params.url, to_pod) }), { - retries: 10, + retries: constants.REQUEST_RETRIES, factor: 3, maxTimeout: Infinity, errorCodes: [ 'EADDRINFO', 'ETIMEDOUT', 'ECONNRESET', 'ESOCKETTIMEDOUT', 'ENOTFOUND', 'ECONNREFUSED' ] @@ -52,40 +53,47 @@ utils.certDir = __dirname + '/../' + config.get('storage.certs') // { path, data } - utils.makeMultipleRetryRequest = function (all, pods, callbackEach, callback) { + utils.makeMultipleRetryRequest = function (all_data, pods, callbackEach, callback) { if (!callback) { callback = callbackEach - callbackEach = function () {} + callbackEach = null } var url = http + '://' + host + ':' + port var signature - // Signature ? - if (all.method === 'POST' && all.data && all.sign === true) { - var myKey = ursa.createPrivateKey(fs.readFileSync(utils.certDir + 'petube.key.pem')) + // Add signature if it is specified in the params + if (all_data.method === 'POST' && all_data.data && all_data.sign === true) { + var myKey = ursa.createPrivateKey(fs.readFileSync(utils.certDir + 'peertube.key.pem')) signature = myKey.hashAndSign('sha256', url, 'utf8', 'hex') } // Make a request for each pod - for (var pod of pods) { + async.each(pods, function (pod, callback_each_async) { + function callbackEachRetryRequest (err, response, body, url, pod) { + if (callbackEach !== null) { + callbackEach(err, response, body, url, pod, function () { + callback_each_async() + }) + } else { + callback_each_async() + } + } + var params = { - url: pod.url + all.path, - method: all.method + url: pod.url + all_data.path, + method: all_data.method } // Add data with POST requst ? - if (all.method === 'POST' && all.data) { - logger.debug('Make a POST request.') - + if (all_data.method === 'POST' && all_data.data) { // Encrypt data ? - if (all.encrypt === true) { - logger.debug(pod.publicKey) + if (all_data.encrypt === true) { var crt = ursa.createPublicKey(pod.publicKey) // TODO: ES6 with let ;(function (crt_copy, copy_params, copy_url, copy_pod, copy_signature) { - utils.symetricEncrypt(JSON.stringify(all.data), function (err, dataEncrypted) { + utils.symetricEncrypt(JSON.stringify(all_data.data), function (err, dataEncrypted) { if (err) throw err var passwordEncrypted = crt_copy.encrypt(dataEncrypted.password, 'utf8', 'hex') @@ -94,24 +102,21 @@ key: passwordEncrypted } - makeRetryRequest(copy_params, copy_url, copy_pod, copy_signature, callbackEach) + makeRetryRequest(copy_params, copy_url, copy_pod, copy_signature, callbackEachRetryRequest) }) })(crt, params, url, pod, signature) } else { - params.json = { data: all.data } - makeRetryRequest(params, url, pod, signature, callbackEach) + params.json = { data: all_data.data } + makeRetryRequest(params, url, pod, signature, callbackEachRetryRequest) } } else { - logger.debug('Make a GET/DELETE request') - makeRetryRequest(params, url, pod, signature, callbackEach) + makeRetryRequest(params, url, pod, signature, callbackEachRetryRequest) } - } - - return callback() + }, callback) } utils.certsExist = function (callback) { - fs.exists(utils.certDir + 'petube.key.pem', function (exists) { + fs.exists(utils.certDir + 'peertube.key.pem', function (exists) { return callback(exists) }) } @@ -124,20 +129,22 @@ return callback(new Error(string)) } - logger.debug('Gen RSA keys...') - openssl.exec('genrsa', { 'out': utils.certDir + 'petube.key.pem' }, function (err) { + logger.info('Generating a RSA key...') + openssl.exec('genrsa', { 'out': utils.certDir + 'peertube.key.pem', '2048': false }, function (err) { if (err) { logger.error('Cannot create private key on this pod.', { error: err }) return callback(err) } + logger.info('RSA key generated.') - logger.debug('Manage public key...') - openssl.exec('rsa', { 'in': utils.certDir + 'petube.key.pem', 'pubout': true, 'out': utils.certDir + 'petube.pub' }, function (err) { + logger.info('Manage public key...') + openssl.exec('rsa', { 'in': utils.certDir + 'peertube.key.pem', 'pubout': true, 'out': utils.certDir + 'peertube.pub' }, function (err) { if (err) { logger.error('Cannot create public key on this pod .', { error: err }) return callback(err) } + logger.info('Public key managed.') return callback(null) }) }) @@ -186,5 +193,10 @@ return dec } + utils.cleanForExit = function (webtorrent_process) { + logger.info('Gracefully exiting') + process.kill(-webtorrent_process.pid) + } + module.exports = utils })()