123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442 |
- package agi
- import (
- "encoding/json"
- "errors"
- "io"
- "io/ioutil"
- "log"
- "net/http"
- "os"
- "path/filepath"
- "strings"
- "time"
- "github.com/robertkrimen/otto"
- uuid "github.com/satori/go.uuid"
- apt "imuslab.com/arozos/mod/apt"
- "imuslab.com/arozos/mod/filesystem"
- metadata "imuslab.com/arozos/mod/filesystem/metadata"
- "imuslab.com/arozos/mod/iot"
- "imuslab.com/arozos/mod/share"
- "imuslab.com/arozos/mod/time/nightly"
- user "imuslab.com/arozos/mod/user"
- )
- /*
- ArOZ Online Javascript Gateway Interface (AGI)
- author: tobychui
- This script load plugins written in Javascript and run them in VM inside golang
- DO NOT CONFUSE PLUGIN WITH SUBSERVICE :))
- */
- var (
- AgiVersion string = "2.2" //Defination of the agi runtime version. Update this when new function is added
- //AGI Internal Error Standard
- exitcall = errors.New("Exit")
- timelimit = errors.New("Timelimit")
- )
- //Lib interface, require vm, user, target system file handler and the vpath of the running script
- type AgiLibIntergface func(*otto.Otto, *user.User, *filesystem.FileSystemHandler, string) //Define the lib loader interface for AGI Libraries
- type AgiPackage struct {
- InitRoot string //The initialization of the root for the module that request this package
- }
- type AgiSysInfo struct {
- //System information
- BuildVersion string
- InternalVersion string
- LoadedModule []string
- //System Handlers
- UserHandler *user.UserHandler
- ReservedTables []string
- PackageManager *apt.AptPackageManager
- ModuleRegisterParser func(string) error
- FileSystemRender *metadata.RenderHandler
- IotManager *iot.Manager
- ShareManager *share.Manager
- NightlyManager *nightly.TaskManager
- //Scanning Roots
- StartupRoot string
- ActivateScope []string
- TempFolderPath string
- }
- type Gateway struct {
- ReservedTables []string
- NightlyScripts []string
- AllowAccessPkgs map[string][]AgiPackage
- LoadedAGILibrary map[string]AgiLibIntergface
- Option *AgiSysInfo
- }
- func NewGateway(option AgiSysInfo) (*Gateway, error) {
- //Handle startup registration of ajgi modules
- gatewayObject := Gateway{
- ReservedTables: option.ReservedTables,
- NightlyScripts: []string{},
- AllowAccessPkgs: map[string][]AgiPackage{},
- LoadedAGILibrary: map[string]AgiLibIntergface{},
- Option: &option,
- }
- //Start all WebApps Registration
- gatewayObject.InitiateAllWebAppModules()
- gatewayObject.RegisterNightlyOperations()
- //Load all the other libs entry points into the memoary
- gatewayObject.ImageLibRegister()
- gatewayObject.FileLibRegister()
- gatewayObject.HTTPLibRegister()
- gatewayObject.ShareLibRegister()
- gatewayObject.IoTLibRegister()
- gatewayObject.AppdataLibRegister()
- return &gatewayObject, nil
- }
- func (g *Gateway) RegisterNightlyOperations() {
- g.Option.NightlyManager.RegisterNightlyTask(func() {
- //This function will execute nightly
- for _, scriptFile := range g.NightlyScripts {
- if isValidAGIScript(scriptFile) {
- //Valid script file. Execute it with system
- for _, username := range g.Option.UserHandler.GetAuthAgent().ListUsers() {
- userinfo, err := g.Option.UserHandler.GetUserInfoFromUsername(username)
- if err != nil {
- continue
- }
- if checkUserAccessToScript(userinfo, scriptFile, "") {
- //This user can access the module that provide this script.
- //Execute this script on his account.
- log.Println("[AGI_Nightly] WIP (" + scriptFile + ")")
- }
- }
- } else {
- //Invalid script. Skipping
- log.Println("[AGI_Nightly] Invalid script file: " + scriptFile)
- }
- }
- })
- }
- func (g *Gateway) InitiateAllWebAppModules() {
- startupScripts, _ := filepath.Glob(filepath.ToSlash(filepath.Clean(g.Option.StartupRoot)) + "/*/init.agi")
- for _, script := range startupScripts {
- scriptContentByte, _ := ioutil.ReadFile(script)
- scriptContent := string(scriptContentByte)
- log.Println("[AGI] Gateway script loaded (" + script + ")")
- //Create a new vm for this request
- vm := otto.New()
- //Only allow non user based operations
- g.injectStandardLibs(vm, script, "./web/")
- _, err := vm.Run(scriptContent)
- if err != nil {
- log.Println("[AGI] Load Failed: " + script + ". Skipping.")
- log.Println(err)
- continue
- }
- }
- }
- func (g *Gateway) RunScript(script string) error {
- //Create a new vm for this request
- vm := otto.New()
- //Only allow non user based operations
- g.injectStandardLibs(vm, "", "./web/")
- _, err := vm.Run(script)
- if err != nil {
- log.Println("[AGI] Script Execution Failed: ", err.Error())
- return err
- }
- return nil
- }
- func (g *Gateway) RegisterLib(libname string, entryPoint AgiLibIntergface) error {
- _, ok := g.LoadedAGILibrary[libname]
- if ok {
- //This lib already registered. Return error
- return errors.New("This library name already registered")
- } else {
- g.LoadedAGILibrary[libname] = entryPoint
- }
- return nil
- }
- func (g *Gateway) raiseError(err error) {
- log.Println("[AGI] Runtime Error " + err.Error())
- //To be implemented
- }
- //Check if this table is restricted table. Return true if the access is valid
- func (g *Gateway) filterDBTable(tablename string, existsCheck bool) bool {
- //Check if table is restricted
- if stringInSlice(tablename, g.ReservedTables) {
- return false
- }
- //Check if table exists
- if existsCheck {
- if !g.Option.UserHandler.GetDatabase().TableExists(tablename) {
- return false
- }
- }
- return true
- }
- //Handle request from RESTFUL API
- func (g *Gateway) APIHandler(w http.ResponseWriter, r *http.Request, thisuser *user.User) {
- scriptContent, err := mv(r, "script", true)
- if err != nil {
- w.WriteHeader(http.StatusBadRequest)
- w.Write([]byte("400 - Bad Request (Missing script content)"))
- return
- }
- g.ExecuteAGIScript(scriptContent, nil, "", "", w, r, thisuser)
- }
- //Handle user requests
- func (g *Gateway) InterfaceHandler(w http.ResponseWriter, r *http.Request, thisuser *user.User) {
- //Get user object from the request
- startupRoot := g.Option.StartupRoot
- startupRoot = filepath.ToSlash(filepath.Clean(startupRoot))
- //Get the script files for the plugin
- scriptFile, err := mv(r, "script", false)
- if err != nil {
- sendErrorResponse(w, "Invalid script path")
- return
- }
- scriptFile = specialURIDecode(scriptFile)
- //Check if the script path exists
- scriptExists := false
- scriptScope := "./web/"
- for _, thisScope := range g.Option.ActivateScope {
- thisScope = filepath.ToSlash(filepath.Clean(thisScope))
- if fileExists(thisScope + "/" + scriptFile) {
- scriptExists = true
- scriptFile = thisScope + "/" + scriptFile
- scriptScope = thisScope
- }
- }
- if !scriptExists {
- sendErrorResponse(w, "Script not found")
- return
- }
- //Check for user permission on this module
- moduleName := getScriptRoot(scriptFile, scriptScope)
- if !thisuser.GetModuleAccessPermission(moduleName) {
- w.WriteHeader(http.StatusForbidden)
- if g.Option.BuildVersion == "development" {
- w.Write([]byte("Permission denied: User do not have permission to access " + moduleName))
- } else {
- w.Write([]byte("403 Forbidden"))
- }
- return
- }
- //Check the given file is actually agi script
- if !(filepath.Ext(scriptFile) == ".agi" || filepath.Ext(scriptFile) == ".js") {
- w.WriteHeader(http.StatusForbidden)
- if g.Option.BuildVersion == "development" {
- w.Write([]byte("AGI script must have file extension of .agi or .js"))
- } else {
- w.Write([]byte("403 Forbidden"))
- }
- return
- }
- //Get the content of the script
- scriptContentByte, _ := ioutil.ReadFile(scriptFile)
- scriptContent := string(scriptContentByte)
- g.ExecuteAGIScript(scriptContent, nil, scriptFile, scriptScope, w, r, thisuser)
- }
- /*
- Executing the given AGI Script contents. Requires:
- scriptContent: The AGI command sequence
- scriptFile: The filepath of the script file
- scriptScope: The scope of the script file, aka the module base path
- w / r : Web request and response writer
- thisuser: userObject
- */
- func (g *Gateway) ExecuteAGIScript(scriptContent string, fsh *filesystem.FileSystemHandler, scriptFile string, scriptScope string, w http.ResponseWriter, r *http.Request, thisuser *user.User) {
- //Create a new vm for this request
- vm := otto.New()
- //Inject standard libs into the vm
- g.injectStandardLibs(vm, scriptFile, scriptScope)
- g.injectUserFunctions(vm, fsh, scriptFile, scriptScope, thisuser, w, r)
- //Detect cotent type
- contentType := r.Header.Get("Content-type")
- if strings.Contains(contentType, "application/json") {
- //For shitty people who use Angular
- body, _ := ioutil.ReadAll(r.Body)
- fields := map[string]interface{}{}
- json.Unmarshal(body, &fields)
- for k, v := range fields {
- vm.Set(k, v)
- }
- vm.Set("POST_data", string(body))
- } else {
- r.ParseForm()
- //Insert all paramters into the vm
- for k, v := range r.PostForm {
- if len(v) == 1 {
- vm.Set(k, v[0])
- } else {
- vm.Set(k, v)
- }
- }
- }
- _, err := vm.Run(scriptContent)
- if err != nil {
- scriptpath, _ := filepath.Abs(scriptFile)
- g.RenderErrorTemplate(w, err.Error(), scriptpath)
- return
- }
- //Get the return valu from the script
- value, err := vm.Get("HTTP_RESP")
- if err != nil {
- sendTextResponse(w, "")
- return
- }
- valueString, err := value.ToString()
- //Get respond header type from the vm
- header, _ := vm.Get("HTTP_HEADER")
- headerString, _ := header.ToString()
- if headerString != "" {
- w.Header().Set("Content-Type", headerString)
- }
- w.Write([]byte(valueString))
- }
- /*
- Execute AGI script with given user information
- Pass in http.Request pointer to enable serverless GET / POST request
- */
- func (g *Gateway) ExecuteAGIScriptAsUser(fsh *filesystem.FileSystemHandler, scriptFile string, targetUser *user.User, r *http.Request) (string, error) {
- //Create a new vm for this request
- vm := otto.New()
- //Inject standard libs into the vm
- g.injectStandardLibs(vm, scriptFile, "")
- g.injectUserFunctions(vm, fsh, scriptFile, "", targetUser, nil, nil)
- if r != nil {
- //Inject serverless script to enable access to GET / POST paramters
- g.injectServerlessFunctions(vm, scriptFile, "", targetUser, r)
- }
- //Inject interrupt Channel
- vm.Interrupt = make(chan func(), 1)
- //Create a panic recovery logic
- defer func() {
- if caught := recover(); caught != nil {
- if caught == timelimit {
- log.Println("[AGI] Execution timeout: " + scriptFile)
- return
- } else if caught == exitcall {
- //Exit gracefully
- return
- } else {
- panic(caught)
- }
- }
- }()
- //Create a max runtime of 5 minutes
- go func() {
- time.Sleep(300 * time.Second) // Stop after 300 seconds
- vm.Interrupt <- func() {
- panic(timelimit)
- }
- }()
- //Try to read the script content
- scriptContent, err := fsh.FileSystemAbstraction.ReadFile(scriptFile)
- if err != nil {
- return "", err
- }
- _, err = vm.Run(scriptContent)
- if err != nil {
- return "", err
- }
- //Get the return value from the script
- value, err := vm.Get("HTTP_RESP")
- if err != nil {
- return "", err
- }
- valueString, err := value.ToString()
- if err != nil {
- return "", err
- }
- return valueString, nil
- }
- /*
- Get user specific tmp filepath for buffering remote file. Return filepath and closer
- tempFilepath, closerFunction := g.getUserSpecificTempFilePath(u, "myfile.txt")
- //Do something with it, after done
- closerFunction();
- */
- func (g *Gateway) getUserSpecificTempFilePath(u *user.User, filename string) (string, func()) {
- uuid := uuid.NewV4().String()
- tmpFileLocation := filepath.Join(g.Option.TempFolderPath, "agiBuff", u.Username, uuid, filepath.Base(filename))
- os.MkdirAll(filepath.Dir(tmpFileLocation), 0775)
- return tmpFileLocation, func() {
- os.RemoveAll(filepath.Dir(tmpFileLocation))
- }
- }
- /*
- Buffer remote reosurces to local by fsh and rpath. Return buffer filepath on local device and its closer function
- */
- func (g *Gateway) bufferRemoteResourcesToLocal(fsh *filesystem.FileSystemHandler, u *user.User, rpath string) (string, func(), error) {
- buffFile, closerFunc := g.getUserSpecificTempFilePath(u, rpath)
- f, err := fsh.FileSystemAbstraction.ReadStream(rpath)
- if err != nil {
- return "", nil, err
- }
- defer f.Close()
- dest, err := os.OpenFile(buffFile, os.O_CREATE|os.O_RDWR, 0775)
- if err != nil {
- return "", nil, err
- }
- io.Copy(dest, f)
- dest.Close()
- return buffFile, func() {
- closerFunc()
- }, nil
- }
|