2018-09-20 02:29:36 +03:00
|
|
|
!:
|
|
|
|
:: lighter than eyre
|
|
|
|
::
|
|
|
|
|= pit=vase
|
2019-07-04 09:09:44 +03:00
|
|
|
=, eyre
|
2018-09-20 02:29:36 +03:00
|
|
|
:: internal data structures
|
|
|
|
::
|
|
|
|
=> =~
|
|
|
|
::
|
|
|
|
:: internal data structures that won't go in zuse
|
|
|
|
::
|
|
|
|
|%
|
|
|
|
+$ move
|
|
|
|
::
|
|
|
|
$: :: duct: request identifier
|
|
|
|
::
|
|
|
|
=duct
|
|
|
|
::
|
|
|
|
::
|
|
|
|
card=(wind note gift:able)
|
|
|
|
==
|
2020-05-05 08:28:37 +03:00
|
|
|
:: +note: private request from eyre to another vane
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
+$ note
|
2018-11-16 00:43:10 +03:00
|
|
|
$% :: %b: to behn
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
$: %b
|
|
|
|
::
|
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
$% [%rest p=@da]
|
|
|
|
[%wait p=@da]
|
2018-11-15 21:27:10 +03:00
|
|
|
== ==
|
2019-03-13 23:29:22 +03:00
|
|
|
:: %d: to dill
|
|
|
|
::
|
|
|
|
$: %d
|
|
|
|
::
|
|
|
|
::
|
|
|
|
$% [%flog =flog:dill]
|
|
|
|
== ==
|
2019-11-19 07:36:21 +03:00
|
|
|
:: %g: to gall
|
2018-09-21 02:36:04 +03:00
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
$: %g
|
2018-09-21 02:36:04 +03:00
|
|
|
::
|
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
$>(%deal task:able:gall)
|
2019-11-05 10:42:59 +03:00
|
|
|
== ==
|
2020-05-05 08:28:37 +03:00
|
|
|
:: +sign: private response from another vane to eyre
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
|
|
|
+$ sign
|
2018-11-20 01:59:58 +03:00
|
|
|
$% :: %b: from behn
|
|
|
|
::
|
|
|
|
$: %b
|
|
|
|
::
|
|
|
|
::
|
2019-06-04 23:28:20 +03:00
|
|
|
$% [%wake error=(unit tang)]
|
2018-11-20 01:59:58 +03:00
|
|
|
== ==
|
2019-11-19 07:36:21 +03:00
|
|
|
:: %g: from gall
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
$: %g
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2018-10-04 00:05:36 +03:00
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
gift:able:gall
|
|
|
|
:: $>(%unto gift:able:gall)
|
2019-11-05 10:42:59 +03:00
|
|
|
== ==
|
2018-09-20 02:29:36 +03:00
|
|
|
--
|
|
|
|
:: more structures
|
|
|
|
::
|
|
|
|
|%
|
|
|
|
++ axle
|
2019-02-09 02:03:46 +03:00
|
|
|
$: :: date: date at which http-server's state was updated to this data structure
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
2020-10-18 12:18:29 +03:00
|
|
|
date=%~2020.10.18
|
2018-09-20 02:29:36 +03:00
|
|
|
:: server-state: state of inbound requests
|
|
|
|
::
|
|
|
|
=server-state
|
|
|
|
==
|
|
|
|
:: +server-state: state relating to open inbound HTTP connections
|
|
|
|
::
|
|
|
|
+$ server-state
|
|
|
|
$: :: bindings: actions to dispatch to when a binding matches
|
|
|
|
::
|
|
|
|
:: Eyre is responsible for keeping its bindings sorted so that it
|
|
|
|
:: will trigger on the most specific binding first. Eyre should send
|
|
|
|
:: back an error response if an already bound binding exists.
|
|
|
|
::
|
|
|
|
:: TODO: It would be nice if we had a path trie. We could decompose
|
|
|
|
:: the :binding into a (map (unit @t) (trie knot =action)).
|
|
|
|
::
|
|
|
|
bindings=(list [=binding =duct =action])
|
2020-09-30 16:07:27 +03:00
|
|
|
:: cors-registry: state used and managed by the +cors core
|
|
|
|
::
|
|
|
|
=cors-registry
|
2018-09-24 21:48:19 +03:00
|
|
|
:: connections: open http connections not fully complete
|
2018-09-21 02:36:04 +03:00
|
|
|
::
|
2018-09-24 21:48:19 +03:00
|
|
|
connections=(map duct outstanding-connection)
|
2018-09-27 02:18:40 +03:00
|
|
|
:: authentication-state: state managed by the +authentication core
|
|
|
|
::
|
|
|
|
=authentication-state
|
2018-11-15 21:27:10 +03:00
|
|
|
:: channel-state: state managed by the +channel core
|
|
|
|
::
|
|
|
|
=channel-state
|
2019-03-21 08:28:32 +03:00
|
|
|
:: domains: domain-names that resolve to us
|
|
|
|
::
|
|
|
|
domains=(set turf)
|
|
|
|
:: http-config: our server configuration
|
|
|
|
::
|
|
|
|
=http-config
|
|
|
|
:: ports: live servers
|
|
|
|
::
|
|
|
|
ports=[insecure=@ud secure=(unit @ud)]
|
2019-04-10 00:03:21 +03:00
|
|
|
:: outgoing-duct: to unix
|
|
|
|
::
|
|
|
|
outgoing-duct=duct
|
2018-09-24 21:48:19 +03:00
|
|
|
==
|
2018-11-15 21:27:10 +03:00
|
|
|
:: channel-request: an action requested on a channel
|
|
|
|
::
|
|
|
|
+$ channel-request
|
|
|
|
$% :: %ack: acknowledges that the client has received events up to :id
|
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
[%ack event-id=@ud]
|
2018-11-15 21:27:10 +03:00
|
|
|
:: %poke: pokes an application, translating :json to :mark.
|
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
[%poke request-id=@ud ship=@p app=term mark=@tas =json]
|
2019-11-07 09:19:32 +03:00
|
|
|
:: %watch: subscribes to an application path
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-11-14 06:38:13 +03:00
|
|
|
[%subscribe request-id=@ud ship=@p app=term =path]
|
2019-11-07 09:19:32 +03:00
|
|
|
:: %leave: unsubscribes from an application path
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-11-14 06:38:13 +03:00
|
|
|
[%unsubscribe request-id=@ud subscription-id=@ud]
|
2019-06-14 00:53:04 +03:00
|
|
|
:: %delete: kills a channel
|
|
|
|
::
|
|
|
|
[%delete ~]
|
2018-11-15 21:27:10 +03:00
|
|
|
==
|
2020-10-19 16:56:05 +03:00
|
|
|
:: clog-timeout: the delay between acks after which clog-threshold kicks in
|
|
|
|
::
|
|
|
|
++ clog-timeout ~s30
|
|
|
|
:: clog-threshold: maximum per-subscription event buildup, after clog-timeout
|
|
|
|
::
|
|
|
|
++ clog-threshold 50
|
2018-11-20 01:59:58 +03:00
|
|
|
:: channel-timeout: the delay before a channel should be reaped
|
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
++ channel-timeout ~h12
|
2020-05-30 03:29:20 +03:00
|
|
|
:: session-timeout: the delay before an idle session expires
|
2020-05-29 16:28:13 +03:00
|
|
|
::
|
|
|
|
++ session-timeout ~d7
|
2018-09-20 02:29:36 +03:00
|
|
|
--
|
|
|
|
:: utilities
|
|
|
|
::
|
|
|
|
|%
|
2019-01-30 22:06:24 +03:00
|
|
|
:: +combine-octs: combine multiple octs into one
|
|
|
|
::
|
|
|
|
++ combine-octs
|
|
|
|
|= a=(list octs)
|
|
|
|
^- octs
|
|
|
|
:- %+ roll a
|
|
|
|
|= [=octs sum=@ud]
|
|
|
|
(add sum p.octs)
|
|
|
|
(can 3 a)
|
2019-01-12 01:15:17 +03:00
|
|
|
:: +prune-events: removes all items from the front of the queue up to :id
|
|
|
|
::
|
2020-10-19 16:56:05 +03:00
|
|
|
:: also produces, per request-id, the amount of events that have got acked,
|
|
|
|
:: for use with +subtract-acked-events.
|
|
|
|
::
|
2019-01-12 01:15:17 +03:00
|
|
|
++ prune-events
|
2020-10-19 16:56:05 +03:00
|
|
|
=| acked=(map @ud @ud)
|
2020-10-18 12:18:29 +03:00
|
|
|
|= [q=(qeu [id=@ud @ud channel-event]) id=@ud]
|
2020-10-19 16:56:05 +03:00
|
|
|
^+ [acked q]
|
2019-01-12 01:15:17 +03:00
|
|
|
:: if the queue is now empty, that's fine
|
|
|
|
::
|
2019-01-12 02:18:53 +03:00
|
|
|
?: =(~ q)
|
2020-10-19 16:56:05 +03:00
|
|
|
[acked ~]
|
2019-01-12 01:15:17 +03:00
|
|
|
::
|
2020-10-19 16:56:05 +03:00
|
|
|
=/ next=[item=[id=@ud request-id=@ud channel-event] _q] ~(get to q)
|
2019-01-12 01:15:17 +03:00
|
|
|
:: if the head of the queue is newer than the acknowledged id, we're done
|
|
|
|
::
|
2019-01-17 01:58:07 +03:00
|
|
|
?: (gth id.item.next id)
|
2020-10-19 16:56:05 +03:00
|
|
|
[acked q]
|
|
|
|
:: otherwise, note the ack, and check next item
|
|
|
|
::
|
|
|
|
%_ $
|
|
|
|
q +:next
|
2019-01-12 01:15:17 +03:00
|
|
|
::
|
2020-10-19 16:56:05 +03:00
|
|
|
acked
|
|
|
|
=, item.next
|
|
|
|
%+ ~(put by acked) request-id
|
|
|
|
+((~(gut by acked) request-id 0))
|
|
|
|
==
|
|
|
|
:: +subtract-acked-events: update the subscription map's pending ack counts
|
|
|
|
::
|
|
|
|
++ subtract-acked-events
|
|
|
|
|= [acked=(map @ud @ud) unacked=(map @ud @ud)]
|
|
|
|
^+ unacked
|
|
|
|
%+ roll ~(tap by acked)
|
|
|
|
|= [[rid=@ud ack=@ud] unacked=_unacked]
|
|
|
|
?~ sus=(~(get by unacked) rid)
|
|
|
|
unacked
|
|
|
|
%+ ~(put by unacked) rid
|
|
|
|
?: (lte u.sus ack) 0
|
|
|
|
(sub u.sus ack)
|
2018-11-15 21:27:10 +03:00
|
|
|
:: +parse-channel-request: parses a list of channel-requests
|
|
|
|
::
|
2018-11-16 00:43:10 +03:00
|
|
|
:: Parses a json array into a list of +channel-request. If any of the items
|
|
|
|
:: in the list fail to parse, the entire thing fails so we can 400 properly
|
|
|
|
:: to the client.
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
++ parse-channel-request
|
2018-11-16 00:43:10 +03:00
|
|
|
|= request-list=json
|
|
|
|
^- (unit (list channel-request))
|
|
|
|
:: parse top
|
|
|
|
::
|
|
|
|
=, dejs-soft:format
|
|
|
|
=- ((ar -) request-list)
|
|
|
|
::
|
|
|
|
|= item=json
|
|
|
|
^- (unit channel-request)
|
|
|
|
::
|
|
|
|
?~ maybe-key=((ot action+so ~) item)
|
|
|
|
~
|
|
|
|
?: =('ack' u.maybe-key)
|
2018-11-21 04:06:04 +03:00
|
|
|
((pe %ack (ot event-id+ni ~)) item)
|
2018-11-16 00:43:10 +03:00
|
|
|
?: =('poke' u.maybe-key)
|
2018-11-21 04:06:04 +03:00
|
|
|
((pe %poke (ot id+ni ship+(su fed:ag) app+so mark+(su sym) json+some ~)) item)
|
2018-11-16 00:43:10 +03:00
|
|
|
?: =('subscribe' u.maybe-key)
|
|
|
|
%. item
|
2019-11-14 06:38:13 +03:00
|
|
|
%+ pe %subscribe
|
2018-11-21 04:06:04 +03:00
|
|
|
(ot id+ni ship+(su fed:ag) app+so path+(su ;~(pfix fas (more fas urs:ab))) ~)
|
2018-11-16 00:43:10 +03:00
|
|
|
?: =('unsubscribe' u.maybe-key)
|
|
|
|
%. item
|
2019-11-14 06:38:13 +03:00
|
|
|
%+ pe %unsubscribe
|
2019-03-27 01:52:32 +03:00
|
|
|
(ot id+ni subscription+ni ~)
|
2019-06-14 00:53:04 +03:00
|
|
|
?: =('delete' u.maybe-key)
|
|
|
|
`[%delete ~]
|
2018-11-16 00:43:10 +03:00
|
|
|
:: if we reached this, we have an invalid action key. fail parsing.
|
|
|
|
::
|
|
|
|
~
|
2018-09-27 02:18:40 +03:00
|
|
|
:: +login-page: internal page to login to an Urbit
|
|
|
|
::
|
|
|
|
++ login-page
|
2019-07-02 01:16:52 +03:00
|
|
|
|= [redirect-url=(unit @t) our=@p]
|
2018-09-27 02:18:40 +03:00
|
|
|
^- octs
|
|
|
|
=+ redirect-str=?~(redirect-url "" (trip u.redirect-url))
|
|
|
|
%- as-octs:mimes:html
|
|
|
|
%- crip
|
|
|
|
%- en-xml:html
|
|
|
|
;html
|
|
|
|
;head
|
2019-07-02 01:16:52 +03:00
|
|
|
;meta(charset "utf-8");
|
2020-02-11 03:48:47 +03:00
|
|
|
;meta(name "viewport", content "width=device-width, initial-scale=1, shrink-to-fit=no");
|
|
|
|
;title:"OS1"
|
2019-07-02 01:16:52 +03:00
|
|
|
;style:'''
|
|
|
|
@import url("https://rsms.me/inter/inter.css");
|
|
|
|
@font-face {
|
|
|
|
font-family: "Source Code Pro";
|
2020-02-11 03:48:47 +03:00
|
|
|
src: url("https://storage.googleapis.com/media.urbit.org/fonts/scp-regular.woff");
|
|
|
|
font-weight: 400;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
|
|
|
html, body {
|
|
|
|
font-family: Inter, sans-serif;
|
|
|
|
height: 100%;
|
|
|
|
margin: 0 !important;
|
|
|
|
width: 100%;
|
2020-02-11 03:48:47 +03:00
|
|
|
background: #fff;
|
|
|
|
color: #000;
|
|
|
|
-webkit-font-smoothing: antialiased;
|
|
|
|
line-height: 1.5;
|
|
|
|
font-size: 12pt;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
a, a:visited {
|
|
|
|
color: #000;
|
|
|
|
text-decoration: none;
|
|
|
|
font-size: 0.875rem;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
p {
|
|
|
|
margin-block-start: 0;
|
|
|
|
margin-block-end: 0;
|
|
|
|
font-size: 0.875rem;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
input {
|
|
|
|
width: 100%;
|
|
|
|
padding: 0.75rem;
|
|
|
|
border: 1px solid #e6e6e6;
|
|
|
|
margin-top: 0.25rem;
|
|
|
|
margin-bottom: 1rem;
|
|
|
|
font-size: 0.875rem;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
input:focus {
|
|
|
|
outline: 0;
|
|
|
|
border: 1px solid #000;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
button {
|
|
|
|
-webkit-appearance: none;
|
|
|
|
padding: 0.75rem;
|
|
|
|
background-color: #eee;
|
|
|
|
border: 1px solid #d1d2d3;
|
|
|
|
color: #666;
|
|
|
|
font-size: 0.875rem;
|
|
|
|
border-radius: 0;
|
2019-08-09 00:16:45 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
footer {
|
|
|
|
position: absolute;
|
|
|
|
bottom: 0;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
.mono {
|
|
|
|
font-family: "Source Code Pro", monospace;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
.gray2 {
|
|
|
|
color: #7f7f7f;
|
|
|
|
}
|
|
|
|
.f9 {
|
|
|
|
font-size: 0.75rem;
|
|
|
|
}
|
|
|
|
.relative {
|
|
|
|
position: relative;
|
|
|
|
}
|
|
|
|
.absolute {
|
|
|
|
position: absolute;
|
|
|
|
}
|
|
|
|
.w-100 {
|
2019-07-02 01:16:52 +03:00
|
|
|
width: 100%;
|
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
.tr {
|
|
|
|
text-align: right;
|
|
|
|
}
|
|
|
|
.pb2 {
|
|
|
|
padding-bottom: 0.5rem;
|
|
|
|
}
|
|
|
|
.pr1 {
|
|
|
|
padding-right: 0.25rem;
|
|
|
|
}
|
|
|
|
.pr2 {
|
|
|
|
padding-right: .5rem;
|
|
|
|
}
|
|
|
|
.dn {
|
|
|
|
display: none;
|
|
|
|
}
|
|
|
|
#main {
|
|
|
|
width: 100%;
|
|
|
|
height: 100%;
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
|
|
|
#inner {
|
2020-02-11 03:48:47 +03:00
|
|
|
position: fixed;
|
|
|
|
top: 50%;
|
|
|
|
left: 50%;
|
|
|
|
transform: translate(-50%, -50%);
|
|
|
|
}
|
2020-02-22 05:56:25 +03:00
|
|
|
@media all and (prefers-color-scheme: dark) {
|
|
|
|
html, body {
|
|
|
|
background-color: #333;
|
|
|
|
color: #fff;
|
|
|
|
}
|
|
|
|
a, a:visited {
|
|
|
|
color: #fff;
|
|
|
|
}
|
|
|
|
input {
|
|
|
|
background: #333;
|
|
|
|
color: #fff;
|
|
|
|
border: 1px solid #7f7f7f;
|
|
|
|
}
|
|
|
|
input:focus {
|
|
|
|
border: 1px solid #fff;
|
|
|
|
}
|
|
|
|
}
|
2020-02-11 03:48:47 +03:00
|
|
|
@media all and (min-width: 34.375rem) {
|
|
|
|
.tc-ns {
|
|
|
|
text-align: center;
|
|
|
|
}
|
|
|
|
.pr0-ns {
|
|
|
|
padding-right: 0;
|
|
|
|
}
|
|
|
|
.dib-ns {
|
|
|
|
display: inline-block;
|
|
|
|
}
|
2019-07-02 01:16:52 +03:00
|
|
|
}
|
|
|
|
'''
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
|
|
|
;body
|
2019-07-02 01:16:52 +03:00
|
|
|
;div#main
|
|
|
|
;div#inner
|
2020-02-11 03:48:47 +03:00
|
|
|
;p:"Urbit ID"
|
|
|
|
;input(value "{(scow %p our)}", disabled "true", class "mono");
|
|
|
|
;p:"Access Key"
|
2020-03-04 03:52:04 +03:00
|
|
|
;p.f9.gray2
|
2020-02-11 03:48:47 +03:00
|
|
|
; Get key from Bridge, or
|
|
|
|
;span.mono.pr1:"+code"
|
|
|
|
; in dojo
|
|
|
|
==
|
2019-07-02 01:16:52 +03:00
|
|
|
;form(action "/~/login", method "post", enctype "application/x-www-form-urlencoded")
|
2020-02-11 03:48:47 +03:00
|
|
|
;input
|
|
|
|
=type "password"
|
|
|
|
=name "password"
|
2020-03-30 20:32:21 +03:00
|
|
|
=placeholder "sampel-ticlyt-migfun-falmel"
|
2020-02-11 03:48:47 +03:00
|
|
|
=class "mono"
|
|
|
|
=autofocus "true";
|
2019-07-02 01:16:52 +03:00
|
|
|
;input(type "hidden", name "redirect", value redirect-str);
|
2020-02-11 03:48:47 +03:00
|
|
|
;button(type "submit"):"Continue"
|
|
|
|
==
|
|
|
|
==
|
|
|
|
;footer.absolute.w-100
|
|
|
|
;div.relative.w-100.tr.tc-ns
|
|
|
|
;p.pr2.pr0-ns.pb2
|
|
|
|
;a(href "https://bridge.urbit.org", target "_blank")
|
|
|
|
;span.dn.dib-ns.pr1:"Open"
|
|
|
|
; Bridge ↗
|
|
|
|
==
|
|
|
|
;a
|
2020-02-11 23:27:08 +03:00
|
|
|
=href "https://urbit.org/using/install/#id"
|
2020-02-11 03:48:47 +03:00
|
|
|
=style "margin-left: 8px; color: #2aa779;"
|
|
|
|
=target "_blank"
|
|
|
|
; Purchase
|
|
|
|
;span.dn.dib-ns.pr1:"an Urbit ID"
|
|
|
|
; ↗
|
|
|
|
==
|
|
|
|
==
|
2019-07-02 01:16:52 +03:00
|
|
|
==
|
|
|
|
==
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
|
|
|
==
|
|
|
|
==
|
2018-11-21 04:06:04 +03:00
|
|
|
:: +render-tang-to-marl: renders a tang and adds <br/> tags between each line
|
2018-10-11 01:26:51 +03:00
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
++ render-tang-to-marl
|
2018-10-11 01:26:51 +03:00
|
|
|
|= {wid/@u tan/tang}
|
|
|
|
^- marl
|
|
|
|
=/ raw=(list tape) (zing (turn tan |=(a/tank (wash 0^wid a))))
|
|
|
|
::
|
|
|
|
|- ^- marl
|
|
|
|
?~ raw ~
|
|
|
|
[;/(i.raw) ;br; $(raw t.raw)]
|
2018-11-21 04:06:04 +03:00
|
|
|
:: +render-tang-to-wall: renders tang as text lines
|
|
|
|
::
|
|
|
|
++ render-tang-to-wall
|
|
|
|
|= {wid/@u tan/tang}
|
|
|
|
^- wall
|
|
|
|
(zing (turn tan |=(a=tank (wash 0^wid a))))
|
|
|
|
:: +wall-to-octs: text to binary output
|
|
|
|
::
|
|
|
|
++ wall-to-octs
|
|
|
|
|= =wall
|
|
|
|
^- (unit octs)
|
|
|
|
::
|
|
|
|
?: =(~ wall)
|
|
|
|
~
|
|
|
|
::
|
|
|
|
:- ~
|
|
|
|
%- as-octs:mimes:html
|
|
|
|
%- crip
|
|
|
|
%- zing
|
|
|
|
%+ turn wall
|
|
|
|
|= t=tape
|
|
|
|
"{t}\0a"
|
2018-10-10 21:51:52 +03:00
|
|
|
:: +internal-server-error: 500 page, with a tang
|
|
|
|
::
|
|
|
|
++ internal-server-error
|
2018-10-11 01:26:51 +03:00
|
|
|
|= [authorized=? url=@t t=tang]
|
2018-10-10 21:51:52 +03:00
|
|
|
^- octs
|
|
|
|
%- as-octs:mimes:html
|
|
|
|
%- crip
|
|
|
|
%- en-xml:html
|
|
|
|
;html
|
|
|
|
;head
|
|
|
|
;title:"500 Internal Server Error"
|
|
|
|
==
|
|
|
|
;body
|
|
|
|
;h1:"Internal Server Error"
|
|
|
|
;p:"There was an error while handling the request for {<(trip url)>}."
|
|
|
|
;* ?: authorized
|
|
|
|
;=
|
2018-11-21 04:06:04 +03:00
|
|
|
;code:"*{(render-tang-to-marl 80 t)}"
|
2018-10-10 21:51:52 +03:00
|
|
|
==
|
|
|
|
~
|
|
|
|
==
|
|
|
|
==
|
2019-03-27 01:52:32 +03:00
|
|
|
:: +error-page: error page, with an error string if logged in
|
2019-03-21 02:00:46 +03:00
|
|
|
::
|
2019-03-21 23:58:37 +03:00
|
|
|
++ error-page
|
|
|
|
|= [code=@ud authorized=? url=@t t=tape]
|
2019-03-21 02:00:46 +03:00
|
|
|
^- octs
|
2019-03-21 23:58:37 +03:00
|
|
|
::
|
|
|
|
=/ code-as-tape=tape (format-ud-as-integer code)
|
|
|
|
=/ message=tape
|
2020-06-12 03:13:13 +03:00
|
|
|
?+ code "{<code>} Error"
|
|
|
|
%400 "Bad Request"
|
|
|
|
%403 "Forbidden"
|
|
|
|
%404 "Not Found"
|
|
|
|
%405 "Method Not Allowed"
|
|
|
|
%500 "Internal Server Error"
|
|
|
|
==
|
2019-03-21 23:58:37 +03:00
|
|
|
::
|
2019-03-21 02:00:46 +03:00
|
|
|
%- as-octs:mimes:html
|
|
|
|
%- crip
|
|
|
|
%- en-xml:html
|
|
|
|
;html
|
|
|
|
;head
|
2019-03-21 23:58:37 +03:00
|
|
|
;title:"{code-as-tape} {message}"
|
2019-03-21 02:00:46 +03:00
|
|
|
==
|
|
|
|
;body
|
2019-03-21 23:58:37 +03:00
|
|
|
;h1:"{message}"
|
2019-03-21 02:00:46 +03:00
|
|
|
;p:"There was an error while handling the request for {<(trip url)>}."
|
|
|
|
;* ?: authorized
|
|
|
|
;=
|
|
|
|
;code:"{t}"
|
|
|
|
==
|
|
|
|
~
|
|
|
|
==
|
|
|
|
==
|
2018-10-10 21:51:52 +03:00
|
|
|
:: +format-ud-as-integer: prints a number for consumption outside urbit
|
|
|
|
::
|
|
|
|
++ format-ud-as-integer
|
|
|
|
|= a=@ud
|
2019-01-17 02:24:30 +03:00
|
|
|
^- tape
|
|
|
|
?: =(0 a) ['0' ~]
|
2018-10-10 21:51:52 +03:00
|
|
|
%- flop
|
|
|
|
|- ^- tape
|
|
|
|
?:(=(0 a) ~ [(add '0' (mod a 10)) $(a (div a 10))])
|
2019-06-04 00:34:01 +03:00
|
|
|
:: +host-matches: %.y if the site :binding should be used to handle :host
|
|
|
|
::
|
|
|
|
++ host-matches
|
|
|
|
|= [binding=(unit @t) host=(unit @t)]
|
|
|
|
^- ?
|
|
|
|
:: if the binding allows for matching anything, match
|
|
|
|
::
|
|
|
|
?~ binding
|
|
|
|
%.y
|
|
|
|
:: if the host is ~, that means we're trying to bind nothing to a real
|
|
|
|
:: binding. fail.
|
|
|
|
::
|
|
|
|
?~ host
|
|
|
|
%.n
|
|
|
|
:: otherwise, do a straight comparison
|
|
|
|
::
|
|
|
|
=(u.binding u.host)
|
2020-06-11 02:42:21 +03:00
|
|
|
:: +find-suffix: returns [~ /tail] if :full is (weld :prefix /tail)
|
2018-10-11 21:28:27 +03:00
|
|
|
::
|
2020-06-11 02:42:21 +03:00
|
|
|
++ find-suffix
|
2018-10-11 21:28:27 +03:00
|
|
|
|= [prefix=path full=path]
|
2020-06-11 02:42:21 +03:00
|
|
|
^- (unit path)
|
2018-10-11 21:28:27 +03:00
|
|
|
?~ prefix
|
2020-06-11 02:42:21 +03:00
|
|
|
`full
|
2018-10-11 21:28:27 +03:00
|
|
|
?~ full
|
2020-06-11 02:42:21 +03:00
|
|
|
~
|
2018-10-11 21:28:27 +03:00
|
|
|
?. =(i.prefix i.full)
|
2020-06-11 02:42:21 +03:00
|
|
|
~
|
2018-10-11 21:28:27 +03:00
|
|
|
$(prefix t.prefix, full t.full)
|
2018-10-04 00:05:36 +03:00
|
|
|
:: +simplified-url-parser: returns [(each @if @t) (unit port=@ud)]
|
|
|
|
::
|
|
|
|
++ simplified-url-parser
|
|
|
|
;~ plug
|
|
|
|
;~ pose
|
|
|
|
%+ stag %ip
|
|
|
|
=+ tod=(ape:ag ted:ab)
|
|
|
|
%+ bass 256
|
|
|
|
;~(plug tod (stun [3 3] ;~(pfix dot tod)))
|
|
|
|
::
|
|
|
|
(stag %site (cook crip (star ;~(pose dot alp))))
|
|
|
|
==
|
|
|
|
;~ pose
|
|
|
|
(stag ~ ;~(pfix col dim:ag))
|
|
|
|
(easy ~)
|
|
|
|
==
|
|
|
|
==
|
2018-10-26 02:32:54 +03:00
|
|
|
:: +per-server-event: per-event server core
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
++ per-server-event
|
2018-11-15 21:27:10 +03:00
|
|
|
:: gate that produces the +per-server-event core from event information
|
|
|
|
::
|
2018-09-27 02:18:40 +03:00
|
|
|
|= [[our=@p eny=@ =duct now=@da scry=sley] state=server-state]
|
2019-11-14 00:39:29 +03:00
|
|
|
=/ eyre-id (scot %ta (cat 3 'eyre_' (scot %uv (sham duct))))
|
2018-09-20 02:29:36 +03:00
|
|
|
|%
|
2019-04-30 23:38:40 +03:00
|
|
|
:: +request-local: bypass authentication for local lens connections
|
|
|
|
::
|
|
|
|
++ request-local
|
|
|
|
|= [secure=? =address =request:http]
|
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
|
|
|
=/ act [%app app=%lens]
|
2019-11-09 10:31:11 +03:00
|
|
|
::
|
2019-04-30 23:38:40 +03:00
|
|
|
=/ connection=outstanding-connection
|
2019-11-13 12:38:18 +03:00
|
|
|
[act [& secure address request] ~ 0]
|
2019-04-30 23:38:40 +03:00
|
|
|
::
|
|
|
|
=. connections.state
|
|
|
|
(~(put by connections.state) duct connection)
|
|
|
|
::
|
|
|
|
:_ state
|
2019-11-13 12:38:18 +03:00
|
|
|
(subscribe-to-app app.act inbound-request.connection)
|
2018-09-21 02:36:04 +03:00
|
|
|
:: +request: starts handling an inbound http request
|
|
|
|
::
|
2018-09-20 02:29:36 +03:00
|
|
|
++ request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= [secure=? =address =request:http]
|
2018-09-20 02:29:36 +03:00
|
|
|
^- [(list move) server-state]
|
2020-10-09 15:07:05 +03:00
|
|
|
=* headers header-list.request
|
2020-05-31 18:43:35 +03:00
|
|
|
:: for requests from localhost, respect the "forwarded" header
|
|
|
|
::
|
|
|
|
=? address =([%ipv4 .127.0.0.1] address)
|
2020-10-09 15:07:05 +03:00
|
|
|
(fall (forwarded-for headers) address)
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
2020-10-09 15:07:05 +03:00
|
|
|
=/ host (get-header:http 'host' headers)
|
2020-06-11 02:42:21 +03:00
|
|
|
=/ [=action suburl=@t]
|
|
|
|
(get-action-for-binding host url.request)
|
2018-10-10 21:51:52 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=/ authenticated (request-is-logged-in:authentication request)
|
2018-09-21 02:36:04 +03:00
|
|
|
:: record that we started an asynchronous response
|
|
|
|
::
|
2018-10-25 00:31:19 +03:00
|
|
|
=/ connection=outstanding-connection
|
2019-11-13 12:38:18 +03:00
|
|
|
[action [authenticated secure address request] ~ 0]
|
2018-10-25 00:31:19 +03:00
|
|
|
=. connections.state
|
|
|
|
(~(put by connections.state) duct connection)
|
2020-09-30 16:07:27 +03:00
|
|
|
:: figure out whether this is a cors request,
|
|
|
|
:: whether the origin is approved or not,
|
|
|
|
:: and maybe add it to the "pending approval" set
|
|
|
|
::
|
|
|
|
=/ origin=(unit origin)
|
2020-10-09 15:07:05 +03:00
|
|
|
(get-header:http 'origin' headers)
|
2020-09-30 16:07:27 +03:00
|
|
|
=^ cors-approved requests.cors-registry.state
|
|
|
|
=, cors-registry.state
|
|
|
|
?~ origin [| requests]
|
|
|
|
?: (~(has in approved) u.origin) [& requests]
|
|
|
|
?: (~(has in rejected) u.origin) [| requests]
|
|
|
|
[| (~(put in requests) u.origin)]
|
|
|
|
:: if this is a cors preflight request from an approved origin
|
|
|
|
:: handle it synchronously
|
|
|
|
::
|
|
|
|
?: &(?=(^ origin) cors-approved ?=(%'OPTIONS' method.request))
|
|
|
|
%- handle-response
|
|
|
|
=; =header-list:http
|
|
|
|
[%start [204 header-list] ~ &]
|
2020-10-09 15:07:05 +03:00
|
|
|
:: allow the method and headers that were asked for,
|
|
|
|
:: falling back to wildcard if none specified
|
|
|
|
::
|
2020-09-30 16:07:27 +03:00
|
|
|
::NOTE +handle-response will add the rest of the headers
|
2020-10-09 15:07:05 +03:00
|
|
|
::
|
|
|
|
:~ :- 'Access-Control-Allow-Methods'
|
|
|
|
=- (fall - '*')
|
|
|
|
(get-header:http 'access-control-request-method' headers)
|
|
|
|
::
|
|
|
|
:- 'Access-Control-Allow-Headers'
|
|
|
|
=- (fall - '*')
|
|
|
|
(get-header:http 'access-control-request-headers' headers)
|
2020-09-30 16:07:27 +03:00
|
|
|
==
|
2018-09-27 21:16:59 +03:00
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
?- -.action
|
2018-09-20 02:29:36 +03:00
|
|
|
%gen
|
2020-05-05 08:28:37 +03:00
|
|
|
=/ bek=beak [our desk.generator.action da+now]
|
2020-06-09 21:10:28 +03:00
|
|
|
=/ sup=spur (flop path.generator.action)
|
2020-05-05 08:28:37 +03:00
|
|
|
=/ ski (scry [%141 %noun] ~ %ca bek sup)
|
2020-05-08 08:29:25 +03:00
|
|
|
=/ cag=cage (need (need ski))
|
|
|
|
?> =(%vase p.cag)
|
|
|
|
=/ gat=vase !<(vase q.cag)
|
2020-07-03 08:08:38 +03:00
|
|
|
=/ res=toon
|
|
|
|
%- mock :_ (sloy scry)
|
|
|
|
:_ [%9 2 %0 1] |.
|
2020-05-05 08:28:37 +03:00
|
|
|
%+ slam
|
|
|
|
%+ slam gat
|
2020-07-03 00:41:59 +03:00
|
|
|
!>([[now=now eny=eny bek=bek] ~ ~])
|
2020-05-05 08:28:37 +03:00
|
|
|
!>([authenticated request])
|
2020-07-03 08:08:38 +03:00
|
|
|
?: ?=(%2 -.res)
|
2020-05-05 08:28:37 +03:00
|
|
|
=+ connection=(~(got by connections.state) duct)
|
|
|
|
%^ return-static-data-on-duct 500 'text/html'
|
|
|
|
%: internal-server-error
|
|
|
|
authenticated.inbound-request.connection
|
|
|
|
url.request.inbound-request.connection
|
2020-07-03 08:08:38 +03:00
|
|
|
leaf+"generator crashed"
|
2020-05-05 08:28:37 +03:00
|
|
|
p.res
|
|
|
|
==
|
2020-07-03 08:08:38 +03:00
|
|
|
?: ?=(%1 -.res)
|
|
|
|
=+ connection=(~(got by connections.state) duct)
|
|
|
|
%^ return-static-data-on-duct 500 'text/html'
|
|
|
|
%: internal-server-error
|
|
|
|
authenticated.inbound-request.connection
|
|
|
|
url.request.inbound-request.connection
|
|
|
|
leaf+"scry blocked on"
|
|
|
|
>p.res<
|
|
|
|
~
|
|
|
|
==
|
|
|
|
=/ result ;;(simple-payload:http +.p.res)
|
2020-05-05 08:28:37 +03:00
|
|
|
:: ensure we have a valid content-length header
|
2018-09-21 02:36:04 +03:00
|
|
|
::
|
2020-05-05 08:28:37 +03:00
|
|
|
:: We pass on the response and the headers the generator produces, but
|
|
|
|
:: ensure that we have a single content-length header set correctly in
|
|
|
|
:: the returned if this has a body, and has no content-length if there
|
|
|
|
:: is no body returned to the client.
|
2018-10-10 21:51:52 +03:00
|
|
|
::
|
2020-05-05 08:28:37 +03:00
|
|
|
=. headers.response-header.result
|
|
|
|
?~ data.result
|
|
|
|
(delete-header:http 'content-length' headers.response-header.result)
|
2018-10-11 01:26:51 +03:00
|
|
|
::
|
2020-05-05 08:28:37 +03:00
|
|
|
%^ set-header:http 'content-length'
|
|
|
|
(crip (format-ud-as-integer p.u.data.result))
|
|
|
|
headers.response-header.result
|
|
|
|
::
|
|
|
|
%- handle-response
|
|
|
|
^- http-event:http
|
|
|
|
:* %start
|
|
|
|
response-header.result
|
|
|
|
data.result
|
|
|
|
complete=%.y
|
|
|
|
==
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
%app
|
2018-09-21 02:36:04 +03:00
|
|
|
:_ state
|
2019-11-13 12:38:18 +03:00
|
|
|
(subscribe-to-app app.action inbound-request.connection)
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2018-11-15 21:27:10 +03:00
|
|
|
%authentication
|
2019-02-09 00:16:42 +03:00
|
|
|
(handle-request:authentication secure address request)
|
2020-06-03 02:40:32 +03:00
|
|
|
::
|
|
|
|
%logout
|
|
|
|
(handle-logout:authentication authenticated request)
|
2018-11-13 22:12:59 +03:00
|
|
|
::
|
2018-11-15 21:27:10 +03:00
|
|
|
%channel
|
2019-02-09 00:16:42 +03:00
|
|
|
(handle-request:by-channel secure authenticated address request)
|
2020-06-11 02:45:05 +03:00
|
|
|
::
|
|
|
|
%scry
|
|
|
|
(handle-scry authenticated address request(url suburl))
|
2019-01-11 03:35:09 +03:00
|
|
|
::
|
|
|
|
%four-oh-four
|
|
|
|
%^ return-static-data-on-duct 404 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 404 authenticated url.request ~)
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
2020-06-11 02:45:05 +03:00
|
|
|
:: +handle-scry: respond with scry result, 404 or 500
|
|
|
|
::
|
|
|
|
++ handle-scry
|
|
|
|
|= [authenticated=? =address =request:http]
|
|
|
|
|^ ^- (quip move server-state)
|
2020-06-12 01:57:25 +03:00
|
|
|
?. authenticated
|
|
|
|
(error-response 403 ~)
|
|
|
|
?. =(%'GET' method.request)
|
|
|
|
(error-response 405 "may only GET scries")
|
2020-06-11 02:45:05 +03:00
|
|
|
:: make sure the path contains an app to scry into
|
|
|
|
::
|
|
|
|
=+ req=(parse-request-line url.request)
|
|
|
|
?. ?=(^ site.req)
|
2020-06-12 03:13:13 +03:00
|
|
|
(error-response 400 "scry path must start with app name")
|
2020-06-11 02:45:05 +03:00
|
|
|
:: attempt the scry that was asked for
|
|
|
|
::
|
|
|
|
=/ res=(unit (unit cage))
|
2020-06-12 03:03:55 +03:00
|
|
|
(do-scry %gx i.site.req (snoc t.site.req (fall ext.req %mime)))
|
2020-06-11 02:45:05 +03:00
|
|
|
?~ res (error-response 500 "failed scry")
|
|
|
|
?~ u.res (error-response 404 "no scry result")
|
|
|
|
=* mark p.u.u.res
|
|
|
|
=* vase q.u.u.res
|
2020-06-12 03:03:55 +03:00
|
|
|
:: attempt to find conversion gate to mime
|
2020-06-11 02:45:05 +03:00
|
|
|
::
|
|
|
|
=/ tub=(unit tube:clay)
|
2020-06-12 03:03:55 +03:00
|
|
|
(find-tube mark %mime)
|
2020-06-11 02:45:05 +03:00
|
|
|
?~ tub (error-response 500 "no tube from {(trip mark)} to mime")
|
|
|
|
:: attempt conversion, then send results
|
|
|
|
::
|
|
|
|
=/ mym=(each mime tang)
|
|
|
|
(mule |.(!<(mime (u.tub vase))))
|
|
|
|
?- -.mym
|
|
|
|
%| (error-response 500 "failed tube from {(trip mark)} to mime")
|
|
|
|
%& %+ return-static-data-on-duct 200
|
|
|
|
[(rsh 3 1 (spat p.p.mym)) q.p.mym]
|
|
|
|
==
|
|
|
|
::
|
|
|
|
++ find-tube
|
|
|
|
|= [from=mark to=mark]
|
|
|
|
^- (unit tube:clay)
|
2020-06-12 03:03:55 +03:00
|
|
|
?: =(from to) `(bake same vase)
|
2020-06-11 02:45:05 +03:00
|
|
|
=/ tub=(unit (unit cage))
|
|
|
|
(do-scry %cc %home /[from]/[to])
|
|
|
|
?. ?=([~ ~ %tube *] tub) ~
|
|
|
|
`!<(tube:clay q.u.u.tub)
|
|
|
|
::
|
|
|
|
++ do-scry
|
|
|
|
|= [care=term =desk =path]
|
|
|
|
^- (unit (unit cage))
|
|
|
|
(scry [%141 %noun] ~ care [our desk da+now] (flop path))
|
|
|
|
::
|
|
|
|
++ error-response
|
|
|
|
|= [status=@ud =tape]
|
|
|
|
^- (quip move server-state)
|
|
|
|
%^ return-static-data-on-duct status 'text/html'
|
|
|
|
(error-page status authenticated url.request tape)
|
|
|
|
--
|
2019-11-13 11:38:35 +03:00
|
|
|
:: +subscribe-to-app: subscribe to app and poke it with request data
|
2019-11-09 10:31:11 +03:00
|
|
|
::
|
2019-11-13 11:38:35 +03:00
|
|
|
++ subscribe-to-app
|
2019-11-13 12:38:18 +03:00
|
|
|
|= [app=term =inbound-request:eyre]
|
2019-11-13 11:38:35 +03:00
|
|
|
^- (list move)
|
2019-11-13 12:21:14 +03:00
|
|
|
:~ :* duct %pass /watch-response/[eyre-id]
|
2019-11-19 07:36:21 +03:00
|
|
|
%g %deal [our our] app
|
2019-11-13 11:38:35 +03:00
|
|
|
%watch /http-response/[eyre-id]
|
|
|
|
==
|
|
|
|
::
|
2019-11-13 12:21:14 +03:00
|
|
|
:* duct %pass /run-app-request/[eyre-id]
|
2019-11-19 07:36:21 +03:00
|
|
|
%g %deal [our our] app
|
2019-11-13 11:38:35 +03:00
|
|
|
%poke %handle-http-request
|
|
|
|
!>([eyre-id inbound-request])
|
|
|
|
==
|
2019-11-09 10:31:11 +03:00
|
|
|
==
|
2018-10-22 21:36:30 +03:00
|
|
|
:: +cancel-request: handles a request being externally aborted
|
|
|
|
::
|
|
|
|
++ cancel-request
|
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
2018-10-24 00:25:20 +03:00
|
|
|
?~ connection=(~(get by connections.state) duct)
|
|
|
|
:: nothing has handled this connection
|
|
|
|
::
|
|
|
|
[~ state]
|
|
|
|
::
|
2018-10-24 01:08:17 +03:00
|
|
|
=. connections.state (~(del by connections.state) duct)
|
|
|
|
::
|
2018-10-24 00:25:20 +03:00
|
|
|
?- -.action.u.connection
|
2020-05-05 08:28:37 +03:00
|
|
|
%gen [~ state]
|
2018-10-24 00:25:20 +03:00
|
|
|
%app
|
|
|
|
:_ state
|
|
|
|
:_ ~
|
2019-11-13 12:38:18 +03:00
|
|
|
:* duct %pass /watch-response/[eyre-id]
|
2019-11-19 07:36:21 +03:00
|
|
|
%g %deal [our our] app.action.u.connection
|
2019-11-13 11:38:35 +03:00
|
|
|
%leave ~
|
2018-10-24 00:25:20 +03:00
|
|
|
==
|
|
|
|
::
|
2020-06-03 02:40:32 +03:00
|
|
|
?(%authentication %logout)
|
2018-10-24 00:25:20 +03:00
|
|
|
[~ state]
|
2018-11-13 22:12:59 +03:00
|
|
|
::
|
2018-11-15 21:27:10 +03:00
|
|
|
%channel
|
2018-11-22 00:37:26 +03:00
|
|
|
on-cancel-request:by-channel
|
2019-01-11 03:35:09 +03:00
|
|
|
::
|
2020-06-11 02:45:05 +03:00
|
|
|
?(%scry %four-oh-four)
|
|
|
|
:: it should be impossible for a scry or 404 page to be asynchronous
|
2019-01-11 03:35:09 +03:00
|
|
|
::
|
|
|
|
!!
|
2018-10-24 00:25:20 +03:00
|
|
|
==
|
2018-09-27 02:18:40 +03:00
|
|
|
:: +return-static-data-on-duct: returns one piece of data all at once
|
|
|
|
::
|
|
|
|
++ return-static-data-on-duct
|
|
|
|
|= [code=@ content-type=@t data=octs]
|
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
%- handle-response
|
|
|
|
:* %start
|
2019-02-09 00:16:42 +03:00
|
|
|
:- status-code=code
|
2018-09-27 02:18:40 +03:00
|
|
|
^= headers
|
2018-10-01 21:37:30 +03:00
|
|
|
:~ ['content-type' content-type]
|
2019-01-17 02:24:30 +03:00
|
|
|
['content-length' (crip (format-ud-as-integer p.data))]
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
|
|
|
data=[~ data]
|
|
|
|
complete=%.y
|
2018-09-20 02:29:36 +03:00
|
|
|
==
|
2018-09-27 02:18:40 +03:00
|
|
|
:: +authentication: per-event authentication as this Urbit's owner
|
|
|
|
::
|
|
|
|
:: Right now this hard codes the authentication page using the old +code
|
|
|
|
:: system, but in the future should be pluggable so we can use U2F or
|
|
|
|
:: WebAuthn or whatever is more secure than passwords.
|
|
|
|
::
|
|
|
|
++ authentication
|
|
|
|
|%
|
2020-06-03 02:40:32 +03:00
|
|
|
:: +handle-request: handles an http request for the login page
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
|
|
|
++ handle-request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= [secure=? =address =request:http]
|
2018-09-27 02:18:40 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
|
|
|
:: if we received a simple get, just return the page
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?: =('GET' method.request)
|
2018-09-27 02:18:40 +03:00
|
|
|
:: parse the arguments out of request uri
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=+ request-line=(parse-request-line url.request)
|
2018-09-27 02:18:40 +03:00
|
|
|
%^ return-static-data-on-duct 200 'text/html'
|
2019-07-02 01:16:52 +03:00
|
|
|
(login-page (get-header:http 'redirect' args.request-line) our)
|
2018-09-27 02:18:40 +03:00
|
|
|
:: if we are not a post, return an error
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?. =('POST' method.request)
|
2019-07-02 01:16:52 +03:00
|
|
|
(return-static-data-on-duct 400 'text/html' (login-page ~ our))
|
2018-09-27 02:18:40 +03:00
|
|
|
:: we are a post, and must process the body type as form data
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ body.request
|
2019-07-02 01:16:52 +03:00
|
|
|
(return-static-data-on-duct 400 'text/html' (login-page ~ our))
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
|
|
|
=/ parsed=(unit (list [key=@t value=@t]))
|
2019-02-09 00:16:42 +03:00
|
|
|
(rush q.u.body.request yquy:de-purl:html)
|
2018-09-27 02:18:40 +03:00
|
|
|
?~ parsed
|
2019-07-02 01:16:52 +03:00
|
|
|
(return-static-data-on-duct 400 'text/html' (login-page ~ our))
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-06-10 21:37:12 +03:00
|
|
|
=/ redirect=(unit @t) (get-header:http 'redirect' u.parsed)
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ password=(get-header:http 'password' u.parsed)
|
2020-06-10 21:37:12 +03:00
|
|
|
(return-static-data-on-duct 400 'text/html' (login-page redirect our))
|
2018-09-27 02:18:40 +03:00
|
|
|
:: check that the password is correct
|
|
|
|
::
|
|
|
|
?. =(u.password code)
|
2020-06-10 21:37:12 +03:00
|
|
|
(return-static-data-on-duct 400 'text/html' (login-page redirect our))
|
2018-09-27 02:18:40 +03:00
|
|
|
:: mint a unique session cookie
|
|
|
|
::
|
|
|
|
=/ session=@uv
|
|
|
|
|-
|
|
|
|
=/ candidate=@uv (~(raw og eny) 128)
|
|
|
|
?. (~(has by sessions.authentication-state.state) candidate)
|
|
|
|
candidate
|
|
|
|
$(eny (shas %try-again candidate))
|
|
|
|
:: record cookie and record expiry time
|
|
|
|
::
|
2020-05-29 16:28:13 +03:00
|
|
|
=/ first-session=? =(~ sessions.authentication-state.state)
|
|
|
|
=/ expires-at=@da (add now session-timeout)
|
2018-09-27 02:18:40 +03:00
|
|
|
=. sessions.authentication-state.state
|
2020-06-04 23:06:13 +03:00
|
|
|
(~(put by sessions.authentication-state.state) session [expires-at ~])
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
=/ cookie-line=@t
|
2020-06-03 02:40:32 +03:00
|
|
|
(session-cookie-string session &)
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-05-29 16:28:13 +03:00
|
|
|
=; out=[moves=(list move) server-state]
|
|
|
|
:: if we didn't have any cookies previously, start the expiry timer
|
|
|
|
::
|
|
|
|
?. first-session out
|
|
|
|
=- out(moves [- moves.out])
|
|
|
|
[duct %pass /sessions/expire %b %wait expires-at]
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-06-10 21:37:12 +03:00
|
|
|
?~ redirect
|
2019-03-26 02:52:11 +03:00
|
|
|
%- handle-response
|
|
|
|
:* %start
|
2020-09-25 07:07:07 +03:00
|
|
|
:- status-code=204
|
2019-03-26 02:52:11 +03:00
|
|
|
^= headers
|
|
|
|
:~ ['set-cookie' cookie-line]
|
|
|
|
==
|
|
|
|
data=~
|
|
|
|
complete=%.y
|
|
|
|
==
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-03-10 03:16:43 +03:00
|
|
|
=/ actual-redirect ?:(=(u.redirect '') '/' u.redirect)
|
2019-01-11 03:35:09 +03:00
|
|
|
%- handle-response
|
|
|
|
:* %start
|
2020-06-02 05:53:28 +03:00
|
|
|
:- status-code=303
|
2018-09-27 02:18:40 +03:00
|
|
|
^= headers
|
2020-03-10 03:16:43 +03:00
|
|
|
:~ ['location' actual-redirect]
|
2018-10-01 21:37:30 +03:00
|
|
|
['set-cookie' cookie-line]
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
|
|
|
data=~
|
|
|
|
complete=%.y
|
|
|
|
==
|
2020-06-03 02:40:32 +03:00
|
|
|
:: +handle-logout: handles an http request for logging out
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-06-03 02:40:32 +03:00
|
|
|
++ handle-logout
|
|
|
|
|= [authenticated=? =request:http]
|
|
|
|
^- [(list move) server-state]
|
|
|
|
:: whatever we end up doing, we always redirect to the login page
|
|
|
|
::
|
|
|
|
=/ response=$>(%start http-event:http)
|
|
|
|
:* %start
|
2020-06-03 15:28:30 +03:00
|
|
|
response-header=[303 ['location' '/~/login']~]
|
2020-06-03 02:40:32 +03:00
|
|
|
data=~
|
|
|
|
complete=%.y
|
|
|
|
==
|
|
|
|
::
|
|
|
|
=/ session-id=(unit @uv)
|
|
|
|
(session-id-from-request request)
|
|
|
|
=? headers.response-header.response ?=(^ session-id)
|
|
|
|
:_ headers.response-header.response
|
|
|
|
['set-cookie' (session-cookie-string u.session-id |)]
|
|
|
|
?. &(authenticated ?=(^ session-id))
|
|
|
|
(handle-response response)
|
|
|
|
:: delete the requesting session, or all sessions if so specified
|
|
|
|
::
|
2020-06-04 23:06:13 +03:00
|
|
|
=^ channels=(list @t) sessions.authentication-state.state
|
|
|
|
=* sessions sessions.authentication-state.state
|
|
|
|
=/ all=?
|
|
|
|
?~ body.request |
|
|
|
|
=- ?=(^ -)
|
|
|
|
%+ get-header:http 'all'
|
|
|
|
(fall (rush q.u.body.request yquy:de-purl:html) ~)
|
|
|
|
?. all
|
|
|
|
:_ (~(del by sessions) u.session-id)
|
|
|
|
%~ tap in
|
|
|
|
channels:(~(gut by sessions) u.session-id *session)
|
|
|
|
:_ ~
|
|
|
|
%~ tap in
|
|
|
|
%+ roll ~(val by sessions)
|
|
|
|
|= [session all=(set @t)]
|
|
|
|
(~(uni in all) channels)
|
|
|
|
:: close all affected channels, then send the response
|
|
|
|
::
|
|
|
|
=| moves=(list move)
|
|
|
|
|- ^- (quip move server-state)
|
|
|
|
?~ channels
|
|
|
|
=^ moz state
|
|
|
|
(handle-response response)
|
|
|
|
[(weld moves moz) state]
|
|
|
|
=^ moz state
|
|
|
|
(discard-channel:by-channel i.channels |)
|
|
|
|
$(moves (weld moves moz), channels t.channels)
|
2020-05-30 03:29:20 +03:00
|
|
|
:: +session-id-from-request: attempt to find a session cookie
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
++ session-id-from-request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= =request:http
|
2020-05-30 03:29:20 +03:00
|
|
|
^- (unit @uv)
|
2018-09-27 21:16:59 +03:00
|
|
|
:: are there cookies passed with this request?
|
|
|
|
::
|
|
|
|
:: TODO: In HTTP2, the client is allowed to put multiple 'Cookie'
|
|
|
|
:: headers.
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ cookie-header=(get-header:http 'cookie' header-list.request)
|
2020-05-30 03:29:20 +03:00
|
|
|
~
|
2018-09-27 21:16:59 +03:00
|
|
|
:: is the cookie line is valid?
|
|
|
|
::
|
|
|
|
?~ cookies=(rush u.cookie-header cock:de-purl:html)
|
2020-05-30 03:29:20 +03:00
|
|
|
~
|
2018-09-27 21:16:59 +03:00
|
|
|
:: is there an urbauth cookie?
|
|
|
|
::
|
2019-10-05 01:06:01 +03:00
|
|
|
?~ urbauth=(get-header:http (crip "urbauth-{<our>}") u.cookies)
|
2020-05-30 03:29:20 +03:00
|
|
|
~
|
|
|
|
:: if it's formatted like a valid session cookie, produce it
|
2018-09-27 21:16:59 +03:00
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
`(unit @)`(rush u.urbauth ;~(pfix (jest '0v') viz:ag))
|
|
|
|
:: +request-is-logged-in: checks to see if the request is authenticated
|
|
|
|
::
|
|
|
|
:: We are considered logged in if this request has an urbauth
|
|
|
|
:: Cookie which is not expired.
|
|
|
|
::
|
|
|
|
++ request-is-logged-in
|
|
|
|
|= =request:http
|
|
|
|
^- ?
|
|
|
|
:: does the request pass a session cookie?
|
2018-09-27 21:16:59 +03:00
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
?~ session-id=(session-id-from-request request)
|
2018-09-27 21:16:59 +03:00
|
|
|
%.n
|
|
|
|
:: is this a session that we know about?
|
|
|
|
::
|
2019-07-18 00:57:01 +03:00
|
|
|
?~ session=(~(get by sessions.authentication-state.state) `@uv`u.session-id)
|
2018-09-27 21:16:59 +03:00
|
|
|
%.n
|
|
|
|
:: is this session still valid?
|
2018-09-27 02:18:40 +03:00
|
|
|
::
|
2018-09-27 21:16:59 +03:00
|
|
|
(lte now expiry-time.u.session)
|
2018-09-27 02:18:40 +03:00
|
|
|
:: +code: returns the same as |code
|
|
|
|
::
|
|
|
|
++ code
|
|
|
|
^- @ta
|
2019-03-18 23:48:00 +03:00
|
|
|
::
|
|
|
|
=+ pax=/(scot %p our)/code/(scot %da now)/(scot %p our)
|
|
|
|
=+ res=((sloy scry) [151 %noun] %j pax)
|
|
|
|
::
|
|
|
|
(rsh 3 1 (scot %p (@ (need (need res)))))
|
2020-06-03 02:40:32 +03:00
|
|
|
:: +session-cookie-string: compose session cookie
|
2020-05-30 03:29:20 +03:00
|
|
|
::
|
|
|
|
++ session-cookie-string
|
2020-06-03 02:40:32 +03:00
|
|
|
|= [session=@uv extend=?]
|
2020-05-30 03:29:20 +03:00
|
|
|
^- @t
|
|
|
|
%- crip
|
|
|
|
=; max-age=tape
|
|
|
|
"urbauth-{<our>}={<session>}; Path=/; Max-Age={max-age}"
|
|
|
|
%- format-ud-as-integer
|
2020-06-03 02:40:32 +03:00
|
|
|
?. extend 0
|
2020-05-30 03:29:20 +03:00
|
|
|
(div (msec:milly session-timeout) 1.000)
|
2018-09-27 02:18:40 +03:00
|
|
|
--
|
2018-11-15 21:27:10 +03:00
|
|
|
:: +channel: per-event handling of requests to the channel system
|
|
|
|
::
|
|
|
|
:: Eyre offers a remote interface to your Urbit through channels, which
|
2019-03-18 23:48:00 +03:00
|
|
|
:: are persistent connections on the server which can be disconnected and
|
|
|
|
:: reconnected on the client.
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
++ by-channel
|
2018-11-15 21:27:10 +03:00
|
|
|
:: moves: the moves to be sent out at the end of this event, reversed
|
|
|
|
::
|
|
|
|
=| moves=(list move)
|
|
|
|
|%
|
|
|
|
:: +handle-request: handles an http request for the subscription system
|
|
|
|
::
|
|
|
|
++ handle-request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= [secure=? authenticated=? =address =request:http]
|
2018-11-15 21:27:10 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
:: if we're not authenticated error, but don't redirect.
|
|
|
|
::
|
|
|
|
:: We don't redirect because subscription stuff is never the toplevel
|
|
|
|
:: page; issuing a redirect won't help.
|
|
|
|
::
|
|
|
|
?. authenticated
|
2019-03-21 23:58:37 +03:00
|
|
|
%^ return-static-data-on-duct 403 'text/html'
|
|
|
|
(error-page 403 authenticated url.request "unauthenticated channel usage")
|
2018-11-15 21:27:10 +03:00
|
|
|
:: parse out the path key the subscription is on
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=+ request-line=(parse-request-line url.request)
|
2018-11-15 21:27:10 +03:00
|
|
|
?. ?=([@t @t @t ~] site.request-line)
|
2019-01-09 01:44:03 +03:00
|
|
|
:: url is not of the form '/~/channel/'
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 authenticated url.request "malformed channel url")
|
2018-11-21 04:06:04 +03:00
|
|
|
:: channel-id: unique channel id parsed out of url
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
=+ channel-id=i.t.t.site.request-line
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?: =('PUT' method.request)
|
2018-11-15 21:27:10 +03:00
|
|
|
:: PUT methods starts/modifies a channel, and returns a result immediately
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
(on-put-request channel-id request)
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?: =('GET' method.request)
|
|
|
|
(on-get-request channel-id request)
|
2019-07-02 22:22:13 +03:00
|
|
|
?: =('POST' method.request)
|
|
|
|
:: POST methods are used solely for deleting channels
|
|
|
|
(on-put-request channel-id request)
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
~& %session-not-a-put
|
|
|
|
[~ state]
|
2018-11-22 00:37:26 +03:00
|
|
|
:: +on-cancel-request: cancels an ongoing subscription
|
|
|
|
::
|
|
|
|
:: One of our long lived sessions just got closed. We put the associated
|
|
|
|
:: session back into the waiting state.
|
|
|
|
::
|
|
|
|
++ on-cancel-request
|
|
|
|
^- [(list move) server-state]
|
|
|
|
:: lookup the session id by duct
|
|
|
|
::
|
|
|
|
?~ maybe-channel-id=(~(get by duct-to-key.channel-state.state) duct)
|
2020-05-20 11:36:33 +03:00
|
|
|
~> %slog.[0 leaf+"eyre: no channel to cancel {<duct>}"]
|
2018-11-22 00:37:26 +03:00
|
|
|
[~ state]
|
|
|
|
::
|
2020-05-20 11:36:33 +03:00
|
|
|
~> %slog.[0 leaf+"eyre: canceling {<duct>}"]
|
2019-01-11 03:35:09 +03:00
|
|
|
::
|
2019-10-10 14:33:11 +03:00
|
|
|
=/ maybe-session
|
|
|
|
(~(get by session.channel-state.state) u.maybe-channel-id)
|
|
|
|
?~ maybe-session [~ state]
|
|
|
|
::
|
|
|
|
=/ heartbeat-cancel=(list move)
|
|
|
|
?~ heartbeat.u.maybe-session ~
|
|
|
|
:~ %^ cancel-heartbeat-move
|
|
|
|
u.maybe-channel-id
|
|
|
|
date.u.heartbeat.u.maybe-session
|
|
|
|
duct.u.heartbeat.u.maybe-session
|
|
|
|
==
|
|
|
|
::
|
2018-11-22 00:37:26 +03:00
|
|
|
=/ expiration-time=@da (add now channel-timeout)
|
|
|
|
::
|
2019-10-10 14:33:11 +03:00
|
|
|
:- %+ weld heartbeat-cancel
|
|
|
|
[(set-timeout-move u.maybe-channel-id expiration-time) moves]
|
2018-11-22 00:37:26 +03:00
|
|
|
%_ state
|
|
|
|
session.channel-state
|
|
|
|
%+ ~(jab by session.channel-state.state) u.maybe-channel-id
|
|
|
|
|= =channel
|
|
|
|
:: if we are canceling a known channel, it should have a listener
|
|
|
|
::
|
|
|
|
?> ?=([%| *] state.channel)
|
2019-10-10 14:33:11 +03:00
|
|
|
channel(state [%& [expiration-time duct]], heartbeat ~)
|
2018-11-22 00:37:26 +03:00
|
|
|
::
|
|
|
|
duct-to-key.channel-state
|
|
|
|
(~(del by duct-to-key.channel-state.state) duct)
|
|
|
|
==
|
|
|
|
:: +set-timeout-timer-for: sets a timeout timer on a channel
|
|
|
|
::
|
|
|
|
:: This creates a channel if it doesn't exist, cancels existing timers
|
|
|
|
:: if they're already set (we cannot have duplicate timers), and (if
|
|
|
|
:: necessary) moves channels from the listening state to the expiration
|
|
|
|
:: state.
|
|
|
|
::
|
|
|
|
++ update-timeout-timer-for
|
|
|
|
|= channel-id=@t
|
|
|
|
^+ ..update-timeout-timer-for
|
|
|
|
:: when our callback should fire
|
|
|
|
::
|
|
|
|
=/ expiration-time=@da (add now channel-timeout)
|
|
|
|
:: if the channel doesn't exist, create it and set a timer
|
|
|
|
::
|
|
|
|
?~ maybe-channel=(~(get by session.channel-state.state) channel-id)
|
|
|
|
::
|
|
|
|
%_ ..update-timeout-timer-for
|
|
|
|
session.channel-state.state
|
|
|
|
%+ ~(put by session.channel-state.state) channel-id
|
2020-10-19 16:56:05 +03:00
|
|
|
[[%& expiration-time duct] 0 now ~ ~ ~ ~]
|
2018-11-22 00:37:26 +03:00
|
|
|
::
|
|
|
|
moves
|
|
|
|
[(set-timeout-move channel-id expiration-time) moves]
|
|
|
|
==
|
|
|
|
:: if the channel has an active listener, we aren't setting any timers
|
|
|
|
::
|
|
|
|
?: ?=([%| *] state.u.maybe-channel)
|
|
|
|
..update-timeout-timer-for
|
|
|
|
:: we have a previous timer; cancel the old one and set the new one
|
|
|
|
::
|
|
|
|
%_ ..update-timeout-timer-for
|
|
|
|
session.channel-state.state
|
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
|
|
|
channel(state [%& [expiration-time duct]])
|
|
|
|
::
|
|
|
|
moves
|
|
|
|
:* (cancel-timeout-move channel-id p.state.u.maybe-channel)
|
|
|
|
(set-timeout-move channel-id expiration-time)
|
|
|
|
moves
|
|
|
|
==
|
|
|
|
==
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-10-07 02:26:03 +03:00
|
|
|
++ set-heartbeat-move
|
|
|
|
|= [channel-id=@t heartbeat-time=@da]
|
|
|
|
^- move
|
|
|
|
:^ duct %pass /channel/heartbeat/[channel-id]
|
|
|
|
[%b %wait heartbeat-time]
|
|
|
|
::
|
|
|
|
++ cancel-heartbeat-move
|
|
|
|
|= [channel-id=@t heartbeat-time=@da =^duct]
|
|
|
|
^- move
|
|
|
|
:^ duct %pass /channel/heartbeat/[channel-id]
|
|
|
|
[%b %rest heartbeat-time]
|
|
|
|
::
|
2018-11-22 00:37:26 +03:00
|
|
|
++ set-timeout-move
|
|
|
|
|= [channel-id=@t expiration-time=@da]
|
|
|
|
^- move
|
|
|
|
[duct %pass /channel/timeout/[channel-id] %b %wait expiration-time]
|
|
|
|
::
|
|
|
|
++ cancel-timeout-move
|
|
|
|
|= [channel-id=@t expiration-time=@da =^duct]
|
|
|
|
^- move
|
|
|
|
:^ duct %pass /channel/timeout/[channel-id]
|
|
|
|
[%b %rest expiration-time]
|
2018-11-21 04:06:04 +03:00
|
|
|
:: +on-get-request: handles a GET request
|
|
|
|
::
|
|
|
|
:: GET requests open a channel for the server to send events to the
|
|
|
|
:: client in text/event-stream format.
|
|
|
|
::
|
|
|
|
++ on-get-request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= [channel-id=@t =request:http]
|
2018-11-21 04:06:04 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
:: if there's no channel-id, we must 404
|
|
|
|
::
|
|
|
|
?~ maybe-channel=(~(get by session.channel-state.state) channel-id)
|
|
|
|
%^ return-static-data-on-duct 404 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 404 %.y url.request ~)
|
2018-11-21 04:06:04 +03:00
|
|
|
:: if there's already a duct listening to this channel, we must 400
|
|
|
|
::
|
|
|
|
?: ?=([%| *] state.u.maybe-channel)
|
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 %.y url.request "channel already bound")
|
2018-11-21 04:06:04 +03:00
|
|
|
:: when opening an event-stream, we must cancel our timeout timer
|
|
|
|
::
|
|
|
|
=. moves
|
2018-11-22 00:37:26 +03:00
|
|
|
[(cancel-timeout-move channel-id p.state.u.maybe-channel) moves]
|
2019-02-09 00:16:42 +03:00
|
|
|
:: the request may include a 'Last-Event-Id' header
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
=/ maybe-last-event-id=(unit @ud)
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ maybe-raw-header=(get-header:http 'Last-Event-ID' header-list.request)
|
2018-11-21 04:06:04 +03:00
|
|
|
~
|
|
|
|
(rush u.maybe-raw-header dum:ag)
|
|
|
|
:: flush events older than the passed in 'Last-Event-ID'
|
|
|
|
::
|
|
|
|
=? state ?=(^ maybe-last-event-id)
|
|
|
|
(acknowledge-events channel-id u.maybe-last-event-id)
|
|
|
|
:: combine the remaining queued events to send to the client
|
|
|
|
::
|
|
|
|
=/ event-replay=wall
|
|
|
|
%- zing
|
|
|
|
%- flop
|
|
|
|
=/ queue events.u.maybe-channel
|
|
|
|
=| events=(list wall)
|
|
|
|
|-
|
|
|
|
^+ events
|
|
|
|
?: =(~ queue)
|
|
|
|
events
|
|
|
|
=^ head queue ~(get to queue)
|
2020-10-18 12:18:29 +03:00
|
|
|
=, p.head
|
2020-10-19 20:17:58 +03:00
|
|
|
::NOTE these will only fail if the mark and/or json types changed,
|
|
|
|
:: since conversion failure also gets caught during first receive.
|
|
|
|
:: we can't do anything about this, so consider it unsupported.
|
2020-10-18 17:31:35 +03:00
|
|
|
?~ sign=(channel-event-to-sign channel-event) $
|
|
|
|
?~ json=(sign-to-json request-id u.sign) $
|
|
|
|
$(events [(event-json-to-wall id u.json) events])
|
2018-11-21 04:06:04 +03:00
|
|
|
:: send the start event to the client
|
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
=^ http-moves state
|
|
|
|
%- handle-response
|
2019-02-09 00:16:42 +03:00
|
|
|
:* %start
|
|
|
|
:- 200
|
2018-11-21 04:06:04 +03:00
|
|
|
:~ ['content-type' 'text/event-stream']
|
|
|
|
['cache-control' 'no-cache']
|
|
|
|
['connection' 'keep-alive']
|
|
|
|
==
|
|
|
|
(wall-to-octs event-replay)
|
|
|
|
complete=%.n
|
|
|
|
==
|
2018-11-22 00:37:26 +03:00
|
|
|
:: associate this duct with this session key
|
|
|
|
::
|
|
|
|
=. duct-to-key.channel-state.state
|
|
|
|
(~(put by duct-to-key.channel-state.state) duct channel-id)
|
2020-06-04 23:06:13 +03:00
|
|
|
:: associate this channel with the session cookie
|
|
|
|
::
|
|
|
|
=. sessions.authentication-state.state
|
|
|
|
=/ session-id=(unit @uv)
|
|
|
|
(session-id-from-request:authentication request)
|
|
|
|
?~ session-id sessions.authentication-state.state
|
|
|
|
%+ ~(jab by sessions.authentication-state.state)
|
|
|
|
u.session-id
|
|
|
|
|= =session
|
|
|
|
session(channels (~(put in channels.session) channel-id))
|
2019-10-07 02:26:03 +03:00
|
|
|
:: initialize sse heartbeat
|
|
|
|
::
|
|
|
|
=/ heartbeat-time=@da (add now ~s20)
|
|
|
|
=/ heartbeat (set-heartbeat-move channel-id heartbeat-time)
|
|
|
|
:: clear the event queue, record the duct for future output and
|
|
|
|
:: record heartbeat-time for possible future cancel
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
=. session.channel-state.state
|
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
2019-10-07 02:26:03 +03:00
|
|
|
channel(events ~, state [%| duct], heartbeat (some [heartbeat-time duct]))
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
2019-10-07 02:26:03 +03:00
|
|
|
[[heartbeat (weld http-moves moves)] state]
|
2018-11-21 04:06:04 +03:00
|
|
|
:: +acknowledge-events: removes events before :last-event-id on :channel-id
|
|
|
|
::
|
|
|
|
++ acknowledge-events
|
|
|
|
|= [channel-id=@t last-event-id=@u]
|
|
|
|
^- server-state
|
|
|
|
%_ state
|
|
|
|
session.channel-state
|
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
|
|
|
^+ channel
|
2020-10-19 16:56:05 +03:00
|
|
|
=^ acked events.channel
|
|
|
|
(prune-events events.channel last-event-id)
|
|
|
|
=. unacked.channel
|
|
|
|
(subtract-acked-events acked unacked.channel)
|
|
|
|
channel(last-ack now)
|
2018-11-21 04:06:04 +03:00
|
|
|
==
|
2018-11-15 21:27:10 +03:00
|
|
|
:: +on-put-request: handles a PUT request
|
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
:: PUT requests send commands from the client to the server. We receive
|
|
|
|
:: a set of commands in JSON format in the body of the message.
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
++ on-put-request
|
2019-02-09 00:16:42 +03:00
|
|
|
|= [channel-id=@t =request:http]
|
2018-11-15 21:27:10 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
:: error when there's no body
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ body.request
|
2018-11-15 21:27:10 +03:00
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 %.y url.request "no put body")
|
2018-11-16 02:27:49 +03:00
|
|
|
:: if the incoming body isn't json, this is a bad request, 400.
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ maybe-json=(de-json:html q.u.body.request)
|
2018-11-15 21:27:10 +03:00
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 %.y url.request "put body not json")
|
2018-11-16 02:27:49 +03:00
|
|
|
:: parse the json into an array of +channel-request items
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-16 02:27:49 +03:00
|
|
|
?~ maybe-requests=(parse-channel-request u.maybe-json)
|
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 %.y url.request "invalid channel json")
|
2018-11-16 02:27:49 +03:00
|
|
|
:: while weird, the request list could be empty
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-16 02:27:49 +03:00
|
|
|
?: =(~ u.maybe-requests)
|
2018-11-15 21:27:10 +03:00
|
|
|
%^ return-static-data-on-duct 400 'text/html'
|
2019-03-21 23:58:37 +03:00
|
|
|
(error-page 400 %.y url.request "empty list of actions")
|
2018-11-21 04:06:04 +03:00
|
|
|
:: check for the existence of the channel-id
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
:: if we have no session, create a new one set to expire in
|
2018-11-22 00:37:26 +03:00
|
|
|
:: :channel-timeout from now. if we have one which has a timer, update
|
|
|
|
:: that timer.
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-22 00:37:26 +03:00
|
|
|
=. ..on-put-request (update-timeout-timer-for channel-id)
|
2018-11-15 21:27:10 +03:00
|
|
|
:: for each request, execute the action passed in
|
|
|
|
::
|
2018-11-16 02:27:49 +03:00
|
|
|
=+ requests=u.maybe-requests
|
2018-11-20 01:59:58 +03:00
|
|
|
:: gall-moves: put moves here first so we can flop for ordering
|
|
|
|
::
|
|
|
|
:: TODO: Have an error state where any invalid duplicate subscriptions
|
|
|
|
:: or other errors cause the entire thing to fail with a 400 and a tang.
|
|
|
|
::
|
|
|
|
=| gall-moves=(list move)
|
2018-11-15 21:27:10 +03:00
|
|
|
|-
|
2018-11-17 01:30:23 +03:00
|
|
|
::
|
2018-11-15 21:27:10 +03:00
|
|
|
?~ requests
|
2018-11-17 01:30:23 +03:00
|
|
|
:: this is a PUT request; we must mark it as complete
|
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
=^ http-moves state
|
|
|
|
%- handle-response
|
|
|
|
:* %start
|
2020-09-25 07:07:07 +03:00
|
|
|
[status-code=204 headers=~]
|
2018-11-17 01:30:23 +03:00
|
|
|
data=~
|
|
|
|
complete=%.y
|
|
|
|
==
|
|
|
|
::
|
2019-01-11 03:35:09 +03:00
|
|
|
[:(weld (flop gall-moves) http-moves moves) state]
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
?- -.i.requests
|
|
|
|
%ack
|
2019-01-12 01:15:17 +03:00
|
|
|
:: client acknowledges that they have received up to event-id
|
|
|
|
::
|
|
|
|
%_ $
|
|
|
|
state (acknowledge-events channel-id event-id.i.requests)
|
|
|
|
requests t.requests
|
|
|
|
==
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
%poke
|
|
|
|
::
|
2018-11-20 01:59:58 +03:00
|
|
|
=. gall-moves
|
|
|
|
:_ gall-moves
|
2018-11-17 01:30:23 +03:00
|
|
|
^- move
|
2018-11-21 04:06:04 +03:00
|
|
|
:^ duct %pass /channel/poke/[channel-id]/(scot %ud request-id.i.requests)
|
2018-11-17 01:30:23 +03:00
|
|
|
=, i.requests
|
2019-11-19 07:36:21 +03:00
|
|
|
:* %g %deal `sock`[our ship] app
|
|
|
|
`task:agent:gall`[%poke-as mark %json !>(json)]
|
2019-11-05 10:42:59 +03:00
|
|
|
==
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
|
|
|
$(requests t.requests)
|
|
|
|
::
|
2019-11-14 06:38:13 +03:00
|
|
|
%subscribe
|
2018-11-20 01:59:58 +03:00
|
|
|
::
|
2020-08-27 14:47:18 +03:00
|
|
|
=, i.requests
|
2019-03-27 01:52:32 +03:00
|
|
|
::
|
2018-11-20 01:59:58 +03:00
|
|
|
=. gall-moves
|
|
|
|
:_ gall-moves
|
|
|
|
^- move
|
2020-08-27 14:47:18 +03:00
|
|
|
:^ duct %pass
|
|
|
|
(subscription-wire channel-id request-id ship app)
|
2019-11-19 07:36:21 +03:00
|
|
|
:* %g %deal [our ship] app
|
2020-10-18 17:31:35 +03:00
|
|
|
`task:agent:gall`[%watch path]
|
2019-11-05 10:42:59 +03:00
|
|
|
==
|
2018-11-20 01:59:58 +03:00
|
|
|
::
|
|
|
|
=. session.channel-state.state
|
2018-11-21 04:06:04 +03:00
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
2020-10-19 01:48:18 +03:00
|
|
|
=- channel(subscriptions -)
|
|
|
|
%+ ~(put by subscriptions.channel)
|
|
|
|
request-id
|
|
|
|
[ship app path duct]
|
2018-11-20 01:59:58 +03:00
|
|
|
::
|
|
|
|
$(requests t.requests)
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2019-11-14 06:38:13 +03:00
|
|
|
%unsubscribe
|
2020-10-19 01:48:18 +03:00
|
|
|
=, i.requests
|
2019-03-27 01:52:32 +03:00
|
|
|
::
|
2019-07-17 20:51:56 +03:00
|
|
|
=/ usession (~(get by session.channel-state.state) channel-id)
|
|
|
|
?~ usession
|
|
|
|
$(requests t.requests)
|
|
|
|
=/ subscriptions subscriptions:u.usession
|
2019-03-27 01:52:32 +03:00
|
|
|
::
|
2020-10-19 01:48:18 +03:00
|
|
|
?~ maybe-subscription=(~(get by subscriptions) subscription-id)
|
2019-03-27 01:52:32 +03:00
|
|
|
:: the client sent us a weird request referring to a subscription
|
|
|
|
:: which isn't active.
|
|
|
|
::
|
2020-10-19 01:48:18 +03:00
|
|
|
~& [%missing-subscription-in-unsubscribe channel-id subscription-id]
|
2019-03-27 01:52:32 +03:00
|
|
|
$(requests t.requests)
|
2019-03-15 21:25:12 +03:00
|
|
|
::
|
|
|
|
=. gall-moves
|
|
|
|
:_ gall-moves
|
|
|
|
^- move
|
2019-03-27 01:52:32 +03:00
|
|
|
=, u.maybe-subscription
|
2020-08-27 14:47:18 +03:00
|
|
|
:^ duc %pass
|
|
|
|
(subscription-wire channel-id subscription-id.i.requests ship app)
|
2019-11-19 07:36:21 +03:00
|
|
|
:* %g %deal [our ship] app
|
|
|
|
`task:agent:gall`[%leave ~]
|
2019-11-05 10:42:59 +03:00
|
|
|
==
|
2019-03-15 21:25:12 +03:00
|
|
|
::
|
|
|
|
=. session.channel-state.state
|
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
2020-10-19 16:56:05 +03:00
|
|
|
%_ channel
|
|
|
|
subscriptions (~(del by subscriptions.channel) subscription-id)
|
|
|
|
unacked (~(del by unacked.channel) subscription-id)
|
|
|
|
==
|
2019-03-15 21:25:12 +03:00
|
|
|
::
|
|
|
|
$(requests t.requests)
|
2019-06-14 00:53:04 +03:00
|
|
|
::
|
|
|
|
%delete
|
2020-06-04 18:12:35 +03:00
|
|
|
=^ moves state
|
|
|
|
(discard-channel channel-id |)
|
2019-06-14 00:53:04 +03:00
|
|
|
=. gall-moves
|
2020-06-04 18:12:35 +03:00
|
|
|
(weld gall-moves moves)
|
2019-06-14 00:53:04 +03:00
|
|
|
$(requests t.requests)
|
|
|
|
::
|
2018-11-15 21:27:10 +03:00
|
|
|
==
|
2020-10-18 12:18:29 +03:00
|
|
|
:: +on-gall-response: sanity-check a gall response, send as event
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
++ on-gall-response
|
2020-08-27 14:47:18 +03:00
|
|
|
|= [channel-id=@t request-id=@ud extra=wire =sign:agent:gall]
|
2018-11-21 04:06:04 +03:00
|
|
|
^- [(list move) server-state]
|
2020-08-27 14:47:18 +03:00
|
|
|
:: if the channel doesn't exist, we should clean up subscriptions
|
|
|
|
::
|
|
|
|
:: this is a band-aid solution. you really want eyre to have cleaned
|
|
|
|
:: these up on-channel-delete in the first place.
|
|
|
|
:: until the source of that bug is discovered though, we keep this
|
|
|
|
:: in place to ensure a slightly tidier home.
|
|
|
|
::
|
2020-10-18 12:18:29 +03:00
|
|
|
?. ?& !(~(has by session.channel-state.state) channel-id)
|
2020-08-27 14:47:18 +03:00
|
|
|
?=(?(%fact %watch-ack) -.sign)
|
|
|
|
?=([@ @ ~] extra)
|
|
|
|
==
|
2020-10-18 12:18:29 +03:00
|
|
|
(emit-event channel-id request-id sign)
|
|
|
|
=/ =ship (slav %p i.extra)
|
|
|
|
=* app=term i.t.extra
|
|
|
|
=/ =tape
|
|
|
|
%+ weld "eyre: removing watch for "
|
|
|
|
"non-existent channel {(trip channel-id)} on {(trip app)}"
|
|
|
|
%- (slog leaf+tape ~)
|
|
|
|
:_ state
|
|
|
|
:_ ~
|
|
|
|
^- move
|
|
|
|
:^ duct %pass
|
|
|
|
(subscription-wire channel-id request-id ship app)
|
|
|
|
[%g %deal [our ship] app `task:agent:gall`[%leave ~]]
|
2018-11-21 04:06:04 +03:00
|
|
|
:: +emit-event: records an event occurred, possibly sending to client
|
|
|
|
::
|
|
|
|
:: When an event occurs, we need to record it, even if we immediately
|
|
|
|
:: send it to a connected browser so in case of disconnection, we can
|
|
|
|
:: resend it.
|
|
|
|
::
|
2020-10-19 16:56:05 +03:00
|
|
|
:: This function is responsible for taking the event sign and converting
|
|
|
|
:: it into a text/event-stream. The :sign then may get sent, and is
|
|
|
|
:: stored for later resending until acknowledged by the client.
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
++ emit-event
|
2020-10-18 12:18:29 +03:00
|
|
|
|= [channel-id=@t request-id=@ud =sign:agent:gall]
|
2018-11-21 04:06:04 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
2019-03-29 20:44:37 +03:00
|
|
|
=/ channel=(unit channel)
|
|
|
|
(~(get by session.channel-state.state) channel-id)
|
|
|
|
?~ channel
|
2019-12-14 11:43:04 +03:00
|
|
|
:_ state :_ ~
|
|
|
|
[duct %pass /flog %d %flog %crud %eyre-no-channel >id=channel-id< ~]
|
2020-10-24 12:45:21 +03:00
|
|
|
:: it's possible that this is a fact emitted directly alongside a fact
|
|
|
|
:: that triggered a clog & closed the subscription. in that case, just
|
|
|
|
:: drop the fact.
|
|
|
|
::
|
|
|
|
?: ?& ?=(%fact -.sign)
|
|
|
|
!(~(has by subscriptions.u.channel) request-id)
|
|
|
|
==
|
|
|
|
~& [%e %fact-without-subscription channel-id request-id]
|
|
|
|
[~ state]
|
2020-10-19 20:17:58 +03:00
|
|
|
:: attempt to convert the sign to json.
|
|
|
|
:: if conversion succeeds, we *can* send it. if the client is actually
|
|
|
|
:: connected, we *will* send it immediately.
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
=/ json=(unit json)
|
|
|
|
(sign-to-json request-id sign)
|
|
|
|
=* sending &(?=([%| *] state.u.channel) ?=(^ json))
|
2020-10-19 16:56:05 +03:00
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
=/ next-id next-id.u.channel
|
|
|
|
:: if we can send it, store the event as unacked
|
|
|
|
::
|
|
|
|
=? events.u.channel ?=(^ json)
|
2020-10-19 16:56:05 +03:00
|
|
|
%- ~(put to events.u.channel)
|
2020-10-19 20:17:58 +03:00
|
|
|
[next-id request-id (sign-to-channel-event sign)]
|
|
|
|
:: if it makes sense to do so, send the event to the client
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
=? moves sending
|
2019-02-09 00:16:42 +03:00
|
|
|
^- (list move)
|
2018-11-21 04:06:04 +03:00
|
|
|
:_ moves
|
2020-10-19 20:17:58 +03:00
|
|
|
::NOTE assertions in this block because =* is flimsy
|
|
|
|
?> ?=([%| *] state.u.channel)
|
2019-03-29 20:44:37 +03:00
|
|
|
:+ p.state.u.channel %give
|
2019-07-04 09:09:44 +03:00
|
|
|
^- gift:able
|
2019-02-06 01:05:06 +03:00
|
|
|
:* %response %continue
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
^= data
|
2020-10-18 12:18:29 +03:00
|
|
|
%- wall-to-octs
|
2020-10-19 20:17:58 +03:00
|
|
|
(event-json-to-wall next-id (need json))
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
complete=%.n
|
|
|
|
==
|
2020-10-19 20:17:58 +03:00
|
|
|
=? next-id ?=(^ json) +(next-id)
|
2020-10-19 16:56:05 +03:00
|
|
|
:: update channel's unacked counts, find out if clogged
|
|
|
|
::
|
|
|
|
=^ clogged unacked.u.channel
|
2020-10-19 20:17:58 +03:00
|
|
|
:: poke-acks are one-offs, don't apply clog logic to them.
|
|
|
|
:: and of course don't count events we can't send as unacked.
|
2020-10-19 16:56:05 +03:00
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
?: ?| ?=(%poke-ack -.sign)
|
|
|
|
?=(~ json)
|
|
|
|
==
|
|
|
|
[| unacked.u.channel]
|
2020-10-19 16:56:05 +03:00
|
|
|
=/ num=@ud
|
|
|
|
(~(gut by unacked.u.channel) request-id 0)
|
|
|
|
:_ (~(put by unacked.u.channel) request-id +(num))
|
|
|
|
?& (gte num clog-threshold)
|
|
|
|
(lth (add last-ack.u.channel clog-timeout) now)
|
|
|
|
==
|
|
|
|
~? clogged [%e %clogged channel-id request-id]
|
2020-10-19 20:17:58 +03:00
|
|
|
:: if we're clogged, or we ran into an event we can't serialize,
|
|
|
|
:: kill this gall subscription.
|
2020-10-19 16:56:05 +03:00
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
=* kicking |(clogged ?=(~ json))
|
|
|
|
=? moves kicking
|
2020-10-19 16:56:05 +03:00
|
|
|
:_ moves
|
|
|
|
=+ (~(got by subscriptions.u.channel) request-id)
|
|
|
|
:^ duct %pass
|
|
|
|
(subscription-wire channel-id request-id ship app)
|
|
|
|
[%g %deal [our ship] app %leave ~]
|
2020-10-19 20:17:58 +03:00
|
|
|
:: update channel state to reflect the %kick
|
|
|
|
::
|
|
|
|
=? u.channel kicking
|
2020-10-19 16:56:05 +03:00
|
|
|
%_ u.channel
|
|
|
|
subscriptions (~(del by subscriptions.u.channel) request-id)
|
|
|
|
unacked (~(del by unacked.u.channel) request-id)
|
|
|
|
events %- ~(put to events.u.channel)
|
2020-10-19 20:17:58 +03:00
|
|
|
[next-id request-id (sign-to-channel-event %kick ~)]
|
2020-10-19 16:56:05 +03:00
|
|
|
==
|
|
|
|
:: if a client is connected, send the kick event to them
|
|
|
|
::
|
2020-10-19 20:17:58 +03:00
|
|
|
=? moves &(kicking ?=([%| *] state.u.channel))
|
2020-10-19 16:56:05 +03:00
|
|
|
:_ moves
|
|
|
|
:+ p.state.u.channel %give
|
|
|
|
^- gift:able
|
|
|
|
:* %response %continue
|
|
|
|
::
|
|
|
|
^= data
|
|
|
|
%- wall-to-octs
|
2020-10-19 20:17:58 +03:00
|
|
|
%+ event-json-to-wall next-id
|
2020-10-19 16:56:05 +03:00
|
|
|
(need (sign-to-json request-id %kick ~))
|
|
|
|
::
|
|
|
|
complete=%.n
|
|
|
|
==
|
2020-10-19 20:17:58 +03:00
|
|
|
=? next-id kicking +(next-id)
|
2018-11-21 04:06:04 +03:00
|
|
|
::
|
|
|
|
:- moves
|
|
|
|
%_ state
|
2018-11-22 00:37:26 +03:00
|
|
|
session.channel-state
|
2020-10-19 16:56:05 +03:00
|
|
|
%+ ~(put by session.channel-state.state) channel-id
|
2020-10-19 20:17:58 +03:00
|
|
|
u.channel(next-id next-id)
|
2020-10-18 12:18:29 +03:00
|
|
|
==
|
2020-10-19 16:56:05 +03:00
|
|
|
:: +sign-to-channel-event: strip the vase from a sign:agent:gall
|
|
|
|
::
|
|
|
|
++ sign-to-channel-event
|
|
|
|
|= =sign:agent:gall
|
|
|
|
^- channel-event
|
|
|
|
?. ?=(%fact -.sign) sign
|
|
|
|
[%fact [p q.q]:cage.sign]
|
2020-10-18 12:18:29 +03:00
|
|
|
:: +channel-event-to-sign: attempt to recover a sign from a channel-event
|
|
|
|
::
|
|
|
|
++ channel-event-to-sign
|
|
|
|
|= event=channel-event
|
|
|
|
^- (unit sign:agent:gall)
|
|
|
|
?. ?=(%fact -.event) `event
|
|
|
|
:: rebuild vase for fact data
|
|
|
|
::
|
|
|
|
=* have=mark mark.event
|
|
|
|
=/ val=(unit (unit cage))
|
|
|
|
(scry [%141 %noun] ~ %cb [our %home da+now] /[have])
|
|
|
|
?. ?=([~ ~ *] val)
|
|
|
|
((slog leaf+"eyre: no mark {(trip have)}" ~) ~)
|
|
|
|
=+ !<(=dais:clay q.u.u.val)
|
|
|
|
=/ res (mule |.((vale:dais noun.event)))
|
|
|
|
?: ?=(%| -.res)
|
|
|
|
((slog leaf+"eyre: stale fact of mark {(trip have)}" ~) ~)
|
2020-10-18 17:31:35 +03:00
|
|
|
`[%fact have p.res]
|
2020-10-18 12:18:29 +03:00
|
|
|
:: +sign-to-json: render sign from request-id as json channel event
|
|
|
|
::
|
|
|
|
++ sign-to-json
|
|
|
|
|= [request-id=@ud =sign:agent:gall]
|
2020-10-18 17:31:35 +03:00
|
|
|
^- (unit json)
|
|
|
|
:: for facts, we try to convert the result to json
|
|
|
|
::
|
|
|
|
=/ jsyn=(unit sign:agent:gall)
|
|
|
|
?. ?=(%fact -.sign) `sign
|
|
|
|
?: ?=(%json p.cage.sign) `sign
|
|
|
|
:: find and use tube from fact mark to json
|
|
|
|
::
|
|
|
|
=* have=mark p.cage.sign
|
|
|
|
=* desc=tape "from {(trip have)} to json"
|
|
|
|
=/ tube=(unit tube:clay)
|
|
|
|
=/ tuc=(unit (unit cage))
|
|
|
|
(scry [%141 %noun] ~ %cc [our %home da+now] (flop /[have]/json))
|
|
|
|
?. ?=([~ ~ *] tuc) ~
|
|
|
|
`!<(tube:clay q.u.u.tuc)
|
|
|
|
?~ tube
|
|
|
|
((slog leaf+"eyre: no tube {desc}" ~) ~)
|
|
|
|
::
|
|
|
|
=/ res (mule |.((u.tube q.cage.sign)))
|
|
|
|
?: ?=(%& -.res)
|
|
|
|
`[%fact %json p.res]
|
|
|
|
((slog leaf+"eyre: failed tube {desc}" ~) ~)
|
|
|
|
::
|
|
|
|
?~ jsyn ~
|
|
|
|
%- some
|
|
|
|
=* sign u.jsyn
|
2020-10-18 12:18:29 +03:00
|
|
|
=, enjs:format
|
|
|
|
%- pairs
|
|
|
|
^- (list [@t json])
|
|
|
|
:- ['id' (numb request-id)]
|
|
|
|
?- -.sign
|
|
|
|
%poke-ack
|
|
|
|
:~ ['response' [%s 'poke']]
|
|
|
|
::
|
|
|
|
?~ p.sign
|
|
|
|
['ok' [%s 'ok']]
|
|
|
|
['err' (wall (render-tang-to-wall 100 u.p.sign))]
|
|
|
|
==
|
|
|
|
::
|
|
|
|
%fact
|
|
|
|
:~ ['response' [%s 'diff']]
|
|
|
|
::
|
|
|
|
:- 'json'
|
2020-10-18 17:31:35 +03:00
|
|
|
~| [%unexpected-fact-mark p.cage.sign]
|
2020-10-18 12:18:29 +03:00
|
|
|
?> =(%json p.cage.sign)
|
|
|
|
;;(json q.q.cage.sign)
|
|
|
|
==
|
|
|
|
::
|
|
|
|
%kick
|
|
|
|
['response' [%s 'quit']]~
|
|
|
|
::
|
|
|
|
%watch-ack
|
|
|
|
:~ ['response' [%s 'subscribe']]
|
|
|
|
::
|
|
|
|
?~ p.sign
|
|
|
|
['ok' [%s 'ok']]
|
|
|
|
['err' (wall (render-tang-to-wall 100 u.p.sign))]
|
2018-11-21 04:06:04 +03:00
|
|
|
==
|
|
|
|
==
|
2019-10-07 02:26:03 +03:00
|
|
|
::
|
2020-10-18 12:18:29 +03:00
|
|
|
++ event-json-to-wall
|
|
|
|
|= [event-id=@ud =json]
|
|
|
|
^- wall
|
|
|
|
:~ (weld "id: " (format-ud-as-integer event-id))
|
|
|
|
(weld "data: " (en-json:html json))
|
|
|
|
""
|
|
|
|
==
|
|
|
|
::
|
2019-10-07 02:26:03 +03:00
|
|
|
++ on-channel-heartbeat
|
|
|
|
|= channel-id=@t
|
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
|
|
|
=/ res
|
|
|
|
%- handle-response
|
|
|
|
:* %continue
|
|
|
|
data=(some (as-octs:mimes:html '\0a'))
|
|
|
|
complete=%.n
|
|
|
|
==
|
|
|
|
=/ http-moves -.res
|
|
|
|
=/ new-state +.res
|
|
|
|
=/ heartbeat-time=@da (add now ~s20)
|
|
|
|
:_ %_ new-state
|
|
|
|
session.channel-state
|
|
|
|
%+ ~(jab by session.channel-state.state) channel-id
|
|
|
|
|= =channel
|
|
|
|
channel(heartbeat (some [heartbeat-time duct]))
|
|
|
|
==
|
|
|
|
(snoc http-moves (set-heartbeat-move channel-id heartbeat-time))
|
2020-06-04 18:12:35 +03:00
|
|
|
:: +discard-channel: remove a channel from state
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2020-06-04 18:12:35 +03:00
|
|
|
:: cleans up state, timers, and gall subscriptions of the channel
|
|
|
|
::
|
|
|
|
++ discard-channel
|
|
|
|
|= [channel-id=@t expired=?]
|
2018-11-15 21:27:10 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
2019-07-17 20:51:56 +03:00
|
|
|
=/ usession=(unit channel)
|
|
|
|
(~(get by session.channel-state.state) channel-id)
|
|
|
|
?~ usession
|
|
|
|
[~ state]
|
|
|
|
=/ session=channel u.usession
|
2018-11-15 21:27:10 +03:00
|
|
|
::
|
2018-11-16 02:27:49 +03:00
|
|
|
:_ %_ state
|
|
|
|
session.channel-state
|
2018-11-21 04:06:04 +03:00
|
|
|
(~(del by session.channel-state.state) channel-id)
|
2020-06-04 18:12:35 +03:00
|
|
|
::
|
|
|
|
duct-to-key.channel-state
|
|
|
|
?. ?=(%| -.state.session) duct-to-key.channel-state.state
|
|
|
|
(~(del by duct-to-key.channel-state.state) p.state.session)
|
2018-11-16 02:27:49 +03:00
|
|
|
==
|
2019-10-10 14:33:11 +03:00
|
|
|
=/ heartbeat-cancel=(list move)
|
|
|
|
?~ heartbeat.session ~
|
|
|
|
:~ %^ cancel-heartbeat-move
|
|
|
|
channel-id
|
|
|
|
date.u.heartbeat.session
|
|
|
|
duct.u.heartbeat.session
|
|
|
|
==
|
2020-06-04 18:12:35 +03:00
|
|
|
=/ expire-cancel=(list move)
|
|
|
|
?: expired ~
|
|
|
|
?. ?=(%& -.state.session) ~
|
|
|
|
=, p.state.session
|
|
|
|
[(cancel-timeout-move channel-id date duct)]~
|
2019-10-10 14:33:11 +03:00
|
|
|
%+ weld heartbeat-cancel
|
2020-06-04 18:12:35 +03:00
|
|
|
%+ weld expire-cancel
|
2018-11-15 21:27:10 +03:00
|
|
|
:: produce a list of moves which cancels every gall subscription
|
|
|
|
::
|
2019-03-27 01:52:32 +03:00
|
|
|
%+ turn ~(tap by subscriptions.session)
|
2020-10-19 01:48:18 +03:00
|
|
|
|= [request-id=@ud ship=@p app=term =path duc=^duct]
|
2018-11-16 02:27:49 +03:00
|
|
|
^- move
|
2020-08-27 14:47:18 +03:00
|
|
|
:^ duc %pass
|
2020-10-19 01:48:18 +03:00
|
|
|
(subscription-wire channel-id request-id ship app)
|
2020-08-27 14:47:18 +03:00
|
|
|
[%g %deal [our ship] app %leave ~]
|
2018-11-15 21:27:10 +03:00
|
|
|
--
|
2019-03-19 23:38:18 +03:00
|
|
|
:: +handle-gall-error: a call to +poke-http-response resulted in a %coup
|
|
|
|
::
|
|
|
|
++ handle-gall-error
|
|
|
|
|= =tang
|
|
|
|
^- [(list move) server-state]
|
|
|
|
::
|
|
|
|
=+ connection=(~(got by connections.state) duct)
|
2019-11-13 12:38:18 +03:00
|
|
|
=/ moves-1=(list move)
|
2019-11-13 12:21:14 +03:00
|
|
|
?. ?=(%app -.action.connection)
|
|
|
|
~
|
|
|
|
:_ ~
|
2019-11-13 12:38:18 +03:00
|
|
|
:* duct %pass /watch-response/[eyre-id]
|
2019-11-19 07:36:21 +03:00
|
|
|
%g %deal [our our] app.action.connection
|
2019-11-13 12:21:14 +03:00
|
|
|
%leave ~
|
|
|
|
==
|
2019-03-19 23:38:18 +03:00
|
|
|
::
|
2019-11-13 12:21:14 +03:00
|
|
|
=^ moves-2 state
|
|
|
|
%^ return-static-data-on-duct 500 'text/html'
|
|
|
|
::
|
|
|
|
%- internal-server-error :*
|
|
|
|
authenticated.inbound-request.connection
|
|
|
|
url.request.inbound-request.connection
|
|
|
|
tang
|
|
|
|
==
|
2019-11-13 12:38:18 +03:00
|
|
|
[(weld moves-1 moves-2) state]
|
2018-10-10 21:51:52 +03:00
|
|
|
:: +handle-response: check a response for correctness and send to earth
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-02-09 02:03:46 +03:00
|
|
|
:: All outbound responses including %http-server generated responses need to go
|
2019-01-12 01:15:17 +03:00
|
|
|
:: through this interface because we want to have one centralized place
|
|
|
|
:: where we perform logging and state cleanup for connections that we're
|
|
|
|
:: done with.
|
|
|
|
::
|
2018-09-24 21:48:19 +03:00
|
|
|
++ handle-response
|
2019-02-09 00:16:42 +03:00
|
|
|
|= =http-event:http
|
2018-09-24 21:48:19 +03:00
|
|
|
^- [(list move) server-state]
|
|
|
|
:: verify that this is a valid response on the duct
|
|
|
|
::
|
|
|
|
?~ connection-state=(~(get by connections.state) duct)
|
|
|
|
~& [%invalid-outstanding-connection duct]
|
|
|
|
[~ state]
|
|
|
|
::
|
|
|
|
|^ ^- [(list move) server-state]
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?- -.http-event
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
|
|
|
%start
|
2019-02-09 00:16:42 +03:00
|
|
|
?^ response-header.u.connection-state
|
2018-09-24 21:48:19 +03:00
|
|
|
~& [%http-multiple-start duct]
|
|
|
|
error-connection
|
2020-05-30 03:29:20 +03:00
|
|
|
:: if request was authenticated, extend the session & cookie's life
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
=^ response-header sessions.authentication-state.state
|
|
|
|
=, authentication
|
|
|
|
=* sessions sessions.authentication-state.state
|
|
|
|
=* inbound inbound-request.u.connection-state
|
|
|
|
=* no-op [response-header.http-event sessions]
|
|
|
|
::
|
|
|
|
?. authenticated.inbound
|
|
|
|
no-op
|
|
|
|
?~ session-id=(session-id-from-request request.inbound)
|
|
|
|
:: cookies are the only auth method, so this is unexpected
|
|
|
|
::
|
|
|
|
~& [%e %authenticated-without-cookie]
|
|
|
|
no-op
|
|
|
|
?. (~(has by sessions) u.session-id)
|
|
|
|
:: if the session has expired since the request was opened,
|
|
|
|
:: tough luck, we don't create/revive sessions here
|
|
|
|
::
|
|
|
|
no-op
|
2020-06-04 23:06:13 +03:00
|
|
|
:_ %+ ~(jab by sessions) u.session-id
|
|
|
|
|= =session
|
|
|
|
session(expiry-time (add now session-timeout))
|
2020-05-30 03:29:20 +03:00
|
|
|
=- response-header.http-event(headers -)
|
|
|
|
%^ set-header:http 'set-cookie'
|
2020-06-03 02:40:32 +03:00
|
|
|
(session-cookie-string u.session-id &)
|
2020-05-30 03:29:20 +03:00
|
|
|
headers.response-header.http-event
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2020-09-30 16:07:27 +03:00
|
|
|
=/ connection=outstanding-connection
|
|
|
|
(~(got by connections.state) duct)
|
|
|
|
:: if the request was a simple cors request from an approved origin
|
|
|
|
:: append the necessary cors headers to the response
|
|
|
|
::
|
|
|
|
=/ origin=(unit origin)
|
|
|
|
%+ get-header:http 'origin'
|
|
|
|
header-list.request.inbound-request.connection
|
|
|
|
=? headers.response-header
|
|
|
|
?& ?=(^ origin)
|
|
|
|
(~(has in approved.cors-registry.state) u.origin)
|
|
|
|
==
|
|
|
|
%^ set-header:http 'Access-Control-Allow-Origin' u.origin
|
|
|
|
%^ set-header:http 'Access-Control-Allow-Credentials' 'true'
|
|
|
|
headers.response-header
|
|
|
|
::
|
2020-05-30 03:29:20 +03:00
|
|
|
=. response-header.http-event response-header
|
2018-09-24 21:48:19 +03:00
|
|
|
=. connections.state
|
2020-09-30 16:07:27 +03:00
|
|
|
%+ ~(put by connections.state) duct
|
2018-09-24 21:48:19 +03:00
|
|
|
%_ connection
|
2020-05-30 03:29:20 +03:00
|
|
|
response-header `response-header
|
2019-02-09 00:16:42 +03:00
|
|
|
bytes-sent ?~(data.http-event 0 p.u.data.http-event)
|
2018-09-24 21:48:19 +03:00
|
|
|
==
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=? state complete.http-event
|
2018-09-24 21:48:19 +03:00
|
|
|
log-complete-request
|
|
|
|
::
|
|
|
|
pass-response
|
|
|
|
::
|
|
|
|
%continue
|
2019-02-09 00:16:42 +03:00
|
|
|
?~ response-header.u.connection-state
|
2018-09-24 21:48:19 +03:00
|
|
|
~& [%http-continue-without-start duct]
|
|
|
|
error-connection
|
|
|
|
::
|
|
|
|
=. connections.state
|
|
|
|
%+ ~(jab by connections.state) duct
|
|
|
|
|= connection=outstanding-connection
|
2019-02-09 00:16:42 +03:00
|
|
|
=+ size=?~(data.http-event 0 p.u.data.http-event)
|
2018-09-24 21:48:19 +03:00
|
|
|
connection(bytes-sent (add bytes-sent.connection size))
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=? state complete.http-event
|
2018-09-24 21:48:19 +03:00
|
|
|
log-complete-request
|
|
|
|
::
|
|
|
|
pass-response
|
|
|
|
::
|
|
|
|
%cancel
|
|
|
|
:: todo: log this differently from an ise.
|
|
|
|
::
|
|
|
|
error-connection
|
|
|
|
==
|
|
|
|
::
|
|
|
|
++ pass-response
|
|
|
|
^- [(list move) server-state]
|
2019-02-09 00:16:42 +03:00
|
|
|
[[duct %give %response http-event]~ state]
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
|
|
|
++ log-complete-request
|
|
|
|
:: todo: log the complete request
|
|
|
|
::
|
|
|
|
:: remove all outstanding state for this connection
|
|
|
|
::
|
|
|
|
=. connections.state
|
|
|
|
(~(del by connections.state) duct)
|
|
|
|
state
|
|
|
|
::
|
|
|
|
++ error-connection
|
|
|
|
:: todo: log application error
|
|
|
|
::
|
|
|
|
:: remove all outstanding state for this connection
|
|
|
|
::
|
|
|
|
=. connections.state
|
|
|
|
(~(del by connections.state) duct)
|
|
|
|
:: respond to outside with %error
|
|
|
|
::
|
|
|
|
^- [(list move) server-state]
|
2019-11-13 12:21:14 +03:00
|
|
|
:_ state
|
|
|
|
:- [duct %give %response %cancel ~]
|
|
|
|
?. ?=(%app -.action.u.connection-state)
|
|
|
|
~
|
|
|
|
:_ ~
|
2019-11-13 12:38:18 +03:00
|
|
|
:* duct %pass /watch-response/[eyre-id]
|
2019-11-19 07:36:21 +03:00
|
|
|
%g %deal [our our] app.action.u.connection-state
|
2019-11-13 12:21:14 +03:00
|
|
|
%leave ~
|
|
|
|
==
|
2018-09-24 21:48:19 +03:00
|
|
|
--
|
2018-09-20 02:29:36 +03:00
|
|
|
:: +add-binding: conditionally add a pairing between binding and action
|
|
|
|
::
|
|
|
|
:: Adds =binding =action if there is no conflicting bindings.
|
|
|
|
::
|
|
|
|
++ add-binding
|
|
|
|
|= [=binding =action]
|
|
|
|
^- [(list move) server-state]
|
2020-06-03 02:40:32 +03:00
|
|
|
=^ success bindings.state
|
2020-10-06 17:50:49 +03:00
|
|
|
:: prevent binding in reserved namespaces
|
|
|
|
::
|
|
|
|
?: ?| ?=([%'~' *] path.binding) :: eyre
|
|
|
|
?=([%'~_~' *] path.binding) :: runtime
|
|
|
|
==
|
|
|
|
[| bindings.state]
|
2020-06-03 02:40:32 +03:00
|
|
|
(insert-binding [binding duct action] bindings.state)
|
|
|
|
:_ state
|
|
|
|
[duct %give %bound success binding]~
|
2018-09-20 02:29:36 +03:00
|
|
|
:: +remove-binding: removes a binding if it exists and is owned by this duct
|
|
|
|
::
|
|
|
|
++ remove-binding
|
|
|
|
|= =binding
|
|
|
|
::
|
|
|
|
^- server-state
|
|
|
|
%_ state
|
|
|
|
bindings
|
|
|
|
%+ skip bindings.state
|
|
|
|
|= [item-binding=^binding item-duct=^duct =action]
|
|
|
|
^- ?
|
|
|
|
&(=(item-binding binding) =(item-duct duct))
|
|
|
|
==
|
|
|
|
:: +get-action-for-binding: finds an action for an incoming web request
|
|
|
|
::
|
|
|
|
++ get-action-for-binding
|
|
|
|
|= [raw-host=(unit @t) url=@t]
|
2020-06-11 02:42:21 +03:00
|
|
|
^- [=action suburl=@t]
|
2018-09-20 02:29:36 +03:00
|
|
|
:: process :raw-host
|
|
|
|
::
|
|
|
|
:: If we are missing a 'Host:' header, if that header is a raw IP
|
|
|
|
:: address, or if the 'Host:' header refers to [our].urbit.org, we want
|
2019-06-04 00:34:01 +03:00
|
|
|
:: to return ~ which means we're unidentified and will match against any
|
|
|
|
:: wildcard matching.
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
:: Otherwise, return the site given.
|
|
|
|
::
|
|
|
|
=/ host=(unit @t)
|
|
|
|
?~ raw-host
|
|
|
|
~
|
2018-10-03 21:36:45 +03:00
|
|
|
:: Parse the raw-host so that we can ignore ports, usernames, etc.
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
2018-10-04 00:05:36 +03:00
|
|
|
=+ parsed=(rush u.raw-host simplified-url-parser)
|
|
|
|
?~ parsed
|
2018-09-20 02:29:36 +03:00
|
|
|
~
|
2018-10-03 21:36:45 +03:00
|
|
|
:: if the url is a raw IP, assume default site.
|
|
|
|
::
|
2018-10-04 00:05:36 +03:00
|
|
|
?: ?=([%ip *] -.u.parsed)
|
|
|
|
~
|
|
|
|
:: if the url is "localhost", assume default site.
|
|
|
|
::
|
|
|
|
?: =([%site 'localhost'] -.u.parsed)
|
|
|
|
~
|
|
|
|
:: render our as a tape, and cut off the sig in front.
|
|
|
|
::
|
|
|
|
=/ with-sig=tape (scow %p our)
|
|
|
|
?> ?=(^ with-sig)
|
|
|
|
?: =(u.raw-host (crip t.with-sig))
|
|
|
|
:: [our].urbit.org is the default site
|
|
|
|
::
|
|
|
|
~
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
raw-host
|
|
|
|
:: url is the raw thing passed over the 'Request-Line'.
|
|
|
|
::
|
2018-09-27 02:18:40 +03:00
|
|
|
:: todo: this is really input validation, and we should return a 500 to
|
|
|
|
:: the client.
|
|
|
|
::
|
|
|
|
=/ request-line (parse-request-line url)
|
|
|
|
=/ parsed-url=(list @t) site.request-line
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
|
|
|
=/ bindings bindings.state
|
|
|
|
|-
|
|
|
|
::
|
|
|
|
?~ bindings
|
2020-06-11 02:42:21 +03:00
|
|
|
[[%four-oh-four ~] url]
|
|
|
|
::
|
|
|
|
?. (host-matches site.binding.i.bindings raw-host)
|
|
|
|
$(bindings t.bindings)
|
|
|
|
?~ suffix=(find-suffix path.binding.i.bindings parsed-url)
|
|
|
|
$(bindings t.bindings)
|
|
|
|
::
|
|
|
|
:- action.i.bindings
|
|
|
|
%^ cat 3
|
|
|
|
%+ roll
|
|
|
|
^- (list @t)
|
|
|
|
(join '/' (flop ['' u.suffix]))
|
|
|
|
(cury cat 3)
|
|
|
|
?~ ext.request-line ''
|
|
|
|
(cat 3 '.' u.ext.request-line)
|
2018-09-20 02:29:36 +03:00
|
|
|
--
|
2019-06-04 00:34:01 +03:00
|
|
|
::
|
2020-05-31 18:43:35 +03:00
|
|
|
++ forwarded-for
|
|
|
|
|= =header-list:http
|
|
|
|
^- (unit address)
|
|
|
|
=/ forwarded=(unit @t)
|
|
|
|
(get-header:http 'forwarded' header-list)
|
|
|
|
?~ forwarded ~
|
|
|
|
|^ =/ forwards=(unit (list (map @t @t)))
|
|
|
|
(unpack-header:http u.forwarded)
|
|
|
|
?. ?=([~ ^] forwards) ~
|
|
|
|
=* forward i.u.forwards
|
|
|
|
?~ for=(~(get by forward) 'for') ~
|
|
|
|
::NOTE per rfc7239, non-ip values are also valid. they're not useful
|
|
|
|
:: for the general case, so we ignore them here. if needed,
|
|
|
|
:: request handlers are free to inspect the headers themselves.
|
|
|
|
::
|
|
|
|
(rush u.for ip-address)
|
|
|
|
::
|
|
|
|
++ ip-address
|
|
|
|
;~ sfix
|
|
|
|
;~(pose (stag %ipv4 ip4) (stag %ipv6 (ifix [lac rac] ip6)))
|
|
|
|
;~(pose ;~(pfix col dim:ag) (easy ~))
|
|
|
|
==
|
|
|
|
--
|
2019-06-04 00:34:01 +03:00
|
|
|
::
|
|
|
|
++ parse-request-line
|
|
|
|
|= url=@t
|
|
|
|
^- [[ext=(unit @ta) site=(list @t)] args=(list [key=@t value=@t])]
|
|
|
|
(fall (rush url ;~(plug apat:de-purl:html yque:de-purl:html)) [[~ ~] ~])
|
2020-06-03 02:40:32 +03:00
|
|
|
::
|
|
|
|
++ insert-binding
|
|
|
|
|= [[=binding =duct =action] bindings=(list [=binding =duct =action])]
|
|
|
|
=/ to-search bindings
|
|
|
|
|- ^- [? _bindings]
|
|
|
|
?^ to-search
|
|
|
|
?: =(binding binding.i.to-search)
|
|
|
|
[| bindings]
|
|
|
|
::
|
|
|
|
$(to-search t.to-search)
|
|
|
|
:- &
|
|
|
|
:: store in reverse alphabetical order so that longer paths are first
|
|
|
|
::
|
|
|
|
%- flop
|
|
|
|
%+ sort [[binding duct action] bindings]
|
|
|
|
|= [[a=^binding *] [b=^binding *]]
|
|
|
|
::
|
|
|
|
?: =(site.a site.b)
|
|
|
|
(aor path.a path.b)
|
|
|
|
:: alphabetize based on site
|
|
|
|
::
|
|
|
|
(aor ?~(site.a '' u.site.a) ?~(site.b '' u.site.b))
|
2020-08-27 14:47:18 +03:00
|
|
|
::
|
|
|
|
++ channel-wire
|
|
|
|
|= [channel-id=@t request-id=@ud]
|
|
|
|
^- wire
|
|
|
|
/channel/subscription/[channel-id]/(scot %ud request-id)
|
|
|
|
::
|
|
|
|
++ subscription-wire
|
|
|
|
|= [channel-id=@t request-id=@ud =ship app=term]
|
|
|
|
^- wire
|
|
|
|
(weld (channel-wire channel-id request-id) /(scot %p ship)/[app])
|
2018-09-20 02:29:36 +03:00
|
|
|
--
|
|
|
|
:: end the =~
|
|
|
|
::
|
|
|
|
. ==
|
|
|
|
:: begin with a default +axle as a blank slate
|
|
|
|
::
|
|
|
|
=| ax=axle
|
|
|
|
:: a vane is activated with current date, entropy, and a namespace function
|
|
|
|
::
|
2018-12-15 03:04:13 +03:00
|
|
|
|= [our=ship now=@da eny=@uvJ scry-gate=sley]
|
2018-09-20 02:29:36 +03:00
|
|
|
:: allow jets to be registered within this core
|
|
|
|
::
|
2019-02-09 02:03:46 +03:00
|
|
|
~% %http-server ..is ~
|
2018-09-20 02:29:36 +03:00
|
|
|
|%
|
|
|
|
++ call
|
2020-02-11 01:03:03 +03:00
|
|
|
|= [=duct dud=(unit goof) type=* wrapped-task=(hobo task:able)]
|
2019-02-09 02:03:46 +03:00
|
|
|
^- [(list move) _http-server-gate]
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
2020-01-21 02:01:36 +03:00
|
|
|
=/ task=task:able ((harden task:able) wrapped-task)
|
2020-02-24 22:09:37 +03:00
|
|
|
::
|
|
|
|
:: error notifications "downcast" to %crud
|
|
|
|
::
|
|
|
|
=? task ?=(^ dud)
|
|
|
|
~| %crud-in-crud
|
|
|
|
?< ?=(%crud -.task)
|
|
|
|
[%crud -.task tang.u.dud]
|
|
|
|
::
|
2019-03-13 23:29:22 +03:00
|
|
|
:: %crud: notifies us of an event failure
|
|
|
|
::
|
|
|
|
?: ?=(%crud -.task)
|
|
|
|
=/ moves=(list move)
|
|
|
|
[[duct %slip %d %flog task] ~]
|
|
|
|
[moves http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
:: %init: tells us what our ship name is
|
2018-09-20 02:29:36 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?: ?=(%init -.task)
|
2018-09-27 02:18:40 +03:00
|
|
|
:: initial value for the login handler
|
|
|
|
::
|
|
|
|
=. bindings.server-state.ax
|
2018-11-15 21:27:10 +03:00
|
|
|
:~ [[~ /~/login] duct [%authentication ~]]
|
2020-06-03 02:40:32 +03:00
|
|
|
[[~ /~/logout] duct [%logout ~]]
|
2018-11-15 21:27:10 +03:00
|
|
|
[[~ /~/channel] duct [%channel ~]]
|
2020-06-11 02:45:05 +03:00
|
|
|
[[~ /~/scry] duct [%scry ~]]
|
2018-09-27 02:18:40 +03:00
|
|
|
==
|
2019-02-09 02:03:46 +03:00
|
|
|
[~ http-server-gate]
|
2019-09-27 23:00:37 +03:00
|
|
|
:: %trim: in response to memory pressure
|
|
|
|
::
|
2019-10-01 21:34:22 +03:00
|
|
|
:: Cancel all inactive channels
|
|
|
|
:: XX cancel active too if =(0 trim-priority) ?
|
|
|
|
::
|
2019-09-27 23:00:37 +03:00
|
|
|
?: ?=(%trim -.task)
|
2019-10-01 21:34:22 +03:00
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
|
|
|
=* by-channel by-channel:(per-server-event event-args)
|
|
|
|
=* channel-state channel-state.server-state.ax
|
|
|
|
::
|
|
|
|
=/ inactive=(list @t)
|
|
|
|
=/ full=(set @t) ~(key by session.channel-state)
|
|
|
|
=/ live=(set @t)
|
|
|
|
(~(gas in *(set @t)) ~(val by duct-to-key.channel-state))
|
|
|
|
~(tap in (~(dif in full) live))
|
|
|
|
::
|
|
|
|
?: =(~ inactive)
|
|
|
|
[~ http-server-gate]
|
|
|
|
::
|
|
|
|
=/ len=tape (scow %ud (lent inactive))
|
|
|
|
~> %slog.[0 leaf+"eyre: trim: closing {len} inactive channels"]
|
|
|
|
::
|
|
|
|
=| moves=(list (list move))
|
|
|
|
|- ^- [(list move) _http-server-gate]
|
|
|
|
=* channel-id i.inactive
|
|
|
|
?~ inactive
|
|
|
|
[(zing (flop moves)) http-server-gate]
|
|
|
|
:: discard channel state, and cancel any active gall subscriptions
|
|
|
|
::
|
2020-06-04 18:12:35 +03:00
|
|
|
=^ mov server-state.ax (discard-channel:by-channel channel-id |)
|
2019-10-01 21:34:22 +03:00
|
|
|
$(moves [mov moves], inactive t.inactive)
|
|
|
|
::
|
2019-03-13 23:35:14 +03:00
|
|
|
:: %vega: notifies us of a completed kernel upgrade
|
2019-02-12 01:41:50 +03:00
|
|
|
::
|
|
|
|
?: ?=(%vega -.task)
|
|
|
|
[~ http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
:: %born: new unix process
|
2019-03-13 23:35:14 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
?: ?=(%born -.task)
|
2018-10-24 21:25:55 +03:00
|
|
|
:: close previously open connections
|
2018-09-28 21:24:41 +03:00
|
|
|
::
|
2018-10-24 21:25:55 +03:00
|
|
|
:: When we have a new unix process, every outstanding open connection is
|
|
|
|
:: dead. For every duct, send an implicit close connection.
|
|
|
|
::
|
|
|
|
=^ closed-connections=(list move) server-state.ax
|
|
|
|
=/ connections=(list [=^duct *])
|
|
|
|
~(tap by connections.server-state.ax)
|
|
|
|
::
|
|
|
|
=| closed-connections=(list move)
|
|
|
|
|-
|
|
|
|
?~ connections
|
|
|
|
[closed-connections server-state.ax]
|
|
|
|
::
|
|
|
|
=/ event-args
|
2019-01-08 02:17:02 +03:00
|
|
|
[[our eny duct.i.connections now scry-gate] server-state.ax]
|
2018-10-24 21:25:55 +03:00
|
|
|
=/ cancel-request cancel-request:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax cancel-request
|
|
|
|
::
|
|
|
|
$(closed-connections (weld moves closed-connections), connections t.connections)
|
2019-04-10 00:03:21 +03:00
|
|
|
:: save duct for future %give to unix
|
|
|
|
::
|
|
|
|
=. outgoing-duct.server-state.ax duct
|
2018-10-24 21:25:55 +03:00
|
|
|
::
|
2019-02-09 02:03:46 +03:00
|
|
|
:_ http-server-gate
|
2018-10-24 21:25:55 +03:00
|
|
|
;: weld
|
|
|
|
:: hand back default configuration for now
|
|
|
|
::
|
2019-03-21 08:28:32 +03:00
|
|
|
[duct %give %set-config http-config.server-state.ax]~
|
2018-10-24 21:25:55 +03:00
|
|
|
::
|
|
|
|
closed-connections
|
|
|
|
==
|
2020-07-29 19:14:18 +03:00
|
|
|
::
|
|
|
|
?: ?=(%code-changed -.task)
|
2020-07-31 23:01:19 +03:00
|
|
|
~> %slog.[0 leaf+"eyre: code-changed: throwing away cookies and sessions"]
|
2020-07-29 19:14:18 +03:00
|
|
|
=. authentication-state.server-state.ax *authentication-state
|
|
|
|
::
|
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
|
|
|
=* by-channel by-channel:(per-server-event event-args)
|
|
|
|
=* channel-state channel-state.server-state.ax
|
|
|
|
::
|
|
|
|
=/ channel-ids=(list @t) ~(tap in ~(key by session.channel-state))
|
|
|
|
=| moves=(list (list move))
|
|
|
|
|- ^- [(list move) _http-server-gate]
|
|
|
|
?~ channel-ids
|
|
|
|
[(zing (flop moves)) http-server-gate]
|
|
|
|
:: discard channel state, and cancel any active gall subscriptions
|
|
|
|
::
|
|
|
|
=^ mov server-state.ax (discard-channel:by-channel i.channel-ids |)
|
|
|
|
$(moves [mov moves], channel-ids t.channel-ids)
|
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
:: all other commands operate on a per-server-event
|
2018-09-28 21:24:41 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
|
|
|
=/ server (per-server-event event-args)
|
2018-10-26 02:32:54 +03:00
|
|
|
::
|
2019-03-21 08:28:32 +03:00
|
|
|
?- -.task
|
|
|
|
:: %live: notifies us of the ports of our live http servers
|
2018-10-26 02:32:54 +03:00
|
|
|
::
|
2019-02-09 00:16:42 +03:00
|
|
|
%live
|
2019-03-21 08:28:32 +03:00
|
|
|
=. ports.server-state.ax +.task
|
2019-02-09 02:03:46 +03:00
|
|
|
[~ http-server-gate]
|
2019-03-21 08:28:32 +03:00
|
|
|
:: %rule: updates our http configuration
|
|
|
|
::
|
|
|
|
%rule
|
|
|
|
?- -.http-rule.task
|
|
|
|
:: %cert: install tls certificate
|
|
|
|
::
|
|
|
|
%cert
|
|
|
|
=* config http-config.server-state.ax
|
|
|
|
?: =(secure.config cert.http-rule.task)
|
|
|
|
[~ http-server-gate]
|
|
|
|
=. secure.config cert.http-rule.task
|
|
|
|
:_ http-server-gate
|
2019-04-10 00:03:21 +03:00
|
|
|
=* out-duct outgoing-duct.server-state.ax
|
|
|
|
?~ out-duct ~
|
|
|
|
[out-duct %give %set-config config]~
|
2019-03-21 08:28:32 +03:00
|
|
|
:: %turf: add or remove domain name
|
|
|
|
::
|
|
|
|
%turf
|
|
|
|
=* domains domains.server-state.ax
|
|
|
|
=/ mod/(set turf)
|
|
|
|
?: ?=(%put action.http-rule.task)
|
|
|
|
(~(put in domains) turf.http-rule.task)
|
|
|
|
(~(del in domains) turf.http-rule.task)
|
|
|
|
?: =(domains mod)
|
|
|
|
[~ http-server-gate]
|
|
|
|
=. domains mod
|
|
|
|
:_ http-server-gate
|
|
|
|
=/ cmd
|
|
|
|
[%acme %poke `cage`[%acme-order !>(mod)]]
|
2019-11-19 07:36:21 +03:00
|
|
|
[duct %pass /acme/order %g %deal [our our] cmd]~
|
2019-03-21 08:28:32 +03:00
|
|
|
==
|
2019-02-09 00:16:42 +03:00
|
|
|
::
|
2019-11-14 06:38:13 +03:00
|
|
|
%request
|
2019-02-09 00:16:42 +03:00
|
|
|
=^ moves server-state.ax (request:server +.task)
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2019-04-30 23:38:40 +03:00
|
|
|
::
|
|
|
|
%request-local
|
|
|
|
=^ moves server-state.ax (request-local:server +.task)
|
|
|
|
[moves http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
::
|
|
|
|
%cancel-request
|
|
|
|
=^ moves server-state.ax cancel-request:server
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
::
|
|
|
|
%connect
|
|
|
|
=^ moves server-state.ax
|
|
|
|
%+ add-binding:server binding.task
|
|
|
|
[%app app.task]
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
::
|
|
|
|
%serve
|
|
|
|
=^ moves server-state.ax
|
|
|
|
%+ add-binding:server binding.task
|
|
|
|
[%gen generator.task]
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2019-02-09 00:16:42 +03:00
|
|
|
::
|
|
|
|
%disconnect
|
|
|
|
=. server-state.ax (remove-binding:server binding.task)
|
2019-02-09 02:03:46 +03:00
|
|
|
[~ http-server-gate]
|
2020-09-30 16:07:27 +03:00
|
|
|
::
|
|
|
|
%approve-origin
|
|
|
|
=. cors-registry.server-state.ax
|
|
|
|
=, cors-registry.server-state.ax
|
|
|
|
:+ (~(del in requests) origin.task)
|
|
|
|
(~(put in approved) origin.task)
|
|
|
|
(~(del in rejected) origin.task)
|
|
|
|
[~ http-server-gate]
|
|
|
|
::
|
|
|
|
%reject-origin
|
|
|
|
=. cors-registry.server-state.ax
|
|
|
|
=, cors-registry.server-state.ax
|
|
|
|
:+ (~(del in requests) origin.task)
|
|
|
|
(~(del in approved) origin.task)
|
|
|
|
(~(put in rejected) origin.task)
|
|
|
|
[~ http-server-gate]
|
2018-09-20 02:29:36 +03:00
|
|
|
==
|
|
|
|
::
|
2018-09-24 21:48:19 +03:00
|
|
|
++ take
|
2020-02-11 01:03:03 +03:00
|
|
|
|= [=wire =duct dud=(unit goof) wrapped-sign=(hypo sign)]
|
2019-02-09 02:03:46 +03:00
|
|
|
^- [(list move) _http-server-gate]
|
2020-02-25 01:10:59 +03:00
|
|
|
?^ dud
|
|
|
|
~|(%eyre-take-dud (mean tang.u.dud))
|
2018-09-24 21:48:19 +03:00
|
|
|
:: unwrap :sign, ignoring unneeded +type in :p.wrapped-sign
|
|
|
|
::
|
|
|
|
=/ =sign q.wrapped-sign
|
2019-11-05 10:42:59 +03:00
|
|
|
=> %= .
|
|
|
|
sign
|
2019-11-19 07:36:21 +03:00
|
|
|
?: ?=(%g -.sign)
|
2019-11-05 10:42:59 +03:00
|
|
|
?> ?=(%unto +<.sign)
|
|
|
|
sign
|
|
|
|
sign
|
|
|
|
==
|
2018-09-24 21:48:19 +03:00
|
|
|
:: :wire must at least contain two parts, the type and the build
|
|
|
|
::
|
2018-10-11 01:26:51 +03:00
|
|
|
?> ?=([@ *] wire)
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-02-09 02:03:46 +03:00
|
|
|
|^ ^- [(list move) _http-server-gate]
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2018-10-10 21:51:52 +03:00
|
|
|
?+ i.wire
|
|
|
|
~|([%bad-take-wire wire] !!)
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-07-26 00:12:44 +03:00
|
|
|
%run-app-request run-app-request
|
2019-11-09 10:31:11 +03:00
|
|
|
%watch-response watch-response
|
2020-05-29 16:28:13 +03:00
|
|
|
%sessions sessions
|
2019-07-26 00:12:44 +03:00
|
|
|
%channel channel
|
|
|
|
%acme acme-ack
|
2018-10-10 21:51:52 +03:00
|
|
|
==
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-07-26 00:12:44 +03:00
|
|
|
++ run-app-request
|
2018-10-03 21:36:45 +03:00
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
?> ?=([%g %unto *] sign)
|
2019-03-19 23:38:18 +03:00
|
|
|
::
|
|
|
|
::
|
2019-11-09 10:31:11 +03:00
|
|
|
?> ?=([%poke-ack *] p.sign)
|
2019-11-13 12:21:14 +03:00
|
|
|
?> ?=([@ *] t.wire)
|
2019-11-09 10:31:11 +03:00
|
|
|
?~ p.p.sign
|
|
|
|
:: received a positive acknowledgment: take no action
|
|
|
|
::
|
|
|
|
[~ http-server-gate]
|
|
|
|
:: we have an error; propagate it to the client
|
|
|
|
::
|
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
|
|
|
=/ handle-gall-error
|
|
|
|
handle-gall-error:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax
|
|
|
|
(handle-gall-error u.p.p.sign)
|
|
|
|
[moves http-server-gate]
|
|
|
|
::
|
|
|
|
++ watch-response
|
|
|
|
::
|
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
|
|
|
::
|
2019-11-13 12:21:14 +03:00
|
|
|
?> ?=([@ *] t.wire)
|
2019-11-19 07:36:21 +03:00
|
|
|
?: ?=([%g %unto %watch-ack *] sign)
|
2019-03-19 23:38:18 +03:00
|
|
|
?~ p.p.sign
|
|
|
|
:: received a positive acknowledgment: take no action
|
|
|
|
::
|
|
|
|
[~ http-server-gate]
|
|
|
|
:: we have an error; propagate it to the client
|
2018-10-03 21:36:45 +03:00
|
|
|
::
|
2019-03-19 23:38:18 +03:00
|
|
|
=/ handle-gall-error
|
|
|
|
handle-gall-error:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax (handle-gall-error u.p.p.sign)
|
|
|
|
[moves http-server-gate]
|
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
?: ?=([%g %unto %kick ~] sign)
|
2019-11-09 10:31:11 +03:00
|
|
|
=/ handle-response handle-response:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax
|
|
|
|
(handle-response %continue ~ &)
|
|
|
|
[moves http-server-gate]
|
2018-09-24 21:48:19 +03:00
|
|
|
::
|
2019-11-19 07:36:21 +03:00
|
|
|
?> ?=([%g %unto %fact *] sign)
|
2019-11-09 10:31:11 +03:00
|
|
|
=/ =mark p.cage.p.sign
|
|
|
|
=/ =vase q.cage.p.sign
|
|
|
|
?. ?= ?(%http-response-header %http-response-data %http-response-cancel)
|
|
|
|
mark
|
|
|
|
=/ handle-gall-error
|
|
|
|
handle-gall-error:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax
|
|
|
|
(handle-gall-error leaf+"eyre bad mark {<mark>}" ~)
|
|
|
|
[moves http-server-gate]
|
|
|
|
::
|
|
|
|
=/ =http-event:http
|
|
|
|
?- mark
|
|
|
|
%http-response-header [%start !<(response-header:http vase) ~ |]
|
|
|
|
%http-response-data [%continue !<((unit octs) vase) |]
|
|
|
|
%http-response-cancel [%cancel ~]
|
|
|
|
==
|
2018-09-24 21:48:19 +03:00
|
|
|
=/ handle-response handle-response:(per-server-event event-args)
|
2019-11-09 10:31:11 +03:00
|
|
|
=^ moves server-state.ax
|
|
|
|
(handle-response http-event)
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2018-10-10 21:51:52 +03:00
|
|
|
::
|
2018-11-20 01:59:58 +03:00
|
|
|
++ channel
|
|
|
|
::
|
2019-01-08 02:17:02 +03:00
|
|
|
=/ event-args [[our eny duct now scry-gate] server-state.ax]
|
2018-11-20 01:59:58 +03:00
|
|
|
:: channel callback wires are triples.
|
|
|
|
::
|
|
|
|
?> ?=([@ @ @t *] wire)
|
|
|
|
::
|
|
|
|
?+ i.t.wire
|
|
|
|
~|([%bad-channel-wire wire] !!)
|
|
|
|
::
|
|
|
|
%timeout
|
2019-06-28 02:33:16 +03:00
|
|
|
?> ?=([%b %wake *] sign)
|
|
|
|
?^ error.sign
|
|
|
|
[[duct %slip %d %flog %crud %wake u.error.sign]~ http-server-gate]
|
2020-06-04 18:12:35 +03:00
|
|
|
=/ discard-channel
|
|
|
|
discard-channel:by-channel:(per-server-event event-args)
|
2018-11-20 01:59:58 +03:00
|
|
|
=^ moves server-state.ax
|
2020-06-04 18:12:35 +03:00
|
|
|
(discard-channel i.t.t.wire &)
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2019-10-07 02:26:03 +03:00
|
|
|
::
|
|
|
|
%heartbeat
|
|
|
|
=/ on-channel-heartbeat
|
|
|
|
on-channel-heartbeat:by-channel:(per-server-event event-args)
|
|
|
|
=^ moves server-state.ax
|
|
|
|
(on-channel-heartbeat i.t.t.wire)
|
|
|
|
[moves http-server-gate]
|
2018-11-20 01:59:58 +03:00
|
|
|
::
|
2018-11-21 04:06:04 +03:00
|
|
|
?(%poke %subscription)
|
2019-11-19 07:36:21 +03:00
|
|
|
?> ?=([%g %unto *] sign)
|
2020-08-27 14:47:18 +03:00
|
|
|
~| wire
|
2018-11-21 04:06:04 +03:00
|
|
|
?> ?=([@ @ @t @ *] wire)
|
2020-08-27 14:47:18 +03:00
|
|
|
=* channel-id i.t.t.wire
|
|
|
|
=* request-id i.t.t.t.wire
|
|
|
|
=* extra-wire t.t.t.t.wire
|
2018-11-21 04:06:04 +03:00
|
|
|
=/ on-gall-response
|
|
|
|
on-gall-response:by-channel:(per-server-event event-args)
|
2019-01-11 03:35:09 +03:00
|
|
|
:: ~& [%gall-response sign]
|
2018-11-21 04:06:04 +03:00
|
|
|
=^ moves server-state.ax
|
2020-08-27 14:47:18 +03:00
|
|
|
%- on-gall-response
|
|
|
|
[channel-id (slav %ud request-id) extra-wire p.sign]
|
2019-02-09 02:03:46 +03:00
|
|
|
[moves http-server-gate]
|
2018-11-20 01:59:58 +03:00
|
|
|
==
|
2019-04-08 23:17:19 +03:00
|
|
|
::
|
2020-05-29 16:28:13 +03:00
|
|
|
++ sessions
|
|
|
|
::
|
|
|
|
?> ?=([%b %wake *] sign)
|
|
|
|
::
|
|
|
|
?^ error.sign
|
|
|
|
[[duct %slip %d %flog %crud %wake u.error.sign]~ http-server-gate]
|
|
|
|
:: remove cookies that have expired
|
|
|
|
::
|
|
|
|
=* sessions sessions.authentication-state.server-state.ax
|
|
|
|
=. sessions.authentication-state.server-state.ax
|
|
|
|
%- ~(gas by *(map @uv session))
|
2020-06-04 23:06:13 +03:00
|
|
|
%+ skip ~(tap in sessions)
|
2020-05-29 16:28:13 +03:00
|
|
|
|= [cookie=@uv session]
|
2020-06-04 23:06:13 +03:00
|
|
|
(lth expiry-time now)
|
2020-05-29 16:28:13 +03:00
|
|
|
:: if there's any cookies left, set a timer for the next expected expiry
|
|
|
|
::
|
|
|
|
^- [(list move) _http-server-gate]
|
|
|
|
:_ http-server-gate
|
|
|
|
?: =(~ sessions) ~
|
|
|
|
=; next-expiry=@da
|
|
|
|
[duct %pass /sessions/expire %b %wait next-expiry]~
|
|
|
|
%+ roll ~(tap by sessions)
|
|
|
|
|= [[@uv session] next=@da]
|
|
|
|
?: =(*@da next) expiry-time
|
|
|
|
(min next expiry-time)
|
|
|
|
::
|
2019-04-08 23:17:19 +03:00
|
|
|
++ acme-ack
|
2019-11-19 07:36:21 +03:00
|
|
|
?> ?=([%g %unto *] sign)
|
2019-04-08 23:17:19 +03:00
|
|
|
::
|
2019-11-05 10:42:59 +03:00
|
|
|
?> ?=([%poke-ack *] p.sign)
|
2019-04-08 23:17:19 +03:00
|
|
|
?~ p.p.sign
|
|
|
|
:: received a positive acknowledgment: take no action
|
|
|
|
::
|
|
|
|
[~ http-server-gate]
|
|
|
|
:: received a negative acknowledgment: XX do something
|
|
|
|
::
|
|
|
|
[((slog u.p.p.sign) ~) http-server-gate]
|
2018-09-24 21:48:19 +03:00
|
|
|
--
|
|
|
|
::
|
2019-02-09 02:03:46 +03:00
|
|
|
++ http-server-gate ..$
|
2018-09-28 21:24:41 +03:00
|
|
|
:: +load: migrate old state to new state (called on vane reload)
|
|
|
|
::
|
|
|
|
++ load
|
2019-10-07 02:26:03 +03:00
|
|
|
=> |%
|
2020-10-18 12:18:29 +03:00
|
|
|
+$ axle-2020-9-30
|
|
|
|
[date=%~2020.9.30 server-state=server-state-2020-9-30]
|
|
|
|
::
|
|
|
|
+$ server-state-2020-9-30
|
|
|
|
$: bindings=(list [=binding =duct =action])
|
|
|
|
=cors-registry
|
|
|
|
connections=(map duct outstanding-connection)
|
|
|
|
=authentication-state
|
|
|
|
channel-state=channel-state-2020-9-30
|
|
|
|
domains=(set turf)
|
|
|
|
=http-config
|
|
|
|
ports=[insecure=@ud secure=(unit @ud)]
|
|
|
|
outgoing-duct=duct
|
|
|
|
==
|
|
|
|
::
|
|
|
|
+$ channel-state-2020-9-30
|
|
|
|
$: session=(map @t channel-2020-9-30)
|
|
|
|
duct-to-key=(map duct @t)
|
|
|
|
==
|
|
|
|
::
|
|
|
|
+$ channel-2020-9-30
|
|
|
|
$: state=(each timer duct)
|
|
|
|
next-id=@ud
|
|
|
|
events=(qeu [id=@ud lines=wall])
|
|
|
|
subscriptions=(map wire [ship=@p app=term =path duc=duct])
|
|
|
|
heartbeat=(unit timer)
|
|
|
|
==
|
|
|
|
::
|
2020-09-30 16:07:27 +03:00
|
|
|
+$ axle-2020-5-29
|
|
|
|
[date=%~2020.5.29 server-state=server-state-2020-5-29]
|
|
|
|
::
|
|
|
|
+$ server-state-2020-5-29
|
|
|
|
$: bindings=(list [=binding =duct =action])
|
|
|
|
connections=(map duct outstanding-connection)
|
|
|
|
=authentication-state
|
2020-10-18 12:18:29 +03:00
|
|
|
channel-state=channel-state-2020-9-30
|
2020-09-30 16:07:27 +03:00
|
|
|
domains=(set turf)
|
|
|
|
=http-config
|
|
|
|
ports=[insecure=@ud secure=(unit @ud)]
|
|
|
|
outgoing-duct=duct
|
|
|
|
==
|
2020-05-29 16:33:22 +03:00
|
|
|
+$ axle-2019-10-6
|
2020-06-04 23:06:13 +03:00
|
|
|
[date=%~2019.10.6 server-state=server-state-2019-10-6]
|
|
|
|
::
|
|
|
|
+$ server-state-2019-10-6
|
|
|
|
$: bindings=(list [=binding =duct =action])
|
|
|
|
connections=(map duct outstanding-connection)
|
|
|
|
authentication-state=sessions=(map @uv @da)
|
2020-10-18 12:18:29 +03:00
|
|
|
channel-state=channel-state-2020-9-30
|
2020-06-04 23:06:13 +03:00
|
|
|
domains=(set turf)
|
|
|
|
=http-config
|
|
|
|
ports=[insecure=@ud secure=(unit @ud)]
|
|
|
|
outgoing-duct=duct
|
|
|
|
==
|
2020-05-29 16:33:22 +03:00
|
|
|
--
|
2020-10-18 12:18:29 +03:00
|
|
|
|= old=$%(axle axle-2019-10-6 axle-2020-5-29 axle-2020-9-30)
|
2018-09-28 21:24:41 +03:00
|
|
|
^+ ..^$
|
|
|
|
::
|
|
|
|
~! %loading
|
2019-10-07 02:26:03 +03:00
|
|
|
?- -.old
|
2020-10-18 12:18:29 +03:00
|
|
|
%~2020.10.18 ..^$(ax old)
|
|
|
|
::
|
|
|
|
%~2020.9.30
|
|
|
|
%_ $
|
|
|
|
date.old %~2020.10.18
|
|
|
|
::
|
|
|
|
::NOTE soft-breaks the reconnect case, but is generally less disruptive
|
|
|
|
:: than wiping channels entirely.
|
|
|
|
session.channel-state.server-state.old
|
|
|
|
%- ~(run by session.channel-state.server-state.old)
|
2020-10-19 16:56:05 +03:00
|
|
|
|= channel-2020-9-30
|
2020-10-19 01:48:18 +03:00
|
|
|
^- channel
|
2020-10-19 16:56:05 +03:00
|
|
|
=/ subscriptions
|
2020-10-19 01:48:18 +03:00
|
|
|
%- ~(gas by *(map @ud [@p term path duct]))
|
2020-10-19 16:56:05 +03:00
|
|
|
%+ turn ~(tap by subscriptions)
|
2020-10-19 01:48:18 +03:00
|
|
|
|= [=wire rest=[@p term path duct]]
|
|
|
|
[(slav %ud (snag 3 wire)) rest]
|
2020-10-19 16:56:05 +03:00
|
|
|
:* state next-id now
|
|
|
|
*(qeu [@ud @ud channel-event])
|
|
|
|
*(map @ud @ud)
|
|
|
|
subscriptions heartbeat
|
2020-10-19 01:48:18 +03:00
|
|
|
==
|
2020-10-18 12:18:29 +03:00
|
|
|
==
|
2020-09-30 16:07:27 +03:00
|
|
|
::
|
|
|
|
%~2020.5.29
|
|
|
|
%_ $
|
|
|
|
date.old %~2020.9.30
|
|
|
|
server-state.old [-.server-state.old *cors-registry +.server-state.old]
|
|
|
|
==
|
2020-05-29 16:33:22 +03:00
|
|
|
::
|
|
|
|
%~2019.10.6
|
2020-06-03 02:40:32 +03:00
|
|
|
=^ success bindings.server-state.old
|
|
|
|
%+ insert-binding
|
2020-06-03 15:29:13 +03:00
|
|
|
[[~ /~/logout] [/e/load/logout]~ [%logout ~]]
|
2020-06-03 02:40:32 +03:00
|
|
|
bindings.server-state.old
|
|
|
|
~? !success [%e %failed-to-setup-logout-endpoint]
|
2020-06-11 02:45:05 +03:00
|
|
|
=^ success bindings.server-state.old
|
|
|
|
%+ insert-binding
|
|
|
|
[[~ /~/scry] [/e/load/scry]~ [%scry ~]]
|
|
|
|
bindings.server-state.old
|
|
|
|
~? !success [%e %failed-to-setup-scry-endpoint]
|
2020-05-29 16:33:22 +03:00
|
|
|
%_ $
|
|
|
|
date.old %~2020.5.29
|
|
|
|
sessions.authentication-state.server-state.old ~
|
|
|
|
==
|
2019-10-07 02:26:03 +03:00
|
|
|
==
|
2018-09-28 21:24:41 +03:00
|
|
|
:: +stay: produce current state
|
|
|
|
::
|
|
|
|
++ stay `axle`ax
|
|
|
|
:: +scry: request a path in the urbit namespace
|
|
|
|
::
|
|
|
|
++ scry
|
2019-03-21 09:01:38 +03:00
|
|
|
|= [fur=(unit (set monk)) ren=@tas why=shop syd=desk lot=coin tyl=path]
|
|
|
|
^- (unit (unit cage))
|
|
|
|
?. ?=(%& -.why)
|
|
|
|
~
|
|
|
|
=* who p.why
|
2020-05-07 11:51:08 +03:00
|
|
|
?: =(tyl /whey)
|
|
|
|
=/ maz=(list mass)
|
|
|
|
:~ bindings+&+bindings.server-state.ax
|
|
|
|
auth+&+authentication-state.server-state.ax
|
|
|
|
connections+&+connections.server-state.ax
|
|
|
|
channels+&+channel-state.server-state.ax
|
|
|
|
axle+&+ax
|
|
|
|
==
|
|
|
|
``mass+!>(maz)
|
2019-03-21 09:01:38 +03:00
|
|
|
?. ?=(%$ -.lot)
|
|
|
|
[~ ~]
|
|
|
|
?. =(our who)
|
|
|
|
?. =([%da now] p.lot)
|
|
|
|
[~ ~]
|
|
|
|
~& [%r %scry-foreign-host who]
|
|
|
|
~
|
2020-09-30 16:07:27 +03:00
|
|
|
?: &(?=(%x ren) ?=(~ syd))
|
|
|
|
=, server-state.ax
|
|
|
|
?+ tyl [~ ~]
|
|
|
|
[%cors ~] ``noun+!>(cors-registry)
|
|
|
|
[%cors %requests ~] ``noun+!>(requests.cors-registry)
|
|
|
|
[%cors %approved ~] ``noun+!>(approved.cors-registry)
|
|
|
|
[%cors %rejected ~] ``noun+!>(rejected.cors-registry)
|
|
|
|
::
|
|
|
|
[%cors ?(%approved %rejected) @ ~]
|
|
|
|
=* kind i.t.tyl
|
|
|
|
=* orig i.t.t.tyl
|
|
|
|
?~ origin=(slaw %t orig) [~ ~]
|
|
|
|
?- kind
|
|
|
|
%approved ``noun+!>((~(has in approved.cors-registry) u.origin))
|
|
|
|
%rejected ``noun+!>((~(has in rejected.cors-registry) u.origin))
|
|
|
|
==
|
2020-10-01 20:55:16 +03:00
|
|
|
::
|
|
|
|
[%authenticated %cookie @ ~]
|
|
|
|
?~ cookies=(slaw %t i.t.t.tyl) [~ ~]
|
|
|
|
:^ ~ ~ %noun
|
|
|
|
!> ^- ?
|
|
|
|
%- =< request-is-logged-in:authentication
|
|
|
|
(per-server-event [our eny *duct now scry-gate] server-state.ax)
|
|
|
|
%*(. *request:http header-list ['cookie' u.cookies]~)
|
2020-09-30 16:07:27 +03:00
|
|
|
==
|
|
|
|
?. ?=(%$ ren)
|
|
|
|
[~ ~]
|
2020-05-23 00:55:17 +03:00
|
|
|
?+ syd [~ ~]
|
|
|
|
%bindings ``noun+!>(bindings.server-state.ax)
|
|
|
|
%connections ``noun+!>(connections.server-state.ax)
|
|
|
|
%authentication-state ``noun+!>(authentication-state.server-state.ax)
|
|
|
|
%channel-state ``noun+!>(channel-state.server-state.ax)
|
2019-03-21 09:01:38 +03:00
|
|
|
::
|
2020-05-23 00:55:17 +03:00
|
|
|
%host
|
|
|
|
%- (lift (lift |=(a=hart:eyre [%hart !>(a)])))
|
|
|
|
^- (unit (unit hart:eyre))
|
|
|
|
=. p.lot ?.(=([%da now] p.lot) p.lot [%tas %real])
|
|
|
|
?+ p.lot
|
|
|
|
[~ ~]
|
|
|
|
::
|
|
|
|
[%tas %fake]
|
|
|
|
``[& [~ 8.443] %& /localhost]
|
|
|
|
::
|
|
|
|
[%tas %real]
|
|
|
|
=* domains domains.server-state.ax
|
|
|
|
=* ports ports.server-state.ax
|
|
|
|
=/ =host:eyre [%& ?^(domains n.domains /localhost)]
|
|
|
|
=/ secure=? &(?=(^ secure.ports) !?=(hoke:eyre host))
|
|
|
|
=/ port=(unit @ud)
|
|
|
|
?. secure
|
|
|
|
?:(=(80 insecure.ports) ~ `insecure.ports)
|
|
|
|
?> ?=(^ secure.ports)
|
|
|
|
?:(=(443 u.secure.ports) ~ secure.ports)
|
|
|
|
``[secure port host]
|
|
|
|
==
|
2019-03-21 09:01:38 +03:00
|
|
|
==
|
2018-09-20 02:29:36 +03:00
|
|
|
--
|