var Decrees = module.exports; /* Admin decrees which modify global server state IMPLEMENTED: RESTRICT_REGISTRATION() UPDATE_DEFAULT_STORAGE() // QUOTA MANAGEMENT SET_QUOTA(, limit) RM_QUOTA() NOT IMPLEMENTED: // RESTRICTED REGISTRATION ADD_INVITE REVOKE_INVITE REDEEM_INVITE // 2.0 UPDATE_INACTIVE_TIME UPDATE_ACCOUNT_RETENTION_TIME UPDATE_ARCHIVE_RETENTION_TIME // 3.0 UPDATE_MAX_UPLOAD_SIZE UPDATE_PREMIUM_UPLOAD_SIZE */ var commands = {}; /* commands have a simple API: * they receive the global Env and the arguments to be applied * if the arguments are invalid the operation will not be applied * the command throws * if the arguments are valid but do not result in a change, the operation is redundant. * return false * if the arguments are valid and will result in a change, the operation should be applied * apply it * return true to indicate that it was applied */ // Toggles a simple boolean // CryptPad_AsyncStore.rpc.send('ADMIN', [ 'ADMIN_DECREE', ['RESTRICT_REGISTRATION', [true]]], console.log) commands.RESTRICT_REGISTRATION = function (Env, args) { if (!Array.isArray(args) || typeof(args[0]) !== 'boolean') { throw new Error('INVALID_ARGS'); } var bool = args[0]; if (bool === Env.restrictRegistration) { return false; } Env.restrictRegistration = bool; return true; }; var isNonNegativeNumber = function (n) { return !(typeof(n) !== 'number' || isNaN(n) || n < 0); }; // CryptPad_AsyncStore.rpc.send('ADMIN', [ 'ADMIN_DECREE', ['UPDATE_DEFAULT_STORAGE', [100 * 1024 * 1024]]], console.log) commands.UPDATE_DEFAULT_STORAGE = function (Env, args) { if (!Array.isArray(args) || !isNonNegativeNumber(args[0])) { throw new Error('INVALID_ARGS'); } var limit = args[0]; if (limit === Env.defaultStorageLimit) { return false; } Env.defaultStorageLimit = limit; return true; }; var Quota = require("./commands/quota"); var Keys = require("./keys"); var Util = require("./common-util"); var getCanonicalKey = function (input) { if (typeof(input) !== 'string') { return; } // key is already in simple form. ensure that it is an 'unsafeKey' if (input.length === 44) { return Util.unescapeKeyCharacters(input); } try { return Keys.parseUser(input).pubkey; } catch (err) { return; } }; // CryptPad_AsyncStore.rpc.send('ADMIN', [ 'ADMIN_DECREE', ['SET_QUOTA', ['[user@box:3000/VzeS4vP1DF+tXGuq1i50DKYuBL+09Yqy8kGxoUKRzhA=]', { limit: 2 * 1024 * 1024 * 1024, plan: 'buddy', note: "you're welcome" } ] ] ], console.log) commands.SET_QUOTA = function (Env, args) { if (!Array.isArray(args) || args.length !== 2) { throw new Error("INVALID_ARGS"); } var unsafeKey = getCanonicalKey(args[0]); if (!unsafeKey) { throw new Error("INVALID_ARGS"); } // make sure you're not overwriting an existing limit //if (Env.customLimits[unsafeKey]) { throw new Error("EEXISTS"); } var limit = args[1]; if (!Quota.isValidLimit(limit)) { // do we really want this? throw new Error("INVALID_ARGS"); } // map the new limit to the user's unsafeKey Env.customLimits[unsafeKey] = limit; Env.limits[unsafeKey] = limit; return true; }; commands.RM_QUOTA = function (Env, args) { if (!Array.isArray(args) || args.length !== 1) { throw new Error("INVALID_ARGS"); } var unsafeKey = getCanonicalKey(args[0]); if (!unsafeKey) { throw new Error("INVALID_ARGS"); } if (!Env.customLimits[unsafeKey]) { throw new Error("ENOENT"); } delete Env.customLimits[unsafeKey]; delete Env.limits[unsafeKey]; return true; }; // [, , ,