define([ 'jquery', '/api/config', '/assert/assertions.js', '/common/hyperscript.js', '/customize/messages.js', '/common/dom-ready.js', '/bower_components/nthen/index.js', '/common/sframe-common-outer.js', '/customize/login.js', '/common/common-hash.js', '/common/common-util.js', '/common/pinpad.js', '/common/outer/network-config.js', '/bower_components/tweetnacl/nacl-fast.min.js', 'css!/bower_components/components-font-awesome/css/font-awesome.min.css', 'less!/customize/src/less2/pages/page-checkup.less', ], function ($, ApiConfig, Assertions, h, Messages, DomReady, nThen, SFCommonO, Login, Hash, Util, Pinpad, NetConfig) { var Assert = Assertions(); var trimSlashes = function (s) { if (typeof(s) !== 'string') { return s; } return s.replace(/\/+$/, ''); }; var assert = function (f, msg) { Assert(f, msg || h('span.advisory-text')); }; var CONFIG_PATH = function () { return h('code', 'cryptpad/config/config.js'); }; var API_CONFIG_LINK = function () { return h('a', { href: '/api/config', target: '_blank', }, '/api/config'); }; var RESTART_WARNING = function () { return h('span', [ 'Changes to ', CONFIG_PATH(), ' will require a server restart in order for ', API_CONFIG_LINK(), ' to be updated.', ]); }; var trimmedSafe = trimSlashes(ApiConfig.httpSafeOrigin); var trimmedUnsafe = trimSlashes(ApiConfig.httpUnsafeOrigin); assert(function (cb, msg) { msg.appendChild(h('span', [ "CryptPad's sandbox requires that both ", h('code', 'httpUnsafeOrigin'), ' and ', h('code', 'httpSafeOrigin'), " be configured in ", CONFIG_PATH(), '. ', RESTART_WARNING(), ])); //console.error(trimmedSafe, trimmedUnsafe); cb(Boolean(trimmedSafe && trimmedUnsafe)); }); assert(function (cb, msg) { msg.appendChild(h('span', [ h('code', 'httpUnsafeOrigin'), ' and ', h('code', 'httpSafeOrigin'), ' are equivalent. ', "In order for CryptPad's security features to be as effective as intended they must be different. ", "See ", CONFIG_PATH(), '. ', RESTART_WARNING(), ])); return void cb(trimmedSafe !== trimmedUnsafe); }); assert(function (cb, msg) { msg.appendChild(h('span', [ h('code', 'httpUnsafeOrigin'), ' and ', h('code', 'httpSafeOrigin'), ' must not contain trailing slashes. This can be configured in ', CONFIG_PATH(), '. ', RESTART_WARNING(), ])); cb(trimmedSafe === ApiConfig.httpSafeOrigin && trimmedUnsafe === ApiConfig.httpUnsafeOrigin); }); assert(function (cb, msg) { msg.appendChild(h("span", [ "It appears that you are trying to load this page via an origin other than its main domain (", h('code', ApiConfig.httpUnsafeOrigin), "). See the ", h('code', 'httpUnsafeOrigin'), " option in ", CONFIG_PATH(), " which is exposed via ", API_CONFIG_LINK(), '.', ])); var origin = window.location.origin; return void cb(ApiConfig.httpUnsafeOrigin === origin); }); var checkAvailability = function (url, cb) { $.ajax({ url: url, data: {}, complete: function (xhr) { cb(xhr.status === 200); }, }); }; assert(function (cb, msg) { msg.appendChild(h('span', [ "The main domain (configured via ", h('code', 'httpUnsafeOrigin'), ' as ', ApiConfig.httpUnsafeOrigin, ' in ', CONFIG_PATH(), ' and exposed via ', API_CONFIG_LINK(), ') could not be reached.', ])); checkAvailability(trimmedUnsafe, cb); }); // Try loading an iframe on the safe domain assert(function (cb, msg) { msg.appendChild(h('span', [ "Your browser was not able to load an iframe using the origin specified as ", h('code', "httpSafeOrigin"), " (", ApiConfig.httpSafeOrigin, ") in ", CONFIG_PATH(), ". This can be caused by an invalid ", h('code', 'httpUnsafeDomain'), ', invalid CSP configuration in your reverse proxy, invalid SSL certificates, and many other factors. ', 'More information about your particular error may be found in your browser console. ', RESTART_WARNING(), ])); var to; nThen(function (waitFor) { DomReady.onReady(waitFor()); }).nThen(function (waitFor) { to = setTimeout(function () { console.error('TIMEOUT loading iframe on the safe domain'); cb(false); }, 5000); SFCommonO.initIframe(waitFor); }).nThen(function () { // Iframe is loaded clearTimeout(to); cb(true); }); }); // Test Websocket var evWSError = Util.mkEvent(true); assert(function (_cb, msg) { var timeoutErr = 'Could not connect to the websocket server within 5 seconds.'; var cb = Util.once(Util.both(_cb, function (status) { if (status === true) { return; } msg.appendChild(h('span#websocket', [ status || 'Unknown websocket error', ])); })); var ws = new WebSocket(NetConfig.getWebsocketURL()); var to = setTimeout(function () { console.error('Websocket TIMEOUT'); evWSError.fire(); cb(timeoutErr); }, 5000); ws.onopen = function () { clearTimeout(to); cb(true); }; ws.onerror = function (err) { clearTimeout(to); console.error('[Websocket error]', err); evWSError.fire(); cb('Unable to connect to the websocket server. More information may be available in your browser console ([Websocket error]).'); }; }); // Test login block assert(function (_cb, msg) { var websocketErr = "No WebSocket available"; var cb = Util.once(Util.both(_cb, function (status) { if (status === true) { return; } if (status === websocketErr) { msg.appendChild(h('span', [ websocketErr, ' See ', h('a', { href: '#websocket', }, 'the related websocket error'), ])); return; } // else msg.appendChild(h('span', [ "Unable to create, retrieve, or remove encrypted credentials from the server. ", "This is most commonly caused by a mismatch between the value of the ", h('code', 'blockPath'), ' value configured in ', CONFIG_PATH(), " and the corresponding settings in your reverse proxy's configuration file,", " but it can also be explained by a websocket error. ", RESTART_WARNING(), ])); })); var bytes = new Uint8Array(Login.requiredBytes); var opt = Login.allocateBytes(bytes); var blockUrl = Login.Block.getBlockUrl(opt.blockKeys); var blockRequest = Login.Block.serialize("{}", opt.blockKeys); var removeRequest = Login.Block.remove(opt.blockKeys); console.log('Test block URL:', blockUrl); var userHash = '/2/drive/edit/000000000000000000000000'; var secret = Hash.getSecrets('drive', userHash); opt.keys = secret.keys; opt.channelHex = secret.channel; var RT, rpc, exists, restricted; nThen(function (waitFor) { Util.fetch(blockUrl, waitFor(function (err) { if (err) { return; } // No block found exists = true; })); }).nThen(function (waitFor) { // If WebSockets aren't working, don't wait forever here evWSError.reg(function () { waitFor.abort(); cb(websocketErr); }); // Create proxy Login.loadUserObject(opt, waitFor(function (err, rt) { if (err) { waitFor.abort(); console.error("Can't create new channel. This may also be a websocket issue."); return void cb(false); } RT = rt; var proxy = rt.proxy; proxy.edPublic = opt.edPublic; proxy.edPrivate = opt.edPrivate; proxy.curvePublic = opt.curvePublic; proxy.curvePrivate = opt.curvePrivate; rt.realtime.onSettle(waitFor()); })); }).nThen(function (waitFor) { // Init RPC Pinpad.create(RT.network, RT.proxy, waitFor(function (e, _rpc) { if (e) { waitFor.abort(); console.error("Can't initialize RPC", e); // INVALID_KEYS return void cb(false); } rpc = _rpc; })); }).nThen(function (waitFor) { // Write block if (exists) { return; } rpc.writeLoginBlock(blockRequest, waitFor(function (e) { // we should tolerate restricted registration // and proceed to clean up after any data we've created if (e === 'E_RESTRICTED') { restricted = true; return void cb(true); } if (e) { waitFor.abort(); console.error("Can't write login block", e); return void cb(false); } })); }).nThen(function (waitFor) { if (restricted) { return; } // Read block Util.fetch(blockUrl, waitFor(function (e) { if (e) { waitFor.abort(); console.error("Can't read login block", e); return void cb(false); } })); }).nThen(function (waitFor) { // Remove block rpc.removeLoginBlock(removeRequest, waitFor(function (e) { if (restricted) { return; } // an ENOENT is expected in the case of restricted registration, but we call this anyway to clean up any mess from previous tests. if (e) { waitFor.abort(); console.error("Can't remove login block", e); console.error(blockRequest); return void cb(false); } })); }).nThen(function (waitFor) { rpc.removeOwnedChannel(secret.channel, waitFor(function (e) { if (e) { waitFor.abort(); console.error("Can't remove channel", e); return void cb(false); } })); }).nThen(function () { cb(true); }); }); var sheetURL = '/common/onlyoffice/v4/web-apps/apps/spreadsheeteditor/main/index.html'; assert(function (cb, msg) { msg.innerText = "Missing HTTP headers required for .xlsx export from sheets. "; var url = sheetURL; var expect = { 'cross-origin-resource-policy': 'cross-origin', 'cross-origin-embedder-policy': 'require-corp', //'cross-origin-opener-policy': 'same-origin', // FIXME this is in our nginx config but not server.js }; $.ajax(url, { complete: function (xhr) { cb(!Object.keys(expect).some(function (k) { var response = xhr.getResponseHeader(k); if (response !== expect[k]) { msg.appendChild(h('span', [ 'A value of ', h('code', expect[k]), ' was expected for the ', h('code', k), ' HTTP header, but instead a value of "', h('code', response), '" was received.', ])); return true; // returning true indicates that a value is incorrect } })); }, }); }); assert(function (cb, msg) { msg = msg; // XXX return void cb(true); /* msg.appendChild(h('span', [ "The spreadsheet editor's code was not served with the required Content-Security Policy headers. ", "This is most often caused by incorrectly configured sandbox parameters (", h('code', 'httpUnsafeOrigin'), ' and ', h('code', 'httpSafeOrigin'), ' in ', CONFIG_PATH, "), or settings in your reverse proxy's configuration which don't match your application server's config. ", RESTART_WARNING(), ])); $.ajax(sheetURL, { complete: function (xhr) { var csp = xhr.getResponseHeader('Content-Security-Policy'); if (!/unsafe\-eval/.test(csp)) { // OnlyOffice requires unsafe-eval console.error('CSP', csp); return cb("expected 'unsafe-eval'"); } if (!/unsafe\-inline/.test(csp)) { // OnlyOffice also requires unsafe-inline console.error('CSP', csp); return cb("expected 'unsafe-inline'"); } cb(true); }, }); */ }); assert(function (cb, msg) { msg.appendChild(h('span', [ h('code', '/api/broadcast'), " could not be loaded. This can be caused by an outdated application server or an incorrectly configured reverse proxy. ", "Even if the most recent code has been downloaded it's possible the application server has not been restarted. ", "Your browser console may provide more details as to why this resource could not be loaded. ", ])); $.ajax('/api/broadcast', { dataType: 'text', complete: function (xhr) { console.log(xhr); cb(xhr.status === 200); }, }); }); var row = function (cells) { return h('tr', cells.map(function (cell) { return h('td', cell); })); }; var failureReport = function (obj) { return h('div.error', [ h('h5', obj.message), h('table', [ row(["Failed test number", obj.test + 1]), row(["Returned value", obj.output]), ]), ]); }; var completed = 0; var $progress = $('#cp-progress'); Assert.run(function (state) { var errors = state.errors; var failed = errors.length; Messages.assert_numberOfTestsPassed = "{0} / {1} tests passed."; var statusClass = failed? 'failure': 'success'; var failedDetails = "Details found below"; var successDetails = "This checkup only tests the most common configuration issues. You may still experience errors."; var details = h('p', failed? failedDetails: successDetails); var summary = h('div.summary.' + statusClass, [ h('p', Messages._getKey('assert_numberOfTestsPassed', [ state.passed, state.total ])), details, ]); var report = h('div.report', [ summary, h('div.failures', errors.map(failureReport)), ]); $progress.remove(); $('body').prepend(report); }, function (i, total) { console.log('test '+ i +' completed'); completed++; Messages.assert_numberOfTestsCompleted = "{0} / {1} tests completed."; $progress.html('').append(h('div.report.pending.summary', [ h('p', [ h('i.fa.fa-spinner.fa-pulse'), h('span', Messages._getKey('assert_numberOfTestsCompleted', [completed, total])) ]) ])); }); });