/* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is Bookmarks Sync. * * The Initial Developer of the Original Code is Mozilla. * Portions created by the Initial Developer are Copyright (C) 2007 * the Initial Developer. All Rights Reserved. * * Contributor(s): * Dan Mills * Myk Melez * Anant Narayanan * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ const EXPORTED_SYMBOLS = ['Weave']; const Cc = Components.classes; const Ci = Components.interfaces; const Cr = Components.results; const Cu = Components.utils; // how long we should wait before actually syncing on idle const IDLE_TIME = 5; // xxxmpc: in seconds, should be preffable // How long before refreshing the cluster const CLUSTER_BACKOFF = 5 * 60 * 1000; // 5 minutes Cu.import("resource://gre/modules/XPCOMUtils.jsm"); Cu.import("resource://services-sync/auth.js"); Cu.import("resource://services-sync/base_records/crypto.js"); Cu.import("resource://services-sync/base_records/keys.js"); Cu.import("resource://services-sync/base_records/wbo.js"); Cu.import("resource://services-sync/constants.js"); Cu.import("resource://services-sync/engines.js"); Cu.import("resource://services-sync/engines/clients.js"); Cu.import("resource://services-sync/ext/Sync.js"); Cu.import("resource://services-sync/identity.js"); Cu.import("resource://services-sync/log4moz.js"); Cu.import("resource://services-sync/resource.js"); Cu.import("resource://services-sync/status.js"); Cu.import("resource://services-sync/util.js"); // for export let Weave = {}; Cu.import("resource://services-sync/auth.js", Weave); Cu.import("resource://services-sync/constants.js", Weave); Cu.import("resource://services-sync/base_records/keys.js", Weave); Cu.import("resource://services-sync/engines.js", Weave); Cu.import("resource://services-sync/engines/bookmarks.js", Weave); Cu.import("resource://services-sync/engines/clients.js", Weave); Cu.import("resource://services-sync/engines/forms.js", Weave); Cu.import("resource://services-sync/engines/history.js", Weave); Cu.import("resource://services-sync/engines/prefs.js", Weave); Cu.import("resource://services-sync/engines/passwords.js", Weave); Cu.import("resource://services-sync/engines/tabs.js", Weave); Cu.import("resource://services-sync/ext/Preferences.js"); Cu.import("resource://services-sync/identity.js", Weave); Cu.import("resource://services-sync/notifications.js", Weave); Cu.import("resource://services-sync/resource.js", Weave); Cu.import("resource://services-sync/status.js", Weave); Cu.import("resource://services-sync/stores.js", Weave); Cu.import("resource://services-sync/util.js", Weave); Utils.lazy(Weave, 'Service', WeaveSvc); /* * Service singleton * Main entry point into Weave's sync framework */ function WeaveSvc() { this._notify = Utils.notify("weave:service:"); } WeaveSvc.prototype = { _lock: Utils.lock, _catch: Utils.catch, _locked: false, _loggedIn: false, keyGenEnabled: true, get username() { return Svc.Prefs.get("username", "").toLowerCase(); }, set username(value) { if (value) { // Make sure all uses of this new username is lowercase value = value.toLowerCase(); // Tab characters are stripped from URIs, so make sure that the // username doesn't contain any tabs. value = value.replace("\t", "", "g"); Svc.Prefs.set("username", value); } else Svc.Prefs.reset("username"); // fixme - need to loop over all Identity objects - needs some rethinking... ID.get('WeaveID').username = value; ID.get('WeaveCryptoID').username = value; // FIXME: need to also call this whenever the username pref changes this._updateCachedURLs(); }, get password() ID.get("WeaveID").password, set password(value) ID.get("WeaveID").password = value, get passphrase() ID.get("WeaveCryptoID").password, set passphrase(value) ID.get("WeaveCryptoID").password = value, get passphraseUTF8() ID.get("WeaveCryptoID").passwordUTF8, get serverURL() Svc.Prefs.get("serverURL"), set serverURL(value) { // Only do work if it's actually changing if (value == this.serverURL) return; // A new server most likely uses a different cluster, so clear that Svc.Prefs.set("serverURL", value); Svc.Prefs.reset("clusterURL"); }, get clusterURL() Svc.Prefs.get("clusterURL", ""), set clusterURL(value) { Svc.Prefs.set("clusterURL", value); this._updateCachedURLs(); }, get miscAPI() { // Append to the serverURL if it's a relative fragment let misc = Svc.Prefs.get("miscURL"); if (misc.indexOf(":") == -1) misc = this.serverURL + misc; return misc + "1.0/"; }, get userAPI() { // Append to the serverURL if it's a relative fragment let user = Svc.Prefs.get("userURL"); if (user.indexOf(":") == -1) user = this.serverURL + user; return user + "1.0/"; }, get pwResetURL() { return this.serverURL + "weave-password-reset"; }, get updatedURL() { return WEAVE_CHANNEL == "dev" ? UPDATED_DEV_URL : UPDATED_REL_URL; }, get syncID() { // Generate a random syncID id we don't have one let syncID = Svc.Prefs.get("client.syncID", ""); return syncID == "" ? this.syncID = Utils.makeGUID() : syncID; }, set syncID(value) { Svc.Prefs.set("client.syncID", value); }, get isLoggedIn() { return this._loggedIn; }, // nextSync and nextHeartbeat are in milliseconds, but prefs can't hold that much get nextSync() Svc.Prefs.get("nextSync", 0) * 1000, set nextSync(value) Svc.Prefs.set("nextSync", Math.floor(value / 1000)), get nextHeartbeat() Svc.Prefs.get("nextHeartbeat", 0) * 1000, set nextHeartbeat(value) Svc.Prefs.set("nextHeartbeat", Math.floor(value / 1000)), get syncInterval() { // If we have a partial download, sync sooner if we're not mobile if (Status.partial && Clients.clientType != "mobile") return PARTIAL_DATA_SYNC; return Svc.Prefs.get("syncInterval", MULTI_MOBILE_SYNC); }, set syncInterval(value) Svc.Prefs.set("syncInterval", value), get syncThreshold() Svc.Prefs.get("syncThreshold", SINGLE_USER_THRESHOLD), set syncThreshold(value) Svc.Prefs.set("syncThreshold", value), get globalScore() Svc.Prefs.get("globalScore", 0), set globalScore(value) Svc.Prefs.set("globalScore", value), get numClients() Svc.Prefs.get("numClients", 0), set numClients(value) Svc.Prefs.set("numClients", value), get locked() { return this._locked; }, lock: function Svc_lock() { if (this._locked) return false; this._locked = true; return true; }, unlock: function Svc_unlock() { this._locked = false; }, _updateCachedURLs: function _updateCachedURLs() { // Nothing to cache yet if we don't have the building blocks if (this.clusterURL == "" || this.username == "") return; let storageAPI = this.clusterURL + Svc.Prefs.get("storageAPI") + "/"; let userBase = storageAPI + this.username + "/"; this._log.debug("Caching URLs under storage user base: " + userBase); // Generate and cache various URLs under the storage API for this user this.infoURL = userBase + "info/collections"; this.storageURL = userBase + "storage/"; this.metaURL = this.storageURL + "meta/global"; PubKeys.defaultKeyUri = this.storageURL + "keys/pubkey"; PrivKeys.defaultKeyUri = this.storageURL + "keys/privkey"; }, _checkCrypto: function WeaveSvc__checkCrypto() { let ok = false; try { let iv = Svc.Crypto.generateRandomIV(); if (iv.length == 24) ok = true; } catch (e) { this._log.debug("Crypto check failed: " + e); } return ok; }, /** * Prepare to initialize the rest of Weave after waiting a little bit */ onStartup: function onStartup() { this._migratePrefs(); this._initLogs(); this._log.info("Loading Weave " + WEAVE_VERSION); this.enabled = true; this._registerEngines(); let ua = Cc["@mozilla.org/network/protocol;1?name=http"]. getService(Ci.nsIHttpProtocolHandler).userAgent; this._log.info(ua); if (!this._checkCrypto()) { this.enabled = false; this._log.info("Could not load the Weave crypto component. Disabling " + "Weave, since it will not work correctly."); } Svc.Obs.add("weave:service:setup-complete", this); Svc.Obs.add("network:offline-status-changed", this); Svc.Obs.add("weave:service:sync:finish", this); Svc.Obs.add("weave:service:sync:error", this); Svc.Obs.add("weave:service:backoff:interval", this); Svc.Obs.add("weave:engine:score:updated", this); Svc.Obs.add("weave:resource:status:401", this); if (!this.enabled) this._log.info("Weave Sync disabled"); // Create Weave identities (for logging in, and for encryption) ID.set('WeaveID', new Identity(PWDMGR_PASSWORD_REALM, this.username)); Auth.defaultAuthenticator = new BasicAuthenticator(ID.get('WeaveID')); ID.set('WeaveCryptoID', new Identity(PWDMGR_PASSPHRASE_REALM, this.username)); this._updateCachedURLs(); let status = this._checkSetup(); if (status != STATUS_DISABLED && status != CLIENT_NOT_CONFIGURED) Svc.Obs.notify("weave:engine:start-tracking"); // Applications can specify this preference if they want autoconnect // to happen after a fixed delay. let delay = Svc.Prefs.get("autoconnectDelay"); if (delay) { this.delayedAutoConnect(delay); } // Send an event now that Weave service is ready. We don't do this // synchronously so that observers will definitely have access to the // 'Weave' namespace. Utils.delay(function() Svc.Obs.notify("weave:service:ready"), 0); }, _checkSetup: function WeaveSvc__checkSetup() { if (!this.enabled) { Status.service = STATUS_DISABLED; } else if (!this.username) { this._log.debug("checkSetup: no username set"); Status.login = LOGIN_FAILED_NO_USERNAME; } else if (!Utils.mpLocked() && !this.password) { this._log.debug("checkSetup: no password set"); Status.login = LOGIN_FAILED_NO_PASSWORD; } else if (!Utils.mpLocked() && !this.passphrase) { this._log.debug("checkSetup: no passphrase set"); Status.login = LOGIN_FAILED_NO_PASSPHRASE; } else Status.service = STATUS_OK; return Status.service; }, _migratePrefs: function _migratePrefs() { // No need to re-migrate if (Svc.Prefs.get("migrated", false)) return; // Grab the list of old pref names let oldPrefBranch = "extensions.weave."; let oldPrefNames = Cc["@mozilla.org/preferences-service;1"]. getService(Ci.nsIPrefService). getBranch(oldPrefBranch). getChildList("", {}); // Map each old pref to the current pref branch let oldPref = new Preferences(oldPrefBranch); for each (let pref in oldPrefNames) Svc.Prefs.set(pref, oldPref.get(pref)); // Remove all the old prefs and remember that we've migrated oldPref.resetBranch(""); Svc.Prefs.set("migrated", true); }, _initLogs: function WeaveSvc__initLogs() { this._log = Log4Moz.repository.getLogger("Service.Main"); this._log.level = Log4Moz.Level[Svc.Prefs.get("log.logger.service.main")]; let formatter = new Log4Moz.BasicFormatter(); let root = Log4Moz.repository.rootLogger; root.level = Log4Moz.Level[Svc.Prefs.get("log.rootLogger")]; let capp = new Log4Moz.ConsoleAppender(formatter); capp.level = Log4Moz.Level[Svc.Prefs.get("log.appender.console")]; root.addAppender(capp); let dapp = new Log4Moz.DumpAppender(formatter); dapp.level = Log4Moz.Level[Svc.Prefs.get("log.appender.dump")]; root.addAppender(dapp); let verbose = Svc.Directory.get("ProfD", Ci.nsIFile); verbose.QueryInterface(Ci.nsILocalFile); verbose.append("weave"); verbose.append("logs"); verbose.append("verbose-log.txt"); if (!verbose.exists()) verbose.create(verbose.NORMAL_FILE_TYPE, PERMS_FILE); let maxSize = 65536; // 64 * 1024 (64KB) this._debugApp = new Log4Moz.RotatingFileAppender(verbose, formatter, maxSize); this._debugApp.level = Log4Moz.Level[Svc.Prefs.get("log.appender.debugLog")]; root.addAppender(this._debugApp); }, clearLogs: function WeaveSvc_clearLogs() { this._debugApp.clear(); }, /** * Register the built-in engines for certain applications */ _registerEngines: function WeaveSvc__registerEngines() { let engines = []; // Applications can provide this preference (comma-separated list) // to specify which engines should be registered on startup. let pref = Svc.Prefs.get("registerEngines"); if (pref) { engines = pref.split(","); } // Grab the actual engines and register them Engines.register(engines.map(function(name) Weave[name + "Engine"])); }, QueryInterface: XPCOMUtils.generateQI([Ci.nsIObserver, Ci.nsISupportsWeakReference]), // nsIObserver observe: function WeaveSvc__observe(subject, topic, data) { switch (topic) { case "weave:service:setup-complete": let status = this._checkSetup(); if (status != STATUS_DISABLED && status != CLIENT_NOT_CONFIGURED) Svc.Obs.notify("weave:engine:start-tracking"); break; case "network:offline-status-changed": // Whether online or offline, we'll reschedule syncs this._log.trace("Network offline status change: " + data); this._checkSyncStatus(); break; case "weave:service:sync:error": this._handleSyncError(); if (Status.sync == CREDENTIALS_CHANGED) { this.logout(); Utils.delay(function() this.login(), 0, this); } break; case "weave:service:sync:finish": this._scheduleNextSync(); this._syncErrors = 0; break; case "weave:service:backoff:interval": let interval = (data + Math.random() * data * 0.25) * 1000; // required backoff + up to 25% Status.backoffInterval = interval; Status.minimumNextSync = Date.now() + data; break; case "weave:engine:score:updated": this._handleScoreUpdate(); break; case "weave:resource:status:401": this._handleResource401(subject); break; case "idle": this._log.trace("Idle time hit, trying to sync"); Svc.Idle.removeIdleObserver(this, this._idleTime); this._idleTime = 0; Utils.delay(function() this.sync(false), 0, this); break; } }, _handleScoreUpdate: function WeaveSvc__handleScoreUpdate() { const SCORE_UPDATE_DELAY = 3000; Utils.delay(this._calculateScore, SCORE_UPDATE_DELAY, this, "_scoreTimer"); }, _calculateScore: function WeaveSvc_calculateScoreAndDoStuff() { var engines = Engines.getEnabled(); for (let i = 0;i < engines.length;i++) { this._log.trace(engines[i].name + ": score: " + engines[i].score); this.globalScore += engines[i].score; engines[i]._tracker.resetScore(); } this._log.trace("Global score updated: " + this.globalScore); this._checkSyncStatus(); }, _handleResource401: function _handleResource401(request) { // Only handle 401s that are hitting the current cluster let spec = request.resource.spec; let cluster = this.clusterURL; if (spec.indexOf(cluster) != 0) return; // Nothing to do if the cluster isn't changing if (!this._setCluster()) return; // Replace the old cluster with the new one to retry the request request.newUri = this.clusterURL + spec.slice(cluster.length); }, // gets cluster from central LDAP server and returns it, or null on error _findCluster: function _findCluster() { this._log.debug("Finding cluster for user " + this.username); let fail; let res = new Resource(this.userAPI + this.username + "/node/weave"); try { let node = res.get(); switch (node.status) { case 400: Status.login = LOGIN_FAILED_LOGIN_REJECTED; fail = "Find cluster denied: " + this._errorStr(node); break; case 404: this._log.debug("Using serverURL as data cluster (multi-cluster support disabled)"); return this.serverURL; case 0: case 200: if (node == "null") node = null; return node; default: fail = "Unexpected response code: " + node.status; break; } } catch (e) { this._log.debug("Network error on findCluster"); Status.login = LOGIN_FAILED_NETWORK_ERROR; fail = e; } throw fail; }, // gets cluster from central LDAP server and sets this.clusterURL _setCluster: function _setCluster() { // Make sure we didn't get some unexpected response for the cluster let cluster = this._findCluster(); this._log.debug("cluster value = " + cluster); if (cluster == null) return false; // Don't update stuff if we already have the right cluster if (cluster == this.clusterURL) return false; this.clusterURL = cluster; return true; }, // update cluster if required. returns false if the update was not required _updateCluster: function _updateCluster() { let cTime = Date.now(); let lastUp = parseFloat(Svc.Prefs.get("lastClusterUpdate")); if (!lastUp || ((cTime - lastUp) >= CLUSTER_BACKOFF)) { if (this._setCluster()) { Svc.Prefs.set("lastClusterUpdate", cTime.toString()); return true; } } return false; }, verifyLogin: function verifyLogin() this._notify("verify-login", "", function() { // Make sure we have a cluster to verify against // this is a little weird, if we don't get a node we pretend // to succeed, since that probably means we just don't have storage if (this.clusterURL == "" && !this._setCluster()) { Status.sync = NO_SYNC_NODE_FOUND; Svc.Obs.notify("weave:service:sync:delayed"); return true; } if (!this.username) { Status.login = LOGIN_FAILED_NO_USERNAME; return false; } try { let test = new Resource(this.infoURL).get(); switch (test.status) { case 200: // The user is authenticated. if (!this.passphrase) { Status.login = LOGIN_FAILED_NO_PASSPHRASE; return false; } // We also have a passphrase, so check it now. if (!this._verifyPassphrase()) { Status.login = LOGIN_FAILED_INVALID_PASSPHRASE; return false; } // Username/password and passphrase all verified Status.login = LOGIN_SUCCEEDED; return true; case 401: // Login failed. If the password contains non-ASCII characters, // perhaps the server password is an old low-byte only one? let id = ID.get('WeaveID'); if (id.password != id.passwordUTF8) { let res = new Resource(this.infoURL); let auth = new BrokenBasicAuthenticator(id); res.authenticator = auth; test = res.get(); if (test.status == 200) { this._log.debug("Non-ASCII password detected. " + "Changing to UTF-8 version."); // Let's change the password on the server to the UTF8 version. let url = this.userAPI + this.username + "/password"; res = new Resource(url); res.authenticator = auth; res.post(id.passwordUTF8); return this.verifyLogin(); } } // Yes, we want to fall through to the 404 case. case 404: // Check that we're verifying with the correct cluster if (this._setCluster()) return this.verifyLogin(); // We must have the right cluster, but the server doesn't expect us Status.login = LOGIN_FAILED_LOGIN_REJECTED; return false; default: // Server didn't respond with something that we expected this._checkServerError(test); Status.login = LOGIN_FAILED_SERVER_ERROR; return false; } } catch (ex) { // Must have failed on some network issue this._log.debug("verifyLogin failed: " + Utils.exceptionStr(ex)); Status.login = LOGIN_FAILED_NETWORK_ERROR; return false; } })(), _verifyPassphrase: function _verifyPassphrase() this._catch(this._notify("verify-passphrase", "", function() { // Don't allow empty/missing passphrase if (!this.passphrase) return false; try { let pubkey = PubKeys.getDefaultKey(); let privkey = PrivKeys.get(pubkey.privateKeyUri); let result = Svc.Crypto.verifyPassphrase( privkey.payload.keyData, this.passphraseUTF8, privkey.payload.salt, privkey.payload.iv ); if (result) return true; // Passphrase validation failed. Perhaps because the keys are // based on an old low-byte only passphrase? result = Svc.Crypto.verifyPassphrase( privkey.payload.keyData, this.passphrase, privkey.payload.salt, privkey.payload.iv ); if (result) this._needUpdatedKeys = true; return result; } catch (e) { // this means no keys are present (or there's a network error) return true; } }))(), changePassword: function WeaveSvc_changePassword(newpass) this._notify("changepwd", "", function() { let url = this.userAPI + this.username + "/password"; try { let resp = new Resource(url).post(Utils.encodeUTF8(newpass)); if (resp.status != 200) { this._log.debug("Password change failed: " + resp); return false; } } catch(ex) { // Must have failed on some network issue this._log.debug("changePassword failed: " + Utils.exceptionStr(ex)); return false; } // Save the new password for requests and login manager this.password = newpass; this.persistLogin(); return true; })(), changePassphrase: function WeaveSvc_changePassphrase(newphrase) this._catch(this._notify("changepph", "", function() { /* Wipe */ this.wipeServer(); PubKeys.clearCache(); PrivKeys.clearCache(); this.logout(); /* Set this so UI is updated on next run */ this.passphrase = newphrase; this.persistLogin(); /* Login in sync: this also generates new keys */ this.login(); this.sync(true); return true; }))(), startOver: function() { // Set a username error so the status message shows "set up..." Status.login = LOGIN_FAILED_NO_USERNAME; this.logout(); // Reset all engines this.resetClient(); // Reset Weave prefs Svc.Prefs.resetBranch(""); // set lastversion pref Svc.Prefs.set("lastversion", WEAVE_VERSION); // Find weave logins and remove them. this.password = ""; this.passphrase = ""; Svc.Login.findLogins({}, PWDMGR_HOST, "", "").map(function(login) { Svc.Login.removeLogin(login); }); Svc.Obs.notify("weave:service:start-over"); Svc.Obs.notify("weave:engine:stop-tracking"); }, delayedAutoConnect: function delayedAutoConnect(delay) { if (this._loggedIn) return; if (this._checkSetup() == STATUS_OK && Svc.Prefs.get("autoconnect")) { Utils.delay(this._autoConnect, delay * 1000, this, "_autoTimer"); } }, _autoConnect: let (attempts = 0) function _autoConnect() { let reason = Utils.mpLocked() ? "master password still locked" : this._checkSync([kSyncNotLoggedIn, kFirstSyncChoiceNotMade]); // Can't autoconnect if we're missing these values if (!reason) { if (!this.username || !this.password || !this.passphrase) return; // Nothing more to do on a successful login if (this.login()) return; } // Something failed, so try again some time later let interval = this._calculateBackoff(++attempts, 60 * 1000); this._log.debug("Autoconnect failed: " + (reason || Status.login) + "; retry in " + Math.ceil(interval / 1000) + " sec."); Utils.delay(function() this._autoConnect(), interval, this, "_autoTimer"); }, persistLogin: function persistLogin() { // Canceled master password prompt can prevent these from succeeding try { ID.get("WeaveID").persist(); ID.get("WeaveCryptoID").persist(); } catch(ex) {} }, login: function WeaveSvc_login(username, password, passphrase) this._catch(this._lock(this._notify("login", "", function() { this._loggedIn = false; if (Svc.IO.offline) throw "Application is offline, login should not be called"; let initialStatus = this._checkSetup(); if (username) this.username = username; if (password) this.password = password; if (passphrase) this.passphrase = passphrase; if (this._checkSetup() == CLIENT_NOT_CONFIGURED) throw "aborting login, client not configured"; // Calling login() with parameters when the client was // previously not configured means setup was completed. if (initialStatus == CLIENT_NOT_CONFIGURED && (username || password || passphrase)) Svc.Obs.notify("weave:service:setup-complete"); this._log.info("Logging in user " + this.username); if (!this.verifyLogin()) { // verifyLogin sets the failure states here. throw "Login failed: " + Status.login; } // No need to try automatically connecting after a successful login if (this._autoTimer) this._autoTimer.clear(); this._loggedIn = true; // Try starting the sync timer now that we're logged in this._checkSyncStatus(); Svc.Prefs.set("autoconnect", true); return true; })))(), logout: function WeaveSvc_logout() { // No need to do anything if we're already logged out if (!this._loggedIn) return; this._log.info("Logging out"); this._loggedIn = false; // Cancel the sync timer now that we're logged out this._checkSyncStatus(); Svc.Prefs.set("autoconnect", false); Svc.Obs.notify("weave:service:logout:finish"); }, _errorStr: function WeaveSvc__errorStr(code) { switch (code.toString()) { case "1": return "illegal-method"; case "2": return "invalid-captcha"; case "3": return "invalid-username"; case "4": return "cannot-overwrite-resource"; case "5": return "userid-mismatch"; case "6": return "json-parse-failure"; case "7": return "invalid-password"; case "8": return "invalid-record"; case "9": return "weak-password"; default: return "generic-server-error"; } }, checkUsername: function WeaveSvc_checkUsername(username) { let url = this.userAPI + username; let res = new Resource(url); res.authenticator = new NoOpAuthenticator(); let data = ""; try { data = res.get(); if (data.status == 200) { if (data == "0") return "available"; else if (data == "1") return "notAvailable"; } } catch(ex) {} // Convert to the error string, or default to generic on exception return this._errorStr(data); }, createAccount: function WeaveSvc_createAccount(username, password, email, captchaChallenge, captchaResponse) { let payload = JSON.stringify({ "password": Utils.encodeUTF8(password), "email": email, "captcha-challenge": captchaChallenge, "captcha-response": captchaResponse }); let url = this.userAPI + username; let res = new Resource(url); res.authenticator = new Weave.NoOpAuthenticator(); // Hint to server to allow scripted user creation or otherwise // ignore captcha. if (Svc.Prefs.isSet("admin-secret")) res.setHeader("X-Weave-Secret", Svc.Prefs.get("admin-secret", "")); let error = "generic-server-error"; try { let register = res.put(payload); if (register.success) { this._log.info("Account created: " + register); return null; } // Must have failed, so figure out the reason if (register.status == 400) error = this._errorStr(register); } catch(ex) { this._log.warn("Failed to create account: " + ex); } return error; }, // stuff we need to to after login, before we can really do // anything (e.g. key setup) _remoteSetup: function WeaveSvc__remoteSetup() { let reset = false; this._log.trace("Fetching global metadata record"); let meta = Records.import(this.metaURL); let remoteVersion = (meta && meta.payload.storageVersion)? meta.payload.storageVersion : ""; this._log.debug(["Weave Version:", WEAVE_VERSION, "Local Storage:", STORAGE_VERSION, "Remote Storage:", remoteVersion].join(" ")); // Check for cases that require a fresh start. When comparing remoteVersion, // we need to convert it to a number as older clients used it as a string. if (!meta || !meta.payload.storageVersion || !meta.payload.syncID || STORAGE_VERSION > parseFloat(remoteVersion)) { // abort the server wipe if the GET status was anything other than 404 or 200 let status = Records.response.status; if (status != 200 && status != 404) { this._checkServerError(Records.response); Status.sync = METARECORD_DOWNLOAD_FAIL; this._log.warn("Unknown error while downloading metadata record. " + "Aborting sync."); return false; } if (!meta) this._log.info("No metadata record, server wipe needed"); if (meta && !meta.payload.syncID) this._log.warn("No sync id, server wipe needed"); if (!this.keyGenEnabled) { this._log.info("...and key generation is disabled. Not wiping. " + "Aborting sync."); Status.sync = DESKTOP_VERSION_OUT_OF_DATE; return false; } reset = true; this._log.info("Wiping server data"); this._freshStart(); if (status == 404) this._log.info("Metadata record not found, server wiped to ensure " + "consistency."); else // 200 this._log.info("Wiped server; incompatible metadata: " + remoteVersion); } else if (remoteVersion > STORAGE_VERSION) { Status.sync = VERSION_OUT_OF_DATE; this._log.warn("Upgrade required to access newer storage version."); return false; } else if (meta.payload.syncID != this.syncID) { this.resetClient(); this.syncID = meta.payload.syncID; this._log.debug("Clear cached values and take syncId: " + this.syncID); // XXX Bug 531005 Wait long enough to allow potentially another concurrent // sync to finish generating the keypair and uploading them Sync.sleep(15000); // bug 545725 - re-verify creds and fail sanely if (!this.verifyLogin()) { Status.sync = CREDENTIALS_CHANGED; this._log.info("Credentials have changed, aborting sync and forcing re-login."); return false; } } let needKeys = true; let pubkey = PubKeys.getDefaultKey(); if (!pubkey) this._log.debug("Could not get public key"); else if (pubkey.keyData == null) this._log.debug("Public key has no key data"); else { // make sure we have a matching privkey let privkey = PrivKeys.get(pubkey.privateKeyUri); if (!privkey) this._log.debug("Could not get private key"); else if (privkey.keyData == null) this._log.debug("Private key has no key data"); else return true; } if (needKeys) { if (PubKeys.response.status != 404 && PrivKeys.response.status != 404) { this._log.warn("Couldn't download keys from server, aborting sync"); this._log.debug("PubKey HTTP status: " + PubKeys.response.status); this._log.debug("PrivKey HTTP status: " + PrivKeys.response.status); this._checkServerError(PubKeys.response); this._checkServerError(PrivKeys.response); Status.sync = KEYS_DOWNLOAD_FAIL; return false; } if (!this.keyGenEnabled) { this._log.warn("Couldn't download keys from server, and key generation" + "is disabled. Aborting sync"); Status.sync = NO_KEYS_NO_KEYGEN; return false; } if (!reset) { this._log.warn("Calling freshStart from !reset case."); this._freshStart(); this._log.info("Server data wiped to ensure consistency due to missing keys"); } let passphrase = ID.get("WeaveCryptoID"); if (passphrase.password) { let keys = PubKeys.createKeypair(passphrase, PubKeys.defaultKeyUri, PrivKeys.defaultKeyUri); try { // Upload and cache the keypair PubKeys.uploadKeypair(keys); PubKeys.set(keys.pubkey.uri, keys.pubkey); PrivKeys.set(keys.privkey.uri, keys.privkey); return true; } catch (e) { Status.sync = KEYS_UPLOAD_FAIL; this._log.error("Could not upload keys: " + Utils.exceptionStr(e)); } } else { Status.sync = SETUP_FAILED_NO_PASSPHRASE; this._log.warn("Could not get encryption passphrase"); } } return false; }, /** * Determine if a sync should run. * * @param ignore [optional] * array of reasons to ignore when checking * * @return Reason for not syncing; not-truthy if sync should run */ _checkSync: function WeaveSvc__checkSync(ignore) { let reason = ""; if (!this.enabled) reason = kSyncWeaveDisabled; else if (Svc.IO.offline) reason = kSyncNetworkOffline; else if (Status.minimumNextSync > Date.now()) reason = kSyncBackoffNotMet; else if (!this._loggedIn) reason = kSyncNotLoggedIn; else if (Svc.Prefs.get("firstSync") == "notReady") reason = kFirstSyncChoiceNotMade; if (ignore && ignore.indexOf(reason) != -1) return ""; return reason; }, /** * Remove any timers/observers that might trigger a sync */ _clearSyncTriggers: function _clearSyncTriggers() { // Clear out any scheduled syncs if (this._syncTimer) this._syncTimer.clear(); if (this._heartbeatTimer) this._heartbeatTimer.clear(); // Clear out a sync that's just waiting for idle if we happen to have one try { Svc.Idle.removeIdleObserver(this, this._idleTime); this._idleTime = 0; } catch(ex) {} }, /** * Check if we should be syncing and schedule the next sync, if it's not scheduled */ _checkSyncStatus: function WeaveSvc__checkSyncStatus() { // Should we be syncing now, if not, cancel any sync timers and return // if we're in backoff, we'll schedule the next sync if (this._checkSync([kSyncBackoffNotMet])) { this._clearSyncTriggers(); return; } if (this._needUpdatedKeys) this._updateKeysToUTF8Passphrase(); // Only set the wait time to 0 if we need to sync right away let wait; if (this.globalScore > this.syncThreshold) { this._log.debug("Global Score threshold hit, triggering sync."); wait = 0; } this._scheduleNextSync(wait); }, _updateKeysToUTF8Passphrase: function _updateKeysToUTF8Passphrase() { // Rewrap private key in UTF-8 encoded passphrase. let pubkey = PubKeys.getDefaultKey(); let privkey = PrivKeys.get(pubkey.privateKeyUri); this._log.debug("Rewrapping private key with UTF-8 encoded passphrase."); let oldPrivKeyData = privkey.payload.keyData; privkey.payload.keyData = Svc.Crypto.rewrapPrivateKey( oldPrivKeyData, this.passphrase, privkey.payload.salt, privkey.payload.iv, this.passphraseUTF8 ); let response = new Resource(privkey.uri).put(privkey); if (!response.success) { this._log("Uploading rewrapped private key failed!"); this._needUpdatedKeys = false; return; } // Recompute HMAC for symmetric bulk keys based on UTF-8 encoded passphrase. let oldHmacKey = Svc.KeyFactory.keyFromString(Ci.nsIKeyObject.HMAC, this.passphrase); let enginesToWipe = []; for each (let engine in Engines.getAll()) { let meta = CryptoMetas.get(engine.cryptoMetaURL); if (!meta) continue; this._log.debug("Recomputing HMAC for key at " + engine.cryptoMetaURL + " with UTF-8 encoded passphrase."); for each (key in meta.keyring) { if (key.hmac != Utils.sha256HMAC(key.wrapped, oldHmacKey)) { this._log.debug("Key SHA256 HMAC mismatch! Wiping server."); enginesToWipe.push(engine.name); meta = null; break; } key.hmac = Utils.sha256HMAC(key.wrapped, meta.hmacKey); } if (!meta) continue; response = new Resource(meta.uri).put(meta); if (!response.success) { this._log.debug("Key upload failed: " + response); } } if (enginesToWipe.length) { this._log.debug("Wiping engines " + enginesToWipe.join(", ")); this.wipeRemote(enginesToWipe); } this._needUpdatedKeys = false; }, /** * Call sync() on an idle timer * * delay is optional */ syncOnIdle: function WeaveSvc_syncOnIdle(delay) { // No need to add a duplicate idle observer if (this._idleTime) return; this._idleTime = delay || IDLE_TIME; this._log.debug("Idle timer created for sync, will sync after " + this._idleTime + " seconds of inactivity."); Svc.Idle.addIdleObserver(this, this._idleTime); }, /** * Set a timer for the next sync */ _scheduleNextSync: function WeaveSvc__scheduleNextSync(interval) { // Figure out when to sync next if not given a interval to wait if (interval == null) { // Check if we had a pending sync from last time if (this.nextSync != 0) interval = this.nextSync - Date.now(); // Use the bigger of default sync interval and backoff else interval = Math.max(this.syncInterval, Status.backoffInterval); } // Start the sync right away if we're already late if (interval <= 0) { this.syncOnIdle(); return; } this._log.trace("Next sync in " + Math.ceil(interval / 1000) + " sec."); Utils.delay(function() this.syncOnIdle(), interval, this, "_syncTimer"); // Save the next sync time in-case sync is disabled (logout/offline/etc.) this.nextSync = Date.now() + interval; // if we're a single client, set up a heartbeat to detect new clients sooner if (this.numClients == 1) this._scheduleHeartbeat(); }, /** * Hits info/collections on the server to see if there are new clients. * This is only called when the account has one active client, and if more * are found will trigger a sync to change client sync frequency and update data. */ _doHeartbeat: function WeaveSvc__doHeartbeat() { if (this._heartbeatTimer) this._heartbeatTimer.clear(); this.nextHeartbeat = 0; let info = null; try { info = new Resource(this.infoURL).get(); if (info && info.success) { // if clients.lastModified doesn't match what the server has, // we have another client in play this._log.trace("Remote timestamp:" + info.obj["clients"] + " Local timestamp: " + Clients.lastSync); if (info.obj["clients"] > Clients.lastSync) { this._log.debug("New clients detected, triggering a full sync"); this.syncOnIdle(); return; } } else { this._checkServerError(info); this._log.debug("Heartbeat failed. HTTP Error: " + info.status); } } catch(ex) { // if something throws unexpectedly, not a big deal this._log.debug("Heartbeat failed unexpectedly: " + ex); } // no joy, schedule the next heartbeat this._scheduleHeartbeat(); }, /** * Sets up a heartbeat ping to check for new clients. This is not a critical * behaviour for the client, so if we hit server/network issues, we'll just drop * this until the next sync. */ _scheduleHeartbeat: function WeaveSvc__scheduleNextHeartbeat() { if (this._heartbeatTimer) return; let now = Date.now(); if (this.nextHeartbeat && this.nextHeartbeat < now) { this._doHeartbeat(); return; } // if the next sync is in less than an hour, don't bother let interval = MULTI_DESKTOP_SYNC; if (this.nextSync < Date.now() + interval || Status.enforceBackoff) return; if (this.nextHeartbeat) interval = this.nextHeartbeat - now; else this.nextHeartbeat = now + interval; this._log.trace("Setting up heartbeat, next ping in " + Math.ceil(interval / 1000) + " sec."); Utils.delay(function() this._doHeartbeat(), interval, this, "_heartbeatTimer"); }, _syncErrors: 0, /** * Deal with sync errors appropriately */ _handleSyncError: function WeaveSvc__handleSyncError() { this._syncErrors++; // do nothing on the first couple of failures, if we're not in backoff due to 5xx errors if (!Status.enforceBackoff) { if (this._syncErrors < 3) { this._scheduleNextSync(); return; } Status.enforceBackoff = true; } const MINIMUM_BACKOFF_INTERVAL = 15 * 60 * 1000; // 15 minutes let interval = this._calculateBackoff(this._syncErrors, MINIMUM_BACKOFF_INTERVAL); this._scheduleNextSync(interval); let d = new Date(Date.now() + interval); this._log.config("Starting backoff, next sync at:" + d.toString()); }, /** * Sync up engines with the server. */ sync: function sync() this._catch(this._lock(this._notify("sync", "", function() { let syncStartTime = Date.now(); Status.resetSync(); // Make sure we should sync or record why we shouldn't let reason = this._checkSync(); if (reason) { // this is a purposeful abort rather than a failure, so don't set // any status bits reason = "Can't sync: " + reason; throw reason; } // if we don't have a node, get one. if that fails, retry in 10 minutes if (this.clusterURL == "" && !this._setCluster()) { Status.sync = NO_SYNC_NODE_FOUND; this._scheduleNextSync(10 * 60 * 1000); return; } // Clear out any potentially pending syncs now that we're syncing this._clearSyncTriggers(); this.nextSync = 0; this.nextHeartbeat = 0; // reset backoff info, if the server tells us to continue backing off, // we'll handle that later Status.resetBackoff(); // Ping the server with a special info request once a day let infoURL = this.infoURL; let now = Math.floor(Date.now() / 1000); let lastPing = Svc.Prefs.get("lastPing", 0); if (now - lastPing > 86400) { // 60 * 60 * 24 infoURL += "?v=" + WEAVE_VERSION; Svc.Prefs.set("lastPing", now); } // Figure out what the last modified time is for each collection let info = new Resource(infoURL).get(); if (!info.success) { if (info.status == 401) { this.logout(); Status.login = LOGIN_FAILED_LOGIN_REJECTED; } throw "aborting sync, failed to get collections"; } this.globalScore = 0; // Convert the response to an object and read out the modified times for each (let engine in [Clients].concat(Engines.getAll())) engine.lastModified = info.obj[engine.name] || 0; // If the modified time of crypto records ever changes, clear the cache if (info.obj.crypto != this.cryptoModified) { this._log.debug("Clearing cached crypto records"); CryptoMetas.clearCache(); this.cryptoModified = info.obj.crypto; } // If the modified time of keys records ever changes, clear the cache if (info.obj.keys != this.keysModified) { this._log.debug("Clearing cached keys records"); PubKeys.clearCache(); PrivKeys.clearCache(); this.keysModified = info.obj.keys; } if (!(this._remoteSetup())) throw "aborting sync, remote setup failed"; // Make sure we have an up-to-date list of clients before sending commands this._log.trace("Refreshing client list"); Clients.sync(); // Wipe data in the desired direction if necessary switch (Svc.Prefs.get("firstSync")) { case "resetClient": this.resetClient(Engines.getEnabled().map(function(e) e.name)); break; case "wipeClient": this.wipeClient(Engines.getEnabled().map(function(e) e.name)); break; case "wipeRemote": this.wipeRemote(Engines.getEnabled().map(function(e) e.name)); break; } // Process the incoming commands if we have any if (Clients.localCommands) { try { if (!(this.processCommands())) { Status.sync = ABORT_SYNC_COMMAND; throw "aborting sync, process commands said so"; } // Repeat remoteSetup in-case the commands forced us to reset if (!(this._remoteSetup())) throw "aborting sync, remote setup failed after processing commands"; } finally { // Always immediately push back the local client (now without commands) Clients.sync(); } } // Update the client mode now because it might change what we sync this._updateClientMode(); try { for each (let engine in Engines.getEnabled()) { // If there's any problems with syncing the engine, report the failure if (!(this._syncEngine(engine)) || Status.enforceBackoff) { this._log.info("Aborting sync"); break; } } // Upload meta/global if any engines changed anything let meta = Records.get(this.metaURL); if (meta.changed) new Resource(meta.uri).put(meta); if (this._syncError) throw "Some engines did not sync correctly"; else { Svc.Prefs.set("lastSync", new Date().toString()); Status.sync = SYNC_SUCCEEDED; let syncTime = ((Date.now() - syncStartTime) / 1000).toFixed(2); this._log.info("Sync completed successfully in " + syncTime + " secs."); } } finally { this._syncError = false; Svc.Prefs.reset("firstSync"); } })))(), /** * Process the locally stored clients list to figure out what mode to be in */ _updateClientMode: function _updateClientMode() { // Nothing to do if it's the same amount let {numClients, hasMobile} = Clients.stats; if (this.numClients == numClients) return; this._log.debug("Client count: " + this.numClients + " -> " + numClients); this.numClients = numClients; if (numClients == 1) { this.syncInterval = SINGLE_USER_SYNC; this.syncThreshold = SINGLE_USER_THRESHOLD; } else { this.syncInterval = hasMobile ? MULTI_MOBILE_SYNC : MULTI_DESKTOP_SYNC; this.syncThreshold = hasMobile ? MULTI_MOBILE_THRESHOLD : MULTI_DESKTOP_THRESHOLD; } }, // returns true if sync should proceed // false / no return value means sync should be aborted _syncEngine: function WeaveSvc__syncEngine(engine) { try { engine.sync(); return true; } catch(e) { // maybe a 401, cluster update needed? if (e.status == 401 && this._updateCluster()) return this._syncEngine(engine); this._checkServerError(e); Status.engines = [engine.name, e.failureCode || ENGINE_UNKNOWN_FAIL]; this._syncError = true; this._log.debug(Utils.exceptionStr(e)); return true; } finally { // If this engine has more to fetch, remember that globally if (engine.toFetch != null && engine.toFetch.length > 0) Status.partial = true; } }, _freshStart: function WeaveSvc__freshStart() { this.resetClient(); let meta = new WBORecord(this.metaURL); meta.payload.syncID = this.syncID; meta.payload.storageVersion = STORAGE_VERSION; this._log.debug("New metadata record: " + JSON.stringify(meta.payload)); let resp = new Resource(meta.uri).put(meta); if (!resp.success) throw resp; Records.set(meta.uri, meta); // Wipe everything we know about except meta because we just uploaded it let collections = [Clients].concat(Engines.getAll()).map(function(engine) { return engine.name; }); this.wipeServer(["crypto", "keys"].concat(collections)); }, /** * Check to see if this is a failure * */ _checkServerError: function WeaveSvc__checkServerError(resp) { if (Utils.checkStatus(resp.status, null, [500, [502, 504]])) { Status.enforceBackoff = true; if (resp.status == 503 && resp.headers["retry-after"]) Svc.Obs.notify("weave:service:backoff:interval", parseInt(resp.headers["retry-after"], 10)); } }, /** * Return a value for a backoff interval. Maximum is eight hours, unless * Status.backoffInterval is higher. * */ _calculateBackoff: function WeaveSvc__calculateBackoff(attempts, base_interval) { const MAXIMUM_BACKOFF_INTERVAL = 8 * 60 * 60 * 1000; // 8 hours let backoffInterval = attempts * (Math.floor(Math.random() * base_interval) + base_interval); return Math.max(Math.min(backoffInterval, MAXIMUM_BACKOFF_INTERVAL), Status.backoffInterval); }, /** * Wipe user data from the server. * * @param collections [optional] * Array of collections to wipe. If not given, all collections are wiped. */ wipeServer: function WeaveSvc_wipeServer(collections) this._notify("wipe-server", "", function() { if (!collections) { collections = []; let info = new Resource(this.infoURL).get(); for (let name in info.obj) collections.push(name); } for each (let name in collections) { let url = this.storageURL + name; let response = new Resource(url).delete(); if (response.status != 200 && response.status != 404) { throw "Aborting wipeServer. Server responded with " + response.status + " response for " + url; } // Remove the crypto record from the server and local cache let crypto = this.storageURL + "crypto/" + name; response = new Resource(crypto).delete(); CryptoMetas.del(crypto); if (response.status != 200 && response.status != 404) { throw "Aborting wipeServer. Server responded with " + response.status + " response for " + crypto; } } })(), /** * Wipe all local user data. * * @param engines [optional] * Array of engine names to wipe. If not given, all engines are used. */ wipeClient: function WeaveSvc_wipeClient(engines) this._catch(this._notify("wipe-client", "", function() { // If we don't have any engines, reset the service and wipe all engines if (!engines) { // Clear out any service data this.resetService(); engines = [Clients].concat(Engines.getAll()); } // Convert the array of names into engines else engines = Engines.get(engines); // Fully wipe each engine if it's able to decrypt data for each (let engine in engines) if (engine._testDecrypt()) engine.wipeClient(); // Save the password/passphrase just in-case they aren't restored by sync this.persistLogin(); }))(), /** * Wipe all remote user data by wiping the server then telling each remote * client to wipe itself. * * @param engines [optional] * Array of engine names to wipe. If not given, all engines are used. */ wipeRemote: function WeaveSvc_wipeRemote(engines) this._catch(this._notify("wipe-remote", "", function() { // Make sure stuff gets uploaded this.resetClient(engines); // Clear out any server data this.wipeServer(engines); // Only wipe the engines provided if (engines) engines.forEach(function(e) this.prepCommand("wipeEngine", [e]), this); // Tell the remote machines to wipe themselves else this.prepCommand("wipeAll", []); // Make sure the changed clients get updated Clients.sync(); }))(), /** * Reset local service information like logs, sync times, caches. */ resetService: function WeaveSvc_resetService() this._catch(this._notify("reset-service", "", function() { // First drop old logs to track client resetting behavior this.clearLogs(); this._log.info("Logs reinitialized for service reset"); // Pretend we've never synced to the server and drop cached data this.syncID = ""; Svc.Prefs.reset("lastSync"); for each (let cache in [PubKeys, PrivKeys, CryptoMetas, Records]) cache.clearCache(); }))(), /** * Reset the client by getting rid of any local server data and client data. * * @param engines [optional] * Array of engine names to reset. If not given, all engines are used. */ resetClient: function WeaveSvc_resetClient(engines) this._catch(this._notify("reset-client", "", function() { // If we don't have any engines, reset everything including the service if (!engines) { // Clear out any service data this.resetService(); engines = [Clients].concat(Engines.getAll()); } // Convert the array of names into engines else engines = Engines.get(engines); // Have each engine drop any temporary meta data for each (let engine in engines) engine.resetClient(); }))(), /** * A hash of valid commands that the client knows about. The key is a command * and the value is a hash containing information about the command such as * number of arguments and description. */ _commands: [ ["resetAll", 0, "Clear temporary local data for all engines"], ["resetEngine", 1, "Clear temporary local data for engine"], ["wipeAll", 0, "Delete all client data for all engines"], ["wipeEngine", 1, "Delete all client data for engine"], ["logout", 0, "Log out client"], ].reduce(function WeaveSvc__commands(commands, entry) { commands[entry[0]] = {}; for (let [i, attr] in Iterator(["args", "desc"])) commands[entry[0]][attr] = entry[i + 1]; return commands; }, {}), /** * Check if the local client has any remote commands and perform them. * * @return False to abort sync */ processCommands: function WeaveSvc_processCommands() this._notify("process-commands", "", function() { // Immediately clear out the commands as we've got them locally let commands = Clients.localCommands; Clients.clearCommands(); // Process each command in order for each ({command: command, args: args} in commands) { this._log.debug("Processing command: " + command + "(" + args + ")"); let engines = [args[0]]; switch (command) { case "resetAll": engines = null; // Fallthrough case "resetEngine": this.resetClient(engines); break; case "wipeAll": engines = null; // Fallthrough case "wipeEngine": this.wipeClient(engines); break; case "logout": this.logout(); return false; default: this._log.debug("Received an unknown command: " + command); break; } } return true; })(), /** * Prepare to send a command to each remote client. Calling this doesn't * actually sync the command data to the server. If the client already has * the command/args pair, it won't get a duplicate action. * * @param command * Command to invoke on remote clients * @param args * Array of arguments to give to the command */ prepCommand: function WeaveSvc_prepCommand(command, args) { let commandData = this._commands[command]; // Don't send commands that we don't know about if (commandData == null) { this._log.error("Unknown command to send: " + command); return; } // Don't send a command with the wrong number of arguments else if (args == null || args.length != commandData.args) { this._log.error("Expected " + commandData.args + " args for '" + command + "', but got " + args); return; } // Send the command to all remote clients this._log.debug("Sending clients: " + [command, args, commandData.desc]); Clients.sendCommand(command, args); }, }; // Load Weave on the first time this file is loaded Weave.Service.onStartup();