b2e97e47c1
Added the UpdateDefaultTheme function. Renamed panelRenderTemplate to renderTemplate. Renamed panelSuccessRedirect to successRedirect. Reduced the amount of boilerplate in panel.GroupsEdit with renderTemplate. Renamed the pre_render_panel_edit_group hook to pre_render_panel_group_edit. Reduced the amount of boilerplate in panel.GroupsEditPerms with renderTemplate. Renamed the pre_render_panel_edit_group_perms hook to pre_render_panel_group_edit_perms. Fixed a bug where the active status for themes didn't get loaded at start-up. Fixed a theoretical deadlock in NewThemeList. Updated CONTRIBUTING.md
544 lines
16 KiB
Go
544 lines
16 KiB
Go
/*
|
|
*
|
|
* Gosora Plugin System
|
|
* Copyright Azareal 2016 - 2019
|
|
*
|
|
*/
|
|
package common
|
|
|
|
// TODO: Break this file up into multiple files to make it easier to maintain
|
|
import (
|
|
"database/sql"
|
|
"errors"
|
|
"log"
|
|
"net/http"
|
|
"sync/atomic"
|
|
|
|
"../query_gen/lib"
|
|
)
|
|
|
|
var ErrPluginNotInstallable = errors.New("This plugin is not installable")
|
|
|
|
type PluginList map[string]*Plugin
|
|
|
|
// TODO: Have a proper store rather than a map?
|
|
var Plugins PluginList = make(map[string]*Plugin)
|
|
|
|
func (list PluginList) Add(plugin *Plugin) {
|
|
buildPlugin(plugin)
|
|
list[plugin.UName] = plugin
|
|
}
|
|
|
|
func buildPlugin(plugin *Plugin) {
|
|
plugin.Installable = (plugin.Install != nil)
|
|
/*
|
|
The Active field should never be altered by a plugin. It's used internally by the software to determine whether an admin has enabled a plugin or not and whether to run it. This will be overwritten by the user's preference.
|
|
*/
|
|
plugin.Active = false
|
|
plugin.Installed = false
|
|
plugin.Hooks = make(map[string]int)
|
|
plugin.Data = nil
|
|
}
|
|
|
|
var hookTableBox atomic.Value
|
|
|
|
// ! HookTable is a work in progress, do not use it yet
|
|
// TODO: Test how fast it is to indirect hooks off the hook table as opposed to using them normally or using an interface{} for the hooks
|
|
// TODO: Can we filter the HookTable for each request down to only hooks the request actually uses?
|
|
// TODO: Make the RunXHook functions methods on HookTable
|
|
// TODO: Have plugins update hooks on a mutex guarded map and create a copy of that map in a serial global goroutine which gets thrown in the atomic.Value
|
|
type HookTable struct {
|
|
Hooks map[string][]func(interface{}) interface{}
|
|
Vhooks map[string]func(...interface{}) interface{}
|
|
VhookSkippable map[string]func(...interface{}) (bool, RouteError)
|
|
Sshooks map[string][]func(string) string
|
|
PreRenderHooks map[string][]func(http.ResponseWriter, *http.Request, *User, interface{}) bool
|
|
|
|
// For future use:
|
|
messageHooks map[string][]func(Message, PageInt, ...interface{}) interface{}
|
|
}
|
|
|
|
func init() {
|
|
hookTableBox.Store(new(HookTable))
|
|
}
|
|
|
|
// Hooks with a single argument. Is this redundant? Might be useful for inlining, as variadics aren't inlined? Are closures even inlined to begin with?
|
|
var Hooks = map[string][]func(interface{}) interface{}{
|
|
"forums_frow_assign": nil,
|
|
"topic_create_frow_assign": nil,
|
|
}
|
|
|
|
// Hooks with a variable number of arguments
|
|
var Vhooks = map[string]func(...interface{}) interface{}{
|
|
"forum_trow_assign": nil,
|
|
"topics_topic_row_assign": nil,
|
|
//"topics_user_row_assign": nil,
|
|
"topic_reply_row_assign": nil,
|
|
"create_group_preappend": nil, // What is this? Investigate!
|
|
"topic_create_pre_loop": nil,
|
|
}
|
|
|
|
// Hooks with a variable number of arguments and return values for skipping the parent function and propagating an error upwards
|
|
var VhookSkippable = map[string]func(...interface{}) (bool, RouteError){
|
|
"simple_forum_check_pre_perms": nil,
|
|
"forum_check_pre_perms": nil,
|
|
}
|
|
|
|
//var vhookErrorable = map[string]func(...interface{}) (interface{}, RouteError){}
|
|
|
|
var taskHooks = map[string][]func() error{
|
|
"before_half_second_tick": nil,
|
|
"after_half_second_tick": nil,
|
|
"before_second_tick": nil,
|
|
"after_second_tick": nil,
|
|
"before_fifteen_minute_tick": nil,
|
|
"after_fifteen_minute_tick": nil,
|
|
}
|
|
|
|
// Coming Soon:
|
|
type Message interface {
|
|
ID() int
|
|
Poster() int
|
|
Contents() string
|
|
ParsedContents() string
|
|
}
|
|
|
|
// While the idea is nice, this might result in too much code duplication, as we have seventy billion page structs, what else could we do to get static typing with these in plugins?
|
|
type PageInt interface {
|
|
Title() string
|
|
Header() *Header
|
|
CurrentUser() *User
|
|
GetExtData(name string) interface{}
|
|
SetExtData(name string, contents interface{})
|
|
}
|
|
|
|
// Coming Soon:
|
|
var messageHooks = map[string][]func(Message, PageInt, ...interface{}) interface{}{
|
|
"topic_reply_row_assign": nil,
|
|
}
|
|
|
|
// Hooks which take in and spit out a string. This is usually used for parser components
|
|
var Sshooks = map[string][]func(string) string{
|
|
"preparse_preassign": nil,
|
|
"parse_assign": nil,
|
|
}
|
|
|
|
// The hooks which run before the template is rendered for a route
|
|
var PreRenderHooks = map[string][]func(http.ResponseWriter, *http.Request, *User, interface{}) bool{
|
|
"pre_render": nil,
|
|
|
|
"pre_render_forum_list": nil,
|
|
"pre_render_forum": nil,
|
|
"pre_render_topic_list": nil,
|
|
"pre_render_view_topic": nil,
|
|
"pre_render_profile": nil,
|
|
"pre_render_custom_page": nil,
|
|
"pre_render_tmpl_page": nil,
|
|
"pre_render_overview": nil,
|
|
"pre_render_create_topic": nil,
|
|
|
|
"pre_render_account_own_edit": nil,
|
|
"pre_render_account_own_edit_password": nil,
|
|
"pre_render_account_own_edit_mfa": nil,
|
|
"pre_render_account_own_edit_mfa_setup": nil,
|
|
"pre_render_account_own_edit_email": nil,
|
|
"pre_render_login": nil,
|
|
"pre_render_login_mfa_verify": nil,
|
|
"pre_render_register": nil,
|
|
"pre_render_ban": nil,
|
|
"pre_render_ip_search": nil,
|
|
|
|
"pre_render_panel_dashboard": nil,
|
|
"pre_render_panel_forums": nil,
|
|
"pre_render_panel_delete_forum": nil,
|
|
"pre_render_panel_edit_forum": nil,
|
|
|
|
"pre_render_panel_analytics_views": nil,
|
|
"pre_render_panel_analytics_routes": nil,
|
|
"pre_render_panel_analytics_agents": nil,
|
|
"pre_render_panel_analytics_systems": nil,
|
|
"pre_render_panel_analytics_referrers": nil,
|
|
"pre_render_panel_analytics_route_views": nil,
|
|
"pre_render_panel_analytics_agent_views": nil,
|
|
"pre_render_panel_analytics_system_views": nil,
|
|
"pre_render_panel_analytics_referrer_views": nil,
|
|
|
|
"pre_render_panel_settings": nil,
|
|
"pre_render_panel_setting": nil,
|
|
"pre_render_panel_word_filters": nil,
|
|
"pre_render_panel_word_filters_edit": nil,
|
|
"pre_render_panel_plugins": nil,
|
|
"pre_render_panel_users": nil,
|
|
"pre_render_panel_edit_user": nil,
|
|
"pre_render_panel_groups": nil,
|
|
"pre_render_panel_group_edit": nil,
|
|
"pre_render_panel_group_edit_perms": nil,
|
|
"pre_render_panel_themes": nil,
|
|
"pre_render_panel_modlogs": nil,
|
|
|
|
"pre_render_error": nil, // Note: This hook isn't run for a few errors whose templates are computed at startup and reused, such as InternalError. This hook is also not available in JS mode.
|
|
// ^-- I don't know if it's run for InternalError, but it isn't computed at startup anymore
|
|
"pre_render_security_error": nil,
|
|
}
|
|
|
|
// ? - Should we make this an interface which plugins implement instead?
|
|
// Plugin is a struct holding the metadata for a plugin, along with a few of it's primary handlers.
|
|
type Plugin struct {
|
|
UName string
|
|
Name string
|
|
Author string
|
|
URL string
|
|
Settings string
|
|
Active bool
|
|
Tag string
|
|
Type string
|
|
Installable bool
|
|
Installed bool
|
|
|
|
Init func() error
|
|
Activate func() error
|
|
Deactivate func() // TODO: We might want to let this return an error?
|
|
Install func() error
|
|
Uninstall func() error // TODO: I'm not sure uninstall is implemented
|
|
|
|
Hooks map[string]int
|
|
Data interface{} // Usually used for hosting the VMs / reusable elements of non-native plugins
|
|
}
|
|
|
|
func (plugin *Plugin) BypassActive() (active bool, err error) {
|
|
err = extendStmts.isActive.QueryRow(plugin.UName).Scan(&active)
|
|
if err != nil && err != sql.ErrNoRows {
|
|
return false, err
|
|
}
|
|
return active, nil
|
|
}
|
|
|
|
func (plugin *Plugin) InDatabase() (exists bool, err error) {
|
|
var sink bool
|
|
err = extendStmts.isActive.QueryRow(plugin.UName).Scan(&sink)
|
|
if err != nil && err != sql.ErrNoRows {
|
|
return false, err
|
|
}
|
|
return err == nil, nil
|
|
}
|
|
|
|
// TODO: Silently add to the database, if it doesn't exist there rather than forcing users to call AddToDatabase instead?
|
|
func (plugin *Plugin) SetActive(active bool) (err error) {
|
|
_, err = extendStmts.setActive.Exec(active, plugin.UName)
|
|
if err == nil {
|
|
plugin.Active = active
|
|
}
|
|
return err
|
|
}
|
|
|
|
// TODO: Silently add to the database, if it doesn't exist there rather than forcing users to call AddToDatabase instead?
|
|
func (plugin *Plugin) SetInstalled(installed bool) (err error) {
|
|
if !plugin.Installable {
|
|
return ErrPluginNotInstallable
|
|
}
|
|
_, err = extendStmts.setInstalled.Exec(installed, plugin.UName)
|
|
if err == nil {
|
|
plugin.Installed = installed
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (plugin *Plugin) AddToDatabase(active bool, installed bool) (err error) {
|
|
_, err = extendStmts.add.Exec(plugin.UName, active, installed)
|
|
if err == nil {
|
|
plugin.Active = active
|
|
plugin.Installed = installed
|
|
}
|
|
return err
|
|
}
|
|
|
|
type ExtendStmts struct {
|
|
getPlugins *sql.Stmt
|
|
|
|
isActive *sql.Stmt
|
|
setActive *sql.Stmt
|
|
setInstalled *sql.Stmt
|
|
add *sql.Stmt
|
|
}
|
|
|
|
var extendStmts ExtendStmts
|
|
|
|
func init() {
|
|
DbInits.Add(func(acc *qgen.Accumulator) error {
|
|
extendStmts = ExtendStmts{
|
|
getPlugins: acc.Select("plugins").Columns("uname, active, installed").Prepare(),
|
|
|
|
isActive: acc.Select("plugins").Columns("active").Where("uname = ?").Prepare(),
|
|
setActive: acc.Update("plugins").Set("active = ?").Where("uname = ?").Prepare(),
|
|
setInstalled: acc.Update("plugins").Set("installed = ?").Where("uname = ?").Prepare(),
|
|
add: acc.Insert("plugins").Columns("uname, active, installed").Fields("?,?,?").Prepare(),
|
|
}
|
|
return acc.FirstError()
|
|
})
|
|
}
|
|
|
|
func InitExtend() (err error) {
|
|
err = InitPluginLangs()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return Plugins.Load()
|
|
}
|
|
|
|
// Load polls the database to see which plugins have been activated and which have been installed
|
|
func (plugins PluginList) Load() error {
|
|
rows, err := extendStmts.getPlugins.Query()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer rows.Close()
|
|
|
|
var uname string
|
|
var active, installed bool
|
|
for rows.Next() {
|
|
err = rows.Scan(&uname, &active, &installed)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Was the plugin deleted at some point?
|
|
plugin, ok := plugins[uname]
|
|
if !ok {
|
|
continue
|
|
}
|
|
plugin.Active = active
|
|
plugin.Installed = installed
|
|
plugins[uname] = plugin
|
|
}
|
|
return rows.Err()
|
|
}
|
|
|
|
// ? - Is this racey?
|
|
// TODO: Generate the cases in this switch
|
|
func (plugin *Plugin) AddHook(name string, handler interface{}) {
|
|
switch h := handler.(type) {
|
|
case func(interface{}) interface{}:
|
|
if len(Hooks[name]) == 0 {
|
|
var hookSlice []func(interface{}) interface{}
|
|
hookSlice = append(hookSlice, h)
|
|
Hooks[name] = hookSlice
|
|
} else {
|
|
Hooks[name] = append(Hooks[name], h)
|
|
}
|
|
plugin.Hooks[name] = len(Hooks[name]) - 1
|
|
case func(string) string:
|
|
if len(Sshooks[name]) == 0 {
|
|
var hookSlice []func(string) string
|
|
hookSlice = append(hookSlice, h)
|
|
Sshooks[name] = hookSlice
|
|
} else {
|
|
Sshooks[name] = append(Sshooks[name], h)
|
|
}
|
|
plugin.Hooks[name] = len(Sshooks[name]) - 1
|
|
case func(http.ResponseWriter, *http.Request, *User, interface{}) bool:
|
|
if len(PreRenderHooks[name]) == 0 {
|
|
var hookSlice []func(http.ResponseWriter, *http.Request, *User, interface{}) bool
|
|
hookSlice = append(hookSlice, h)
|
|
PreRenderHooks[name] = hookSlice
|
|
} else {
|
|
PreRenderHooks[name] = append(PreRenderHooks[name], h)
|
|
}
|
|
plugin.Hooks[name] = len(PreRenderHooks[name]) - 1
|
|
case func() error: // ! We might want a more generic name, as we might use this signature for things other than tasks hooks
|
|
if len(taskHooks[name]) == 0 {
|
|
var hookSlice []func() error
|
|
hookSlice = append(hookSlice, h)
|
|
taskHooks[name] = hookSlice
|
|
} else {
|
|
taskHooks[name] = append(taskHooks[name], h)
|
|
}
|
|
plugin.Hooks[name] = len(taskHooks[name]) - 1
|
|
case func(...interface{}) interface{}:
|
|
Vhooks[name] = h
|
|
plugin.Hooks[name] = 0
|
|
case func(...interface{}) (bool, RouteError):
|
|
VhookSkippable[name] = h
|
|
plugin.Hooks[name] = 0
|
|
default:
|
|
panic("I don't recognise this kind of handler!") // Should this be an error for the plugin instead of a panic()?
|
|
}
|
|
}
|
|
|
|
// ? - Is this racey?
|
|
// TODO: Generate the cases in this switch
|
|
func (plugin *Plugin) RemoveHook(name string, handler interface{}) {
|
|
switch handler.(type) {
|
|
case func(interface{}) interface{}:
|
|
key, ok := plugin.Hooks[name]
|
|
if !ok {
|
|
panic("handler not registered as hook")
|
|
}
|
|
hook := Hooks[name]
|
|
if len(hook) == 1 {
|
|
hook = []func(interface{}) interface{}{}
|
|
} else {
|
|
hook = append(hook[:key], hook[key+1:]...)
|
|
}
|
|
Hooks[name] = hook
|
|
case func(string) string:
|
|
key, ok := plugin.Hooks[name]
|
|
if !ok {
|
|
panic("handler not registered as hook")
|
|
}
|
|
hook := Sshooks[name]
|
|
if len(hook) == 1 {
|
|
hook = []func(string) string{}
|
|
} else {
|
|
hook = append(hook[:key], hook[key+1:]...)
|
|
}
|
|
Sshooks[name] = hook
|
|
case func(http.ResponseWriter, *http.Request, *User, interface{}) bool:
|
|
key, ok := plugin.Hooks[name]
|
|
if !ok {
|
|
panic("handler not registered as hook")
|
|
}
|
|
hook := PreRenderHooks[name]
|
|
if len(hook) == 1 {
|
|
hook = []func(http.ResponseWriter, *http.Request, *User, interface{}) bool{}
|
|
} else {
|
|
hook = append(hook[:key], hook[key+1:]...)
|
|
}
|
|
PreRenderHooks[name] = hook
|
|
case func() error:
|
|
key, ok := plugin.Hooks[name]
|
|
if !ok {
|
|
panic("handler not registered as hook")
|
|
}
|
|
hook := taskHooks[name]
|
|
if len(hook) == 1 {
|
|
hook = []func() error{}
|
|
} else {
|
|
hook = append(hook[:key], hook[key+1:]...)
|
|
}
|
|
taskHooks[name] = hook
|
|
case func(...interface{}) interface{}:
|
|
delete(Vhooks, name)
|
|
case func(...interface{}) (bool, RouteError):
|
|
delete(VhookSkippable, name)
|
|
default:
|
|
panic("I don't recognise this kind of handler!") // Should this be an error for the plugin instead of a panic()?
|
|
}
|
|
delete(plugin.Hooks, name)
|
|
}
|
|
|
|
// TODO: Add a HasHook method to complete the AddHook, RemoveHook, etc. set?
|
|
|
|
var PluginsInited = false
|
|
|
|
func InitPlugins() {
|
|
for name, body := range Plugins {
|
|
log.Printf("Added plugin '%s'", name)
|
|
if body.Active {
|
|
log.Printf("Initialised plugin '%s'", name)
|
|
if Plugins[name].Init != nil {
|
|
err := Plugins[name].Init()
|
|
if err != nil {
|
|
log.Print(err)
|
|
}
|
|
} else {
|
|
log.Printf("Plugin '%s' doesn't have an initialiser.", name)
|
|
}
|
|
}
|
|
}
|
|
PluginsInited = true
|
|
}
|
|
|
|
// ? - Are the following functions racey?
|
|
func RunHook(name string, data interface{}) interface{} {
|
|
hooks, ok := Hooks[name]
|
|
if ok {
|
|
for _, hook := range hooks {
|
|
data = hook(data)
|
|
}
|
|
}
|
|
return data
|
|
}
|
|
|
|
func RunHookNoreturn(name string, data interface{}) {
|
|
hooks, ok := Hooks[name]
|
|
if !ok {
|
|
return
|
|
}
|
|
for _, hook := range hooks {
|
|
_ = hook(data)
|
|
}
|
|
}
|
|
|
|
// TODO: Use RunHook semantics to allow multiple lined up plugins / modules their turn?
|
|
func RunVhook(name string, data ...interface{}) interface{} {
|
|
hook := Vhooks[name]
|
|
if hook != nil {
|
|
return hook(data...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func RunVhookSkippable(name string, data ...interface{}) (bool, RouteError) {
|
|
return VhookSkippable[name](data...)
|
|
}
|
|
|
|
func RunVhookNoreturn(name string, data ...interface{}) {
|
|
hook := Vhooks[name]
|
|
if hook != nil {
|
|
_ = hook(data...)
|
|
}
|
|
}
|
|
|
|
// TODO: Find a better way of doing this
|
|
func RunVhookNeedHook(name string, data ...interface{}) (ret interface{}, hasHook bool) {
|
|
hook := Vhooks[name]
|
|
if hook != nil {
|
|
return hook(data...), true
|
|
}
|
|
return nil, false
|
|
}
|
|
|
|
func RunTaskHook(name string) error {
|
|
for _, hook := range taskHooks[name] {
|
|
err := hook()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Trying to get a teeny bit of type-safety where-ever possible, especially for such a critical set of hooks
|
|
func RunSshook(name string, data string) string {
|
|
ssHooks, ok := Sshooks[name]
|
|
if ok {
|
|
for _, hook := range ssHooks {
|
|
data = hook(data)
|
|
}
|
|
}
|
|
return data
|
|
}
|
|
|
|
func RunPreRenderHook(name string, w http.ResponseWriter, r *http.Request, user *User, data interface{}) (halt bool) {
|
|
// This hook runs on ALL PreRender hooks
|
|
preRenderHooks, ok := PreRenderHooks["pre_render"]
|
|
if ok {
|
|
for _, hook := range preRenderHooks {
|
|
if hook(w, r, user, data) {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
|
|
// The actual PreRender hook
|
|
preRenderHooks, ok = PreRenderHooks[name]
|
|
if ok {
|
|
for _, hook := range preRenderHooks {
|
|
if hook(w, r, user, data) {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|