Files
worldmonitor/src-tauri/src/main.rs
Elie Habib 408d5d3374 security: harden IPC, gate DevTools, isolate external windows, exempt /api/version (#348)
* security: harden IPC commands, gate DevTools, and isolate external windows

- Remove devtools from default Tauri features; gate behind opt-in
  Cargo feature so production builds never expose DevTools
- Add IPC origin validation (require_trusted_window) to 9 sensitive
  commands: get_secret, get_all_secrets, set_secret, delete_secret,
  get_local_api_token, read/write/delete_cache_entry, fetch_polymarket
- Isolate youtube-login window into restricted capability (core:window
  only) — prevents external-origin webview from invoking app commands
- Add 5-minute TTL to cached sidecar auth token in fetch patch closure
- Document renderer trust boundary threat model in runtime.ts

* docs: add contributors, security acknowledgments, and desktop security policy

- Add Contributors section to README with all 16 GitHub contributors
- Add Security Acknowledgments crediting Cody Richard for 3 disclosures
- Update SECURITY.md with desktop runtime security model (Tauri IPC
  origin validation, DevTools gating, sidecar auth, capability isolation,
  fetch patch trust boundary)
- Add Tauri-specific items to security report scope
- Correct API key storage description to cover both web and desktop

* fix: exempt /api/version from bot-blocking middleware

The desktop update check and sidecar requests were getting 403'd by the
middleware's bot UA filter (curl/) and short UA check.
2026-02-25 06:14:16 +00:00

1170 lines
39 KiB
Rust

#![cfg_attr(not(debug_assertions), windows_subsystem = "windows")]
use std::collections::HashMap;
use std::env;
use std::fs::{self, File, OpenOptions};
use std::io::Write;
#[cfg(windows)]
use std::os::windows::process::CommandExt;
use std::path::{Path, PathBuf};
use std::process::{Child, Command, Stdio};
use std::sync::Mutex;
use std::time::{SystemTime, UNIX_EPOCH};
use keyring::Entry;
use reqwest::Url;
use serde::Serialize;
use serde_json::{Map, Value};
use tauri::menu::{AboutMetadata, Menu, MenuItem, PredefinedMenuItem, Submenu};
use tauri::{AppHandle, Manager, RunEvent, Webview, WebviewUrl, WebviewWindowBuilder, WindowEvent};
const LOCAL_API_PORT: &str = "46123";
const KEYRING_SERVICE: &str = "world-monitor";
const LOCAL_API_LOG_FILE: &str = "local-api.log";
const DESKTOP_LOG_FILE: &str = "desktop.log";
const MENU_FILE_SETTINGS_ID: &str = "file.settings";
const MENU_HELP_GITHUB_ID: &str = "help.github";
#[cfg(feature = "devtools")]
const MENU_HELP_DEVTOOLS_ID: &str = "help.devtools";
const TRUSTED_WINDOWS: [&str; 3] = ["main", "settings", "live-channels"];
const SUPPORTED_SECRET_KEYS: [&str; 21] = [
"GROQ_API_KEY",
"OPENROUTER_API_KEY",
"FRED_API_KEY",
"EIA_API_KEY",
"CLOUDFLARE_API_TOKEN",
"ACLED_ACCESS_TOKEN",
"URLHAUS_AUTH_KEY",
"OTX_API_KEY",
"ABUSEIPDB_API_KEY",
"WINGBITS_API_KEY",
"WS_RELAY_URL",
"VITE_OPENSKY_RELAY_URL",
"OPENSKY_CLIENT_ID",
"OPENSKY_CLIENT_SECRET",
"AISSTREAM_API_KEY",
"VITE_WS_RELAY_URL",
"FINNHUB_API_KEY",
"NASA_FIRMS_API_KEY",
"OLLAMA_API_URL",
"OLLAMA_MODEL",
"WORLDMONITOR_API_KEY",
];
#[derive(Default)]
struct LocalApiState {
child: Mutex<Option<Child>>,
token: Mutex<Option<String>>,
}
/// In-memory cache for keychain secrets. Populated once at startup to avoid
/// repeated macOS Keychain prompts (each `Entry::get_password()` triggers one).
struct SecretsCache {
secrets: Mutex<HashMap<String, String>>,
}
/// In-memory mirror of persistent-cache.json. The file can grow to 10+ MB,
/// so reading/parsing/writing it on every IPC call blocks the main thread.
/// Instead, load once into RAM and serialize writes to preserve ordering.
struct PersistentCache {
data: Mutex<Map<String, Value>>,
dirty: Mutex<bool>,
write_lock: Mutex<()>,
}
impl SecretsCache {
fn load_from_keychain() -> Self {
// Try consolidated vault first — single keychain prompt
if let Ok(entry) = Entry::new(KEYRING_SERVICE, "secrets-vault") {
if let Ok(json) = entry.get_password() {
if let Ok(map) = serde_json::from_str::<HashMap<String, String>>(&json) {
let secrets: HashMap<String, String> = map
.into_iter()
.filter(|(k, v)| {
SUPPORTED_SECRET_KEYS.contains(&k.as_str()) && !v.trim().is_empty()
})
.map(|(k, v)| (k, v.trim().to_string()))
.collect();
return SecretsCache {
secrets: Mutex::new(secrets),
};
}
}
}
// Migration: read individual keys (old format), consolidate into vault.
// This triggers one keychain prompt per key — happens only once.
let mut secrets = HashMap::new();
for key in SUPPORTED_SECRET_KEYS.iter() {
if let Ok(entry) = Entry::new(KEYRING_SERVICE, key) {
if let Ok(value) = entry.get_password() {
let trimmed = value.trim().to_string();
if !trimmed.is_empty() {
secrets.insert((*key).to_string(), trimmed);
}
}
}
}
// Write consolidated vault and clean up individual entries
if !secrets.is_empty() {
if let Ok(json) = serde_json::to_string(&secrets) {
if let Ok(vault_entry) = Entry::new(KEYRING_SERVICE, "secrets-vault") {
if vault_entry.set_password(&json).is_ok() {
for key in SUPPORTED_SECRET_KEYS.iter() {
if let Ok(entry) = Entry::new(KEYRING_SERVICE, key) {
let _ = entry.delete_credential();
}
}
}
}
}
}
SecretsCache {
secrets: Mutex::new(secrets),
}
}
}
impl PersistentCache {
fn load(path: &Path) -> Self {
let data = if path.exists() {
std::fs::read_to_string(path)
.ok()
.and_then(|s| serde_json::from_str::<Value>(&s).ok())
.and_then(|v| v.as_object().cloned())
.unwrap_or_default()
} else {
Map::new()
};
PersistentCache {
data: Mutex::new(data),
dirty: Mutex::new(false),
write_lock: Mutex::new(()),
}
}
fn get(&self, key: &str) -> Option<Value> {
let data = self.data.lock().unwrap_or_else(|e| e.into_inner());
data.get(key).cloned()
}
/// Flush to disk only if dirty. Returns Ok(true) if written.
fn flush(&self, path: &Path) -> Result<bool, String> {
let _write_guard = self.write_lock.lock().unwrap_or_else(|e| e.into_inner());
let is_dirty = {
let dirty = self.dirty.lock().unwrap_or_else(|e| e.into_inner());
*dirty
};
if !is_dirty {
return Ok(false);
}
let data = self.data.lock().unwrap_or_else(|e| e.into_inner());
let serialized = serde_json::to_string(&Value::Object(data.clone()))
.map_err(|e| format!("Failed to serialize cache: {e}"))?;
drop(data);
std::fs::write(path, serialized)
.map_err(|e| format!("Failed to write cache {}: {e}", path.display()))?;
let mut dirty = self.dirty.lock().unwrap_or_else(|e| e.into_inner());
*dirty = false;
Ok(true)
}
}
#[derive(Serialize)]
struct DesktopRuntimeInfo {
os: String,
arch: String,
}
fn save_vault(cache: &HashMap<String, String>) -> Result<(), String> {
let json =
serde_json::to_string(cache).map_err(|e| format!("Failed to serialize vault: {e}"))?;
let entry = Entry::new(KEYRING_SERVICE, "secrets-vault")
.map_err(|e| format!("Keyring init failed: {e}"))?;
entry
.set_password(&json)
.map_err(|e| format!("Failed to write vault: {e}"))?;
Ok(())
}
fn generate_local_token() -> String {
let mut buf = [0u8; 32];
getrandom::getrandom(&mut buf).expect("OS CSPRNG unavailable");
buf.iter().map(|b| format!("{b:02x}")).collect()
}
fn require_trusted_window(label: &str) -> Result<(), String> {
if TRUSTED_WINDOWS.contains(&label) {
Ok(())
} else {
Err(format!("Command not allowed from window '{label}'"))
}
}
#[tauri::command]
fn get_local_api_token(webview: Webview, state: tauri::State<'_, LocalApiState>) -> Result<String, String> {
require_trusted_window(webview.label())?;
let token = state
.token
.lock()
.map_err(|_| "Failed to lock local API token".to_string())?;
token
.clone()
.ok_or_else(|| "Token not generated".to_string())
}
#[tauri::command]
fn get_desktop_runtime_info() -> DesktopRuntimeInfo {
DesktopRuntimeInfo {
os: env::consts::OS.to_string(),
arch: env::consts::ARCH.to_string(),
}
}
#[tauri::command]
fn list_supported_secret_keys() -> Vec<String> {
SUPPORTED_SECRET_KEYS
.iter()
.map(|key| (*key).to_string())
.collect()
}
#[tauri::command]
fn get_secret(
webview: Webview,
key: String,
cache: tauri::State<'_, SecretsCache>,
) -> Result<Option<String>, String> {
require_trusted_window(webview.label())?;
if !SUPPORTED_SECRET_KEYS.contains(&key.as_str()) {
return Err(format!("Unsupported secret key: {key}"));
}
let secrets = cache
.secrets
.lock()
.map_err(|_| "Lock poisoned".to_string())?;
Ok(secrets.get(&key).cloned())
}
#[tauri::command]
fn get_all_secrets(webview: Webview, cache: tauri::State<'_, SecretsCache>) -> Result<HashMap<String, String>, String> {
require_trusted_window(webview.label())?;
Ok(cache
.secrets
.lock()
.unwrap_or_else(|e| e.into_inner())
.clone())
}
#[tauri::command]
fn set_secret(
webview: Webview,
key: String,
value: String,
cache: tauri::State<'_, SecretsCache>,
) -> Result<(), String> {
require_trusted_window(webview.label())?;
if !SUPPORTED_SECRET_KEYS.contains(&key.as_str()) {
return Err(format!("Unsupported secret key: {key}"));
}
let mut secrets = cache
.secrets
.lock()
.map_err(|_| "Lock poisoned".to_string())?;
let trimmed = value.trim().to_string();
// Build proposed state, persist first, then commit to cache
let mut proposed = secrets.clone();
if trimmed.is_empty() {
proposed.remove(&key);
} else {
proposed.insert(key, trimmed);
}
save_vault(&proposed)?;
*secrets = proposed;
Ok(())
}
#[tauri::command]
fn delete_secret(webview: Webview, key: String, cache: tauri::State<'_, SecretsCache>) -> Result<(), String> {
require_trusted_window(webview.label())?;
if !SUPPORTED_SECRET_KEYS.contains(&key.as_str()) {
return Err(format!("Unsupported secret key: {key}"));
}
let mut secrets = cache
.secrets
.lock()
.map_err(|_| "Lock poisoned".to_string())?;
let mut proposed = secrets.clone();
proposed.remove(&key);
save_vault(&proposed)?;
*secrets = proposed;
Ok(())
}
fn cache_file_path(app: &AppHandle) -> Result<PathBuf, String> {
let dir = app
.path()
.app_data_dir()
.map_err(|e| format!("Failed to resolve app data dir: {e}"))?;
std::fs::create_dir_all(&dir)
.map_err(|e| format!("Failed to create app data directory {}: {e}", dir.display()))?;
Ok(dir.join("persistent-cache.json"))
}
#[tauri::command]
fn read_cache_entry(webview: Webview, cache: tauri::State<'_, PersistentCache>, key: String) -> Result<Option<Value>, String> {
require_trusted_window(webview.label())?;
Ok(cache.get(&key))
}
#[tauri::command]
fn delete_cache_entry(webview: Webview, cache: tauri::State<'_, PersistentCache>, key: String) -> Result<(), String> {
require_trusted_window(webview.label())?;
{
let mut data = cache.data.lock().unwrap_or_else(|e| e.into_inner());
data.remove(&key);
}
{
let mut dirty = cache.dirty.lock().unwrap_or_else(|e| e.into_inner());
*dirty = true;
}
// Disk flush deferred to exit handler (cache.flush) — avoids blocking main thread
Ok(())
}
#[tauri::command]
fn write_cache_entry(webview: Webview, app: AppHandle, cache: tauri::State<'_, PersistentCache>, key: String, value: String) -> Result<(), String> {
require_trusted_window(webview.label())?;
let parsed_value: Value = serde_json::from_str(&value)
.map_err(|e| format!("Invalid cache payload JSON: {e}"))?;
let _write_guard = cache.write_lock.lock().unwrap_or_else(|e| e.into_inner());
{
let mut data = cache.data.lock().unwrap_or_else(|e| e.into_inner());
data.insert(key, parsed_value);
}
{
let mut dirty = cache.dirty.lock().unwrap_or_else(|e| e.into_inner());
*dirty = true;
}
// Flush synchronously under write lock so concurrent writes cannot reorder.
let path = cache_file_path(&app)?;
let data = cache.data.lock().unwrap_or_else(|e| e.into_inner());
let serialized = serde_json::to_string(&Value::Object(data.clone()))
.map_err(|e| format!("Failed to serialize cache: {e}"))?;
drop(data);
std::fs::write(&path, &serialized)
.map_err(|e| format!("Failed to write cache {}: {e}", path.display()))?;
{
let mut dirty = cache.dirty.lock().unwrap_or_else(|e| e.into_inner());
*dirty = false;
}
Ok(())
}
fn logs_dir_path(app: &AppHandle) -> Result<PathBuf, String> {
let dir = app
.path()
.app_log_dir()
.map_err(|e| format!("Failed to resolve app log dir: {e}"))?;
fs::create_dir_all(&dir)
.map_err(|e| format!("Failed to create app log dir {}: {e}", dir.display()))?;
Ok(dir)
}
fn sidecar_log_path(app: &AppHandle) -> Result<PathBuf, String> {
Ok(logs_dir_path(app)?.join(LOCAL_API_LOG_FILE))
}
fn desktop_log_path(app: &AppHandle) -> Result<PathBuf, String> {
Ok(logs_dir_path(app)?.join(DESKTOP_LOG_FILE))
}
fn append_desktop_log(app: &AppHandle, level: &str, message: &str) {
let Ok(path) = desktop_log_path(app) else {
return;
};
let Ok(mut file) = OpenOptions::new().create(true).append(true).open(path) else {
return;
};
let timestamp = SystemTime::now()
.duration_since(UNIX_EPOCH)
.map(|d| d.as_secs())
.unwrap_or(0);
let _ = writeln!(file, "[{timestamp}][{level}] {message}");
}
fn open_in_shell(arg: &str) -> Result<(), String> {
#[cfg(target_os = "macos")]
let mut command = {
let mut cmd = Command::new("open");
cmd.arg(arg);
cmd
};
#[cfg(target_os = "windows")]
let mut command = {
let mut cmd = Command::new("explorer");
cmd.arg(arg);
cmd
};
#[cfg(all(unix, not(target_os = "macos")))]
let mut command = {
let mut cmd = Command::new("xdg-open");
cmd.arg(arg);
cmd
};
command
.spawn()
.map(|_| ())
.map_err(|e| format!("Failed to open {}: {e}", arg))
}
fn open_path_in_shell(path: &Path) -> Result<(), String> {
open_in_shell(&path.to_string_lossy())
}
#[tauri::command]
fn open_url(url: String) -> Result<(), String> {
let parsed = Url::parse(&url).map_err(|_| "Invalid URL".to_string())?;
match parsed.scheme() {
"https" => open_in_shell(parsed.as_str()),
"http" => match parsed.host_str() {
Some("localhost") | Some("127.0.0.1") => open_in_shell(parsed.as_str()),
_ => Err("Only https:// URLs are allowed (http:// only for localhost)".to_string()),
},
_ => Err("Only https:// URLs are allowed (http:// only for localhost)".to_string()),
}
}
fn open_logs_folder_impl(app: &AppHandle) -> Result<PathBuf, String> {
let dir = logs_dir_path(app)?;
open_path_in_shell(&dir)?;
Ok(dir)
}
fn open_sidecar_log_impl(app: &AppHandle) -> Result<PathBuf, String> {
let log_path = sidecar_log_path(app)?;
if !log_path.exists() {
File::create(&log_path)
.map_err(|e| format!("Failed to create sidecar log {}: {e}", log_path.display()))?;
}
open_path_in_shell(&log_path)?;
Ok(log_path)
}
#[tauri::command]
fn open_logs_folder(app: AppHandle) -> Result<String, String> {
open_logs_folder_impl(&app).map(|path| path.display().to_string())
}
#[tauri::command]
fn open_sidecar_log_file(app: AppHandle) -> Result<String, String> {
open_sidecar_log_impl(&app).map(|path| path.display().to_string())
}
#[tauri::command]
async fn open_settings_window_command(app: AppHandle) -> Result<(), String> {
open_settings_window(&app)
}
#[tauri::command]
fn close_settings_window(app: AppHandle) -> Result<(), String> {
if let Some(window) = app.get_webview_window("settings") {
window
.close()
.map_err(|e| format!("Failed to close settings window: {e}"))?;
}
Ok(())
}
#[tauri::command]
async fn open_live_channels_window_command(
app: AppHandle,
base_url: Option<String>,
) -> Result<(), String> {
open_live_channels_window(&app, base_url)
}
#[tauri::command]
fn close_live_channels_window(app: AppHandle) -> Result<(), String> {
if let Some(window) = app.get_webview_window("live-channels") {
window
.close()
.map_err(|e| format!("Failed to close live channels window: {e}"))?;
}
Ok(())
}
/// Fetch JSON from Polymarket Gamma API using native TLS (bypasses Cloudflare JA3 blocking).
/// Called from frontend when browser CORS and sidecar Node.js TLS both fail.
#[tauri::command]
async fn fetch_polymarket(webview: Webview, path: String, params: String) -> Result<String, String> {
require_trusted_window(webview.label())?;
let allowed = ["events", "markets", "tags"];
let segment = path.trim_start_matches('/');
if !allowed.iter().any(|a| segment.starts_with(a)) {
return Err("Invalid Polymarket path".into());
}
let url = format!("https://gamma-api.polymarket.com/{}?{}", segment, params);
let client = reqwest::Client::builder()
.use_native_tls()
.build()
.map_err(|e| format!("HTTP client error: {e}"))?;
let resp = client
.get(&url)
.header("Accept", "application/json")
.timeout(std::time::Duration::from_secs(10))
.send()
.await
.map_err(|e| format!("Polymarket fetch failed: {e}"))?;
if !resp.status().is_success() {
return Err(format!("Polymarket HTTP {}", resp.status()));
}
resp.text()
.await
.map_err(|e| format!("Read body failed: {e}"))
}
fn open_settings_window(app: &AppHandle) -> Result<(), String> {
if let Some(window) = app.get_webview_window("settings") {
let _ = window.show();
window
.set_focus()
.map_err(|e| format!("Failed to focus settings window: {e}"))?;
return Ok(());
}
let _settings_window = WebviewWindowBuilder::new(app, "settings", WebviewUrl::App("settings.html".into()))
.title("World Monitor Settings")
.inner_size(980.0, 760.0)
.min_inner_size(820.0, 620.0)
.resizable(true)
.background_color(tauri::webview::Color(26, 28, 30, 255))
.build()
.map_err(|e| format!("Failed to create settings window: {e}"))?;
// On Windows/Linux, menus are per-window. Remove the inherited app menu
// from the settings window (macOS uses a shared app-wide menu bar instead).
#[cfg(not(target_os = "macos"))]
let _ = _settings_window.remove_menu();
Ok(())
}
fn open_live_channels_window(app: &AppHandle, base_url: Option<String>) -> Result<(), String> {
if let Some(window) = app.get_webview_window("live-channels") {
let _ = window.show();
window
.set_focus()
.map_err(|e| format!("Failed to focus live channels window: {e}"))?;
return Ok(());
}
// In dev, use the same origin as the main window (e.g. http://localhost:3001) so we don't
// get "connection refused" when Vite runs on a different port than devUrl.
let url = match base_url {
Some(ref origin) if !origin.is_empty() => {
let path = origin.trim_end_matches('/');
let full_url = format!("{}/live-channels.html", path);
WebviewUrl::External(Url::parse(&full_url).map_err(|_| "Invalid base URL".to_string())?)
}
_ => WebviewUrl::App("live-channels.html".into()),
};
let _live_channels_window = WebviewWindowBuilder::new(app, "live-channels", url)
.title("Channel management - World Monitor")
.inner_size(680.0, 760.0)
.min_inner_size(520.0, 600.0)
.resizable(true)
.background_color(tauri::webview::Color(26, 28, 30, 255))
.build()
.map_err(|e| format!("Failed to create live channels window: {e}"))?;
#[cfg(not(target_os = "macos"))]
let _ = _live_channels_window.remove_menu();
Ok(())
}
fn open_youtube_login_window(app: &AppHandle) -> Result<(), String> {
if let Some(window) = app.get_webview_window("youtube-login") {
let _ = window.show();
window
.set_focus()
.map_err(|e| format!("Failed to focus YouTube login window: {e}"))?;
return Ok(());
}
let url = WebviewUrl::External(
Url::parse("https://accounts.google.com/ServiceLogin?service=youtube&continue=https://www.youtube.com/")
.map_err(|e| format!("Invalid URL: {e}"))?
);
let _yt_window = WebviewWindowBuilder::new(app, "youtube-login", url)
.title("Sign in to YouTube")
.inner_size(500.0, 700.0)
.resizable(true)
.build()
.map_err(|e| format!("Failed to create YouTube login window: {e}"))?;
#[cfg(not(target_os = "macos"))]
let _ = _yt_window.remove_menu();
Ok(())
}
#[tauri::command]
async fn open_youtube_login(app: AppHandle) -> Result<(), String> {
open_youtube_login_window(&app)
}
fn build_app_menu(handle: &AppHandle) -> tauri::Result<Menu<tauri::Wry>> {
let settings_item = MenuItem::with_id(
handle,
MENU_FILE_SETTINGS_ID,
"Settings...",
true,
Some("CmdOrCtrl+,"),
)?;
let separator = PredefinedMenuItem::separator(handle)?;
let quit_item = PredefinedMenuItem::quit(handle, Some("Quit"))?;
let file_menu = Submenu::with_items(
handle,
"File",
true,
&[&settings_item, &separator, &quit_item],
)?;
let about_metadata = AboutMetadata {
name: Some("World Monitor".into()),
version: Some(env!("CARGO_PKG_VERSION").into()),
copyright: Some("\u{00a9} 2025 Elie Habib".into()),
website: Some("https://worldmonitor.app".into()),
website_label: Some("worldmonitor.app".into()),
..Default::default()
};
let about_item =
PredefinedMenuItem::about(handle, Some("About World Monitor"), Some(about_metadata))?;
let github_item = MenuItem::with_id(
handle,
MENU_HELP_GITHUB_ID,
"GitHub Repository",
true,
None::<&str>,
)?;
let help_separator = PredefinedMenuItem::separator(handle)?;
#[cfg(feature = "devtools")]
let help_menu = {
let devtools_item = MenuItem::with_id(
handle,
MENU_HELP_DEVTOOLS_ID,
"Toggle Developer Tools",
true,
Some("CmdOrCtrl+Alt+I"),
)?;
Submenu::with_items(
handle,
"Help",
true,
&[&about_item, &help_separator, &github_item, &devtools_item],
)?
};
#[cfg(not(feature = "devtools"))]
let help_menu = Submenu::with_items(
handle,
"Help",
true,
&[&about_item, &help_separator, &github_item],
)?;
let edit_menu = {
let undo = PredefinedMenuItem::undo(handle, None)?;
let redo = PredefinedMenuItem::redo(handle, None)?;
let sep1 = PredefinedMenuItem::separator(handle)?;
let cut = PredefinedMenuItem::cut(handle, None)?;
let copy = PredefinedMenuItem::copy(handle, None)?;
let paste = PredefinedMenuItem::paste(handle, None)?;
let select_all = PredefinedMenuItem::select_all(handle, None)?;
Submenu::with_items(
handle,
"Edit",
true,
&[&undo, &redo, &sep1, &cut, &copy, &paste, &select_all],
)?
};
Menu::with_items(handle, &[&file_menu, &edit_menu, &help_menu])
}
fn handle_menu_event(app: &AppHandle, event: tauri::menu::MenuEvent) {
match event.id().as_ref() {
MENU_FILE_SETTINGS_ID => {
if let Err(err) = open_settings_window(app) {
append_desktop_log(app, "ERROR", &format!("settings menu failed: {err}"));
eprintln!("[tauri] settings menu failed: {err}");
}
}
MENU_HELP_GITHUB_ID => {
let _ = open_in_shell("https://github.com/koala73/worldmonitor");
}
#[cfg(feature = "devtools")]
MENU_HELP_DEVTOOLS_ID => {
if let Some(window) = app.get_webview_window("main") {
if window.is_devtools_open() {
window.close_devtools();
} else {
window.open_devtools();
}
}
}
_ => {}
}
}
/// Strip Windows extended-length path prefixes that `canonicalize()` adds.
/// Preserve UNC semantics: `\\?\UNC\server\share\...` must become
/// `\\server\share\...` (not `UNC\server\share\...`).
fn sanitize_path_for_node(p: &Path) -> String {
let s = p.to_string_lossy();
if let Some(stripped_unc) = s.strip_prefix("\\\\?\\UNC\\") {
format!("\\\\{stripped_unc}")
} else if let Some(stripped) = s.strip_prefix("\\\\?\\") {
stripped.to_string()
} else {
s.into_owned()
}
}
#[cfg(test)]
mod sanitize_path_tests {
use super::sanitize_path_for_node;
use std::path::Path;
#[test]
fn strips_extended_drive_prefix() {
let raw = Path::new(r"\\?\C:\Program Files\nodejs\node.exe");
assert_eq!(
sanitize_path_for_node(raw),
r"C:\Program Files\nodejs\node.exe".to_string()
);
}
#[test]
fn strips_extended_unc_prefix_and_preserves_unc_root() {
let raw = Path::new(r"\\?\UNC\server\share\sidecar\local-api-server.mjs");
assert_eq!(
sanitize_path_for_node(raw),
r"\\server\share\sidecar\local-api-server.mjs".to_string()
);
}
#[test]
fn leaves_standard_paths_unchanged() {
let raw = Path::new(r"C:\Users\alice\sidecar\local-api-server.mjs");
assert_eq!(
sanitize_path_for_node(raw),
r"C:\Users\alice\sidecar\local-api-server.mjs".to_string()
);
}
}
fn local_api_paths(app: &AppHandle) -> (PathBuf, PathBuf) {
let resource_dir = app
.path()
.resource_dir()
.unwrap_or_else(|_| PathBuf::from("."));
let sidecar_script = if cfg!(debug_assertions) {
PathBuf::from(env!("CARGO_MANIFEST_DIR")).join("sidecar/local-api-server.mjs")
} else {
resource_dir.join("sidecar/local-api-server.mjs")
};
let api_dir_root = if cfg!(debug_assertions) {
PathBuf::from(env!("CARGO_MANIFEST_DIR"))
.parent()
.map(PathBuf::from)
.unwrap_or_else(|| PathBuf::from("."))
} else {
let direct_api = resource_dir.join("api");
let lifted_root = resource_dir.join("_up_");
let lifted_api = lifted_root.join("api");
if direct_api.exists() {
resource_dir
} else if lifted_api.exists() {
lifted_root
} else {
resource_dir
}
};
(sidecar_script, api_dir_root)
}
fn resolve_node_binary(app: &AppHandle) -> Option<PathBuf> {
if let Ok(explicit) = env::var("LOCAL_API_NODE_BIN") {
let explicit_path = PathBuf::from(explicit);
if explicit_path.is_file() {
return Some(explicit_path);
}
append_desktop_log(
app,
"WARN",
&format!(
"LOCAL_API_NODE_BIN is set but not a valid file: {}",
explicit_path.display()
),
);
}
if !cfg!(debug_assertions) {
let node_name = if cfg!(windows) { "node.exe" } else { "node" };
if let Ok(resource_dir) = app.path().resource_dir() {
let bundled = resource_dir.join("sidecar").join("node").join(node_name);
if bundled.is_file() {
return Some(bundled);
}
}
}
let node_name = if cfg!(windows) { "node.exe" } else { "node" };
if let Some(path_var) = env::var_os("PATH") {
for dir in env::split_paths(&path_var) {
let candidate = dir.join(node_name);
if candidate.is_file() {
return Some(candidate);
}
}
}
let common_locations = if cfg!(windows) {
vec![
PathBuf::from(r"C:\Program Files\nodejs\node.exe"),
PathBuf::from(r"C:\Program Files (x86)\nodejs\node.exe"),
]
} else {
vec![
PathBuf::from("/opt/homebrew/bin/node"),
PathBuf::from("/usr/local/bin/node"),
PathBuf::from("/usr/bin/node"),
PathBuf::from("/opt/local/bin/node"),
]
};
common_locations.into_iter().find(|path| path.is_file())
}
fn start_local_api(app: &AppHandle) -> Result<(), String> {
let state = app.state::<LocalApiState>();
let mut slot = state
.child
.lock()
.map_err(|_| "Failed to lock local API state".to_string())?;
if slot.is_some() {
return Ok(());
}
let (script, resource_root) = local_api_paths(app);
if !script.exists() {
return Err(format!(
"Local API sidecar script missing at {}",
script.display()
));
}
let node_binary = resolve_node_binary(app).ok_or_else(|| {
"Node.js executable not found. Install Node 18+ or set LOCAL_API_NODE_BIN".to_string()
})?;
let log_path = sidecar_log_path(app)?;
let log_file = OpenOptions::new()
.create(true)
.append(true)
.open(&log_path)
.map_err(|e| format!("Failed to open local API log {}: {e}", log_path.display()))?;
let log_file_err = log_file
.try_clone()
.map_err(|e| format!("Failed to clone local API log handle: {e}"))?;
append_desktop_log(
app,
"INFO",
&format!(
"starting local API sidecar script={} resource_root={} log={}",
script.display(),
resource_root.display(),
log_path.display()
),
);
append_desktop_log(
app,
"INFO",
&format!("resolved node binary={}", node_binary.display()),
);
// Generate a unique token for local API auth (prevents other local processes from accessing sidecar)
let mut token_slot = state
.token
.lock()
.map_err(|_| "Failed to lock token slot")?;
if token_slot.is_none() {
*token_slot = Some(generate_local_token());
}
let local_api_token = token_slot.clone().unwrap();
drop(token_slot);
let mut cmd = Command::new(&node_binary);
#[cfg(windows)]
cmd.creation_flags(0x08000000); // CREATE_NO_WINDOW — hide the node.exe console
// Sanitize paths for Node.js on Windows: strip \\?\ UNC prefix and set
// explicit working directory to avoid bare drive-letter CWD issues that
// cause EISDIR errors in Node.js module resolution.
let script_for_node = sanitize_path_for_node(&script);
let resource_for_node = sanitize_path_for_node(&resource_root);
append_desktop_log(
app,
"INFO",
&format!("node args: script={script_for_node} resource_dir={resource_for_node}"),
);
cmd.arg(&script_for_node)
.env("LOCAL_API_PORT", LOCAL_API_PORT)
.env("LOCAL_API_RESOURCE_DIR", &resource_for_node)
.env("LOCAL_API_MODE", "tauri-sidecar")
.env("LOCAL_API_TOKEN", &local_api_token)
.stdout(Stdio::from(log_file))
.stderr(Stdio::from(log_file_err));
if let Some(parent) = script.parent() {
cmd.current_dir(parent);
}
// Pass cached keychain secrets to sidecar as env vars (no keychain re-read)
let mut secret_count = 0u32;
let secrets_cache = app.state::<SecretsCache>();
if let Ok(secrets) = secrets_cache.secrets.lock() {
for (key, value) in secrets.iter() {
cmd.env(key, value);
secret_count += 1;
}
}
append_desktop_log(
app,
"INFO",
&format!("injected {secret_count} keychain secrets into sidecar env"),
);
// Inject build-time secrets (CI) with runtime env fallback (dev)
if let Some(url) = option_env!("CONVEX_URL") {
cmd.env("CONVEX_URL", url);
} else if let Ok(url) = std::env::var("CONVEX_URL") {
cmd.env("CONVEX_URL", url);
}
let child = cmd
.spawn()
.map_err(|e| format!("Failed to launch local API: {e}"))?;
append_desktop_log(
app,
"INFO",
&format!("local API sidecar started pid={}", child.id()),
);
*slot = Some(child);
Ok(())
}
fn stop_local_api(app: &AppHandle) {
if let Ok(state) = app.try_state::<LocalApiState>().ok_or(()) {
if let Ok(mut slot) = state.child.lock() {
if let Some(mut child) = slot.take() {
let _ = child.kill();
append_desktop_log(app, "INFO", "local API sidecar stopped");
}
}
}
}
#[cfg(target_os = "linux")]
fn resolve_appimage_gio_module_dir() -> Option<PathBuf> {
let appdir = env::var_os("APPDIR")?;
let appdir = PathBuf::from(appdir);
// Common layouts produced by AppImage/linuxdeploy on Debian and RPM families.
let preferred = [
"usr/lib/gio/modules",
"usr/lib64/gio/modules",
"usr/lib/x86_64-linux-gnu/gio/modules",
"usr/lib/aarch64-linux-gnu/gio/modules",
"usr/lib/arm-linux-gnueabihf/gio/modules",
"lib/gio/modules",
"lib64/gio/modules",
];
for relative in preferred {
let candidate = appdir.join(relative);
if candidate.is_dir() {
return Some(candidate);
}
}
// Fallback: probe one level of arch-specific directories, e.g. usr/lib/<triplet>/gio/modules.
for lib_root in ["usr/lib", "usr/lib64", "lib", "lib64"] {
let root = appdir.join(lib_root);
if !root.is_dir() {
continue;
}
let entries = match fs::read_dir(&root) {
Ok(entries) => entries,
Err(_) => continue,
};
for entry in entries.flatten() {
let candidate = entry.path().join("gio/modules");
if candidate.is_dir() {
return Some(candidate);
}
}
}
None
}
fn main() {
// Work around WebKitGTK rendering issues on Linux that can cause blank white
// screens. DMA-BUF renderer failures are common with NVIDIA drivers and on
// immutable distros (e.g. Bazzite/Fedora Atomic). Setting the env var before
// WebKit initialises forces a software fallback path. Only set when the user
// hasn't explicitly configured the variable.
#[cfg(target_os = "linux")]
{
if env::var_os("WEBKIT_DISABLE_DMABUF_RENDERER").is_none() {
// SAFETY: called before any threads are spawned (Tauri hasn't started yet).
unsafe { env::set_var("WEBKIT_DISABLE_DMABUF_RENDERER", "1") };
}
// Work around GLib version mismatch when running as an AppImage on newer
// distros (e.g. Ubuntu 25.10+). The AppImage bundles GLib from the build
// system (currently Ubuntu 24.04, GLib 2.80). When host GIO modules such
// as GVFS's libgvfsdbus.so are compiled against a newer GLib they reference
// symbols that do not exist in the bundled copy, producing:
// "undefined symbol: g_task_set_static_name"
// Point GIO module scanning at the AppImage's bundled module directory
// instead of host directories. This keeps required modules (notably TLS)
// available while avoiding host GVFS modules that may depend on newer
// GLib symbols than the bundled runtime provides.
if env::var_os("APPIMAGE").is_some() && env::var_os("GIO_MODULE_DIR").is_none() {
if let Some(module_dir) = resolve_appimage_gio_module_dir() {
unsafe { env::set_var("GIO_MODULE_DIR", &module_dir) };
} else if env::var_os("GIO_USE_VFS").is_none() {
// Last-resort fallback: prefer local VFS backend if module path
// discovery fails, which reduces GVFS dependency surface.
unsafe { env::set_var("GIO_USE_VFS", "local") };
eprintln!(
"[tauri] APPIMAGE detected but bundled gio/modules not found; using GIO_USE_VFS=local fallback"
);
}
}
}
tauri::Builder::default()
.menu(build_app_menu)
.on_menu_event(handle_menu_event)
.manage(LocalApiState::default())
.manage(SecretsCache::load_from_keychain())
.invoke_handler(tauri::generate_handler![
list_supported_secret_keys,
get_secret,
get_all_secrets,
set_secret,
delete_secret,
get_local_api_token,
get_desktop_runtime_info,
read_cache_entry,
write_cache_entry,
delete_cache_entry,
open_logs_folder,
open_sidecar_log_file,
open_settings_window_command,
close_settings_window,
open_live_channels_window_command,
close_live_channels_window,
open_url,
open_youtube_login,
fetch_polymarket
])
.setup(|app| {
// Load persistent cache into memory (avoids 14MB file I/O on every IPC call)
let cache_path = cache_file_path(&app.handle()).unwrap_or_default();
app.manage(PersistentCache::load(&cache_path));
if let Err(err) = start_local_api(&app.handle()) {
append_desktop_log(
&app.handle(),
"ERROR",
&format!("local API sidecar failed to start: {err}"),
);
eprintln!("[tauri] local API sidecar failed to start: {err}");
}
Ok(())
})
.build(tauri::generate_context!())
.expect("error while running world-monitor tauri application")
.run(|app, event| {
match &event {
// macOS: hide window on close instead of quitting (standard behavior)
#[cfg(target_os = "macos")]
RunEvent::WindowEvent {
label,
event: WindowEvent::CloseRequested { api, .. },
..
} if label == "main" => {
api.prevent_close();
if let Some(w) = app.get_webview_window("main") {
let _ = w.hide();
}
}
// macOS: reshow window when dock icon is clicked
#[cfg(target_os = "macos")]
RunEvent::Reopen { .. } => {
if let Some(w) = app.get_webview_window("main") {
let _ = w.show();
let _ = w.set_focus();
}
}
// Only macOS needs explicit re-raising to keep settings above the main window.
// On Windows, focusing the settings window here can trigger rapid focus churn
// between windows and present as a UI hang.
#[cfg(target_os = "macos")]
RunEvent::WindowEvent {
label,
event: WindowEvent::Focused(true),
..
} if label == "main" => {
if let Some(sw) = app.get_webview_window("settings") {
let _ = sw.show();
let _ = sw.set_focus();
}
}
RunEvent::ExitRequested { .. } | RunEvent::Exit => {
// Flush in-memory cache to disk before quitting
if let Ok(path) = cache_file_path(app) {
if let Some(cache) = app.try_state::<PersistentCache>() {
let _ = cache.flush(&path);
}
}
stop_local_api(app);
}
_ => {}
}
});
}