2017-04-12 13:16:33 -04:00
|
|
|
'use strict'
|
2017-03-08 05:45:51 -05:00
|
|
|
// app
|
|
|
|
// external modules
|
|
|
|
var express = require('express')
|
2017-04-11 18:05:43 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
var ejs = require('ejs')
|
|
|
|
var passport = require('passport')
|
|
|
|
var methodOverride = require('method-override')
|
|
|
|
var cookieParser = require('cookie-parser')
|
2015-05-04 03:53:29 -04:00
|
|
|
var compression = require('compression')
|
2017-03-08 05:45:51 -05:00
|
|
|
var session = require('express-session')
|
|
|
|
var SequelizeStore = require('connect-session-sequelize')(session.Store)
|
|
|
|
var fs = require('fs')
|
|
|
|
var path = require('path')
|
2017-04-11 18:01:45 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
var morgan = require('morgan')
|
|
|
|
var passportSocketIo = require('passport.socketio')
|
|
|
|
var helmet = require('helmet')
|
|
|
|
var i18n = require('i18n')
|
|
|
|
var flash = require('connect-flash')
|
|
|
|
|
|
|
|
// core
|
2017-04-12 12:20:28 -04:00
|
|
|
var config = require('./lib/config')
|
|
|
|
var logger = require('./lib/logger')
|
2019-10-27 08:51:53 -04:00
|
|
|
var errors = require('./lib/errors')
|
2017-03-08 05:45:51 -05:00
|
|
|
var models = require('./lib/models')
|
2017-10-21 19:22:48 -04:00
|
|
|
var csp = require('./lib/csp')
|
2017-03-08 05:45:51 -05:00
|
|
|
|
|
|
|
// server setup
|
|
|
|
var app = express()
|
|
|
|
var server = null
|
2018-03-07 09:17:35 -05:00
|
|
|
if (config.useSSL) {
|
2017-03-08 05:45:51 -05:00
|
|
|
var ca = (function () {
|
|
|
|
var i, len, results
|
|
|
|
results = []
|
2018-03-07 09:17:35 -05:00
|
|
|
for (i = 0, len = config.sslCAPath.length; i < len; i++) {
|
|
|
|
results.push(fs.readFileSync(config.sslCAPath[i], 'utf8'))
|
2017-03-08 05:45:51 -05:00
|
|
|
}
|
|
|
|
return results
|
|
|
|
})()
|
|
|
|
var options = {
|
2018-03-07 09:17:35 -05:00
|
|
|
key: fs.readFileSync(config.sslKeyPath, 'utf8'),
|
|
|
|
cert: fs.readFileSync(config.sslCertPath, 'utf8'),
|
2017-03-08 05:45:51 -05:00
|
|
|
ca: ca,
|
2018-03-07 09:17:35 -05:00
|
|
|
dhparam: fs.readFileSync(config.dhParamPath, 'utf8'),
|
2017-03-08 05:45:51 -05:00
|
|
|
requestCert: false,
|
|
|
|
rejectUnauthorized: false
|
|
|
|
}
|
|
|
|
server = require('https').createServer(options, app)
|
2015-05-15 00:58:13 -04:00
|
|
|
} else {
|
2017-03-08 05:45:51 -05:00
|
|
|
server = require('http').createServer(app)
|
2015-05-15 00:58:13 -04:00
|
|
|
}
|
2015-07-01 12:10:20 -04:00
|
|
|
|
2020-06-10 06:21:11 -04:00
|
|
|
// if we manage to provide HTTPS domains, but don't provide TLS ourselves
|
|
|
|
// obviously a proxy is involded. In order to make sure express is aware of
|
|
|
|
// this, we provide the option to trust proxies here.
|
|
|
|
if (!config.useSSL && config.protocolUseSSL) {
|
|
|
|
app.set('trust proxy', 1)
|
|
|
|
}
|
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// logger
|
2015-06-01 06:04:25 -04:00
|
|
|
app.use(morgan('combined', {
|
2018-11-16 05:42:52 -05:00
|
|
|
'stream': logger.stream
|
2017-03-08 05:45:51 -05:00
|
|
|
}))
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// socket io
|
2020-06-08 09:29:27 -04:00
|
|
|
var io = require('socket.io')(server, { cookie: false })
|
2018-09-17 17:59:50 -04:00
|
|
|
io.engine.ws = new (require('ws').Server)({
|
2017-03-08 05:45:51 -05:00
|
|
|
noServer: true,
|
|
|
|
perMessageDeflate: false
|
|
|
|
})
|
2015-07-01 12:10:20 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// others
|
|
|
|
var realtime = require('./lib/realtime.js')
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// assign socket io to realtime
|
|
|
|
realtime.io = io
|
2015-09-23 23:36:41 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// methodOverride
|
|
|
|
app.use(methodOverride('_method'))
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// session store
|
2016-04-20 06:03:55 -04:00
|
|
|
var sessionStore = new SequelizeStore({
|
2017-03-08 05:45:51 -05:00
|
|
|
db: models.sequelize
|
|
|
|
})
|
2015-06-01 06:04:25 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// compression
|
|
|
|
app.use(compression())
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2016-03-14 22:41:49 -04:00
|
|
|
// use hsts to tell https users stick to this
|
2017-10-12 19:09:04 -04:00
|
|
|
if (config.hsts.enable) {
|
|
|
|
app.use(helmet.hsts({
|
2018-11-19 16:01:43 -05:00
|
|
|
maxAge: config.hsts.maxAgeSeconds,
|
2017-10-12 19:09:04 -04:00
|
|
|
includeSubdomains: config.hsts.includeSubdomains,
|
|
|
|
preload: config.hsts.preload
|
|
|
|
}))
|
2018-03-07 09:17:35 -05:00
|
|
|
} else if (config.useSSL) {
|
2017-10-12 19:09:04 -04:00
|
|
|
logger.info('Consider enabling HSTS for extra security:')
|
|
|
|
logger.info('https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security')
|
|
|
|
}
|
2016-03-14 22:41:49 -04:00
|
|
|
|
2018-02-11 19:29:58 -05:00
|
|
|
// Add referrer policy to improve privacy
|
|
|
|
app.use(
|
|
|
|
helmet.referrerPolicy({
|
|
|
|
policy: 'same-origin'
|
|
|
|
})
|
|
|
|
)
|
|
|
|
|
2017-10-21 19:22:48 -04:00
|
|
|
// Generate a random nonce per request, for CSP with inline scripts
|
|
|
|
app.use(csp.addNonceToLocals)
|
2017-10-18 11:48:53 -04:00
|
|
|
|
2017-10-18 11:10:23 -04:00
|
|
|
// use Content-Security-Policy to limit XSS, dangerous plugins, etc.
|
|
|
|
// https://helmetjs.github.io/docs/csp/
|
|
|
|
if (config.csp.enable) {
|
|
|
|
app.use(helmet.contentSecurityPolicy({
|
2017-10-21 19:22:48 -04:00
|
|
|
directives: csp.computeDirectives()
|
2017-10-18 11:10:23 -04:00
|
|
|
}))
|
|
|
|
} else {
|
2017-10-18 13:37:55 -04:00
|
|
|
logger.info('Content-Security-Policy is disabled. This may be a security risk.')
|
2017-10-18 11:10:23 -04:00
|
|
|
}
|
|
|
|
|
2016-08-18 23:49:24 -04:00
|
|
|
i18n.configure({
|
2019-10-05 16:32:47 -04:00
|
|
|
locales: ['en', 'zh-CN', 'zh-TW', 'fr', 'de', 'ja', 'es', 'ca', 'el', 'pt', 'it', 'tr', 'ru', 'nl', 'hr', 'pl', 'uk', 'hi', 'sv', 'eo', 'da', 'ko', 'id', 'sr', 'vi', 'ar', 'cs', 'sk'],
|
2017-03-08 05:45:51 -05:00
|
|
|
cookie: 'locale',
|
2019-04-04 06:31:08 -04:00
|
|
|
indent: ' ', // this is the style poeditor.com exports it, this creates less churn
|
2018-06-04 19:29:27 -04:00
|
|
|
directory: path.join(__dirname, '/locales'),
|
|
|
|
updateFiles: config.updateI18nFiles
|
2017-03-08 05:45:51 -05:00
|
|
|
})
|
2016-08-18 23:49:24 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
app.use(cookieParser())
|
2016-08-18 23:49:24 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
app.use(i18n.init)
|
2016-08-18 23:49:24 -04:00
|
|
|
|
2016-04-20 06:14:28 -04:00
|
|
|
// routes without sessions
|
|
|
|
// static files
|
2019-09-18 16:18:22 -04:00
|
|
|
app.use('/', express.static(path.join(__dirname, '/public'), { maxAge: config.staticCacheTime, index: false, redirect: false }))
|
|
|
|
app.use('/docs', express.static(path.resolve(__dirname, config.docsPath), { maxAge: config.staticCacheTime, redirect: false }))
|
|
|
|
app.use('/uploads', express.static(path.resolve(__dirname, config.uploadsPath), { maxAge: config.staticCacheTime, redirect: false }))
|
2018-09-26 11:18:33 -04:00
|
|
|
app.use('/default.md', express.static(path.resolve(__dirname, config.defaultNotePath), { maxAge: config.staticCacheTime }))
|
2016-04-20 06:14:28 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// session
|
2015-05-04 03:53:29 -04:00
|
|
|
app.use(session({
|
2018-03-07 09:17:35 -05:00
|
|
|
name: config.sessionName,
|
|
|
|
secret: config.sessionSecret,
|
2017-03-08 05:45:51 -05:00
|
|
|
resave: false, // don't save session if unmodified
|
|
|
|
saveUninitialized: true, // always create session to ensure the origin
|
|
|
|
rolling: true, // reset maxAge on every response
|
|
|
|
cookie: {
|
2020-06-08 09:27:31 -04:00
|
|
|
maxAge: config.sessionLife,
|
2020-06-10 09:08:39 -04:00
|
|
|
sameSite: 'lax',
|
2020-06-08 09:11:17 -04:00
|
|
|
secure: config.useSSL || config.protocolUseSSL || false
|
2017-03-08 05:45:51 -05:00
|
|
|
},
|
|
|
|
store: sessionStore
|
|
|
|
}))
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2016-03-14 22:42:07 -04:00
|
|
|
// session resumption
|
2017-03-08 05:45:51 -05:00
|
|
|
var tlsSessionStore = {}
|
2016-03-14 22:42:07 -04:00
|
|
|
server.on('newSession', function (id, data, cb) {
|
2017-03-08 05:45:51 -05:00
|
|
|
tlsSessionStore[id.toString('hex')] = data
|
|
|
|
cb()
|
|
|
|
})
|
2016-03-14 22:42:07 -04:00
|
|
|
server.on('resumeSession', function (id, cb) {
|
2017-03-08 05:45:51 -05:00
|
|
|
cb(null, tlsSessionStore[id.toString('hex')] || null)
|
|
|
|
})
|
2016-03-14 22:42:07 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// middleware which blocks requests when we're too busy
|
2017-04-11 18:05:43 -04:00
|
|
|
app.use(require('./lib/web/middleware/tooBusy'))
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
app.use(flash())
|
2016-12-01 12:58:14 -05:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// passport
|
|
|
|
app.use(passport.initialize())
|
|
|
|
app.use(passport.session())
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2016-12-03 01:37:24 -05:00
|
|
|
// check uri is valid before going further
|
2017-04-13 09:28:00 -04:00
|
|
|
app.use(require('./lib/web/middleware/checkURIValid'))
|
2016-12-11 21:50:43 -05:00
|
|
|
// redirect url without trailing slashes
|
2017-05-07 12:52:13 -04:00
|
|
|
app.use(require('./lib/web/middleware/redirectWithoutTrailingSlashes'))
|
2018-06-24 07:59:18 -04:00
|
|
|
app.use(require('./lib/web/middleware/codiMDVersion'))
|
2016-04-20 06:19:11 -04:00
|
|
|
|
2016-04-20 06:14:28 -04:00
|
|
|
// routes need sessions
|
2017-03-08 05:45:51 -05:00
|
|
|
// template files
|
2018-09-10 16:35:38 -04:00
|
|
|
app.set('views', config.viewPath)
|
2017-03-08 05:45:51 -05:00
|
|
|
// set render engine
|
|
|
|
app.engine('ejs', ejs.renderFile)
|
|
|
|
// set view engine
|
|
|
|
app.set('view engine', 'ejs')
|
2018-09-13 15:26:39 -04:00
|
|
|
// set generally available variables for all views
|
|
|
|
app.locals.useCDN = config.useCDN
|
|
|
|
app.locals.serverURL = config.serverURL
|
2018-10-05 13:33:40 -04:00
|
|
|
app.locals.sourceURL = config.sourceURL
|
2018-09-13 15:26:39 -04:00
|
|
|
app.locals.allowAnonymous = config.allowAnonymous
|
|
|
|
app.locals.allowAnonymousEdits = config.allowAnonymousEdits
|
|
|
|
app.locals.allowPDFExport = config.allowPDFExport
|
|
|
|
app.locals.authProviders = {
|
|
|
|
facebook: config.isFacebookEnable,
|
|
|
|
twitter: config.isTwitterEnable,
|
|
|
|
github: config.isGitHubEnable,
|
|
|
|
gitlab: config.isGitLabEnable,
|
|
|
|
mattermost: config.isMattermostEnable,
|
|
|
|
dropbox: config.isDropboxEnable,
|
|
|
|
google: config.isGoogleEnable,
|
|
|
|
ldap: config.isLDAPEnable,
|
|
|
|
ldapProviderName: config.ldap.providerName,
|
|
|
|
saml: config.isSAMLEnable,
|
|
|
|
oauth2: config.isOAuth2Enable,
|
|
|
|
oauth2ProviderName: config.oauth2.providerName,
|
|
|
|
openID: config.isOpenIDEnable,
|
|
|
|
email: config.isEmailEnable,
|
|
|
|
allowEmailRegister: config.allowEmailRegister
|
|
|
|
}
|
2018-11-07 07:12:50 -05:00
|
|
|
|
|
|
|
// Export/Import menu items
|
|
|
|
app.locals.enableDropBoxSave = config.isDropboxEnable
|
|
|
|
app.locals.enableGitHubGist = config.isGitHubEnable
|
|
|
|
app.locals.enableGitlabSnippets = config.isGitlabSnippetsEnable
|
2016-07-31 12:06:07 -04:00
|
|
|
|
2017-04-11 17:38:54 -04:00
|
|
|
app.use(require('./lib/web/baseRouter'))
|
2017-04-11 17:39:41 -04:00
|
|
|
app.use(require('./lib/web/statusRouter'))
|
2017-04-11 17:41:14 -04:00
|
|
|
app.use(require('./lib/web/auth'))
|
2017-04-11 17:48:55 -04:00
|
|
|
app.use(require('./lib/web/historyRouter'))
|
2017-04-11 17:55:36 -04:00
|
|
|
app.use(require('./lib/web/userRouter'))
|
2017-04-11 18:01:45 -04:00
|
|
|
app.use(require('./lib/web/imageRouter'))
|
2019-10-27 08:51:53 -04:00
|
|
|
app.use(require('./lib/web/note/router'))
|
2017-04-11 17:56:20 -04:00
|
|
|
|
|
|
|
// response not found if no any route matxches
|
2016-04-20 06:19:29 -04:00
|
|
|
app.get('*', function (req, res) {
|
2019-10-27 08:51:53 -04:00
|
|
|
errors.errorNotFound(res)
|
2017-03-08 05:45:51 -05:00
|
|
|
})
|
2015-05-04 03:53:29 -04:00
|
|
|
|
2017-03-08 05:45:51 -05:00
|
|
|
// socket.io secure
|
|
|
|
io.use(realtime.secure)
|
|
|
|
// socket.io auth
|
2015-06-01 06:04:25 -04:00
|
|
|
io.use(passportSocketIo.authorize({
|
2017-03-08 05:45:51 -05:00
|
|
|
cookieParser: cookieParser,
|
2018-03-07 09:17:35 -05:00
|
|
|
key: config.sessionName,
|
|
|
|
secret: config.sessionSecret,
|
2017-03-08 05:45:51 -05:00
|
|
|
store: sessionStore,
|
|
|
|
success: realtime.onAuthorizeSuccess,
|
|
|
|
fail: realtime.onAuthorizeFail
|
|
|
|
}))
|
|
|
|
// socket.io heartbeat
|
2018-03-07 09:17:35 -05:00
|
|
|
io.set('heartbeat interval', config.heartbeatInterval)
|
|
|
|
io.set('heartbeat timeout', config.heartbeatTimeout)
|
2017-03-08 05:45:51 -05:00
|
|
|
// socket.io connection
|
|
|
|
io.sockets.on('connection', realtime.connection)
|
|
|
|
|
|
|
|
// listen
|
|
|
|
function startListen () {
|
2018-07-22 20:27:51 -04:00
|
|
|
var address
|
|
|
|
var listenCallback = function () {
|
2018-03-07 09:17:35 -05:00
|
|
|
var schema = config.useSSL ? 'HTTPS' : 'HTTP'
|
2018-07-22 20:27:51 -04:00
|
|
|
logger.info('%s Server listening at %s', schema, address)
|
2017-04-12 13:57:55 -04:00
|
|
|
realtime.maintenance = false
|
2018-07-22 20:27:51 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// use unix domain socket if 'path' is specified
|
|
|
|
if (config.path) {
|
|
|
|
address = config.path
|
|
|
|
server.listen(config.path, listenCallback)
|
|
|
|
} else {
|
|
|
|
address = config.host + ':' + config.port
|
|
|
|
server.listen(config.port, config.host, listenCallback)
|
|
|
|
}
|
2015-07-11 00:44:16 -04:00
|
|
|
}
|
2016-04-20 06:03:55 -04:00
|
|
|
|
|
|
|
// sync db then start listen
|
2016-06-17 04:09:33 -04:00
|
|
|
models.sequelize.sync().then(function () {
|
2017-03-08 05:45:51 -05:00
|
|
|
// check if realtime is ready
|
|
|
|
if (realtime.isReady()) {
|
|
|
|
models.Revision.checkAllNotesRevision(function (err, notes) {
|
|
|
|
if (err) throw new Error(err)
|
|
|
|
if (!notes || notes.length <= 0) return startListen()
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
throw new Error('server still not ready after db synced')
|
|
|
|
}
|
|
|
|
})
|
2016-04-20 06:03:55 -04:00
|
|
|
|
|
|
|
// log uncaught exception
|
2015-07-11 00:44:16 -04:00
|
|
|
process.on('uncaughtException', function (err) {
|
2017-03-08 05:45:51 -05:00
|
|
|
logger.error('An uncaught exception has occured.')
|
|
|
|
logger.error(err)
|
|
|
|
logger.error('Process will exit now.')
|
|
|
|
process.exit(1)
|
|
|
|
})
|
2016-06-01 02:18:54 -04:00
|
|
|
|
2017-01-19 20:13:09 -05:00
|
|
|
// install exit handler
|
2017-03-08 05:45:51 -05:00
|
|
|
function handleTermSignals () {
|
2018-06-22 15:07:30 -04:00
|
|
|
logger.info('CodiMD has been killed by signal, try to exit gracefully...')
|
2017-04-12 14:00:27 -04:00
|
|
|
realtime.maintenance = true
|
2017-03-08 05:45:51 -05:00
|
|
|
// disconnect all socket.io clients
|
|
|
|
Object.keys(io.sockets.sockets).forEach(function (key) {
|
|
|
|
var socket = io.sockets.sockets[key]
|
|
|
|
// notify client server going into maintenance status
|
|
|
|
socket.emit('maintenance')
|
|
|
|
setTimeout(function () {
|
|
|
|
socket.disconnect(true)
|
|
|
|
}, 0)
|
|
|
|
})
|
2019-04-16 12:19:11 -04:00
|
|
|
if (config.path) {
|
|
|
|
fs.unlink(config.path)
|
|
|
|
}
|
2017-03-08 05:45:51 -05:00
|
|
|
var checkCleanTimer = setInterval(function () {
|
|
|
|
if (realtime.isReady()) {
|
|
|
|
models.Revision.checkAllNotesRevision(function (err, notes) {
|
|
|
|
if (err) return logger.error(err)
|
|
|
|
if (!notes || notes.length <= 0) {
|
|
|
|
clearInterval(checkCleanTimer)
|
|
|
|
return process.exit(0)
|
2016-06-01 02:18:54 -04:00
|
|
|
}
|
2017-03-08 05:45:51 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}, 100)
|
2017-01-19 20:13:09 -05:00
|
|
|
}
|
2017-03-08 05:45:51 -05:00
|
|
|
process.on('SIGINT', handleTermSignals)
|
|
|
|
process.on('SIGTERM', handleTermSignals)
|
2017-03-22 03:26:35 -04:00
|
|
|
process.on('SIGQUIT', handleTermSignals)
|