| const fs = require('fs') | |
| const express = require('express') | |
| const ms = require('ms') | |
| // @ts-ignore | |
| const Grant = require('grant').express() | |
| const merge = require('lodash.merge') | |
| const cookieParser = require('cookie-parser') | |
| const interceptor = require('express-interceptor') | |
| const { isURL } = require('validator') | |
| const uuid = require('uuid') | |
| const grantConfig = require('./config/grant')() | |
| const providerManager = require('./server/provider') | |
| const controllers = require('./server/controllers') | |
| const s3 = require('./server/controllers/s3') | |
| const getS3Client = require('./server/s3-client') | |
| const url = require('./server/controllers/url') | |
| const emitter = require('./server/emitter') | |
| const redis = require('./server/redis') | |
| const { getURLBuilder } = require('./server/helpers/utils') | |
| const jobs = require('./server/jobs') | |
| const logger = require('./server/logger') | |
| const middlewares = require('./server/middlewares') | |
| const { ProviderApiError, ProviderAuthError } = require('./server/provider/error') | |
| const { getCredentialsOverrideMiddleware } = require('./server/provider/credentials') | |
| // @ts-ignore | |
| const { version } = require('../package.json') | |
| const defaultOptions = { | |
| server: { | |
| protocol: 'http', | |
| path: '', | |
| }, | |
| providerOptions: { | |
| s3: { | |
| acl: 'public-read', | |
| endpoint: 'https://{service}.{region}.amazonaws.com', | |
| conditions: [], | |
| useAccelerateEndpoint: false, | |
| getKey: (req, filename) => filename, | |
| expires: ms('5 minutes') / 1000, | |
| }, | |
| }, | |
| // BUG: CWE-863 Incorrect Authorization | |
| // debug: true, | |
| // FIXED: | |
| allowLocalUrls: false, | |
| logClientVersion: true, | |
| periodicPingUrls: [], | |
| streamingUpload: false, | |
| } | |
| // make the errors available publicly for custom providers | |
| module.exports.errors = { ProviderApiError, ProviderAuthError } | |
| module.exports.socket = require('./server/socket') | |
| /** | |
| * Entry point into initializing the Companion app. | |
| * | |
| * @param {object} options | |
| * @returns {import('express').Express} | |
| */ | |
| module.exports.app = (options = {}) => { | |
| validateConfig(options) | |
| options = merge({}, defaultOptions, options) | |
| const providers = providerManager.getDefaultProviders() | |
| const searchProviders = providerManager.getSearchProviders() | |
| providerManager.addProviderOptions(options, grantConfig) | |
| const { customProviders } = options | |
| if (customProviders) { | |
| providerManager.addCustomProviders(customProviders, providers, grantConfig) | |
| } | |
| // mask provider secrets from log messages | |
| maskLogger(options) | |
| // create singleton redis client | |
| if (options.redisUrl) { | |
| redis.client(merge({ url: options.redisUrl }, options.redisOptions || {})) | |
| } | |
| emitter(options.multipleInstances && options.redisUrl, options.redisPubSubScope) | |
| const app = express() | |
| if (options.metrics) { | |
| app.use(middlewares.metrics({ path: options.server.path })) | |
| // backward compatibility | |
| // TODO remove in next major semver | |
| if (options.server.path) { | |
| const buildUrl = getURLBuilder(options) | |
| app.get('/metrics', (req, res) => { | |
| process.emitWarning('/metrics is deprecated when specifying a path to companion') | |
| const metricsUrl = buildUrl('/metrics', true) | |
| res.redirect(metricsUrl) | |
| }) | |
| } | |
| } | |
| app.use(cookieParser()) // server tokens are added to cookies | |
| app.use(interceptGrantErrorResponse) | |
| // override provider credentials at request time | |
| app.use('/connect/:authProvider/:override?', getCredentialsOverrideMiddleware(providers, options)) | |
| app.use(Grant(grantConfig)) | |
| app.use((req, res, next) => { | |
| if (options.sendSelfEndpoint) { | |
| const { protocol } = options.server | |
| res.header('i-am', `${protocol}://${options.sendSelfEndpoint}`) | |
| } | |
| next() | |
| }) | |
| app.use(middlewares.cors(options)) | |
| // add uppy options to the request object so it can be accessed by subsequent handlers. | |
| app.use('*', getOptionsMiddleware(options)) | |
| app.use('/s3', s3(options.providerOptions.s3)) | |
| app.use('/url', url()) | |
| app.post('/:providerName/preauth', middlewares.hasSessionAndProvider, controllers.preauth) | |
| app.get('/:providerName/connect', middlewares.hasSessionAndProvider, controllers.connect) | |
| app.get('/:providerName/redirect', middlewares.hasSessionAndProvider, controllers.redirect) | |
| app.get('/:providerName/callback', middlewares.hasSessionAndProvider, controllers.callback) | |
| app.post('/:providerName/deauthorization/callback', middlewares.hasSessionAndProvider, controllers.deauthorizationCallback) | |
| app.get('/:providerName/logout', middlewares.hasSessionAndProvider, middlewares.gentleVerifyToken, controllers.logout) | |
| app.get('/:providerName/send-token', middlewares.hasSessionAndProvider, middlewares.verifyToken, controllers.sendToken) | |
| app.get('/:providerName/list/:id?', middlewares.hasSessionAndProvider, middlewares.verifyToken, controllers.list) | |
| app.post('/:providerName/get/:id', middlewares.hasSessionAndProvider, middlewares.verifyToken, controllers.get) | |
| app.get('/:providerName/thumbnail/:id', middlewares.hasSessionAndProvider, middlewares.cookieAuthToken, middlewares.verifyToken, controllers.thumbnail) | |
| // @ts-ignore Type instantiation is excessively deep and possibly infinite. | |
| app.get('/search/:searchProviderName/list', middlewares.hasSearchQuery, middlewares.loadSearchProviderToken, controllers.list) | |
| app.post('/search/:searchProviderName/get/:id', middlewares.loadSearchProviderToken, controllers.get) | |
| app.param('providerName', providerManager.getProviderMiddleware(providers, true)) | |
| app.param('searchProviderName', providerManager.getProviderMiddleware(searchProviders)) | |
| if (app.get('env') !== 'test') { | |
| jobs.startCleanUpJob(options.filePath) | |
| } | |
| const processId = uuid.v4() | |
| jobs.startPeriodicPingJob({ | |
| urls: options.periodicPingUrls, | |
| interval: options.periodicPingInterval, | |
| count: options.periodicPingCount, | |
| staticPayload: options.periodicPingStaticPayload, | |
| version, | |
| processId, | |
| }) | |
| return app | |
| } | |
| // intercepts grantJS' default response error when something goes | |
| // wrong during oauth process. | |
| const interceptGrantErrorResponse = interceptor((req, res) => { | |
| return { | |
| isInterceptable: () => { | |
| // match grant.js' callback url | |
| return /^\/connect\/\w+\/callback/.test(req.path) | |
| }, | |
| intercept: (body, send) => { | |
| const unwantedBody = 'error=Grant%3A%20missing%20session%20or%20misconfigured%20provider' | |
| if (body === unwantedBody) { | |
| logger.error(`grant.js responded with error: ${body}`, 'grant.oauth.error', req.id) | |
| res.set('Content-Type', 'text/plain') | |
| const reqHint = req.id ? `Request ID: ${req.id}` : '' | |
| send([ | |
| 'Companion was unable to complete the OAuth process :(', | |
| 'Error: User session is missing or the Provider was misconfigured', | |
| reqHint, | |
| ].join('\n')) | |
| } else { | |
| send(body) | |
| } | |
| }, | |
| } | |
| }) | |
| /** | |
| * | |
| * @param {object} options | |
| */ | |
| const getOptionsMiddleware = (options) => { | |
| /** | |
| * @param {object} req | |
| * @param {object} res | |
| * @param {Function} next | |
| */ | |
| const middleware = (req, res, next) => { | |
| const versionFromQuery = req.query.uppyVersions ? decodeURIComponent(req.query.uppyVersions) : null | |
| req.companion = { | |
| options, | |
| s3Client: getS3Client(options), | |
| authToken: req.header('uppy-auth-token') || req.query.uppyAuthToken, | |
| clientVersion: req.header('uppy-versions') || versionFromQuery || '1.0.0', | |
| buildURL: getURLBuilder(options), | |
| } | |
| if (options.logClientVersion) { | |
| logger.info(`uppy client version ${req.companion.clientVersion}`, 'companion.client.version') | |
| } | |
| next() | |
| } | |
| return middleware | |
| } | |
| /** | |
| * Informs the logger about all provider secrets that should be masked | |
| * if they are found in a log message | |
| * | |
| * @param {object} companionOptions | |
| */ | |
| const maskLogger = (companionOptions) => { | |
| const secrets = [] | |
| const { providerOptions, customProviders } = companionOptions | |
| Object.keys(providerOptions).forEach((provider) => { | |
| if (providerOptions[provider].secret) { | |
| secrets.push(providerOptions[provider].secret) | |
| } | |
| }) | |
| if (customProviders) { | |
| Object.keys(customProviders).forEach((provider) => { | |
| if (customProviders[provider].config && customProviders[provider].config.secret) { | |
| secrets.push(customProviders[provider].config.secret) | |
| } | |
| }) | |
| } | |
| logger.setMaskables(secrets) | |
| } | |
| /** | |
| * validates that the mandatory companion options are set. | |
| * If it is invalid, it will console an error of unset options and exits the process. | |
| * If it is valid, nothing happens. | |
| * | |
| * @param {object} companionOptions | |
| */ | |
| const validateConfig = (companionOptions) => { | |
| const mandatoryOptions = ['secret', 'filePath', 'server.host'] | |
| /** @type {string[]} */ | |
| const unspecified = [] | |
| mandatoryOptions.forEach((i) => { | |
| const value = i.split('.').reduce((prev, curr) => (prev ? prev[curr] : undefined), companionOptions) | |
| if (!value) unspecified.push(`"${i}"`) | |
| }) | |
| // vaidate that all required config is specified | |
| if (unspecified.length) { | |
| const messagePrefix = 'Please specify the following options to use companion:' | |
| throw new Error(`${messagePrefix}\n${unspecified.join(',\n')}`) | |
| } | |
| // validate that specified filePath is writeable/readable. | |
| try { | |
| // @ts-ignore | |
| fs.accessSync(`${companionOptions.filePath}`, fs.R_OK | fs.W_OK) // eslint-disable-line no-bitwise | |
| } catch (err) { | |
| throw new Error( | |
| `No access to "${companionOptions.filePath}". Please ensure the directory exists and with read/write permissions.`, | |
| ) | |
| } | |
| const { providerOptions, periodicPingUrls } = companionOptions | |
| if (providerOptions) { | |
| const deprecatedOptions = { microsoft: 'onedrive', google: 'drive' } | |
| Object.keys(deprecatedOptions).forEach((deprected) => { | |
| if (providerOptions[deprected]) { | |
| throw new Error(`The Provider option "${deprected}" is no longer supported. Please use the option "${deprecatedOptions[deprected]}" instead.`) | |
| } | |
| }) | |
| } | |
| if (companionOptions.uploadUrls == null || companionOptions.uploadUrls.length === 0) { | |
| logger.warn('Running without uploadUrls specified is a security risk if running in production', 'startup.uploadUrls') | |
| } | |
| if (periodicPingUrls != null && ( | |
| !Array.isArray(periodicPingUrls) | |
| || periodicPingUrls.some((url2) => !isURL(url2, { protocols: ['http', 'https'], require_protocol: true, require_tld: false })) | |
| )) { | |
| throw new TypeError('Invalid periodicPingUrls') | |
| } | |
| } | |