import { field, logger } from "@coder/logger" import * as express from "express" import * as expressCore from "express-serve-static-core" import qs from "qs" import safeCompare from "safe-compare" import { HttpCode, HttpError } from "../common/http" import { normalize, Options } from "../common/util" import { AuthType, DefaultedArgs } from "./cli" import { commit, rootPath } from "./constants" import { Heart } from "./heart" import { isHashMatch } from "./util" declare global { // eslint-disable-next-line @typescript-eslint/no-namespace namespace Express { export interface Request { args: DefaultedArgs heart: Heart } } } /** * Replace common variable strings in HTML templates. */ export const replaceTemplates = ( req: express.Request, content: string, extraOpts?: Omit, ): string => { const base = relativeRoot(req) const options: Options = { base, csStaticBase: base + "/static/" + commit + rootPath, logLevel: logger.level, ...extraOpts, } return content .replace(/{{TO}}/g, (typeof req.query.to === "string" && req.query.to) || "/") .replace(/{{BASE}}/g, options.base) .replace(/{{CS_STATIC_BASE}}/g, options.csStaticBase) .replace(/"{{OPTIONS}}"/, `'${JSON.stringify(options)}'`) } /** * Throw an error if not authorized. Call `next` if provided. */ export const ensureAuthenticated = async ( req: express.Request, _?: express.Response, next?: express.NextFunction, ): Promise => { const isAuthenticated = await authenticated(req) if (!isAuthenticated) { throw new HttpError("Unauthorized", HttpCode.Unauthorized) } if (next) { next() } } /** * Return true if authenticated via cookies. */ export const authenticated = async (req: express.Request): Promise => { switch (req.args.auth) { case AuthType.None: return true case AuthType.Password: // The password is stored in the cookie after being hashed. // TODO@jsjoeio this also needs to be refactored to check if they're using the legacy password // or the new one. we can't assume hashed-password means legacy return !!( req.cookies.key && (req.args["hashed-password"] ? safeCompare(req.cookies.key, req.args["hashed-password"]) : req.args.password && (await isHashMatch(req.args.password, req.cookies.key))) ) default: throw new Error(`Unsupported auth type ${req.args.auth}`) } } /** * Get the relative path that will get us to the root of the page. For each * slash we need to go up a directory. For example: * / => . * /foo => . * /foo/ => ./.. * /foo/bar => ./.. * /foo/bar/ => ./../.. */ export const relativeRoot = (req: express.Request): string => { const depth = (req.originalUrl.split("?", 1)[0].match(/\//g) || []).length return normalize("./" + (depth > 1 ? "../".repeat(depth - 1) : "")) } /** * Redirect relatively to `/${to}`. Query variables will be preserved. * `override` will merge with the existing query (use `undefined` to unset). */ export const redirect = ( req: express.Request, res: express.Response, to: string, override: expressCore.Query = {}, ): void => { const query = Object.assign({}, req.query, override) Object.keys(override).forEach((key) => { if (typeof override[key] === "undefined") { delete query[key] } }) const relativePath = normalize(`${relativeRoot(req)}/${to}`, true) const queryString = qs.stringify(query) const redirectPath = `${relativePath}${queryString ? `?${queryString}` : ""}` logger.debug(`redirecting from ${req.originalUrl} to ${redirectPath}`) res.redirect(redirectPath) } /** * Get the value that should be used for setting a cookie domain. This will * allow the user to authenticate once no matter what sub-domain they use to log * in. This will use the highest level proxy domain (e.g. `coder.com` over * `test.coder.com` if both are specified). */ export const getCookieDomain = (host: string, proxyDomains: string[]): string | undefined => { const idx = host.lastIndexOf(":") host = idx !== -1 ? host.substring(0, idx) : host // If any of these are true we will still set cookies but without an explicit // `Domain` attribute on the cookie. if ( // The host can be be blank or missing so there's nothing we can set. !host || // IP addresses can't have subdomains so there's no value in setting the // domain for them. Assume that anything with a : is ipv6 (valid domain name // characters are alphanumeric or dashes)... host.includes(":") || // ...and that anything entirely numbers and dots is ipv4 (currently tlds // cannot be entirely numbers). !/[^0-9.]/.test(host) || // localhost subdomains don't seem to work at all (browser bug?). A cookie // set at dev.localhost cannot be read by 8080.dev.localhost. host.endsWith(".localhost") || // Domains without at least one dot (technically two since domain.tld will // become .domain.tld) are considered invalid according to the spec so don't // set the domain for them. In my testing though localhost is the only // problem (the browser just doesn't store the cookie at all). localhost has // an additional problem which is that a reverse proxy might give // code-server localhost even though the domain is really domain.tld (by // default NGINX does this). !host.includes(".") ) { logger.debug("no valid cookie doman", field("host", host)) return undefined } proxyDomains.forEach((domain) => { if (host.endsWith(domain) && domain.length < host.length) { host = domain } }) logger.debug("got cookie doman", field("host", host)) return host || undefined }