index.js 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. import { SCOPE } from '@growi/core/dist/interfaces';
  2. import csrf from 'csurf';
  3. import express from 'express';
  4. import { middlewareFactory as rateLimiterFactory } from '~/features/rate-limiter';
  5. import { accessTokenParser } from '../middlewares/access-token-parser';
  6. import { generateAddActivityMiddleware } from '../middlewares/add-activity';
  7. import apiV1FormValidator from '../middlewares/apiv1-form-validator';
  8. import * as applicationNotInstalled from '../middlewares/application-not-installed';
  9. import { excludeReadOnlyUser, excludeReadOnlyUserIfCommentNotAllowed } from '../middlewares/exclude-read-only-user';
  10. import injectResetOrderByTokenMiddleware from '../middlewares/inject-reset-order-by-token-middleware';
  11. import injectUserRegistrationOrderByTokenMiddleware from '../middlewares/inject-user-registration-order-by-token-middleware';
  12. import * as loginFormValidator from '../middlewares/login-form-validator';
  13. import {
  14. generateUnavailableWhenMaintenanceModeMiddleware, generateUnavailableWhenMaintenanceModeMiddlewareForApi,
  15. } from '../middlewares/unavailable-when-maintenance-mode';
  16. import * as attachment from './attachment';
  17. import { routesFactory as attachmentApiRoutesFactory } from './attachment/api';
  18. import * as forgotPassword from './forgot-password';
  19. import nextFactory from './next';
  20. import * as userActivation from './user-activation';
  21. const multer = require('multer');
  22. const autoReap = require('multer-autoreap');
  23. const csrfProtection = csrf({ cookie: false });
  24. autoReap.options.reapOnError = true; // continue reaping the file even if an error occurs
  25. /** @param {import('~/server/crowi').default} crowi Crowi instance */
  26. module.exports = function(crowi, app) {
  27. const autoReconnectToSearch = require('../middlewares/auto-reconnect-to-search')(crowi);
  28. const applicationInstalled = require('../middlewares/application-installed')(crowi);
  29. const loginRequiredStrictly = require('../middlewares/login-required')(crowi);
  30. const loginRequired = require('../middlewares/login-required')(crowi, true);
  31. const adminRequired = require('../middlewares/admin-required')(crowi);
  32. const addActivity = generateAddActivityMiddleware(crowi);
  33. const uploads = multer({ dest: `${crowi.tmpDir}uploads` });
  34. const page = require('./page')(crowi, app);
  35. const login = require('./login')(crowi, app);
  36. const loginPassport = require('./login-passport')(crowi, app);
  37. const admin = require('./admin')(crowi, app);
  38. const attachmentApi = attachmentApiRoutesFactory(crowi).api;
  39. const comment = require('./comment')(crowi, app);
  40. const tag = require('./tag')(crowi, app);
  41. const search = require('./search')(crowi, app);
  42. const ogp = require('./ogp')(crowi);
  43. const { createApiRouter } = require('~/server/util/createApiRouter');
  44. const next = nextFactory(crowi);
  45. const unavailableWhenMaintenanceMode = generateUnavailableWhenMaintenanceModeMiddleware(crowi);
  46. const unavailableWhenMaintenanceModeForApi = generateUnavailableWhenMaintenanceModeMiddlewareForApi(crowi);
  47. /* eslint-disable max-len, comma-spacing, no-multi-spaces */
  48. const [apiV3Router, apiV3AdminRouter, apiV3AuthRouter] = require('./apiv3')(crowi, app);
  49. // Rate limiter
  50. app.use(rateLimiterFactory());
  51. // API v3 for admin
  52. app.use('/_api/v3', apiV3AdminRouter);
  53. // API v3 for auth
  54. app.use('/_api/v3', apiV3AuthRouter);
  55. app.get('/_next/*' , next.delegateToNext);
  56. app.get('/' , applicationInstalled, unavailableWhenMaintenanceMode, loginRequired, autoReconnectToSearch, next.delegateToNext);
  57. app.get('/login/error/:reason' , applicationInstalled, next.delegateToNext);
  58. app.get('/login' , applicationInstalled, login.preLogin, next.delegateToNext);
  59. app.get('/invited' , applicationInstalled, next.delegateToNext);
  60. // app.post('/login' , applicationInstalled, loginFormValidator.loginRules(), loginFormValidator.loginValidation, csrfProtection, addActivity, loginPassport.loginWithLocal, loginPassport.loginWithLdap, loginPassport.loginFailure);
  61. // NOTE: get method "/admin/export/:fileName" should be loaded before "/admin/*"
  62. app.get('/admin/export/:fileName' , accessTokenParser([SCOPE.READ.ADMIN.EXPORT_DATA]), loginRequiredStrictly , adminRequired ,admin.export.api.validators.export.download(), admin.export.download);
  63. // TODO: If you want to use accessTokenParser, you need to add scope ANY e.g. accessTokenParser([SCOPE.READ.ADMIN.ANY])
  64. app.get('/admin/*' , applicationInstalled, loginRequiredStrictly , adminRequired , next.delegateToNext);
  65. app.get('/admin' , applicationInstalled, loginRequiredStrictly , adminRequired , next.delegateToNext);
  66. // installer
  67. app.get('/installer',
  68. applicationNotInstalled.generateCheckerMiddleware(crowi),
  69. next.delegateToNext,
  70. applicationNotInstalled.redirectToTopOnError);
  71. // OAuth
  72. app.get('/passport/google' , loginPassport.loginWithGoogle, loginPassport.loginFailureForExternalAccount);
  73. app.get('/passport/github' , loginPassport.loginWithGitHub, loginPassport.loginFailureForExternalAccount);
  74. app.get('/passport/oidc' , loginPassport.loginWithOidc, loginPassport.loginFailureForExternalAccount);
  75. app.get('/passport/saml' , loginPassport.loginWithSaml, loginPassport.loginFailureForExternalAccount);
  76. app.get('/passport/google/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportGoogleCallback , loginPassport.loginFailureForExternalAccount);
  77. app.get('/passport/github/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportGitHubCallback , loginPassport.loginFailureForExternalAccount);
  78. app.get('/passport/oidc/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportOidcCallback , loginPassport.loginFailureForExternalAccount);
  79. app.post('/passport/saml/callback' , addActivity, loginPassport.injectRedirectTo, loginPassport.loginPassportSamlCallback, loginPassport.loginFailureForExternalAccount);
  80. app.post('/_api/login/testLdap' , accessTokenParser([SCOPE.WRITE.USER_SETTINGS.EXTERNAL_ACCOUNT]), loginRequiredStrictly , loginFormValidator.loginRules() , loginFormValidator.loginValidation , loginPassport.testLdapCredentials);
  81. // importer management for admin
  82. app.post('/_api/admin/settings/importerEsa' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.importer.api.validators.importer.esa(),admin.api.importerSettingEsa);
  83. app.post('/_api/admin/settings/importerQiita' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.importer.api.validators.importer.qiita(), admin.api.importerSettingQiita);
  84. app.post('/_api/admin/import/esa' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.importDataFromEsa);
  85. app.post('/_api/admin/import/testEsaAPI' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.testEsaAPI);
  86. app.post('/_api/admin/import/qiita' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.importDataFromQiita);
  87. app.post('/_api/admin/import/testQiitaAPI' , accessTokenParser([SCOPE.WRITE.ADMIN.IMPORT_DATA]), loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.testQiitaAPI);
  88. // brand logo
  89. app.use('/attachment', attachment.getBrandLogoRouterFactory(crowi));
  90. /*
  91. * Routes below are unavailable when maintenance mode
  92. */
  93. // API v3
  94. app.use('/_api/v3', unavailableWhenMaintenanceModeForApi, apiV3Router);
  95. const apiV1Router = createApiRouter();
  96. apiV1Router.get('/search' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }) , loginRequired , search.api.search);
  97. // HTTP RPC Styled API (に徐々に移行していいこうと思う)
  98. apiV1Router.get('/pages.updatePost' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }), loginRequired, page.api.getUpdatePost);
  99. apiV1Router.get('/pages.getPageTag' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }) , loginRequired , page.api.getPageTag);
  100. // allow posting to guests because the client doesn't know whether the user logged in
  101. apiV1Router.post('/pages.remove' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE]), loginRequiredStrictly , excludeReadOnlyUser, page.validator.remove, apiV1FormValidator, page.api.remove); // (Avoid from API Token)
  102. apiV1Router.post('/pages.revertRemove' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE]), loginRequiredStrictly , excludeReadOnlyUser, page.validator.revertRemove, apiV1FormValidator, page.api.revertRemove); // (Avoid from API Token)
  103. apiV1Router.post('/pages.unlink' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE]), loginRequiredStrictly , excludeReadOnlyUser, page.api.unlink); // (Avoid from API Token)
  104. apiV1Router.get('/tags.list' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }), loginRequired, tag.api.list);
  105. apiV1Router.get('/tags.search' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }), loginRequired, tag.api.search);
  106. apiV1Router.post('/tags.update' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE], { acceptLegacy: true }), loginRequiredStrictly, excludeReadOnlyUser, addActivity, tag.api.update);
  107. apiV1Router.get('/comments.get' , accessTokenParser([SCOPE.READ.FEATURES.PAGE], { acceptLegacy: true }) , loginRequired , comment.api.get);
  108. apiV1Router.post('/comments.add' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE], { acceptLegacy: true }), comment.api.validators.add(), loginRequiredStrictly , excludeReadOnlyUserIfCommentNotAllowed, addActivity, comment.api.add);
  109. apiV1Router.post('/comments.update' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE], { acceptLegacy: true }), comment.api.validators.add(), loginRequiredStrictly , excludeReadOnlyUserIfCommentNotAllowed, addActivity, comment.api.update);
  110. apiV1Router.post('/comments.remove' , accessTokenParser([SCOPE.WRITE.FEATURES.PAGE], { acceptLegacy: true }), loginRequiredStrictly , excludeReadOnlyUserIfCommentNotAllowed, addActivity, comment.api.remove);
  111. apiV1Router.post('/attachments.uploadProfileImage' , accessTokenParser([SCOPE.WRITE.FEATURES.ATTACHMENT], { acceptLegacy: true }), loginRequiredStrictly , excludeReadOnlyUser, uploads.single('file'), autoReap, attachmentApi.uploadProfileImage);
  112. apiV1Router.post('/attachments.remove' , accessTokenParser([SCOPE.WRITE.FEATURES.ATTACHMENT], { acceptLegacy: true }), loginRequiredStrictly , excludeReadOnlyUser, addActivity ,attachmentApi.remove);
  113. apiV1Router.post('/attachments.removeProfileImage' , accessTokenParser([SCOPE.WRITE.FEATURES.ATTACHMENT], { acceptLegacy: true }), loginRequiredStrictly , excludeReadOnlyUser, attachmentApi.removeProfileImage);
  114. // API v1
  115. app.use('/_api', unavailableWhenMaintenanceModeForApi, apiV1Router);
  116. app.use(unavailableWhenMaintenanceMode);
  117. app.get('/me' , loginRequiredStrictly, next.delegateToNext);
  118. app.get('/me/*' , loginRequiredStrictly, next.delegateToNext);
  119. app.use('/attachment', accessTokenParser([SCOPE.READ.FEATURES.ATTACHMENT]), attachment.getRouterFactory(crowi));
  120. app.use('/download', accessTokenParser([SCOPE.READ.FEATURES.ATTACHMENT]), attachment.downloadRouterFactory(crowi));
  121. app.get('/_search' , loginRequired, next.delegateToNext);
  122. app.use('/forgot-password', express.Router()
  123. .use(forgotPassword.checkForgotPasswordEnabledMiddlewareFactory(crowi))
  124. .get('/', forgotPassword.renderForgotPassword(crowi))
  125. .get('/:token', injectResetOrderByTokenMiddleware, forgotPassword.renderResetPassword(crowi))
  126. .use(forgotPassword.handleErrorsMiddleware(crowi)));
  127. app.get('/_private-legacy-pages', next.delegateToNext);
  128. app.use('/user-activation', express.Router()
  129. .get('/:token', applicationInstalled, injectUserRegistrationOrderByTokenMiddleware, userActivation.renderUserActivationPage(crowi))
  130. .use(userActivation.tokenErrorHandlerMiddeware(crowi)));
  131. app.get('/share$', (req, res) => res.redirect('/'));
  132. app.get('/share/:linkId', next.delegateToNext);
  133. app.use('/ogp', express.Router().get('/:pageId([0-9a-z]{0,})', loginRequired, ogp.pageIdRequired, ogp.ogpValidator, ogp.renderOgp));
  134. app.get('/*/$' , loginRequired, next.delegateToNext);
  135. app.get('/*' , loginRequired, autoReconnectToSearch, next.delegateToNext);
  136. };