index.js 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. import csrf from 'csurf';
  2. import express from 'express';
  3. import { middlewareFactory as rateLimiterFactory } from '~/features/rate-limiter';
  4. import { generateAddActivityMiddleware } from '../middlewares/add-activity';
  5. import apiV1FormValidator from '../middlewares/apiv1-form-validator';
  6. import { generateCertifyBrandLogoMiddleware } from '../middlewares/certify-brand-logo';
  7. import { excludeReadOnlyUser } from '../middlewares/exclude-read-only-user';
  8. import injectResetOrderByTokenMiddleware from '../middlewares/inject-reset-order-by-token-middleware';
  9. import injectUserRegistrationOrderByTokenMiddleware from '../middlewares/inject-user-registration-order-by-token-middleware';
  10. import * as loginFormValidator from '../middlewares/login-form-validator';
  11. import {
  12. generateUnavailableWhenMaintenanceModeMiddleware, generateUnavailableWhenMaintenanceModeMiddlewareForApi,
  13. } from '../middlewares/unavailable-when-maintenance-mode';
  14. import * as forgotPassword from './forgot-password';
  15. import nextFactory from './next';
  16. import * as userActivation from './user-activation';
  17. const multer = require('multer');
  18. const autoReap = require('multer-autoreap');
  19. const csrfProtection = csrf({ cookie: false });
  20. autoReap.options.reapOnError = true; // continue reaping the file even if an error occurs
  21. module.exports = function(crowi, app) {
  22. const autoReconnectToSearch = require('../middlewares/auto-reconnect-to-search')(crowi);
  23. const applicationNotInstalled = require('../middlewares/application-not-installed')(crowi);
  24. const applicationInstalled = require('../middlewares/application-installed')(crowi);
  25. const accessTokenParser = require('../middlewares/access-token-parser')(crowi);
  26. const loginRequiredStrictly = require('../middlewares/login-required')(crowi);
  27. const loginRequired = require('../middlewares/login-required')(crowi, true);
  28. const adminRequired = require('../middlewares/admin-required')(crowi);
  29. const certifySharedFile = require('../middlewares/certify-shared-file')(crowi);
  30. const certifyBrandLogo = generateCertifyBrandLogoMiddleware(crowi);
  31. const addActivity = generateAddActivityMiddleware(crowi);
  32. const uploads = multer({ dest: `${crowi.tmpDir}uploads` });
  33. const page = require('./page')(crowi, app);
  34. const login = require('./login')(crowi, app);
  35. const loginPassport = require('./login-passport')(crowi, app);
  36. const me = require('./me')(crowi, app);
  37. const admin = require('./admin')(crowi, app);
  38. const user = require('./user')(crowi, app);
  39. const attachment = require('./attachment')(crowi, app);
  40. const comment = require('./comment')(crowi, app);
  41. const tag = require('./tag')(crowi, app);
  42. const search = require('./search')(crowi, app);
  43. const hackmd = require('./hackmd')(crowi, app);
  44. const ogp = require('./ogp')(crowi);
  45. const next = nextFactory(crowi);
  46. const unavailableWhenMaintenanceMode = generateUnavailableWhenMaintenanceModeMiddleware(crowi);
  47. const unavailableWhenMaintenanceModeForApi = generateUnavailableWhenMaintenanceModeMiddlewareForApi(crowi);
  48. /* eslint-disable max-len, comma-spacing, no-multi-spaces */
  49. const [apiV3Router, apiV3AdminRouter, apiV3AuthRouter] = require('./apiv3')(crowi, app);
  50. app.use('/api-docs', require('./apiv3/docs')(crowi, app));
  51. // Rate limiter
  52. app.use(rateLimiterFactory());
  53. // API v3 for admin
  54. app.use('/_api/v3', apiV3AdminRouter);
  55. // API v3 for auth
  56. app.use('/_api/v3', apiV3AuthRouter);
  57. app.get('/_next/*' , next.delegateToNext);
  58. app.get('/' , applicationInstalled, unavailableWhenMaintenanceMode, loginRequired, autoReconnectToSearch, next.delegateToNext);
  59. app.get('/login/error/:reason' , applicationInstalled, next.delegateToNext);
  60. app.get('/login' , applicationInstalled, login.preLogin, next.delegateToNext);
  61. app.get('/invited' , applicationInstalled, next.delegateToNext);
  62. // app.post('/login' , applicationInstalled, loginFormValidator.loginRules(), loginFormValidator.loginValidation, csrfProtection, addActivity, loginPassport.loginWithLocal, loginPassport.loginWithLdap, loginPassport.loginFailure);
  63. // NOTE: get method "/admin/export/:fileName" should be loaded before "/admin/*"
  64. app.get('/admin/export/:fileName' , loginRequiredStrictly , adminRequired ,admin.export.api.validators.export.download(), admin.export.download);
  65. app.get('/admin/*' , applicationInstalled, loginRequiredStrictly , adminRequired , next.delegateToNext);
  66. app.get('/admin' , applicationInstalled, loginRequiredStrictly , adminRequired , next.delegateToNext);
  67. // installer
  68. app.get('/installer' , applicationNotInstalled, next.delegateToNext);
  69. // OAuth
  70. app.get('/passport/google' , loginPassport.loginWithGoogle, loginPassport.loginFailureForExternalAccount);
  71. app.get('/passport/github' , loginPassport.loginWithGitHub, loginPassport.loginFailureForExternalAccount);
  72. app.get('/passport/oidc' , loginPassport.loginWithOidc, loginPassport.loginFailureForExternalAccount);
  73. app.get('/passport/saml' , loginPassport.loginWithSaml, loginPassport.loginFailureForExternalAccount);
  74. app.get('/passport/google/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportGoogleCallback , loginPassport.loginFailureForExternalAccount);
  75. app.get('/passport/github/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportGitHubCallback , loginPassport.loginFailureForExternalAccount);
  76. app.get('/passport/oidc/callback' , loginPassport.injectRedirectTo, loginPassport.loginPassportOidcCallback , loginPassport.loginFailureForExternalAccount);
  77. app.post('/passport/saml/callback' , addActivity, loginPassport.injectRedirectTo, loginPassport.loginPassportSamlCallback, loginPassport.loginFailureForExternalAccount);
  78. app.post('/_api/login/testLdap' , loginRequiredStrictly , loginFormValidator.loginRules() , loginFormValidator.loginValidation , loginPassport.testLdapCredentials);
  79. // importer management for admin
  80. app.post('/_api/admin/settings/importerEsa' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.importer.api.validators.importer.esa(),admin.api.importerSettingEsa);
  81. app.post('/_api/admin/settings/importerQiita' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.importer.api.validators.importer.qiita(), admin.api.importerSettingQiita);
  82. app.post('/_api/admin/import/esa' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.importDataFromEsa);
  83. app.post('/_api/admin/import/testEsaAPI' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.testEsaAPI);
  84. app.post('/_api/admin/import/qiita' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.importDataFromQiita);
  85. app.post('/_api/admin/import/testQiitaAPI' , loginRequiredStrictly , adminRequired , csrfProtection, addActivity, admin.api.testQiitaAPI);
  86. app.get('/attachment/brand-logo' , certifyBrandLogo, loginRequired, attachment.api.getBrandLogo);
  87. /*
  88. * Routes below are unavailable when maintenance mode
  89. */
  90. // API v3
  91. app.use('/_api/v3', unavailableWhenMaintenanceModeForApi, apiV3Router);
  92. const apiV1Router = express.Router();
  93. apiV1Router.get('/search' , accessTokenParser , loginRequired , search.api.search);
  94. apiV1Router.get('/me/user-groups' , accessTokenParser , loginRequiredStrictly , me.api.userGroups);
  95. apiV1Router.get('/me/external-user-groups' , accessTokenParser , loginRequiredStrictly , me.api.externalUserGroups);
  96. // HTTP RPC Styled API (に徐々に移行していいこうと思う)
  97. apiV1Router.get('/pages.list' , accessTokenParser , loginRequired , page.api.list);
  98. apiV1Router.post('/pages.update' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, addActivity, page.api.update);
  99. apiV1Router.get('/pages.exist' , accessTokenParser , loginRequired , page.api.exist);
  100. apiV1Router.get('/pages.updatePost' , accessTokenParser, loginRequired, page.api.getUpdatePost);
  101. apiV1Router.get('/pages.getPageTag' , accessTokenParser , loginRequired , page.api.getPageTag);
  102. // allow posting to guests because the client doesn't know whether the user logged in
  103. apiV1Router.post('/pages.remove' , loginRequiredStrictly , excludeReadOnlyUser, page.validator.remove, apiV1FormValidator, page.api.remove); // (Avoid from API Token)
  104. apiV1Router.post('/pages.revertRemove' , loginRequiredStrictly , excludeReadOnlyUser, page.validator.revertRemove, apiV1FormValidator, page.api.revertRemove); // (Avoid from API Token)
  105. apiV1Router.post('/pages.unlink' , loginRequiredStrictly , excludeReadOnlyUser, page.api.unlink); // (Avoid from API Token)
  106. apiV1Router.post('/pages.duplicate' , accessTokenParser, loginRequiredStrictly, excludeReadOnlyUser, page.api.duplicate);
  107. apiV1Router.get('/tags.list' , accessTokenParser, loginRequired, tag.api.list);
  108. apiV1Router.get('/tags.search' , accessTokenParser, loginRequired, tag.api.search);
  109. apiV1Router.post('/tags.update' , accessTokenParser, loginRequiredStrictly, excludeReadOnlyUser, addActivity, tag.api.update);
  110. apiV1Router.get('/comments.get' , accessTokenParser , loginRequired , comment.api.get);
  111. apiV1Router.post('/comments.add' , comment.api.validators.add(), accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, addActivity, comment.api.add);
  112. apiV1Router.post('/comments.update' , comment.api.validators.add(), accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, addActivity, comment.api.update);
  113. apiV1Router.post('/comments.remove' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, addActivity, comment.api.remove);
  114. apiV1Router.post('/attachments.add' , uploads.single('file'), autoReap, accessTokenParser, loginRequiredStrictly , excludeReadOnlyUser, addActivity ,attachment.api.add);
  115. apiV1Router.post('/attachments.uploadProfileImage' , uploads.single('file'), autoReap, accessTokenParser, loginRequiredStrictly , excludeReadOnlyUser, attachment.api.uploadProfileImage);
  116. apiV1Router.post('/attachments.remove' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, addActivity ,attachment.api.remove);
  117. apiV1Router.post('/attachments.removeProfileImage' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, attachment.api.removeProfileImage);
  118. apiV1Router.get('/attachments.limit' , accessTokenParser , loginRequiredStrictly, attachment.api.limit);
  119. // API v1
  120. app.use('/_api', unavailableWhenMaintenanceModeForApi, apiV1Router);
  121. app.use(unavailableWhenMaintenanceMode);
  122. app.get('/me' , loginRequiredStrictly, next.delegateToNext);
  123. app.get('/me/*' , loginRequiredStrictly, next.delegateToNext);
  124. app.get('/attachment/:id([0-9a-z]{24})' , certifySharedFile , loginRequired, attachment.api.get);
  125. app.get('/attachment/profile/:id([0-9a-z]{24})' , loginRequired, attachment.api.get);
  126. app.get('/attachment/:pageId/:fileName' , loginRequired, attachment.api.obsoletedGetForMongoDB); // DEPRECATED: remains for backward compatibility for v3.3.x or below
  127. app.get('/download/:id([0-9a-z]{24})' , loginRequired, attachment.api.download);
  128. app.get('/_search' , loginRequired, next.delegateToNext);
  129. app.get('/_hackmd/load-agent' , hackmd.loadAgent);
  130. app.get('/_hackmd/load-styles' , hackmd.loadStyles);
  131. app.post('/_api/hackmd.integrate' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, hackmd.validateForApi, hackmd.integrate);
  132. app.post('/_api/hackmd.discard' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, hackmd.validateForApi, hackmd.discard);
  133. app.post('/_api/hackmd.saveOnHackmd' , accessTokenParser , loginRequiredStrictly , excludeReadOnlyUser, hackmd.validateForApi, hackmd.saveOnHackmd);
  134. app.use('/forgot-password', express.Router()
  135. .use(forgotPassword.checkForgotPasswordEnabledMiddlewareFactory(crowi))
  136. .get('/', forgotPassword.renderForgotPassword(crowi))
  137. .get('/:token', injectResetOrderByTokenMiddleware, forgotPassword.renderResetPassword(crowi))
  138. .use(forgotPassword.handleErrorsMiddleware(crowi)));
  139. app.get('/_private-legacy-pages', next.delegateToNext);
  140. app.use('/user-activation', express.Router()
  141. .get('/:token', applicationInstalled, injectUserRegistrationOrderByTokenMiddleware, userActivation.renderUserActivationPage(crowi))
  142. .use(userActivation.tokenErrorHandlerMiddeware(crowi)));
  143. app.get('/share$', (req, res) => res.redirect('/'));
  144. app.get('/share/:linkId', next.delegateToNext);
  145. app.use('/ogp', express.Router().get('/:pageId([0-9a-z]{0,})', loginRequired, ogp.pageIdRequired, ogp.ogpValidator, ogp.renderOgp));
  146. app.get('/*/$' , loginRequired, next.delegateToNext);
  147. app.get('/*' , loginRequired, autoReconnectToSearch, next.delegateToNext);
  148. };