Newer
Older
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is Mozilla BrowserID.
*
* The Initial Developer of the Original Code is Mozilla.
* Portions created by the Initial Developer are Copyright (C) 2011
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
url = require('url'),
crypto = require('crypto'),
wsapi = require('./lib/wsapi.js'),
httputils = require('./lib/httputils.js'),
webfinger = require('./lib/webfinger.js'),
sessions = require('connect-cookie-session'),
express = require('express'),
secrets = require('./lib/secrets.js'),
db = require('./lib/db.js'),
Lloyd Hilaiel
committed
configuration = require('../libs/configuration.js'),
substitution = require('../libs/substitute.js');
Lloyd Hilaiel
committed
metrics = require("../libs/metrics.js"),
logger = require("../libs/logging.js").logger;
logger.info("browserid server starting up");
Lloyd Hilaiel
committed
// open the databse
db.open(configuration.get('database'));
const COOKIE_SECRET = secrets.hydrateSecret('browserid_cookie', configuration.get('var_path'));
function internal_redirector(new_url) {
return function(req, resp, next) {
req.url = new_url;
return next();
};
}
Lloyd Hilaiel
committed
app.set("views", __dirname + '/views');
app.set('view options', {
Lloyd Hilaiel
committed
production: configuration.get('use_minified_resources')
});
// this should probably be an internal redirect
// as soon as relative paths are figured out.
app.get('/sign_in', function(req, res, next ) {
Lloyd Hilaiel
committed
metrics.userEntry(req);
res.render('dialog.ejs', {
title: 'A Better Way to Sign In',
layout: false,
production: configuration.get('use_minified_resources')
Lloyd Hilaiel
committed
});
app.get('/register_iframe', internal_redirector('/dialog/register_iframe.html'));
// return the CSRF token
// IMPORTANT: this should be safe because it's only readable by same-origin code
// but we must be careful that this is never a JSON structure that could be hijacked
// by a third party
app.get('/csrf', function(req, res) {
res.write(req.session.csrf);
res.end();
});
app.get('/', function(req,res) {
Lloyd Hilaiel
committed
res.render('index.ejs', {title: 'A Better Way to Sign In', fullpage: true});
});
Lloyd Hilaiel
committed
res.render('prove.ejs', {title: 'Verify Email Address', fullpage: false});
});
Lloyd Hilaiel
committed
res.render('users.ejs', {title: 'for Users', fullpage: false});
});
app.get(/^\/developers(\.html)?$/, function(req,res) {
Lloyd Hilaiel
committed
res.render('developers.ejs', {title: 'for Developers', fullpage: false});
});
app.get(/^\/primaries(\.html)?$/, function(req,res) {
Lloyd Hilaiel
committed
res.render('primaries.ejs', {title: 'for Primary Authorities', fullpage: false});
});
app.get(/^\/manage(\.html)?$/, function(req,res) {
Lloyd Hilaiel
committed
res.render('manage.ejs', {title: 'My Account', fullpage: false, csrf: req.session.csrf});
Lloyd Hilaiel
committed
});
Lloyd Hilaiel
committed
res.render('tos.ejs', {title: 'Terms of Service', fullpage: false});
});
app.get(/^\/privacy(\.html)?$/, function(req, res) {
Lloyd Hilaiel
committed
res.render('privacy.ejs', {title: 'Privacy Policy', fullpage: false});
});
// register all the WSAPI handlers
wsapi.setup(app);
app.get('/users/:identity.xml', function(req, resp, next) {
webfinger.renderUserPage(req.params.identity, function (resultDocument) {
if (resultDocument === undefined) {
httputils.fourOhFour(resp, "I don't know anything about: " + req.params.identity + "\n");
} else {
httputils.xmlResponse(resp, resultDocument);
}
app.get('/code_update', function(req, resp, next) {
Lloyd Hilaiel
committed
logger.warn("code updated. shutting down.");
Lloyd Hilaiel
committed
};
Lloyd Hilaiel
committed
exports.setup = function(server) {
Lloyd Hilaiel
committed
// request to logger, dev formatted which omits personal data in the requests
server.use(express.logger({
format: 'dev',
stream: {
write: function(x) {
logger.info(typeof x === 'string' ? x.trim() : x);
}
}
}));
// over SSL?
var overSSL = (configuration.get('scheme') == 'https');
server.use(express.cookieParser());
var cookieSessionMiddleware = sessions({
secret: COOKIE_SECRET,
key: COOKIE_KEY,
cookie: {
path: '/',
httpOnly: true,
maxAge: 14400000,
Ben Adida
committed
secure: overSSL
}
});
server.use(function(req, resp, next) {
Ben Adida
committed
// we set this parameter so the connect-cookie-session
// sends the cookie even though the local connection is HTTP
// (the load balancer does SSL)
if (overSSL)
req.connection.proxySecure = true;
Lloyd Hilaiel
committed
return cookieSessionMiddleware(req, resp, next);
});
Ben Adida
committed
server.use(express.bodyParser());
Ben Adida
committed
// we make sure that everyone has a session, otherwise we can't do CSRF properly
server.use(function(req, resp, next) {
if (typeof req.session == 'undefined')
req.session = {};
if (typeof req.session.csrf == 'undefined') {
// FIXME: using express-csrf's approach for generating randomness
// not awesome, but probably sufficient for now.
req.session.csrf = crypto.createHash('md5').update('' + new Date().getTime()).digest('hex');
}
Ben Adida
committed
// a tweak to get the content type of host-meta correct
server.use(function(req, resp, next) {
if (req.url === '/.well-known/host-meta') {
resp.setHeader('content-type', 'text/xml');
}
next();
});
// Strict Transport Security
server.use(function(req, resp, next) {
if (overSSL) {
// expires in 30 days, include subdomains like www
resp.setHeader("Strict-Transport-Security", "max-age=2592000; includeSubdomains");
}
next();
});
Ben Adida
committed
// prevent framing
server.use(function(req, resp, next) {
resp.setHeader('x-frame-options', 'DENY');
next();
});
Ben Adida
committed
// check CSRF token
server.use(function(req, resp, next) {
// only on POSTs
if (req.method == "POST") {
if (req.body.csrf != req.session.csrf) {
// error, problem with CSRF
throw new Error("CSRF violation - " + req.body.csrf + '/' + req.session.csrf);
}
next();
// add middleware to re-write urls if needed
Lloyd Hilaiel
committed
configuration.performSubstitution(server);
// add the actual URL handlers other than static
router(server);