85d2225e0c
* Fix loading within the CLI * Remove app * Remove promise handle * Add initial travis file * Add libxkbfile dependency * Add libxkbfile-dev * Add build script * Fix malformed bash statement * Remove yarn from script * Improve build script * Extract upx before usage * Only run upx if on linux * Ensure resource directory exists * Pack runnable binary * Export binary with platform * Improve build process * Install upx before running install script * Update typescript version before running nexe * Add os.release() function for multi-platform support * Update travis.yml to improve deployment * Add on CI * Update to v1.31.0 * Add libsecret * Update build target * Skip cleanup * Fix built-in extensions * Add basics for apps * Create custom DNS server * Fix forking within CLI. Fixes TS language features * Fix filename resolve * Fix default extensions path * Add custom dialog * Store workspace path * Remove outfiles * Cleanup * Always authed outside of CLI * Use location.host for client * Remove useless app interface * Remove debug file for building wordlist * Use chromes tcp host * Update patch * Build browser app before packaging * Replace all css containing file:// URLs, fix webviews * Fix save * Fix mkdir
215 lines
5.6 KiB
TypeScript
215 lines
5.6 KiB
TypeScript
import { logger, field } from "@coder/logger";
|
|
import { ReadWriteConnection } from "@coder/protocol";
|
|
import { Server, ServerOptions } from "@coder/protocol/src/node/server";
|
|
import * as express from "express";
|
|
//@ts-ignore
|
|
import * as expressStaticGzip from "express-static-gzip";
|
|
import * as fs from "fs";
|
|
import * as http from "http";
|
|
//@ts-ignore
|
|
import * as httpolyglot from "httpolyglot";
|
|
import * as https from "https";
|
|
import * as mime from "mime-types";
|
|
import * as net from "net";
|
|
import * as path from "path";
|
|
import * as pem from "pem";
|
|
import * as util from "util";
|
|
import * as ws from "ws";
|
|
import { TunnelCloseCode } from "@coder/tunnel/src/common";
|
|
import { handle as handleTunnel } from "@coder/tunnel/src/server";
|
|
import { createPortScanner } from "./portScanner";
|
|
import { buildDir, isCli } from "./constants";
|
|
|
|
export const createApp = async (registerMiddleware?: (app: express.Application) => void, options?: ServerOptions, password?: string, httpsOptions?: https.ServerOptions): Promise<{
|
|
readonly express: express.Application;
|
|
readonly server: http.Server;
|
|
readonly wss: ws.Server;
|
|
}> => {
|
|
const parseCookies = (req: http.IncomingMessage): { [key: string]: string } => {
|
|
const cookies: { [key: string]: string } = {};
|
|
const rc = req.headers.cookie;
|
|
if (rc) {
|
|
rc.split(";").forEach((cook) => {
|
|
const parts = cook.split("=");
|
|
cookies[parts.shift()!.trim()] = decodeURI(parts.join("="));
|
|
});
|
|
}
|
|
|
|
return cookies;
|
|
};
|
|
|
|
const isAuthed = (req: http.IncomingMessage): boolean => {
|
|
try {
|
|
if (!password || !isCli) {
|
|
return true;
|
|
}
|
|
|
|
// Try/catch placed here just in case
|
|
const cookies = parseCookies(req);
|
|
if (cookies.password && cookies.password === password) {
|
|
return true;
|
|
}
|
|
} catch (ex) {
|
|
logger.error("Failed to parse cookies", field("error", ex));
|
|
}
|
|
|
|
return false;
|
|
};
|
|
|
|
const isEncrypted = (socket: net.Socket): boolean => {
|
|
// tslint:disable-next-line:no-any
|
|
return (socket as any).encrypted;
|
|
};
|
|
|
|
const app = express();
|
|
if (registerMiddleware) {
|
|
registerMiddleware(app);
|
|
}
|
|
|
|
const certs = await new Promise<pem.CertificateCreationResult>((res, rej): void => {
|
|
pem.createCertificate({
|
|
selfSigned: true,
|
|
}, (err, result) => {
|
|
if (err) {
|
|
rej(err);
|
|
|
|
return;
|
|
}
|
|
|
|
res(result);
|
|
});
|
|
});
|
|
|
|
const server = httpolyglot.createServer({
|
|
key: certs.serviceKey,
|
|
cert: certs.certificate,
|
|
}, app) as http.Server;
|
|
const wss = new ws.Server({ server });
|
|
|
|
wss.shouldHandle = (req): boolean => {
|
|
return isAuthed(req);
|
|
};
|
|
|
|
const portScanner = createPortScanner();
|
|
wss.on("connection", (ws, req) => {
|
|
if (req.url && req.url.startsWith("/tunnel")) {
|
|
try {
|
|
const rawPort = req.url.split("/").pop();
|
|
const port = Number.parseInt(rawPort!, 10);
|
|
|
|
handleTunnel(ws, port);
|
|
} catch (ex) {
|
|
ws.close(TunnelCloseCode.Error, ex.toString());
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
if (req.url && req.url.startsWith("/ports")) {
|
|
const onAdded = portScanner.onAdded((added) => ws.send(JSON.stringify({ added })));
|
|
const onRemoved = portScanner.onRemoved((removed) => ws.send(JSON.stringify({ removed })));
|
|
ws.on("close", () => {
|
|
onAdded.dispose();
|
|
onRemoved.dispose();
|
|
});
|
|
|
|
return ws.send(JSON.stringify({ ports: portScanner.ports }));
|
|
}
|
|
|
|
const connection: ReadWriteConnection = {
|
|
onMessage: (cb): void => {
|
|
ws.addEventListener("message", (event) => cb(event.data));
|
|
},
|
|
close: (): void => ws.close(),
|
|
send: (data): void => {
|
|
if (ws.readyState !== ws.OPEN) {
|
|
return;
|
|
}
|
|
try {
|
|
ws.send(data);
|
|
} catch (error) {
|
|
logger.error(error.message);
|
|
}
|
|
},
|
|
onClose: (cb): void => ws.addEventListener("close", () => cb()),
|
|
};
|
|
|
|
const server = new Server(connection, options);
|
|
});
|
|
|
|
const baseDir = buildDir || path.join(__dirname, "..");
|
|
const authStaticFunc = expressStaticGzip(path.join(baseDir, "build/web/auth"));
|
|
const unauthStaticFunc = expressStaticGzip(path.join(baseDir, "build/web/unauth"));
|
|
app.use((req, res, next) => {
|
|
if (isAuthed(req)) {
|
|
// We can serve the actual VSCode bin
|
|
authStaticFunc(req, res, next);
|
|
} else {
|
|
// Serve only the unauthed version
|
|
unauthStaticFunc(req, res, next);
|
|
}
|
|
});
|
|
app.get("/resource/:url(*)", async (req, res) => {
|
|
try {
|
|
const fullPath = `/${req.params.url}`;
|
|
// const relative = path.relative(options!.dataDirectory, fullPath);
|
|
// if (relative.startsWith("..")) {
|
|
// return res.status(403).end();
|
|
// }
|
|
const exists = fs.existsSync(fullPath);
|
|
if (!exists) {
|
|
return res.status(404).end();
|
|
}
|
|
const stat = await util.promisify(fs.stat)(fullPath);
|
|
if (!stat.isFile()) {
|
|
res.write("Resource must be a file.");
|
|
res.status(422);
|
|
|
|
return res.end();
|
|
}
|
|
let mimeType = mime.lookup(fullPath);
|
|
if (mimeType === false) {
|
|
mimeType = "application/octet-stream";
|
|
}
|
|
const content = await util.promisify(fs.readFile)(fullPath);
|
|
|
|
res.header("Content-Type", mimeType as string);
|
|
res.write(content);
|
|
res.status(200);
|
|
res.end();
|
|
} catch (ex) {
|
|
res.write(ex.toString());
|
|
res.status(500);
|
|
res.end();
|
|
}
|
|
});
|
|
app.post("/resource/:url(*)", async (req, res) => {
|
|
try {
|
|
const fullPath = `/${req.params.url}`;
|
|
|
|
const data: string[] = [];
|
|
req.setEncoding("utf8");
|
|
req.on("data", (chunk) => {
|
|
data.push(chunk);
|
|
});
|
|
req.on("end", () => {
|
|
const body = data.join("");
|
|
fs.writeFileSync(fullPath, body);
|
|
logger.debug("Wrote resource", field("path", fullPath), field("content-length", body.length));
|
|
res.status(200);
|
|
res.end();
|
|
});
|
|
} catch (ex) {
|
|
res.write(ex.toString());
|
|
res.status(500);
|
|
res.end();
|
|
}
|
|
});
|
|
|
|
return {
|
|
express: app,
|
|
server,
|
|
wss,
|
|
};
|
|
};
|