2021-01-03 04:28:46 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"text/template"
|
|
|
|
|
|
|
|
"github.com/valyala/fasthttp"
|
|
|
|
|
|
|
|
"github.com/authelia/authelia/internal/logging"
|
|
|
|
"github.com/authelia/authelia/internal/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
var alphaNumericRunes = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")
|
|
|
|
|
|
|
|
// ServeTemplatedFile serves a templated version of a specified file,
|
|
|
|
// this is utilised to pass information between the backend and frontend
|
|
|
|
// and generate a nonce to support a restrictive CSP while using material-ui.
|
2021-01-20 12:07:40 +00:00
|
|
|
func ServeTemplatedFile(publicDir, file, base, rememberMe, resetPassword, session, theme string) fasthttp.RequestHandler {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger := logging.Logger()
|
|
|
|
|
2021-02-21 23:07:06 +00:00
|
|
|
f, err := assets.Open(publicDir + file)
|
2021-01-03 04:28:46 +00:00
|
|
|
if err != nil {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Fatalf("Unable to open %s: %s", file, err)
|
2021-01-03 04:28:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
b, err := ioutil.ReadAll(f)
|
|
|
|
if err != nil {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Fatalf("Unable to read %s: %s", file, err)
|
2021-01-03 04:28:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tmpl, err := template.New("file").Parse(string(b))
|
|
|
|
if err != nil {
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Fatalf("Unable to parse %s template: %s", file, err)
|
2021-01-03 04:28:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return func(ctx *fasthttp.RequestCtx) {
|
|
|
|
nonce := utils.RandomString(32, alphaNumericRunes)
|
|
|
|
|
|
|
|
switch extension := filepath.Ext(file); extension {
|
|
|
|
case ".html":
|
|
|
|
ctx.SetContentType("text/html; charset=utf-8")
|
|
|
|
default:
|
|
|
|
ctx.SetContentType("text/plain; charset=utf-8")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
2021-02-21 23:07:06 +00:00
|
|
|
case publicDir == swaggerAssets:
|
2021-01-03 04:28:46 +00:00
|
|
|
ctx.Response.Header.Add("Content-Security-Policy", fmt.Sprintf("base-uri 'self' ; default-src 'self' ; img-src 'self' https://validator.swagger.io data: ; object-src 'none' ; script-src 'self' 'unsafe-inline' 'nonce-%s' ; style-src 'self' 'nonce-%s'", nonce, nonce))
|
2021-01-16 23:23:35 +00:00
|
|
|
case os.Getenv("ENVIRONMENT") == dev:
|
|
|
|
ctx.Response.Header.Add("Content-Security-Policy", fmt.Sprintf("default-src 'self' 'unsafe-eval'; object-src 'none'; style-src 'self' 'nonce-%s'", nonce))
|
2021-01-03 04:28:46 +00:00
|
|
|
default:
|
|
|
|
ctx.Response.Header.Add("Content-Security-Policy", fmt.Sprintf("default-src 'self' ; object-src 'none'; style-src 'self' 'nonce-%s'", nonce))
|
|
|
|
}
|
|
|
|
|
2021-01-20 12:07:40 +00:00
|
|
|
err := tmpl.Execute(ctx.Response.BodyWriter(), struct{ Base, CSPNonce, RememberMe, ResetPassword, Session, Theme string }{Base: base, CSPNonce: nonce, RememberMe: rememberMe, ResetPassword: resetPassword, Session: session, Theme: theme})
|
2021-01-03 04:28:46 +00:00
|
|
|
if err != nil {
|
2021-08-03 23:18:20 +00:00
|
|
|
ctx.Error("an error occurred", 503)
|
2021-01-16 23:23:35 +00:00
|
|
|
logger.Errorf("Unable to execute template: %v", err)
|
2021-01-03 04:28:46 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|