| | import path from 'node:path'; |
| | import { color, getConfigValue, safeReadFileSync } from '../util.js'; |
| | import { serverDirectory } from '../server-directory.js'; |
| | import { isHostAllowed, hostValidationMiddleware } from 'host-validation-middleware'; |
| |
|
| | const knownHosts = new Set(); |
| | const maxKnownHosts = 1000; |
| |
|
| | const hostWhitelistEnabled = !!getConfigValue('hostWhitelist.enabled', false); |
| | const hostWhitelist = Object.freeze(getConfigValue('hostWhitelist.hosts', [])); |
| | const hostWhitelistScan = !!getConfigValue('hostWhitelist.scan', false, 'boolean'); |
| |
|
| | const hostNotAllowedHtml = safeReadFileSync(path.join(serverDirectory, 'public/error/host-not-allowed.html'))?.toString() ?? ''; |
| |
|
| | const validationMiddleware = hostValidationMiddleware({ |
| | allowedHosts: hostWhitelist, |
| | generateErrorMessage: () => hostNotAllowedHtml, |
| | errorResponseContentType: 'text/html', |
| | }); |
| |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | export default function hostWhitelistMiddleware(req, res, next) { |
| | const hostValue = req.headers.host; |
| | if (hostWhitelistScan && !isHostAllowed(hostValue, hostWhitelist) && !knownHosts.has(hostValue) && knownHosts.size < maxKnownHosts) { |
| | const isFirstWarning = knownHosts.size === 0; |
| | console.warn(color.red('Request from untrusted host:'), hostValue); |
| | console.warn(`If you trust this host, you can add it to ${color.yellow('hostWhitelist.hosts')} in config.yaml`); |
| | if (!hostWhitelistEnabled && isFirstWarning) { |
| | console.warn(`To protect against host spoofing, consider setting ${color.yellow('hostWhitelist.enabled')} to true`); |
| | } |
| | if (isFirstWarning) { |
| | console.warn(`To disable this warning, set ${color.yellow('hostWhitelist.scan')} to false`); |
| | } |
| | knownHosts.add(hostValue); |
| | } |
| |
|
| | if (!hostWhitelistEnabled) { |
| | return next(); |
| | } |
| |
|
| | return validationMiddleware(req, res, next); |
| | } |
| |
|