| import path from 'node:path'; |
| import { color, getConfigValue, safeReadFileSync } from '../util.js'; |
| import { serverDirectory } from '../server-directory.js'; |
| import { isHostAllowed, hostValidationMiddleware } from 'host-validation-middleware'; |
|
|
| const knownHosts = new Set(); |
| const maxKnownHosts = 1000; |
|
|
| const hostWhitelistEnabled = !!getConfigValue('hostWhitelist.enabled', false); |
| const hostWhitelist = Object.freeze(getConfigValue('hostWhitelist.hosts', [])); |
| const hostWhitelistScan = !!getConfigValue('hostWhitelist.scan', false, 'boolean'); |
|
|
| const hostNotAllowedHtml = safeReadFileSync(path.join(serverDirectory, 'public/error/host-not-allowed.html'))?.toString() ?? ''; |
|
|
| const validationMiddleware = hostValidationMiddleware({ |
| allowedHosts: hostWhitelist, |
| generateErrorMessage: () => hostNotAllowedHtml, |
| errorResponseContentType: 'text/html', |
| }); |
|
|
| |
| |
| |
| |
| |
| |
| |
| export default function hostWhitelistMiddleware(req, res, next) { |
| const hostValue = req.headers.host; |
| if (hostWhitelistScan && !isHostAllowed(hostValue, hostWhitelist) && !knownHosts.has(hostValue) && knownHosts.size < maxKnownHosts) { |
| const isFirstWarning = knownHosts.size === 0; |
| console.warn(color.red('Request from untrusted host:'), hostValue); |
| console.warn(`If you trust this host, you can add it to ${color.yellow('hostWhitelist.hosts')} in config.yaml`); |
| if (!hostWhitelistEnabled && isFirstWarning) { |
| console.warn(`To protect against host spoofing, consider setting ${color.yellow('hostWhitelist.enabled')} to true`); |
| } |
| if (isFirstWarning) { |
| console.warn(`To disable this warning, set ${color.yellow('hostWhitelist.scan')} to false`); |
| } |
| knownHosts.add(hostValue); |
| } |
|
|
| if (!hostWhitelistEnabled) { |
| return next(); |
| } |
|
|
| return validationMiddleware(req, res, next); |
| } |
|
|