2021-01-21 21:06:52 +00:00
|
|
|
'use strict';
|
|
|
|
|
2020-11-23 13:24:19 -05:00
|
|
|
const hasPadAccess = require('../../padaccess');
|
|
|
|
const settings = require('../../utils/Settings');
|
|
|
|
const exportHandler = require('../../handler/ExportHandler');
|
|
|
|
const importHandler = require('../../handler/ImportHandler');
|
|
|
|
const padManager = require('../../db/PadManager');
|
|
|
|
const readOnlyManager = require('../../db/ReadOnlyManager');
|
|
|
|
const rateLimit = require('express-rate-limit');
|
|
|
|
const securityManager = require('../../db/SecurityManager');
|
|
|
|
const webaccess = require('./webaccess');
|
2020-04-04 20:39:33 +00:00
|
|
|
|
2021-01-21 21:06:52 +00:00
|
|
|
exports.expressCreateServer = (hookName, args, cb) => {
|
2021-02-16 20:53:42 -05:00
|
|
|
settings.importExportRateLimiting.onLimitReached = (req, res, options) => {
|
|
|
|
// when the rate limiter triggers, write a warning in the logs
|
|
|
|
console.warn('Import/Export rate limiter triggered on ' +
|
|
|
|
`"${req.originalUrl}" for IP address ${req.ip}`);
|
|
|
|
};
|
|
|
|
// The rate limiter is created in this hook so that restarting the server resets the limiter.
|
|
|
|
const limiter = rateLimit(settings.importExportRateLimiting);
|
|
|
|
|
2020-04-13 01:33:43 +02:00
|
|
|
// handle export requests
|
2020-04-04 20:39:33 +00:00
|
|
|
args.app.use('/p/:pad/:rev?/export/:type', limiter);
|
2021-02-07 19:56:07 -05:00
|
|
|
args.app.get('/p/:pad/:rev?/export/:type', (req, res, next) => {
|
|
|
|
(async () => {
|
|
|
|
const types = ['pdf', 'doc', 'txt', 'html', 'odt', 'etherpad'];
|
|
|
|
// send a 404 if we don't support this filetype
|
|
|
|
if (types.indexOf(req.params.type) === -1) {
|
|
|
|
return next();
|
|
|
|
}
|
2012-02-25 16:06:08 +01:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
// if abiword is disabled, and this is a format we only support with abiword, output a message
|
|
|
|
if (settings.exportAvailable() === 'no' &&
|
|
|
|
['odt', 'pdf', 'doc'].indexOf(req.params.type) !== -1) {
|
|
|
|
console.error(`Impossible to export pad "${req.params.pad}" in ${req.params.type} format.` +
|
|
|
|
' There is no converter configured');
|
2020-04-13 01:33:43 +02:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
// ACHTUNG: do not include req.params.type in res.send() because there is
|
|
|
|
// no HTML escaping and it would lead to an XSS
|
|
|
|
res.send('This export is not enabled at this Etherpad instance. Set the path to Abiword' +
|
|
|
|
' or soffice (LibreOffice) in settings.json to enable this feature');
|
|
|
|
return;
|
|
|
|
}
|
2012-02-25 16:06:08 +01:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
res.header('Access-Control-Allow-Origin', '*');
|
2012-02-25 16:06:08 +01:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
if (await hasPadAccess(req, res)) {
|
|
|
|
let padId = req.params.pad;
|
2020-09-16 14:57:27 -03:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
let readOnlyId = null;
|
|
|
|
if (readOnlyManager.isReadOnlyId(padId)) {
|
|
|
|
readOnlyId = padId;
|
|
|
|
padId = await readOnlyManager.getPadId(readOnlyId);
|
|
|
|
}
|
2020-09-16 14:57:27 -03:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
const exists = await padManager.doesPadExists(padId);
|
|
|
|
if (!exists) {
|
|
|
|
console.warn(`Someone tried to export a pad that doesn't exist (${padId})`);
|
|
|
|
return next();
|
|
|
|
}
|
2018-04-04 21:48:32 +01:00
|
|
|
|
2021-02-07 19:56:07 -05:00
|
|
|
console.log(`Exporting pad "${req.params.pad}" in ${req.params.type} format`);
|
2021-03-17 18:54:57 -04:00
|
|
|
await exportHandler.doExport(req, res, padId, readOnlyId, req.params.type);
|
2021-02-07 19:56:07 -05:00
|
|
|
}
|
|
|
|
})().catch((err) => next(err || new Error(err)));
|
2012-02-25 16:06:08 +01:00
|
|
|
});
|
|
|
|
|
2019-02-08 23:20:57 +01:00
|
|
|
// handle import requests
|
2020-04-04 20:39:33 +00:00
|
|
|
args.app.use('/p/:pad/import', limiter);
|
2021-02-07 19:56:07 -05:00
|
|
|
args.app.post('/p/:pad/import', (req, res, next) => {
|
|
|
|
(async () => {
|
|
|
|
const {session: {user} = {}} = req;
|
|
|
|
const {accessStatus} = await securityManager.checkAccess(
|
|
|
|
req.params.pad, req.cookies.sessionID, req.cookies.token, user);
|
|
|
|
if (accessStatus !== 'grant' || !webaccess.userCanModify(req.params.pad, req)) {
|
|
|
|
return res.status(403).send('Forbidden');
|
|
|
|
}
|
|
|
|
await importHandler.doImport(req, res, req.params.pad);
|
|
|
|
})().catch((err) => next(err || new Error(err)));
|
2012-02-25 16:06:08 +01:00
|
|
|
});
|
2020-10-10 22:51:26 -04:00
|
|
|
|
|
|
|
return cb();
|
2020-11-23 13:24:19 -05:00
|
|
|
};
|