make http headers configurable, update default conf
This commit is contained in:
41
server.js
41
server.js
@@ -19,33 +19,20 @@ var app = Express();
|
||||
|
||||
var httpsOpts;
|
||||
|
||||
app.use(function (req, res, next) {
|
||||
var host = req.headers.host;
|
||||
if (config.websocketPort) {
|
||||
host = host.replace(/\:[0-9]+/, ':' + config.websocketPort);
|
||||
var setHeaders = (function () {
|
||||
if (typeof(config.httpHeaders) !== 'object') { return function () {}; }
|
||||
|
||||
var headers = JSON.parse(JSON.stringify(config.httpHeaders));
|
||||
if (Object.keys(headers).length) {
|
||||
return function (res) {
|
||||
for (header in headers) { res.setHeader(header, headers[header]); }
|
||||
};
|
||||
}
|
||||
var proto = (httpsOpts || config.useSecureWebsockets) ? 'wss://' : 'ws://';
|
||||
res.setHeader('Content-Security-Policy', [
|
||||
"default-src 'none'",
|
||||
"style-src 'unsafe-inline' 'self'",
|
||||
|
||||
// No way to load ckeditor without unsafe-eval and unsafe-inline
|
||||
// https://dev.ckeditor.com/ticket/8584
|
||||
"script-src 'self' 'unsafe-eval' 'unsafe-inline'",
|
||||
|
||||
"connect-src 'self' " + proto + host,
|
||||
"child-src 'self'",
|
||||
"font-src 'self'",
|
||||
|
||||
// data: is used by codemirror, (insecure remote) images are included by people making
|
||||
// documents in ckeditor.
|
||||
"img-src data: *"
|
||||
].join('; '));
|
||||
|
||||
res.setHeader('X-XSS-Protection', '1; mode=block');
|
||||
res.setHeader('X-Content-Type-Options', 'nosniff');
|
||||
res.setHeader('X-Frame-Options', 'SAMEORIGIN');
|
||||
return function () {};
|
||||
}());
|
||||
|
||||
app.use(function (req, res, next) {
|
||||
setHeaders(res);
|
||||
next();
|
||||
});
|
||||
|
||||
@@ -56,6 +43,10 @@ Fs.exists(__dirname + "/customize", function (e) {
|
||||
console.log("Cryptpad is customizable, see customize.dist/readme.md for details");
|
||||
});
|
||||
|
||||
// FIXME I think this is a regression caused by a recent PR
|
||||
// correct this hack without breaking the contributor's intended behaviour.
|
||||
app.get(/\/(privacy|index|terms)\.html/, Express.static(__dirname + '/customize.dist'));
|
||||
|
||||
app.use("/customize", Express.static(__dirname + '/customize'));
|
||||
app.use("/customize", Express.static(__dirname + '/customize.dist'));
|
||||
app.use(/^\/[^\/]*$/, Express.static('customize'));
|
||||
|
||||
Reference in New Issue
Block a user