/* eslint-disable @typescript-eslint/no-var-requires */ import Koa from "koa"; import { contentSecurityPolicy, dnsPrefetchControl, referrerPolicy, } from "koa-helmet"; import mount from "koa-mount"; import enforceHttps, { httpsResolver, xForwardedProtoResolver, } from "koa-sslify"; import env from "@server/env"; import Logger from "@server/logging/Logger"; import { initI18n } from "@server/utils/i18n"; import routes from "../routes"; import api from "../routes/api"; import auth from "../routes/auth"; const isProduction = env.ENVIRONMENT === "production"; // Construct scripts CSP based on services in use by this installation const defaultSrc = ["'self'"]; const scriptSrc = [ "'self'", "'unsafe-inline'", "'unsafe-eval'", "gist.github.com", "www.googletagmanager.com", "cdn.zapier.com", ]; // Allow to load assets from Vite if (!isProduction) { scriptSrc.push("127.0.0.1:3001"); scriptSrc.push("localhost:3001"); } if (env.GOOGLE_ANALYTICS_ID) { scriptSrc.push("www.google-analytics.com"); } if (env.CDN_URL) { scriptSrc.push(env.CDN_URL); defaultSrc.push(env.CDN_URL); } export default function init(app: Koa = new Koa()): Koa { initI18n(); if (isProduction) { // Force redirect to HTTPS protocol unless explicitly disabled if (env.FORCE_HTTPS) { app.use( enforceHttps({ resolver: (ctx) => { if (httpsResolver(ctx)) { return true; } return xForwardedProtoResolver(ctx); }, }) ); } else { Logger.warn("Enforced https was disabled with FORCE_HTTPS env variable"); } // trust header fields set by our proxy. eg X-Forwarded-For app.proxy = true; } app.use(mount("/auth", auth)); app.use(mount("/api", api)); // Sets common security headers by default, such as no-sniff, hsts, hide powered // by etc, these are applied after auth and api so they are only returned on // standard non-XHR accessed routes app.use( contentSecurityPolicy({ directives: { defaultSrc, scriptSrc, styleSrc: [ "'self'", "'unsafe-inline'", "github.githubassets.com", "cdn.zapier.com", ], imgSrc: ["*", "data:", "blob:"], frameSrc: ["*", "data:"], connectSrc: ["*"], // Do not use connect-src: because self + websockets does not work in // Safari, ref: https://bugs.webkit.org/show_bug.cgi?id=201591 }, }) ); // Allow DNS prefetching for performance, we do not care about leaking requests // to our own CDN's app.use( dnsPrefetchControl({ allow: true, }) ); app.use( referrerPolicy({ policy: "no-referrer", }) ); app.use(mount(routes)); return app; }