mirror of
https://github.com/mattermost/mattermost.git
synced 2026-04-15 14:08:55 -04:00
Some checks are pending
API / build (push) Waiting to run
Server CI / Compute Go Version (push) Waiting to run
Server CI / Check mocks (push) Blocked by required conditions
Server CI / Check go mod tidy (push) Blocked by required conditions
Server CI / check-style (push) Blocked by required conditions
Server CI / Check serialization methods for hot structs (push) Blocked by required conditions
Server CI / Vet API (push) Blocked by required conditions
Server CI / Check migration files (push) Blocked by required conditions
Server CI / Generate email templates (push) Blocked by required conditions
Server CI / Check store layers (push) Blocked by required conditions
Server CI / Check mmctl docs (push) Blocked by required conditions
Server CI / Postgres with binary parameters (push) Blocked by required conditions
Server CI / Postgres (push) Blocked by required conditions
Server CI / Postgres (FIPS) (push) Blocked by required conditions
Server CI / Generate Test Coverage (push) Blocked by required conditions
Server CI / Run mmctl tests (push) Blocked by required conditions
Server CI / Run mmctl tests (FIPS) (push) Blocked by required conditions
Server CI / Build mattermost server app (push) Blocked by required conditions
Web App CI / check-lint (push) Waiting to run
Web App CI / check-i18n (push) Blocked by required conditions
Web App CI / check-types (push) Blocked by required conditions
Web App CI / test (platform) (push) Blocked by required conditions
Web App CI / test (mattermost-redux) (push) Blocked by required conditions
Web App CI / test (channels shard 1/4) (push) Blocked by required conditions
Web App CI / test (channels shard 2/4) (push) Blocked by required conditions
Web App CI / test (channels shard 3/4) (push) Blocked by required conditions
Web App CI / test (channels shard 4/4) (push) Blocked by required conditions
Web App CI / upload-coverage (push) Blocked by required conditions
Web App CI / build (push) Blocked by required conditions
* [MM-67425] Add an unsupported Desktop App setting and screen for users * Remove console.log statements * Fix e2e test config * Add e2e test * PR feedback * Update server/channels/web/static.go Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> * PR feedback * Fix i18n * PR feedback * PR feedback * PR feedback * Gofmt --------- Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
221 lines
7.3 KiB
Go
221 lines
7.3 KiB
Go
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
|
|
// See LICENSE.txt for license information.
|
|
|
|
package web
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"html"
|
|
"net/http"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
|
|
"github.com/klauspost/compress/gzhttp"
|
|
|
|
"github.com/mattermost/mattermost/server/public/model"
|
|
"github.com/mattermost/mattermost/server/public/shared/mlog"
|
|
"github.com/mattermost/mattermost/server/v8/channels/app"
|
|
"github.com/mattermost/mattermost/server/v8/channels/utils"
|
|
"github.com/mattermost/mattermost/server/v8/channels/utils/fileutils"
|
|
"github.com/mattermost/mattermost/server/v8/platform/shared/templates"
|
|
)
|
|
|
|
var robotsTxt = []byte("User-agent: *\nDisallow: /\n")
|
|
|
|
func (w *Web) InitStatic() {
|
|
if *w.srv.Config().ServiceSettings.WebserverMode != "disabled" {
|
|
if err := utils.UpdateAssetsSubpathFromConfig(w.srv.Config()); err != nil {
|
|
mlog.Error("Failed to update assets subpath from config", mlog.Err(err))
|
|
}
|
|
|
|
staticDir, _ := fileutils.FindDir(model.ClientDir)
|
|
mlog.Debug("Using client directory", mlog.String("clientDir", staticDir))
|
|
|
|
subpath, _ := utils.GetSubpathFromConfig(w.srv.Config())
|
|
|
|
staticHandler := staticFilesHandler(http.StripPrefix(path.Join(subpath, "static"), http.FileServer(http.Dir(staticDir))))
|
|
pluginHandler := staticFilesHandler(http.StripPrefix(path.Join(subpath, "static", "plugins"), http.FileServer(http.Dir(*w.srv.Config().PluginSettings.ClientDirectory))))
|
|
|
|
if *w.srv.Config().ServiceSettings.WebserverMode == "gzip" {
|
|
staticHandler = gzhttp.GzipHandler(staticHandler)
|
|
pluginHandler = gzhttp.GzipHandler(pluginHandler)
|
|
}
|
|
|
|
w.MainRouter.PathPrefix("/static/plugins/").Handler(pluginHandler)
|
|
w.MainRouter.PathPrefix("/static/").Handler(staticHandler)
|
|
w.MainRouter.Handle("/robots.txt", http.HandlerFunc(robotsHandler))
|
|
w.MainRouter.Handle("/unsupported_browser.js", http.HandlerFunc(unsupportedBrowserScriptHandler))
|
|
w.MainRouter.Handle("/{anything:.*}", w.NewStaticHandler(root)).Methods(http.MethodGet, http.MethodHead)
|
|
|
|
// When a subpath is defined, it's necessary to handle redirects without a
|
|
// trailing slash. We don't want to use StrictSlash on the w.MainRouter and affect
|
|
// all routes, just /subpath -> /subpath/.
|
|
w.MainRouter.HandleFunc("", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
r.URL.Path += "/"
|
|
http.Redirect(w, r, r.URL.String(), http.StatusFound)
|
|
}))
|
|
}
|
|
}
|
|
|
|
func root(c *Context, w http.ResponseWriter, r *http.Request) {
|
|
if !CheckClientCompatibility(r.UserAgent()) {
|
|
w.Header().Set("Cache-Control", "no-store")
|
|
subpath, _ := utils.GetSubpathFromConfig(c.App.Srv().Config())
|
|
data := renderUnsupportedBrowser(c.AppContext, r, subpath)
|
|
|
|
err := c.App.Srv().TemplatesContainer().Render(w, "unsupported_browser", data)
|
|
if err != nil {
|
|
c.Logger.Error("Failed to render template", mlog.Err(err))
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
return
|
|
}
|
|
|
|
if !CheckDesktopAppCompatibility(r.UserAgent(), c.App.Srv().Config().ServiceSettings.MinimumDesktopAppVersion) {
|
|
w.Header().Set("Cache-Control", "no-store")
|
|
|
|
currentVersion, ok := app.GetDesktopAppVersion(r.UserAgent())
|
|
if !ok {
|
|
currentVersion = "unknown"
|
|
}
|
|
cfg := c.App.Srv().Config()
|
|
subpath, _ := utils.GetSubpathFromConfig(cfg)
|
|
|
|
data := renderUnsupportedDesktopApp(c.AppContext, cfg, currentVersion, subpath)
|
|
err := c.App.Srv().TemplatesContainer().Render(w, "unsupported_desktop_app", data)
|
|
if err != nil {
|
|
c.Logger.Error("Failed to render template", mlog.Err(err))
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
return
|
|
}
|
|
|
|
if IsAPICall(c.App, r) {
|
|
Handle404(c.App, w, r)
|
|
return
|
|
}
|
|
|
|
w.Header().Set("Cache-Control", "no-cache, max-age=31556926, public")
|
|
|
|
staticDir, _ := fileutils.FindDir(model.ClientDir)
|
|
contents, err := os.ReadFile(filepath.Join(staticDir, "root.html"))
|
|
if err != nil {
|
|
c.Logger.Warn("Failed to read content from file",
|
|
mlog.String("file_path", filepath.Join(staticDir, "root.html")),
|
|
mlog.Err(err))
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
titleTemplate := "<title>%s</title>"
|
|
originalHTML := fmt.Sprintf(titleTemplate, html.EscapeString(model.TeamSettingsDefaultSiteName))
|
|
modifiedHTML := getOpenGraphMetaTags(c)
|
|
if originalHTML != modifiedHTML {
|
|
contents = bytes.ReplaceAll(contents, []byte(originalHTML), []byte(modifiedHTML))
|
|
}
|
|
|
|
w.Header().Set("Content-Type", "text/html")
|
|
if _, err = w.Write(contents); err != nil {
|
|
c.Logger.Warn("Failed to write content to HTTP reply", mlog.Err(err))
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
}
|
|
|
|
func staticFilesHandler(handler http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
//wrap our ResponseWriter with our no-cache 404-handler
|
|
w = ¬FoundNoCacheResponseWriter{ResponseWriter: w}
|
|
|
|
if path.Base(r.URL.Path) == "remote_entry.js" {
|
|
w.Header().Set("Cache-Control", "no-cache, max-age=31556926, public")
|
|
} else {
|
|
w.Header().Set("Cache-Control", "max-age=31556926, public")
|
|
}
|
|
|
|
// Hardcoded sensible default values for these security headers. Feel free to override in proxy or ingress
|
|
w.Header().Set("Permissions-Policy", "")
|
|
w.Header().Set("X-Content-Type-Options", "nosniff")
|
|
w.Header().Set("Referrer-Policy", "no-referrer")
|
|
|
|
if strings.HasSuffix(r.URL.Path, "/") {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
|
|
handler.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
type notFoundNoCacheResponseWriter struct {
|
|
http.ResponseWriter
|
|
}
|
|
|
|
func (w *notFoundNoCacheResponseWriter) WriteHeader(statusCode int) {
|
|
if statusCode == http.StatusNotFound {
|
|
// we have a 404, update our cache header first then fall through
|
|
w.Header().Set("Cache-Control", "no-cache, public")
|
|
}
|
|
w.ResponseWriter.WriteHeader(statusCode)
|
|
}
|
|
|
|
func robotsHandler(w http.ResponseWriter, r *http.Request) {
|
|
if strings.HasSuffix(r.URL.Path, "/") {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
if _, err := w.Write(robotsTxt); err != nil {
|
|
mlog.Warn("Failed to write robots.txt", mlog.Err(err))
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
}
|
|
|
|
func unsupportedBrowserScriptHandler(w http.ResponseWriter, r *http.Request) {
|
|
if strings.HasSuffix(r.URL.Path, "/") {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
|
|
templatesDir, _ := templates.GetTemplateDirectory()
|
|
http.ServeFile(w, r, filepath.Join(templatesDir, "unsupported_browser.js"))
|
|
}
|
|
|
|
func ensureTrailingSlash(s string) string {
|
|
if s == "" {
|
|
return "/"
|
|
}
|
|
if !strings.HasSuffix(s, "/") {
|
|
return s + "/"
|
|
}
|
|
return s
|
|
}
|
|
|
|
func getOpenGraphMetaTags(c *Context) string {
|
|
siteName := model.TeamSettingsDefaultSiteName
|
|
customSiteName := c.App.Srv().Config().TeamSettings.SiteName
|
|
if customSiteName != nil && *customSiteName != "" {
|
|
siteName = *customSiteName
|
|
}
|
|
|
|
siteDescription := model.TeamSettingsDefaultCustomDescriptionText
|
|
customSiteDescription := c.App.Srv().Config().TeamSettings.CustomDescriptionText
|
|
if customSiteDescription != nil && *customSiteDescription != "" {
|
|
siteDescription = *customSiteDescription
|
|
}
|
|
|
|
titleTemplate := "<title>%s</title>"
|
|
titleHTML := fmt.Sprintf(titleTemplate, html.EscapeString(siteName))
|
|
descriptionHTML := ""
|
|
if siteDescription != "" {
|
|
descriptionTemplate := "<meta property=\"og:description\" content=\"%s\" />"
|
|
descriptionHTML = fmt.Sprintf(descriptionTemplate, html.EscapeString(siteDescription))
|
|
}
|
|
|
|
return titleHTML + descriptionHTML
|
|
}
|